7 resultados para access policies

em Digital Commons at Florida International University


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Access to the Internet has grown exponentially in Latin America over the past decade. The International Telecommunications Union (ITU) estimates that in 2009 there were 144.5 million Internet users in South America, 6.4 million in Central America, and 8.2 million in the Caribbean, or a total 159.2 million users in all of Latin America.1 At that time, ITU reported an estimated 31 million Internet users in Mexico, which would bring the overall number of users in Latin America to 190.2 million people. More recent estimates published by Internet World Stats place Internet access currently at an estimated 204.6 million out of a total population of 592.5 million in the region (this figure includes Mexico).2 According to those figures, 34.5 per cent of the Latin American population now enjoys Internet access. In recent years, universal access policies contributed to the vast increase in digital literacy and Internet use in Argentina, Brazil, Chile, Colombia, and Costa Rica. Whereas the latter was the first country in the region to adopt a policy of universal access, the most expansive and successful digital inclusion programs in the region have taken hold in Brazil and Chile. These two countries have allocated considerable resources to the promotion of digital literacy and Internet access among low income and poor populations; in both cases, civil society groups significantly assisted in the promotion of inclusion at the grassroots level. Digital literacy and Internet access have come to represent, particularly in the area of education, a welcome complementary resource for populations chronically underserved in nations with a long-standing record of inadequate public social services. Digital inclusion is vastly expanding throughout the region, thanks to stabilizing economies, increasingly affordable technology, and the rapid growth in the supply of cellular mobile telephony. A recent study by the global advertising agency Razorfish revealed significant shifts in the demographics of digital inclusion in the major economies of South America, where Web access is rapidly increasing amid the lower middle class and the working poor.3 Several researchers have suggested that Internet access will bring about greater civic participation and engagement, although skeptics remain unsure this could happen in Latin America. Yet, there have been some recent instances of political mobilization facilitated through the use of the Web and social media applications, starting in Chile when “smart mobs” nationwide demonstrated against former Chilean President Michelle Bachelet when she failed to enact education reforms in May 2006. The Internet has also been used by marginalized groups and by guerrillas groups to highlight their stories. In sum, Internet access in Latin is no longer a medium restricted to the elite. It is rather a public sphere upon which civil society has staked its claim. Some of the examples noted in this study point toward a developing trend whereby civil society, through online grassroots movements, is able to effectively pressure public officials, instill transparency and demand accountability in government. Access to the Internet has also made it possible for voices on the margins to participate in the conversation in a way that was never previously feasible. 1 International Telecommunications Union [ITU], “Information Technology Public & Report,” accessed May 15, 2011, http://www.itu.int/. 2 Internet World Stats, “Internet Usage Statistics for the Americas,” accessed March 24, 2011, http://www.internetworldstats.com/stats2.htm 3 J. Crump, “The finch and the fox,” London, UK (2010), http://www.slideshare.net/razorfishmarketing/the-finch-and-the-fox.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The main objective is to get participants thinking about how they can solve problems associated with a dual submission of ETDs. Many institutions choose to archive ETDs in their repositories, but also mandate, insist, or permit ETDs to be submitted to ProQuest via the UMI ETD Administrator. The Administrator offers a no-submission-fee route for ETD inclusion in ProQuest’s ubiquitous subscription databases. At FIU, after deciding on a mandatory ETD Policy in July 2011, we considered moving from a payment/snail mail submission to altogether scrapping submission to ProQuest; however, our librarians made a case for keeping at least an option for ProQuest submission. After consideration of all the options, implementing the UMI ETD Administrator seemed the most logical because it relieves payment, paperwork, and snail mail. Unfortunately, the UMI ETD Administrator creates as many problems as it solves e.g., the dual submission. According to the Berkman Center’s Good Practices for University Open-Access Policies, the university should offer to make additional deposits outside of the institutional repository. Thus, we sought to find a way for the students to only submit once to our DigitalCommons Institutional Repository. By June 2012, we manually triaged our first batch of ETDs from our DigitalCommons to the UMI ETD Administrator; however, since that first batch we have identified problems with metadata submission, entering student information, and the ETD Administrator default setup. For instance, with our second batch, we eliminated discrepancies with the department field; in our third batch, we eliminated concerns with FERPA and submitting student information; in our fourth batch, we look to cut down the time of each manual submission. Attendees, with institutions considering the ETD Administrator, should expect to anticipate and solve several issues associated with implementing the system in conjunction with an institutional repository. Attendees, who work with both the ETD Administrator and an Institutional Repository, should expect to gain new ideas for eliminating a dual submission for students, a quicker publication turn around, and/or decreased workflow time.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The policies of most universities show a lack of dedication in addressing the needs of their non-traditional graduate students, particularly African-American women seeking advanced degrees. As African-American women return to the academy to pursue doctoral degrees, universities must address the issues facing women in general and African-American women in particular.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This study was a qualitative investigation, with demographic quantitative features, of post-secondary educational access and legal guidelines for individuals with psychological disabilities. Although disability laws have positively influenced post-secondary educational attitudes and practices relative to accommodating many individuals with disabilities, prevailing stigmas regarding mental illness have discouraged the equal access to higher education for individuals with psychological disabilities. Little research concentrating on this area was found.^ Thirty-six relevant legal case decisions, focusing on a variety of realms of higher education, were scrutinized. The policies, procedures, and practices of six Southeastern United States universities were analyzed through official documents and participant responses from disability service providers and other university employees. Comparisons were made between legal cases, and within and between universities. Case findings also provided standards through which participating university practices could be studied.^ The legal analysis revealed that most institutions did not discriminate against individuals with psychological disabilities. Practices of a few of these institutions, however, suggested non-compliance despite favorable decisions on their behalf. Institutions found to have discriminatory practices were cited for inadequate procedures, or for presumptive assessments of the educational functioning levels of individuals with psychological disabilities.^ Participant university practices generally suggested disability law compliance; however, certain campus interventions were determined to be ineffective in identifying, addressing, and communicating about the educational needs of individuals with psychological disabilities. The most effective services for these individuals, who were described as rapidly increasing in number but lagging in self-advocacy and acceptance by others, went beyond legal requirements.^ Recommendations were made for institutional practices concerning disability-related documentation, written standards and operations, and student identification and referral. Directions for future research focused on study skills training for students; exposure of mental health professionals to client educational needs; and expansion of the current research, on a nationwide collegiate level, and a parallel analysis focusing on business and industry. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. ^ In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. ^ In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access to healthcare is a major problem in which patients are deprived of receiving timely admission to healthcare. Poor access has resulted in significant but avoidable healthcare cost, poor quality of healthcare, and deterioration in the general public health. Advanced Access is a simple and direct approach to appointment scheduling in which the majority of a clinic's appointments slots are kept open in order to provide access for immediate or same day healthcare needs and therefore, alleviate the problem of poor access the healthcare. This research formulates a non-linear discrete stochastic mathematical model of the Advanced Access appointment scheduling policy. The model objective is to maximize the expected profit of the clinic subject to constraints on minimum access to healthcare provided. Patient behavior is characterized with probabilities for no-show, balking, and related patient choices. Structural properties of the model are analyzed to determine whether Advanced Access patient scheduling is feasible. To solve the complex combinatorial optimization problem, a heuristic that combines greedy construction algorithm and neighborhood improvement search was developed. The model and the heuristic were used to evaluate the Advanced Access patient appointment policy compared to existing policies. Trade-off between profit and access to healthcare are established, and parameter analysis of input parameters was performed. The trade-off curve is a characteristic curve and was observed to be concave. This implies that there exists an access level at which at which the clinic can be operated at optimal profit that can be realized. The results also show that, in many scenarios by switching from existing scheduling policy to Advanced Access policy clinics can improve access without any decrease in profit. Further, the success of Advanced Access policy in providing improved access and/or profit depends on the expected value of demand, variation in demand, and the ratio of demand for same day and advanced appointments. The contributions of the dissertation are a model of Advanced Access patient scheduling, a heuristic to solve the model, and the use of the model to understand the scheduling policy trade-offs which healthcare clinic managers must make. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications.