122 resultados para Norms to be applied to the open access regulation


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fierce debates have characterised 2013 as the implications of government mandates for open access have been debated and pathways for implementation worked out. There is no doubt that journals will move to a mix of gold and green and there will be an unsettled relationship between the two. But what of books? Is it conceivable that in those subjects, such as in the humanities and social sciences, where something longer than the journal article is still the preferred form of scholarly communications that these will stay closed? Will it be acceptable to have some publicly funded research made available only in closed book form (regardless of whether print or digital) while other subjects where articles are favoured go open access? Frances Pinter is in the middle of these debates, having founded Knowledge Unlatched (see www.knowledgeunlatched.org). KU is a global library consortium enabling open access books. Knowledge Unlatched is helping libraries to work together for a sustainable open future for specialist academic books. Its vision is a healthy market that includes free access for end users. In this session she will review all the different models that are being experimented with around the world. These include author-side payments, institutional subsidies, research funding body approaches etc. She will compare and contrast these models with those that are already in place for journal articles. She will also review the policy landscape and report on how open access scholarly books are faring to date Frances Pinter, Founder, Knowledge Unlatched, UK

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The world is increasingly moving towards more open models of publishing and communication. The UK government has demonstrated a firm commitment to ensuring that academic research outputs are made available to all who might benefit from access to them, and its open access policy attempts to make academic publications freely available to readers, rather than being locked behind pay walls or only available to researchers with access to well-funded university libraries. Open access policies have an important role to play in fostering an open innovation ecosystem and ensuring that maximum value is derived from investments in university-based research. But are we ready to embrace this change?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background The majority of patients who attend emergency departments (EDs) in Saudi Arabia have non-urgent problems, resulting in overcrowding, excessive waiting times and delayed care for more acutely ill patients. The purpose of this research was to examine the reasons for non-urgent visits to a Saudi ED and factors associated with patient perceptions of urgency. Methods We administered a survey to 350 consecutively presenting Canadian Triage and Acuity Scale (CTAS) IV or V adult patients at a large tertiary ED in Riyadh region, Saudi Arabia, during 25 days of data collection in March 2013. Results Over half of the sample usually visited the ED to access healthcare. The most common reasons for attending the ED were not having a regular healthcare provider (63%), being able to receive care on the same day (62%), and the convenience of and access to medical care 24/7 (62%). Approximately two-thirds of CTAS V patients and one-third of CTAS IV patients believed their condition was more urgent than their triage nurse rating. Conclusion Multiple factors influence non-urgent visits to the ED in the Saudi context including insufficient community awareness of the role of the ED and perceived lack of access to primary healthcare services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article investigates the discourses of academic legitimacy that surround the production, consumption, and accreditation of online scholarship. Using the web-based media and cultural studies journal (http://journal.media-culture.org.au) as a case study, it examines how online scholarly journals often position themselves as occupying a space between the academic and the popular and as having a functional advantage over print-based media in promoting a spirit of public intellectualism. The current research agenda of both government and academe prioritises academic research that is efficient, self-promoting, and relevant to the public. Yet, although the cost-effectiveness and public-intellectual focus of online scholarship speak to these research priorities, online journals such as M/C Journal have occupied, and continue to occupy, an unstable position in relation to the perceived academic legitimacy of their content. Although some online scholarly journals have achieved a limited form of recognition within a system of accreditation that still privileges print-based scholarship, I argue that this, nevertheless, points to the fact that traditional textual notions of legitimate academic work continue to pervade the research agenda of an academe that increasingly promotes flexible delivery of teaching and online research initiatives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"This invaluable companion to The Mammals of Australia is intended to be taken out into the field and used in conjunction with the more comprehensive volume. Genuinely practical in the outdoors, the book includes accounts of 389 species and newly developed, comprehensive identification keys. The Field Companion is introduced by a Mammal Distribution Matrix, which provides a classified checklist of all mammals in Australia (including those extinguished since European settlement) and the distribution of extant species in each state and territory. Species accounts provide initial differentiation, and include notes on identification, size, abundance, habitat and federal list/status, photograph and distribution map, as well as key references, which provide quick access to all relevant state identification keys in the Field Companion and to the longer entry in The Mammals of Australia. The authors have developed separate keys, illustrated with detailed drawings and maps, for the six states and the Northern Territory, to simplify the identification process and allow the reader to confidently separate all mammal species, no matter how subtle the differences. With the addition of these identification keys, this book becomes more than a field guide - although it is intended primarily to be used outdoors - and allows the user to finish identification based on more obscure characteristics, which is an advantage for some hard-to-identify species groups."--Libraries Australia

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since Queensland Wire Industries Pty Ltd v Broken Hill Pty Co Ltd (1989) 167 CLR 177 it has been recognised that corporations with substantial market power are subject to special responsibilities and restraints that corporations without market power are not. In NT Power Generation Pty Ltd v Power and Water Authority (2004) 219 CLR 90 McHugh A-CJ, Gummow, Callinan and Heydon JJ in their joint reasons stated (at [76]), that s 46 of the Competition and Consumer Act 2010 (Cth) (CCA) can operate not only to prevent firms with substantial market power from doing prohibited things, but also compel them positively to do things they do not want to do. Their Honours also stated (at [126]) that the proposition that a private property owner who declines to permit competitors to use the property is immune from s 46 is “intrinsically unsound”. However, the circumstances in which a firm with substantial power must accommodate competitors, and private property rights give way to the public interest are uncertain. The purpose of this Note is to consider recent developments in two areas of the CCA where the law requires private property rights to give way to the public interest. The first part of the Note considers two recent cases which clarify the circumstances in which s 46 of the CCA can be used to compel a firm with substantial market power to accommodate a competitor and allow the competitor to make use of private property rights in the public interest. Secondly, on 12 February 2014 the Minister for Small Business, the Hon Bruce Billson,released the Productivity Commission’s Final Report, on the National Access Regime in Pt IIIA of the CCA (National Access Regime, Inquiry Report No 66, Canberra). Pt IIIA provides for the processes by which third parties may obtain access to infrastructure owned by others in the public interest. The Report recommends that Pt IIIA be retained but makes a number of suggestions for its reform, some of which will be briefly considered.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An estimated 285 million people worldwide are visually impaired. Some 90% of those live in developing nations, where less than 1% of the world’s books are available in a form they can read. In developed countries, the situation is only marginally better: only around 7% of the world’s books are accessible to print-disabled people. The right to read is part of our basic human rights. Access to the written word is crucial to allow people to fully participate in society. It’s important for education, political involvement, success in the workplace, scientific progress and, not least, creative play and leisure. Equal access to books and other cultural goods is also required by international law. The technology now exists to deliver books in accessible electronic forms to people much more cheaply than printing and shipping bulky braille copies or books on tape. Electronic books can be read with screen readers and refreshable braille devices, or printed into large print or braille if needed. Now that we have this technology, what’s been referred to as the global “book famine” is a preventable tragedy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ubiquitination involves the attachment of ubiquitin to lysine residues on substrate proteins or itself, which can result in protein monoubiquitination or polyubiquitination. Ubiquitin attachment to different lysine residues can generate diverse substrate-ubiquitin structures, targeting proteins to different fates. The mechanisms of lysine selection are not well understood. Ubiquitination by the largest group of E3 ligases, the RING-family E3 s, is catalyzed through co-operation between the non-catalytic ubiquitin-ligase (E3) and the ubiquitin-conjugating enzyme (E2), where the RING E3 binds the substrate and the E2 catalyzes ubiquitin transfer. Previous studies suggest that ubiquitination sites are selected by E3-mediated positioning of the lysine toward the E2 active site. Ultimately, at a catalytic level, ubiquitination of lysine residues within the substrate or ubiquitin occurs by nucleophilic attack of the lysine residue on the thioester bond linking the E2 catalytic cysteine to ubiquitin. One of the best studied RING E3/ E2 complexes is the Skp1/Cul1/F box protein complex, SCFCdc4, and its cognate E2, Cdc34, which target the CDK inhibitor Sic1 for K48-linked polyubiquitination, leading to its proteasomal degradation. Our recent studies of this model system demonstrated that residues surrounding Sic1 lysines or lysine 48 in ubiquitin are critical for ubiquitination. This sequence-dependence is linked to evolutionarily conserved key residues in the catalytic region of Cdc34 and can determine if Sic1 is mono- or poly-ubiquitinated. Our studies indicate that amino acid determinants in the Cdc34 catalytic region and their compatibility to those surrounding acceptor lysine residues play important roles in lysine selection. This may represent a general mechanism in directing the mode of ubiquitination in E2 s.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This submission addresses the Youth Justice and Other Legislation Amendment Bill 2014 the objectives of which are to: 1. Permit repeat offenders’ identifying information to be published and open the Children’s Court for youth justice matters involving repeat offenders; 2. Create a new offence where a child commits a further offence while on bail; 3. Permit childhood findings of guilt for which no conviction was recorded to be admissible in court when sentencing a person for an adult offence; 4. Provide for the automatic transfer from detention to adult corrective services facilities of 17 year olds who have six months or more left to serve in detention; 5. Provide that, in sentencing any adult or child for an offence punishable by imprisonment, the court must not have regard to any principle, whether under statute or at law, that a sentence of imprisonment (in the case of an adult) or detention (in the case of a child) should only be imposed as a last resort; 6. Allow children who have absconded from Sentenced Youth Boot Camps to be arrested and brought before a court for resentencing without first being given a warning; and 7. Make a technical amendment to the Youth Justice Act 1992.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Until quite recently, most Australian jurisdictions gave statutory force to the principle of imprisonment as a sanction of last resort, reflecting its status as the most punitive sentencing option open to the court.1 That principle gave primary discretion as to whether incarceration was the most appropriate means of achieving the purpose of a sentence to the sentencing court, which received all of the information relevant to the offence, the offender and any victim(s). The disestablishment of this principle is symptomatic of an increasing erosion of judicial discretion with respect to sentencing, which appears to be resulting in some extremely punitive consequences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasing evidence suggests that chromatin modifications have important roles in modulating constitutive or alternative splicing. Here we demonstrate that the PWWP domain of the chromatin-associated protein Psip1/Ledgf can specifically recognize tri-methylated H3K36 and that, like this histone modification, the Psip1 short (p52) isoform is enriched at active genes. We show that the p52, but not the long (p75), isoform of Psip1 co-localizes and interacts with Srsf1 and other proteins involved in mRNA processing. The level of H3K36me3 associated Srsf1 is reduced in Psip1 mutant cells and alternative splicing of specific genes is affected. Moreover, we show altered Srsf1 distribution around the alternatively spliced exons of these genes in Psip1 null cells. We propose that Psip1/p52, through its binding to both chromatin and splicing factors, might act to modulate splicing.