119,412 research outputs found

    Ebola Virus Localization in the Macaque Reproductive Tract during Acute Ebola Virus Disease.

    Get PDF
    Sexual transmission of Ebola virus (EBOV) has been demonstrated more than a year after recovery from the acute phase of Ebola virus disease (EVD). The mechanisms underlying EBOV persistence and sexual transmission are not currently understood. Using the acute macaque model of EVD, we hypothesized EBOV would infect the reproductive tissues and sought to localize the infection in these tissues using immunohistochemistry and transmission electron microscopy. In four female and eight male macaques that succumbed to EVD between 6 and 9 days after EBOV challenge, we demonstrate widespread EBOV infection of the interstitial tissues and endothelium in the ovary, uterus, testis, seminal vesicle, epididymis, and prostate gland, with minimal associated tissue immune response or organ pathology. Given the widespread involvement of EBOV in the reproductive tracts of both male and female macaques, it is reasonable to surmise that our understanding of the mechanisms underlying sexual transmission of EVD and persistence of EBOV in immune-privileged sites would be facilitated by the development of a nonhuman primate model in which the macaques survived past the acute stage into convalescence

    After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance

    Get PDF
    Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications. Yet, few consumers appreciate the nature of permissions within the mobile ecosystem, often failing to appreciate the privacy permissions that are altered when updating an app. Even more concerning is the lack of understanding of the wide use of third-party libraries, most which are installed with automatic permissions, that is permissions that must be granted to allow the application to function appropriately. Unsurprisingly, many of these third-party permissions violate consumers’ privacy expectations and thereby, become “over-privileged” to the user. Consequently, an obscurity of privacy expectations between what is practiced by the private sector and what is deemed appropriate by the public sector is exhibited. Despite the growing attention given to privacy in the mobile ecosystem, legal literature has largely ignored the implications of mobile permissions. This article seeks to address this omission by analyzing the impacts of mobile permissions and the privacy harms experienced by consumers of mobile applications. The authors call for the review of industry self-regulation and the overreliance upon simple notice and consent. Instead, the authors set out a plan for greater attention to be paid to socio-technical solutions, focusing on better privacy protections and technology embedded within the automatic permission-based application ecosystem

    Privileged Mexican migrants in Europe: Distinctions and cosmopolitanism on social networking sites

    Get PDF
    This article examines the ways in which classed distinctions are related to the construction of increasingly cosmopolitan identities on Social Networking Sites (SNSs) amongst Mexican migrants from relatively privileged backgrounds living in Europe. It centres on how user demographics shape many of the concerns and outcomes pertaining to the use of SNSs. It considers the implications of the fact that SNSs are predominantly used by a demographic considered as non-marginalized, mobile and as possessing relatively privileged economic, cultural and social backgrounds. It analyses the ways in which online identities are constructed on SNS profiles using multimedia content to represent specific lifestyles and cultural practices that are used to make distinctions amongst participants, and are related to social, cultural and economic capital. A critical analysis is presented as to how users represent cosmopolitan identities online through the display of tastes and lifestyles in SNS content and into how these representations relate to users’ privileged positions in Mexican society. Bourdieu’s concept of distinction is used to emphasize the utility of considering different forms of capital in analysing the use of SNSs and profile content generated by a specific demographic. This article demonstrates how the analysis of SNS use may contribute towards an understanding of how classed distinctions are made based on this use and of how users negotiate the posting of profile content according to these distinctions and manage (select, edit and share) their representations

    Strange bedfellows? Keyword and conceptual search unite to make sense of relevant ESI in electronic discovery

    Get PDF
    In the brief history of electronic discovery, the latter part of the twentieth century witnessed the demise of paper by a digital hero that emancipated the content of paper documents with OCR and TIFF. This technology added a third dimension to the realm of 2D paper document review and production that lead to a sea change in discovery methods. By many accounts what we have before us is a three-stage evolution from paper to digital to clustering in order to overcome the problems of volume and complexity of ESI. The intent of this position paper is to describe the development of the digital hero and methodology that is emancipating the content and context of ESI – conceptual search that spans file formats, languages and technique, and includes keyword search on a common, shared index

    Invisible publics: higher education and digital exclusion

    Get PDF
    Teaching in public involves reducing barriers to access and nowhere is this more appropriate than with the subject of electronic resources and the delivery of virtual learning opportunities. The future of the university, in a time of resurgence of neo-liberal values, the primacy of market forces and an increasing emphasis on private rather than public provision, has become the subject of much debate. Insufficient attention, however, is being paid to the possibility of exclusion, which is the inevitable result of increasing digital pedagogies and practices. This chapter focuses on the role of the university in ensuring equitable access to digital technology. Over the last decade, the possibilities of virtual learning have included pportunities for widening participation, increasing student numbers and opening up world trades in professional and academic expertise, thereby sustaining the globalization of education. This chapter addresses the limitations to these opportunities, in particular the failure to prioritize issues of digital inclusion and the divisive consequences of digital discrimination. The chapter is in two parts: the first examines the adoption of virtual learning within higher education, in particular, the ability of the technology to both enable and deny access. The second looks at the wider implications of this duality when set against the background of an increasingly digital society, and how inclusive practices are failing to have inclusive results

    The Origin of Life: Models and Data.

    Get PDF
    A general framework for conventional models of the origin of life (OOL) is the specification of a 'privileged function.' A privileged function is an extant biological function that is excised from its biological context, elevated in importance over other functions, and transported back in time to a primitive chemical or geological environment. In RNA or Clay Worlds, the privileged function is replication. In Metabolism-First Worlds, the privileged function is metabolism. In Thermal Vent Worlds, the privileged function is energy harvesting from chemical gradients. In Membrane Worlds, the privileged function is compartmentalization. In evaluating these models, we consider the contents and properties of the Universal Gene Set of life, which is the set of orthologous genes conserved throughout the tree of life and found in every living system. We also consider the components and properties of the Molecular Toolbox of Life, which contains twenty amino acids, eight nucleotides, glucose, polypeptide, polynucleotide, and several other components. OOL models based on privileged functions necessarily depend on "takeovers" to transition from previous genetic and catalytic systems to the extant DNA/RNA/protein system, requiring replacement of one Molecular Toolbox with another and of one Universal Gene Set with another. The observed robustness and contents of the Toolbox of Life and the Universal Gene Set over the last 3.7 billion years are thought to be post hoc phenomena. Once the takeover processes are acknowledged and are reasonably considered, the privileged function models are seen to be extremely complex with low predictive power. These models require indeterminacy and plasticity of biological and chemical processes

    Digitally Yours; The Body in Contemporary Photography

    Full text link
    This article analyses two artworks by contemporary photographers, Alexa Wright and Wendy McMurdo. It focuses in particular on the relationship between digital technologies and representation of the body, and on the changes to accepted paradigms of sexuality, identity and sensuousness caused by the computation of the art object. The article appears in ‘The Issues: In Contemporary Culture and Aesthetics’, which explores the intersecting fields of contemporary art, philosophy and practice

    Regulating Search Warrant Execution Procedure for Stored Electronic Communications

    Get PDF
    Electronic communication services, from email, to social media, tomessaging applications, have not only dramatically changed daily life but have also had a profound impact on criminal investigations and procedure.The often large volume of electronically stored information has led to a two-step process for search warrant execution, codified in Federal Criminal Procedure Rule 41. When conducting a search pursuant to Rule 41, law enforcement often retains both responsive items—materials that fall within the scope of the warrant—and nonresponsive materials—intermingled items that can be searched, but ultimately exceed the scope of the warrant. This possession of nonresponsive material creates a tension between the account holder’s privacy interests and the government’s ability to conduct an effective search.Courts and scholars have implemented and proposed a range of approaches for search warrant execution inlight of concerns about sweeping general searches and the practicalities of searching electronically stored information. This Note examines these approaches to regulate search warrant execution procedure in the context of stored electronic communications. This Note also discusses the strengths and shortcomings of these various mechanisms and concludes that Rule 41 should be amended to provide standards for the retention and use of nonresponsive material
    • 

    corecore