849 resultados para Public Library of Fort Wayne and Allen County
Resumo:
Purpose: The purpose of this paper is to investigate the mechanisms adopted by cities to control the provision of externalized public services and to explore the determinants of such control choices.
Design/methodology/approach: The paper presents the results of a multiple case study based on the experiences of three cities and three public services (transport, solid waste collection and home care services for the elderly), where control mechanisms and their possible antecedents were analyzed.
Findings: The results show that the control models found in the cases analyzed do not correspond to the "pure" patterns described in the private sector literature and that the factors identified by management control contributions do not seem to be exhaustive in explaining the configuration of control systems in the public sector. While environmental and task characteristics only partially explain the adoption of certain configurations of control, the features of the control systems seem to be rather influenced by variables that are related to party characteristics.
Originality/value: The paper shows that the combinations of control mechanisms are more multifaceted than those presented in the literature, and that the factors identified in the private sector literature do not seem to explain comprehensively the configuration of control systems in the public sector. © Emerald Group Publishing Limited.
Resumo:
Helokinestatins 1–5 represent a novel family of bradykinin antagonist peptides originally isolated from the venom of the Gila Monster, Heloderma suspectum. We found that they were encoded in tandem along with a single copy of C-type natriuretic peptide (CNP), by two different but almost identical biosynthetic precursors that were cloned from a venom-derived cDNA library. Here we have applied the same strategy to the venom of a related species, the Mexican beaded lizard, Heloderma horridum. Lyophilised venom was used as a surrogate tissue to generate a cDNA library that was interrogated with primers from the previous study and for reverse phase HPLC fractionation. The structure of a single helokinestatin precursor was obtained following sequencing of 20 different clones. The open-reading frame contained 196 amino acid residues, somewhat greater than the 177–178 residues of the corresponding helokinestatin precursors in H. suspectum. The reason for this difference in size was the insertion of an additional domain of 18 amino acid residues encoding an additional copy of helokinestatin-3. Helokinestatin-6 (GPPFNPPPFVDYEPR) was a novel peptide from this precursor identified in venom HPLC fractions. A synthetic replicate of this peptide antagonised the relaxation effect of bradykinin on rat arterial smooth muscle. The novel peptide family, the helokinestatins, have been shown to be present in the venom of H. horridum and to be encoded by a single precursor of different structure to those from H. suspectum. Studies such as this reveal the naturally-selected structures of bioactive peptides that have been optimised for purpose and provide the scientist with a natural analogue library for pharmacological investigation.
Resumo:
Privacy has now become a major topic not only in law but in computing, psychology, economics and social studies, and the explosion in scholarship has made it difficult for the student to traverse the field and identify the significant issues across the many disciplines. This series brings together a collection of significant papers with a multi-disciplinary approach which enable the reader to navigate through the complexities of the issues and make sense of the prolific scholarship published in this field.
The three volumes in this series address different themes: an anthropological approach to what privacy means in a cultural context; the issue of state surveillance where the state must both protect the individual and protect others from that individual and also protect itself; and, finally, what privacy might mean in a world where government and commerce collect data incessantly. The regulation of privacy is continually being called for and these papers help enable understanding of the ethical rationales behind the choices made in the sphere of regulation of privacy.
The articles presented in each of these collections have been chosen for the quality of their scholarship and their utility to the researcher, and feature a variety of approaches. The articles which debate the technical context of privacy are accessible to those from the arts and humanities; overall, the breadth of approach taken in the choice of articles has created a series which is an invaluable and important resource for lecturers, researchers and student.