Purchase of the sales data was funded by the Scottish Government as part of the wider Monitoring and Evaluating Scotland's Alcohol Strategy portfolio of studies. Funding to pay the Open Access publication charges for this article was provided by NHS Health Scotland. ; Aims: To highlight the importance of monitoring biases when using retail sales data to estimate population alcohol consumption. Methods: Previously, we identified and where possible quantified sources of bias that may lead to under- or overestimation of alcohol consumption in Scotland. Here, we update findings by using more recent data and by quantifying emergent biases. Results: Underestimation resulting from the net effect of biases on population consumption in Scotland increased from -4% in 2010 to -7% in 2013. Conclusion: Biases that might impact on the validity and reliability of sales data when estimating population consumption should be routinely monitored and updated. ; Publisher PDF ; Peer reviewed
Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying prede¿ned (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing importance for the business process management and auditing communities. This paper presents an approach for checking compliance of observed process executions recorded in an event log to control-¿ow and temporal compliance requirements. We show a collection of 54 control ¿ow and 15 temporal compliance rules, distributed respectively over 10 and 7 categories. In addition we present how temporal compliance requirements discussed in literature can be uni¿ed and formalized using a generic temporal compliance rule. To check compliance with respect to a compliance rule, the event log describing the observed behavior is aligned with the corresponding rule. The alignment then shows which events occurred out of speci¿ed order and which events deviated by which amount of time from the prescribed behavior. The approach is ¿exible (easy to express new rules), and allowing for multi-perspective diagnostic information in case of compliance violations. The technique and corresponding tool support have been experimentally validated using a case study. Keywords: compliance checking, process mining, conformance checking, data-aware conformance checking, Petri-nets
This research was supported by the European Research Council (ERC) under the European Union's Seventh Framework Programme (FP7/2007-2013)/ERC Grant 609819 (SOMICS project). ; When human infants are intentionally addressed by others, they tend to interpret the information communicated as being relevant to them and worth acquiring. For humans, this attribution of relevance leads to a preference to learn from communication, making it possible to accumulate knowledge over generations. Great apes are sensitive to communicative cues, but do these cues also activate an expectation of relevance? In an observational learning paradigm, we demonstrated to a sample of nonhuman great apes (bonobos, chimpanzees, orangutans; N = 24) how to operate on a food dispenser device. When apes had the opportunity to choose between an effective and an ineffective method in the baseline conditions, the majority of them chose the effective method. However, when the ineffective method was demonstrated in a communicative way, they failed to prioritize efficiency, even though they were equally attentive in both conditions. This suggests that the ostensive demonstration elicited an expectation of relevance that modified apes' interpretation of the situation, potentially leading to a preference to learn from communication, as human children do. ; Publisher PDF ; Peer reviewed
Acknowledgments The authors thank Ruth Rosenholtz for her detailed comments on this manuscript and for sharing the code of the TTM. We thank both reviewers for their insightful comments. A.B. was supported by the European Union's Horizon 2020 Framework Programme for Research and Innovation under the Specific Grant Agreements No. 785907 (Human Brain Project SGA2) and No. 945539 (Human Brain Project SGA3). O.H.C. was supported by the Swiss National Science Foundation (SNF) 320030_176153 "Basics of visual processing: from elements to figures." A.D. was supported by the Swiss National Science Foundation grants No. 176153 "Basics of visual processing: from elements to figures" and No. 191718 "Towards machines that see like us: human eye movements for robust deep recurrent neural networks." D.W. was supported by the National Institutes of Health grant R01 CA236793. ; Peer reviewed ; Publisher PDF
Acknowledgments EvH, TB, KC, and HH were supported by the Australian Government through the Australian Research Council's Discovery Projects funding scheme (project DP180102268). PC was supported by grants from Dartmouth College and from Natural Sciences and Engineering Research Council Canada. ; Peer reviewed ; Publisher PDF
Information systems are facing conflicting requirements. On the one hand, systems need to be adaptive and self-managing to deal with rapidly changing circumstances. On the other hand, legislation such as the Sarbanes-Oxley Act, is putting increasing demands on monitoring activities and processes. As processes and systems become more flexible, both the need for, and the complexity of monitoring increases. Our earlier work on process mining has primarily focused on process discovery, i.e., automatically constructing models describing knowledge extracted from event logs. In this paper, we focus on a different problem complementing process discovery. Given an event log and some property, we want to verify whether the property holds. For this purpose we have developed a new language based on Linear Temporal Logic (LTL) and we combine this with a standard XML format to store event logs. Given an event log and an LTL property, our LTL Checker verifies whether the observed behavior matches the (un)expected/(un)desirable behavior.
ARL was supported by a European Union COFUND/Durham Junior Research Fellowship. ; Vocal fold control was critical to the evolution of spoken language, much as it today allows us to learn vowel systems. It has, however, never been demonstrated directly in a non-human primate, leading to the suggestion that it evolved in the human lineage after divergence from great apes. Here, we provide the first evidence for real-time, dynamic and interactive vocal fold control in a great ape during an imitation "do-as-I-do" game with a human demonstrator. Notably, the orang-utan subject skilfully produced "wookies"-an idiosyncratic vocalization exhibiting a unique spectral profile among the orang-utan vocal repertoire. The subject instantaneously matched human-produced wookies as they were randomly modulated in pitch, adjusting his voice frequency up or down when the human demonstrator did so, readily generating distinct low vs. high frequency sub-variants. These sub-variants were significantly different from spontaneous ones (not produced in matching trials). Results indicate a latent capacity for vocal fold exercise in a great ape (i) in real-time, (ii) up and down the frequency spectrum, (iii) across a register range beyond the species-repertoire and, (iv) in a co-operative turntaking social setup. Such ancestral capacity likely provided the neuro-behavioural basis of the more fine-tuned vocal fold control that is a human hallmark. ; Publisher PDF ; Peer reviewed
The study was funded by the European Union's Horizon 2020 Research and Innovation Program under the Marie Skłodowska-Curie grant agreement no. 702137 attributed to A.R.L. ; One of the defining features of language is displaced reference—the capacity to transmit information about something that is not present or about a past or future event. It is very rare in nature and has not been shown in any nonhuman primate, confounding, as such, any understanding of its precursors and evolution in the human lineage. Here, we describe a vocal phenomenon in a wild great ape with unparalleled affinities with displaced reference. When exposed to predator models, Sumatran orangutan mothers temporarily suppressed alarm calls up to 20 min until the model was out of sight. Subjects delayed their vocal responses in function of perceived danger for themselves, but four major predictions for stress-based mechanisms were not met. Conversely, vocal delay was also a function of perceived danger for another—an infant—suggesting high-order cognition. Our findings suggest that displaced reference in language is likely to have originally piggybacked on akin behaviors in an ancestral hominid. ; Publisher PDF ; Peer reviewed
Se trata de un artículo de investigación sobre la presencia y el tipo de participación social de los cuatro principales partidos políticos de España (PP, PSOE, Podemos y Ciudadanos) en Internet y en las redes sociales. El análisis, definido temporalmente entre las elecciones del 20 de diciembre de 2015 y las del 26 de junio de 2016, se realiza empleando una combinación de técnicas cuantitativas y cualitativas que dan respuesta no solo al qué, al dónde y al cuánto (tipo de presencia, localización, niveles de participación de organizaciones y usuarios, retroalimentación y viralidad, engagement y diálogo social generados), sino también al cómo y al por qué (política comunicativa, evaluación de contenidos, afinidad y sentiment ), y que nos permiten realizan un análisis comparativo entre las cuatro fuerzas políticas. Con respecto a los sitios web, los resultados constatan presencias adecuadas atendiendo al posicionamiento orgánico y al carácter descriptivo de la arquitectura de composición; y, con respecto a las redes sociales, las participaciones son, por lo general, pertinentes desde el punto de vista técnico, pero presentan un escaso grado de innovación y un bajo nivel de interacción social, por lo que se utilizan más como un escaparate publicitario que como un foro de debate y participación. ; This is a research on the presence and type of social participation of the four main political parties in Spain (PP, PSOE, Podemos and Ciudadanos) on the Internet and social networks. The analysis, temporarily defined between the elections of 20th December (2015) and the 26th June (2016), is carried out using a combination of quantitative and qualitative techniques that respond not only to what, where and how (kind of presence, location, levels of participation of organizations and users, feedback and virality, engagement and generated social dialogue), but also the how and why (communication policy, evaluation of content, affinity and sentiment). On the other hand, this allows us to perform a comparison between the four political forces. With respect to websites, the results confirm appropriate presences taking the organic positioning and the architecture of composition, and, with respect to social networks, they are generally correct from a technical point of view, but they reflect a low level of innovation and social interaction, so they are used as an advertising showcase and not as forum for discussion and participation. ; Facultad de Periodismo y Comunicación Social
Se trata de un artículo de investigación sobre la presencia y el tipo de participación social de los cuatro principales partidos políticos de España (PP, PSOE, Podemos y Ciudadanos) en Internet y en las redes sociales. El análisis, definido temporalmente entre las elecciones del 20 de diciembre de 2015 y las del 26 de junio de 2016, se realiza empleando una combinación de técnicas cuantitativas y cualitativas que dan respuesta no solo al qué, al dónde y al cuánto (tipo de presencia, localización, niveles de participación de organizaciones y usuarios, retroalimentación y viralidad, engagement y diálogo social generados), sino también al cómo y al por qué (política comunicativa, evaluación de contenidos, afinidad y sentiment), y que nos permiten realizan un análisis comparativo entre las cuatro fuerzas políticas. Con respecto a los sitios web, los resultados constatan presencias adecuadas atendiendo al posicionamiento orgánico y al carácter descriptivo de la arquitectura de composición; y, con respecto a las redes sociales, las participaciones son, por lo general, pertinentes desde el punto de vista técnico, pero presentan un escaso grado de innovación y un bajo nivel de interacción social, por lo que se utilizan más como un escaparate publicitario que como un foro de debate y participación ; This is a research on the presence and type of social participation of the four main political parties in Spain (PP, PSOE, Podemos and Ciudadanos) on the Internet and social networks. The analysis, temporarily defined between the elections of 20th December (2015) and the 26th June (2016), is carried out using a combination of quantitative and qualitative techniques that respond not only to what, where and how (kind of presence, location, levels of participation of organizations and users, feedback and virality, engagement and generated social dialogue), but also the how and why (communication policy, evaluation of content, affinity and sentiment). On the other hand, this allows us to perform a comparison between the four ...
Paper 1: San Francisco Peak: a plea to protect. This is a study done for the Plateau Sciences Society. It lists names of people (residing in the eastern part of Navajo-land) and their personal opinions. It gives an account on the importance the mountain ha
Internet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what"privacy" is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining "privacy" as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970's. Its aim was to protect a "privacy" that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as "data protection", that apply to "personal data". The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that "data protection" still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of "personal data" written down in the normative texts we analysed essentially reflects the beliefs ...
Internet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what"privacy" is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining "privacy" as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970's. Its aim was to protect a "privacy" that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as "data protection", that apply to "personal data". The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that "data protection" still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of "personal data" written down in the normative texts we analysed essentially reflects the beliefs ...
Internet and digital information and communication technologies in general are often portrayedas a threat to privacy. This gives rise to many debates, both in the media and among decisionmakers. The Snowden revelations, in 2013, followed by the adoption in 2016 of the General Data Protection Regulation (GDPR), have moved these discussions under the spotlight of the publicsphere.The research presented in this dissertation was born out of three questions: can we define what"privacy" is? Is there any consensus on its definition? And does this consensus change with theevolution of the technical milieu transforming our ways of communicating, and by doing so, theway in which our privacy can be intruded upon? By defining "privacy" as the object which is protected by normative texts – laws, court decisions,techno-political standards of the Internet – protecting the right to privacy, it becomes possible toconduct an empirical study of how it evolved and how it has been a topic of contention. Data protection law emerged in Europe during the 1970's. Its aim was to protect a "privacy" that was perceived as under threat by the advent of computers. Currently, the GDPR, or somedocuments adopted by standards-settings organisations like the Internet Engineering Task Force(IETF) or the World Wide Web Consortium (W3C), are written with the intention that they protect this privacy through a set of rules and principles referred to as "data protection", that apply to "personal data". The legal definitions of this notion produced by political institutions and those crafted instandards-settings bodies are identical. Furthermore, the study of the genealogy of data protection reveals that computer scientists have played a pivotal role in the invention of the principles that "data protection" still relies on, for instance in the GDPR. The analysis of the controversies that took place in the shaping of these rules shows that the notion of "personal data" written down in the normative texts we analysed essentially reflects the beliefs ...
Breastfeeding (BF) promotion is one of the most cost-effective interventions to advance mother–child health. Evidence-based frameworks and models to promote the effective scale up and sustainability of BF programs are still lacking. A systematic review of peer-reviewed and gray literature reports was conducted to identify key barriers and facilitators for scale up of BF programs in low- and middle-income countries. The review identified BF programs located in 28 countries in Africa, Latin America and the Caribbean, and Asia. Study designs included case studies, qualitative studies, and observational quantitative studies. Only 1 randomized, controlled trial was identified. A total of 22 enabling factors and 15 barriers were mapped into a scale-up framework termed "AIDED" that was used to build the parsimonious breastfeeding gear model (BFGM). Analogous to a well-oiled engine, the BFGM indicates the need for several key "gears" to be working in synchrony and coordination. Evidence-based advocacy is needed to generate the necessary political will to enact legislation and policies to protect, promote, and support BF at the hospital and community levels. This political-policy axis in turn drives the resources needed to support workforce development, program delivery, and promotion. Research and evaluation are needed to sustain the decentralized program coordination "gear" required for goal setting and system feedback. The BFGM helps explain the different levels of performance in national BF outcomes in Mexico and Brazil. Empirical research is recommended to further test the usefulness of the AIDED framework and BFGM for global scaling up of BF programs.