927 research outputs found
A Traditional and Textualist Analysis of the Goals of Antitrust: Efficiency, Preventing Theft from Consumers, and Consumer Choice
This Article ascertains the overall purpose of the antitrust statutes in two very different ways. First, it performs a traditional analysis of the legislative history of the antitrust laws by analyzing relevant legislative debates and committee reports. Second, it undertakes a textualist or “plain meaning” analysis of the purpose of the antitrust statutes, using Justice Scalia’s methodology. It does this by analyzing the meaning of key terms as they were used in contemporary dictionaries, legal treatises, common law cases, and the earliest U.S. antitrust cases, and it does this in light of the history of the relevant times.
Both approaches demonstrate that the overriding purpose of the antitrust statutes is to prevent firms from stealing from consumers by charging them supracompetitive prices. When firms use their market power to raise prices to supracompetitive levels, purchasers pay more for their goods and services, and these overcharges constitute a taking of purchasers’ property. Economic efficiency was only a secondary concern. In addition, the textualist approach leads to the surprising conclusion that neither the Sherman Act nor the Clayton Act contain an exception for monopolies attained by efficient business conduct. A “plain meaning” analysis of the antitrust statutes reveals that they are supposed to prevent and condemn all privately created monopolies
Balanced entertainment: motivations behind watching cable news
[EMBARGOED UNTIL 6/1/2023] Cable news networks have a peculiar dynamic with their audiences compared to other television news mediums, as their privatized, highly competitive nature means they are especially dependent on attracting audiences and catering to viewer whims to maintain ratings. The nature of this dynamic has made it fertile ground for studies that examine it through a Uses and Gratifications Theory lens. Prior scholarly perspectives have focused largely on the partisan, ideological ways that cable news networks have catered to audiences, such as by decrying bias in competing networks or making vocal, performative gestures of their professed ideology. The Fox News Network is the most visible representation of this pattern of behavior, having over the decades cultivated a loyal, predominantly conservative audience, and a sizable amount of research on cable news networks has focused on Fox News and its audiences. This study sought to examine both Fox News and other cable news networks using Uses and Gratifications Theory, surveying cable news network audiences to get a sense of what uses and gratifications they tended to value and what areas they felt both their network of choice and other networks could improve in, so as to get a sense of what non-partisan factors may be serving as potential uses and gratifications for American cable news network viewers. The results of this study were mixed, and overall seemed to suggest that the independent variable that was aspects of one's personal identity and background such as age and political self-identity had a stronger influence on the dependent variable that was what uses and gratifications one prioritized instead of cable news network affiliation, which is true to the spirit of uses and gratifications theory.Includes bibliographical references
Securing Inter-Organizational Workflows in Highly Dynamic Environments through Biometric Authentication
High flexibility demands of business processes in an inter-organizational context potentially conflict with existing security needs, mainly implied by regulative and legal requirements. In order to comply with these it has to be ensured that access to information within the workflow is restricted to authorized participants. Furthermore, the system might be required to prove this retrospectively. In highly flexible environments, particularly when documents leave the owner’s security domain, the scope of trust must be expendable throughout the workflow. Usage control provides practical concepts. However, user authentication remains a major vulnerability. In order to ensure effective access control the possibility of process-wide enforcement of strong authentication is needed. Inherently, strong user authentication can be realized applying biometrics, though practical reasons still slow the broad application of biometric authentication methods in common workflow scenarios. This work proposes the combination of usage control and typing biometrics to secure interorganizational workflows in highly dynamic environments. On the one hand, usage control provides high flexibility for document-centric workflows but relies on the enforcement of strong authentication. On the other hand, authentication based on typing is flexible in both deployment and application. Furthermore, the inherent privacy problem of biometrics is significantly weakened by the proposed approach
Learning About Modeling in Teacher Preparation Programs
This study explores opportunities that secondary mathematics teacher preparation programs provide to learn about modeling in algebra. Forty-eight course instructors and ten focus groups at five universities were interviewed to answer questions related to modeling. With the analysis of the interview transcripts and related course materials, we found few opportunities for PSTs to engage with the full modeling cycle. Examples of opportunities to learn about algebraic modeling and the participants’ perspectives on the opportunities can contribute to the study of modeling and algebra in teacher education
Why Does This Have to be So Hard? : Perinatal Experiences from an Ecological Systems Approach
This study examines the lived experience of the perinatal population to understand how they can be supported from the lens of different ecological systems and what counselors can do to better serve people with uteruses during their perinatal experience. Furthermore, this study aims to utilize an inclusive framework for capturing the perinatal experience of people with uteruses and to explore barriers and facilitators to care through an ecological systems framework. Fifteen participants who have experienced infertility, conception, pregnancy, miscarriage, childbirth, stillbirth, and postpartum were recruited through various means throughout the United States. Thematic analysis was used, with semi-structured interviews and photovoice, to gather and analyze participant narratives through oral and visual means in two phases. The first phase resulted in eight themes: (1) social and cultural influences, (2) navigating transitions and changes, (3) support networks and resources, (4) discrimination and stigma, (5) advocacy and empowerment, (6) mental health and well-being, (7) interactions with medical systems, and (8) impact of systems and policies. The themes identified in phase two were: (1) meaning making, (2) the emotional impact of perinatal experiences, (3) navigating roles and identities, (4) pressure and expectations, (5) advocacy and empowerment, (6) social support and community, (7) prevalence of infertility and miscarriage, and (8) challenges in healthcare. Implications of this study indicate a need for collaborative, interdisciplinary communication among providers interacting with the perinatal population and perinatal mental health competency training. This dissertation is available in open access at AURA (https://aura.antioch.edu) and OhioLINK ETD Center (https://etd.ohiolink.edu)
Expanding window fountain codes for unequal error protection
A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally. © 2009 IEEE
Turning the shelves: empirical findings and space syntax analyses of two virtual supermarket variations
The spatial structure of a virtual supermarket was systematically varied to investigate human behavior and cognitive processes in unusual building configurations. The study builds upon experiments in a regular supermarket, which serve as a baseline case. In a between-participant design a total of 41 participants completed a search task in two different virtual supermarket environments. For 21 participants the supermarket shelves were turned towards them at a 45° angle when entering the store, giving high visual access to product categories and products. For 20 participants the shelves were placed in exactly the opposite direction obstructing a quick development of shopping goods dependencies. The obtained differences in search performance between the two conditions are analyzed using space syntax analyses and comparisons made of environmental features and participants’ actual search path trajectories
Expanding window fountain codes for unequal error protection
A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally
Another Missed Opportunity in Shoemaker v. Gindlesberger: Strict Privity Lives On in Ohio Legal Malpractice Cases
This Note surveys the development of the strict-privity rule in Ohio and other jurisdictions and will argue that the Ohio Supreme Court missed yet another opportunity to modify its outmoded strict-privity rule. This Note only suggests that the Ohio Supreme Court should again reevaluate its strict-privity rule to at least provide relief to intended beneficiaries of negligently prepared wills. Part II provides a brief overview of the development of the strict-privity rule in legal malpractice cases in Anglo-American law, particularly Ohio, as well as a few of the arguments for and against the strict-privity rule. Part III provides the statement of facts, the procedural history, and the Ohio Supreme Court’s decision in Shoemaker. Finally, Part IV examines the decision in Shoemaker and argues that the Ohio Supreme Court missed a valuable opportunity to overrule the misstated holding of Simon and bring attorneys and other professionals under the same standard of liability. It further discusses why a relaxing of strict privity is the accepted standard among the majority of jurisdictions. It concludes with why Shoemaker was the ideal case in which to overrule Simon and discusses a federal estate tax issue in the Shoemaker opinion
Expanding window fountain codes for unequal error protection
A novel approach to provide unequal error protection (UEP) using rateless codes over erasure channels, named Expanding Window Fountain (EWF) codes, is developed and discussed. EWF codes use a windowing technique rather than a weighted (non-uniform) selection of input symbols to achieve UEP property. The windowing approach introduces additional parameters in the UEP rateless code design, making it more general and flexible than the weighted approach. Furthermore, the windowing approach provides better performance of UEP scheme, which is confirmed both theoretically and experimentally. © 2009 IEEE
- …