893 resultados para Right of Access
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Shipping list number: 94-0291-P (pt. 1), 95-0084-P (volume 2).
Resumo:
The University of the West Indies (UWI), established in the British colony of Jamaica in 1948, was mandated to serve the “brightest and the best” of the British colonies. Unfortunately, the austerity of Jamaica's economy has not helped to augment an “open door” access to higher education, and UWI is often criticized for not implementing policies to sustain the democratization of higher education; it is accused of functioning as an elitist institution. ^ The purpose of this qualitative study was to determine whether UWI functions democratically as an institution to influence the equity of higher education in Jamaica. A review of the literature reveals many interpretations of the democratization of higher education. Three of Spaulding and Kargodorian's four criteria were utilized to analyze this research. They were (1) equality of access to higher education, (2) equality of participation within the institution of higher education, and (3) equality of educational results. Multiple sources of written data augmented by interviews in Jamaica and Miami were utilized. ^ The analysis revealed that UWI functions in a collaborative relationship with Jamaica's Centralized Educational System as well as with the country's political, economic, and social realms to impact the democratization of higher education. Documentation suggests that, although strong traditional influences continue to exist, UWI has deviated from its original mandate and instead, flexible admittance policies and diversification of expanded programs have contributed to greater accessibility. ^ Despite UWI's reports of improvements which have contributed to more access, UNESCO and some interviewees have not been impressed. A World Bank report on enrollment ratio at the university level in English speaking Caribbean countries reflects less than one percent of the age cohort. The Jamaicans interviewed, especially those from the lower class, felt that their democratic right to receive higher education was not met. UNESCO regards UWI's efforts as just putting a “dent” in the problem. ^ Recommendations include continuing efforts towards developing curricula more relevant to the Jamaican society, increasing distance education in order to ease UWI's load, expanding financial partnerships with private sectors, and extending research in collaboration with large local and foreign private companies. ^
Resumo:
Florida’s Voluntary Pre-Kindergarten program (VPK) aims to ensure that all 4-year-olds are prepared to excel in K-12 mathematics. Early numeracy/spatial skills are predictive of success in K–12 mathematics. No research has examined whether VPK classrooms are equipped with the materials necessary to teach numeracy/spatial skill. The Pre-Kindergarten Numeracy and Spatial Environment Survey was created to examine the frequency of access to and use of numeracy/spatial materials in VPK classrooms. The 69-item survey was completed by the lead educator from a sample of 62 pre-kindergarten classrooms in Miami-Dade County. Regression analysis results suggest the location of the pre-kindergarten center, the sex distribution of the children in the classrooms or the number of years of experience that the educator has as a lead teacher along with the extra training courses undertaken by the teachers does not affect the access to or the use of, numeracy and spatial materials in the classrooms.
Resumo:
This article discusses the concept of right and its identification with the power to coerce, to show a reciprocity between the original contract and the right, as a manifestation of the reciprocity between moral law and freedom, as Kant states in its Second Critique. The demonstration of this view will allow a republican stance evident in the legal and political thought of Kant, since the right of a people can only exist while the town itself is unified to enact.
Resumo:
The aim of this paper is to explore the role and activities of nurse practitioners (NPs) working in long-term care (LTC) to understand concepts of access to primary care for residents. Utilizing the "FIT" framework developed by Penchanksy and Thomas, we used a directed content analysis method to analyze data from a pan-Canadian study of NPs in LTC. Individual and focus group interviews were conducted at four sites in western, central and eastern regions of Canada with 143 participants, including NPs, RNs, regulated and unregulated nursing staff, allied health professionals, physicians, administrators and directors and residents and family members. Participants emphasized how the availability and accessibility of the NP had an impact on access to primary and urgent care for residents. Understanding more about how NPs affect access in Canadian LTC will be valuable for nursing practice and healthcare planning and policy and may assist other countries in planning for the introduction of NPs in LTC settings to increase access to primary care.
Resumo:
Abstract: In the mid-1990s when I worked for a telecommunications giant I struggled to gain access to basic geodemographic data. It cost hundreds of thousands of dollars at the time to simply purchase a tile of satellite imagery from Marconi, and it was often cheaper to create my own maps using a digitizer and A0 paper maps. Everything from granular administrative boundaries to right-of-ways to points of interest and geocoding capabilities were either unavailable for the places I was working in throughout Asia or very limited. The control of this data was either in a government’s census and statistical bureau or was created by a handful of forward thinking corporations. Twenty years on we find ourselves inundated with data (location and other) that we are challenged to amalgamate, and much of it still “dirty” in nature. Open data initiatives such as ODI give us great hope for how we might be able to share information together and capitalize not only in the crowdsourcing behavior but in the implications for positive usage for the environment and for the advancement of humanity. We are already gathering and amassing a great deal of data and insight through excellent citizen science participatory projects across the globe. In early 2015, I delivered a keynote at the Data Made Me Do It conference at UC Berkeley, and in the preceding year an invited talk at the inaugural QSymposium. In gathering research for these presentations, I began to ponder on the effect that social machines (in effect, autonomous data collection subjects and objects) might have on social behaviors. I focused on studying the problem of data from various veillance perspectives, with an emphasis on the shortcomings of uberveillance which included the potential for misinformation, misinterpretation, and information manipulation when context was entirely missing. As we build advanced systems that rely almost entirely on social machines, we need to ponder on the risks associated with following a purely technocratic approach where machines devoid of intelligence may one day dictate what humans do at the fundamental praxis level. What might be the fallout of uberveillance? Bio: Dr Katina Michael is a professor in the School of Computing and Information Technology at the University of Wollongong. She presently holds the position of Associate Dean – International in the Faculty of Engineering and Information Sciences. Katina is the IEEE Technology and Society Magazine editor-in-chief, and IEEE Consumer Electronics Magazine senior editor. Since 2008 she has been a board member of the Australian Privacy Foundation, and until recently was the Vice-Chair. Michael researches on the socio-ethical implications of emerging technologies with an emphasis on an all-hazards approach to national security. She has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation and surveillance/ uberveillance for Proceedings of the IEEE, Computer and IEEE Potentials. Prior to academia, Katina worked for Nortel Networks as a senior network engineer in Asia, and also in information systems for OTIS and Andersen Consulting. She holds cross-disciplinary qualifications in technology and law.
Resumo:
Autobiographical introduction.--Philosophical theory.--Applications: the three shadows, sickness, sorrow and sin, and the right to life, property and reputation.--Applications: the ethics of the family, the state, the international relations, etc.
Resumo:
In the early twenty-first century, jazz has a history in Japan of approximately 100 years. In contemporary Tokyo, Japanese musicians demonstrate their right to access jazz performance through a variety of musical and extra-musical techniques. Those accepted as fully professional and authentic artists, or puro, gain a special status among their peers, setting them apart from their amateur and part-time counterparts. Drawing on three months of participant-observation in the Tokyo jazz scene, I examine this status of puro, its variable definition, the techniques used by musicians to establish themselves as credible jazz performers, and some obstacles to achieving this status. I claim two things: first, aspiring puro musicians establish themselves within a jazz tradition through musical references to African American identity and a rhetoric of jazz as universal music. Second, I claim that universalism as a core aesthetic creates additional obstacles to puro status for certain musicians in the Tokyo scene.
Resumo:
"These studies were conducted by the General Electric Company, Reentry Systems Department, for the Stability and Control Section of the Flight Dynamics Laboratory of the Air Force Research and Technology Division."
Resumo:
Background: The Medical Education Partnership Initiative, has helped to mitigate the digital divide in Africa. The aim of the study was to assess the level of access, attitude, and training concerning meaningful use of electronic resources and EBM among medical students at an African medical school. Methods: The study involved medical students at the University of Zimbabwe College of Health Sciences, Harare. The needs assessment tool consisted of a 21-question, paper-based, voluntary and anonymous survey. Results: A total of 61/67 (91%), responded to the survey. 60% of the medical students were ‘third-year medical students’. Among medical students, 85% of responders had access to digital medical resources, but 54% still preferred printed medical textbooks. Although 25% of responders had received training in EBM, but only 7% found it adequate. 98% of the participants did not receive formal training in journal club presentation or analytical reading of medical literature, but 77 % of them showed interest in learning these skills. Conclusion: Lack of training in EBM, journal club presentation and analytical reading skills have limited the impact of upgraded technology in enhancing the level of knowledge. This impact can be boosted by developing a curriculum with skills necessary in using EBM.
Resumo:
This thesis presents a study of the Grid data access patterns in distributed analysis in the CMS experiment at the LHC accelerator. This study ranges from the deep analysis of the historical patterns of access to the most relevant data types in CMS, to the exploitation of a supervised Machine Learning classification system to set-up a machinery able to eventually predict future data access patterns - i.e. the so-called dataset “popularity” of the CMS datasets on the Grid - with focus on specific data types. All the CMS workflows run on the Worldwide LHC Computing Grid (WCG) computing centers (Tiers), and in particular the distributed analysis systems sustains hundreds of users and applications submitted every day. These applications (or “jobs”) access different data types hosted on disk storage systems at a large set of WLCG Tiers. The detailed study of how this data is accessed, in terms of data types, hosting Tiers, and different time periods, allows to gain precious insight on storage occupancy over time and different access patterns, and ultimately to extract suggested actions based on this information (e.g. targetted disk clean-up and/or data replication). In this sense, the application of Machine Learning techniques allows to learn from past data and to gain predictability potential for the future CMS data access patterns. Chapter 1 provides an introduction to High Energy Physics at the LHC. Chapter 2 describes the CMS Computing Model, with special focus on the data management sector, also discussing the concept of dataset popularity. Chapter 3 describes the study of CMS data access patterns with different depth levels. Chapter 4 offers a brief introduction to basic machine learning concepts and gives an introduction to its application in CMS and discuss the results obtained by using this approach in the context of this thesis.
Resumo:
Despite their increasing size and ease of access, the pornography and erotica industries have received scant attention from academics in the business disciplines. This paper examines what little research has been conducted and offers background material drawn from other disciplines on historical social approaches to pornography. These areas include sumptuary law and approaches to moral issues generally. The paper concludes with a suggested approach to determining a research agenda for this much neglected area.
Resumo:
Information and Communications Technologies globally are moving towards Service Oriented Architectures and Web Services. The healthcare environment is rapidly moving to the use of Service Oriented Architecture/Web Services systems interconnected via this global open Internet. Such moves present major challenges where these structures are not based on highly trusted operating systems. This paper argues the need of a radical re-think of access control in the contemporary healthcare environment in light of modern information system structures, legislative and regulatory requirements, and security operation demands in Health Information Systems. This paper proposes the Open and Trusted Health Information Systems (OTHIS), a viable solution including override capability to the provision of appropriate levels of secure access control for the protection of sensitive health data.