348 resultados para Communal ownership
Resumo:
The Australian Bone Marrow Donor Registry (ABMDR) is a publicly funded company that is part of an international network that facilitates unrelated bone marrow transplantation. This role means that the ABMDR has access to a large biospecimen repository, therefore making it a highly valuable research resource. Recognising the potential value of these biospecimens for research purposes, the ABMDR is in the process of determining whether, and how, to share its biospecimens with other biobanks. While this would undoubtedly be of value to the scientific community, and ultimately to the wider community, it would also inevitably transform the role of an institution whose primary role is therapeutic, and would compromise the degree of control that a custodian has over donated material. This article describe the challenges confronting the ABMDR, and organisations like it, in balancing their duties to donors, patients, researchers and the general public. These problems have led inevitably to the use of "property" rights language in the discussion of these issues but notions of gift, ownership, trusteeship and transfer might also be considered.
Resumo:
Community-based arts and media movements have been intsrumental in building population-wide creative capacity for cultural development, social participation and social transformation in many parts of the world. Digital storytelling is a form of media practice that was pioneered in the United States at the intersection of these movements. It is described here as a ‘co-creative’ media production method. This description aims to differentiate the approaches to collaborative content creation that are used in community cultural development (CCD) and community media movements from those valued in professional and consumer modes of media production. Yet, the products of co-creative practices, such as digital stories, do not circulate widely through existing media networks or through the newer social media networks that Australian CCD and community media movements anticipated by at least twenty years. The complex politics of story ownership are one of a number of factors that often render ‘publication’ a secondary consideration in the making of digital stories. The possibility of ‘downstream’ use and re-use of stories in other networks is not usually considered in initial planning and development processes. As landmark projects such as Capture Wales indicate, even where stories are made for broadcast outcomes, television can be a problematic window for exhibiting digital stories. Scepticism about the brave new world of reality television and user generated content also circulates in digital storytelling networks, especially when it comes to ethical concerns for managing the risks of harm associated with widespread distribution of digital stories to indiscriminate publics. This publication reports on a collaborative action research project that took a closer look at some of the constraints relating to the problems of re-purposing digital stories for television. It focussed on ‘best practice’ for managing the risks of harm to storytellers in the process of re-purposing digital stories for broadcast on community television.
Resumo:
Background In China, as in many developing countries, rapid increases in car ownership and new drivers have been coupled with a large trauma burden. The World Health Organization has identified key risk factors including speeding, drink-driving, helmet and restraint non-use, overloaded vehicles, and fatigued-driving in many rapidly motorising countries, including China. Levels of awareness of these risk factors among road users are not well understood. Although research identifies speeding as the major factor contributing to road crashes in China, there appears to be widespread acceptance of it among the broader community. Purpose To assess self-reported speeding and awareness of crash risk factors among Chinese drivers in Beijing. Methods Car drivers (n=299) were recruited from car washing locations and car parks to complete an anonymous questionnaire. Perceptions of the relative risk of drink-driving, fatigued-driving and speeding, and attitudes towards speeding and self-reported driving speeds were assessed. Results Overall, driving speeds of >10km/hr above posted limits on two road types (60 and 80 km/hour zones) were reported by more than one third of drivers. High-range speeding (i.e., >30 km/hour in a 60 km/hour zone and >40 km/hour in an 80 km/hour zone) was reported by approximately 5% of the sample. Attitudinal measures indicated that approximately three quarters of drivers reported attitudes that were not supportive of speeding. Drink-driving was identified as the most risky behaviour; 18% reported the perception that drink-driving had the same level of danger as speeding and 82% reported it as more dangerous. For fatigued-driving, 1% reported the perception that it was not as dangerous as speeding; 27.4% reported it as the same level and 71.6% perceived it as more dangerous. Conclusion Driving speeds well above posted speed limits were commonly reported by drivers. Speeding was rated as the least dangerous on-road behaviour, compared to drink-driving and fatigued-driving. One third of drivers reported regularly engaging in speeds at least 10km/hr above posted limits, despite speeding being the major reported contributor to crashes. Greater awareness of the risks associated with speeding is needed to help reduce the road trauma burden in China and promote greater speed limit compliance.
Resumo:
This is the first volume in a book series examining how organizations in the creative industries respond to disruptive change and how they themselves generate business innovations. The aspiration of this book series is to understand some of the common forces behind the disruptions occurring in so many creative industries today and identifying the most promising strategies and responses by organizations to create new value propositions, business models and business practices that can enable these industry participants to cope with and eventually thrive as their industries and sectors are transformed. The chapters included in the volume examine the processes of disruption and transformation due to the technology of the Internet, social forces driven by social media, the development of new portable digital devices with greater capabilities and smaller size, the decreasing costs of new information, and the creation of new business models and forms of intellectual property ownership rights for a digitized industry. The context for this volume is the publishing industries, understood as the industries for the publishing of fiction and non-fiction books, academic literature, consumer as well as trade magazines, and daily newspapers. This volume includes chapters by an internationally diverse array of media scholars whose chapters provide insights into these phenomena in Eastern Europe, Finland, France, Germany, Norway, Portugal, Russia, and the United States, using different methodological frameworks including, but not limited to, surveys, in-depth interviews and multiple-case studies. One gap that this book series seeks to fill is that between the study of business innovation and disruption by innovation scholars largely based in business school settings and similar studies by scholarly experts from non-business school disciplines, including the broader social sciences (e.g. sociology, political science, economic geography) and creative industry based professional school disciplines (e.g. architecture, communications, design, film making, journalism, media studies, performing arts, photography and television). Future volumes of this book series will examine disruption and business innovation in the film, video and photography sectors (volume two), the music sector (volume three) and interactive entertainment (volume four), with subsequent volumes focusing on the most relevant developments in creative industry business innovation and disruption that emerge.
Resumo:
A typology of music distribution models is proposed consisting of the ownership model, the access model, and the context model. These models are not substitutes for each other and may co‐exist serving different market niches. The paper argues that increasingly the economic value created from recorded music is based on con‐text rather than on ownership. During this process, access‐based services temporarily generate economic value, but such services are destined to eventually become commoditised.
Resumo:
During the evolution of the music industry, developments in the media environment have required music firms to adapt in order to survive. Changes in broadcast radio programming during the 1950s; the Compact Cassette during the 1970s; and the deregulation of media ownership during the 1990s are all examples of changes which have heavily affected the music industry. This study explores similar contemporary dynamics, examines how decision makers in the music industry perceive and make sense of the developments, and reveals how they revise their business strategies, based on their mental models of the media environment. A qualitative system dynamics model is developed in order to support the reasoning brought forward by the study. The model is empirically grounded, but is also based on previous music industry research and a theoretical platform constituted by concepts from evolutionary economics and sociology of culture. The empirical data primarily consist of 36 personal interviews with decision makers in the American, British and Swedish music industrial ecosystems. The study argues that the model which is proposed, more effectively explains contemporary music industry dynamics than music industry models presented by previous research initiatives. Supported by the model, the study is able to show how “new” media outlets make old music business models obsolete and challenge the industry’s traditional power structures. It is no longer possible to expose music at one outlet (usually broadcast radio) in the hope that it will lead to sales of the same music at another (e.g. a compact disc). The study shows that many music industry decision makers still have not embraced the new logic, and have not yet challenged their traditional mental models of the media environment. Rather, they remain focused on preserving the pivotal role held by the CD and other physical distribution technologies. Further, the study shows that while many music firms remain attached to the old models, other firms, primarily music publishers, have accepted the transformation, and have reluctantly recognised the realities of a virtualised environment.
Resumo:
Remote dryland regions are characterised by sparse populations and socially marginalised voices which pose particular challenges to natural resource management. This paper considers the issue of how to achieve community engagement in regions with these characteristics. In doing so, the paper contributes to an expanding international research agenda focusing on the distinct characteristics of arid and semi-arid regions under the heading of 'dryland syndrome'. The paper draws on government liaison officer and local community perspectives of successful engagement in the case-study region of Lake Eyre Basin, Australia. The results demonstrate that widely recognised characteristics of successful engagement are required but insufficient for genuine engagement in remote dryland regions. In addition to building trust through community ownership, being inclusive, effective communication, and adequate resources, genuine community engagement in drylands also requires respecting the extreme conditions and extraordinary variability of these areas. Residents of dryland regions seek genuine engagement yet engage opportunistically when seasons are conducive and when tangible outcomes are visible. © 2011 The Authors. Geographical Research © 2011 Institute of Australian Geographers.
Resumo:
As planners work to create more sustainable and liveable urban environments, a priority is to transition away from prioritising the automobile and towards enhancing the pedestrian experience. Thus, this research explores the experience of pedestrian accessibility in inner-urban higher-density Brisbane in Australia, drawing on findings from semi-structured in-depth interviews with 24 residents and over 100 hours of public place observations in three case-study neighbourhoods. The interviews took place in residents homes and explored their experience of higher density living and their neighbourhood, whilst observations were recorded through a combination of methods including photographs, sketch maps, recordings and field journals. Observation locations included retail and commercial space, roads, parkland and open space, with multiple observations at each location. A thematic analysis identified common themes in both interviews and the observations, with this paper focusing on residents’ lived experience in urban built environments. This analysis revealed that pedestrian accessibility is linked to access to local amenities and direct routes, aesthetics, sense of community, ownership of space and safety. In particular, observations revealed how pedestrian accessibility and route-taking works with, against or in spite of the design features of urban environments, as well as the importance of the social use of the built environment. Residents spoke about although walking quick and preferred for local amenities, the decision to walk was moderated by factors such as time of day and perceived safety. Measures to ensure and improve the pedestrian accessibility of urban areas needs to take into account the propensity for people to prefer and improvise direct routes (often to the detriment of traffic safety considerations), the importance of ongoing maintenance and upgrading of walking infrastructure and the importance of aesthetically pleasing and safe walking environments. By combining interviews and observations, this research highlights the current dominance of the automobile culture in Brisbane and the layers of meaning, experiences and complexity hidden within the pedestrian experience.
Resumo:
This paper presents a new hybrid evolutionary algorithm based on Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) for daily Volt/Var control in distribution system including Distributed Generators (DGs). Due to the small X/R ratio and radial configuration of distribution systems, DGs have much impact on this problem. Since DGs are independent power producers or private ownership, a price based methodology is proposed as a proper signal to encourage owners of DGs in active power generation. Generally, the daily Volt/Var control is a nonlinear optimization problem. Therefore, an efficient hybrid evolutionary method based on Particle Swarm Optimization and Ant Colony Optimization (ACO), called HPSO, is proposed to determine the active power values of DGs, reactive power values of capacitors and tap positions of transformers for the next day. The feasibility of the proposed algorithm is demonstrated and compared with methods based on the original PSO, ACO and GA algorithms on IEEE 34-bus distribution feeder.
Resumo:
This paper presents an efficient hybrid evolutionary optimization algorithm based on combining Ant Colony Optimization (ACO) and Simulated Annealing (SA), called ACO-SA, for distribution feeder reconfiguration (DFR) considering Distributed Generators (DGs). Due to private ownership of DGs, a cost based compensation method is used to encourage DGs in active and reactive power generation. The objective function is summation of electrical energy generated by DGs and substation bus (main bus) in the next day. The approach is tested on a real distribution feeder. The simulation results show that the proposed evolutionary optimization algorithm is robust and suitable for solving DFR problem.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples of ‘good’ early childhood education practice, the study labelled racialising practices in educators’ work. The primary aim was to understand how racialising practices are mobilised in professional practices, including documentation, even when educators’ work is seen to be high quality. Extracts from two communal journals that captured an action research process around embedding practices are examined to show how racism and whiteness were concealed within the documentation. This enables understanding about how documentation can provide evidence to stakeholders that diversity work in mainstream childcare centres is productive and inclusive, despite disparity between what is recorded and what occurs in practice.
Resumo:
In private placement transactions, issuing firms sell a block of securities to just a small group of investors at a discounted price. Non-participating shareholders suffer from ownership dilution and lose the opportunity to receive the discount. This thesis provides the first evidence on whether and how corporate governance can protect non-participating shareholders' interests. Results from an examination of 329 private placements issued by the top 250 Australian firms between 2002 and 2009 demonstrate that firms with higher governance quality are more likely to issue a share purchase plan (SPP) along with the private placement, thus providing greater protection to non-participating shareholders' interests.
Resumo:
Streaming services like Spotify and Pandora pay many millions of dollars each year for the rights to the music they play. But how much of this ends up back with artists and songwriters? The answer: not an awful lot.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.