821 resultados para right of access under Freedom of Information legislation
Resumo:
At head of title: 85th Congress, 2d session, Senate report ; no. 1621.
Resumo:
CIS Microfiche Accession Numbers: CIS 83 S161-2
Resumo:
WI docs. no.: Leg.3:SB/1976/4.
Resumo:
Description based on: June 30, 1979.
Resumo:
Mode of access: Internet.
Resumo:
"De jure regni apud Scotos, a dialogue concerning the rights of the crown in Scotland" by George Buchanan -- pages [235]-283.
Resumo:
Hearings held on S. 3418, 3633, 3116, 2810, and 2542.
Resumo:
"March 1970."
Resumo:
Social networks constitute a major channel for the diffusion of information and the formation of attitudes in a society. Introducing a dynamic model of social learning, the first part of this thesis studies the emergence of socially influential individuals and groups, and identifies the characteristics that make them influential. The second part uses a Bayesian network game to analyse the role of social interaction and conformism in the making of decisions whose returns or costs are ex ante uncertain.
Resumo:
This article begins by setting out the human rights provisions that apply to social media expression. It then provides insight into the part social media plays within our society by analysing the social media landscape and how it facilitates a ‘purer’ form of expression. The social media paradox is explored through the lens of current societal issues and concerns regarding the use of social media and how these have manifested into litigation. It concludes by analysing the tension that the application of an array of criminal legislation and jurisprudence has created with freedom of expression, and whether this can successfully mitigated by the Director of Public Prosecution’s Interim Guidelines.
Resumo:
This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.
Resumo:
New media platforms have changed the media landscape forever, as they have altered our perceptions of the limits of communication, and reception of information. Platforms such as Facebook, Twitter and WhatsApp enable individuals to circumvent the traditional mass media, converging audience and producer to create millions of ‘citizen journalists’. This new breed of journalist uses these platforms as a way of, not only receiving news, but of instantaneously, and often spontaneously, expressing opinions and venting and sharing emotions, thoughts and feelings. They are liberated from cultural and physical restraints, such as time, space and location, and they are not constrained by factors that impact upon the traditional media, such as editorial control, owner or political bias or the pressures of generating commercial revenue. A consequence of the way in which these platforms have become ingrained within our social culture is that habits, conventions and social norms, that were once informal and transitory manifestations of social life, are now infused within their use. What were casual and ephemeral actions and/or acts of expression, such as conversing with friends or colleagues or swapping/displaying pictures, or exchanging thoughts that were once kept private, or maybe shared with a select few, have now become formalised and potentially permanent, on view for the world to see. Incidentally, ‘traditional’ journalists and media outlets are also utilising new media, as it allows them to react, and disseminate news, instantaneously, within a hyper-competitive marketplace. However, in a world where we are saturated, not only by citizen journalists, but by traditional media outlets, offering access to news and opinion twenty-four hours a day, via multiple new media platforms, there is increased pressure to ‘break’ news fast and first. This paper will argue that new media, and the culture and environment it has created, for citizen journalists, traditional journalists and the media generally, has altered our perceptions of the limits and boundaries of freedom of expression dramatically, and that the corollary to this seismic shift is the impact on the notion of privacy and private life. Consequently, this paper will examine what a reasonable expectation of privacy may now mean, in a new media world.
Resumo:
Title 1 of the Americans with Disabilities Act (ADA) requires all employers, public and private, with more than fifteen employees to provide reasonable accommodation to qualified individuals with disabilities if the accommodation would, within limits, allow the individual to perform the essential functions of the job. Seven years after Congress enacted the law and five years after the initial provisions became effective, little information is available about the experience of organizations faced with requests for workplace accommodation.^ The question addressed in this study is: How are organizations responding to the ADA mandate to fit individuals with psychiatric disabilities in the workplace? The data sources are three organizations that allowed access to this sensitive information, and a fourth that had two disability discrimination charges filed against it.^ A brute-force case method approach applied to the four organizations yields the following information: Attorneys are hesitant to allow inquiry into company policy owing to fear of litigation; workers are not disclosing and requesting accommodation; tacit accommodation of long-standing employees appears to be a regular practice; knowledge of the intent of the ADA makes a difference in terms of equality of treatment; and insensitivity to employee privacy results in an adversarial situation.^ Implications are relevant to the need to improve lines of communication between human resource, EEO, supervisory, and legal staff; consequences of failure to address accommodations on an explicit level; need for better understanding of the availability and use of outside resources for achieving accommodation; and improvement of self-advocacy and disclosure by the employees with disabilities. ^
Collection-Level Subject Access in Aggregations of Digital Collections: Metadata Application and Use
Resumo:
Problems in subject access to information organization systems have been under investigation for a long time. Focusing on item-level information discovery and access, researchers have identified a range of subject access problems, including quality and application of metadata, as well as the complexity of user knowledge required for successful subject exploration. While aggregations of digital collections built in the United States and abroad generate collection-level metadata of various levels of granularity and richness, no research has yet focused on the role of collection-level metadata in user interaction with these aggregations. This dissertation research sought to bridge this gap by answering the question “How does collection-level metadata mediate scholarly subject access to aggregated digital collections?” This goal was achieved using three research methods: • in-depth comparative content analysis of collection-level metadata in three large-scale aggregations of cultural heritage digital collections: Opening History, American Memory, and The European Library • transaction log analysis of user interactions, with Opening History, and • interview and observation data on academic historians interacting with two aggregations: Opening History and American Memory. It was found that subject-based resource discovery is significantly influenced by collection-level metadata richness. The richness includes such components as: 1) describing collection’s subject matter with mutually-complementary values in different metadata fields, and 2) a variety of collection properties/characteristics encoded in the free-text Description field, including types and genres of objects in a digital collection, as well as topical, geographic and temporal coverage are the most consistently represented collection characteristics in free-text Description fields. Analysis of user interactions with aggregations of digital collections yields a number of interesting findings. Item-level user interactions were found to occur more often than collection-level interactions. Collection browse is initiated more often than search, while subject browse (topical and geographic) is used most often. Majority of collection search queries fall within FRBR Group 3 categories: object, concept, and place. Significantly more object, concept, and corporate body searches and less individual person, event and class of persons searches were observed in collection searches than in item searches. While collection search is most often satisfied by Description and/or Subjects collection metadata fields, it would not retrieve a significant proportion of collection records without controlled-vocabulary subject metadata (Temporal Coverage, Geographic Coverage, Subjects, and Objects), and free-text metadata (the Description field). Observation data shows that collection metadata records in Opening History and American Memory aggregations are often viewed. Transaction log data show a high level of engagement with collection metadata records in Opening History, with the total page views for collections more than 4 times greater than item page views. Scholars observed viewing collection records valued descriptive information on provenance, collection size, types of objects, subjects, geographic coverage, and temporal coverage information. They also considered the structured display of collection metadata in Opening History more useful than the alternative approach taken by other aggregations, such as American Memory, which displays only the free-text Description field to the end-user. The results extend the understanding of the value of collection-level subject metadata, particularly free-text metadata, for the scholarly users of aggregations of digital collections. The analysis of the collection metadata created by three large-scale aggregations provides a better understanding of collection-level metadata application patterns and suggests best practices. This dissertation is also the first empirical research contribution to test the FRBR model as a conceptual and analytic framework for studying collection-level subject access.
Resumo:
It is unclear whether the two hippocampal lobes convey similar or different activities and how they cooperate. Spatial discrimination of electric fields in anesthetized rats allowed us to compare the pathway-specific field potentials corresponding to the gamma-paced CA3 output (CA1 Schaffer potentials) and CA3 somatic inhibition within and between sides. Bilateral excitatory Schaffer gamma waves are generally larger and lead from the right hemisphere with only moderate covariation of amplitude, and drive CA1 pyramidal units more strongly than unilateral waves. CA3 waves lock to the ipsilateral Schaffer potentials, although bilateral coherence was weak. Notably, Schaffer activity may run laterally, as seen after the disruption of the connecting pathways. Thus, asymmetric operations promote the entrainment of CA3-autonomous gamma oscillators bilaterally, synchronizing lateralized gamma strings to converge optimally on CA1 targets. The findings support the view that interhippocampal connections integrate different aspects of information that flow through the left and right lobes.