157 research outputs found
A content analysis of the back of the book indexes of hymnals of the Baptist, Episcopal and Methodist denominations in the United States
This paper documents the content analysis of back of the book indexes of selected Methodist, Episcopal and Baptist denominational hymnals published between 1801 and 1996 and designated for use by these American congregations. The study was conducted to ascertain if any denominational and chronological trends in the indexing of these hymnals exist; if so, to determine what they are, the significance of these differences, to speculate on the reasons these differences exist and to explore the ramifications of these differences to the fields of hymnology and information science. An important historical discovery was that metrical and alphabetical tune indexes appeared at the same time that scores began to be included in hymnals (1855). Additionally, although the three denominations share more than half the contents of their individual hymnbooks, each group favors a particular set of indexes
Closed circuits : kinship, neighborhood and incarceration in urban Portugal
The notion that prisons are a ‘world apart’, with their
walls severing prisoners from their external relationships, and
incarceration an interruption, ‘time away’ spent in a separate social
universe, has provided an adequate framework for understanding the
social realities of imprisonment in the past. But it has also created an
analytical dead angle that prevents us from identifying the ramifying
social effects of concentrated incarceration upon both the prison and
heavily penalized lower-class neighborhoods. This article addresses these
effects with data from an ethnographic revisit of a major women’s prison
in Portugal, where the recomposition of the inmate population that has
accompanied the rapid inflation of the country’s carceral population is
especially pronounced and entails the activation of wide-ranging
carceralized networks bringing kinship and neighborhood into the prison
as well as the prison into the domestic world. The analysis focuses on the
ways whereby these constellations have transformed the experience of
confinement and the texture of correctional life, calling for a
reconsideration of the theoretical status of the prison as a ‘total
institution’ and for exploring anew the boundary that separates it (or not)
from outside worlds.Wenner-Gren Foundation for Anthropological Research
Evidence for bystander signalling between human trophoblast cells and human embryonic stem cells
Maternal exposure during pregnancy to toxins can occasionally lead to miscarriage and
malformation. It is currently thought that toxins pass through the placental barrier, albeit bilayered
in the first trimester, and damage the fetus directly, albeit at low concentration. Here we
examined the responses of human embryonic stem (hES) cells in tissue culture to two metals at low
concentration. We compared direct exposures with indirect exposures across a bi-layered model
of the placenta cell barrier. Direct exposure caused increased DNA damage without apoptosis or
a loss of cell number but with some evidence of altered differentiation. Indirect exposure caused
increased DNA damage and apoptosis but without loss of pluripotency. This was not caused by
metal ions passing through the barrier. Instead the hES cells responded to signalling molecules
(including TNF-α) secreted by the barrier cells. This mechanism was dependent on connexin 43
mediated intercellular ‘bystander signalling’ both within and between the trophoblast barrier and
the hES colonies. These results highlight key differences between direct and indirect exposure of hES
cells across a trophoblast barrier to metal toxins. It offers a theoretical possibility that an indirectly
mediated toxicity of hES cells might have biological relevance to fetal development
The Job Itself: The Effects of Functional Units on Work Autonomy among Public and Academic Librarians
Job autonomy is a topic that should be of concern to both library managers and employees because job autonomy may predict job satisfaction and retention. This article describes job autonomy among public and academic librarians using data reported by respondents to the Workforce Issues in Library and Information Science (WILIS 1) Research Project1 survey. The authors extracted a subset of the LIS professionals, public and academic librarians, focusing on the autonomy measures and the variables related to the broad areas of responsibility: administration; access and collections; information services, education and research; digital information technology and Web access; and information technology and consulting. Findings indicate that there are significant differences in perceived autonomy based on areas of responsibility. Administrators and information technology librarians reported higher autonomy, regardless of type of library. Also, public librarians have less freedom in scheduling their time than academic librarians. As today's professionals seek more autonomy and flexibility, managers struggle with the pressure of increased attention to accountability within their organizations. Library administrators will need to find a balancing point in order to maintain organizational effectiveness.published or submitted for publicatio
Remediating Third-Party Software Vulnerabilities on U.S. Army Information Systems
Information systems belonging to the DoD and U.S. Army experience cyber attacks on a daily basis. Increasingly, these attacks are targeting popular third-party applications, instead of focusing on vulnerabilities in Microsoft software. The DoD responded to this threat by adopting Citadel Hercules, which did not find a willing audience with the U.S. Army. Instead, the Army adopted Microsoft Systems Management Server (SMS), followed by System Center Configuration Manager (SCCM) 2007 to meet this threat. After more than five years, the rollout of SCCM to all organizations within the U.S. Army is still incomplete. This study provides an overview of the threats facing U.S. Army information systems and looks at how the Army has addressed this challenge in the past. Next, the study takes a system engineering approach to identifying an optimal tool for mitigating third-party vulnerabilities and suggests potential alternatives to SCCM. In addition, the study utilizes a cost benefit analysis approach to aid in evaluating the potential Return on Investment (ROI) provided by each tool. The purpose of this study is to answer the question What is the most optimal solution for mitigating vulnerabilities in third-party applications on U.S. Army information systemshttp://archive.org/details/remediatingthird109457410Major, United States Arm
The Home Advocate
Weekly newspaper from Jefferson, Texas that includes local, state and national news along with some advertising
The Home Advocate
Weekly newspaper from Jefferson, Texas that includes local, state and national news along with some advertising
- …