767 research outputs found

    Employer Liability for Employee Online Criminal Acts

    Get PDF
    While the computer and Internet have served as the foundation for a more efficient and effective workplace, they have also wreaked havoc on employers. Employees are increasingly using work-related time to enter the Information Superhighway to commit criminal acts upon third parties outside the employer’s business. Can an employer be held liable for such acts when they are committed using the employer’s computer and Internet system? While the doctrine of respondeat superior may shield employers from liability, the theory of negligent retention or supervision may allow injured parties a second bite at the employer liability apple. Because legislatures and courts have been slow to enact legislation and establish standards for this potential liability, employers must take appropriate precautions against the potential criminal activities of their employees. This Note offers employers proactive steps that can be taken to avoid this liability

    Use of Free and Open-Source Software Apps Provide Many Benefits for College Students

    Get PDF
    Free and Open-Source software apps along with free Linux-based distributions of operating systems have developed at a blistering pace over the past decade. Today more than ever before, it is possible for students to download and use free software to complete a plethora of complex tasks related to educational pursuits. This paper considers the impact of allowing students to explore the use of more than a dozen cross-platform, free, and open-source software apps to complete STEM-related tasks in a University preservice education course. The core cross-platform apps install in Windows 10, macOS, and various Linux distributed operating systems. In addition, they are supported to work in Chrome OS via the Crostini project

    Employer Liability for Employee Online Criminal Acts

    Get PDF
    While the computer and Internet have served as the foundation for a more efficient and effective workplace, they have also wreaked havoc on employers. Employees are increasingly using work-related time to enter the Information Superhighway to commit criminal acts upon third parties outside the employer’s business. Can an employer be held liable for such acts when they are committed using the employer’s computer and Internet system? While the doctrine of respondeat superior may shield employers from liability, the theory of negligent retention or supervision may allow injured parties a second bite at the employer liability apple. Because legislatures and courts have been slow to enact legislation and establish standards for this potential liability, employers must take appropriate precautions against the potential criminal activities of their employees. This Note offers employers proactive steps that can be taken to avoid this liability

    The Future of Future City: A STEM Program

    Get PDF
    The idea of integrating science, technology, engineering, and mathematics (STEM) is still an enigma for many educators (Dare et al, 2021). Recent academic standards favor curricula that interweave the principles of integrated STEM into all content areas. Finding a “one size fits all” curriculum is challenging, perhaps even impossible. Future City is a national program that specializes in hands-on cross-curricular STEM education. Students work collaboratively using an engineering and design process to showcase their solutions to citywide sustainability issues. This research brief examines how educators can utilize the Future City program as the cornerstone of their STEM curriculum

    Multiple Convictions Statute in Ohio: Has It Achieved Its Intended Result

    Get PDF
    The Ohio Allied Offense Statute is a codification of the common law doctrine of merger and is the Ohio legislature\u27s attempt to insulate criminal defendants from harsh and absurd punishment. This Article discusses the relationship of certain constitutional guarantees against multiple punishments to the Allied Offense Statute and the multiple punishment controversy in Ohio

    Enhancing Data Science Education throughout Indiana

    Get PDF
    Data science is the process of analyzing authentic real-world data sets to extract meaning, glean context, and seek insight into how to improve society. Data science promises new insights, helping transform information into knowledge that can drive science and industry (Berman et al., 2018). In recent years, employer demand for employees with the visualization, mathematical, and computational programming skill sets for this expanding niche has led to the introduction of new programs and coursework at both the K-12 and collegiate level. This research brief examines one such partnership in Indiana funded by the Lilly Endowment partnering Purdue University Fort Wayne (PFW) and the Fort Wayne Community Schools

    Growing in STEM: Hands-On Education via Tower Gardening

    Get PDF
    Sole use of a textbook as the primary source of learning in the middle school setting has been linked to potentially limit students’ conceptual understanding of complex content (Driscoll et al., 1994), while the positive impact of hands-on learning has been well documented (Ekwueme et al., 2015; Satterthwait, 2010). Ideally, when a textbook is used in conjunction with content applied in a hands-on manner, student engagement and understanding of standards-based content are increased. In a grant funded collaboration between the Northeast Indiana STEM Education Resource Center housed at Purdue University Fort Wayne and an East Allen Community Schools middle school science classroom, a vertical tower garden was purchased and used by students under the guidance of their teacher to learn plant-based science content. This research brief examines some of the many benefits and ways integration of a tower garden in the classroom allowed student appreciation of science to grow

    An engineered Tetrahymena tRNA(Gln) for in vivo incorporation of unnatural amino acids into proteins by nonsense suppression

    Get PDF
    A new tRNA, THG73, has been designed and evaluated as a vehicle for incorporating unnatural amino acids site-specifically into proteins expressed in vivo using the stop codon suppression technique. The construct is a modification of tRNAGln(CUA) from Tetrahymena thermophila, which naturally recognizes the stop codon UAG. Using electrophysiological studies of mutations at several sites of the nicotinic acetylcholine receptor, it is established that THG73 represents a major improvement over previous nonsense suppressors both in terms of efficiency and fidelity of unnatural amino acid incorporation. Compared with a previous tRNA used for in vivo suppression, THG73 is as much as 100-fold less likely to be acylated by endogenous synthetases of the Xenopus oocyte. This effectively eliminates a major concern of the in vivo suppression methodology, the undesirable incorporation of natural amino acids at the suppression site. In addition, THG73 is 4-10-fold more efficient at incorporating unnatural amino acids in the oocyte system. Taken together, these two advances should greatly expand the range of applicability of the in vivo nonsense suppression methodology

    A New Normalizing Algorithm for BAC CGH Arrays with Quality Control Metrics

    Get PDF
    The main focus in pin-tip (or print-tip) microarray analysis is determining which probes, genes, or oligonucleotides are differentially expressed. Specifically in array comparative genomic hybridization (aCGH) experiments, researchers search for chromosomal imbalances in the genome. To model this data, scientists apply statistical methods to the structure of the experiment and assume that the data consist of the signal plus random noise. In this paper we propose “SmoothArray”, a new method to preprocess comparative genomic hybridization (CGH) bacterial artificial chromosome (BAC) arrays and we show the effects on a cancer dataset. As part of our R software package “aCGHplus,” this freely available algorithm removes the variation due to the intensity effects, pin/print-tip, the spatial location on the microarray chip, and the relative location from the well plate. removal of this variation improves the downstream analysis and subsequent inferences made on the data. Further, we present measures to evaluate the quality of the dataset according to the arrayer pins, 384-well plates, plate rows, and plate columns. We compare our method against competing methods using several metrics to measure the biological signal. With this novel normalization algorithm and quality control measures, the user can improve their inferences on datasets and pinpoint problems that may arise in their BAC aCGH technology

    IST Austria Technical Report

    Get PDF
    A comprehensive understanding of the clonal evolution of cancer is critical for understanding neoplasia. Genome-wide sequencing data enables evolutionary studies at unprecedented depth. However, classical phylogenetic methods often struggle with noisy sequencing data of impure DNA samples and fail to detect subclones that have different evolutionary trajectories. We have developed a tool, called Treeomics, that allows us to reconstruct the phylogeny of a cancer with commonly available sequencing technologies. Using Bayesian inference and Integer Linear Programming, robust phylogenies consistent with the biological processes underlying cancer evolution were obtained for pancreatic, ovarian, and prostate cancers. Furthermore, Treeomics correctly identified sequencing artifacts such as those resulting from low statistical power; nearly 7% of variants were misclassified by conventional statistical methods. These artifacts can skew phylogenies by creating illusory tumor heterogeneity among distinct samples. Importantly, we show that the evolutionary trees generated with Treeomics are mathematically optimal
    corecore