NCJ Number
80564
Date Published
1979
Length
128 pages
Annotation
This second of three volumes describing the workings and application of the privacy and security cost model provides instructions on how to compile and load the various programs and subroutines composing the automated cost model, as well as instructions on the execution of the software.
Abstract
State agencies responsbile for implementing Department of Justice regulations for privacy and security in criminal history record information have expressed the need for cost data and for principles to justify budget requests and support proposals for the additional State legislation often required. This study is intended to meet such a need. In addition to providing the user of the automated version of the privacy and security cost model with instructions on how to compile and load the programs and execute the model's software, this volume also furnishes instructions on how to use the Cost Analysis Form and related schedules described in volume 1 as source documents for data entry into the automated model. Information on how to interpret output reports and the model's program logic is provided as well. The automated cost model has been designed to (1) follow the manual model as closely as possible, (2) provide the user with feedback on intermediate calculations, (3) give a concise report of all data entered, and (4) allow easy switching from the questions on the Cost Analysis Form to the related schedule questions for each section of the model. The model relieves the user of having to reanswer questions that are used throughout the form by storing frequently used cost factors. Volume 1 (see NCJ 80563) is a user's guide for the manual version of the cost model, and volume 3 (see NCJ 80565) provides an executive summary of the project.