We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Although the 13 United States courts of appeals are the final word on 99 percent of all federal cases, there is no detailed account of how these courts operate. How do judges decide which decisions are binding precedents and which are not? Who decides whether appeals are argued orally? What administrative structures do these courts have? The answers to these and hundreds of other questions are largely unknown, not only to lawyers and legal academics but also to many within the judiciary itself. Written and Unwritten is the first book to provide an inside look at how these courts operate. An unprecedented contribution to the field of judicial administration, the book collects the differing local rules and internal procedures of each court of appeals. In-depth interviews of the chief judges of all 13 circuits and surveys of all clerks of court reveal previously undisclosed practices and customs.
Children add more information to their utterances by packing more material into a single clause. They can specify roles, modify nouns with adjectives and verbs with added locatives and adverbs. They can add demonstratives (those) and quantifiers (many) to nouns, and make clearer what they are referring to. Young children’s early constructions tend to mirror parental usage, just as their lexical choices do. They follow preferred argument structure and place given information in the Agent slot of transitive verbs, and keep the Object slot of transitives and the Subject slot of intransitives for new information. They may omit given information at this stage and only later add the relevant pronoun subjects. In both questions and negations, they take time to master the use of auxiliary verbs and rely on fixed “frames” for some time as they learn the meaning of each wh- question word. Children also take time in learning how different perspectives can be marked within the clause, with choices of causative, location, or voice alternations. Here children must learn the options verb by verb.
Edited by
William J. Brady, University of Virginia,Mark R. Sochor, University of Virginia,Paul E. Pepe, Metropolitan EMS Medical Directors Global Alliance, Florida,John C. Maino II, Michigan International Speedway, Brooklyn,K. Sophia Dyer, Boston University Chobanian and Avedisian School of Medicine, Massachusetts
A mass gathering is often a preplanned event, like a concert or sporting event, held at a specific location for a defined duration that strains planning and response resources. However, a mass gathering can also be spontaneous, such as the gathering of mourners associated with the death of a celebrity or a protest. Over the last few years, we have seen an increase in the number of protests, some events that are pre-planned and organized but others that are not and that can quickly become out-of-control and end in tragedy. The bottom line is that despite the many years of dealing with and researching mass gatherings, there remains a lack of in depth understanding of the mass gathering and, despite often being attended by reasonably healthy or well people, the gatherings seem to be more hazardous than expected
This chapter analyses global value chains. First, we explain how globalisation leads to fragmentation of production and dispersion of activities. Global value chains consist of nodes, where each node represents the value added received from the previous node. Countries can now specialise in activities and functions – nodes of the global value chain – rather than in the whole production of certain goods. Second, we discuss how to measure global value chains, which is challenging. Recent efforts allow us to estimate so-called forward- and backward linkages. Third, we provide a framework to map the governance configuration of global value chains based on the complexity of the knowledge to be exchanged in a transaction, the ease of codifying information about the transaction, and the capability of the supplier with respect to the specificities of the transaction. Fourth, we describe some possible sources of inefficiencies in global value chains (taxation, rent-seeking, contracts and trade costs).
To assist communities who suffered from hurricane-inflicted damages, emergency responders may monitor social media messages. We present a case-study using the event of Hurricane Matthew to analyze the results of an imputation method for the location of Twitter users who follow school and school districts in Georgia, USA.
Methods:
Tweets related to Hurricane Matthew were analyzed by content analysis with latent Dirichlet allocation models and sentiment analysis to identify needs and sentiment changes over time. A hurdle regression model was applied to study the association between retweet frequency and content analysis topics.
Results:
Users residing in counties affected by Hurricane Matthew posted tweets related to preparedness (n = 171; 16%), awareness (n = 407; 38%), call-for-action or help (n = 206; 19%), and evacuations (n = 93; 9%), with mostly a negative sentiment during the preparedness and response phase. Tweets posted in the hurricane path during the preparedness and response phase were less likely to be retweeted than those outside the path (adjusted odds ratio: 0.95; 95% confidence interval: 0.75, 1.19).
Conclusions:
Social media data can be used to detect and evaluate damages of communities affected by natural disasters and identify users’ needs in at-risk areas before the event takes place to aid during the preparedness phases.
This article reports findings from a study that sought to identify barriers to music and music education in the UK. Emerging from empirical research involving n = 723 participants and clarified by an evidence base of over 10,000 research participants, the key findings presented in this paper relate to pupil and participant voice and involvement, location as a sub-theme of diversity and inclusion, collaboration and transition points. The research is contextualised by twenty years of policy initiatives seeking to address barriers to music learning. The article provides an overview of the research study before presenting the rich data that emerged within each theme reported. Research participant voice is used as much as possible to enable the reader to consider, reflect and interpret the data in a way that is meaningful for their own context. The paper concludes by asking why after 20 years of policy initiatives, research and evaluation the same barriers still exist and, as we emerge from the pandemic, suggests that this research provides a compelling case that now is the time for change.
This chapter evaluates the application of jurisdictional principles to cloud computing services and the core challenges for governments and others. The chapter considers the interplay of jurisdiction—the ability of a court to hear a dispute—in the context of physical location, intelligible access to data, and the physical location of servers.
In particular, the chapter focuses on areas of uncertainty, such as the categorization of services and the location of data and limits to current approaches. The chapter argues that the traditional territorial approach to jurisdiction is a poor fit to account for the properties of cloud computing services and data more generally arguing that data poses unique legal challenges to applying traditional jurisdiction principles.
The chapter provides an analysis of access to cloud computing services for law enforcement and intelligence purposes by the US government. This includes an analysis of the “Microsoft Warrant” case, the US CLOUD Act and its possible conflicts with the General Data Protection Regulation (GDPR), and access by US intelligence agencies under FISA Section 702 and Executive Order 12333.
Prepositions typically denote relations in space or time, but this is not definitive. Our analysis of prepositions diverges significantly from the traditional view. Where that requires PPs to have NP objects, we allow a much fuller range of complements, including content clauses and no complement, making many traditional ‘subordinating conjunctions’ and adverbs prepositions. Prepositions rarely have inflected forms. They can usually be modified by AdvPs, notably ‘right’ and ‘straight’.
PPs commonly function as complements and adjuncts. They may function predicative complements, but rarely in ‘become’ VPs. As adjuncts, PPs don’t require a predicand. A number of prepositions have grammaticized uses, such as ‘by’ in passive clauses. Many prepositions can be stranded or fronted, a choice affected by various syntactic factors. Some unusual prepositions, such as ‘ago’, must follow a measure expression.
Certain verbs license particles, dependents that may appear between a verb and its object, an unusual situation, usually a PP. Many verb + preposition combinations have idiomatic meanings, but we reject the ‘phrasal verb’ analysis because the combinations are not phrases.
Chapter 6 aims at accounting for modification by temporal adverbials. The binary approach allows them to operate on different levels of tense structure above S_0. Crucial is the new insight that the relation between modifier A and modified B is not to be expressed as location of A in B but rather as the intersection of A and B. This insight and the flexibility of (deictic) adverbial modification offers the possibility of presenting a structural solution to the Present Perfect puzzle. It also sheds light on the nature of the in/for-test: it explains why terminative sentences with a for-adverbial introduced at a higher level may be regarded as well-formed as opposed to those which require a token interpretation.
First identify the foreground abnormality (or activity) based on three key features of Location (generalized, lateralized, bilaterally independent, focal, or multifocal), occurrence (sporadic or repetitive), and morphology (sharp or blunt). Next, qualify your description with the modifiers of prevalence, duration, amplitude, and frequency. Prevalence - abnormalities may be continuous or intermittent, if intermittent; they may be abundant, frequent, occasional or rare. Duration - intermittent abnormalities may be very long, long, intermittent, brief, or of a very brief duration when they occur. These terms are most useful with continuous EEG monitoring. Amplitude - abnormalities may be very low (< 20 uV), low (20-49 uV), medium (50-199 uV), or high (> 200 uV) in amplitude; always measure the absolute amplitude (peak to trough). Frequency - measure the typical rate of the abnormality to the nearest 0.5 per second division. When reporting the waveform, the modifiers (prevalence, duration, amplitude, and frequency) should precede the three key features of location, composition, and morphology.
Frequency is the number of times a waveform occurs per second (one big square). Rhythms in addition to frequency have characteristic features of location, morphology, reactivity, and state dependence. Frequencies are descriptive; rhythms are diagnostic. Clinically relevant frequency bands include delta (0.5-4 Hz), theta (5-7 Hz), alpha (8-13 Hz), and beta (14-30 Hz).The alpha rhythm is an obligate feature of normal wakefulness, and it has considerable variations. Abnormal alpha rhythm may be slow, asymmetric, or unreactive (Bancaud’s phenomena). Excessive beta is associated with sedative medications. In most normal adults, theta and delta rhythms are limited to drowsiness or sleep; their occurrence during wakefulness may be abnormal.
I consider a range of objections to the identity of negative actions and positive events, which have appeared in the recent literature. Most of these objections are appeals to Leibniz’s Law: they attempt to show that a certain negative action can’t be identical to a certain positive event, because these entities have different properties (e.g. different spatiotemporal locations, modal profiles, or causal roles). I show that these objections rely on confusions (e.g. between the things we do and our particular doings of them, or between action sentences and nominals which purport to denote particular doings). Thus, we can (and in the light of the previous chapters, we should) identify negative actions with positive events.
Despite the increased use of dating technology for finding and forming romantic relationships, location remains relevant for relationship formation. While current research on relationship formation attends to the ratio of marriageable men to women, marital attitudes, and gendered racial exclusion, this research does not always consider a nuanced look at how location can also constrain opportunities to make short- or long-term romantic connections. Drawing on interviews with 111 Asian, White, Black, and Latina heterosexual college-educated women between the ages of twenty-five and thirty-three, I find that regardless of race/ethnicity, women observe that some places provide limited opportunities to meet men and that the mismatch between their dating norms, beliefs, and/or expectations for relationships and the location where they reside make their search more difficult. Women of color additionally note that some locations provide fewer opportunities for same-race and/or interracial dating than others. I also find that women of color are more likely to employ strategies to address their locational barriers than White women.
Therefore, I argue that not only does location continue to matter for forming romantic connections in the digital age, but that location and race also intersect to create unique locational barriers for women of color. This intersection, consequently, demonstrates that the opportunities for relationship formation remain stratified despite the rise of dating technology.
The chapter summarises the various ways through which attachment to a particular geography - be a street or a nation - can be compromised. Memory, familiarity with customs and rules, and access to public space, as well as safety, personal and political freedoms are key constituents of belonging as is basic economic well-being.
This chapter introduces the critical issues that permeate the discussion of the location and horizon of Coetzee’s literary practice. It starts by noting a polarization among critics between those who characterize his literary project as being a highly localized one that speaks to the condition of South Africa and those who regard his work as being concerned with universal problems and as belonging to ‘world literature’. It delves into this problem by considering the way Coetzee himself narrates the vicissitudes of a writer navigating national and global literary fields in Elizabeth Costello. Looking next at his corpus as a whole, the chapter argues that an appreciation of Coetzee’s peculiar world-making fictional strategies helps us to discern that world (or worlds) to which his fictions seek to orient us. It concludes by considering Coetzee’s recent interest in the ‘literatures of the south’, speculating that his corpus has been concerned to explore through its world-making what it means to live beneath southern horizons.
Workers across the globe have evolved in their patterns of work, with increased flexibility emerging as a central theme. We highlight three forms of flexibility that workers have increasingly demanded: flexibility in location, schedule, and work design. We argue these capture the broad ways in which workers seek to structure and balance their work and nonwork lives, as well as their careers overall. We describe the evolution of each form of flexibility, review the benefits and challenges, and outline avenues for future research. Finally, we highlight a unique work arrangement, or setting, that infuses flexibility in unique ways – coworking spaces. We review what we know so far about coworking spaces, which have proliferated far faster than the scientific research that seeks to understand them. We conclude by outlining questions that may be good first priorities for emerging scholarly research in this area.
Suicide and suicide attempts have become more prevalent in recent years, with notable increases in the US in all age groups and geographic locations. Risk of suicide is particularly high among patients diagnosed with bipolar disorder or severe depression, especially when associated with mixed features or agitation, or with co-occurring substance abuse. Factors contributing to such risk include relative social and geographic isolation and low access to sources of support or clinical care. In addition, unemployment, poverty, demoralisation and opioid abuse have been identified as important risk factors. Notably, overall longevity rates in the US, though rising for many decades, have recently been declining, in part owing to suicide and substance overdoses. A particular circumstance associated with strikingly high rates of suicides and attempts is the days and weeks following discharge from psychiatric hospitalisation. Although the incidence of such events is low, there is a need for more secure aftercare planning and implementation. Research on therapeutics aimed at reducing suicidal risk and all-cause mortality among psychiatric patients remains severely under-developed.
Likert items and questionnaires are widely used in HCI, particularly to measure user experience. However, there is some confusion over which is the right test to use to analyse data arising from these instruments. Furthermore, this book has proposed several more modern alternatives to traditional statistical tests but there is little evidence if they are better in the context of this particular sort of data. This chapter therefore reports on several simulation studies to compare the variety of tests that can be used to analyse Likert item and questionnaire data. The results suggest that this sort of data best reveals dominance effects and therefore that tests of dominance are the most suitable, and most robust, tests to use.
Effects and the size of effects are proposed as a key way to overcome the limitations of significance testing in modern statistics. However, traditionally, effects are usually added on to the statistical testing procedure. This chapter proposes instead thinking first about what effects to look for in the context of the research and its maturity within the discipline of HCI. The main types of effect, changes in location, stochastic dominance and (co)variation, are described. Consideration of which of these effects that current best knowledge can predict leads to choosing the test most suitable to find those effects.