56 resultados para Mexican Music
Resumo:
BACKGROUND Erosive tooth wear is the irreversible loss of dental hard tissue as a result of chemical processes. When the surface of a tooth is attacked by acids, the resulting loss of structural integrity leaves a softened layer on the tooth's surface, which renders it vulnerable to abrasive forces. The authors' objective was to estimate the prevalence of erosive tooth wear and to identify associated factors in a sample of 14- to 19-year-old adolescents in Mexico. METHODS The authors performed a cross-sectional study on a convenience sample (N = 417) of adolescents in a school in Mexico City, Mexico. The authors used a questionnaire and an oral examination performed according to the Lussi index. RESULTS The prevalence of erosive tooth wear was 31.7% (10.8% with exposed dentin). The final logistic regression model included age (P < .01; odds ratio [OR], 1.64; 95% confidence interval [CI], 1.26-2.13), high intake of sweet carbonated drinks (P = .03; OR, 1.81; 95% CI, 1.06-3.07), and xerostomia (P = .04; OR, 2.31; 95% CI, 1.05-5.09). CONCLUSIONS Erosive tooth wear, mainly on the mandibular first molars, was associated with age, high intake of sweet carbonated drinks, and xerostomia. PRACTICAL IMPLICATIONS Knowledge regarding erosive tooth wear in adolescents with relatively few years of exposure to causal factors will increase the focus on effective preventive measures, the identification of people at high risk, and early treatment.
Resumo:
Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.
Resumo:
Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.
The pragmatics of computer-mediated communication between South African and Mexican drug traffickers
Resumo:
South Africa and Mexico are ripe with drug trafficking. The gangs and syndicates running the drug businesses in these two countries collaborate occasionally. Communication between these international drug business partners takes place on social media. Their main language of communication is English, mixed with some limited use of Spanish and Afrikaans. The key purpose of the interactions between the South African and Mexican parties is the organisation of their business activities. This study aims at examining how the drug traffickers position each other and themselves regarding their common business interest and how their relationship evolves throughout their interactions. Moreover, it is of interest to look at how these people make use of different social media and their affordances. For this a qualitative analysis of the interaction between two drug traffickers (one South African and one Mexican) on Facebook, Threema and PlayStation 4 was performed. Computer-mediated communication between these two main informants was studied at various stages of their relationship. Results show that at first the interaction between the South African and Mexican drug traffickers consists of interpersonal negotiations of power. The high risk of the drug business and gang/syndicate membership paired with intercultural frictions causes the two interlocutors to be extremely cautious and at the same time to mark their position. As their relationship develops and they gain trust in each other a shift to interpersonal negotiations of solidarity takes place. In these discursive practices diverse linguistic strategies are employed for creating relational effects and for positioning the other and the self. The discursive activities of the interactants are also identity practices. Thus, the two drug traffickers construct identities through these social practices, positioning and their interpersonal relationship.