15,970 research outputs found

    Annual Report: 2008

    Get PDF
    I submit herewith the annual report from the Agricultural and Forestry Experiment Station, School of Natural Resources and Agricultural Sciences, University of Alaska Fairbanks, for the period ending December 31, 2008. This is done in accordance with an act of Congress, approved March 2, 1887, entitled, “An act to establish agricultural experiment stations, in connection with the agricultural college established in the several states under the provisions of an act approved July 2, 1862, and under the acts supplementary thereto,” and also of the act of the Alaska Territorial Legislature, approved March 12, 1935, accepting the provisions of the act of Congress. The research reports are organized according to our strategic plan, which focuses on high-latitude soils, high-latitude agriculture, natural resources use and allocation, ecosystems management, and geographic information. These areas cross department and unit lines, linking them and unifying the research. We have also included in our financial statement information on the special grants we receive. These special grants allow us to provide research and outreach that is targeted toward economic development in Alaska. Research conducted by our graduate and undergraduate students plays an important role in these grants and the impact they make on Alaska.Financial statement -- Grants -- Students -- Research reports: Partners, Facilities, and Programs; Geographic Information; High-Latitude Agriculture; High-Latitude Soils, Management of Ecosystems; Natural Resources Use and Allocation; Index to Reports -- Publications -- Facult

    Perspectives on financial incentives to health service providers for increasing breast feeding and smoking quit rates during pregnancy: a mixed methods study

    Get PDF
    Objective: To explore the acceptability, mechanisms and consequences of provider incentives for smoking cessation and breast feeding as part of the Benefits of Incentives for Breastfeeding and Smoking cessation in pregnancy (BIBS) study. Design: Cross-sectional survey and qualitative interviews. Setting: Scotland and North West England. Participants: Early years professionals: 497 survey respondents included 156 doctors; 197 health visitors/maternity staff; 144 other health staff. Qualitative interviews or focus groups were conducted with 68 pregnant/postnatal women/family members; 32 service providers; 22 experts/decision-makers; 63 conference attendees. Methods: Early years professionals were surveyed via email about the acceptability of payments to local health services for reaching smoking cessation in pregnancy and breastfeeding targets. Agreement was measured on a 5-point scale using multivariable ordered logit models. A framework approach was used to analyse free-text survey responses and qualitative data. Results: Health professional net agreement for provider incentives for smoking cessation targets was 52.9% (263/497); net disagreement was 28.6% (142/497). Health visitors/maternity staff were more likely than doctors to agree: OR 2.35 (95% CI 1.51 to 3.64; p<0.001). Net agreement for provider incentives for breastfeeding targets was 44.1% (219/497) and net disagreement was 38.6% (192/497). Agreement was more likely for women (compared with men): OR 1.81 (1.09 to 3.00; p=0.023) and health visitors/maternity staff (compared with doctors): OR 2.54 (95% CI 1.65 to 3.91; p<0.001). Key emergent themes were 'moral tensions around acceptability', 'need for incentives', 'goals', 'collective or divisive action' and 'monitoring and proof'. While provider incentives can focus action and resources, tensions around the impact on relationships raised concerns. Pressure, burden of proof, gaming, box-ticking bureaucracies and health inequalities were counterbalances to potential benefits. Conclusions: Provider incentives are favoured by non-medical staff. Solutions which increase trust and collaboration towards shared goals, without negatively impacting on relationships or increasing bureaucracy are required

    Technoconsen(t)sus

    Get PDF
    This Article proposes to ease doctrinal noise in consent through creating an objective “reasonable digital consumer” standard based on empirical testing of real consumers. In a manner similar to the way in which courts assess actual consumer confusion in trademark law, digital user agreements can be tested for legal usability. Specifically, a particular digital agreement would be deemed to withstand an unconscionability challenge only to the extent that a drafter can demonstrate a “reasonable digital consumer” is capable of meaningfully understanding its terms and presentation. Part I of this Article introduces the challenges computer code presents to consent in the intellectual property space using the example of security-invasive DRM. It briefly describes DRM as a common business strategy for preemptively enforcing intellectual property rights. It then explains the negative consequences of this strategy for the information security of businesses, governments, and consumers. One of these negative consequences is industry confusion regarding the ethical norms of acceptable technology business conduct. Part II examines legal code and consent, placing the norm confusion described in Part I in legal context. This section describes the strain that the emergence of security-invasive DRM has placed on copyright law, computer intrusion law, and contract law in the United States. This tension forces us to come to terms with the preexisting problems of contractual consent and form contracts in a digital context. Current doctrinal construction of digital consent has analyzed user agreements only on grounds related to procedural unconscionability. This approach is flawed as a matter of contract doctrine: procedural and substantive unconscionability must be analyzed simultaneously under either Williston’s or Corbin’s standard of unconscionability. Either of these two approaches would correctly assess as unconscionable many current user agreements. Finally, Part III discusses the organizational code emerging at the intersection of computer code and legal code in digital contracting. It posits one possible legal approach to reconstructing meaningful consent in digital contracts in order to solve the problems of unconscionability discussed in Part II—generating an empirical objective “reasonable digital consumer” standard by looking to trademark law. Trademark case law offers well-established methods for determining whether a “reasonable” consumer is confused by a particular trademark or practice; these cases employ empirical testing by experts using real consumers. Importing this “legal usability testing” into digital contracting would benefit both users and content owners through creating predictability of legal outcome. Similarly, a reasonable digital consumer standard leverages the naturally occurring “hubs” of understanding that both courts and content owners seek to generate through form contracts. The proposed method strikes a successful balance between customization and standardization by using the real understandings of users. It also allows for evolution of these understandings over time as users’ familiarity with technology, and technology itself, advances

    Risk Adjustment In Neurocritical care (RAIN)--prospective validation of risk prediction models for adult patients with acute traumatic brain injury to use to evaluate the optimum location and comparative costs of neurocritical care: a cohort study.

    Get PDF
    OBJECTIVES: To validate risk prediction models for acute traumatic brain injury (TBI) and to use the best model to evaluate the optimum location and comparative costs of neurocritical care in the NHS. DESIGN: Cohort study. SETTING: Sixty-seven adult critical care units. PARTICIPANTS: Adult patients admitted to critical care following actual/suspected TBI with a Glasgow Coma Scale (GCS) score of < 15. INTERVENTIONS: Critical care delivered in a dedicated neurocritical care unit, a combined neuro/general critical care unit within a neuroscience centre or a general critical care unit outside a neuroscience centre. MAIN OUTCOME MEASURES: Mortality, Glasgow Outcome Scale - Extended (GOSE) questionnaire and European Quality of Life-5 Dimensions, 3-level version (EQ-5D-3L) questionnaire at 6 months following TBI. RESULTS: The final Risk Adjustment In Neurocritical care (RAIN) study data set contained 3626 admissions. After exclusions, 3210 patients with acute TBI were included. Overall follow-up rate at 6 months was 81%. Of 3210 patients, 101 (3.1%) had no GCS score recorded and 134 (4.2%) had a last pre-sedation GCS score of 15, resulting in 2975 patients for analysis. The most common causes of TBI were road traffic accidents (RTAs) (33%), falls (47%) and assault (12%). Patients were predominantly young (mean age 45 years overall) and male (76% overall). Six-month mortality was 22% for RTAs, 32% for falls and 17% for assault. Of survivors at 6 months with a known GOSE category, 44% had severe disability, 30% moderate disability and 26% made a good recovery. Overall, 61% of patients with known outcome had an unfavourable outcome (death or severe disability) at 6 months. Between 35% and 70% of survivors reported problems across the five domains of the EQ-5D-3L. Of the 10 risk models selected for validation, the best discrimination overall was from the International Mission for Prognosis and Analysis of Clinical Trials in TBI Lab model (IMPACT) (c-index 0.779 for mortality, 0.713 for unfavourable outcome). The model was well calibrated for 6-month mortality but substantially underpredicted the risk of unfavourable outcome at 6 months. Baseline patient characteristics were similar between dedicated neurocritical care units and combined neuro/general critical care units. In lifetime cost-effectiveness analysis, dedicated neurocritical care units had higher mean lifetime quality-adjusted life-years (QALYs) at small additional mean costs with an incremental cost-effectiveness ratio (ICER) of £14,000 per QALY and incremental net monetary benefit (INB) of £17,000. The cost-effectiveness acceptability curve suggested that the probability that dedicated compared with combined neurocritical care units are cost-effective is around 60%. There were substantial differences in case mix between the 'early' (within 18 hours of presentation) and 'no or late' (after 24 hours) transfer groups. After adjustment, the 'early' transfer group reported higher lifetime QALYs at an additional cost with an ICER of £11,000 and INB of £17,000. CONCLUSIONS: The risk models demonstrated sufficient statistical performance to support their use in research but fell below the level required to guide individual patient decision-making. The results suggest that management in a dedicated neurocritical care unit may be cost-effective compared with a combined neuro/general critical care unit (although there is considerable statistical uncertainty) and support current recommendations that all patients with severe TBI would benefit from transfer to a neurosciences centre, regardless of the need for surgery. We recommend further research to improve risk prediction models; consider alternative approaches for handling unobserved confounding; better understand long-term outcomes and alternative pathways of care; and explore equity of access to postcritical care support for patients following acute TBI. FUNDING: The National Institute for Health Research Health Technology Assessment programme

    Weathering the Nest: Privacy Implications of Home Monitoring for the Aging American Population

    Get PDF
    The research in this paper will seek to ascertain the extent of personal data entry and collection required to enjoy at least the minimal promised benefits of distributed intelligence and monitoring in the home. Particular attention will be given to the abilities and sensitivities of the population most likely to need these devices, notably the elderly and disabled. The paper will then evaluate whether existing legal limitations on the collection, maintenance, and use of such data are applicable to devices currently in use in the home environment and whether such regulations effectively protect privacy. Finally, given appropriate policy parameters, the paper will offer proposals to effectuate reasonable and practical privacy-protective solutions for developers and consumers

    A Roadmap for Change: Federal Policy Recommendations for Addressing the Criminilization of LGBT People and People Living with HIV

    Get PDF
    Each year in the United States, thousands of lesbian, gay, bisexual, transgender, Two Spirit, queer, questioning and gender non-conforming (LGBT) people and people living with HIV come in contact with the criminal justice system and fall victim to similar miscarriages of justice.According to a recent national study, a startling 73% of all LGBT people and PLWH surveyed have had face-to-face contact with police during the past five years.1 Five percent of these respondents also report having spent time in jail or prison, a rate that is markedly higher than the nearly 3% of the U.S. adult population whoare under some form of correctional supervision (jail, prison, probation, or parole) at any point in time.In fact, LGBT people and PLWH, especially Native and LGBT people and PLWH of color, aresignificantly overrepresented in all aspects of the penal system, from policing, to adjudication,to incarceration. Yet their experiences are often overlooked, and little headway has been madein dismantling the cycles of criminalization that perpetuate poor life outcomes and push already vulnerable populations to the margins of society.The disproportionate rate of LGBT people and PLWH in the criminal system can best be understoodin the larger context of widespread and continuing discrimination in employment, education, socialservices, health care, and responses to violence

    The Future of Cybercrime: AI and Emerging Technologies Are Creating a Cybercrime Tsunami

    Get PDF
    This paper reviews the impact of AI and emerging technologies on the future of cybercrime and the necessary strategies to combat it effectively. Society faces a pressing challenge as cybercrime proliferates through AI and emerging technologies. At the same time, law enforcement and regulators struggle to keep it up. Our primary challenge is raising awareness as cybercrime operates within a distinct criminal ecosystem. We explore the hijacking of emerging technologies by criminals (CrimeTech) and their use in illicit activities, along with the tools and processes (InfoSec) to protect against future cybercrime. We also explore the role of AI and emerging technologies (DeepTech) in supporting law enforcement, regulation, and legal services (LawTech)

    Management and Impacts of Wild Hogs (Sus scrofa) in South Carolina

    Get PDF
    Wild hogs (Sus scrofa) are an invasive species that can damage native ecosystems, negatively impact native wildlife, and potentially act as disease reservoirs in the U.S. To better understand how natural resource professionals in South Carolina approach wild hog management, I conducted a web-based survey of natural resource professionals focused on aspects of wild hog impacts and management. Generally, there was agreement among natural resource professionals regarding the approaches used to control wild hog populations and their subsequent effectiveness. The majority of respondents indicated high priority impacts needing to be addressed in wild hog management were agricultural damage and disease transmission. The expert opinions and perceptions of natural resource professionals provide important information for the creation of a wild hog technical guide for South Carolina. To assess the feasibility of a technical assistance and cost-sharing program to reduce wild hog damage on private landowners\u27 properties in South Carolina, I provided camera-activated corral traps to five private landowners and examined how they used the traps to manage wild hogs and how other wildlife species responded the traps. Most pictures were taken during late night and early morning hours between 2100 and 0300. Wild hogs were present in approximately 2% of pictures, and non-target species, including white-tailed deer, raccoons, eastern cottontail rabbits, and opossums, were photographed more often than wild hogs. During the study period, a total of 30 wild hogs were trapped by two landowners. The development of a technical assistance and cost-sharing program for private landowners affected by wild hogs is a priority because wild hogs are present in every South Carolina county and affecting landowners throughout the state. With the majority of land in the U.S. privately owned, wild hog population control will likely entail management in large portions of the landscape on private lands as well as public lands. To examine the relationship between the prevalence of six wild hog diseases and certain demographic, temporal, and spatial factors, I analyzed disease data collected by the United States Department of Agriculture Wildlife Services personnel in South Carolina between 2007 and 2014. Age class was significantly associated with swine brucellosis, pseudorabies virus, and porcine circovirus 2 prevalence. Sex and season were significantly associated with porcine circovirus 2 prevalence as well. Positive swine brucellosis, pseudorabies virus, and porcine circovirus samples were detected in 44.4-92.3% of counties sampled. All domestic swine operations in the U.S. are currently free of swine brucellosis and pseudorabies virus; however, our results suggest that wild hogs could be reservoirs of these diseases and thus have the potential to infect domestic swine herds. Because wild hogs are present in every county in South Carolina, this information is crucial to determine disease hotspots in the state and can be shared with the at-risk individuals, such as hunters or farmers, and the domestic livestock operations in affected counties

    Internet Giants as Quasi-Governmental Actors and the Limits of Contractual Consent

    Get PDF
    Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put and the entities – including the federal government – with whom their information would be shared. We also call into question the distinction between governmental actors and private actors in this realm, as the Internet giants increasingly exploit contractual mechanisms to operate with quasi-governmental powers in their relations with consumers. As regulators and policymakers focus on how to better protect consumer data, we propose that solutions that rely upon consumer permission adopt a more exacting and limited concept of the consent required before private entities may collect or make use of consumer’s information where such uses touch upon privacy interests
    corecore