Filename
stringlengths 22
64
| Paragraph
stringlengths 8
5.57k
|
---|---|
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | In Fig. 2 we show the iron abundance ([Fe/H]) as a function of Teff for the three associations and for ι Hor. Since we obtain similar Fe i and Fe ii abundances for the whole sample (see Table 4 and top-left panel in Fig. 2), henceforth we will consider [Fe i/H] as iron abundance. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | In Fig. 1, we show the lithium abundance versus the spec- troscopic effective temperature listed in Table 4. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | Table 3. Internal errors in abundance determination due to uncertainties in stellar parameters for the coolest star (namely, HD 38392) and for one of the warmest (namely, HIP 27072) in our sample. Numbers refer to the differences between the abundances obtained with and without the uncertainties in stellar parameters. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | our values and theirs are: ∆Teff =69 K, ∆ log g =0.07 dex, ∆ξ =0.27 km s−1, ∆[Fe/H]=0.06 dex (TYC 9493-838-1) and ∆Teff =50 K, ∆ log g =0.10 dex, ∆ξ =0.18 km s−1, ∆[Fe/H]=−0.02 dex (HIP 114530). The (small) differences are within the uncertainties and they can be attributed to the different line lists and σ-clipping criteria used. In addition, the mean iron abundance we find for AB Dor [Fe/H]=0.10 ± 0.03) is slightly larger than that of (e.g., the Pleiades ([Fe/H]=0.04 ± 0.03; An et al. 2007, and ref- erences therein). However, considering possible systematic differences between abundance analysis performed in dif- ferent way, this does not role out the direct link between AB Dor and Pleiades discussed by Ortega et al. (2007). |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | that the (solar) iron abundance of the UMa group is very close to that of the Pleiades ([Fe/H]=0.04 ± 0.03; An et al. 2007, and references therein). In particular, the UMa stars in our sample were recently analysed by Paulson & Yelda (2006) and Ram´ırez et al. (2007) through spectroscopic methods similar to ours, and all results agree within the errors. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The Carina Near group shows a mean iron abundance of [Fe/H]=0.08±0.06 dex. For the two stars in common with Desidera et al. (2006b), we find similar values both in stellar parameters and in [Fe/H]. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The α-elements, such as magnesium, silicon, calcium, and titanium, are primarily produced in the aftermath of explo- sions of type II supernovae, with a small contribution from type Ia SNe (Woosly & Weaver 1995). |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The abundances of α-elements are listed in Table 4 and plotted in Fig. 2. The figure shows that there is no star-to-star variation for the different elements, which show solar [X/Fe] values, with the only possible exception of Ti ii, for which slight NLTE effects may be present (see D’Orazi & Randich 2009, Biazzo et al. 2011a,b, for thor- ough discussions on this issue). Therefore, we consider as titanium abundance the one obtained from Ti i. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The average silicon abundance we find for AB Dor is in good agreement with the results of Viana Almeida et al. (2009), who derived mean [Si/Fe]= −0.07 ± 0.05 dex. In particular, for the two stars in common, the mean difference is only 0.02 ± 0.04 dex. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | In ι Hor, the abundance ratios of α-elements with re- spect to iron are in their solar proportions, as also found by Paulson et al. (2003) for Hyades F–K dwarfs. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | Iron-peak elements are synthesised by SNIa explosions. In particular, Cr varies tighly in lockstep with iron at all [Fe/H], while Ni seems to show an upturn at [Fe/H]> 0 (Bensby et al. 2003). |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | We measured the abundances of Cr and Ni as iron-peak elements; their values are plotted in Fig. 2 as a function of Teff . Also in this case, all [X/Fe] values are consistent with the solar abundances, with very small scatter (Table 4). |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | the The average nickel abundance we derive for AB Dor group is in good agreement with the results by Viana Almeida et al. (2009), i.e. <[Ni/Fe]>= −0.06 ± 0.10 dex. In particular, for the two stars in common with us, the mean difference is only −0.01 ± 0.06 dex. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The [Zn/Fe] ratio is slightly lower than the solar value for all associations, while for ι Hor we find solar abundance, in agreement with Paulson et al. (2003) for Hyades F–K dwarfs. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | Sodium and aluminium are thought to be produced in SNe II and SNe Ib/c (Nomoto et al. 1984) as a consequence of Ne and Mg burnings in massive stars through NeNa and MgAl chains. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The results of abundance analysis of young stars show that none of the young associations or moving groups with available metallicity determination is extremely metal-rich (see, e.g., Santos et al. 2008; Viana Almeida et al. 2009; Biazzo et al. 2011a,b; D’Orazi et al. 2011; and this work). Members of nearby young moving groups are the best tar- gets for planet searches using direct imaging techniques. Sur- veys focusing on these targets were performed in the past years (e.g., Kasper et al. 2007; Chauvin et al. 2010) and next generation direct imaging instruments, like SPHERE and GPI4, will also intensively observe these stars. How- ever, it is emerging that the metallicity distribution of nearby young stars studied in direct imaging surveys is different from that of samples of radial velocity survey (e.g., Fischer & Valenti 2005). Such metallicity distribu- tion is characterised by a significantly lower dispersion and a slightly lower mean metallicity. As suggested by Livio & Pringler (2003), metallicity may play an impotant role in the migration history of planets. Thus, the lack of nearby, young super-metal-rich stars complicates the com- parison of the results of planet searches around these stars with those from radial velocity surveys. First of all, because the low metallicity dispersion of young stars5 makes it chal- lenging to investigate any trend in the frequency of giant planets at wide separations with metallicity. Second, because the statistical interpretation of the results of direct imaging surveys is often done by comparing the observed frequencies or upper limits with extrapolations of the results of radial velocity surveys. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | We plot the abundances of Na and Al relative to Fe versus Teff in Fig. 2. The abundance ratios of Na and Al of the studied sample with respect to Fe are in their solar proportions (similar result was found by Paulson et al. 2003 for the sodium abundance of Hyades dwarfs). |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The slightly sub-solar metallicity of nearby young as- sociations cannot be explained in terms of radial Galacto- centric migration, as they are younger than ∼ 600 Myr. In the scenario devised by Haywood (2009), giant planet for- mation could be favored at Galactocentric radii where the density of the molecular hydrogen, the primary constituent of planets, is higher (in particular, at the position of the molecular ring). In this case, one might expect a paucity of giant planets around young stars as compared to older stars, originating closer to the Galactic centre. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | Figure 2. [Fe/H] and [X/Fe] versus Teff . In the [Fe/H] plot, filled and empty symbols refer to Fe i and Fe ii abundances, respectively. The meaning of the symbols is explained in the top-left panel. Different lines refer to regions of ±1σ around the average, as indicated in the top-left panel. The horizontal error bar drawn in all plots represents the typical uncertainty in Teff . |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | taken into account for a proper interpretation of the results of direct-imaging planet searches, whose primary targets will be young nearby stars. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | log g =4.5, For [Fe i/H]=0.16±0.09 dex, [Fe ii/H]=0.15±0.09 dex, and [X/H](=[X/Fe]+[Fe/H]) higher than the Sun (see Table 4). Our values of astrophysical parameters and elemental abun- dances are in very good agreement with the recent liter- ature values listed in Table 5, with the only exception of Bond et al. (2006)’s results, who found lower [Fe/H]. This agreement confirms that this star is more metal-rich than the Sun at the ∼ 2σ level. Although this is still marginally con- sistent with what is expected from statistical fluctuations, some discussion of this object would be merited. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | The authors are very grateful to the referee for a careful reading of the paper and for his/her comments that helped improving the paper. This paper makes use of data col- lected for the preparation of the SPHERE@ESO GTO sur- vey. We warmly thank the SPHERE Consortium for mak- ing them available for the present work. This paper is also based on observations made with European Southern Ob- servatory telescopes (program IDs: 70.D-0081(A), 082.A- 9007(A), 083.A-9011(B), 084.A-9011(B)) and data obtained from the ESO Science Archive Facility under request num- bers: 143106, 143382, 147882, 152598, 153529, 162614, 6572, 10960. This research made use of the SIMBAD database, op- erated at the CDS (Strasbourg, France). KB acknowledges the financial support from the INAF Post-doctoral fellow- ship. SD and EC acknowledge the PRIN-INAF 2010 “Plane- tary systems at young ages and interactions with their active host stars”. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | press Mouillet D., Beuzit J. L., Desidera S., et al.: 2010, in The Spirit of Lyot 2010: Direct Detection of Exoplanets and Circumstellar disks, University of Paris Diderot (France), ed. A. Boccaletti. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | Average of [Tii/Fe] and [Tiii/Fe]. The astrophysical parameters of these stars, also reported in D’Orazi et al. (2012), were revised. The results are slightly different but consistent within the errors. |
Processed_Elemental_abundances_of_low-mass_stars_in_nearby_y.txt | Table 5. Astrophysical parameters and elemental abundances of ι Hor from the literature and from this work. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Abstract—End user privacy is a critical concern for all organizations that collect, process and store user data as a part of their business. Privacy concerned users, regulatory bodies and privacy experts continuously demand organizations provide users with privacy protection. Current research lacks an understanding of organizational characteristics that affect an organization’s motivation towards user privacy. This has resulted in a “one solution fits all” approach, which is incapable of providing sustainable solutions for organizational issues related to user privacy. In this work, we have empirically investigated 40 diverse organizations on their motivations and approaches towards user privacy. Resources such as newspaper articles, privacy policies and internal privacy reports that display information about organizational motivations and approaches towards user privacy were used in the study. We could observe organizations to have two primary motivations to provide end users with privacy as voluntary driven inherent motivation, and risk driven compliance motivation. Building up on these findings we developed a taxonomy of organizational privacy approaches and further explored the taxonomy through limited exclusive interviews. With his work, we encourage authorities and scholars to understand organizational characteristics that define an organization’s approach towards privacy, in order to effectively communicate regulations that enforce and encourage organizations to consider privacy within their business practices. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Target, a popular retail chain, was accused of sending pregnancy catalogues to a 16 year old girl, whose pregnancy was not known to her parents (Forbes 2014). The data collection and processing methods Target adopted to enhance its marketing enabled it to collect and predict sensitive personal information of their customers such as, when they got divorced, when they got pregnant, and even when had a breakup (Forbes 2014). Such privacy invasive incidents being reported show how some organizations are increasingly investing in ways of collecting, storing and processing vast amounts of user data, without much concern on user privacy (Chan & Greenaway 2005), which have significant consequences on users whose data are compromised (Chan & Greenaway 2005). |
Processed_Understanding_Organizational_Approach_towards_End_.txt | With concerns for user privacy rising in the society, users (Sarvas & Frohlich 2011), the research community (Langheinrich 2001; Wright & De Hert 2012) and governments (Fromholz 2000) are demanding organizations prioritize privacy in their business practices. Such developments have made user privacy an increasingly important issue for organizations (Ginosar & Ariel 2017; Smith 1993; Julia 2009). Brunton & Nissenbaum (2017) claim, “In the digital economy, the real power is not held by individual consumers and citizens using their smart-phones and laptops to navigate the twists and turns of their lives, but by the large government and corporate entities who monitor them”. However, due to the vast differences in the scale of operation, field of operation, nature of data stored and used, size, scope and revenues of different organizations, it is difficult to define the approach an organization should take to provide privacy to their users in a single model (Chan & Greenaway 2005). The “one solution fits all” approach taken so far in solving organizational privacy issues is not applicable anymore (Gürses & del Alamo 2016). Therefore, in order to understand, predict and solve organizational privacy concerns it is essential that the regulatory bodies and governments understand and acknowledge the organizations when they enforce laws and regulations. For this, here we attempt to empirically investigate the approaches taken by different organizations to address end user privacy requirements. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | In this experiment, we studied 40 organizations that deal heavily with user data to develop, maintain and provide on-line applications to users, in-order to understand their approach towards privacy. Data was collected from organizational privacy policies, newspaper articles, previously published interviews and organizational reports on their data practices. Based on the results, we built a taxonomy of privacy protection approaches adopted by organizations towards end user privacy. We could observe four distinct approaches organizations take to provide privacy to their users characterized by their actions, expressions and communications of their priorities. Motivation is the key for people’s actions, desires, and needs. Motivation is considered as the reason for behaviour, or what causes a person or an entity to want to repeat a behaviour (Elliot & Covington 2001). The four approaches we identified could be observed to be driven by two motivations described in psychology research. We could observe the approach an organization takes towards providing end user privacy was driven by either their inherent knowledge and business needs to attract customers, or as a risk management strategy to ensure compliance with regulations. We discuss these findings in detail together with the existing knowledge in psychology when we present our results. We then verified the taxonomy through a limited number of personal interviews with management personnel from a selected sub set of the organizations studied. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | The paper is structured as below. The related work section extensively elaborate on research done so far in identifying organizational approaches towards privacy. The methodology section contains information on the study approach and this is followed by the results. We then discuss the results based on previous work in the field of privacy, and in the fields of business studies and organizational motivation, followed by our conclusions. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | self-explanatory and informative about their privacy decisions. While these theories provide a strong background as a basis on which organizational privacy research could thrive on, they need to be interpreted with empirical evidence in order to establish their capacity to solve organizational privacy requirements, which is the focus of this study. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Anthonysamy et al. (2017) have identified four approaches towards privacy from an engineering perspective. Their classification tries to understand how privacy is implemented in a system considering it as an engineering requirement. On a similar perspective, Notario et al (2015) have identified two approaches to implement privacy protection during a software development process, as risk based and goal oriented. They define risk-based method as identifying threats to the system that might compromise the privacy of its end users and take measures to mitigate those risks in the development stage of the system. Goal oriented approach is defined as the approach where regulations and laws define principles the system must fulfil to provide data protection. Similarly, Van et al. (2003), in chapter 7 of their Handbook for Privacy and Privacy Enhancing Technologies, mention two categories, which could motivate organizations to perform privacy auditing, namely economic motive and social motive. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | In contrast to the above theoretical approaches, Ginosar and Ariel (2017) in their study on the missing aspects of privacy research, identified web-site owners and management (essentially organizations) as an important stakeholder whose concerns, efforts and views has been missing from privacy research. In their analysis, similar to the theories put forward by Greenaway and Chan (2005), they claim that organizations are driven by institutional theory, where they create privacy policies as a response to external pressure, or as a resource base view, by identifying user information as an important resource to gain competitive advantage in their business. However, their study was a survey-based investigation. In a similar study, Schwaig et al. (2006) investigated the compliance to Fair Information Practices by the top 500 largest US corporations by total revenue. Their study was limited to compliance. In this work, we are investigating and understanding the efforts, concerns and attitudes organizations have as a whole towards, not only in providing privacy policies, but also in providing privacy protection through their applications to end users. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Our work includes an analysis of organizational policies, reports, and declared commitment towards privacy in order to understand their approach towards privacy. We did not have any prejudice as to how we believe organizations would approach user privacy or a motive to interpret organizational behaviours explicitly based on the theories mentioned above. The empirical evidence unveiled in this study describe, enhance and establish the theories described above, and helps the governments, researchers and the organizations themselves to better address organizational concerns on end user privacy requirements. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Our goal in this study was to understand how different organizations approach end user privacy. For this, we conducted an empirical investigation of 40 diverse organizations. Below we describe how we selected the organizations and carried out the investigation in detail. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | The first step of the study was to select organizations to study. For this, we first identified 5 categories of organizations that heavily deal with personal data of users as Electronic and Software Development, Banking and Insurance, Government, Telecommunication Service Providers and Online Sales and Service Providers. This list was compiled following an extensive study on recent breaching incidents through newspaper articles. In this preliminary study, we studied breaching incidents that appeared in newspapers articles available online in the last 5 years. Then, we selected 40 organizations overall representing all the above categories that differ significantly in organizational structure (open source, board controlled, privately owned), operational scale (international scale, locally based) and revenue (based on Forbes list of companies against their net worth) aiming to increase the validity and credibility of our taxonomy. We considered availability of data, ease of access of data and public interest when we selected organizations. The final selection consisted of 13 electronic and software development organizations, 8 banking and insurance, 2 government, 3 telecommunication service providers and 14 online sales and service providing organizations in this study. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | mixed data-collection method (Small 2011) for the analysis with privacy policies, newspaper articles, publicly available administrative reports, on-line resources and government reports and also interviews given by the organizations as our resources. We collected newspaper articles within the last 10 years concerning privacy incidents of the selected organizations, accessed on-line privacy policies of the organizations and downloaded publicly available materials in the organization’s web site that relates to its approach and decisions towards end user privacy. We collected at least two newspaper, and not more than 8 articles on breaching incidents for each organization. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Triangulation method in qualitative research is an approach where different resources are incorporated in a study to enhance credibility and reliability of the results (Jick 1979). In the second step, going forward with the triangulation method, to challenge and further ground the results, we conducted exclusive structured interviews with technical and management personnel from the organizations. We selected and sent email invitations for interviews to 15 of the 40 organizations, of which 11 responded with expression of interest. All the organizations we selected for interviewing were either Australian based organizations, or those that had branches in Australia and hence, all the interviewees were based in Australia. Only 7 participants agreed to continue with the interview following the explanation of the interview questions. The random sample was chosen to represent each of the five categories of organizations we used in the first step. Interviewees were guaranteed that neither their personal profile, nor their company profile will be revealed in presentation of data gathered. We conducted the interviews over the phone. The interviewees were not compensated in any way for their participation, other than a verbal appreciation on their input as a professional in the field. Two of the participants had 2 to 5 years of experience in security and privacy and one participant had 5 to 10 years of experience. Four of the participants had more than 10 years of experience. The complete study design was approved by the ethic committee of the University of New South Wales. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Our study is based on the grounded theory approach (Corbin & Strauss 1990) and the outcome is based on the empirical evidence unveiled through the study (Corbin & Strauss 1990). Coding is a popular approach adopted in qualitative research as a reduction methodology for theory formation based on data gathered (Saldaña 2015). Similarly, in our approach we first summarized the privacy policy of each organization using open coding. Examples of the summarization codes we generated at this level are “we manage privacy risk”, “we understand your privacy needs”, “we participated in privacy sealing”, “we strictly adhere to government laws”, “we follow fair information practices / privacy by design”. We used the other resources (internal reports, government reports) to interpret the abstract statements in the privacy policies, to assist the initial level of summarization. We then analysed this summary to identify the characteristics that defined that organization’s approach towards user privacy. We categorized organizations that had similar codes and after several rounds of combining different categories, we ended up with four distinct organizational approaches towards end user privacy. They are government regulation compliance approach, government AND/OR self- regulations compliance approach, user focus approach and privacy education approach. We then performed axial coding on the common characteristics in each category to summarize the key factors. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | In the grounded theory approach, considering literature is permitted in guiding data analysis (Suddaby 2006). Therefore, we made use of the theoretical contributions of defining organizational privacy approaches by Greenaway and Chan (2005) and Ginosar and Ariel (2017) to guide us in our coding process. We could see striking similarities in the codes we generated that clearly differentiated between the two approaches previously identified by Greenaway and Chan (2005). Their work on identifying and modelling organizational privacy as a resource based view and institutional theory unarguably became the backbone of our categorization. Thereby, building on this knowledge we could identify two motivational factors that drive the four organizational approaches towards end user privacy. We selectively re-coded some of the initial codes based on this knowledge. To demonstrate a more practical interpretation of our findings, we used the terms voluntary approach and risk based approach to identify the two motivations in our taxonomy. These terms appeared more applicable in defining the two groups due to some characteristics we found within the two categories which were not given significance in the original theory. For example, the element of risk as a catalyst in encouraging institutional theory based approach within organizations was disregarded in the theory by Greenaway. Further, the resource base view developing an inherent motivation was visible in our analysis, which we interpreted as voluntary motivation. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | In this section we present the results of the study we conducted to identify organizational approaches towards end use privacy. As we discussed in the data analysis section above, we identified four distinct organizational approaches towards end user privacy and two motivations that drive these approaches. This shows that organizations approach end user privacy in different ways, which confirms our previous claim that the “one solution fits all” approach taken in defining privacy laws and regulations does not adequately address organizational concerns on end-user privacy. The following table depicts the characteristics of the four organizational approaches towards end user privacy. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Risk Regulation Compliance Based Approach (RISK-REG) gov. Investigate to regulations for potential their survival business Implement according regulations consultation security measures. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Risk Gov. Induced, Regulation AND/OR Self- Regulation Compliance Approach (RISK-SELF) Declare policy with potential privacy imposed organization. Whilst complying with regulations government employee conduct training. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Frequently change and modify their privacy policies and release products to manipulate customer perception on privacy. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | In addition to gov. laws, adhere to best practices recommended by third parties due to risk. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Use terms such as “our decisions”, internal compliant” “we are and “operational requirements” which may appear vague to a general user. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Use terms such as “our internal decisions”,” your information” personal and “operational requirements” which may appear vague to a general user. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | they solutions The come up with may or may adhere completely to the rules by declared governments and authorities. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Define organizational policies and regulations towards privacy which may be less than, equal to, than greater government laws. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Use more specific terms as “we collect your location to show you closest delivery outlet”. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | depending on its characteristics. To differentiate solutions towards organizational concerns towards end user privacy based on their approaches, it is crucial that we find out what causes these difference and the reflections of the differences. To understand this, here we present our results analysing the privacy approaches against organizational characteristics in the following table. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | The interview results further strengthened and enhanced the knowledge we determined by the desk investigation. One participant mentioned that he could “observe a significant improvement in the company’s user base after integrating privacy concerns into the products, which motivated his organization to pay attention to privacy continuously”. This organization was involved in social networking application development and the owner mentioned that user privacy concerns is a critical determinant when users adopt their applications. Another participant who is a manager in a financial organization suggested that the government should refine laws concerning the resale of client data for analytical purposes, as it would enable businesses to better perform and would also act as a deterrent to black market sales of user data. Another manager who represented an organization involved in security related software application development and management mentioned that most of the privacy decisions they take are based on their belief that it is the right thing to do, which demonstrates an education based approach. Another manager mentioned that following a huge security or privacy incident similar to the panama papers (The Guardian, Luke Harding 2016) gives them an incentive to be more concerned of privacy, showing organizational concerns towards privacy risk. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Our study analysed 40 organizations, which might not be sufficient to provide a comprehensive statistical analysis of the results. The interviewees were all based in Australia. Studying more organizations with diverse business practices, would perhaps reveal more branches in the taxonomy. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Our taxonomy depicted two branches of motivations that drive organizations to consider user privacy. Similar to Greenaway and Chan’s (2005) theoretical model of organizational approaches towards privacy, the voluntary motivation we discovered was an “inside-out” approach where the organization was driven by internal concerns, considering user data as their resource, which required management. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | The risk-based approach was an “outside-in” approach where the organization was driven by external factors to protect end user privacy. The taxonomy hence support the model by Greenaway and Chan (2005) and provide the background for it. For example, the study revealed that the organizations that were driven towards user privacy through risk had strong dependency on government regulations and regional infrastructure. On the other hand, strong dependency on user data within an organization’s business model (social networking software providers) encourages a user focus approach towards privacy considering user data as their own resource. The following model explains the model we generated through the results. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Voluntary motivation was observed in 32.5% of the organizations studied. Even though this is low as a percentage, most of these organizations (Facebook, Apple) develop applications that are strongly connected with users’ lifestyles. Hence, the impact these organizations have on user privacy is significant. Previous work has shown that some organizations approach privacy for business reasons, to attract a niche area of customers through declaration of privacy commitment, to promote the brand name and protect the market shares rather than due to risk (Asghari et al. 2016). These organizations publicly declare their commitment towards end user privacy, and use it as a marketing tool. Furthermore, previous work has suggested that organizations may consider privacy as a social responsibility and be attentive towards user privacy concerns (Straub Jr & Collins 1990). Social values, norms, and market demands in a society could act as an incentive encouraging an organization to voluntarily consider privacy in their business (Straub Jr & Collins 1990). This was the basis for the organizations (47%) that demonstrated motivation towards user privacy due to their knowledge that providing privacy protection to their users is the “right thing to do”. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | The other portion (53%) of voluntarily motivated organizations demonstrated a user focus approach towards privacy (VOL-USER). We found this approach to be similar to the interactive approach towards privacy, which was first coined by Gürses & del Alamo (2016) and defined as the methodology of capturing privacy matters that arise between peers or in a workplace due to the introduction of information systems, and improve user’s agency with respect to privacy through socio-technical designs. In our study this was observed to be practiced only by social networking software providers (87%), possibly due to their wide interaction with billions of users and large scale operations with funds to conduct user interactive surveys. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Extrinsic motivation is defined as doing an activity in order to attain some separable outcome, or to avoid a penalty (Carroll 1979) and would always be approached with the minimum possible effort to reach a pre-defined level of expectation (Olafsen et al. 2015). We could observe that the risk induced motivation identified in our taxonomy demonstrated characteristics similar to that of extrinsic motivation. The study revealed that organizations that demonstrated a risk based motivation towards privacy (67.5%) were mostly financial institutions, government organizations and telecommunication service providing organizations that were dependent on the government and the infrastructure in the region they operate in. Within the risk induced category 37.5% of the organizations demonstrated compliance towards government regulation (RISK-REG), which identifies the benchmark of privacy protection an organization should provide to an end user. Organizations in this category were observed to be motivated to provide users with privacy to enable them to operate their business in a country or a region. Additionally, we observed some organizations (40%) that complied with self-made regulations (RISK-SELF), which was either a sub set of govt. regulations or a more comprehensive exceeding set of regulations. Previous work has shown that risk based motivation is driven by stakeholder interests and competitor behaviours (Dusuki & Yusof 2016). Organizations that had risk induced privacy are observed to conduct risk identification processes to identify potential privacy impacts on stakeholders (Wright & De Hert 2012). We believe that this process results in a deep understanding of the system and its impacts on the end users. Organizations demonstrating an inclination to follow privacy regulations inevitably demand stronger involvement by the governing authorities to continue what they are doing in enforcing and defining regulations related to privacy (Voss 2017). However, to encourage organizational participation in adhering to these regulations, our study shows that it is necessary for the legal frameworks to interpret privacy as a risk, because, our taxonomy shows that organizations are motivated to adopt regulations due to risk. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | With the monetary value of personal information in marketing and targeted advertising rising, the demand for mechanisms to control large organizations compromising user privacy against business motives is critical (Mai 2016). Nevertheless, voluntary motivation demonstrated by these organizations implies that they have an interest to understand and respond to user requirements in privacy. Voluntary motivation is similar to intrinsic motivation discussed in psychology. It is defined as doing of an activity for its inherent satisfactions rather than for some separable consequence (Carroll 1979). It is argued that intrinsic motivation is better in motivating a person towards a task compared to extrinsic motivation because the former is out of choice towards personal endorsement whereas the latter is a compliance due to an external control (Ryan & Deci 2000). Therefore, voluntary motivation, if properly monitored, could be used to shape the future of privacy research and development. We believe that governments and the research community, rather than attempting to bring organizations that have voluntary motivation towards privacy into legal frameworks, should focus on making use of the motivation they have together with their resources to redefine privacy to address their business motives. Such an approach would enable monitoring and directing the motivation they already have in a way that benefit both the users and the organization. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | of highlighting privacy risks to induce motivation in organizations. Regulations such as the GDPR are showing signs of changes and initiating the required changes to integrate technological and engineering aspects into privacy. For such initiatives, the knowledge elicited here, which demonstrate how different organizations approach privacy as management strategy is important. Understanding how a particular sector of organization, for example banking and financial organizations adopting privacy due to risk suggest enforcing privacy rules through a risk based approach. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Anthonysamy et al. (2017) in their study on approaches to privacy implementation in systems, claim that consideration of privacy only being an early stage task, and the element of regulation and accountability to be positives of the compliance based approach. However, it is possible that the risks the organization perceive mismatch the actual risks perceived by the end users of a system. It has been shown that many developers feel that communicating with end users of a system is not necessary as they know what users want from a system (Caputo et al. 2016). Such attitudes could hinder an organization’s capability to identify real risks as perceived by users. This may lead to mis-prioritization of risks and hence not deliver adequate privacy protection to the end users. Additionally, previous work has identified Compliance being limited to government legal documents, lack of concern for third party imposed risk on privacy, and non-adherence to the continuous changes in privacy requirements and functionalities are weaknesses of the Risk based approach (Anthonysamy et al. 2017). Similarly, our study further revealed the disjoint nature of privacy risk analysis and policy declaration from the technological and development practices to be a weakness. Interpretation of legal requirements and translating them into practice is a critical component that determines the compliance of organizations that approach privacy through regulations (Breaux & Antón 2008). Therefore, we suggest that legal frameworks make an effort to encourage an approach that demonstrate compliance. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | A common characteristic that was evident in all motivational approaches we identified was that they are all top-down induced motivations. This essentially means that even though the organizational motivation towards privacy at the top level is either voluntary or compliance, for the ground level staff it is always compliance or obligation. It is understood that for better privacy implementation an organization’s top management should enforce compliance by ground staff (Cavoukian et al. 2010). For example, Alge et al (2006) state that organizations should continuously monitor employees who may (un/willingly) manipulate the privacy practices exercised by a company. The recent incident at Uber, where employees were accused of spying on celebrity travel information in their systems (The Guardian 2016) is a good example for the need for such strict measures. However, we believe that if we can induce motivation for the ground level staff; development, quality assurance and legal teams to have voluntary motivation, the prevailing burdensome attitude towards privacy in organizations could be changed (Senarath et al. 2017). For example, technical organizations are moving towards flat hierarchal management strategies to encourage technological breakthroughs from ground level staff by giving them opportunity and authority (Brem & Wolfram 2017). We believe that applying the same for privacy practices could nudge ground level staff to cultivate a voluntary attitude towards privacy. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Our results suggest that the future direction in privacy research should be a mixed approach. Governments should make it a priority to regulate privacy policies and laws as more than half of the organizations studied were observed to be motivated to consider privacy in their business model due to risk induced compliance. Therefore, legal frameworks act as a strong incentive in not only encouraging the organizations to adopt privacy in their business practices, but also in setting the standards in privacy protection. However, our results also strengthen the claim by Van et al. (Van Blarkom et al. 2003) which states that self-regulation may not be sufficient when it comes to organizations, as they tend to adopt only what they find attractive. Therefore, inducing voluntary motivation at all levels within an organization hierarchy is essential to ensure privacy as an organizational practice. Further to that, when it comes to organizations that are heavily dependent on user data, which demonstrated a voluntary motivation towards privacy, the regulations need to be modified and customized. The results suggested that such organizations believed the existing laws to be outdated or non-considerate concerning their business practices and requirements. Hence, further attention is required as to how to allow mutual benefits for both users and organizations while using technology to preserve privacy. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | to the approach they take towards user privacy. These findings contribute to the knowledge that is required by regulatory bodies and governments to understand the organizations when they enforce privacy regulations. Further, our findings revealed that the regulatory bodies need to understand the technological advancements that drive organizations to change and challenge privacy laws. We believe that regulations enforced through such an understanding would positively influence adherence. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Brashear, T., Granot, E., Brashear, T. G. & Cesar Motta, P. (2012), ‘A structural guide to in-depth interviewing in business and industrial marketing research’, Journal of Business & Industrial Marketing 27(7), 547–553. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Brem, A. & Wolfram, P. (2017), ‘Organisation of new product development in asia and europe: results from western multi-nationals r&d sites in germany, india, and china’, Review ofManagerial Science 11(1), 159–190. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Brunton, F. & Nissenbaum, (2017), ‘Privacy trust gap: A review’, Yale Law Journal 126(4), 908–1241. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Cavoukian, A., Taylor, S. & Abrams, M. E. (2010), ‘Privacy by design: essential for organizational accountability and strong business practices’, Identity in the Information Society 3(2), 405–413. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Davies, S. (2010), ‘Why privacy by design is the next crucial step for privacy protection’. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Dusuki, A. W. & Yusof, T. F. M. T. M. (2016), ‘The pyramid of corporate social responsibility model: Empirical evidence from malaysian stakeholder persepective’, Malaysian Accounting Review 7(2). |
Processed_Understanding_Organizational_Approach_towards_End_.txt | law: The experiments need more time’, Fordham Intell. Prop. Media & Ent. LJ 17, 693. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Notario, N., Crespo, A., Martı́n, Y.-S., Del Alamo, J. M. Le Métayer, D., Antignac, T., Kung, A., Kroener, I. & Wright, D. (2015), Integrating privacy best practices into a privacy engineering methodology, in ‘Security and Privacy Workshops (SPW), 2015 IEEE’, IEEE, pp. 151–158. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Olafsen, A. H., Halvari, H., Forest, J. & Deci, E. L. (2015),‘Show them the money? the role of pay, managerial need support, and justice in a self-determination theory model of intrinsic work motivation’, Scandinavian journal of psychology 56(4), 447–457. |
Processed_Understanding_Organizational_Approach_towards_End_.txt | Copyright: © 2017 authors. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 3.0 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and ACIS are credited. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | pernova remnants (SNRs) and their surrounding molec- ular clouds (Goss & Robinson 1968). OH masers associ- ated with HMSF regions are primarily from the main line transitions, i.e., 1665 and 1667 MHz. Evolved star OH masers are predominantly strong in the 1612 MHz tran- sition, which often shows double-horned spectral pro- files (e.g., Sevenster et al. 1997a, 1997b, 2001a). SNRs are only detected in the 1720 MHz OH masers (e.g., Frail et al. 1996). Furthermore, other astrophysical en- vironments, such as comets (G´erard et al. 1998) and the centers of active galaxies (Baan et al. 1982), have also been detected in ground-state OH maser emission. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | Most previous searches for ground-state OH maser emission selected target sources based on criteria such as: infrared (IR) point sources with colors indicative of young high-mass star formation regions (e.g., Edris et al. 2007); evolved stars associated with water and/or SiO masers (e.g., Lewis et al. 1995); SNRs (e.g., Frail et al. 1996); maser sources with other OH transitions (e.g., In addition to these targeted searches, Caswell 2004). a number of complete surveys have been performed to- ward regions of the Galactic plane. These surveys were usually restricted to one or two of the ground-state OH transitions (e.g., the 1665 and 1667 MHz main line transitions or 1612 MHz satellite transition) and therefore favour either HMSF regions (e.g. Caswell et al. 1980; Caswell & Haynes 1983a,b, 1987; Caswell 1998) or evolved star sites (e.g. Sevenster et al. 1997a,b, 2001a). Since these previous surveys suffer from biases, further studies should be carried out to comprehensively un- derstand the complete population of ground-state OH masers. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | search a 176 square degree portion of the southern Galac- tic plane in all four ground-state OH transitions simulta- neously (Dawson et al. 2014). The sensitive OH search covered Galactic longitudes of 332◦ and 10◦ and Galac- tic latitudes of −2◦ and +2◦ (152 square degrees), plus an extension around the Galactic Center, i.e., between Galactic longitudes of 358◦ and 4◦ and Galactic latitudes of +2◦ and +6◦ (24 square degrees)(shown in Figure 1). The initial SPLASH single-dish survey produced maser- optimised cubes (see Dawson et al. 2014 for details) with a mean rms (root-mean-square) sensitivity of ∼65 mJy (at a velocity resolution of 0.18 km s−1), allowing us to identify about 600 OH maser sites. The SPLASH ob- servations have allowed us to overcome biases present in a number of previous searches but are limited to a spatial resolution of about 13′. In order to fully exploit these sensitive OH maser observations, high spatial res- olution observations are required, allowing reliable iden- tifications with associated objects. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | We completed the accurate positions of the pilot region (334◦ < l <344◦ and −2◦ < b < +2◦, 40 square degrees; Qiao et al. 2016b, hereafter Paper I; shown in the red shaded region in Figure 1) and the Galactic Center region (−5◦ < l < +5◦ and −2◦ < b < +2◦, 40 square degrees; Qiao et al. 2018, hereafter Paper II; shown in the cyan shaded region in Figure 1) with the Australia Telescope Compact Array (ATCA) observations. In these two re- gions, we detected 571 OH maser sites toward 367 tar- get fields where OH maser candidates were identified in SPLASH. Towards 30 of these target fields, our ATCA observations find no OH maser emission, about half of which might be due to the intrinsic variability of OH masers (Paper I; Paper II). Through comparison with data in the literature, we concluded that, of these 571 OH maser sites, 391 are associated with evolved stars, 95 are associated with star formation, 6 are associated with SNRs and the origins of 79 maser sites remain un- known. Three of the evolved star OH maser sites are as- sociated with PNe, one of which exhibited variable 1720 MHz OH maser emission (IRAS 16333−4807; Qiao et al. 2016a) which may be tracing short-lived equatorial ejec- tions during the PNe formation. This 1720 MHz maser is one of only three such masers ever detected in the vicinity of a PNe (the other two examples are K3-35 – G´omez et al. 2009 and Vy2-2 – G´omez et al. 2016). |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | This is the third (and final) paper in a series present- ing the accurate positions of OH masers identified in the SPLASH survey. The Galactic region presented in the current paper is given in Figure 1 (96 square degrees; be- tween Galactic longitudes of 332◦ and 334◦ and Galactic latitudes of −2◦ and +2◦, between Galactic longitudes of 344◦ and 355◦ and Galactic latitudes of −2◦ and +2◦, between Galactic longitudes of 358◦ and 4◦ and Galactic latitudes of +2◦ and +6◦, and between Galactic longi- tudes of 5◦ and 10◦ and Galactic latitudes of −2◦ and +2◦). Future work will present the full polarisation char- acteristics, including an analysis of magnetic fields. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | ary 26 – 29, 2016 March 2 and 2016 March 4. Across these observations the ATCA was in the 6A, 6A, 6C, 6B, 6B, 6B and 6B configurations, respectively, resulting in a synthesised beam in the range 6.5′′ × 4.4′′ to 22′′ × 5′′. Each of the 253 target fields were observed for a mini- mum of 20 minutes, conducted as a series of 4-minute integrations distributed across a range of hour angles in order to obtain adequate uv-coverage. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | A full description of the observations and data reduc- tion specifications are provided in Paper I and Paper II, so here we provide only a brief description of the important points. At each epoch, the Compact Array Broadband Backend (CABB) was configured to provide 4 spectral zoom bands (channel spacing of 0.5 kHz or 0.09 km s−1) but there was some variation in the zoom bandwidths across these epochs. For observations in the 2014 OCT Semester (i.e., 2015 January 27 – 28, 2015 January 30 – 2015 February 1 and 2015 March 1 – 7), we used 2 MHz zoom bands for both the 1612 and 1720 MHz transitions, and 1.5 MHz zoom bands for both the 1665 and 1667 MHz transitions (following our pre- vious observations of the SPLASH pilot region). For observations during the 2015 OCT Semester (i.e., 2016 February 19 – 24, 2016 February 26 – 29, 2016 March 2 and 2016 March 4), 4 MHz zoom bands were used for the 1612 MHz transition and 1.5 MHz zoom bands for each of the 1665, 1667 and 1720 MHz transitions. The reduced bandwidths during the Semester 2014 OCT meant that the entire velocity range of six 1612 MHz OH masers (G350.10+0.75, G350.351.50, G351.05+2.05, G353.65+0.80, G353.751.55 and 353.951.00) and one 1720 MHz OH maser (G332.2750.05) were excluded in the ATCA observations (see Table 2 for details), and conse- quently we are not able to provide accu- rate positions for these seven sources. Additionally, one 1612 MHz spectrum (G347.396+0.394) and three 1667 MHz spectra (G348.668−0.715, G351.118−0.352 and G008.707+0.811) were truncated. At each epoch observations, PKS B1934−638 has been used for pri- mary flux density calibration and either PKS B1934−638 or PKS B0823−500 was used for bandpass calibration. Observations of a nearby phase calibrator (either PKS B1613−586, PKS B1710−269 or PKS B1740−517; cho- sen to be within 7◦) were made every ∼20 minutes. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | The data reduction process followed standard tech- niques for ATCA spectral line data processing and a detailed description is given in Paper I. After calibrat- ing the data and producing image cubes, we searched for maser emission in both the cube and peak intensity images. The resultant mean rms of the ATCA observa- tions was 70 mJy in a 0.09 km s−1 channel (c.f., 65 mJy for the Parkes observations in a 0.18 km s−1 channel). The LSR velocity range over which maser emission was searched for in each transition was approximately −350 to +300 km s−1 (−250 to +210 km s−1 for the Semester 2014 OCT) for 1612 MHz, −160 to +180 km s−1 for 1665/7 MHz and −120 to +200 km s−1 (−180 to +250 km s−1 for the Semester 2014 OCT) for 1720 MHz. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | Galactic Longitude (degrees) Fig. 1.— The full survey region of SPLASH (blue outline): the red shaded region is the pilot region presented in Paper I while the cyan shaded region is the Galactic Center region which was presented in Paper II. The unshaded area shows the Galactic ranges presented in the current paper. The black crosses, yellow circles, blue squares and carmine rhombuses mark the locations of evolved star, star formation, SNR and unknown OH maser sites we detected in the ATCA observations, respectively. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | tra at each of the fitted spot positions were extracted from the uv data using the Miriad task uvspec and were used to determine flux density and velocity characteris- tics. Velocity ranges are defined by emission surpassing 3σ in data that was first binned over 5 channels (corre- sponding to a velocity resolution of about 0.45 km s−1). In the case of overlapping velocity components with a trough between them, two spectral components are re- ported if the peak of the weaker feature is stronger than the trough minimum by at least the 1σ noise level. As cautioned in Paper I and Paper II, this method may ex- clude some weaker emission (including line wings) and as such the presented velocity ranges and integrated flux densities should be used as a guide. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | We have used the 1720 MHz zoom band (since few masers are detected in this band) to assess the radio continuum properties associated with the maser targets. Data were reduced employing standard techniques for radio continuum data reduction, obtaining a typical rms noise of 10 mJy. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | spots into 362 maser sites according to their separations (see Table 1), 160 of which have been discovered in the SPLASH observations. Among these maser sites, 293 are made up of more than one maser spot and the most ex- treme source, G351.774−0.536, shows a total of 38 maser spots across all four ground-state OH transitions. The majority of the masers sites (298) show emission in the 1612 MHz transition, while 70 show 1665 MHz, 84 show 1667 MHz and 25 show 1720 MHz OH masers, respec- tively. Section 4.6 discusses the 17 target fields where we find no maser emission in our ATCA observations. |
Processed_Accurate_OH_Maser_Positions_From_The_SPLASH_Survey.txt | Following Paper I, we present a figure for each of the maser sites (an example is given in Figure 2), in- cluding spectra of the detected OH maser transitions, a plot of the measured spot positions including a rela- tive error ellipse, and the location of the detected maser spots overlaid on an IR image. Shaded regions of the spectra show the velocity ranges calculated using the method described in Section 2 and indicate the ranges used to calculate the integrated flux densities given in column 5 in Table 1. In some cases, there is emission in the spectra that is not shaded – this typically indi- cates the emission is from nearby unrelated maser sites (details given in Section 3.3) or is a noise spike. Note that three spectra (G005.128+1.490, G005.639+0.770 and G006.095−0.629) have been affected by RFI, which has been flagged, resulting in zero values in some velocity ranges. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Louis, MO 63130, USA; EInstitut d’Electronique du Sud, Université de Montpellier 2, F-34095 Montpellier, France. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | the Solar System was born (Clayton & Nittler 2004; Lodders & Amari 2005; Zinner 2007). |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | limit (L2-08) and a value with large error (L2-16) for the 21Ne exposure age could be derived. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Table 1. Cosmogenic 21Ne and 3He, recoil retention and recoil-corrected presolar ages of large SiC grains. The retention percentage combines direct production of 3He with that via 3H. Upper limits are in italics, upper limits based on total 21Ne are given in italics and parentheses. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | discussion of the 3He ages and a comparison between He and Ne ages, we refer to Heck et al. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Solar System formation (Clayton 2003) is discussed in Heck et al. (2008b) and Ott et al. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | which were obtained on a less diverse set of grains - seem to be considerably longer. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Obviously, it will be necessary to determine Li and He/Ne ages on the same grains. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Greiner, D. E., Lindstrom, P. J., Heckman, H. H., Cork, B., & Bieser, F. S. 1975, Phys. Rev. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Heck, P. R., Gyngard, S., Meier, M. M. M., Ávila, J. N., Amari, S., Zinner, E. K., Lewis, R. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Meyer, B. S., & Zinner, E. K. 2006, in Meteorites and the Early Solar System II, ed. D. S. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Ott, U., Altmaier, M., Herpers, U., Kuhnhenn, J., Merchel, S., Michel, R., & Mohapatra, R. K. |
Processed_He_and_Ne_ages_of_large_presolar_silicon_carbide_g.txt | Virag, A., Wopenka, B., Amari, S., Zinner, E., Anders, E., & Lewis, R. S. 1992, Geochim. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.