35,976 research outputs found

    Descriptive Naming of Context Data Providers

    Get PDF

    Core Services in the Architecture of the National Digital Library for Science Education (NSDL)

    Full text link
    We describe the core components of the architecture for the (NSDL) National Science, Mathematics, Engineering, and Technology Education Digital Library. Over time the NSDL will include heterogeneous users, content, and services. To accommodate this, a design for a technical and organization infrastructure has been formulated based on the notion of a spectrum of interoperability. This paper describes the first phase of the interoperability infrastructure including the metadata repository, search and discovery services, rights management services, and user interface portal facilities

    On Constructing Persistent Identifiers with Persistent Resolution Targets

    Get PDF
    Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintenance-free PIDs using content-centric network technology and overlay networks. For proving the validity of the presented approach, the Handle PID System is used in conjunction with Magnet Link access information encoding, state-of-the-art decentralized data distribution with BitTorrent, and Named Data Networking (NDN) as location-independent data access technology for networks. Contrasting existing approaches, no green-field implementation of PID or major modifications of the Handle System is required to enable location-independent data dissemination with maintenance-free PIDs.Comment: Published IEEE paper of the FedCSIS 2016 (SoFAST-WS'16) conference, 11.-14. September 2016, Gdansk, Poland. Also available online: http://ieeexplore.ieee.org/document/7733372

    The ‘PAThs’ Project: An Effort to Represent the Physical Dimension of Coptic Literary Production (Third–Eleventh centuries)

    Get PDF
    PAThs – Tracking Papyrus and Parchment Paths: An Archaeological Atlas of Coptic Literature. Literary Texts in their Geographical Context. Production, Copying, Usage, Dissemination and Storage is an ambitious digital project based in Rome, working towards a new historical and archaeological geography of the Coptic literary tradition. This aim implies a number of auxiliary tasks and challenges, including classification of authors, works, titles, colophons, and codicological units, as well as the study and wherever possible exact mapping of the relevant geographical sites related to the production, circulation, and storage of manuscript

    Equipping Police with Naloxone Spray and Decriminalizing All Opioid Use in the U.S.: An Ethical Analysis

    Get PDF
    The number of police departments carrying Narcan keeps increasing at a fast pace throughout the U.S., as it is considered an effective measure to fight the opioid epidemic. However, there have been strong oppositions to the idea of the police Narcan use. Still, in 2018, the nation is debating about it. Though not clearly visible to the public, there are important ethical arguments against the police Narcan use which necessarily involve understanding of the ethical roles and responsibilities of police as the law enforcement agency and apprehension of the moral status of a non-therapeutic opioid use. The authors of the paper investigate, primarily, the existing ethical controversies surrounding the police Narcan use while touching upon the issue of the decriminalizing drug policy in the U.S. The authors conclude that the police can carry and administer Narcan without self-contradiction and that the policymakers’ investigation on the drug decriminalization policy should begin with the understanding of the “common morality” of the American public, the ethical view shared and practiced by the greatest number of people

    Structural Justice: A critical feminist framework exploring the intersection between justice, equity and structural reconciliation.

    Full text link
    Violence against women is a human rights violation (UN, 2006). It affects the health of women globally (UN, 2009) and its elimination is at the heart of many international and national goals. Intimate partner violence (IPV), one of the most common forms of gender-based violence, affects one in three women worldwide (WHO, 2013). The consequences of IPV create negative health outcomes for women that diminish their quality of life and their overall well-being. Abused women access community supports such as shelters to seek safe refuge from the abuse and restore their lives. While shelters play an extensive role in helping women to rebuild their lives they often struggle to navigate inflexible and unjust systemic structures that can be re-victimizing to women and undermine their ability to live violence free. This study describes an emergent narrative of structural justice (SJ) that arose while examining the structural challenges of 6 shelters for abused women in urban and rural Virginia. It details the critical exploration of the intersection between structure and justice by integrating existing literature with qualitative participant narratives (N=36); and constructing an operational definition of structural justice (SJ) through an iterative process. Findings reveal SJ oriented patterns that shape five core tenets at the heart of this narrative. This SJ offers a framework out of which we can create a narrative of hope and a call-to-action. to rectify systemic violence. This framework contributes to the discourse concerning the elimination of VAW as it focuses on creating justice, equity and structural reconciliation

    Consumers' Willingness to communicate in a second language : communicating in service settings

    Get PDF
    Purpose – The service management literature emphasizes the importance of communication, but language difficulties can make communicating in business settings more difficult. This paper addresses consumer willingness to communicate in a second language to identity the antecedents that drive consumer language preferences. Design/methodology/approach – The paper presents the findings of an empirical study in two multilingual countries with a total of 361 adult respondents. Findings – The findings show perceived control to be the strongest antecedent of consumer willingness to communicate in a second language, and identifies second language skills as an antecedent in countries with little political tensions related to language, while political considerations is a strong antecedent in countries where language use is political. Research limitations/implications – The study is limited to countries with more than one official language. While multilingual countries make up around 2/3 of the world’s population, future research could test whether the same antecedents are applicable in monolingual societies. Practical implications – The findings help managers to understand in which situations consumers may be willing to switch language, and in which situations it is important to serve consumers in more than one language. Originality/value – The paper is the first to draw upon both the service management literature and the sociolinguistic literature to develop and test a model to explain consumer language preferences.status: publishe

    Neutral User-defined Identifiers for Computational Resources

    Get PDF
    Clients of cloud service providers often require that controls be placed on cloud-resource names and attributes such that these cannot be read by employees of the service provider. This disclosure describes techniques that enable users to define descriptive, recognizable, and memorable identifiers that prevent deciphering of the significance of the object underlying an identifier. Such user-defined identifiers, termed as ‘neutral’ or ‘innocuous,’ are similar to secure IDs, and can be used to label sensitive resources to prevent unauthorized individuals from guessing the nature of the data underlying the identifier. Neutral, user-defined identifiers are created by having the identifiers conform to a schema that prevents an easy deciphering of the object underlying the identifier, while still enabling the identifier to be easily recognizable and memorable. An attempt by a user in a secure account to create a resource with an identifier meaningful enough to compromise security is rejected
    • 

    corecore