WorldWideScience

Sample records for safety controversy theft

  1. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  2. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  3. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  4. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  5. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  6. Current trends in copper theft prevention

    Energy Technology Data Exchange (ETDEWEB)

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  7. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  8. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  9. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  10. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  11. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  12. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  13. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  14. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  15. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  16. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  17. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  18. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  19. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  20. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  1. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  2. Safety vs. reputation: risk controversies in emerging policy networks regarding school safety in the Netherlands

    NARCIS (Netherlands)

    Binkhorst, J.; Kingma, S.F.

    2012-01-01

    This article deals with risk controversies in emerging policy networks regarding school safety in the Netherlands. It offers a grounded account of the interpretations of school risks and safety measures by the various stakeholders of the policy network, in particular, schools, local government and

  3. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  4. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  5. Drug safety: Pregnancy rating classifications and controversies.

    Science.gov (United States)

    Wilmer, Erin; Chai, Sandy; Kroumpouzos, George

    2016-01-01

    This contribution consolidates data on international pregnancy rating classifications, including the former US Food and Drug Administration (FDA), Swedish, and Australian classification systems, as well as the evidence-based medicine system, and discusses discrepancies among them. It reviews the new Pregnancy and Lactation Labeling Rule (PLLR) that replaced the former FDA labeling system with narrative-based labeling requirements. PLLR emphasizes on human data and highlights pregnancy exposure registry information. In this context, the review discusses important data on the safety of most medications used in the management of skin disease in pregnancy. There are also discussions of controversies relevant to the safety of certain dermatologic medications during gestation. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Sim-based detection tools to minimize motorcycle theft

    Science.gov (United States)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  7. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  8. 25 CFR 11.412 - Theft.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  9. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  10. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  11. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  12. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  13. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  14. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  15. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  16. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  17. Gun Theft and Crime.

    Science.gov (United States)

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  18. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  19. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    OpenAIRE

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  20. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  1. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  2. Overt theft and the peculiarities of the qualification

    OpenAIRE

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  3. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  4. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  5. 14 CFR 1214.609 - Loss or theft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  6. 26 CFR 1.165-8 - Theft losses.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  7. 27 CFR 24.265 - Losses by theft.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  8. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  9. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    OpenAIRE

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  10. Brake to the theft of fuels

    International Nuclear Information System (INIS)

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  11. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  12. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  13. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  14. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  15. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  16. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  17. Dog Theft: A Case for Tougher Sentencing Legislation.

    Science.gov (United States)

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  18. 7 CFR 331.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  19. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  20. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Science.gov (United States)

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  1. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  2. Money and Credit With Limited Commitment and Theft

    OpenAIRE

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  3. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  4. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  5. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  6. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  7. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  8. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  9. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  10. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  11. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  12. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  13. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  14. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  15. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  16. 42 CFR 73.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  17. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  18. Dog Theft: A Case for Tougher Sentencing Legislation

    Science.gov (United States)

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  19. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  20. Developmental Trajectories of Male Physical Violence and Theft

    Science.gov (United States)

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  1. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  2. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  3. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  4. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  5. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  6. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  7. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  8. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  9. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  10. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  11. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  12. Combating employee theft in the healthcare industry.

    Science.gov (United States)

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  13. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  14. On the electricity shortage, price and electricity theft nexus

    International Nuclear Information System (INIS)

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  15. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  16. Tricks of the trade: Mechanism of brood theft in an ant.

    Science.gov (United States)

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  17. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  18. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    OpenAIRE

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  19. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  20. Electrical injuries due to theft of copper.

    Science.gov (United States)

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  1. Deterring and remedying employee theft.

    Science.gov (United States)

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  2. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Science.gov (United States)

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  3. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  4. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  5. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Science.gov (United States)

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  6. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    Science.gov (United States)

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  7. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  8. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  9. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  10. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Science.gov (United States)

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  11. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  12. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  13. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  14. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  15. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  16. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  17. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  18. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  19. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  20. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  1. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  2. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  3. 76 FR 8400 - National Highway Traffic Safety Administration

    Science.gov (United States)

    2011-02-14

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety Administration (NHTSA) Department of Transportation (DOT). ACTION: Grant of petition for exemption. SUMMARY: This...

  4. New consumer load prototype for electricity theft monitoring

    International Nuclear Information System (INIS)

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  5. New consumer load prototype for electricity theft monitoring

    Science.gov (United States)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  6. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  7. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  8. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  9. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  10. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    OpenAIRE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  11. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    International Nuclear Information System (INIS)

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  12. Kleptomania or common theft - diagnostic and judicial difficulties.

    Science.gov (United States)

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  13. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  14. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  15. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  16. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  17. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  18. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  19. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  20. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  1. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  2. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  3. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  4. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  5. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  6. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  7. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  8. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  9. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  10. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  11. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  12. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  13. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  14. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Science.gov (United States)

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  15. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  16. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  17. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  18. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  19. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Science.gov (United States)

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  20. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  1. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  2. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  3. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  4. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  5. Varicocele: Management and the continuing controversies

    Directory of Open Access Journals (Sweden)

    P S Agbo

    2010-01-01

    Full Text Available Varicoceles have long been associated with infertility. Despite this long history, there remains much controversy regarding their aetiology and management. The aim of this review is to present the most current information on the management of varicoceles and to highlight some of the management controversies: Association of varicocele with male infertility; Management of varicocele in adolescent; safety and effectiveness of varicocele embolization and management of subclinical varicoceles. It is hoped that this review study will stimulate further research into this condition in order to find a more common ground regarding its management.

  6. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  7. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  8. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  9. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  10. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Directory of Open Access Journals (Sweden)

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  11. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  12. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  13. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  14. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  15. Is there a scientific nuclear controversy

    International Nuclear Information System (INIS)

    Muench, E.; Borsch, P.

    1977-01-01

    In the present rather violent discussion about the introduction of nuclear power into the energy supply system it is often alleged that even experts disagree about many aspects, which is interpreted to prove the existence of a scientific controversy in these points. This study about the existence or in existence of such controversy critically reviews both the different collections of signatures organized by scientists and the statements published in specific areas of science. Important partial aspects are the energy requirement and the ways and means available to meet it, the safety and the risks of nuclear technology, radiation exposure and biological effects, the misuse of plutonium, and reprocessing and the ultimate storage of radioactive waste. The study concludes that there is no scientific controversy about the peaceful uses of nuclear power in the sense of the term used here. (orig.) [de

  16. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  17. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    OpenAIRE

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  18. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  19. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  20. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  1. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  2. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  3. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  4. Evidence to the Windscale Inquiry on the social and political implications of the nuclear controversy

    International Nuclear Information System (INIS)

    Taylor, P.J.

    1977-01-01

    Mr.Taylor's paper has the following section headings: preface; my relevant experience; the problem of controversy; the nature of the nuclear power controversy; the role of argument; paranoia and repression; structural inertia and conflict; the internationalisation of the opposition; the place of THORP in the context of an environmental revolution; the effect on THORP; the disposal controversy; the safety controversy; the psychological aspects of the nuclear controversy; nuclear power and symbolic representation; my own view as a social anthropologist (fledgling). (U.K.)

  5. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  6. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    Science.gov (United States)

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  7. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Science.gov (United States)

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  8. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  9. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  10. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  11. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Science.gov (United States)

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  12. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  13. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Directory of Open Access Journals (Sweden)

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  14. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  15. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  16. Reducing theft and embezzlement by encouraging ethical behavior.

    Science.gov (United States)

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  17. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  18. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  19. Exxon Valdez controversy revived

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    Four years after its occurrence rocked the petroleum industry and revitalized the US environmental movement, the Exxon Valdez tanker oil spill off Alaska continues to stir controversy. Conflicting reports abound over whether there is long term damage to the Prince William Sound ecosystem resulting from the March 24, 1989, spill. Government scientists at recent conferences disclosed studies they contend show long term, significant damage to the sound. Exxon this month launched a counteroffensive, disclosing results of studies it funded that it claims show no credible scientific evidence of long term damage. At the same time, the company blasted as flawed the government's data on assessing environmental damage to the sound and charged that test samples from the sound were mishandled. Meantime, Prince William Sound still shows lingering effects from the Exxon Valdez oil spill. But recovery has been so rapid that there is more controversy over how to use $900 million in natural resource recovery funds that Exxon paid than over how badly species are suffering. The paper describes Exxon's studies; faulty data; lingering damage; and an update on tanker safety

  20. The tariff for fire and theft car insurance: analysis with a Cox model

    OpenAIRE

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  1. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  2. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  3. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Science.gov (United States)

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  4. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  5. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  6. Still controversial

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1986-10-15

    It is some sixty years since the existence of the neutrino was controversially postulated by the controversial Wolfgang Pauli. Today, the neutrino remains controversial. At the Berkeley Conference, summarizer Steve Weinberg kept the spotlight on these enigmatic particles during a considerable portion of his talk.

  7. Still controversial

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    It is some sixty years since the existence of the neutrino was controversially postulated by the controversial Wolfgang Pauli. Today, the neutrino remains controversial. At the Berkeley Conference, summarizer Steve Weinberg kept the spotlight on these enigmatic particles during a considerable portion of his talk

  8. Organisational Behaviour and Culture : Insights from and for public safety management

    NARCIS (Netherlands)

    G. Belschak-Jacobs (Gabriele)

    2018-01-01

    textabstractLarge-scale migration, forced displacement, organised crime, terrorism and natural disasters, but also the proliferation of child pornography, hacking, identity theft and other types of cybercrime provide very concrete challenges to public safety and can trigger profound feelings of

  9. Safety and environment

    International Nuclear Information System (INIS)

    Cogne, F.

    1975-01-01

    The author analyses the papers presented by C. Starr and M. Muntzing at the Paris Conference on the maturity of nuclear energy. The main problems raised in the matter of safety (safety of the plants, plutonium toxicity, the possibilities of theft or sabotage, treatment and storage of the waste) are analyzed and it is pointed out that the hazards arising from the use of nuclear power are contained within reasonable limits. The experts should take the initiative of informing the general public on these matters as the mass media circulate too much inaccurate information in this field. As concerns the environment, it is the choice of sites and the harmonizing of the rules and procedures which appear to be the most important problems for the authorities charged with safety measures [fr

  10. Fighting the scourge of metal theft.

    Science.gov (United States)

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  11. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  12. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  13. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  14. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  15. Understanding the agreements and controversies surrounding childhood psychopharmacology

    Directory of Open Access Journals (Sweden)

    Johnston Josephine

    2008-02-01

    Full Text Available Abstract The number of children in the US taking prescription drugs for emotional and behavioral disturbances is growing dramatically. This growth in the use of psychotropic drugs in pediatric populations has given rise to multiple controversies, ranging from concerns over off-label use and long-term safety to debates about the societal value and cultural meaning of pharmacological treatment of childhood behavioral and emotional disorders. This commentary summarizes the authors' eight main findings from the first of five workshops that seek to understand and produce descriptions of these controversies. The workshop series is convened by The Hastings Center, a bioethics research institute located in Garrison, New York, U.S.A.

  16. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  17. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  18. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  19. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  20. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  1. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  2. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  3. Addressing the controversy regarding the association between thimerosal-containing vaccines and autism

    OpenAIRE

    García-Fernández, Lisset; Unidad de Análisis y Generación de Evidencias en Salud Pública (UNAGESP), Instituto Nacional de Salud. Lima, Perú. Médica infectóloga.; Hernández, Adrián V.; Unidad de Análisis y Generación de Evidencias en Salud Pública (UNAGESP), Instituto Nacional de Salud. Lima, Perú. Department of Quantitative Health Sciences, Lerner Research Institute, Cleveland Clinic, Cleveland. Ohio, EE. UU. médico epidemiólogo clínico, PhD in Health Science.; Suárez Moreno, Víctor; Unidad de Análisis y Generación de Evidencias en Salud Pública (UNAGESP), Instituto Nacional de Salud. Lima, Perú. médico infectólogo, MPH in Public Health.; Fiestas, Fabián; Unidad de Análisis y Generación de Evidencias en Salud Pública (UNAGESP), Instituto Nacional de Salud. Lima, Perú. médico epidemiólogo.

    2014-01-01

    Vaccination is one of the most important public health interventions in the reduction childhood morbidity and mortality. Thimerosal is an organic mercury compound used as preservante in multi-dose vials. Often in Peru, there are waves of controversy about the safety of this type of vaccines, mainly arguing that there is an association between them and autism. As a result of these controversies, there have been some voices asking for laws banning thimerosal-containing vaccines, which would...

  4. Towards creating believable decoy project folders for detecting data theft

    NARCIS (Netherlands)

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  5. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  6. Computational Controversy

    NARCIS (Netherlands)

    Timmermans, Benjamin; Kuhn, Tobias; Beelen, Kaspar; Aroyo, Lora

    2017-01-01

    Climate change, vaccination, abortion, Trump: Many topics are surrounded by fierce controversies. The nature of such heated debates and their elements have been studied extensively in the social science literature. More recently, various computational approaches to controversy analysis have

  7. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  8. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  9. Theft detection and smart metering practices and expectations in the Netherlands

    NARCIS (Netherlands)

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  10. Copper wire theft and high voltage electrical burns

    OpenAIRE

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  11. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  12. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  13. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  14. RxPATROL: a Web-based tool for combating pharmacy theft.

    Science.gov (United States)

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  15. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  16. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  17. Glaciers in Patagonia: Controversy and prospects

    Science.gov (United States)

    Kargel, J. S.; Alho, P.; Buytaert, W.; Célleri, R.; Cogley, J. G.; Dussaillant, A.; Guido, Z.; Haeberli, W.; Harrison, S.; Leonard, G.; Maxwell, A.; Meier, C.; Poveda, G.; Reid, B.; Reynolds, J.; Rodríguez, C. A. Portocarrero; Romero, H.; Schneider, J.

    2012-05-01

    Lately, glaciers have been subjects of unceasing controversy. Current debate about planned hydroelectric facilities—a US7- to 10-billion megaproject—in a pristine glacierized area of Patagonia, Chile [Romero Toledo et al., 2009; Vince, 2010], has raised anew the matter of how glaciologists and global change experts can contribute their knowledge to civic debates on important issues. There has been greater respect for science in this controversy than in some previous debates over projects that pertain to glaciers, although valid economic motivations again could trump science and drive a solution to the energy supply problem before the associated safety and environmental problems are understood. The connection between glaciers and climate change—both anthropogenic and natural—is fundamental to glaciology and to glaciers' practical importance for water and hydropower resources, agriculture, tourism, mining, natural hazards, ecosystem conservation, and sea level [Buytaert et al., 2010; Glasser et al., 2011]. The conflict between conservation and development can be sharper in glacierized regions than almost anywhere else. Glaciers occur in spectacular natural landscapes, but they also supply prodigious exploitable meltwater.

  18. Enhancing vaccine safety capacity globally: A lifecycle perspective

    NARCIS (Netherlands)

    R.T. Chen (Robert T.); T.T. Shimabukuro (Tom T.); D.B. Martin (David); P. Zuber (Patrick); D.M. Weibel (Daniel); M.C.J.M. Sturkenboom (Miriam)

    2015-01-01

    textabstractMajor vaccine safety controversies have arisen in several countries beginning in the last decades of 20th century. Such periodic vaccine safety controversies are unlikely to go away in the near future as more national immunization programs mature with near elimination of target

  19. Copper wire theft and high voltage electrical burns.

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  20. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  1. 78 FR 72749 - Reports, Forms and Record Keeping Requirements; Agency Information Collection Activity Under OMB...

    Science.gov (United States)

    2013-12-03

    ... Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards. OMB Number: 2127-0002... Federal motor vehicle safety, bumper, and theft prevention standards administered by NHTSA. The... vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper, and theft...

  2. 49 CFR Appendix B to Part 591 - Section 591.5(f) Bond for the Entry of More Than a Single Vehicle

    Science.gov (United States)

    2010-10-01

    ...) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591... Federal motor vehicle safety, or bumper, or theft prevention standards; and WHEREAS, pursuant to 49 CFR... to conform to the Federal motor vehicle safety, bumper, and theft prevention standards; and WHEREAS...

  3. 49 CFR 591.5 - Declarations required for importation.

    Science.gov (United States)

    2010-10-01

    ... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... theft prevention standards. (b) The vehicle or equipment item conforms with all applicable safety... with all applicable Federal motor vehicle safety, bumper, and theft prevention standards, but is...

  4. Current Therapeutic Cannabis Controversies and Clinical Trial Design Issues

    OpenAIRE

    Russo, Ethan B.

    2016-01-01

    This overview covers a wide range of cannabis topics, initially examining issues in dispensaries and self-administration, plus regulatory requirements for production of cannabis-based medicines, particularly the Food and Drug Administration “Botanical Guidance.” The remainder pertains to various cannabis controversies that certainly require closer examination if the scientific, consumer, and governmental stakeholders are ever to reach consensus on safety issues, specifically: whether botanica...

  5. Caffeine controversies.

    Science.gov (United States)

    Gentle, Samuel J; Travers, Colm P; Carlo, Waldemar A

    2018-04-01

    Caffeine use in preterm infants has endured several paradigms: from standard of care to possible neurotoxin to one of the few medications for which there is evidence of bronchopulmonary dysplasia (BPD) risk reduction. The purpose of the review is to analyze this dynamic trajectory and discuss controversies that still remain after decades of caffeine use. Following concerns for caffeine safety in preterm infants, a large randomized controlled trial demonstrated a reduction in BPD and treatment for patent ductus arteriosus. The lower rate of death or neurodevelopmental impairment noted at 18-21 months was not statistically different at later timepoints; however, infants in the caffeine group had lower rates of motor impairment at 11-year follow-up. The time of caffeine therapy initiation is now substantially earlier, and doses used are sometimes higher that previously used, but there are limited data to support these practices. Caffeine therapy for apnea of prematurity (AOP) remains one of the pillars of neonatal care, although more evidence to support dosing and timing of initiation and discontinuation are needed.

  6. Copper wire theft and high voltage electrical burns

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  7. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  8. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  9. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    OpenAIRE

    Samuel Andrew Hardy

    2015-01-01

    Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hire...

  10. 新型盗窃行为探析%An Analysis of the New types of Act of Theft

    Institute of Scientific and Technical Information of China (English)

    韩梅

    2013-01-01

    The 8th Amendment of the Criminal Law has added three new types act of theft, which makes the objective essentials of constituting crimes tend to be specific relatively. To study and discuss the new types of act of theft will be helpful for grasping the essence of theft and preventing such crimes more precisely. Indoor theft refers to an act entering relatively isolated residences of others’ living illegally to steal their properties. Theft with weapons refers to an act that the actor carrying the portable weapons banned in the country or other weapons to steal. Pick-pocketing refers to an act that the actor steals others’ properties in public places.%  《刑法修正案(八)》增加了三种新的盗窃行为类型,使盗窃罪的客观构成要件相对趋向于具体化。入户盗窃,是指非法进入他人生活的与外界相对隔离的住所窃取他人财物;携带凶器盗窃,是指行为人随身携带国家禁止个人携带的器械或其他器械进行盗窃的行为;扒窃是指行为人在公共场所盗窃别人随身的财物。对三种新类型盗窃行为方式的研究和探讨,有助于更准确地把握盗窃罪的实质和预防此类犯罪。

  11. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  12. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  13. Computational Controversy

    OpenAIRE

    Timmermans, Benjamin; Kuhn, Tobias; Beelen, Kaspar; Aroyo, Lora

    2017-01-01

    Climate change, vaccination, abortion, Trump: Many topics are surrounded by fierce controversies. The nature of such heated debates and their elements have been studied extensively in the social science literature. More recently, various computational approaches to controversy analysis have appeared, using new data sources such as Wikipedia, which help us now better understand these phenomena. However, compared to what social sciences have discovered about such debates, the existing computati...

  14. The safety of radioactive materials transport; La surete des transports de matieres radioactives

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The rule of the radioactive materials transport contains two different objectives: the safety, or physical protection, consists in preventing the losses, the disappearances, the thefts and the diversions of the nuclear materials (useful materials for weapons); the high civil servant of defence near the Minister of Economy, Finance and Industry is the responsible authority; the safety consists in mastering the risks of irradiation, contamination and criticality presented by the radioactive and fissile materials transport, in order that man and environment do not undergo the nuisances. The control of the safety is within the competence of the Asn. (N.C.)

  15. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  16. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  17. Elements of safety and non proliferation

    International Nuclear Information System (INIS)

    Jalouneix, Jean; Aurelle, Jacques; Funk, Pierre; Ladsous, David; Bon Nguyen, Romuald; Goue, Georges; Lefevre, Odile

    2015-01-01

    This book on nuclear safety and non proliferation is based on knowledge and expertise of the IRSN. The first chapter addresses the safety of nuclear materials, of their installations and of their transportations. It proposes some contextual elements, presents the general guidelines of the French nuclear safety arrangement, the approach to take risks into account, the involved governmental and public bodies, the legal framework, and the protection and control arrangement (in terms of planning of safety-related activities, in terms of operator obligations, in terms of exercises and management crisis). The second part addresses the safety of radioactive sources: context (peculiarity, losses and thefts), international framework (source categories, Euratom directive), and the French organisation. The third chapter addresses nuclear non proliferation: historical background (creation and role of the IAEA and of the EAEC, definitions), principle of statements, inspection process, and French organisation (legal framework, governmental bodies, the IRSN). The last chapter addresses the issue of chemical non proliferation: historical background, international context (Convention on chemical weapons, organisation for their ban), and the French organisation

  18. 49 CFR 567.4 - Requirements for manufacturers of motor vehicles.

    Science.gov (United States)

    2010-10-01

    ... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... statement: “This vehicle conforms to all applicable Federal motor vehicle safety and theft prevention... conforms to the applicable Federal motor vehicle theft prevention standard in effect on the date of...

  19. The problem of theft depravity in traditional Russian culture(middle of the 19th - beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Т В Лис

    2008-06-01

    Full Text Available This article touches upon the problem of perceiving and comprehending the theft within its interrelationship with the concept of sin, which is in its turn considered to be one of the most important notions of the Christian ethics. Considering this very aspect theft studies make it easy to pinpoint certain peculiarities of the traditional sense of justice and national morality. In terms of temporal perspective the idea of sin correlates with an image of theft victim. Then the larceny turns into a certain visitation for the recently committed offence or crime. Thus, we can draw up a certain cause-and-effect line: any crime or offence entails punishment, which is actually a crime aimed at somebody, who has committed the crime first. In this case we can talk about the synonymy of crime and punishment as well as about the cumulation of sin.

  20. The nuclear controversy and nuclear safety techniques

    International Nuclear Information System (INIS)

    Ragnarson, P.

    1979-09-01

    Survey interviews with 125 Swedish nuclear safety engineers are summarized and commented upon. A short historical background is given, claiming that the major safety issues of nuclear energy have been debated continously during the 50's and 60's in a way that could well have been watched and interpreted by a political, democratic system involving political parties, government departments, etc. With a few exceptions, these 125 engineers represent 10 - 20 years experience in nuclear research and development. By definition they belong to a professional group of about 800 in Sweden (1978). The main aim of the study is to find out if (how and why) a public debate can bring about changes in an industrially established technology by influencing the attitudes and technical judgements of the individuals and/or organizations involved. Examples are given in which the nuclear specialists themselves admit or claim that direct or indirect impacts from the public debate have been important. A common experience is that the scientists and engineers have been forced to broaden their professional scope through a time-consuming but - on the whole - 'positive' process. A year after the interviews started, a serious reactor accident occured near Harrisburg, Pennsylvania. The group has been used for a survey of the immediate reactions in order to see if it could cause sudden changes of attitudes among the experts. A minority demonstrated clear changes towards a more cautious attitude regarding nuclear risks. (author)

  1. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  2. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    National Research Council Canada - National Science Library

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  3. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  4. The nuclear controversy: unequal competition in public policy-making

    International Nuclear Information System (INIS)

    Sanderson, I.

    1980-05-01

    The subject is discussed under the headings: introduction; some epistemological problems; energy policy-making and the energy crisis; the nuclear controversy - substantive issues (the need for nuclear power; the desirability of nuclear power (safety of nuclear power; cost of nuclear power; nuclear power and weapons proliferation; nuclear power and civil liberties; some other aspects of nuclear power development); conclusion); the dominance of pro-nuclear thinking; conclusion and prospects. Appendix A describes the structure of the UK nuclear industry and its European connections. (U.K.)

  5. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    Science.gov (United States)

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  6. Interrelationship between nuclear safety, safeguards and nuclear security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2007-01-01

    As preventive activities against danger within nuclear systems, three major areas exist; nuclear safety, safeguards and nuclear security. Considering the purpose of these activities, to prevent non-peaceful use is common in nuclear security in general and safeguards. At the same time, measures against sabotage, one of the subcategory in nuclear security, is similar to nuclear safety in aiming at preventing nuclear accidents. When taking into account the insider issues in nuclear security, the distinction between measures against sabotage and nuclear safety becomes ambiguous. Similarly, the distinction between measures against theft, another subcategory in nuclear security, and safeguards also becomes vague. These distinctions are influenced by psychological conditions of members in nuclear systems. Members who have the intention to make nuclear systems dangerous to human society shall be the 'enemy' to nuclear systems and thus be the target for nuclear security. (author)

  7. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  8. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    OpenAIRE

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  9. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  10. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  11. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  12. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Science.gov (United States)

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  13. 78 FR 38771 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Approving...

    Science.gov (United States)

    2013-06-27

    ... information that raises significant identity theft, personal safety, or privacy concerns that are not... raises personal safety or privacy concerns is released to the public when considering whether to release... customer information or information that raises identity theft, personal safety or privacy concerns that do...

  14. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  15. HPV vaccines: a controversial issue?

    Science.gov (United States)

    Nicol, A F; Andrade, C V; Russomano, F B; Rodrigues, L L S; Oliveira, N S; Provance, D W

    2016-01-01

    Controversy still exists over whether the benefits of the available HPV vaccines outweigh the risks and this has suppressed uptake of the HPV vaccines in comparison to other vaccines. Concerns about HPV vaccine safety have led some physicians, healthcare officials and parents to withhold the recommended vaccination from the target population. The most common reason for not administering the prophylactic HPV vaccines are concerns over adverse effects. The aim of this review is the assessment of peer-reviewed scientific data related to measurable outcomes from the use of HPV vaccines throughout the world with focused attention on the potential adverse effects. We found that the majority of studies continue to suggest a positive risk-benefit from vaccination against HPV, with minimal documented adverse effects, which is consistent with other vaccines. However, much of the published scientific data regarding the safety of HPV vaccines appears to originate from within the financially competitive HPV vaccine market. We advocate a more independent monitoring system for vaccine immunogenicity and adverse effects to address potential conflicts of interest with regular systematic literature reviews by qualified individuals to vigilantly assess and communicate adverse effects associated with HPV vaccination. Finally, our evaluation suggests that an expanded use of HPV vaccine into more diverse populations, particularly those living in low-resource settings, would provide numerous health and social benefits.

  16. HPV vaccines: a controversial issue?

    Directory of Open Access Journals (Sweden)

    A.F. Nicol

    2016-01-01

    Full Text Available Controversy still exists over whether the benefits of the available HPV vaccines outweigh the risks and this has suppressed uptake of the HPV vaccines in comparison to other vaccines. Concerns about HPV vaccine safety have led some physicians, healthcare officials and parents to withhold the recommended vaccination from the target population. The most common reason for not administering the prophylactic HPV vaccines are concerns over adverse effects. The aim of this review is the assessment of peer-reviewed scientific data related to measurable outcomes from the use of HPV vaccines throughout the world with focused attention on the potential adverse effects. We found that the majority of studies continue to suggest a positive risk-benefit from vaccination against HPV, with minimal documented adverse effects, which is consistent with other vaccines. However, much of the published scientific data regarding the safety of HPV vaccines appears to originate from within the financially competitive HPV vaccine market. We advocate a more independent monitoring system for vaccine immunogenicity and adverse effects to address potential conflicts of interest with regular systematic literature reviews by qualified individuals to vigilantly assess and communicate adverse effects associated with HPV vaccination. Finally, our evaluation suggests that an expanded use of HPV vaccine into more diverse populations, particularly those living in low-resource settings, would provide numerous health and social benefits.

  17. Doctrinal controversies and ecumenical councils | Ogbonnaya ...

    African Journals Online (AJOL)

    This work focused on the doctrinal controversies that have confronted the Church in the course of its development and the accompanying councils that sought to resolve these theological controversies. The paper did this historically, by showing the origin of the problems, the factors and features involved in the controversies ...

  18. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  19. Plutonium controversy

    International Nuclear Information System (INIS)

    Richmond, C.R.

    1980-01-01

    The toxicity of plutonium is discussed, particularly in relation to controversies surrounding the setting of radiation protection standards. The sources, amounts of, and exposure pathways of plutonium are given and the public risk estimated

  20. Managing Controversies in the Fuzzy Front End

    DEFF Research Database (Denmark)

    Christiansen, John K.; Gasparin, Marta

    2016-01-01

    This research investigates the controversies that emerge in the fuzzy front end (FFE) and how they are closed so the innovation process can move on. The fuzzy front has been characterized in the literature as a very critical phase, but controversies in the FFE have not been studied before....... The analysis investigates the microprocesses around the controversies that emerge during the fuzzy front end of four products. Five different types of controversies are identified: profit, production, design, brand and customers/market. Each controversy represents a threat, but also an opportunity to search...

  1. Plutonium controversy

    Energy Technology Data Exchange (ETDEWEB)

    Richmond, C.R.

    1980-01-01

    The toxicity of plutonium is discussed, particularly in relation to controversies surrounding the setting of radiation protection standards. The sources, amounts of, and exposure pathways of plutonium are given and the public risk estimated. (ACR)

  2. Maxillary reconstruction: Current concepts and controversies

    Directory of Open Access Journals (Sweden)

    Subramania Iyer

    2014-01-01

    Full Text Available Maxillary reconstruction is still an evolving art when compared to the reconstruction of the mandible. The defects of maxilla apart from affecting the functions of the speech, swallowing and mastication also cause cosmetic disfigurement. Rehabilitation of the form and function in patients with maxillary defects is either by using an obturator prosthesis or by a surgical reconstruction. Literature is abundant with a variety of reconstructive methods. The classification systems are also varied, with no universal acceptance of any one of them. The oncologic safety of these procedures is still debated, and conclusive evidence in this regard has not emerged yet. Management of the orbit is also not yet addressed properly. Tissue engineering, that has been hyped to be one of the possible solutions for this vexing reconstructive problem, has not come out with reliable and reproducible results so far. This review article discusses the rationale and oncological safety of the reconstructing the maxillary defects, critically analyzes the classification systems, offers the different reconstructive methods and touches upon the controversies in this subject. The management of the retained and exenterated orbit associated with maxillectomy is reviewed. The surgical morbidity, complications and the recent advances in this field are also looked into. An algorithm, based on our experience, is presented.

  3. Maxillary reconstruction: Current concepts and controversies

    Science.gov (United States)

    Iyer, Subramania; Thankappan, Krishnakumar

    2014-01-01

    Maxillary reconstruction is still an evolving art when compared to the reconstruction of the mandible. The defects of maxilla apart from affecting the functions of the speech, swallowing and mastication also cause cosmetic disfigurement. Rehabilitation of the form and function in patients with maxillary defects is either by using an obturator prosthesis or by a surgical reconstruction. Literature is abundant with a variety of reconstructive methods. The classification systems are also varied, with no universal acceptance of any one of them. The oncologic safety of these procedures is still debated, and conclusive evidence in this regard has not emerged yet. Management of the orbit is also not yet addressed properly. Tissue engineering, that has been hyped to be one of the possible solutions for this vexing reconstructive problem, has not come out with reliable and reproducible results so far. This review article discusses the rationale and oncological safety of the reconstructing the maxillary defects, critically analyzes the classification systems, offers the different reconstructive methods and touches upon the controversies in this subject. The management of the retained and exenterated orbit associated with maxillectomy is reviewed. The surgical morbidity, complications and the recent advances in this field are also looked into. An algorithm, based on our experience, is presented. PMID:24987199

  4. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  5. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  6. Safety, security and safeguard

    International Nuclear Information System (INIS)

    Zakariya, Nasiru Imam; Kahn, M.T.E.

    2015-01-01

    Highlights: • The 3S interface in the design of PPS is hereby proposed. • The 3S synergy enhances the reduction in vulnerability and terrorism. • Highlighted were concept of detection, delay and response. - Abstract: A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks

  7. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    Institute of Scientific and Technical Information of China (English)

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  8. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  9. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  10. The controversy on chronic cerebrospinal venous insufficiency

    Directory of Open Access Journals (Sweden)

    Paolo Zamboni

    2013-08-01

    Full Text Available The objective of this review is to analyze the actual scientific controversy on chronic cerebrospinal venous insufficiency (CCSVI and its association with both neurodegenerative disorders and multiple sclerosis (MS. We revised all published studies on prevalence of CCSVI in MS patients, including ultrasound and catheter venography series. Furthermore, we take into consideration other publications dealing with the pathophysiologic consequences of CCSVI in the brain, as well as ecent data characterizing the pathology of the venous wall in course of CCSVI. Finally, safety and pilot data on effectiveness of endovascular CCSVI treatment were further updated. Studies of prevalence show a big variability in prevalence of CCSVI in MS patients assessed by established ultrasonographic criteria. This could be related to high operator dependency of ultrasound. However, 12 studies, by the means of more objective catheter venography, show a prevalence >90% of CCSVI in MS. Global hypo-hypoperfusion of the brain, and reduced cerebral spinal fluid dynamics in MS was shown to be related to CCSVI. Postmortem studies and histology corroborate the 2009 International Union of Phlebology (UIP Consensus decision to insert CCSVI among venous malformations. Finally, safety of balloon angioplasty of the extracranial veins was certainly demonstrated, while prospective data on the potential effectiveness of endovascular treatment of CCSVI support to increase the level of evidence by proceeding with a randomized control trial (RCT. Taking into account the current epidemiological data, including studies on catheter venography, the autoptic findings, and the relationship between CCSVI and both hypo-perfusion and cerebro-spinal fluid flow, we conclude that CCSVI can be definitively inserted among the medical entities. Research is still inconclusive in elucidating the CCSVI role in the pathogenesis of neurological disorders. The controversy between the vascular and the

  11. Energy, controversies and prospects

    International Nuclear Information System (INIS)

    Bertholet, J.-L.; Garbely, M.; Lachal, B.; Romerio, F.; Weber, W.

    2003-01-01

    The energy debate raises deep controversies, as discussions on climate change or electricity markets' deregulation show. In this context, it is very difficult for the citizen to express himself in referendums and for the decision maker to slice between various options. Experts themselves deliver controversial evaluations and interest groups can benefit from them to suggest their own solution. This book enables to get a better insight and better understand energy-related controversies and the environmental and socio-economic impacts of energy. It deals with topics as complex and politically extreme as the exhaustion of fossil fuels, climate change, ionising radiations, renewable energy sources, energy consumption in Southern countries and the reorganisation of electricity markets. It starts with an article on the precaution principle and it ends with a glance on the future, devoted to education in the field of efficient energy use [fr

  12. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    OpenAIRE

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  13. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  14. 49 CFR 567.7 - Requirements for persons who alter certified vehicles.

    Science.gov (United States)

    2010-10-01

    ... Federal motor vehicle safety, Bumper, and Theft Prevention standards, and (2) Assumes legal responsibility... Vehicle Safety, Bumper and Theft Prevention Standards affected by the alteration and in effect in (month... vehicles. 567.7 Section 567.7 Transportation Other Regulations Relating to Transportation (Continued...

  15. Planning and architectural safety considerations in designing nuclear power plants

    International Nuclear Information System (INIS)

    Konsowa, Ahmed A.

    2009-01-01

    To achieve optimum safety and to avoid possible hazards in nuclear power plants, considering architectural design fundamentals and all operating precautions is mandatory. There are some planning and architectural precautions should be considered to achieve a high quality design and construction of nuclear power plant with optimum safety. This paper highlights predicted hazards like fire, terrorism, aircraft crash attacks, adversaries, intruders, and earthquakes, proposing protective actions against these hazards that vary from preventing danger to evacuating and sheltering people in-place. For instance; using safeguards program to protect against sabotage, theft, and diversion. Also, site and building well design focusing on escape pathways, emergency exits, and evacuation zones, and the safety procedures such as; evacuation exercises and sheltering processes according to different emergency classifications. In addition, this paper mentions some important codes and regulations that control nuclear power plants design, and assessment methods that evaluate probable risks. (author)

  16. Teen Addiction. Current Controversies Series.

    Science.gov (United States)

    Winters, Paul A., Ed.

    The Current Controversies series explores social, political, and economic controversies that dominate the national and international scenes today from a variety of perspectives. Recent surveys have shown that, after years of decline, drug use among teenagers has increased during the 1990s, and that alcohol and tobacco use have remained…

  17. 75 FR 15621 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2010-03-30

    ... indication either in the text of the K.T. Safety Act or its associated legislative history that Congress... why a decision was made to operate these vehicles in this fashion. In short, we are not convinced that...

  18. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  19. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  20. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  1. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  2. Managing Controversies in the Fuzzy Front End

    DEFF Research Database (Denmark)

    Christiansen, John K.; Gasparin, Marta

    2016-01-01

    . The analysis investigates the microprocesses around the controversies that emerge during the fuzzy front end of four products. Five different types of controversies are identified: profit, production, design, brand and customers/market. Each controversy represents a threat, but also an opportunity to search...... for new solutions in the unpredictable non-linear processes. The study uses an ethnographic approach using qualitative data from interviews, company documents, external communication and marketing material, minutes of meetings, informal conversations and observations. The analysis of four FFE processes...... demonstrates how the fuzzy front requires managers to deal with controversies that emerge from many different places and involve both human and non-human actors. Closing the controversies requires managers to take account of the situation, identify the problem that needs to be addressed, and initiate a search...

  3. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Document Server

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  4. Obstetric controversies in thyroidology

    Directory of Open Access Journals (Sweden)

    Ambika Gopalakrishnan Unnikrishnan

    2013-01-01

    Full Text Available It is well known that thyroid disorders commonly affect women. The care of pregnant women affected by thyroid disease is an important clinical challenge for endocrinologists. Hypothyroidism is the commonest problem, and maternal hypothyroxinemia has been linked to adverse feto-maternal outcomes. This article would discuss the controversy regarding first-trimester thyroid hormone deficiency and fetal brain development. Certain obstetric controversies in the management of hyperthyroidism in pregnancy, including the indications of TSH receptor antibody measurements and fetal thyroid status monitoring would also be discussed.

  5. An Organizational Learning Framework for Patient Safety.

    Science.gov (United States)

    Edwards, Marc T

    Despite concerted effort to improve quality and safety, high reliability remains a distant goal. Although this likely reflects the challenge of organizational change, persistent controversy over basic issues suggests that weaknesses in conceptual models may contribute. The essence of operational improvement is organizational learning. This article presents a framework for identifying leverage points for improvement based on organizational learning theory and applies it to an analysis of current practice and controversy. Organizations learn from others, from defects, from measurement, and from mindfulness. These learning modes correspond with contemporary themes of collaboration, no blame for human error, accountability for performance, and managing the unexpected. The collaborative model has dominated improvement efforts. Greater attention to the underdeveloped modes of organizational learning may foster more rapid progress in patient safety by increasing organizational capabilities, strengthening a culture of safety, and fixing more of the process problems that contribute to patient harm.

  6. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  7. Safe but controversial: A study of recent high-visibility spent fuel shipping campaigns

    International Nuclear Information System (INIS)

    Grimm, P.D.; Harmon, L.H.

    1987-01-01

    Since the need to move radioactive materials is at the core of every part of the fuel cycle, it is not surprising that the waste management program also has a critical transportation link. Yet, in spite of a nearly flawless safety record, transportation of spent fuel is an extremely controversial and emotional issue. There are reactions at every political level and pressures from special interest groups across the Nation. In many cases the courts make the final decisions. An example is the DOE program to move spent fuel from Brookhaven National Laboratory which took ten years to accomplish and wound up being decided by the U.S. Supreme Court. Two other DOE shipping campaigns now underway contain all of the same elements of controversy. About 35 - 40 rail shipments are intended to move the damaged Three-Mile Island core to DOE's Idaho facility. In addition, approximately 50 shipments of spent fuel will be made from the VEPCO plant at Surry, Virginia, to Idaho for use in testing above-ground storage methods. This paper traces the background of the campaigns and the controversies generated. Comparisons and contrasts of ''routine'' shipments of recent years with problems of today, including lawsuits to prevent shipment, are given along with implications for the future

  8. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  9. How science makes environmental controversies worse

    International Nuclear Information System (INIS)

    Sarewitz, Daniel

    2004-01-01

    I use the example of the 2000 US Presidential election to show that political controversies with technical underpinnings are not resolved by technical means. Then, drawing from examples such as climate change, genetically modified foods, and nuclear waste disposal, I explore the idea that scientific inquiry is inherently and unavoidably subject to becoming politicized in environmental controversies. I discuss three reasons for this. First, science supplies contesting parties with their own bodies of relevant, legitimated facts about nature, chosen in part because they help make sense of, and are made sensible by, particular interests and normative frameworks. Second, competing disciplinary approaches to understanding the scientific bases of an environmental controversy may be causally tied to competing value-based political or ethical positions. The necessity of looking at nature through a variety of disciplinary lenses brings with it a variety of normative lenses, as well. Third, it follows from the foregoing that scientific uncertainty, which so often occupies a central place in environmental controversies, can be understood not as a lack of scientific understanding but as the lack of coherence among competing scientific understandings, amplified by the various political, cultural, and institutional contexts within which science is carried out. In light of these observations, I briefly explore the problem of why some types of political controversies become 'scientized' and others do not, and conclude that the value bases of disputes underlying environmental controversies must be fully articulated and adjudicated through political means before science can play an effective role in resolving environmental problems

  10. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  11. Controversies in water management: Frames and mental models

    International Nuclear Information System (INIS)

    Kolkman, M.J.; Veen, A. van der; Geurts, P.A.T.M.

    2007-01-01

    Controversies in decision and policy-making processes can be analysed using frame reflection and mental model mapping techniques. The purpose of the method presented in this paper is to improve the quality of the information and interpretations available to decision makers, by surfacing and juxtaposing the different frames of decision makers, experts, and special interests groups. The research provides a new method to analyse frames. It defines a frame to consist of perspectives and a mental model, which are in close interaction (through second order learning processes). The mental model acts like a 'filter' through which the problem situation is observed. Five major perspective types guide the construction of meaning out of the information delivered by the mental model, and determine what actors see as their interests. The perspective types are related to an actor's institutional and personal position in the decision making process. The method was applied to a case, in order to test its viability. The case concerns the decision making process and environmental impact assessment procedure for the improvement of dike ring 53 in the Netherlands, which was initiated by the Dutch 'Flood Defences Act 1996'. In this specific case the perspectives and mental models of stakeholders were elicited to explain controversies. The case was analysed with regard to the conflicts emerging between stakeholders, on an individual level. The influence of institutional embedding of individuals on the use of information and the construction of meaning, and the limits of a participatory approach were analysed within the details of controversies that emerged during the case analysis. Complicating factor appeared to be the interaction between national dike safety norms (short term) and local water management problems (long term). Revealed controversies mainly concerned disputes between an organisational and a technical perspective. But also disputes on distribution of responsibilities

  12. The nuclear controversy

    International Nuclear Information System (INIS)

    Walske, C.; Dobkin, R.A.

    1984-01-01

    The article deals with the nuclear controversy, especially in the United States. To a certain extent the nuclear debate has become heavily politicised. Public opinion and anti-nuclear groups are mentioned as well as nuclear disarmament

  13. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  14. The Reviewing of Controversial Juvenile Books: A Study.

    Science.gov (United States)

    Crow, Sherry R.

    1986-01-01

    Describes a study which examined reviewers' treatment of controversial juvenile books in Booklist, Bulletin of Center for Children's Books, Horn Book, and School Library Journal. The total number of controversial books reviewed by each journal, promptness of reviews, and extent of discussion of controversial features are discussed. (MBR)

  15. Current Therapeutic Cannabis Controversies and Clinical Trial Design Issues

    Science.gov (United States)

    Russo, Ethan B.

    2016-01-01

    This overview covers a wide range of cannabis topics, initially examining issues in dispensaries and self-administration, plus regulatory requirements for production of cannabis-based medicines, particularly the Food and Drug Administration “Botanical Guidance.” The remainder pertains to various cannabis controversies that certainly require closer examination if the scientific, consumer, and governmental stakeholders are ever to reach consensus on safety issues, specifically: whether botanical cannabis displays herbal synergy of its components, pharmacokinetics of cannabis and dose titration, whether cannabis medicines produce cyclo-oxygenase inhibition, cannabis-drug interactions, and cytochrome P450 issues, whether cannabis randomized clinical trials are properly blinded, combatting the placebo effect in those trials via new approaches, the drug abuse liability (DAL) of cannabis-based medicines and their regulatory scheduling, their effects on cognitive function and psychiatric sequelae, immunological effects, cannabis and driving safety, youth usage, issues related to cannabis smoking and vaporization, cannabis concentrates and vape-pens, and laboratory analysis for contamination with bacteria and heavy metals. Finally, the issue of pesticide usage on cannabis crops is addressed. New and disturbing data on pesticide residues in legal cannabis products in Washington State are presented with the observation of an 84.6% contamination rate including potentially neurotoxic and carcinogenic agents. With ongoing developments in legalization of cannabis in medical and recreational settings, numerous scientific, safety, and public health issues remain. PMID:27683558

  16. Current Therapeutic Cannabis Controversies and Clinical Trial Design Issues.

    Directory of Open Access Journals (Sweden)

    Ethan Budd Russo

    2016-09-01

    Full Text Available This overview covers a wide range of cannabis topics, initially examining issue in dispensaries and self-administration, plus regulatory requirement for production of cannabis-based medicines, particularly the Food and Drug Administration Botanical Guidance. The remainder pertains to various cannabis controversies that certainly require closer examination if the scientific, consumer and governmental stakeholders are ever to reach consensus on safety issues, specifically: whether botanical cannabis displays herbal synergy of its components, pharmacokinetics of cannabis and dose titration, whether cannabis medicines produce cyclo-oxygenase inhibition, cannabis-drug interactions and cytochrome P450 issues, whether cannabis randomized clinical trials are properly blinded, combatting the placebo effect in those trials via new approaches, the drug abuse liability of cannabis-based medicines and their regulatory scheduling, their effects on cognitive function and psychiatric sequelae, immunological effects, cannabis and driving safety, youth usage, issues related to cannabis smoking and vaporization, cannabis concentrates and vape-pens, and laboratory analysis for contamination with bacteria and heavy metals. Finally, the issue of pesticide usage on cannabis crops is addressed. New and disturbing data on pesticide residues in legal cannabis products in Washington State are presented with the observation of an 84.6% contamination rate including potentially neurotoxic and carcinogenic agents. With ongoing developments in legalization of cannabis in medical and recreational settings, numerous scientific, safety and public health issues remain.

  17. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  18. Controversies Concerning the Canadian Not Criminally Responsible Reform Act.

    Science.gov (United States)

    Lacroix, Robert; O'Shaughnessy, Roy; McNiel, Dale E; Binder, Renée L

    2017-03-01

    In Canada, individuals found not criminally responsible on account of mental disorder are subject to the disposition recommendations of the Provincial or Territorial Review Board of the jurisdiction where the offense was committed. Bill C-14, known as "The Not Criminally Responsible Reform Act" made changes to the postverdict disposition process of these individuals. This legislation was consistent with a broader "tough-on-crime" agenda of the previous federal government. The legislative changes codify that Review Boards take public safety as the "paramount consideration" in making their recommendations. The legislation also creates a new "high-risk" category for certain offenders and imposes limitations on their liberty. Further, Bill C-14 seeks to enhance victim involvement in the disposition process. The passage of this legislation has generated significant controversy in the medical and legal fields. Critics have stated that there is an absence of empirical evidence on which to base the amendments, that the legislation was an overreaction to high-profile cases, and that Bill C-14 is in questionable compliance with the Canadian Charter of Rights and Freedoms. In this review, we explore the potential catalysts involved in the creation of Bill C-14, the controversy surrounding the legislation, and the potential future impact on practicing forensic psychiatrists and on the forensic mental health system in Canada. © 2017 American Academy of Psychiatry and the Law.

  19. Sexual Orientation, Controversy, and Science.

    Science.gov (United States)

    Bailey, J Michael; Vasey, Paul L; Diamond, Lisa M; Breedlove, S Marc; Vilain, Eric; Epprecht, Marc

    2016-09-01

    SummaryOngoing political controversies around the world exemplify a long-standing and widespread preoccupation with the acceptability of homosexuality. Nonheterosexual people have seen dramatic surges both in their rights and in positive public opinion in many Western countries. In contrast, in much of Africa, the Middle East, the Caribbean, Oceania, and parts of Asia, homosexual behavior remains illegal and severely punishable, with some countries retaining the death penalty for it. Political controversies about sexual orientation have often overlapped with scientific controversies. That is, participants on both sides of the sociopolitical debates have tended to believe that scientific findings-and scientific truths-about sexual orientation matter a great deal in making political decisions. The most contentious scientific issues have concerned the causes of sexual orientation-that is, why are some people heterosexual, others bisexual, and others homosexual? The actual relevance of these issues to social, political, and ethical decisions is often poorly justified, however. © The Author(s) 2016.

  20. Controversies in hormone replacement therapy

    Directory of Open Access Journals (Sweden)

    A. Baziad

    2001-09-01

    Full Text Available Deficiency of estrogen hormone will result in either long-term or short-term health problems which may reduce the quality of life. There are numerous methods by which the quality of female life can be achieved. Since the problems occuring are due to the deficiency of estrogen hormone, the appropriate method to tackle the problem is by administration of estrogen hormone. The administration of hormone replacement therapy (HRT with estrogen may eliminate climacteric complaints, prevent osteoporosis, coronary heart disease, dementia, and colon cancer. Although HRT has a great deal of advantage, its use is still low and may result in controversies. These controversies are due to fact that both doctor and patient still hold on to the old, outmoded views which are not supported by numerous studies. Currently, the use of HRT is not only based on experience, or temporary observation, but more on evidence based medicine. (Med J Indones 2001; 10: 182-6Keywords: controversies, HRT

  1. Long-term Safety of Pregnancy Following Breast Cancer According to Estrogen Receptor Status

    DEFF Research Database (Denmark)

    Lambertini, Matteo; Kroman, Niels; Ameye, Lieveke

    2018-01-01

    Safety of pregnancy in women with history of estrogen receptor (ER)-positive breast cancer remains controversial. In this multicenter case-control study, 333 patients with pregnancy after breast cancer were matched (1:3) to 874 nonpregnant patients of similar characteristics, adjusting for guaran......Safety of pregnancy in women with history of estrogen receptor (ER)-positive breast cancer remains controversial. In this multicenter case-control study, 333 patients with pregnancy after breast cancer were matched (1:3) to 874 nonpregnant patients of similar characteristics, adjusting...

  2. USA perspectives. Safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Dicus, G.J.

    1999-01-01

    In contrast to the 103 licensed nuclear power plants in the United States, there are about 157,000 licenses that authorize the use of radioactive materials subject to US Atomic Energy Act. as amended. Each year the NRC receives about 200 reports of lost, stolen or abandoned radioactive sources and devices. The NRC has established a programme to review and analyze reports and other information on losses, thefts, abandonments, and discoveries of radioactive sources that helped to identify and characterize the problem with safety and security of radioactive sources in devices used under the general license programme. In summary, a large number of radioactive sources in use in the USA have a very good safety record. When used properly by trained personnel with effective regulatory oversight, the many uses of radioactive sources are safe and provide a net benefit to society. If problems occur such as overexposures or contamination of property, it is essential that hey are promptly reported to the regulatory authority. If necessary appropriate emergency response measures can be taken, and the problems analysed. In that way, effective risk-informed regulatory measures can be activated to assure the continued safety and security of radioactive sources

  3. Neuroimaging of nonaccidental head trauma: pitfalls and controversies

    Energy Technology Data Exchange (ETDEWEB)

    Fernando, Sujan [University of Missouri-Kansas School of Medicine, Department of Medicine, Kansas City, MO (United States); Obaldo, Ruby E. [The University of Kansas Medical Center, Department of Radiology, Kansas City, MO (United States); Walsh, Irene R. [The University of Missouri-Kansas City, Children' s Mercy Hospitals and Clinics, Department of Emergency Medicine, Kansas City, MO (United States); Lowe, Lisa H. [The University of Missouri-Kansas City, Children' s Mercy Hospitals and Clinics, Department of Radiology, Kansas City, MO (United States)

    2008-08-15

    Although certain neuroimaging appearances are highly suggestive of abuse, radiological findings are often nonspecific. The objective of this review is to discuss pitfalls, controversies, and mimics occurring in neuroimaging of nonaccidental head trauma in order to allow the reader to establish an increased level of comfort in distinguishing between nonaccidental and accidental head trauma. Specific topics discussed include risk factors, general biomechanics and imaging strategies in nonaccidental head trauma, followed by the characteristics of skull fractures, normal prominent tentorium and falx versus subdural hematoma, birth trauma versus nonaccidental head trauma, hyperacute versus acute on chronic subdural hematomas, expanded subarachnoid space versus subdural hemorrhage, controversy regarding subdural hematomas associated with benign enlarged subarachnoid spaces, controversy regarding hypoxia as a cause of subdural hematoma and/or retinal hemorrhages without trauma, controversy regarding the significance of retinal hemorrhages related to nonaccidental head trauma, controversy regarding the significance of subdural hematomas in general, and pitfalls of glutaric aciduria type 1 and hemophagocytic lymphohistiocytosis mimicking nonaccidental head trauma. (orig.)

  4. KNOW NUKES: a model for teaching controversial issues

    International Nuclear Information System (INIS)

    Thomashow, M.S.

    1986-01-01

    This dissertation articulates elements of an educational strategy derived from the experience of the KNOW NUKES program, a teacher training project designed to introduce the nuclear power controversy in the high school classroom. This strategy can be used as means of furthering the effectiveness of controversial issues education, not only in the area of nuclear power, but in teaching about any environmental issue. This is specifically achieved by (2) placing the KNOW NUKES institute in the broader context of controversial issues education; (2) describing in detail KNOW NUKES project planning; (3) reviewing the structure and content of the various teaching techniques and materials that have been developed for the KNOW NUKES institute; (4) utilizing a particular technique developed by the institute that reveals varying perspectives on controversial issues, in this case, an instrumental for decoding the controversial issues that are explicit and implicit in corporate image advertisements; and (5) qualitatively evaluating the practical implementation of the KNOW NUKES model

  5. Neuroimaging of nonaccidental head trauma: pitfalls and controversies

    International Nuclear Information System (INIS)

    Fernando, Sujan; Obaldo, Ruby E.; Walsh, Irene R.; Lowe, Lisa H.

    2008-01-01

    Although certain neuroimaging appearances are highly suggestive of abuse, radiological findings are often nonspecific. The objective of this review is to discuss pitfalls, controversies, and mimics occurring in neuroimaging of nonaccidental head trauma in order to allow the reader to establish an increased level of comfort in distinguishing between nonaccidental and accidental head trauma. Specific topics discussed include risk factors, general biomechanics and imaging strategies in nonaccidental head trauma, followed by the characteristics of skull fractures, normal prominent tentorium and falx versus subdural hematoma, birth trauma versus nonaccidental head trauma, hyperacute versus acute on chronic subdural hematomas, expanded subarachnoid space versus subdural hemorrhage, controversy regarding subdural hematomas associated with benign enlarged subarachnoid spaces, controversy regarding hypoxia as a cause of subdural hematoma and/or retinal hemorrhages without trauma, controversy regarding the significance of retinal hemorrhages related to nonaccidental head trauma, controversy regarding the significance of subdural hematomas in general, and pitfalls of glutaric aciduria type 1 and hemophagocytic lymphohistiocytosis mimicking nonaccidental head trauma. (orig.)

  6. Understanding Controversies in Urban Climate Change Adaptation

    DEFF Research Database (Denmark)

    Baron, Nina; Petersen, Lars Kjerulf

    2015-01-01

    This article explores the controversies that exist in urban climate change adaptation and how these controversies influence the role of homeowners in urban adaptation planning. A concrete SUDS project in a housing cooperative in Copenhagen has been used as a case study thereby investigating the m...

  7. Investigation of natural gas theft by magnetic remanence mapping.

    Science.gov (United States)

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  8. Penetrating abdominal injuries: management controversies

    Science.gov (United States)

    Butt, Muhammad U; Zacharias, Nikolaos; Velmahos, George C

    2009-01-01

    Penetrating abdominal injuries have been traditionally managed by routine laparotomy. New understanding of trajectories, potential for organ injury, and correlation with advanced radiographic imaging has allowed a shift towards non-operative management of appropriate cases. Although a selective approach has been established for stab wounds, the management of abdominal gunshot wounds remains a matter of controversy. In this chapter we describe the rationale and methodology of selecting patients for non-operative management. We also discuss additional controversial issues, as related to antibiotic prophylaxis, management of asymptomatic thoracoabdominal injuries, and the use of colostomy vs. primary repair for colon injuries. PMID:19374761

  9. Penetrating abdominal injuries: management controversies

    Directory of Open Access Journals (Sweden)

    Velmahos George C

    2009-04-01

    Full Text Available Abstract Penetrating abdominal injuries have been traditionally managed by routine laparotomy. New understanding of trajectories, potential for organ injury, and correlation with advanced radiographic imaging has allowed a shift towards non-operative management of appropriate cases. Although a selective approach has been established for stab wounds, the management of abdominal gunshot wounds remains a matter of controversy. In this chapter we describe the rationale and methodology of selecting patients for non-operative management. We also discuss additional controversial issues, as related to antibiotic prophylaxis, management of asymptomatic thoracoabdominal injuries, and the use of colostomy vs. primary repair for colon injuries.

  10. Controversies in Persistent (Chronic) Lyme Disease

    Science.gov (United States)

    2016-01-01

    The Centers for Disease Control and Prevention estimates that more than 300 000 new cases of Lyme disease occur each year in the United States and that 10% to 20% of these patients will remain symptomatic despite receiving appropriate antibiotic therapy. Many elements of the disease are poorly understood and have generated considerable controversy. This paper discusses the medical controversies related to posttreatment manifestations and their potential impact on infusion nurses. PMID:27755213

  11. School Safety Concerns All Students.

    Science.gov (United States)

    Henderson, Megan

    1999-01-01

    Suggests that school safety is an issue that concerns all students. Discusses how the staff of the Rockwood South (Missouri) "RAMpage" covered the shootings at Columbine High School in a 14-page issue and in follow-up issues. Suggests that the student newspaper covered the controversial topic in an appropriate, tasteful manner. (RS)

  12. Analyzing the Impact of Theft and Vandalism in Relation to the Sustainability of Renewable Energy Development Projects in Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Eugene C.X. Ikejemba

    2018-03-01

    Full Text Available Theft and vandalism impede the sustainability of renewable energy (RE development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances on implemented projects. We utilize a consumer clinic approach to generate data that represents the situation. We define our instigators practically (Government Inequality, Crime to Survive, Sabotage and demarcate the actions of the offenders into 4 types: (1 vandalization of small RE projects (SPv; (2 theft of RE infrastructures from small RE projects (SPt; (3 vandalization of large RE projects (LPv; and (4 theft of RE infrastructures from large RE projects (LPt. To counteract these actions we define three types of security interference: human, societal and technical. We model the career of an RE criminal as a multi-stage Markov model. In every stage the offender can commit any of the offences SPv, SPt, LPv, LPt, or go to rest. Transition probabilities are our means to reflect offender maturity. Crucial to our model is that they are affected by the level of interference installed at the project site. Calibrated on a dialogue with 144 respondents, our Markov model directs us to adequate interferences per project. Specifically, for large projects technical and human security are the most effective, whereas, for small projects we recommend societal security. The paper introduces a mathematical model of the career of a RE-offender including the influence of security interference and calibrates the parameters through an ethnographic approach.

  13. Controversies in Obesity Treatment

    Directory of Open Access Journals (Sweden)

    Majid Karandish

    2015-06-01

    Full Text Available The markedly high prevalence of obesity contributes to the increased incidence of chronic diseases, such as diabetes, hypertension, sleep apnea, and heart disease. Because of high prevalence of obesity in almost all countries, it has been the focus of many researches throughout the world during the recent decades. Along with increasing researches, new concepts and controversies have been emerged. The existing controversies on the topic are so deep that some researches argue on absolutely philosophical questions such as “Is obesity a disease?” or “Is it correct to treat obesity?” These questions are based on a few theories and real data that explain obesity as a biological adaptation and also the final results of weight loss programs. Many people attempt to lose weight by diet therapy, physical activity and lifestyle modifications. Importantly, weight loss strategies in the long term are ineffective and may have unintended consequences including decreasing energy expenditure, complicated appetite control, eating disorders, reducing self-esteem, increasing the plasma and tissue levels of persistent organic pollutants that promote metabolic complications, and consequently, higher risk of repeated cycles of weight loss and weight regain. In this review, major paradoxes and controversies on obesity including classic obesity paradox, pre-obesity; fat-but-fit theory, and healthy obesity are explained. In addition, the relevant strategies like “Health at Every Size” that emphasize on promotion of global health behaviors rather than weight loss programs are explained.

  14. The words of controversy about climate change

    International Nuclear Information System (INIS)

    Chetouani, Lamria

    2007-01-01

    The author analyses the rhetorical staging of controversies which occur in France about climate change, and more particularly about the greenhouse effect. In a first part, she makes a distinction between four registers of controversy: on responsibilities, on consequences and extent of the phenomenon, on solutions, and on spatio-temporal projections of the greenhouse effect. She shows that debates are structured by an opposition between optimism and pessimism. In a second part, based on a lexicological analysis, she highlights the important oppositions between scientific speeches and political speeches, independent speeches and technocratic speeches, and so on, with unexpected aspects. It appears that controversy goes largely beyond the scientific debate, and incorporates crossed interventions of economic, political and social concern

  15. Analyzing the impact of theft and vandalism in relation to the sustainability of renewable energy development projects in Sub-Saharan Africa

    NARCIS (Netherlands)

    Ikejemba, Eugene C.X.; Schuur, Peter C.

    2018-01-01

    Theft and vandalism impede the sustainability of renewable energy (RE) development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances

  16. On the history of the nuclear controversy

    International Nuclear Information System (INIS)

    Muench, E.

    1979-01-01

    For the past ten years or so the introduction and expansion of nuclear power in a number of industrialized countries of the Western world has been accompanied by a sometimes vehement controversy. This controversy has taken many forms and, in almost all countries, has had distinct effects on the utilization of nuclear power for energy supply purposes. It has given rise to considerable delays in the completion of nuclear installations and, in one country, has even resulted in a rejection of nuclear power altogether. The different facets of the picture, i.e. public action groups opposing nuclear power, the nuclear controversy and scientists, political activities, appeals to courts of law and actions bordering on illegality, are described chronologically and their impacts are analyzed. (orig.) [de

  17. Covering Conflict and Controversy: Measuring Balance, Fairness, Defamation.

    Science.gov (United States)

    Simon, Todd F.; And Others

    1989-01-01

    Measures balance, fairness, and defamation in local stories containing controversy and covering law enforcement, education, local government, and business. Finds that most stories lack balance and that the opposing side of the controversy was not contacted in 28 percent of the instances. (RS)

  18. 49 CFR 591.2 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.2 Purpose. The purpose of this part is to ensure that motor vehicles and motor vehicle equipment permanently imported into the United States conform with theft...

  19. Controversies in faith and health care.

    Science.gov (United States)

    Tomkins, Andrew; Duff, Jean; Fitzgibbon, Atallah; Karam, Azza; Mills, Edward J; Munnings, Keith; Smith, Sally; Seshadri, Shreelata Rao; Steinberg, Avraham; Vitillo, Robert; Yugi, Philemon

    2015-10-31

    Differences in religious faith-based viewpoints (controversies) on the sanctity of human life, acceptable behaviour, health-care technologies and health-care services contribute to the widespread variations in health care worldwide. Faith-linked controversies include family planning, child protection (especially child marriage, female genital mutilation, and immunisation), stigma and harm reduction, violence against women, sexual and reproductive health and HIV, gender, end-of-life issues, and faith activities including prayer. Buddhism, Christianity, Hinduism, Islam, Judaism, and traditional beliefs have similarities and differences in their viewpoints. Improved understanding by health-care providers of the heterogeneity of viewpoints, both within and between faiths, and their effect on health care is important for clinical medicine, public-health programmes, and health-care policy. Increased appreciation in faith leaders of the effect of their teachings on health care is also crucial. This Series paper outlines some faith-related controversies, describes how they influence health-care provision and uptake, and identifies opportunities for research and increased interaction between faith leaders and health-care providers to improve health care. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Danish Cartoon Crisis/Controversy

    DEFF Research Database (Denmark)

    Hervik, Peter

    2017-01-01

    The Danish Cartoon Crisis Controversy is one of several terms that refer to the turmoil that associates with the Danish newspaper Morgenavisen Jyllands-Posten’s publication of 12 cartoons on 30 September 2005. “The Muhammad Cartoon Crisis” is an alternative heading used for the violent global rea...

  1. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making t...

  2. The IAEA code of conduct on the safety of radiation sources and the security of radioactive materials. A step forwards or backwards?

    International Nuclear Information System (INIS)

    Boustany, K.

    2001-01-01

    About the finalization of the Code of Conduct on the Safety and Security of radioactive Sources, it appeared that two distinct but interrelated subject areas have been identified: the prevention of accidents involving radiation sources and the prevention of theft or any other unauthorized use of radioactive materials. What analysis reveals is rather that there are gaps in both the content of the Code and the processes relating to it. Nevertheless, new standards have been introduced as a result of this exercise and have thus, as an enactment of what constitutes appropriate behaviour in the field of the safety and security of radioactive sources, emerged into the arena of international relations. (N.C.)

  3. 49 CFR 591.4 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... (other than a damage settlement in connection with a recovered theft vehicle unless such motor vehicle..., DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.4 Definitions. All terms used in this part that are defined...

  4. Streamlining antibiotic therapy with procalcitonin protocols: consensus and controversies.

    Science.gov (United States)

    Haubitz, Sebastian; Mueller, Beat; Schuetz, Philipp

    2013-04-01

    Accumulating evidence supports procalcitonin (PCT) as an accurate surrogate biomarker for likelihood and severity of bacterial infections. In community-acquired pneumonia and other respiratory infections, PCT-guided antibiotic therapy algorithms resulted in reduced antibiotic exposure while maintaining a similar or even better level of safety compared with standard care. Reductions in antibiotic use translate into lower treatment costs, decreased risk of side effects and decreased bacterial multiresistance. This is especially important, as acute respiratory infections represent the most frequent reason for antibiotic prescriptions worldwide. Still, there is some controversy about the benefits of PCT measurement in sepsis patients in the intensive care unit and for nonrespiratory infections. Highly sensitive PCT assays are readily available in many hospitals today, and point-of-care assays with high enough sensitivity for antibiotic guidance are expected to be available soon. Herein, the authors provide an overview of recent studies evaluating PCT in different clinical situations and an outlook of currently enrolling or upcoming interventional trials.

  5. Nuclear controversy with many undercurrents

    International Nuclear Information System (INIS)

    Lingjaerde, R.O.

    1979-01-01

    The president of the Norwegian Atomic Energy Society presents, in the form of an interview his opinions on the nature of the nuclear controversy in Norway. He is very critical of the emotional and uninformed nature of much of the criticism of nuclear power, and emphasises that nuclear power must be regarded as an alternative to other, less favourable forms of thermal power, as a supplement to hydroelectric power, or to electricity rationing. While a society using less energy is quite feasible, it would hardly be acceptable. The waste disposal controversy is quite artifical, as perfectly safe methods of disposal are available. Finally he regrets that it is the conclusions only in the Nuclear Power Commission's report which have attracted attention, and mainly the comments of the dissident minority. (JIW)

  6. Why Map Issues? On Controversy Analysis as a Digital Method.

    Science.gov (United States)

    Marres, Noortje

    2015-09-01

    This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital "move beyond impartiality." I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter.

  7. Mapping Controversies with Social Media: The Case for Symmetry

    Directory of Open Access Journals (Sweden)

    Noortje Marres

    2015-09-01

    Full Text Available This article assesses the usefulness for social media research of controversy analysis, an approach developed in Science and Technology Studies (STS and related fields. We propose that this approach can help to address an important methodological problem in social media research, namely, the tension between social media as resource for social research and as an empirical object in its own right. Initially developed for analyzing interactions between science, technology, and society, controversy analysis has in recent decades been implemented digitally to study public debates and issues dynamics online. A key feature of controversy analysis as a digital method, we argue, is that it enables a symmetrical approach to the study of media-technological dynamics and issue dynamics. It allows us to pay equal attention to the ways in which a digital platform like Twitter mediates public issues, and to how controversies mediate “social media” as an object of public attention. To sketch the contours of such a symmetrical approach, the article discusses examples from a recent social media research project in which we mapped issues of “privacy” and “surveillance” in the wake of the National Security Agency (NSA data leak by Edward Snowden in June 2013. Through a discussion of social media research practice, we then outline a symmetrical approach to analyzing controversy with social media. We conclude that the digital implementation of such an approach requires further exchanges between social media researchers and controversy analysts.

  8. The chilling effect: how do researchers react to controversy?

    Directory of Open Access Journals (Sweden)

    Joanna Kempner

    2008-11-01

    Full Text Available BACKGROUND: Can political controversy have a "chilling effect" on the production of new science? This is a timely concern, given how often American politicians are accused of undermining science for political purposes. Yet little is known about how scientists react to these kinds of controversies. METHODS AND FINDINGS: Drawing on interview (n = 30 and survey data (n = 82, this study examines the reactions of scientists whose National Institutes of Health (NIH-funded grants were implicated in a highly publicized political controversy. Critics charged that these grants were "a waste of taxpayer money." The NIH defended each grant and no funding was rescinded. Nevertheless, this study finds that many of the scientists whose grants were criticized now engage in self-censorship. About half of the sample said that they now remove potentially controversial words from their grant and a quarter reported eliminating entire topics from their research agendas. Four researchers reportedly chose to move into more secure positions entirely, either outside academia or in jobs that guaranteed salaries. About 10% of the group reported that this controversy strengthened their commitment to complete their research and disseminate it widely. CONCLUSIONS: These findings provide evidence that political controversies can shape what scientists choose to study. Debates about the politics of science usually focus on the direct suppression, distortion, and manipulation of scientific results. This study suggests that scholars must also examine how scientists may self-censor in response to political events.

  9. The Chilling Effect: How Do Researchers React to Controversy?

    Science.gov (United States)

    Kempner, Joanna

    2008-01-01

    Background Can political controversy have a “chilling effect” on the production of new science? This is a timely concern, given how often American politicians are accused of undermining science for political purposes. Yet little is known about how scientists react to these kinds of controversies. Methods and Findings Drawing on interview (n = 30) and survey data (n = 82), this study examines the reactions of scientists whose National Institutes of Health (NIH)-funded grants were implicated in a highly publicized political controversy. Critics charged that these grants were “a waste of taxpayer money.” The NIH defended each grant and no funding was rescinded. Nevertheless, this study finds that many of the scientists whose grants were criticized now engage in self-censorship. About half of the sample said that they now remove potentially controversial words from their grant and a quarter reported eliminating entire topics from their research agendas. Four researchers reportedly chose to move into more secure positions entirely, either outside academia or in jobs that guaranteed salaries. About 10% of the group reported that this controversy strengthened their commitment to complete their research and disseminate it widely. Conclusions These findings provide evidence that political controversies can shape what scientists choose to study. Debates about the politics of science usually focus on the direct suppression, distortion, and manipulation of scientific results. This study suggests that scholars must also examine how scientists may self-censor in response to political events. PMID:19018657

  10. Studying a Controversy amongst Pashtuns of Torghar, Balochistan, Pakistan

    Directory of Open Access Journals (Sweden)

    Luc Bellon

    2007-10-01

    Full Text Available Much has been written about the political structures of tribal groups. The present article looks at political dynamics amongst Pashtuns of Balochistan, through the prism of a controversy. The sociological interest of studying the arguments used during a controversy has been underlined by Boltanski and Thevenot. A controversy finishes by the establishment, through consensus, of a common agreement upon accepted norms, determined limits, redefinition of social values, etc. The advantage of focusing on the argumentation itself is to avoid taking the agreement as a pre-established social truth, a reference that concerned people would reluctantly challenge. To study a controversy is to study the social realities in the making, to study the archaeology of collective consensus, to reinstate history, contingencies and individual plurality within the social dynamics and to take seriously their performative actions alongside other social determinisms. This article shows that to study controversy is a way not only to set light on political dynamics and structures, but also to discuss the impact and definition of concepts such as segmentarity, equality, rights, interests, and their relevance within the Pashtun society which was observed.

  11. 78 FR 53171 - Agency Information Collection Activities: Submission to OMB for Reinstatement, With Change, of a...

    Science.gov (United States)

    2013-08-28

    ... risks to FCU members or to an FCU's safety and soundness. Each FCU also must develop an Identity Theft... requires each FCU to establish reasonable policies and procedures to address the risk of identity theft... (Program). In developing the Program, financial institutions and creditors are required to consider the...

  12. Controversy and consensus nuclear beta decay 1911-1934

    CERN Document Server

    Jensen, Carsten

    2000-01-01

    In 1920s, a long-lasting controversy on the interpretation of nuclear beta spectrum arose between Lise Meitner and Charles Drummond Ellis. This controversy, and the reactions from the contending parties when it was settled, reflect clearly the difference between the scientific communities in Berlin and Cambridge at that time. The Meitner-Ellis controversy ended in 1929, and it left an anomaly that attracted leading theoretical physicists. A new dispute, this time between Niels Bohr and Wolfgang Pauli, broke out. It concerned the explanation of the continuity of the primary beta particles and dominated the discussions for the next five years. Pauli argued for a new particle, and Bohr for a new theory; both suggestions were radical steps, but they reflected two different ways of doing physics.

  13. Controversial Science and the Media

    Science.gov (United States)

    Riordon, James

    2012-03-01

    The possibility that the OPERA collaboration has detected superluminal neutrinos was among the most controversial topics in physics news in decades, and one of the most widely covered stories in all of science in 2011. Word of the research initially reached journalists and the public prior to publication in peer-reviewed journals. Understandably, many physicists are concerned that the significance of controversial science may be exaggerated or distorted when news organizations report on science at such an early stage. I will offer an overview of the ways the story was promoted by the media relations personnel, and outline the rationales that motivate media relations efforts along with the associated benefits and drawbacks that can result. Finally, I will examine the accuracy and completeness of the superluminal neutrino news stories that ultimately were made available to the general public.

  14. Short-term initiatives for enhancing cyber-safety within South African schools

    Directory of Open Access Journals (Sweden)

    Elmarie Kritzinger

    2016-07-01

    Full Text Available The rate of technological development across the globe is dramatic. The decreasing cost and increasing availability of ICT devices means that its users are no longer exclusively industry or government employees – they are now also home users. Home users integrate ICT in their daily lives for education, socialising and information gathering. However, using ICT is associated with risks and threats, such as identity theft and phishing scams. Most home users of ICT do not have the necessary information technology and Internet skills to protect themselves and their information. School learners, in particular, are not sufficiently educated on how to use technological devices safely, especially in developing countries such as South Africa. The national school curriculum in South Africa currently does not make provision for cyber-safety education, and the availability of supporting material and training for ICT teachers in South Africa is limited, resulting in a lack of knowledge and skills regarding cyber-safety. The research in hand focuses on the situation concerning cyber-safety awareness in schools and has adopted a short-term approach towards cyber-safety among teachers and school learners in South Africa until a formal long-term national approach has been implemented. This study takes a quantitative approach to investigating the current options of teachers to enhance cyber-safety among learners in their schools. The research proposes that short-term initiatives (i.e. posters can increase learners’ awareness of cyber-safety until formal cyber-safety awareness methods have been introduced.

  15. Comprehension of Relations among Controversial Texts: Effects of External Strategy Use

    Science.gov (United States)

    Kobayashi, Keiichi

    2009-01-01

    This study examined the effects of external strategy use on the comprehension of relations among controversial texts. About 80 undergraduates read six controversial texts for the purpose of either finding intertextual relations or forming their opinion about the controversial issue. Half of them were permitted to use external strategies, the other…

  16. The impact of green stormwater infrastructure installation on surrounding health and safety.

    Science.gov (United States)

    Kondo, Michelle C; Low, Sarah C; Henning, Jason; Branas, Charles C

    2015-03-01

    We investigated the health and safety effects of urban green stormwater infrastructure (GSI) installments. We conducted a difference-in-differences analysis of the effects of GSI installments on health (e.g., blood pressure, cholesterol and stress levels) and safety (e.g., felonies, nuisance and property crimes, narcotics crimes) outcomes from 2000 to 2012 in Philadelphia, Pennsylvania. We used mixed-effects regression models to compare differences in pre- and posttreatment measures of outcomes for treatment sites (n=52) and randomly chosen, matched control sites (n=186) within multiple geographic extents surrounding GSI sites. Regression-adjusted models showed consistent and statistically significant reductions in narcotics possession (18%-27% less) within 16th-mile, quarter-mile, half-mile (P<.001), and eighth-mile (P<.01) distances from treatment sites and at the census tract level (P<.01). Narcotics manufacture and burglaries were also significantly reduced at multiple scales. Nonsignificant reductions in homicides, assaults, thefts, public drunkenness, and narcotics sales were associated with GSI installation in at least 1 geographic extent. Health and safety considerations should be included in future assessments of GSI programs. Subsequent studies should assess mechanisms of this association.

  17. Chemical Safety Alert: Anhydrous Ammonia Theft

    Science.gov (United States)

    This extremely hazardous substance is largely used as an agricultural fertilizer, but is also a key ingredient in the illegal production of methamphetamines. It is stored as a liquid under pressure, but becomes a toxic gas when released.

  18. Desecuritization as Displacement of Controversy

    DEFF Research Database (Denmark)

    Jacobsen, Marc; Strandsbjerg, Jeppe

    2017-01-01

    By signing the Ilulissat Declaration of May 2008, the five littoral states of the Arctic Ocean pre-emptively desecuritized potential geopolitical controversies in the Arctic Ocean by confirming that international law and geo-science are the defining factors underlying the future delimitation...

  19. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  20. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Directory of Open Access Journals (Sweden)

    Manabi Paul

    Full Text Available Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  1. 'Mysticism' in quantum mechanics: the forgotten controversy

    International Nuclear Information System (INIS)

    Marin, Juan Miguel

    2009-01-01

    This paper argues that a European controversy over a 'mystical' hypothesis, one assigning the mind a role to play at the material level of reality, shaped much of the debate over the interpretation of the quantum equations. It traces back the controversy to the past two decades, beginning in the late 1920s-birth of quantum theory-and concluding with Erwin Schroedinger's lectures published as 'Mind and Matter'. Becoming aware of the issues at stake can help us understand the historical, philosophical and cultural background from which today's physics emerged

  2. COOPERATIVE CONTROVERSY TECHNIQUE TO IMPROVE STUDENTS’ MOTIVATION IN ENGLISH DEBATE

    Directory of Open Access Journals (Sweden)

    Suciati Suciati

    2016-03-01

    Full Text Available Many students do not like English debate. They argue that in the debate, they should apply four skills in English and should have appropriate matter, manner, and method. One of the reasons which make them do not like the debate is their lack of motivation. To solve this problem, teacher or lecturer should apply the appropriate technique in the teaching-learning process. Cooperative controversy technique is different with the traditional debate. In this technique, debaters change positions and try to reach a consensus at the end of the debate. By doing it before practicing the real English debate format, the students will get the basic knowledge about the debate so they do not directly practice the complicated one. Cooperative controversy increases the number of ideas, quality of ideas, feelings of stimulation, and enjoyment and originality of expression in creative problem solving. If it is compared to the group which does not use controversy, in controversy, the members get motivation and satisfaction in solving the problems.Keywords: English debate, students’ motivation, cooperative controversy

  3. Risk and resilience in the Nigerian oil sector: The economic effects of pipeline sabotage and theft

    International Nuclear Information System (INIS)

    Yeeles, Adam; Akporiaye, Alero

    2016-01-01

    Political unrest in the Niger Delta has long been viewed as a hurdle for extracting maximum value from Nigeria's oil resources. Recently, investors and policymakers have laid blame for sector under-performance on pipeline sabotage and theft, and sounded the alarm for an impending ‘oil crisis’. However, our understanding of the economic effects of social action against oil companies is incomplete. Rigorous analysis has not heretofore been offered as evidence for such dire futures. Despite the obvious risk of pipeline interdiction, price dynamics and aggregate production respond minimally to pipeline interdiction. Based on quantitative analysis of the relationship among price, production and pipeline interdiction from multiple data sources covering different time intervals (monthly data from 2005 to 2014 and annual data from 1999 to 2013), we find no evidence of significant effects of pipeline interdiction on production and a weak relationship between pipeline interdiction and Bonny light crude prices. Reported losses in product are substantial, but there is no evidence of statistically significant impacts on price or production in the aggregate. Explanations for this counterintuitive result are cast in terms of sector resilience. The implications of this finding for producer risk and the likelihood of an impending ‘oil crisis’ are discussed. - Highlights: • We examine the impact of pipeline sabotage and theft on the Nigerian oil economy. • Econometric analysis of production, price and pipeline interdiction over different time intervals. • Aggregate price and production are impacted minimally by pipeline interdiction. • Oil sector business risk is high, but production is resilient to interruptions from social and political unrest.

  4. From Users to Designers: Building a Self-Organizing Game-Based Learning Environment

    Science.gov (United States)

    Squire, Kurt; Giovanetto, Levi; Devane, Ben; Durga, Shree

    2005-01-01

    The simultaneous publication of Steven Johnson's Everything Bad is Good for You and appearance of media reports of X-rated content in the popular game Grand Theft Auto has renewed controversies surrounding the social effects of computer and video games. On the one hand, videogames scholars argue that videogames are complex, cognitively challenging…

  5. Risk controversies. Concepts - conflicts - communication

    International Nuclear Information System (INIS)

    Jungermann, H.

    1991-01-01

    Common arguments and differences in risk communication in connection with the controversial discussion surrounding the fields of genetic engineering, chemistry, nuclear engineering, information techniques, and climate research are investigated. Presented are comparative analyses on subjects, those becoming active, and strategies of risk communication. (DG) [de

  6. 16 CFR 2.3 - Policy as to private controversies.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Policy as to private controversies. 2.3 Section 2.3 Commercial Practices FEDERAL TRADE COMMISSION ORGANIZATION, PROCEDURES AND RULES OF PRACTICE... other action when the alleged violation of law is merely a matter of private controversy and does not...

  7. Safety and security of radioactive sources in industrial radiography in Bangladesh

    Energy Technology Data Exchange (ETDEWEB)

    Mollah, A. S.; Nazrul, M. Abdullah [Industrial Inspection Service Limited, Dhaka (Bangladesh)

    2013-07-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing the risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)

  8. Safety and security of radioactive sources in industrial radiography in Bangladesh

    International Nuclear Information System (INIS)

    Mollah, A. S.; Nazrul, M. Abdullah

    2013-01-01

    Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing the risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)

  9. Energy controversy: the role of nuclear power

    International Nuclear Information System (INIS)

    Schmidt, F.H.; Bodansky, D.

    1975-02-01

    The objective of the paper presented is to show that nuclear fission power is the best, and maybe the only, alternative source of energy. It is written for a wide range of readers, including non-scientists and scientists who are not particularly informed on the issues involved. The first question considered concerns man's need for energy; it is concluded that conservation measures alone cannot suffice. Next, the earth's energy sources are examined, and the extent of each is estimated in the simple context of the length of time it could last at present use rates. Only nuclear fission, nuclear fusion, and solar energy can provide for future time scales commensurate with man's historic past, while avoiding the possibility of catastrophic social upheaval. Fusion and solar energy are rejected on technological grounds because the world energy problem is so pressing that one cannot gamble on hopes for future technological breakthroughs. Thus, only nuclear fission meets the twin criteria of technological feasibility and adequate resource base. Each of the controversial issues surrounding nuclear fission energy is examined in some detail. The conclusion is reached that none is serious, and that nuclear fission offers by far the best energy source from environmental, economic, longevity, and overall safety standpoints

  10. Legitimacy of hospital reconfiguration: the controversial downsizing of Kidderminster hospital.

    Science.gov (United States)

    Oborn, Eivor

    2008-04-01

    This paper examines the contested organizational legitimacy of hospital reconfiguration, which continues to be a central issue in health care management. A qualitative study which focuses on the controversial downsizing of Kidderminster Hospital, a highly publicized landmark case of district general hospital closure. Rhetorical strategies are analysed to examine how legitimacy was constructed by stakeholder groups and how these strategies were used to support or resist change. Stakeholders promoting change legitimized re-organization pragmatically and morally arguing the need for centralization as a rational necessity. Stakeholders resisting change argued for cognitive and moral legitimacy in current service arrangements, contrasting local versus regionalized aspects of safety and provision. Groups managed to talk past each other, failing to establish a dialogue, which led to significant conflict and political upheaval. Stakeholders value hospitals in different ways and argue for diverse accounts of legitimacy. Broader discourses of medical science and democratic participation were drawn into rhetorical texts concerning regionalization to render them more powerful.

  11. Epistemic Authority and Genuine Ethical Controversies.

    Science.gov (United States)

    Roberts, Adam James

    2017-05-01

    In 'Professional Hubris and its Consequences', Eric Vogelstein claims that 'that there are no good arguments in favor of professional organizations taking genuinely controversial positions on issues of professional ethics'. In this response, I defend two arguments in favour of organisations taking such positions: that their stance-taking may lead to better public policy, and that it may lead to better practice by medical professionals. If either of those defences succeeds, then Vogelstein's easy path to his conclusion - that professional organisations should not take such stances - is blocked. He or others must instead look to establish that the reasons against stance-taking on genuine ethical controversies are more compelling than those for it: plausibly a more challenging task. © 2017 John Wiley & Sons Ltd.

  12. Controversial Issues in Learning Disability.

    Science.gov (United States)

    Sapir, Selma C.

    The author discusses controversial issues in the field of learning disabilities (LD). Among topics addressed are conflicting definitions of LD and the impact of the operational definition accepted by the US Government; etiological questions concerning the separation of neurological, environmental, and emotional factors; approaches used in training…

  13. Current controversies, is there merit?

    DEFF Research Database (Denmark)

    Twetman, S

    2009-01-01

    Xylitol has become a debated measure in caries prevention. This paper aims to examine and comment on some possible controversies, with emphasis on the most recent literature. A search for clinical trials was conducted through 2007 in PubMed, and papers describing a controlled xylitol intervention...

  14. Hydroelectric power is green, although controversial

    International Nuclear Information System (INIS)

    Schulp, A.

    2003-01-01

    Hydroelectric power is worldwide the most important source of renewable energy. Still, it has some controversial aspects, which are briefly discussed in this article, focusing on Belgium and the Netherlands [nl

  15. Methodology for safety and security of radioactive sources and materials. The Israeli approach

    International Nuclear Information System (INIS)

    Keren, M.

    1998-01-01

    About 10 Radioactive incidents occurred in Israel during 1996-1997. Some of them were theft or lost of Radioactive equipment or sources, some happened because misuse of Radioactive equipment and some of other reasons. Part of them could be eliminated if a better methodological attitude to the subject existed. A new methodology for notification, registration and licensing is described. Hopefully this methodology will increase defense in depth and the Safety and Security of Radioactive sources and materials. Information on the inventory of Radioactive sources and materials is essential. Where they are situated, what is the supply rate or all history from berth to grave. Persons involved are important: Who are the Radiation Safety Officers (RSO), what is their training and updating programs. As much as possible information on the site and places where those Radioactive sources and materials are used. Procedures for security of sources and materials is part of site information, beside safety precautions. Users are obliged to inform on any changes and to ask for confirmation to those changes. The same is when high activity sources are moved across the country. (author)

  16. Teaching controversial issues in the secondary school science classroom

    Science.gov (United States)

    van Rooy, Wilhelmina

    1993-12-01

    A sample of fourteen secondary school biology teachers chosen from twelve schools were interviewed. The purpose was to determine their views on how controversial issues in science might be handled in the secondary school science classroom and whether the issues of surrogacy and human embryo experimentation were suitable controversial issues for discussion in schools. In general, teachers indicated that controversial issues deserve a more prominent place in the science curriculum because they have the potential to foster thinking, learning, and interest in science. The issues of surrogacy and human embryo experimentation were seen as appropriate contexts for learning, provided that teachers were well informed and sensitive to both the students and to the school environment.

  17. 49 CFR Appendix C to Part 591 - Power of Attorney and Agreement

    Science.gov (United States)

    2010-10-01

    ... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. C Appendix C to...

  18. Women's Athletics: Coping with Controversy.

    Science.gov (United States)

    Hoepner, Barbara J., Ed.

    This book is a collection of papers discussing controversial topics in women's athletics. Section one, "Overview--Women's Rights," includes articles on women's rights and equal opportunities in sports, the emergence of women in sports, and significant events in a century of American women's sports. Section two, "Women's Intercollegiate…

  19. The first Pico-Ficino Controversy

    DEFF Research Database (Denmark)

    Aasdalen, Unn Irene

    2011-01-01

    -scale conflict regarding how to live and die according to Platonic ideals. The themes of the controversy are firstly the interpretation of Plato’s Symposium, in particular Diotima’s speech, and secondly the practical conclusions one should draw from Plato’s fictional banquet. Ficino’s position is presented...

  20. The design of an enzyme: a chronology on the controversy.

    Science.gov (United States)

    Buc, Henri

    2013-05-13

    After the publication of the Monod-Wyman-Changeux model, a controversy arose between Jacques Monod, Francis Crick and Jeffries Wyman about the comparison of the regulatory performances of an oligomer undergoing a concerted transition between two states and a monomer having the same composition and subjected to a similar conformational equilibrium. The controversy took place between September 1965 and March 1966. It gave rise to several unpublished notes. Numerous misunderstandings between the participants were not fully dissipated as the controversy abruptly ended. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  2. The role of controversy, regulation and engineering in UK biofuel development

    International Nuclear Information System (INIS)

    Boucher, Philip

    2012-01-01

    Biofuels have undergone a controversial resurgence in the UK since the turn of the century. The aim of this article is to consider this development in the context of ongoing interactions between the controversy and regulatory and engineering activities. It is found that the discursive space of the controversy has increasingly narrowed around environmental issues, particularly greenhouse gas emissions. The implications for biofuel development are considered in the context of changing regulatory and engineering visions in response to indirect land-use change. Opposition to the third generation biofuels may be softened, but it may be more difficult to justify the cost of holistic regulation of land-use change. - Highlights: ► The relationships between regulation, engineering and controversy are considered. ► The controversy has reduced, shifted focus and narrowed in scope. ► The narrowed scope may soften opposition to third generation biofuels. ► It may make it difficult to justify the cost of holistic regulation.

  3. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  4. Experts' discussion on reactor safety research

    International Nuclear Information System (INIS)

    1980-01-01

    The experts' discussion on reactor safety research deals with risk analysis, political realization, man and technics, as well as with the international state of affairs. Inspite of a controversy on individual issues and on the proportion of governmental and industrial involvment in reactor safety research, the continuation and intensification of corresponding research work is said to be necessary. Several participants demanded to consider possible 'conventional accidents' as well as a stronger financial commitment by the industry in this sector. The ratio 'man and technics' being an interface decisive for the proper functioning or failure of complex technical systems requires even more research work to be done. (GL) [de

  5. Turkish Social Studies Teachers’ Thoughts About the Teaching of Controversial Issues

    Directory of Open Access Journals (Sweden)

    Ahmet Copur

    2016-06-01

    Full Text Available In today’s world, one of the primary goals of education is to raise individuals as citizens equipped with the skills of communication, high-level thinking, problem solving and questioning as well as with a global viewpoint. Introducing controversial issues into the classroom environment may be among the steps to be taken to achieve these goals. In this context, this study has the primary goal of revealing Social Studies teachers’ thoughts about the teaching of controversial issues in the classroom environment. This study adopted mixed methods. The study participants consisted of Social Studies teachers working in Bursa, which is a large-scale province of Turkey, in the 2014-2015 school year. According to the study findings, while terror was the most controversial issue, faith in creation was the least controversial issue. In addition, teachers mainly preferred to introduce issues related to the Social Studies curriculum and that were appropriate for the students’ preparedness. However, another result is that controversial issues contributed to students’ acquisition of personal critical skills such as high-level thinking and communication. It was also observed that the teaching of controversial issues was related to the Social Studies lesson and was important for the achievement of the goals of the lesson.

  6. Safety of nanofood: A review | Ijabadeniyi | African Journal of ...

    African Journals Online (AJOL)

    Introduction of genetically modified (GM) foods generated a lot of controversy few years back, now it is the turn of nanofoods. There has been debate on the safety of foods that have been produced directly or indirectly with nanomaterials. Nanoparticles or nanotechnology procedures may be used to make food products, ...

  7. Introducing Ethics Using Structured Controversies

    Science.gov (United States)

    Wareham, David; Elefsiniotis, Takis P.; Elms, David

    2006-01-01

    This paper describes a method of introducing ethics to a second-year class of civil engineering students. The method, known as a "structured controversy", takes the form of a workshop where the students assume the identity of stakeholders having an interest in a proposed development in an environmentally sensitive region. The instructor…

  8. Current controversies and future perspectives in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Agustí, Alvar; Vestbo, Jørgen

    2011-01-01

    Over the past decade there has been much research and interest in COPD. As a result, the understanding and management of the disease has improved significantly. Yet, there are many uncertainties and controversies that require further work. This review discusses these controversies and anticipates...

  9. Weak value controversy

    Science.gov (United States)

    Vaidman, L.

    2017-10-01

    Recent controversy regarding the meaning and usefulness of weak values is reviewed. It is argued that in spite of recent statistical arguments by Ferrie and Combes, experiments with anomalous weak values provide useful amplification techniques for precision measurements of small effects in many realistic situations. The statistical nature of weak values is questioned. Although measuring weak values requires an ensemble, it is argued that the weak value, similarly to an eigenvalue, is a property of a single pre- and post-selected quantum system. This article is part of the themed issue `Second quantum revolution: foundational questions'.

  10. The Safety of Second-Generation Antipsychotics During Pregnancy

    DEFF Research Database (Denmark)

    Damkier, Per; Videbech, Poul

    2018-01-01

    The issue of antipsychotic treatment during pregnancy is subject to substantial uncertainty and some controversy among healthcare providers, specifically pertaining to second-generation antipsychotics (SGAs) that are subject to a large gap in safety data during pregnancy compared...... with antidepressants. The amount of safety data for the use of SGAs during pregnancy is rapidly increasing, thus constantly changing the level of evidence. We performed a clinically focused review on the safety of SGA during pregnancy. Twenty-three studies provided various pregnancy outcomes for 14,382 pregnant women...... exposed to an SGA during pregnancy. In utero exposure to aripiprazole, olanzapine, and quetiapine is not associated with increased risks of major congenital malformations, whereas risperidone and paliperidone may be associated with a very minor increased risk of congenital malformations. Safety data...

  11. Review of the recent carbon dioxide-climate controversy

    International Nuclear Information System (INIS)

    Luther, F.M.; Cess, R.D.

    1992-01-01

    Model calculations of the climatic impact of the increasing atmospheric carbon dioxide (CO 2 ) concentration consistently suggest that a doubling of the CO 2 concentration would lead to a warming of global average surface air temperatures by as much as several degrees Celsius. In this appendix, this controversy about the effect of CO 2 on climate is reviewed. Because the surface energy balance approach to estimating climate sensitivity has been the source of much of the controversy, a review of this approach is presented. It is shown that prior applications of this approach violate the law of conservation of energy (the first law of thermodynamics); therefore, these results are incorrect. Empirical data indicating the relationship between atmospheric emittance and surface vapor pressure and surface air temperature are shown to be consistent with climate model calculations. Consequently, it is not the experimental data that are the basis of the controversy, but rather the analysis and interpretation of these data

  12. Perspectives on nuclear material safety management methods at DOE sites

    International Nuclear Information System (INIS)

    Hyder, M.L.

    1997-01-01

    The management of nuclear materials, and fissile materials in particular, at the USDOE facilities is undergoing significant changes. These result in large part from decreasing requirements for these materials in the US weapons program. Not only is new production no longer required, but returns must be handled and safely stored. Eventually surplus fissile material will be used for power production, or else put into a form suitable for long term disposition. In the meanwhile concentrates must be stored with protection against releases of radioactive material to the environment, and also against theft or deliberate dispersion. In addition, cleaning up large volumes of materials contaminated with fissile isotopes will be a major activity, and there will also be some quantity of spent fuel containing enriched uranium that cannot readily be processed. All these activities pose safety problems, some of which are addressed here

  13. Identity Theft: Gentrification, Latinidad, and American Girl Marisol Luna

    Science.gov (United States)

    Rudolph, Jennifer Domino

    2009-01-01

    Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll's accompanying narrative depicts her Chicago neighborhood of Pilsen as "dangerous" and recounts her family's move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of…

  14. The occupational health and safety of flight attendants.

    Science.gov (United States)

    Griffiths, Robin F; Powell, David M C

    2012-05-01

    In order to perform safety-critical roles in emergency situations, flight attendants should meet minimum health standards and not be impaired by factors such as fatigue. In addition, the unique occupational and environmental characteristics of flight attendant employment may have consequential occupational health and safety implications, including radiation exposure, cancer, mental ill-health, musculoskeletal injury, reproductive disorders, and symptoms from cabin air contamination. The respective roles of governments and employers in managing these are controversial. A structured literature review was undertaken to identify key themes for promoting a future agenda for flight attendant health and safety. Recommendations include breast cancer health promotion, implementation of Fatigue Risk Management Systems, standardization of data collection on radiation exposure and health outcomes, and more coordinated approaches to occupational health and safety risk management. Research is ongoing into cabin air contamination incidents, cancer, and fatigue as health and safety concerns. Concerns are raised that statutory medical certification for flight attendants will not benefit either flight safety or occupational health.

  15. Lead theft--a study of the "uniqueness" of lead from church roofs.

    Science.gov (United States)

    Bond, John W; Hainsworth, Sarah V; Lau, Tien L

    2013-07-01

    In the United Kingdom, theft of lead is common, particularly from churches and other public buildings with lead roofs. To assess the potential to distinguish lead from different sources, 41 samples of lead from 24 church roofs in Northamptonshire, U.K, have been analyzed for relative abundance of trace elements and isotopes of lead using X-ray fluorescence (XRF) and inductively coupled plasma mass spectrometry, respectively. XRF revealed the overall presence of 12 trace elements with the four most abundant, calcium, phosphorus, silicon, and sulfur, showing a large weight percentage standard error of the mean of all samples suggesting variation in the weight percentage of these elements between different church roofs. Multiple samples from the same roofs, but different lead sheets, showed much lower weight percentage standard errors of the mean suggesting similar trace element concentrations. Lead isotope ratios were similar for all samples. Factors likely to affect the occurrence of these trace elements are discussed. © 2013 American Academy of Forensic Sciences.

  16. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    CERN Multimedia

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  17. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    CERN Multimedia

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  18. 42 CFR 405.817 - Principles for determining amount in controversy.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Principles for determining amount in controversy... the Medicare Part B Program § 405.817 Principles for determining amount in controversy. (a) Individual... may assert that the aggregation principles contained in this subpart may be applied to determine the...

  19. Chernobylsk: a 'cloud' crosses... the facts and the controversies

    International Nuclear Information System (INIS)

    Lerouge, B.

    2008-01-01

    Twenty years after the Chernobylsk accident the effects are detailed by specialists, in radiobiology to judge the eventual sanitary injuries. It is a critical analysis that is made in this work, at the light of todays knowledge. The first part treats the question of communication, faults, late, silent. The second part is the time of controversy, the contamination in France, the radiation doses in France, thyroid cancers, the controversy of low doses effects, the controversy of sanitary consequences in USSR. The third part concerns the modernization of the nuclear world, the radiobiology, the public opinion. In annexes are: radioactivity, serious accidents, radiation doses (concepts and units), radiation protection and standards, the scientific bases of radiation protection, the figured conclusions of Chernobylsk forum, the European contamination map. (N.C.)

  20. The Satanic Ritual Abuse Controversy.

    Science.gov (United States)

    Putnam, Frank W.

    1991-01-01

    The issues raised by Jonker and Jonker-Bakker and Young et al (EC 601 187-188) illustrate a major controversy dividing the child abuse community, the alleged existence of a conspiracy of satanic, ritual, sexual abuse of children. No evidence is found to support claims that large numbers of babies and children are being sacrificed or abused in…

  1. Knowledge Safety – Insights from the SME Sector

    Directory of Open Access Journals (Sweden)

    Małgorzata Zięba

    2017-11-01

    Full Text Available Purpose: This paper aims to explore the topic of knowledge safety, defined as the state of knowledge being safe from loss, leakage, attrition, oblivion, waste or theft. The paper first presents a theoretical background and review of previous studies on knowledge loss and ways of overcoming it, and then illustrates the topic of knowledge safety with ten case studies from the small and medium-sized enterprises (SMEs sector. Methodology: The paper is based on an analysis of Knowledge Management (KM literature devoted to knowledge loss and its potential types in companies, and on the results of case study research. Knowledge safety was first defined and contrasted with other terms, and then examined in 10 selected SMEs. The research resulted in a clarification of what SMEs understand by the term of “knowledge safety” and what kind of measures they take to ensure it. Findings: As the analysis shows, the examined SMEs attribute diversified significance to the issue of knowledge safety. For some of them, such problem does not exist at all and they state that they can ensure knowledge safety in all aspects of their operations. Some companies perceive it mainly through the safety of the knowledge stored in electronic databases, while others link it with the human factor only. Research limitations: Research results are limited to ten companies operating in Poland. As such, they cannot illustrate the whole picture of the existing small or medium-sized companies. Research implications: The findings of both literature review and case study analysis indicate that there is a need to further examine the issue of knowledge safety by analysing the potential factors which may endanger knowledge safety and the methods to eliminate such risks. Practical implications: The paper examines important aspects of knowledge safety and provides guidelines on how it can be ensured by managers or owners of SMEs. Originality/value: The term of knowledge safety has been

  2. Safety and functional outcome of thrombolysis in dissection-related ischemic stroke: a meta-analysis of individual patient data

    NARCIS (Netherlands)

    Zinkstok, Sanne M.; Vergouwen, Mervyn D. I.; Engelter, Stefan T.; Lyrer, Philippe A.; Bonati, Leo H.; Arnold, Marcel; Mattle, Heinrich P.; Fischer, Urs; Sarikaya, Hakan; Baumgartner, Ralf W.; Georgiadis, Dimitrios; Odier, Céline; Michel, Patrik; Putaala, Jukka; Griebe, Martin; Wahlgren, Nils; Ahmed, Niaz; van Geloven, Nan; de Haan, Rob J.; Nederkoorn, Paul J.

    2011-01-01

    The safety and efficacy of thrombolysis in cervical artery dissection (CAD) are controversial. The aim of this meta-analysis was to pool all individual patient data and provide a valid estimate of safety and outcome of thrombolysis in CAD. We performed a systematic literature search on intravenous

  3. The cartoon controversy as a case of multiculturalrecognition

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2007-01-01

    The paper considers what ‘recognition' might mean in theory and which policies would in practice qualify as policies of recognition in relation to multicultural conflicts such as the ‘cartoon controversy' sparked by the publication of drawings of the Prophet Mohammad in the Danish Newspaper...... Jyllands-Posten. The paper provides a general theoretical account of recognition as a strictly political concept, including distinctions between different conceptions hereof, and asks whether the cartoon controversy can be described in these terms and what the relevant meaning of recognition might then be...

  4. KAERI software safety guideline for developing safety-critical software in digital instrumentation and control system of nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Jang Soo; Kim, Jang Yeol; Eum, Heung Seop.

    1997-07-01

    Recently, the safety planning for safety-critical software systems is being recognized as the most important phase in the software life cycle, and being developed new regulatory positions and standards by the regulatory and the standardization organization. The requirements for software important to safety of nuclear reactor are described in such positions and standards. Most of them are describing mandatory requirements, what shall be done, for the safety-critical software. The developers of such a software. However, there have been a lot of controversial factors on whether the work practices satisfy the regulatory requirements, and to justify the safety of such a system developed by the work practices, between the licenser and the licensee. We believe it is caused by the reason that there is a gap between the mandatory requirements (What) and the work practices (How). We have developed a guidance to fill such gap, which can be useful for both licenser and licensee to conduct a justification of the safety in the planning phase of developing the software for nuclear reactor protection systems. (author). 67 refs., 13 tabs., 2 figs

  5. KAERI software safety guideline for developing safety-critical software in digital instrumentation and control system of nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jang Soo; Kim, Jang Yeol; Eum, Heung Seop

    1997-07-01

    Recently, the safety planning for safety-critical software systems is being recognized as the most important phase in the software life cycle, and being developed new regulatory positions and standards by the regulatory and the standardization organization. The requirements for software important to safety of nuclear reactor are described in such positions and standards. Most of them are describing mandatory requirements, what shall be done, for the safety-critical software. The developers of such a software. However, there have been a lot of controversial factors on whether the work practices satisfy the regulatory requirements, and to justify the safety of such a system developed by the work practices, between the licenser and the licensee. We believe it is caused by the reason that there is a gap between the mandatory requirements (What) and the work practices (How). We have developed a guidance to fill such gap, which can be useful for both licenser and licensee to conduct a justification of the safety in the planning phase of developing the software for nuclear reactor protection systems. (author). 67 refs., 13 tabs., 2 figs.

  6. Mobile phone radiation health risk controversy: the reliability and sufficiency of science behind the safety standards

    OpenAIRE

    Leszczynski Dariusz; Xu Zhengping

    2010-01-01

    Abstract There is ongoing discussion whether the mobile phone radiation causes any health effects. The International Commission on Non-Ionizing Radiation Protection, the International Committee on Electromagnetic Safety and the World Health Organization are assuring that there is no proven health risk and that the present safety limits protect all mobile phone users. However, based on the available scientific evidence, the situation is not as clear. The majority of the evidence comes from in ...

  7. From Classroom to Controversy: Conflict in the Teaching of Religion

    Science.gov (United States)

    Neal, Lynn S.

    2013-01-01

    What happens when a class assignment becomes a source of controversy? How do we respond? What do we learn? By describing the controversy surrounding an assignment on religion and representation, this article examines conflict's productive role in teaching about New Religious Movements (NRMs) and religion. It suggests that we consider how our…

  8. Breast cancer radiotherapy: controversies and prospectives

    Institute of Scientific and Technical Information of China (English)

    YU Jin-ming; WANG Yong-sheng

    2008-01-01

    @@ Despite consensus on breast cancer radiotherapy, there are still some controversies over post-mastectomy radiotherapy (PMRT) in patients with 1-3 positive lymph nodes, accelerated partial breast irradiation (APBI), appropriate sequence of radiotherapy, chemotherapy and hormonal treatment, and radiotherapy after preoperative systemic therapy.

  9. Challenges of communicating safety case results to different audiences

    International Nuclear Information System (INIS)

    Hocke, Peter; Roehlig, Klaus-Juergen

    2014-01-01

    Nowadays, nuclear politics and decision making are often oriented at procedures which are linked to precautionary concepts and which reflect forms of 'knowledge politics'. These precautionary concepts in most cases focus on robust societal decisions, which incorporate the principles of sustainability as a topic of public debate. The issue of high-level nuclear waste is under debate and confronted with public discourse, which integrates not only the knowledge of different stakeholders, but also accept certain forms of 'Nichtwissen' ('non-knowledge'). Interdisciplinary research has to observe these normative trends and also has to 'contextualise' these questions before interpreting its research results for giving answers with practical relevance, especially in communication with different social actors. Issues which are brought up in this field of nuclear waste management and their social context have to be analysed in two dimensions: i) the dimension of professionalism and expertise; ii) the dimension of managing controversial debates ('knowledge politics') and the preparation and implementing of robust decisions mostly by responsible governmental organisations. In this context on the one hand complex aspects of safety have to be communicated in their internal scientific logic and structure. On the other hand the different functional systems and collective actors of highly differentiated modern societies are engaged in controversial debates on advanced technologies like nuclear energy and technologies for waste disposal over long-lasting time periods. Most safety and construction issues for final disposal of high-level waste, but also of waste management in general, are debated within professional 'communities' of scientists and experts. But if their technological artefacts and their conceptual planning become issues of controversial and political debates in spheres which are outside the closed circle of high-level professionals and party politicians (who are in the

  10. Ego Involvement and Topic Controversiality as Related to Attitude Change.

    Science.gov (United States)

    Sledden, Elizabeth A.; Fernandez, Katherine A.

    Attitude change was measured on four different topics before and immediately after a persuasion was presented in order to compare the degree of change with the level of ego involvement as it relates to topic controversiality. Ego involvement was based on self-ratings of concern for each topic. Objective topic controversiality was based on the…

  11. Growing a cyber-safety culture amongst school learners in South Africa through gaming

    Directory of Open Access Journals (Sweden)

    Elmarie Kritzinger

    2017-10-01

    Full Text Available Virtually all school learners today have access to ICT devices and the internet at home or at school. More and more schools are using ICT devices to improve education in South Africa. ICT devices and internet access have enormous advantages and assist learners in learning and teachers in teaching more successfully. However, with these advantages come numerous ICT and cyber-risks and threats that can harm learners, for example cyber-bullying, identity theft and access to inappropriate material. Currently, South Africa does not have a long-term plan to grow a cyber-safety culture in its schools. This research therefore proposes a short-term initiative in the form of a game-based approach, which will assist school learners in becoming more cyber safe and teach learners about the relevant cyber-related risks and threats. The research is based on a quantitative survey that was conducted among primary school learners to establish if the game-based approach would be a feasible short-term initiative. The aim of the research is to establish if a game based approach can be used to improve cyber-safety awareness. This approach was plotted into the required ICT and cyber-safety policy required by all schools.

  12. The Saga of the HIV Controversy

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 5. The Saga of the HIV Controversy - Nobel Prize in Physiology or Medicine - 2008. Udaykumar Ranga. General Article Volume 14 Issue 5 May 2009 pp 472-498. Fulltext. Click here to view fulltext PDF. Permanent link:

  13. Current controversies and future perspectives in chronic obstructive pulmonary disease

    DEFF Research Database (Denmark)

    Agustí, Alvar; Vestbo, Jørgen

    2011-01-01

    Over the past decade there has been much research and interest in COPD. As a result, the understanding and management of the disease has improved significantly. Yet, there are many uncertainties and controversies that require further work. This review discusses these controversies and anticipates...... some of the changes that may occur in the near future in the field of COPD....

  14. Are too many inferior vena cava filters used? Controversial evidences in different clinical settings: a narrative review.

    Science.gov (United States)

    Dalla Vestra, Michele; Grolla, Elisabetta; Bonanni, Luca; Pesavento, Raffaele

    2018-03-01

    The use of inferior vena cava filters to prevent pulmonary embolism is increasing mainly because of indications that appear to be unclearly codified and recommended. The evidence supporting this approach is often heterogeneous, and mainly based on observational studies and consensus opinions, while the insertion of an IVC filter exposes patients to the risk of complications and increases health care costs. Thus, several proposed indications for an IVC filter placement remain controversial. We attempt to review the proof on the efficacy and safety of IVC filters in several "special" clinical settings, and assess the robustness of the available evidence for any specific indication to place an IVC filter.

  15. Mobile phone radiation health risk controversy: the reliability and sufficiency of science behind the safety standards.

    Science.gov (United States)

    Leszczynski, Dariusz; Xu, Zhengping

    2010-01-27

    There is ongoing discussion whether the mobile phone radiation causes any health effects. The International Commission on Non-Ionizing Radiation Protection, the International Committee on Electromagnetic Safety and the World Health Organization are assuring that there is no proven health risk and that the present safety limits protect all mobile phone users. However, based on the available scientific evidence, the situation is not as clear. The majority of the evidence comes from in vitro laboratory studies and is of very limited use for determining health risk. Animal toxicology studies are inadequate because it is not possible to "overdose" microwave radiation, as it is done with chemical agents, due to simultaneous induction of heating side-effects. There is a lack of human volunteer studies that would, in unbiased way, demonstrate whether human body responds at all to mobile phone radiation. Finally, the epidemiological evidence is insufficient due to, among others, selection and misclassification bias and the low sensitivity of this approach in detection of health risk within the population. This indicates that the presently available scientific evidence is insufficient to prove reliability of the current safety standards. Therefore, we recommend to use precaution when dealing with mobile phones and, whenever possible and feasible, to limit body exposure to this radiation. Continuation of the research on mobile phone radiation effects is needed in order to improve the basis and the reliability of the safety standards.

  16. Mobile phone radiation health risk controversy: the reliability and sufficiency of science behind the safety standards

    Directory of Open Access Journals (Sweden)

    Leszczynski Dariusz

    2010-01-01

    Full Text Available Abstract There is ongoing discussion whether the mobile phone radiation causes any health effects. The International Commission on Non-Ionizing Radiation Protection, the International Committee on Electromagnetic Safety and the World Health Organization are assuring that there is no proven health risk and that the present safety limits protect all mobile phone users. However, based on the available scientific evidence, the situation is not as clear. The majority of the evidence comes from in vitro laboratory studies and is of very limited use for determining health risk. Animal toxicology studies are inadequate because it is not possible to "overdose" microwave radiation, as it is done with chemical agents, due to simultaneous induction of heating side-effects. There is a lack of human volunteer studies that would, in unbiased way, demonstrate whether human body responds at all to mobile phone radiation. Finally, the epidemiological evidence is insufficient due to, among others, selection and misclassification bias and the low sensitivity of this approach in detection of health risk within the population. This indicates that the presently available scientific evidence is insufficient to prove reliability of the current safety standards. Therefore, we recommend to use precaution when dealing with mobile phones and, whenever possible and feasible, to limit body exposure to this radiation. Continuation of the research on mobile phone radiation effects is needed in order to improve the basis and the reliability of the safety standards.

  17. The breast implant controversy.

    Science.gov (United States)

    Cook, R R; Harrison, M C; LeVier, R R

    1994-02-01

    The breast implant issue is a "bad news/good news" story. For many women with implants, the controversy has caused a fair degree of anxiety which may or may not be resolved as further information becomes available. It has also taken its toll on Dow Corning. Whole lines of medical products have been eliminated or are being phase out. The development of new medical applications has been terminated. As a consequence, employees have lost their jobs. What the effect will be on the biomedical industry as a whole remains to be seen (11). While silicones have been an important component in various medical devices, it is likely that other materials can be used as replacements. However, suppliers of non-silicone materials are also reevaluating their role in this market. For example, Du Pont, the nation's largest chemical company, has determined that the unpredictable and excessive costs of doing business with manufacturers of implantable medical devices no longer justifies the unrestricted sale of standard raw materials into this industry. Other companies are quietly following suit. On the up side, it is possible that the research being driven by this controversy will result in a greater understanding of the immunologic implications of xenobiotics, of the importance of nonbiased observations, of the need for ready access to valid data sets, and of the opportunity for valid scientific information to guide legal decisions. Only time will tell.

  18. Controversy matters: Impacts of topic and solution controversy on the perceived credibility of a scientist who advocates.

    Directory of Open Access Journals (Sweden)

    Lindsey Beall

    Full Text Available In this article, we focus on the potential influence of a scientist's advocacy position on the public's perceived credibility of scientists as a whole. Further, we examine how the scientist's solution position (information only, non-controversial, and controversial affects the public's perception of the scientist's motivation for sharing information about specific issues (flu, marijuana, climate change, severe weather. Finally, we assess how perceived motivations mediate the relationship between solution position and credibility. Using data from a quota sample of American adults obtained by Qualtrics (n = 2,453, we found that in some conditions advocating for a solution positively predicted credibility, while in one condition, it negatively predicted scientist credibility. We also found that the influence of solution position on perceived credibility was mediated by several motivation perceptions; most notably through perception that the scientist was motivated to: (a serve the public and (b persuade the public. Further results and implications are discussed.

  19. Socio-scientific controversies and beginning teachers’ pedagogical practice

    Directory of Open Access Journals (Sweden)

    Pedro Reis

    2005-08-01

    Full Text Available The current investigation aimed to study the impact of recent socio-scientific controversies, made public through the media, on the concepts and practices of a group of Natural Science teachers at the start of their careers. This study is particularly relevant at a time that is heavily marked by much debate regarding the social and environmental impact of several scientific and technological innovations and by the implementation of new science curricula, that stress the importance of discussing socio-scientific controversies in the context of students’ scientific alphabetisation (namely in their understanding of the nature of science and its relation to society and culture (McComas, 2000. This investigation followed an interpretative approach of a qualitative nature. Through the construction of case studies, it sought to analyse the possible impact of socio-scientific controversies on the teachers’ concepts (about the nature, teaching and learning of science and pedagogic practice. For data collection semi-structured interviews were conducted and classes observed.The controversial issues raised by certain recent technological innovations – namely the environmental, social and cultural impact they may have – did have an impact on the teachers’ concepts about the nature, teaching and learning of science. Besides reinforcing the duality of feelings as regards science and technology, as a source of both progress and concern, they triggered in these teachers the idea of the need for a widespread scientific alphabetisation that empowers the population for understanding and deciding and acting upon these issues. However, the concept of scientific alphabetisation and the best way to achieve it vary among the teachers participating in this study.

  20. Cartography of architectural controversies

    DEFF Research Database (Denmark)

    Lotz, Katrine

    2009-01-01

    on the visual materials and documents produced during the process, and interviews with architects, clients and engineers, I describe the continuous efforts to establish and strengthen architectural motives, and how they eventually gain the ability to align other motives and other actors. I suggest...... that employing the visualising methods of the recent development of Actor-Network-Theory called ‘Cartography of Controversies' might contribute to trans-disciplinary efforts to develop analytic understanding of the conflicting human purposes and power-struggles at stake in the be-coming of architecture....

  1. Global Banning of a Diffused Controversial Practice

    DEFF Research Database (Denmark)

    Gurses, Kerem; Giones, Ferran; Mehta, Kandarpkumar

    2017-01-01

    We study the deinstitutionalization of a controversial practice that had previously reached a level of international diffusion. We draw on international diffusion and deinstitutionalization theory to study the emergence and diffusion of the third-party ownership practice in the soccer industry. We...... use an inductive case study combining archival and interview data to study the determinants of the international diffusion of a controversial practice at a global scale, the contestation, and finally the deinstitutionalization process that resulted from the ban of the practice. We find...... that the opacity of the practice can be a diffusion driver, locally and at the international level, nevertheless the opacity also may lead to different meaning creation attempts and potential discursive battles between actors, and eventually to deinstitutionalization of the practice. This article advances our...

  2. Study on Pick-pocketing Theft-- with the Relevant Provisions to the Eighth Criminal Law Amendment as Background%扒窃型盗窃罪研究——以《刑法修正案(八)》相关规定为背景

    Institute of Scientific and Technical Information of China (English)

    薛进展; 蔡正华

    2012-01-01

    扒窃型盗窃罪是《刑法修正案(八)》新增的盗窃罪独立定罪类型,也拓宽了扒窃行为入罪的评价路径。刑法上的扒窃是指“以非法占有为目的,秘密窃取他人随身携带的财物的行为”。但并不是所有的扒窃都可以构成扒窃型盗窃罪,只有符合“公共场合”、“从他人身上”以及“取得”等标准的扒窃行为才能构成扒窃型盗窃罪。扒窃型盗窃罪作为内涵最为丰富的盗窃罪定罪类型,其外延受到的限制最严格,所以当出现多种类型盗窃罪竞合时,理应首先认定行为是否构成扒窃型盗窃罪。%The pick-pocketing type Theft is a new type of independent theft in the "eighth Criminal Law Amendment ", which at the same time clear the way of incorporating pick-pocketing behavior into crime. Pick-pocketing in the criminal law referred to those behaviors which are for the purpose of illegal possession and by means of stealing others' property carried with in secret. However not all of pick-pocketing may constitute of pick-pocketing type theft, only those which are conducted in the "public places", from others' body and acquire may meet the definition. Pick-pocketing theft criminal type, who is the richest in connotation, has also the strictest restriction in its epitaxial. So when we meet multiple types of Theft competing, pick-pocketing type theft shall be considered in the first.

  3. The use of content analysis in the assessment of medical controversies.

    Science.gov (United States)

    de Villiers, F P

    1991-12-01

    Medicine is fraught with controversies, and several strategies have been developed in order to reach rational conclusions. Examples are using more subjects or an improved research design, developing consensus statements or using meta-analysis. An additional strategy is described in this paper. The language content of scientific papers is examined to establish whether the authors use factual (informational) language or emotional appeals (directive language) to convince the reader. This type of content analysis is then applied to a sample controversy. The paper shows that directive language content analysis can be applied effectively to scientific publications to clarify the basis of and reasoning behind some controversies.

  4. chemical safety and chemical security overview

    African Journals Online (AJOL)

    IICBA01

    Wafaa M. Abdou. Chemical Industries Division, National Research Centre, ... substances to attain an acceptably low risk of exposure. Security is: ... Sharing locations of chemicals can publicize targets for theft .... D. Personal Protective Equipments (PPE): ... E. Lighting & Noise Levels ... PPE. ➢ Autoclave or sterilize wastes.

  5. Applications of computer based safety systems in Korea nuclear power plants

    International Nuclear Information System (INIS)

    Won Young Yun

    1998-01-01

    With the progress of computer technology, the applications of computer based safety systems in Korea nuclear power plants have increased rapidly in recent decades. The main purpose of this movement is to take advantage of modern computer technology so as to improve the operability and maintainability of the plants. However, in fact there have been a lot of controversies on computer based systems' safety between the regulatory body and nuclear utility in Korea. The Korea Institute of Nuclear Safety (KINS), technical support organization for nuclear plant licensing, is currently confronted with the pressure to set up well defined domestic regulatory requirements from this aspect. This paper presents the current status and the regulatory activities related to the applications of computer based safety systems in Korea. (author)

  6. Actor-network Theory and cartography of controversies in Information Science

    OpenAIRE

    LOURENÇO, Ramon Fernandes; TOMAÉL, Maria Inês

    2018-01-01

    Abstract The present study aims to discuss the interactions between the Actor-network Theory and the Cartography of Controversies method in Information Science research. A literature review was conducted on books, scholarly articles, and any other sources addressing the Theory-Actor Network and Cartography of Controversies. The understanding of the theoretical assumptions that guide the Network-Actor Theory allows examining important aspects to Information Science research, seeking to identif...

  7. Nuclear safety and public debate

    International Nuclear Information System (INIS)

    Tanguy, P.

    1997-01-01

    In this article are evoked the question of nuclear safety and the public opinion, from the beginning of nuclear power plants in 1954 where a peaceful use of nuclear energy is developed in minds. If the aim was to avoid any important accident, the Three Miles Island accident and more recently the Chernobyl accident provoked a shock in public opinion and marked a peak of nuclear controversy. From this point, the policy of transparence and a best information of the public taken as a partner are necessary to maintain the dialogue. (N.C.)

  8. Apraxia of Speech: Concepts and Controversies

    Science.gov (United States)

    Ziegler, Wolfram; Aichert, Ingrid; Staiger, Anja

    2012-01-01

    Purpose: This article was written as an editorial to a collection of original articles on apraxia of speech (AOS) in which some of the more recent advancements in the understanding of this syndrome are discussed. It covers controversial issues concerning the theoretical foundations of AOS. Our approach was motivated by a change of perspective on…

  9. Mercury, vaccines, and autism: one controversy, three histories.

    Science.gov (United States)

    Baker, Jeffrey P

    2008-02-01

    The controversy regarding the once widely used mercury-containing preservative thimerosal in childhood vaccines has raised many historical questions that have not been adequately explored. Why was this preservative incorporated in the first place? Was there any real evidence that it caused harm? And how did thimerosal become linked in the public mind to the "autism epidemic"? I examine the origins of the thimerosal controversy and their legacy for the debate that has followed. More specifically, I explore the parallel histories of three factors that converged to create the crisis: vaccine preservatives, mercury poisoning, and autism. An understanding of this history provides important lessons for physicians and policymakers seeking to preserve the public's trust in the nation's vaccine system.

  10. Mapping Wind Energy Controversies

    DEFF Research Database (Denmark)

    Munk, Anders Kristian

    As part the Wind2050 project funded by the Danish Council for Strategic Research we have mapped controversies on wind energy as they unfold online. Specifically we have collected two purpose built datasets, a web corpus containing information from 758 wind energy websites in 6 different countries......, and a smaller social media corpus containing information from 14 Danish wind energy pages on Facebook. These datasets have been analyzed to answer questions like: How do wind proponents and opponents organize online? Who are the central actors? And what are their matters of concern? The purpose of this report...

  11. Topical therapy of atopic dermatitis: controversies from Hippocrates to topical immunomodulators.

    Science.gov (United States)

    Tilles, Gérard; Wallach, Daniel; Taïeb, Alain

    2007-02-01

    Although atopic dermatitis can be treated efficiently, there is still much controversy about the risk/benefit ratio of both topical corticosteroids and topical immunomodulators. Conflicting data may be found about the usefulness of bathing, diet regulation, and other therapeutic interventions. These controversies result in part from the persistence of Hippocratic doctrines in modern medical thinking. Humoralist and diathetic doctrines, as they pertain to eczema, are reviewed. The paradoxical worsening of oozing and the deadly hazards of hospitalization before the era of antibiotics are brought to mind. We hope that this historical review will improve the understanding of current controversies and help dermatologists to manage patients with atopic dermatitis and other chronic skin diseases.

  12. Controversy, Trials, and Crime--Oh My!

    Science.gov (United States)

    Rott, Kim

    2006-01-01

    Teenagers' innate interest with the justice system is one of the reasons that so many high school literary classics teem with criminals, controversial issues, and trials. Novels such as "To Kill a Mockingbird," "A Separate Peace," "The Crucible," and "Twelve Angry Men" feature high-impact trials. In the author's desire to tap into this interest,…

  13. 49 CFR 591.6 - Documents accompanying declarations.

    Science.gov (United States)

    2010-10-01

    ... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.6 Documents accompanying... be accompanied by a statement substantiating that the vehicle was not manufactured for use on the...

  14. History of the Belgian nuclear power controversy

    International Nuclear Information System (INIS)

    Laes, E.

    2009-01-01

    Partly because nuclear energy technology continues to provoke profound controversy, the Flemish institute for technology assessment (viWTA) took the initiative to order a study aimed at mapping out the historical dynamics of the societal debate on nuclear energy. This study was carried out by the Belgian Nuclear Research Centre (SCK-CEN, under the research programme PISA) together with the Free university of Brussels (VUB, research group MEKO) in 2004. In 2007, the report was updated and published by Acco (Leuven) under the title Kernenergie (on)besproken. This study had three main objectives: 1) to discuss the societal debate on nuclear energy in Belgium in relation to major events (Chernobyl, TMI, etc.); 2) to elucidate the role of social actors in the controversy on both a national and international level and 3) to discuss possible alternatives for a better structuring of the debate in the future, building on existing approaches

  15. Metaphysics for an enlightened public: The controversy over monads in Germany, 1746-1748.

    Science.gov (United States)

    Broman, Thomas

    2012-03-01

    This essay analyzes the controversy that attended the prize essay question on monads proposed by the Berlin Academy of Sciences in 1746. The controversy was first touched off by an anonymous pamphlet published by the mathematician Leonhard Euler, the academy's most well known member, that attacked the doctrine of monads. It peaked with the awarding of the prize to Johann Heinrich Gottlob Justi, whose winning essay closely followed Euler's arguments. This essay discusses the controversy as one instance in a broader quarrel in the German academic community over the suitability of Christian Wolff's philosophy as the foundation for a broad range of academic disciplines, including natural philosophy. It also analyzes the controversy as displaying the central role of the periodical press in the emergent German public sphere.

  16. Safety and security of radiation sources and radioactive materials: A case of Zambia - least developed country

    International Nuclear Information System (INIS)

    Banda, S.C.

    1998-01-01

    In Zambia, which is current (1998) classified as a Least Developed Country has applications of nuclear science and technology that cover the medical, industrial, education and research. However, the application is mainly in medical and industry. Through the responsibility of radiation source is within the mandate of the Radiation Protection Board. The aspects involving security fall on different stake holders some that have no technical knowledge on what radiation is about. The stake holders in this category include customs clearing and forwarding agents, state security/defence agencies and the operators. Such a situation demands a national system that should be instituted to meet the safety and security requirements but takes into account the involvement of the diverse stake holders. In addition such system should avoid unnecessary exposure, ensure safety of radioactive materials and sources, detect illicit trade and maintain integrity of such materials or sources. This paper will provide the status on issue in Zambia and the challenges that exist to ensure further development in application of Nuclear Science and Technology (S and T) in the country takes into account the safety and security requirements that avoid deliberate and accidental loss of radiation sources and radioactive materials. The Government has a responsibility to ensure that effective system is established and operated to protect radiation sources and radioactive materials from theft, sabotage and ensure safety. (author)

  17. The use of human albumin for the treatment of ascites in patients with liver cirrhosis: item of safety, facts, controversies and perspectives.

    Science.gov (United States)

    Facciorusso, Antonio; Nacchiero, Maurizio Cosimo; Rosania, Rosa; Laonigro, Giulio; Longo, Nunzio; Panella, Carmine; Ierardi, Enzo

    2011-09-01

    Albumin constitutes approximately one half of the proteins in the plasma and plays a pivotal role in modulating the distribution of fluid between body compartments. Hence it is commonly employed in cirrhotic patients in association with diuretics for the treatment of ascites. Nevertheless, its usefulness is controversial in this condition and well-stated only in some circumstances. The item of safety of the drug appears to be convincing due to the accurate cautions in the course of its preparation. Side effects are described in literature only as sporadic events. Indeed, albumin administration is effective to prevent the circulatory dysfunctions after large-volume paracentesis and renal failure and after Spontaneous Bacterial Peritonitis (SBP). Finally albumin represents, associated with vasoconstrictors, the therapeutic gold standard for the hepatorenal-syndrome (HRS). Physiopathological bases of the therapeutic use of albumin in hepatic cirrhosis consist in both hypoalbuminemia and portal hypertension consequences. In fact, cirrhotic patient with ascites, in spite of hydrosaline retention, shows an effective hypovolemia with peripheral arterial vasodilatation and increase in heart rate. Therefore the effectiveness of albumin administration in the treatment of ascites is due to its plasma volume expander property as well as its efficacy in restoring plasmatic oncotic pressure. Trials are in progress in order to define the effectiveness of the prolonged home-administration of human albumin in the treatment and prevention of ascites. Finally, it has been recently demonstrated that the binding, transport and detoxification capacities of human albumin are severely reduced in cirrhotics and this impairment correlates with the degree of liver failure. Therefore, the next challenge will be to determine whether the alterations of non-oncotic properties of albumin are able to forecast mortality in cirrhotics with ascites and exogenous albumin chronic administration will be

  18. Controversies in watermanagement : Frames and mental models

    NARCIS (Netherlands)

    Kolkman, Rien; van der Veen, A.; Geurts, Petrus A.T.M.

    2007-01-01

    Controversies in decision and policy-making processes can be analysed using frame reflection and mental model mapping techniques. The purpose of the method presented in this paper is to improve the quality of the information and interpretations available to decision makers, by surfacing and

  19. Debating Diversity: Ethics and Controversial Public Issues

    Science.gov (United States)

    Darr, Christopher R.

    2016-01-01

    Courses: Ethics, Organizational Communication, Political Communication. Objectives: After completing this unit activity, students should be able to (1) apply multiple ethical perspectives to real-world diversity issues in a debate format, and (2) explain the role of informational and social category diversity in current controversies.

  20. What Can We Learn from Taiwanese Teachers about Teaching Controversial Public Issues?

    Science.gov (United States)

    Hung, Yu-Han

    2016-01-01

    This study explores how history teachers in Taiwan make curricular decisions while engaging controversial public issues. The main political controversies discussed in Taiwanese society center on the relationship between Taiwan and the People's Republic of China. This study documents how four social studies teachers formulate their curricular…

  1. Atomic weight versus atomic mass controversy

    International Nuclear Information System (INIS)

    Holden, N.E.

    1985-01-01

    A problem for the Atomic Weights Commission for the past decade has been the controversial battle over the names ''atomic weight'' and ''atomic mass''. The Commission has considered the arguments on both sides over the years and it appears that this meeting will see more of the same discussion taking place. In this paper, I review the situation and offer some alternatives

  2. Controversies in gestational diabetes.

    Science.gov (United States)

    Nolan, Christopher J

    2011-02-01

    Gestational diabetes mellitus (GDM) and controversy are old friends. However, several major studies in the field have clarified some of the main issues. There is now no doubt that hyperglycaemia, at levels less than those that occur in overt diabetes, is associated with adverse pregnancy outcomes, such as large-for-gestational age infants, neonatal hyperinsulinism, neonatal hypoglycaemia and pre-eclampsia. We also have evidence now that a standard approach to GDM with diagnosis at 24-28 weeks, dietary advice, self-monitoring of blood glucose and insulin therapy as needed reduces these adverse perinatal outcomes. Unknown, however, is if this same approach is effective at reducing long-term risks of metabolic syndrome, type 2 diabetes and cardiovascular disease in both the mothers and babies. For example, could our management strategies miss critical time points of fuel-mediated injury to the foetus important for the baby's long-term metabolic health? The implications of a recent international consensus statement on new diagnostic criteria for GDM are discussed, as well as issues relating to the timing of diagnosis. The potential place for a risk calculator for adverse outcomes in GDM pregnancy that takes into account glycaemic and non-glycaemic risk factors is considered. Such a tool could help stratify GDM women to different levels of care. Ongoing issues relating to maternal glycaemic and foetal growth targets, and the use of oral hypoglycaemic agents in GDM are discussed. To resolve some of the remaining controversies, further carefully designed randomised controlled trials in GDM with long-term follow-up of both mothers and babies are necessary. Copyright © 2010 Elsevier Ltd. All rights reserved.

  3. “C’è un furto con scasso in ogni vera lettura”. Calvino’s Thefts from Ariosto

    Directory of Open Access Journals (Sweden)

    Martin McLaughlin

    2013-06-01

    Full Text Available Calvino’s love for Ariosto throughout his writing life is well known. However, despite this life-long enthusiasm for Ariosto, there are some variations. In a 1980 interview with Tullio Pericoli Calvino used the metaphor of “stealing” words from other texts and discussed notions of artistic thievery, citing his own “thefts” from Ariosto. The article examines how Calvino carries out his thefts, and how he then systematically develops in his own way what he has “stolen”, concentrating on key episodes from Il cavaliere inesistente and Il castello dei destini incrociati. What emerges is that in the first phase of his literary career Calvino was more concerned with the content of the Furioso, while in later years he became fascinated by the poem’s structural and stylistic qualities.

  4. Teaching global climate change as a controversial issue - Active learning in higher education

    Energy Technology Data Exchange (ETDEWEB)

    Manolas, E.I.

    2007-07-01

    Global climate change is one of the most important controversial issues of our time. If the role of Universities is to create the leaders of tomorrow, then, the duty of teachers in institutions of higher education is to find ways to help students become aware of the problem and understand the complexity of the issue. Following presentation of the definition of controversial issues, the reasons for teaching controversial topics as well as the characteristics of controversial topics, this paper puts forward certain active learning approaches which are in conformity with such considerations without, at the same time, loosing sight of the interdisciplinary nature of the subject. The paper concludes with a discussion of the obstacles which should be overcome so that the methods put forward in this paper can be applied successfully. (orig.)

  5. Anti-theft device staining on banknotes detected by mass spectrometry imaging.

    Science.gov (United States)

    Correa, Deleon Nascimento; Zacca, Jorge Jardim; Rocha, Werickson Fortunato de Carvalho; Borges, Rodrigo; de Souza, Wanderley; Augusti, Rodinei; Eberlin, Marcos Nogueira; Vendramini, Pedro Henrique

    2016-03-01

    We describe the identification and limits of detection of ink staining by mass spectrometry imaging (MSI), as used in anti-theft devices (ATDs). Such ink staining is applied to banknotes during automated teller machine (ATM) explosions. Desorption electrospray ionization (DESI) coupled with high-resolution and high-accuracy orbitrap mass spectrometry (MS) and a moving stage device were applied to obtain 2D molecular images of the major dyes used for staining, that is, 1-methylaminoanthraquinone (MAAQ), rhodamine B (RB) and rhodamine 6G (R6G). MAAQ could not be detected because of its inefficient desorption by DESI from the banknote cellulose surface. By contrast, ATD staining on banknotes is perceptible by the human naked eye only at concentrations higher than 0.2 μg cm(-2), whereas both RB and R6G at concentrations 200 times lower (as low as 0.001 μg cm(-2)) could be easily detected and imaged by DESI-MSI, with selective and specific identification of each analyte and their spatial distribution on samples from suspects. This technique is non-destructive, and no sample preparation is required, which ensures sample preservation for further forensic investigations. Copyright © 2016. Published by Elsevier Ireland Ltd.

  6. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    CERN Multimedia

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  7. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    Directory of Open Access Journals (Sweden)

    Clara Victoria Meza-Maya

    2017-01-01

    Full Text Available Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V. Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes de un colegio de Bogotá. Resultados y conclusiones: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  8. 49 CFR 591.1 - Scope.

    Science.gov (United States)

    2010-10-01

    ... OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.1 Scope. This part establishes procedures governing the importation of motor vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper...

  9. 78 FR 17975 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Notice of Filing of...

    Science.gov (United States)

    2013-03-25

    ... confidential customer information or information that raises personal safety or privacy concerns is released to... identities, or information that raises significant identity theft, personal safety, or privacy concerns that... privacy concerns that are not outweighed by investor protection concerns). Similarly, the proposed rule...

  10. Empowerment in healthcare policy making: three domains of substantive controversy.

    Science.gov (United States)

    Chiapperino, Luca; Tengland, Per-Anders

    2015-12-01

    This paper distinguishes between the uses of empowerment across different contexts in healthcare policy and health promotion, providing a model for the ethical and political scrutiny of those uses. We argue that the controversies currently engendered by empowerment are better understood by means of a historical distinction between two concepts of empowerment, namely, what we call the radical empowerment approach and the new wave of empowerment. Building on this distinction, we present a research agenda for ethicists and policy makers, highlighting three domains of controversy raised by the new wave of empowerment, namely: (1) the relationship between empowerment and paternalistic interferences on the part of professionals; (2) the evaluative commitment of empowerment strategies to the achievement of health-related goals; and (3) the problems arising from the emphasis on responsibility for health in recent uses of empowerment. Finally, we encourage the explicit theorisation of these moral controversies as a necessary step for the development and implementation of ethically legitimate empowerment processes.

  11. Controversial Issues in Thyroid Cancer Management.

    Science.gov (United States)

    Tuttle, R Michael

    2018-04-13

    The lack of prospective randomized clinical trials for most management topics in differentiated thyroid cancer force us to make management recommendations based on retrospective observational data which is often incomplete, subject to selection bias, and conflicting. Therefore, it is not surprising that many aspects of thyroid cancer management remain controversial and not well defined. This review will examine the controversies surrounding three important topics in thyroid cancer management: (1) the option of thyroid lobectomy as initial therapy for thyroid cancer, (2) the proper use of preoperative neck imaging to optimize the completeness of the initial surgical procedure, and (3) the selective use RAI therapy as remnant ablation, adjuvant treatment or treatment of known persistent/recurrent disease. As thyroid cancer management moves toward a much more risk adapted approach to personalized management recommendations, clinicians and patients must balance the risks and benefits of the potential management options to arrive at a management plan that is optimized based on both patient preferences/values and the philosophy/experience of the local disease management team. Copyright © 2018 by the Society of Nuclear Medicine and Molecular Imaging, Inc.

  12. Selection of tolerable risk criteria for dam safety decision making

    International Nuclear Information System (INIS)

    Nielsen, N.M.; Hartford, D.N.D.; MacDonald, T.F.

    1994-01-01

    Risk assessment has received increasing attention in recent years as a means of aiding decision making on dams by providing systematic and rational methods for dealing with risk and uncertainty. Risk assessment is controversial and decisions affecting risk to life are the most controversial. Tolerable criteria, based on the risks that society is prepared to accept in order to avoid excessive costs, set bounds within which risk-based decisions may be made. The components of risk associated with dam safety are addressed on an individual basis and criteria established for each component, thereby permitting flexibility in the balance between component risk and avoiding the problems of placing a monetary value on life. The guiding principle of individual risk is that dams do not impose intolerable risks on any individual. A risk to life of 1 in 10 4 per annum is generally considered the maximum tolerable risk. When considering societal risk, the safety of a dam should be proportional to the consequences of its failure. Risks of financial losses beyond the corporation's ability to finance should be so low as to be considered negligible. 17 refs., 3 figs

  13. E-cigarettes: scientific and political controversies

    OpenAIRE

    Yussuf Saloojee

    2018-01-01

    Background and challenges to implementation The e-cigarette is touted as a disruptive technology that could make combustible cigarettes obsolete. The product, its science and politics though are controversial. Intervention or response Published journal articles, reports and conference presentations on e-cigarettes were located using PubMed, plus conference, industry and other websites. These were critically reviewed. Results and lessons learnt A number of contenti...

  14. Characterization of anti-theft devices directly from the surface of banknotes via easy ambient sonic spray ionization mass spectrometry.

    Science.gov (United States)

    Schmidt, Eduardo Morgado; Franco, Marcos Fernando; Cuelbas, Claudio José; Zacca, Jorge Jardim; de Carvalho Rocha, Werickson Fortunato; Borges, Rodrigo; de Souza, Wanderley; Sawaya, Alexandra Christine Helena Frankland; Eberlin, Marcos Nogueira; Correa, Deleon Nascimento

    2015-09-01

    Using Brazilian banknotes as a test case, forensic examination and identification of Rhodamine B dye anti-theft device (ATD) staining on banknotes were performed. Easy ambient sonic spray ionization mass spectrometry (EASI-MS) was used since it allows fast and simple analysis with no sample preparation providing molecular screening of the surface with direct desorption and ionization of the security dye. For a more accurate molecular characterization of the ATD dye, Q Exactive Orbitrap™ Fourier transform (tandem) mass spectrometry using eletrospray ionization (ESI-HRMS/MS) was also applied. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  15. The controversy about nuclear power

    International Nuclear Information System (INIS)

    Bethe, H.A.

    1977-01-01

    A short review of the events of the past several years in the conflict in the USA between the groups supporting or opposing nuclear power. Reference is made to publications on both sides of the controversy which the author considers to be well reasoned and useful sources of information. Mention is also made of the legal and legislative actions taken by both sides. The arguments against nuclear power are summarized and solutions to the problems which are the source of these arguments are suggested

  16. Online safety

    CERN Document Server

    Healey, Justin

    2015-01-01

    Australians are increasingly connecting online through computers, mobile phones and other electronic devices to access the internet and social media. In the process, young people in particular are becoming more at risk of being exposed to fraud, identity theft, unauthorised access to personal information, stalking, harassment and exposure to illicit or offensive materials. This book presents a range of cybersafety tips to arm readers with an informed awareness of the risks online and offer advice on how to stay protected. A chapter in the book is specifically dedicated to understanding and dea

  17. Electrical stimulation in dysphagia treatment: a justified controversy?

    NARCIS (Netherlands)

    Bogaardt, H. C. A.

    2008-01-01

    Electrical stimulation in dysphagia treatment: a justified controversy? Neuromuscular electrostimulation (LAMES) is a method for stimulating muscles with short electrical pulses. Neuromuscular electrostimulation is frequently used in physiotherapy to strengthen healthy muscles (as in sports

  18. Vaccine quality and safety: Scrutinizing the reported 3-fold increase in adverse effects following immunization (Aefi) in India

    OpenAIRE

    Patil, Rajan R

    2013-01-01

    Background: There has been major controversy over vaccine safety in India following newspaper reports citing right to information (RTI) disclosure that there have been increasing vaccine related deaths following immunization in children in the recent years.

  19. 49 CFR 592.6 - Duties of a registered importer.

    Science.gov (United States)

    2010-10-01

    ... marking requirements of the theft prevention standard (part 541 of this chapter); or (ii) The vehicle... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REGISTERED IMPORTERS OF VEHICLES NOT ORIGINALLY MANUFACTURED TO CONFORM TO THE FEDERAL MOTOR VEHICLE SAFETY STANDARDS § 592.6 Duties of a...

  20. 49 CFR 591.8 - Conformance bond and conditions.

    Science.gov (United States)

    2010-10-01

    ... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS § 591.8 Conformance bond and conditions. (a) The bond required under section 591.6(c) for importation of a vehicle not originally manufactured...

  1. Cause for controversy? Infliximab in the treatment of ulcerative colitis: an update

    Directory of Open Access Journals (Sweden)

    Garrett Lawlor

    2009-12-01

    Full Text Available Garrett Lawlor, Alan C MossBeth Israel Deaconess Medical Center and Harvard Medical School, Boston, MA, USAAbstract: Infliximab is a monoclonal antibody against tumor necrosis factor (TNF which has become an established therapy for Crohn’s disease over the last 10 years. Given the similarities between Crohn’s disease and ulcerative colitis (UC, it is no surprise that gastroenterologists have used infliximab in patients with UC who have failed other therapies. Although the initial controlled trials with infliximab in steroid-refractory disease were unimpressive, subsequent controlled trials have demonstrated the efficacy of infliximab in both moderate to severe disease, and as rescue-therapy to avoid colectomy. The long-term remission rates, colectomy-sparing effects, and the impact of concomitant immunomodulator therapy, remain to be determined in these patients. Whether infliximab is a superior strategy to cyclosporine in patients with steroidrefractory disease is controversial. This review examines the data on the efficacy and safety of infliximab as an induction and maintenance agent for UC.Keywords: ulcerative colitis, infliximab, biologics

  2. Understanding and Developing Controversial Issues in College Courses.

    Science.gov (United States)

    Payne, Brian K.; Gainey, Randy R.

    2003-01-01

    Discusses common controversial issues in different college disciplines, such as the death penalty and drug legalization. Also suggests useful methods for encouraging enlightening discussions, such as verbal and physical cues, student-centered activities, and text selection. (SLD)

  3. Emergence of controversy in technology transitions: Green revolution and Bt cotton in India

    NARCIS (Netherlands)

    Ramani, S.V.; Thutupalli, A.

    2015-01-01

    Technology transitions following radical technological breakthroughs are often marked by controversies and the transitions to Green Revolution (GR) and Genetically Modified (GM) seeds in India were no exceptions to this rule. Controversies can trigger social dilemmas, but in economics we do not yet

  4. The rocky flats controversy on radionuclide soil action levels

    International Nuclear Information System (INIS)

    Earle, T.C.

    2004-01-01

    This report describes the Rocky Flats radionuclide soil action level controversy as a case study for the purpose of understanding the nature and value of stakeholder involvement in the management of radiological hazards. The report consists of three main sections. The first section outlines the Rocky Flats story, including the Cold War era, the post-Cold War era, and the transition between the two. This provides the context necessary to understand the radionuclide soil action level controversy, the main events of which are described in the second section. In the final section, the Rocky Flats case is briefly discussed within the framework of a general model of stakeholder involvement and the lessons learned from the case are identified. (author)

  5. Controversy and consensus on a clinical pharmacist in primary care in the Netherlands

    NARCIS (Netherlands)

    Hazen, Ankie C M; Wal, Aletta W Van Der; Sloeserwij, Vivianne M.; Zwart, Dorien L M; Gier, Johan J De; de Wit, Niek J; Leendertse, Anne J.; Bouvy, Marcel L.; Bont, Antoinette A De

    2016-01-01

    Background Controversy about the introduction of a non-dispensing pharmacist in primary care practice hampers implementation. Objective The aim of this study is to systematically map the debate on this new role for pharmacists amongst all stakeholders to uncover and understand the controversy and

  6. Integration of basic controversies in cross-cultural psychology

    NARCIS (Netherlands)

    Poortinga, Y.H.

    2016-01-01

    This article discusses controversies in the field of cross-cultural psychology, including cultural psychology, with a view to possible integration.1 It briefly describes the indigenisation movement as a reaction against Western scientific ethnocentrism and mentions two methodological topics, that

  7. Datasprints as a method for Controversy Mapping

    DEFF Research Database (Denmark)

    Jensen, Torben Elgaard; Munk, Anders Kristian; Bach, Daniel

    2017-01-01

    A datasprint is an intensive 3-5 day workshop that brings together humanistic researchers, data experts, and stakeholders from a selected field. Together, the participants visualize and analyse a collection of data sets, which have been prepared before the datasprint. In the beginning of a datasp......A datasprint is an intensive 3-5 day workshop that brings together humanistic researchers, data experts, and stakeholders from a selected field. Together, the participants visualize and analyse a collection of data sets, which have been prepared before the datasprint. In the beginning...... of a datasprint, stakeholders present their understandings and views of the field in question. Following this, the workshop participants explore how the prepared data may shed new light on the field. The final products of a datasprint are prototypes of analyses or digital products that forms the basis for future...... collaboration between the partners. Since 2015, DIGHUMLAB has sponsored a special interest group in controversy mapping. Datasprints have proved to be a very productive format for controversy making and for creating dialogue and joint projects between humanistic researchers....

  8. 49 CFR 567.1 - Purpose.

    Science.gov (United States)

    2010-10-01

    ... Federal Theft Prevention Standards (part 541 of this chapter), are applicable to the vehicle. ... and location of, and other requirements for, the certification label to be affixed to motor vehicles as required by the National Traffic and Motor Vehicle Safety Act, as amended (the Vehicle Safety Act...

  9. 49 CFR 592.9 - Forfeiture of bond.

    Science.gov (United States)

    2010-10-01

    ... Federal motor vehicle safety, bumper, and theft prevention standard in effect at the time the vehicle was... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) REGISTERED IMPORTERS OF VEHICLES NOT ORIGINALLY MANUFACTURED TO CONFORM TO THE FEDERAL MOTOR VEHICLE SAFETY STANDARDS § 592.9 Forfeiture of bond. A Registered...

  10. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  11. The Case of the Danish Cartoons Controversy: The Paradox of Civility

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2014-01-01

    The so-called ‘Danish cartoons controversy’ set in motion by the publication of twelve drawings under the title ‘the face of Mohammed’ by the Danish broadsheet Jyllands-Posten in September 2005 has become one of the iconic controversies surrounding Islam in Europe. But the cartoon controversy...... by interpreting it in terms of the concept of ‘civility’ as a social theoretical concept and analytical category. The introduction of this analytical perspective gives a more complete picture of what was actually at stake in the cartoons controversy. The introduction of the concept of civility makes it possible...... due to the discursive logic of civility claims. This ‘paradox of civility’ is a practical problem facing any attempt by minority groups to raise issues of civility. This discursive phenomenon might have empirical explanatory significance, since the logic of claims of civility might explain some...

  12. Knowledge Translation and Patient Safety: The Canadian Adverse Events Study

    OpenAIRE

    Baker, G. Ross; Norton, Peter; Flintoft, Virginia

    2006-01-01

    The Canadian Adverse Events Study was the first national study of adverse events in Canadian hospitals. Learning from the controversy surrounding similar studies in other countries, the team engaged in extensive knowledge translation activities throughout the life of the project. Using meetings, Web-based communication and other tools, the team successfully prepared most Canadian stakeholders for the study’s release, allowing them to develop anticipatory patient safety initiatives. However, u...

  13. Child injury control: trends, themes, and controversies.

    Science.gov (United States)

    Johnston, Brian D; Ebel, Beth E

    2013-01-01

    Injury is a major cause of morbidity and mortality among US children, and an important driver of health status globally. Despite its enormous burden, injury is preventable. Over the last 10 years, significant progress has been made in the reduction of unintentional injury among US children. However, aggregate trends mask important disparities by age group, region, and injury mechanism. Basic and translation research is needed to develop and test prevention strategies to address these new or recalcitrant problems. Motor vehicle occupant injury has fallen to historic lows, but challenges remain in protecting novice drivers and managing the distraction of new technologies. Injury to pedestrians has also declined, but likely as a result of decreased exposure as fewer children walk. This calls for a broader public health perspective to promote activity while enhancing safety. Deaths due to drowning are common and illustrate the difficulty in measuring and promoting appropriate supervision. Environmental modification and use of protective products may be a more appropriate response. Concussion in sport is another challenging issue: public health laws promote identification and appropriate management of concussed athletes, but less progress has been made on primary prevention of these injuries. Unintentional poisoning is on the rise, attributable to misuse of, and overdose with, prescription opioids. Injury deaths to infants are also increasing. This trend is driven in part by better death investigation that classifies more sleep-related deaths as suffocation events. Finally, we examine a sample of cross-cutting themes and controversies in injury control that might be amenable to empiric evaluation. Copyright © 2013 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  14. Federal Judge Orders Showing of Controversial Film.

    Science.gov (United States)

    Flygare, Thomas J.

    1987-01-01

    Reviews a recent court decision in Nebraska regarding the cancellation of a controversial film on the University of Nebraska campus. The film was cancelled after a state senator threatened to close the theater if the movie was shown. The lawsuit alleged the university violated the First Amendment in cancelling the film; the judge ruled for the…

  15. Controversial Novels and Censorship in the Schools.

    Science.gov (United States)

    Katz, John Stuart

    The legal history of censorship in general in the United States as well as the legal context in particular of the censorship of novels from schools is discussed. This thesis deals with four novels which have aroused substantial controversy when taught in the schools. The novels are: "The Catcher in the Rye," by J. D. Salinger, "The Adventures of…

  16. Design of anti-theft/cable cut real time alert system for copper cable using microcontroller and GSM technology

    Science.gov (United States)

    Lim, E. K.; Norizan, M. N.; Mohamad, I. S.; Yasin, M. N. M.; Murad, S. A. Z.; Baharum, N. A.; Jamalullail, N.

    2017-09-01

    This paper presents the design of anti-theft/cable cut real time alert system using microcontroller and GSM technology. The detection part is using the electrical circuit wire connection in detecting the voltage drop of the cable inside the microcontroller digital input port. The GSM wireless modem is used to send the location of cable cut directly to the authority mobile phone. Microcontroller SK40C with Microchip PIC16F887 is used as a controller to control the wireless modem and also the detection device. The device is able to detect and display the location of the cable cut on the LCD display besides of and sending out the location of the cable break to the authority mobile phone wirelessly via SMS.

  17. Siting controversial facilities

    International Nuclear Information System (INIS)

    Baird, R.D.; Blacker, P.B.

    1985-01-01

    There is often significant difficulty involved with siting controversial facilities. The social and political problems are frequently far more difficult to resolve than the technical and economic issues. The tendancy for most developing organizations is to address only technical issues in the search for a technically optimal site, to the exclusion of such weighting considerations as the social and political climate associated with potential sites--an approach which often imperils the success of the project. The site selection processes currently suggested is summarized and two contemporary examples of their application are cited. The difference between developers' real objectives and the objectives they have implicitly assumed by adopting the recommended approaches without augmentation are noted. The resulting morass of public opposition is attributed to the failure to consider the needs of individuals and groups who stand to be negatively impacted by the development. A comprehensive implementation strategy which addresses non-technical consideration in parallel with technical ones is presented and evaluated

  18. Details of criminological investigations of large-valued thefts related to nuclear materials (diversion safeguards program)

    International Nuclear Information System (INIS)

    Leachman, R.B.; Cornella, A.P.

    1972-06-01

    Studies were made of five areas of criminology which have great similarity to the case of nuclear materials. Actual cases of crimes were analyzed by experts in law enforcement and criminal justice. To identify fields of analogous criminology, possible characteristics of nuclear material thefts were considered: total value, high unit cost, limited marketability, special technology for handling, and licensing. The items considered to be analogous to nuclear materials in these aspects were: narcotics, data (as exists in computer memories, tapes, or discs), precious metal and gems, objects of art, and weapons. A criminology survey was conducted in which 509 individuals received one or more questionnaires soliciting opinion responses. Sixty-five questionnaires were returned. Eighty-four individuals replied by letter indicating inadequate knowledge of the crimes being surveyed. The questionnaire was supplemented by 18 interviews with criminal justice and industry personnel for more definitive information on diversion problems. Results of this survey are reported

  19. Adolescent varicocoele management controversies.

    Science.gov (United States)

    Serefoglu, E C; Saitz, T R; La Nasa, J A; Hellstrom, W J

    2013-01-01

    Varicocoele is defined as excessive dilatation of the pampiniform venous plexus of the spermatic cord. Varicocoele frequently appears during early puberty and is recognized to be the most common surgically correctable cause of male infertility. However, the actual incidence in adolescents, pathophysiology and the association with male factor infertility all remain somewhat controversial. The most accurate diagnostic technique for identifying young men who will benefit from surgical treatment has yet to be established. Observations of testicular asymmetry and deteriorating semen quality helped establish current guidelines and recommendations for surgical treatment. Further studies, comparing observation with surgical intervention, are needed to refine the current indications for varicocoele repair in the adolescent male. © 2012 American Society of Andrology and European Academy of Andrology.

  20. The Validity of Warrantless Searches under the Occupational Safety and Health Act of 1970

    Science.gov (United States)

    Shanks, Michael D.

    1975-01-01

    One of the most controversial federal acts providing for random administrative searches is the Occupational Safety and Health Act of 1970 (OSHA). The author reviews the search and seizure law and concludes that abandonment of Fourth Amendment rights should not be predicated on the mere convenience of even a justifiable regulatory scheme. (JT)

  1. Trust in the pharmaceutical sector : Analysis of drug safety controversies by means of drug life cycles

    NARCIS (Netherlands)

    Hernández, J.F.

    2015-01-01

    Before obtaining a marketing approval, the efficacy and safety profile of drugs is studied in specific populations and under well-controlled circumstances. After marketing approval, the drug is made available and used in ‘real world conditions’, which are known to deviate from the trial setting.

  2. JUDGMENTS CONCERNING THE ACCOUNTING CONTROVERSIAL OVER THE REVALUATION OF ESTATE INVESTMENTS

    OpenAIRE

    Raluca Andreea Trandafir; Nicoleta Asalos

    2009-01-01

    The present work tackles as main theme the bookkeeping controversy, which is met when the two international audit standards are put face to face, especially IAS 16 that it refers to corporal immobilizations versus IAS 40, that it refers to an real investment. This work has as a goal the presentation and the differentiation of the bookkeeping controversy between the two audit international standards. In the first part of the work there are presented the two standards, IAS 16 corporal Immobiliz...

  3. Unconsciously against it. Psychological aspects of the nuclear controversy

    International Nuclear Information System (INIS)

    Wuenschmann, A.

    1980-06-01

    The book deals with the psychological aspects of the nuclear controversy. An attempt is made to describe, in psychological terms, arrange, explain and, in this sense, 'comprehend' the phenomenon of the nuclear controversy in the light of the following facts: - individual and archetypal spectra of associations arising in the minds of many people in combination with the term 'nuclear power plant', the existence of different psychological types; the suggestion and psychological regression in the group. Especially the nuclear opponents, more or less successfully, have used the individual and archetypal association spectrum as an instrument to further their own ends and have thus contributed to the erection of psychological barriers against nuclear power in the minds of many people. (orig./RW) [de

  4. Communication of geo-scientific safety arguments

    International Nuclear Information System (INIS)

    Flavelle, P.; Goodwin, B.; Jensen, M.; Linden, R.; Mazurek, M.; Srivastave, M.; Strom, A.; Sudicky, E.; Voinis, S.

    2007-01-01

    Working Group B addressed the communication of geo-scientific safety arguments through a discussion of practical experience as it related to the methods, types of information and specific arguments found to best communicate geo-scientific concepts and notions of safety with broad audiences including, colleagues, authorities and regulators, political decision makers, academics, and the general public. The following questions were suggested by the programme committee of the AMIGO-2 workshop for discussion by Working Group B with respect to the communication of geo-scientific information and safety arguments: - What is the place of geo-scientific arguments in relation to quantitative and qualitative topics like scenario and FEPs (features, events, processes) assessment, simulated repository evolution, calculated dose or risk impacts, engineering tests of materials, etc., when presenting a safety case to different audiences and with respect to the various stages of the repository programme? (see section 3). - Would we be better off focusing messages to the public on time scales of a few hundred years or a few generations? (see section 4). - How do you handle the fact that geoscience interpretations seldom are unique and data often are open to various interpretations? (see section 5). - How do you handle expert controversy on a specific topic? (see section 6). (authors)

  5. Reactor safety in the Netherlands

    International Nuclear Information System (INIS)

    Eendebak, B.Th.

    1983-01-01

    In this book, the author gives a survey of the most important safety aspects of the construction and operation of nuclear power plants in the Netherlands. It deals with concrete questions like how to choose appropriate sites for power plants; what are the risks for people living in their surroundings; what are the consequences of possible accidents; what to do with the nuclear wastes and what are the conseqences for new generations. For answering these questions, the author has presented a fairly well documented outline of the contemporary problems. So, the book is a useful tool for everybody who wants to become acquainted with the nuclear controversy (G.J.P.)

  6. Controversial Therapies for Young Children with Developmental Disabilities.

    Science.gov (United States)

    Nickel, Robert E.

    1996-01-01

    This article examines reasons parents may choose a controversial alternative treatment for a child with developmental disabilities and reviews a few specific treatments--vitamin B-6 and magnesium, auditory integration training, megavitamins and minerals, Piracetam, intravenous immunoglobulin, and melatonin. Recommendations on talking with families…

  7. Climatic change science, experience and controversies

    International Nuclear Information System (INIS)

    Le Treut, H.; Van Ypersele, J.P.; Hallegatte, St.; Hourcade, J.Ch.

    2004-01-01

    The international scientific community, gathered in the framework of the inter-governmental group for climate evolution (Giec), has confirmed the influence of human activities on climate and on the global warming. However, this diagnosis is sometimes questioned in the press. This book, published by the institute of sustainable development, gathers a series of articles written by scientists who make comments on the last Giec reports and who outline the knowledge gained, the remaining uncertainties and the controversies. (J.S.)

  8. Allocative inefficiency and the capital-energy controversy

    International Nuclear Information System (INIS)

    Christopoulos, Dimitris K.; Tsionas, Efthymios G.

    2002-01-01

    The purpose of the paper is to estimate a system of input demands for Greek manufacturing deviating from the standard practice of assuming strict cost minimization. The study allows for the presence of price distortions and allocative inefficiency in the decision process. This assumption affects parameter estimates and estimated elasticities materially, and throws new light on the capital-energy controversy in Greek manufacturing

  9. Pension Reform Act 2004 and its Controversies: Repeating or ...

    African Journals Online (AJOL)

    Pension Reform Act 2004 and its Controversies: Repeating or Learning from Past Mistakes? ... Journal of Research in National Development ... and discusses how the present pension reform will affect active employees when they retire.

  10. Management of ß-thalassemia – Consensus and controversies!

    Directory of Open Access Journals (Sweden)

    Mamta V. Manglani

    2017-12-01

    Full Text Available The mainstay of treatment of ß-Thalassemia major includes life-long regular packed red cell transfusions and iron chelation. With advances in understanding the molecular biology and its implications in the patients, newer modalities are now being explored to offer a better quality of life to transfusion dependent thalassemic patients. Improved safety of transfusions, newer chelator drugs and combination of chelators have improved outcomes in these patients. Amlodipine along with chelators may be a future option for preventing cardiac iron overload related complications. Drugs which improve HbF levels and thus ameliorate anemia such as hydroxyurea, butyrates azacytidine etc. have also been explored with little relief to transfusion dependent patients. HSCT, which is the only curative treatment available at present, has its own limitations as sibling donors may not be available to many. However, there has been extensive work done on improving outcomes with MUD and Haplo-identical HSCT in the recent times. Gene therapy using lentiviral vectors is also offering great hope to these children. Induced Pluripotent Stem Cells (iPSC is a promising advance in the treatment of thalassemia. Several newer molecules targeting different pathophysiologic aspects are being explored and have met with good success. These include luspatercept, sotatercept, macrophage inhibition, JAK2 inhibition using ruxolitinib etc. Controversies regarding use of wheat grass and ESAs are relatively less worrisome. But use of thalidomide should be done with great caution. Despite its success reported in anecdotal reports, in the absence of adequate data with larger trials, its role in routine management of thalassemia syndromes remains to be ascertained.

  11. The World Congress on Controversies in Breast Cancer (CoBRA in Melbourne, Australia

    Directory of Open Access Journals (Sweden)

    Ilana Rabinoff-Sofer

    2015-03-01

    Full Text Available The World Congress on Controversies in Breast Cancer (CoBRA will take place October 22-24, 2015 in Melbourne, Australia.CoBRA is a concept congress dealing with controversial topics in breast cancer in the format of debates and discussions, allowing ample time for speaker-participant interaction.CLICK HERE for more information

  12. 37 CFR 351.3 - Controversy and further proceedings.

    Science.gov (United States)

    2010-07-01

    ..., the contested amount of a claim is $10,000 or less, the Copyright Royalty Judges shall decide the... CONGRESS COPYRIGHT ROYALTY JUDGES RULES AND PROCEDURES PROCEEDINGS § 351.3 Controversy and further... negotiation period, the Copyright Royalty Judges will issue an order declaring that further proceedings are...

  13. Some diagnostic and therapeutic controversies in glaucoma addressed

    NARCIS (Netherlands)

    Müskens, Rogier Peter Hendrik Maria

    2008-01-01

    In the five studies contained in this thesis, several controversies on the diagnosis of and therapy for glaucoma have been addressed. The first part of this thesis consisted of three studies that aimed tot improve existing technologies for diagnosing glaucoma. The latter part consisted of two

  14. Nuclear Deterrence in Cyber-ia: Challenges and Controversies

    Science.gov (United States)

    2016-09-01

    54 | Air & Space Power Journal Nuclear Deterrence in Cyber-ia Challenges and Controversies © Dr. Stephen J. Cimbala* Disclaimer: The views and...into here. 11. Mazanec, “International Order in Cyberspace,” 83. 12. Joel Brenner, Glass Houses: Privacy , Secrecy, and Cyber Insecurity in a Transparent

  15. Recent developments in intelligent packaging for enhancing food quality and safety.

    Science.gov (United States)

    Sohail, Muhammad; Sun, Da-Wen; Zhu, Zhiwei

    2018-03-07

    The role of packaging cannot be denied in the life cycle of any food product. Intelligent packaging is an emerging technology in the food packaging sector. Although it still needs its full emergence in the market, its importance has been proved for the maintenance of food quality and safety. The present review describes several aspects of intelligent packaging. It first highlights different tools used in intelligent packaging and elucidates the role of these packaging devices for maintaining the quality of different food items in terms of controlling microbial growth and gas concentration, and for providing convenience and easiness to its users in the form of time temperature indication. This review also discusses other intelligent packaging solutions in supply chain management of food products to control theft and counterfeiting conducts and broaden the image of the food companies in terms of branding and marketing. Overall, intelligent packaging can ensure food quality and safety in the food industry, however there are still some concerns over this emerging technology including high cost and legal aspects, and thus future work should be performed to overcome these problems for further promoting its applications in the food industry. Moreover, work should also be carried out to combine several single intelligent packaging devices into a single one, so that most of the benefits from this emerging technology can be achieved.

  16. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories.

  17. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories

  18. Behavioural controversy concerning homo economicus: a Humean perspective

    Directory of Open Access Journals (Sweden)

    Khandakar Elahi

    2014-05-01

    Full Text Available In his monumental masterpiece, A Treatise on Human Nature, which explains the methodology of human reasoning concerning matters of fact and describes the roles that passions and morals play in it, Hume arrives at an enormously interesting maxim: An academic controversy cannot continue for long unless the disputants assign different meanings to the major terms employed in the debate. This theory has been applied in this paper to examine the behavioural criticisms about Homo Economicus (HE, the pivotal perception in the neoclassical microeconomic model.To achieve this objective, the paper discusses the origin and evolution of the concept, reviews behavioural criticisms, summarises the main tenets of Hume’s philosophy of human knowledge and finally examines the behavioural opinions from Hume’s perspective. The paper concludes that Hume’s theory convincingly explains the reason why the HE controversy is continuing for over half century- a fact that both the mainstream and behavioural economists are ignoring.

  19. A hybrid approach to quantify software reliability in nuclear safety systems

    International Nuclear Information System (INIS)

    Arun Babu, P.; Senthil Kumar, C.; Murali, N.

    2012-01-01

    Highlights: ► A novel method to quantify software reliability using software verification and mutation testing in nuclear safety systems. ► Contributing factors that influence software reliability estimate. ► Approach to help regulators verify the reliability of safety critical software system during software licensing process. -- Abstract: Technological advancements have led to the use of computer based systems in safety critical applications. As computer based systems are being introduced in nuclear power plants, effective and efficient methods are needed to ensure dependability and compliance to high reliability requirements of systems important to safety. Even after several years of research, quantification of software reliability remains controversial and unresolved issue. Also, existing approaches have assumptions and limitations, which are not acceptable for safety applications. This paper proposes a theoretical approach combining software verification and mutation testing to quantify the software reliability in nuclear safety systems. The theoretical results obtained suggest that the software reliability depends on three factors: the test adequacy, the amount of software verification carried out and the reusability of verified code in the software. The proposed approach may help regulators in licensing computer based safety systems in nuclear reactors.

  20. Resolving the controversy over beneficial effects of ionizing radiation

    International Nuclear Information System (INIS)

    Cuttler, J.M.

    1999-01-01

    In spite of the extensive research carried out during the past century, intense controversy continues over the health effects of low-level radiation. This controversy is largely due to political, social and economic issues among scientists and analysts in a variety of disciplines. These issues cloud objectivity and strengthen paradigms. Over the past ten years, in 14 universities and two research institutes, Japanese scientists have conducted exceptional research which clearly demonstrates beneficial effects of low-level radiation and cancer cures following therapy with low doses of radiation. Assessment, replication and extension of this work in North America could lead to greater appreciation of its significance. Cancer patients would demand such treatments, leading to universal acceptance of these bio-positive effects and reducing public fear of nuclear technology. (author)