119,412 research outputs found
Ebola Virus Localization in the Macaque Reproductive Tract during Acute Ebola Virus Disease.
Sexual transmission of Ebola virus (EBOV) has been demonstrated more than a year after recovery from the acute phase of Ebola virus disease (EVD). The mechanisms underlying EBOV persistence and sexual transmission are not currently understood. Using the acute macaque model of EVD, we hypothesized EBOV would infect the reproductive tissues and sought to localize the infection in these tissues using immunohistochemistry and transmission electron microscopy. In four female and eight male macaques that succumbed to EVD between 6 and 9 days after EBOV challenge, we demonstrate widespread EBOV infection of the interstitial tissues and endothelium in the ovary, uterus, testis, seminal vesicle, epididymis, and prostate gland, with minimal associated tissue immune response or organ pathology. Given the widespread involvement of EBOV in the reproductive tracts of both male and female macaques, it is reasonable to surmise that our understanding of the mechanisms underlying sexual transmission of EVD and persistence of EBOV in immune-privileged sites would be facilitated by the development of a nonhuman primate model in which the macaques survived past the acute stage into convalescence
After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance
Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications. Yet, few consumers appreciate the nature of permissions within the mobile ecosystem, often failing to appreciate the privacy permissions that are altered when updating an app. Even more concerning is the lack of understanding of the wide use of third-party libraries, most which are installed with automatic permissions, that is permissions that must be granted to allow the application to function appropriately. Unsurprisingly, many of these third-party permissions violate consumersâ privacy expectations and thereby, become âover-privilegedâ to the user. Consequently, an obscurity of privacy expectations between what is practiced by the private sector and what is deemed appropriate by the public sector is exhibited. Despite the growing attention given to privacy in the mobile ecosystem, legal literature has largely ignored the implications of mobile permissions. This article seeks to address this omission by analyzing the impacts of mobile permissions and the privacy harms experienced by consumers of mobile applications. The authors call for the review of industry self-regulation and the overreliance upon simple notice and consent. Instead, the authors set out a plan for greater attention to be paid to socio-technical solutions, focusing on better privacy protections and technology embedded within the automatic permission-based application ecosystem
Privileged Mexican migrants in Europe: Distinctions and cosmopolitanism on social networking sites
This article examines the ways in which classed distinctions are related to the construction of increasingly cosmopolitan identities on Social Networking Sites (SNSs) amongst Mexican migrants from relatively privileged backgrounds living in Europe. It centres on how user demographics shape many of the concerns and outcomes pertaining to the use of SNSs. It considers the implications of the fact that SNSs are predominantly used by a demographic considered as non-marginalized, mobile and as possessing relatively privileged economic, cultural and social backgrounds. It analyses the ways in which online identities are constructed on SNS profiles using multimedia content to represent specific lifestyles and cultural practices that are used to make distinctions amongst participants, and are related to social, cultural and economic capital. A critical analysis is presented as to how users represent cosmopolitan identities online through the display of tastes and lifestyles in SNS content and into how these representations relate to usersâ privileged positions in Mexican society. Bourdieuâs concept of distinction is used to emphasize the utility of considering different forms of capital in analysing the use of SNSs and profile content generated by a specific demographic. This article demonstrates how the analysis of SNS use may contribute towards an understanding of how classed distinctions are made based on this use and of how users negotiate the posting of profile content according to these distinctions and manage (select, edit and share) their representations
Strange bedfellows? Keyword and conceptual search unite to make sense of relevant ESI in electronic discovery
In the brief history of electronic discovery, the latter part of the twentieth century witnessed the
demise of paper by a digital hero that emancipated the content of paper documents with OCR
and TIFF. This technology added a third dimension to the realm of 2D paper document review
and production that lead to a sea change in discovery methods. By many accounts what we have
before us is a three-stage evolution from paper to digital to clustering in order to overcome the
problems of volume and complexity of ESI. The intent of this position paper is to describe the
development of the digital hero and methodology that is emancipating the content and context of
ESI â conceptual search that spans file formats, languages and technique, and includes keyword
search on a common, shared index
Invisible publics: higher education and digital exclusion
Teaching in public involves reducing barriers to access and nowhere is this more appropriate than with the subject of electronic resources and the delivery of virtual learning opportunities. The future of the university, in a time of resurgence of neo-liberal values, the primacy of market forces and
an increasing emphasis on private rather than public provision, has become
the subject of much debate. Insufficient attention, however, is being paid to
the possibility of exclusion, which is the inevitable result of increasing digital pedagogies and practices. This chapter focuses on the role of the university in ensuring equitable access to digital technology. Over the last decade, the possibilities of virtual learning have included pportunities for widening participation, increasing student numbers and opening up world trades in professional and academic expertise, thereby sustaining the globalization
of education. This chapter addresses the limitations to these opportunities, in particular the failure to prioritize issues of digital inclusion and the divisive consequences of digital discrimination. The chapter is in two parts: the first examines the adoption of virtual learning within
higher education, in particular, the ability of the technology to both enable and deny access. The second looks at the wider implications of this duality when set against the background of an increasingly digital society, and how inclusive practices are failing to have inclusive results
The Origin of Life: Models and Data.
A general framework for conventional models of the origin of life (OOL) is the specification of a 'privileged function.' A privileged function is an extant biological function that is excised from its biological context, elevated in importance over other functions, and transported back in time to a primitive chemical or geological environment. In RNA or Clay Worlds, the privileged function is replication. In Metabolism-First Worlds, the privileged function is metabolism. In Thermal Vent Worlds, the privileged function is energy harvesting from chemical gradients. In Membrane Worlds, the privileged function is compartmentalization. In evaluating these models, we consider the contents and properties of the Universal Gene Set of life, which is the set of orthologous genes conserved throughout the tree of life and found in every living system. We also consider the components and properties of the Molecular Toolbox of Life, which contains twenty amino acids, eight nucleotides, glucose, polypeptide, polynucleotide, and several other components. OOL models based on privileged functions necessarily depend on "takeovers" to transition from previous genetic and catalytic systems to the extant DNA/RNA/protein system, requiring replacement of one Molecular Toolbox with another and of one Universal Gene Set with another. The observed robustness and contents of the Toolbox of Life and the Universal Gene Set over the last 3.7Â billion years are thought to be post hoc phenomena. Once the takeover processes are acknowledged and are reasonably considered, the privileged function models are seen to be extremely complex with low predictive power. These models require indeterminacy and plasticity of biological and chemical processes
Digitally Yours; The Body in Contemporary Photography
This article analyses two artworks by contemporary photographers, Alexa Wright and Wendy McMurdo. It focuses in particular on the relationship between digital technologies and representation of the body, and on the changes to accepted paradigms of sexuality, identity and sensuousness caused by the computation of the art object.
The article appears in âThe Issues: In Contemporary Culture and Aestheticsâ, which explores the intersecting fields of contemporary art, philosophy and practice
Recommended from our members
Electronic Discovery/Disclosure: From Litigation to International Commercial Arbitration
Regulating Search Warrant Execution Procedure for Stored Electronic Communications
Electronic communication services, from email, to social media, tomessaging applications, have not only dramatically changed daily life but have also had a profound impact on criminal investigations and procedure.The often large volume of electronically stored information has led to a two-step process for search warrant execution, codified in Federal Criminal Procedure Rule 41. When conducting a search pursuant to Rule 41, law enforcement often retains both responsive itemsâmaterials that fall within the scope of the warrantâand nonresponsive materialsâintermingled items that can be searched, but ultimately exceed the scope of the warrant. This possession of nonresponsive material creates a tension between the account holderâs privacy interests and the governmentâs ability to conduct an effective search.Courts and scholars have implemented and proposed a range of approaches for search warrant execution inlight of concerns about sweeping general searches and the practicalities of searching electronically stored information. This Note examines these approaches to regulate search warrant execution procedure in the context of stored electronic communications. This Note also discusses the strengths and shortcomings of these various mechanisms and concludes that Rule 41 should be amended to provide standards for the retention and use of nonresponsive material
- âŠ