239 research outputs found

    Determining the Extent of Market and Extent of Resource for Stated Preference Survey Design Using Mapping Methods

    Get PDF
    Determining the appropriate survey population and the commodity to be valued are among the most fundamental design decisions for stated preference (SP) surveys. However, often little information is available about who in the population holds measurable value for the resource (the extent of the market) and their perceptions regarding the scope of the resource to be valued (the extent of the resource). In this paper, we present a novel approach using cognitive mapping interview techniques to shed light on these design questions. The method also provides ancillary information that assists in the interpretation of information collected during focus groups and through SP survey administration. The approach was developed and tested as part of an ongoing study on environmental degradation associated with acidification in the Southern Appalachian Mountain region. Although damage from acidification in the study region is broad, it is not clear whether residents of this region care, in both a use and nonuse sense, about resources in their states of residence, in neighboring states, on public lands, or more broadly across the region. From a pilot study, we found that participants show a significant home-state preference in the number and size of natural areas that they value within the larger Southern Appalachian Mountain region. However, this preference is not strong enough to suggest that the market for improving these resources is solely constrained to residents of the state in which the resource is located.stated preference, cognitive mapping, extent of market, extent of resource, definition of commodity

    Cultures of caste and rural development in the social network of a south Indian village

    Get PDF
    Cultures of caste in much of rural India have become entangled with institutions of rural development. In community-driven development, emphasis on ā€œlocal resource personsā€ and ā€œcommunity spokespersonsā€ has created new opportunities for brokerage and patronage within some villages, which interact with existing forms of authority and community afforded by caste identity and intra-caste headmanship. In this article, we study how these entangled cultures of caste and development translate into social network structures using data on friendship ties from a south Indian village. We find that although caste continues to be important in shaping community structures and leadership in the villageā€™s network, its influence varies across different communities. This fluidity of casteā€™s influence on community network structures is argued to be the result of multiple distinct yet partially overlapping cultural-political forces, which include sharedness afforded by caste identity and new forms of difference and inequality effected through rural development

    Rhesus TRIM5Ī± disrupts the HIV-1 capsid at the inter-hexamer interfaces

    Get PDF
    TRIM proteins play important roles in the innate immune defense against retroviral infection, including human immunodeficiency virus type-1 (HIV-1). Rhesus macaque TRIM5Ī± (TRIM5Ī±rh) targets the HIV-1 capsid and blocks infection at an early post-entry stage, prior to reverse transcription. Studies have shown that binding of TRIM5Ī± to the assembled capsid is essential for restriction and requires the coiled-coil and B30.2/SPRY domains, but the molecular mechanism of restriction is not fully understood. In this study, we investigated, by cryoEM combined with mutagenesis and chemical cross-linking, the direct interactions between HIV-1 capsid protein (CA) assemblies and purified TRIM5Ī±rh containing coiled-coil and SPRY domains (CC-SPRYrh). Concentration-dependent binding of CC-SPRYrh to CA assemblies was observed, while under equivalent conditions the human protein did not bind. Importantly, CC-SPRYrh, but not its human counterpart, disrupted CA tubes in a non-random fashion, releasing fragments of protofilaments consisting of CA hexamers without dissociation into monomers. Furthermore, such structural destruction was prevented by inter-hexamer crosslinking using P207C/T216C mutant CA with disulfide bonds at the CTD-CTD trimer interface of capsid assemblies, but not by intra-hexamer crosslinking via A14C/E45C at the NTD-NTD interface. The same disruption effect by TRIM5Ī±rh on the inter-hexamer interfaces also occurred with purified intact HIV-1 cores. These results provide insights concerning how TRIM5Ī± disrupts the virion core and demonstrate that structural damage of the viral capsid by TRIM5Ī± is likely one of the important components of the mechanism of TRIM5Ī±-mediated HIV-1 restriction. Ā© 2011 Zhao et al

    A Review of the Scientific Rigor, Reproducibility, and Transparency Studies Conducted by the ABRF Research Groups.

    Get PDF
    Shared research resource facilities, also known as core laboratories (Cores), are responsible for generating a significant and growing portion of the research data in academic biomedical research institutions. Cores represent a central repository for institutional knowledge management, with deep expertise in the strengths and limitations of technology and its applications. They inherently support transparency and scientific reproducibility by protecting against cognitive bias in research design and data analysis, and thedy have institutional responsibility for the conduct of research (research ethics, regulatory compliance, and financial accountability) performed in their Cores. The Association of Biomolecular Resource Facilities (ABRF) is a FASEB-member scientific society whose members are scientists and administrators that manage or support Cores. The ABRF Research Groups (RGs), representing expertise for an array of cutting-edge and established technology platforms, perform multicenter research studies to determine and communicate best practices and community-based standards. This review provides a summary of the contributions of the ABRF RGs to promote scientific rigor and reproducibility in Cores from the published literature, ABRF meetings, and ABRF RGs communications

    The Political Economy of Non-Traditional Security: Explaining the Governance of Avian Influenza in Indonesia

    Get PDF
    Given the common association of non-traditional security (NTS) problems with globalisation, surprisingly little attention has been paid to how the political economy context of given NTS issues shape how they are securitised and managed in practice. We argue that security and its governance are always highly contested because different modes of security governance invariably privilege particular interests and normative agendas in state and society, which relate directly to the political economy. Drawing on critical political geography, we argue that, because NTS issues are perceived as at least potentially transnational, their securitisation often involves strategic attempts by actors and coalitions to ā€˜rescaleā€™ their governance beyond the national political and institutional arenas, into new, expert-dominated modes of governance. Such efforts are often resisted by other coalitions, for which this rescaling is deleterious. As evidenced by a case study of avian influenza in Indonesia, particular governance outcomes depend upon the nature of the coalitions assembled for and against rescaling in specific situations, while these coalitionsā€™ make-up and relative strength is shaped by the political economy of the industries that rescaling would affect, viewed against the broader backdrop of state-society relations

    On violating oneā€™s own privacy: N-adic utterances and inadvertent disclosures in online venues

    Get PDF
    Purpose: To understand the phenomena of people revealing regrettable information on the Internet, we examine who people think theyā€™re addressing, and what they say, in the process of interacting with those not physically or temporally co-present. Design/methodology/approach: We conduct qualitative analyses of interviews with student bloggers and observations of five yearsā€™ worth of their blog posts, drawing on linguistsā€™ concepts of indexical ground and deictics. Based on analyses of how bloggers reference their shared indexical ground and how they use deictics, we expose bloggersā€™ evolving awareness of their audiences, and the relationship between this awareness and their disclosures. Findings: Over time, writers and their regular audience, or ā€œchorus,ā€ reciprocally reveal personal information. However, since not all audience members reveal themselves in this venue, writersā€™ disclosures are available to those observers they are not aware of. Thus, their over-disclosure is tied to what we call the ā€œn-adicā€ organization of online interaction. Specifically, and as can be seen in their linguistic cues, N-adic utterances are directed towards a non-unified audience whose invisibility makes the discloser unable to find out the exact number of participants or the time they enter or exit the interaction. Research implications: Attention to linguistic cues, such as deictics, is a compelling way to identify the shifting reference groups of ethnographic subjects interacting with physically or temporally distant others. Originality/value: We describe the social organization of interaction with undetectable others. N-adic interactions likely also happen in other on- and offline venues in which participants are obscured but can contribute anonymously.postprin

    Relational persons and relational processes: developing the notion of relationality for the sociology of personal life

    Get PDF
    The concept of relationality has recently found widespread favour in British sociology, particularly in the emergent sub-field of the sociology of personal life, which is characterised by its attachment to the concept. However, this ā€˜relational turnā€™ is under-theorized and pays little attention to the substantial history of relational thinking across the human sciences. This paper argues that the notion of relationality in the sociology of personal life might be strengthened by an exploration of the conceptualization of the relational person and relational processes offered by three bodies of literature: the process oriented thinking of American pragmatism, specifically of Mead and Emirbayer; the figurational sociology of Elias; and psychoanalysis, particularly the object relations tradition, contemporary relational psychoanalysis and Ettingerā€™s notion of transubjectivity. The paper attends particularly to the processes involved in the individuality, agentic reflexivity and affective dimensions of the relational person

    Probing the Links between Political Economy and Non-Traditional Security: Themes, Approaches, and Instruments

    Get PDF
    This is a pre-print of an article published in International Politics. The definitive publisher-authenticated version of: Hameiri, Shahar, and Lee Jones. "Probing the links between political economy and non-traditional security: Themes, approaches and instruments." International Politics (2015), is available online at: http://dx.doi.org/10.1057/ip.2015.1In recent decades, the security agenda for states and international organisations has expanded dramatically to include a range of ā€˜non-traditionalā€™, transnational security issues. It is often suggested that globalisation has been a key driver for the emergence or intensification of these problems, but, surprisingly, little sustained scholarly effort has been made to examine the link between responses to the new security agenda and the changing political economy. This curious neglect largely reflects the mutual blind-spots of the sub-disciplines of International Security Studies and International Political Economy, coupled with the dominance of approaches that tend to neglect economic factors. This special issue, which this article introduces, aims to overcome this significant gap. In particular, it focuses on three key themes: the broad relationship between security and the political economy; what is being secured in the name of security, and how this has changed; and how things are being secured ā€“ what modes of governance have emerged to manage security problems. In all of these areas, the contributions point to the crucial role of the state in translating shifting state-economy relations to new security definitions and practices
    • ā€¦
    corecore