WorldWideScience

Sample records for avoiding confidential statement

  1. 18 CFR 706.410 - Confidentiality of statements.

    Science.gov (United States)

    2010-04-01

    ... EMPLOYEE RESPONSIBILITIES AND CONDUCT Statements of Employment and Financial Interests § 706.410 Confidentiality of statements. Each statement of employment and financial interests, and each supplementary... decision of the Director for good cause shown: Provided, That information from a statement or...

  2. 5 CFR 3902.102 - Employees required to submit FCC Form A54A, “Confidential Supplemental Statement of Employment...

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Employees required to submit FCC Form... REQUIREMENTS FOR EMPLOYEES OF THE FEDERAL COMMUNICATIONS COMMISSION § 3902.102 Employees required to submit FCC... file FCC Form A54A, “Confidential Supplemental Statement of Employment and Financial Interests.”...

  3. 37 CFR 382.14 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 382... Confidential information. (a) Definition. For purposes of this subpart, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of...

  4. 37 CFR 261.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 261... THE MAKING OF EPHEMERAL REPRODUCTIONS § 261.5 Confidential information. (a) For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein,...

  5. 37 CFR 384.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 384... BUSINESS ESTABLISHMENT SERVICES § 384.5 Confidential information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein,...

  6. Computer Security: Printing confidentially

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Have you ever hesitated to print a confidential document using CERN printers? Or perhaps you have rushed quickly to the printer after hitting the “print” button in order to avoid someone else getting hold of and reading your document? These times are over now with the new printing infrastructure!   Indeed, many of us regularly print out confidential documents like our salary slips, MARS forms, tendering documents and drafts of preliminary papers. The upcoming CERN data protection policy will require all of us to respect the confidentiality of such documents and, as the word “confidential” implies, access to “confidential” or sensitive documents will be tightly controlled. What can we do about the public printers located in many buildings, floors and shared spaces - accessible not only to CERN staff and users but also to visitors and guests? Some printers are located in the vicinity of restaurants, cafeterias or close to paths taken b...

  7. 37 CFR 380.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 380... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account and any information contained therein, including the amount of royalty payments,...

  8. 37 CFR 262.5 - Confidential information.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Confidential information. 262... information. (a) Definition. For purposes of this part, “Confidential Information” shall include the statements of account, any information contained therein, including the amount of royalty payments, and...

  9. Confidentiality-Preserving Data Publishing for Credulous Users by Extended Abduction

    CERN Document Server

    Inoue, Katsumi; Wiese, Lena

    2011-01-01

    Publishing private data on external servers incurs the problem of how to avoid unwanted disclosure of confidential data. We study a problem of confidentiality in extended disjunctive logic programs and show how it can be solved by extended abduction. In particular, we analyze how credulous non-monotonic reasoning affects confidentiality.

  10. Confidentiality and personal integrity.

    Science.gov (United States)

    Edgar, A

    1994-06-01

    This paper uses the social theory of Erving Goffman in order to argue that confidentiality should be understood in relation to the mundane social skills by which individuals present and respect specific self-images of themselves and others during social interaction. The breaching of confidentiality is analysed in terms of one person's capacity to embarrass another, and so to expose that person as incompetent. Respecting confidentiality may at once serve to protect the vulnerable from an unjust society, and yet also protect the guilty from just accusation. Ethical reasoning about confidentiality must therefore recognize the dangers of prejudice and violence inherent in decisions to breach or to respect confidentiality. Case studies are used to illustrate the efficacy of this account, culminating with analyses of three examples from the UKCC document Confidentiality.

  11. 40 CFR 22.5 - Filing, service, and form of all filed documents; business confidentiality claims.

    Science.gov (United States)

    2010-07-01

    ... documents; business confidentiality claims. 22.5 Section 22.5 Protection of Environment ENVIRONMENTAL... of all filed documents; business confidentiality claims. (a) Filing of documents. (1) The original... knowledge, information and belief, the statements made therein are true, and that it is not interposed...

  12. 12 CFR 308.177 - Statement of net worth.

    Science.gov (United States)

    2010-01-01

    .... Unaudited financial statements are acceptable unless the administrative law judge or the Board of Directors otherwise requires. Financial statements or reports to a Federal or state agency, prepared before the... proceeding. (c) Statement confidential. Unless otherwise ordered by the Board of Directors or required by...

  13. Ombuds’ corner: Confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.    Jane* came to the Ombuds to share her concerns about the actions of Mike*, one of her senior colleague supervisors, and insisted on the absolute confidentiality. The Ombuds promised to keep the information confidential following the terms of his mandate. During the discussion it appeared that the whole group was affected by the situation, spending a lot of time discussing how to resolve the problem instead of focusing on their main responsibilities. The risks for the Organization seemed very high and could possibly endanger the safety of the operations.  On one side, the Ombuds believed that it was essential to bring this matter to the attention of senior managem...

  14. Cognitive Interference Channels with Confidential Messages under Randomness Constraint

    CERN Document Server

    Watanabe, Shun

    2012-01-01

    The cognitive interference channel with confidential messages (CICC) proposed by Liang et. al. is investigated. When the security is considered in coding systems, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. For the CICC, the trade-off between the rate of the random number to realize the stochastic encoding and the communication rates is investigated, and the optimal trade-off is completely characterized.

  15. Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder

    CERN Document Server

    Watanabe, Shun

    2012-01-01

    In coding schemes for the wire-tap channel or the broadcast channels with confidential messages, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. In this paper, it is investigated that the trade-off between the rate of the random number to realize the stochastic encoding and the rates of the common, private, and confidential messages. For the direct theorem, the superposition coding scheme for the wire-tap channel recently proposed by Chia and El Gamal is employed, and its strong security is proved. The matching converse theorem is also established. Our result clarifies that a combination of the ordinary stochastic encoding and the channel prefixing by the channel simulation is suboptimal.

  16. Detection and Avoidance of SQL Injection Attack In Multi-Tier Web Based Application

    Directory of Open Access Journals (Sweden)

    Ms. S.Raichal

    2013-06-01

    Full Text Available The aim of this paper is to prevent sql injection attack using stored procedure. In SQL injection attack,an attacker might deliver malicious SQL query segments as user input which could effect in a different database request. Using SQL injection attacks, an attacker might thus obtain and modify confidential information. An attacker could even use a SQL injection vulnerability as a basic IP or Port scanner of the internal corporate network. The stored procedure does not permit conditional statement there by the hacker cannot identify the IDs. The stored procedure is the new approach that is executed. Stored procedure avoids the attack which is more secured one where the conditional statements are not permitted. In sql injection input is set as conditional statements and the user can able to login into the website. But in this paper every condition are checked in the procedural language of stored procedure.Once it notices the condition statement the user will be blocked to log into the website. Only the correct form of passwords is acceptable.

  17. Confidentiality in gamete donation

    Directory of Open Access Journals (Sweden)

    Neda Yavari

    2006-03-01

    Full Text Available During recent decades, the third person intervention in human artificial insemination has created new hopes for infertile couples. However these new progresses have propounded new ethical and legal concerns for families. One of them is confidentiality regarding gamete donor's identity, and its disclosure to the future child and others. Of course, negligence to this ethical issue would produce a big barrier for efficient health care services."nFor compiling this article we searched different websites including Pubmed, Ovid, Elsevier, Google and etc and the resulting articles were investigated carefully. "nIn this article, the history of gamete donation in different countries is reviewed initially and the mentioned reasons for anonymity with that of disclosure are compared. "nBecause of the different cultures and values of various societies, it is not justifiable to propose a unique method regarding this issue; however, there have to be clear rules in this regard, in each country. In order to facilitate this process, pretreatment counseling courses should be established to explain different aspects of this issue for the recipients.

  18. Fetal privacy and confidentiality.

    Science.gov (United States)

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  19. Data Confidentiality Challenges in Big Data Applications

    Energy Technology Data Exchange (ETDEWEB)

    Yin, Jian; Zhao, Dongfang

    2015-12-15

    In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure data confidentiality and discuss various techniques to optimize performance of such a system.

  20. Confidential data in a competitive utility environment: A regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Vine, E.

    1996-08-01

    Historically, the electric utility industry has been regarded as one of the most open industries in the United States in sharing information but their reputation is being challenged by competitive energy providers, the general public, regulators, and other stakeholders. As the prospect of competition among electricity power providers has increased in recent years, many utilities have been requesting that the data they submit to their utility regulatory commissions remain confidential. Withholding utility information from the public is likely to have serious and significant policy implications with respect to: (1) consumer education, the pursuit of truth, mutual respect among parties, and social cooperation; (2) the creation of a fair market for competitive energy services; (3) the regulatory balance; (4) regional and national assessments of energy-savings opportunities; (5) research and development; and (6) evaluations of utility programs, plans, and policies. In a telephone survey of all public utility commissions (PUCs) that regulate electric and gas utilities in the U.S., we found that almost all PUCs have received requests from utility companies for data to be filed as confidential, and confidential data filings appear to have increased (both in scope and in frequency) in those states where utility restructuring is being actively discussed. The most common types of data submitted as confidential by utilities dealt with specific customer data, market data, avoided costs, and utility costs.

  1. 7 CFR 983.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 983.65 Section 983.65..., ARIZONA, AND NEW MEXICO Reports, Books and Records § 983.65 Confidential information. All reports and records furnished or submitted by handlers to the committee which include confidential data or...

  2. Confidential patent application with an example of preparation

    Directory of Open Access Journals (Sweden)

    Obrad T. Čabarkapa

    2013-12-01

    is submitted: power of attorney; cofirmation on presenting the invention at an international exhibition; certified copy of the first patent application; statement on the basis of entitlement to file an application; statement by the inventor if he does not want to be mentioned in the patent application; proof of the payment of the patent application fee; statement of a joint representative if there are more applicants. Conclusion In order that a confidential invention receive  patent or petty patent protection, it is necessary to file a patent application. A confidential patent application is a very comprehensive document which has to be compiled with expert knowledge from both the technical field to which the application relates and the field of intellectual property protection. The shown content of the confidential patent application with an example can be useful for inventors in their attempts to draw up their own patent applications. [1] The structure and the content of a confidential patent application  is identical  to the content and the form of a patent application submitted to the Intellectual Property Office,a competent state institution for the protection of intellectual property. 

  3. [Professional confidentiality and the family].

    Science.gov (United States)

    Louvrier, P

    2006-09-01

    The roots of " doctor-patient privilege " or professional confidentiality go back to the Greek island of Cos - Hippocrates' birthplace. The Cos school advocated silence about what the doctor might learn during his visits. In 1868 the Napoleonic Criminal Code sanctioned those who divulged secrets that were entrusted to them by virtue of their profession or estate. The [Belgian medical association's] Code of Professional Ethics extends the bounds of professional confidentiality to include everything that the doctor sees, has knowledge of, learns of, ascertains, discovers, or surprises. Confidentiality as a matter of public policy is relative. It is a tool for the preservation of values, allowing access to health care without fear of divulgation. This leads to possible conflicts of values, conflicts between two duties involving a value that can be protected only to the detriment of another value. The family's rights are specified in Belgium's law on patient's rights, to wit: indirect consultation of the medical file after an individual's death and representation of a patient who is not able to exercise her/his rights her/himself. Silence is nevertheless the rule. The care that an illness calls for generally forces the doctor to make certain disclosures to the patient's family about the state of the illness. This usually goes no farther if the ailment is benign. However, in some sensitive situations (HIV, alcoholism, and divorce), the doctor must bear in mind that the patient may oppose the disclosure of any and all information. A good understanding of the foundations of professional confidentiality, informing the patient, and the doctor's own human qualities should make it possible to get hitherto stalled situations to move forward. The patient remains the doctor's primary focus.

  4. [Confidentiality as ethical responsibility and legal duty].

    Science.gov (United States)

    Arroyo Cordero, Tamara

    2009-01-01

    The article analyzes the challenge that the health professionals encounter when trying to protect their patient's confidentiality, considering the increasing demand for globalization of the information. It discusses the importance that confidentiality has for the therapeutic alliance and how the government has protected it throughout time. It identifies weak areas in the protection of confidentiality, especially in the psychiatry field. Finally, it invites the reader to consider the real benefits of sharing patient's information when deciding whether to brake or not the patient's confidentiality.

  5. 49 CFR 537.12 - Confidential information.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AUTOMOTIVE FUEL ECONOMY REPORTS § 537.12 Confidential information. (a) Information made available under § 537.11 for public inspection does not include information for... 49 Transportation 6 2010-10-01 2010-10-01 false Confidential information. 537.12 Section...

  6. 19 CFR 111.24 - Records confidential.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Records confidential. 111.24 Section 111.24 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS BROKERS Duties and Responsibilities of Customs Brokers § 111.24 Records confidential....

  7. 7 CFR 1220.243 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1220.243 Section 1220.243 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. Except as otherwise provided in the Act, financial or commercial information that...

  8. 7 CFR 1219.63 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1219.63 Section 1219.63 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1219.63 Confidential treatment. (a) All information obtained from the books, records, or reports...

  9. 7 CFR 54.1033 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Confidential treatment. 54.1033 Section 54.1033 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... and Poultry Products § 54.1033 Confidential treatment. Every design review specialist...

  10. 7 CFR 1230.82 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1230.82 Section 1230.82 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1230.82 Confidential treatment. All information obtained from the books, records or reports required...

  11. 7 CFR 1218.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1218.62 Section 1218.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... § 1218.62 Confidential treatment. All information obtained from books, records, or reports under the...

  12. 7 CFR 1212.72 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1212.72 Section 1212.72 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  13. 7 CFR 1205.340 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1205.340 Section 1205.340 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Cotton Research and Promotion Order Reports, Books, and Records § 1205.340 Confidential treatment....

  14. 7 CFR 1207.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1207.352 Section 1207.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PLAN Potato Research and Promotion Plan Reports, Books, and Records § 1207.352 Confidential...

  15. 7 CFR 1221.127 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1221.127 Section 1221.127 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  16. 7 CFR 1206.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1206.62 Section 1206.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act and this...

  17. 7 CFR 1250.354 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1250.354 Section 1250.354 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Research and Promotion Order Reports, Books, and Records § 1250.354 Confidential treatment. (a)...

  18. 7 CFR 1260.203 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1260.203 Section 1260.203 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Promotion and Research Order Reports, Books and Records § 1260.203 Confidential treatment. All...

  19. 7 CFR 1209.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1209.62 Section 1209.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING..., Books and Records § 1209.62 Confidential treatment. All information obtained from books, records,...

  20. 7 CFR 1150.278 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.278 Section 1150.278 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... of Milk Producer Organizations § 1150.278 Confidential treatment. All documents and other...

  1. 7 CFR 1160.403 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1160.403 Section 1160.403 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1160.403 Confidential treatment. (a) All persons, including...

  2. 7 CFR 1150.173 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Confidential treatment. 1150.173 Section 1150.173 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... Order Reports, Books and Records § 1150.173 Confidential treatment. All information obtained from...

  3. 7 CFR 1216.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1216.62 Section 1216.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Confidential treatment. All information obtained from books, records, or reports under the Act, this...

  4. 7 CFR 1215.62 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1215.62 Section 1215.62 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... Records § 1215.62 Confidential treatment. (a) All information obtained from books, records, or...

  5. 15 CFR 806.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Confidentiality. 806.5 Section 806.5 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF ECONOMIC ANALYSIS, DEPARTMENT OF COMMERCE DIRECT INVESTMENT SURVEYS § 806.5 Confidentiality....

  6. 7 CFR 1210.607 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1210.607 Section 1210.607 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... PROMOTION PLAN Referendum Procedures § 1210.607 Confidential information. All ballots cast and...

  7. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73... Handling Reports and Records § 930.73 Confidential information. All reports and records furnished or submitted by handlers to the Board and its authorized agents which include data or information...

  8. 7 CFR 984.79 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 984.79 Section 984.79... Regulating Handling Reports, Books, and Other Records § 984.79 Confidential information. All reports and records submitted by handlers to the Board, which include data or information constituting a trade...

  9. 7 CFR 996.72 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 996.72 Section 996.72... Confidential information. All reports and records furnished or submitted by handlers and importers to USDA which include data or information constituting a trade secret or disclosing a trade position,...

  10. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71... CALIFORNIA Order Regulating Handling Reports and Books and Other Records § 993.71 Confidential information... information constituting a trade secret or disclosing of the trade position, financial condition, or...

  11. 7 CFR 28.960 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Confidential information. 28.960 Section 28.960 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards... Tests § 28.960 Confidential information. No information concerning individual tests under...

  12. 7 CFR 989.75 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 989.75 Section 989.75... GROWN IN CALIFORNIA Order Regulating Handling Reports and Records § 989.75 Confidential information. All... to no person, except the Secretary upon request therefor, data or information obtained or...

  13. 7 CFR 900.309 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.309 Section 900.309... to Agricultural Marketing Agreement Act of 1937, as Amended § 900.309 Confidential information. The... information furnished to, compiled by, or in the possession of the referendum agent, shall be regarded...

  14. 7 CFR 900.407 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.407 Section 900.407... to the Agricultural Marketing Agreement Act of 1937, as Amended § 900.407 Confidential information... voted or the manner in which any person voted) and all information furnished to, compiled by, or...

  15. 7 CFR 900.352 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 900.352 Section 900.352... Determining the Qualification of Cooperative Milk Marketing Associations § 900.352 Confidential information. The documents and other information submitted by an applicant association and otherwise obtained...

  16. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70... WASHINGTON Order Regulating Handling Records and Reports § 982.70 Confidential information. All reports and records furnished or submitted by handlers to the Board, which include data or information constituting...

  17. 7 CFR 929.65 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 929.65 Section 929.65... Confidential information. All reports and records furnished or submitted by handlers to the committee and its authorized agents which include data or information constituting a trade secret or disclosing the...

  18. 7 CFR 932.63 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 932.63 Section 932.63... Regulating Handling Reports and Records § 932.63 Confidential information. All reports and information... any person, other than the Secretary upon request therefor, data, or information obtained or...

  19. Confidentiality in psychotherapy: Some of actual dilemmas

    Directory of Open Access Journals (Sweden)

    Vukosavljević-Gvozden Tatjana D.

    2004-01-01

    Full Text Available The article examines confidentiality principle from different perspectives: as the factor which plays a very important part in developing a productive therapist-client relationship, ethical and, in many countries, legal issue. Ways to maintain confidentiality in therapy are stated, as well as situations in which it is inevitably limited. Three dilemmas concerning confidentiality are explained and discussed. The first is when one should speak and when one should be silent and what we should do when we are in two minds. The second is whether the client should be informed about confidentiality limitations at the very beginning, or when the need arises during the treatment. The third is whether confidentiality limitation (when a client poses a threat to himself or to the society should be legally regulated, as it is being done in many western countries.

  20. 37 CFR 251.32 - Financial disclosure statement.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Financial disclosure... PROCEDURE Standards of Conduct § 251.32 Financial disclosure statement. (a) Within 45 days of their... shall file with the Librarian an updated confidential financial disclosure form or, if there are...

  1. Avoid Logs to Avoid Ticks

    Institute of Scientific and Technical Information of China (English)

    莫文佳

    2004-01-01

    扁虱是莱姆关节炎的罪魁祸首。研究人员为了弄明白何处扁虱最猖獗, 不惜以身作饵,他们发现:The ticks were all over the log surface。因此告诫人 们:Avoid sitting on logs。

  2. Confidentiality in psychological practice: a decrepit concept?

    Science.gov (United States)

    McMahon, M; Knowles, A D

    1995-11-01

    Although the principle of confidentiality in the relationship between psychologists and client has been vaunted, and is emphasised in the Australian Psychological Society's Code of Professional Conduct (the APS code; 1994), the confidentiality of this relationship is circumscribed by the absence of legal protections, the ethical beliefs of psychologists, institutional practices, and the provisions of the APS code itself. Lack of privilege in judicial proceedings, and statutory obligations to report certain types of behaviour, mandate breaches of confidentiality in some circumstances. Ethical beliefs of psychologists may support disclosure, especially where it is believed that there is danger of serious physical harm to the client or others. Multidisciplinary teams and institutional settings require the exchange of information for optimal delivery of services. Recent amendments to the APS code may require disclosure without the client's consent when a client is believed to be suicidal. Such developments, when considered at all, are typically regarded as exceptions to a general obligation of confidentiality. However, discussion of exceptions presupposes agreement on fundamental principle: the significance of, and rationale for, confidentiality in the psychologist-client relationship. It is argued in this paper that the obligation of confidentiality has been assumed rather than vigorously analysed and empirically explored. A critical examination of this obligation is the most appropriate starting point for the rehabilitation of contemporary principles of confidentiality in the psychologist-client relationship.

  3. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy

    Science.gov (United States)

    Xue, Mingfu; Hu, Aiqun; He, Chunlong

    We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

  4. Resonating Statements

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...... of an IT project in a Danish local government spans a two-year time period and demonstrates a double-loop legitimization process. First, resonating statements are produced to localize a national IT initiative to support the specificity of a local government discourse. Second, the resonating statements are used...

  5. Biosafety data as confidential business information.

    Directory of Open Access Journals (Sweden)

    Kaare M Nielsen

    Full Text Available Removal of confidentiality claims on biosafety data is necessary to adhere to standard scientific procedures of quality assurance, to increase transparency, to minimize impacts of conflicts of interests, and ultimately to improve public confidence in GMOs.

  6. THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    SABAU-POPA CLAUDIA DIANA

    2015-07-01

    Full Text Available The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network technology, the medical equipment connected to wifi and the electronic databases. The databases containing medical records were implemented due to automation. Thus, transforming data into medical knowledge contribute to a better understanding of the disease. Due to these factors, the measures taken by the hospital management for this type of risk are adapted to the cyber changes. The hospital objectives aim: the implementation of a robust information system, the early threats identifications and the incident reporting. Neglecting this type of risk can generate financial loss, inability to continue providing health care services for a certain period of time, providing an erroneous diagnosis, medical equipment errors etc. Thus, in a digital age the appropriate risk management for the information security and cyber risk represent a necessity. The main concern of hospitals worldwide is to align with international requirements and obtain credentials in terms of data security from the International Organisation for Standardization, which regulates the management of this type of risk. Romania is at the beginning in terms of concerns regarding the management, avoidance and mitigation of information security, the health system being most highly exposed to its manifestation. The present paper examines the concerns of the health system to the confidentiality of information and cyber security risk and its management arrangements. Thus, a set of key risk indicators is implemented and monitored for 2011-2013, using a user interface, a Dashboard, which acts as an early warning system of the manifestation of the

  7. 13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk Ratings and related Confidential Information. 120.1060 Section 120.1060 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision §...

  8. Making a Difference--The Impact of the Confidential Inquiry into Premature Deaths of People with Learning Disabilities

    Science.gov (United States)

    Heslop, Pauline; Marriott, Anna

    2015-01-01

    The Confidential Inquiry into premature deaths of people with learning disabilities (CIPOLD) was commissioned by the Department of Health in England in 2010 to investigate the avoidable or premature deaths of people with learning disabilities through retrospective reviews of deaths. Both the process of conducting CIPOLD and the findings of the…

  9. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt;

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping...

  10. 12 CFR 978.3 - Request for confidential information.

    Science.gov (United States)

    2010-01-01

    ... shall make all requests for confidential information to a financial regulatory agency, or to a regional... financial regulatory agency. This part and its procedures may be supplemented by a confidentiality agreement between a Bank and a financial regulatory agency....

  11. What Does Confidentiality Inside The Arbitration Mean?

    Directory of Open Access Journals (Sweden)

    Diana - Loredana HOGAŞ

    2014-06-01

    Full Text Available The principle of confidentiality is one of the highlights of the institution of arbitration. Its application is not uniform in the national legislation. The parties to an arbitration agreement may experience various unpleasant situations such as unwanted disclosure of issues they wanted to keep secret, although they had relied on the fact that the private nature of arbitration would protect them from prying eyes and unwanted third parties. In this article we take a brief foray into national and international legislation, analyzing the way in which the principle of confidentiality is applied.

  12. 5 CFR 2634.904 - Confidential filer defined.

    Science.gov (United States)

    2010-01-01

    ... FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Confidential Financial Disclosure... contracting process. The contracting officer should be required to file a confidential financial disclosure... confidential financial disclosure report. Example 3 to paragraph (a)(1). A GS-13 employee at an...

  13. 5 CFR 2634.906 - Review of confidential filer status.

    Science.gov (United States)

    2010-01-01

    ... BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Confidential Financial Disclosure Reports § 2634.906 Review of confidential filer status. The head of each agency, or an officer... confidential financial disclosure report pursuant to this subpart. A decision by the agency head or...

  14. 12 CFR 978.5 - Storage of confidential information.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Storage of confidential information. 978.5 Section 978.5 Banks and Banking FEDERAL HOUSING FINANCE BOARD MISCELLANEOUS FEDERAL HOME LOAN BANK... confidential information and maintaining its confidentiality, as a part of its internal audit process....

  15. 22 CFR 130.15 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ..., confidential business information means commercial or financial information which by law is entitled to... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Confidential business information. 130.15... CONTRIBUTIONS, FEES AND COMMISSIONS § 130.15 Confidential business information. (a) Any person who is...

  16. On the Drafting of Confidentiality Agreements

    DEFF Research Database (Denmark)

    Drewsen, Merete; Lando, Henrik; Cummins, Tim

    2006-01-01

    IACCM (International Association for Contract and Commercial Management) has initiated. The main theoretical aspect of the article concerns the application of the value maximization principle (the Coase theorem) to the drafting of confidentiality agreements. While the article is not theoretical, its...... prescriptions are open to theoretical dispute; this may especially be the case for the section on the size of damages....

  17. 42 CFR 93.108 - Confidentiality.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Confidentiality. 93.108 Section 93.108 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH ASSESSMENTS AND HEALTH EFFECTS STUDIES OF HAZARDOUS SUBSTANCES RELEASES AND FACILITIES PUBLIC HEALTH SERVICE POLICIES ON...

  18. 7 CFR 1210.352 - Confidential treatment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential treatment. 1210.352 Section 1210.352 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING... treatment. (a) All information obtained from the books, records, or reports required to be maintained...

  19. 7 CFR 1219.108 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Confidential information. 1219.108 Section 1219.108 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE HASS AVOCADO PROMOTION,...

  20. 7 CFR 987.67 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 987.67 Section 987.67... information. All data or other information constituting a trade secret or disclosing a trade position or... the Committee and information which would reveal the circumstances of a single handler shall...

  1. Confidentiality of Accounting Academics: Consequences of Nonconformity

    Science.gov (United States)

    Amponsah, Emmanuel B.; Boateng, Peter Agyekum; Onuoha, Luke N.

    2016-01-01

    This paper examined ways by which nonconformity to confidentiality among accounting academics could lead to increased-recruitment-and-legal-costs to their employing universities in Ghana that offered accounting degree programmes. With a cross-sectional design, data collected from 1,225 accountants analysed via Cronbach's alpha,…

  2. Teachers Avoiding Learners' Avoidance: Is It Possible?

    Science.gov (United States)

    Tadayyon, Maedeh; Zarrinabadi, Nourollah; Ketabi, Saeed

    2016-01-01

    Dealing with learners who prefer to take the back seat and avoid classroom participation can be every teacher's nightmare. This lack of participation may cause teacher frustration, and possibly the only way to reduce this lack of participation is to access the concept of avoidance strategy. Avoidance strategy is the abandonment of a classroom task…

  3. Data Confidentiality in Mobile Ad hoc Networks

    CERN Document Server

    Aldabbas, Hamza; Janicke, Helge; Al-Bayatti, Ali; 10.5121/ijwmn.2012.4117

    2012-01-01

    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nod...

  4. Confidentiality and Security in Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Papanaga

    2008-11-01

    Full Text Available Behind the technologies Medical System contains different types of information including patient information also. The patient data is classified as confidential and is one of the patient rights based on World Health Organization declaration. There are several compromises in solutions selection based on hardware and software requirements, performance, usability, portability. This article presents the investigation results and proposes the secured solution principles for the medical system that deal with patient data.

  5. 16 CFR 801.90 - Transactions or devices for avoidance.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Transactions or devices for avoidance. 801.90 Section 801.90 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... Transactions or devices for avoidance. Any transaction(s) or other device(s) entered into or employed for...

  6. Data Confidentiality in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Hamza Aldabbas

    2012-03-01

    Full Text Available Mobile ad hoc networks (MANETs are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2 to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs, as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

  7. Practical State Machine Replication with Confidentiality

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Haibin [University of North Carolina, Chapel Hill

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography, while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.

  8. 3-Receiver Broadcast Channels with Common and Confidential Messages

    CERN Document Server

    Chia, Yeow-Khiang

    2009-01-01

    Achievable secrecy rate regions for the general 3-receiver broadcast channel with one common and one confidential message sets are established. We consider two setups: (i) when the confidential message is to be sent to two of the receivers and the third receiver is an eavesdropper; and (ii) when the confidential message is to be sent to one of the receivers and the other two receivers are eavesdroppers. We show that our secrecy rate regions are optimum for some special cases.

  9. 76 FR 77816 - Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...

    Science.gov (United States)

    2011-12-14

    ... AGENCY Access to Confidential Business Information by Guident Technologies, Inc. and Subcontractor...: EPA has authorized its contractor, Guident Technologies, Inc. of Herndon, VA and subcontractor, Impact... to be Confidential Business Information (CBI). DATES: Access to the confidential data will occur...

  10. 75 FR 78238 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2010-12-15

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of San Diego... determined to be Confidential Business Information (CBI). DATES: Access to the confidential data...

  11. 76 FR 9012 - Access to Confidential Business Information by Electronic Consulting Services, Inc.

    Science.gov (United States)

    2011-02-16

    ... AGENCY Access to Confidential Business Information by Electronic Consulting Services, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Electronic... determined to be Confidential Business Information (CBI). DATES: Access to the confidential data will...

  12. 5 CFR 2634.901 - Policies of confidential financial disclosure reporting.

    Science.gov (United States)

    2010-01-01

    ... GOVERNMENT ETHICS EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Confidential Financial Disclosure Reports § 2634.901 Policies of confidential financial disclosure reporting... financial disclosure to complement the Act's system of public disclosure. The confidential reports...

  13. Leaking confidential Information by non-malicious User Behavior in Enterprise Systems - An Empirical Study : 6. Mediterranean Conference on Information Systems (MCIS 2011)

    NARCIS (Netherlands)

    Hadasch, Frank; Mueller, Benjamin; Mädche, Alexander

    2011-01-01

    Information assets of enterprises are vulnerable to theft and need to be protected to avoid information leakage to unauthorized parties. Technical countermeasures to protect confidential information fall to short, as information leaks can emerge from non-malicious behavior of users while they execut

  14. 26 CFR 1.533-2 - Statement required.

    Science.gov (United States)

    2010-04-01

    ...) INCOME TAXES (CONTINUED) Corporations Used to Avoid Income Tax on Shareholders § 1.533-2 Statement... shareholders, the amounts that would be payable to each of the shareholders if the income of the...

  15. Research On Preserving User Confidentiality In Cloud Computing – Design Of A Confidentiality Framework

    Directory of Open Access Journals (Sweden)

    Harish Chennamsetty

    2016-09-01

    Full Text Available Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service is stored (or offered outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.

  16. Enhance Confidentiality of Threshold Signature for MANET

    Institute of Scientific and Technical Information of China (English)

    GUO Wei; XIONG Zhongwei

    2006-01-01

    The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.

  17. 25 CFR 700.837 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Confidentiality of archaeological resource information... specific archaeological resource or area about which information is sought. (2) The purpose for which the... AND RELOCATION PROCEDURES New Lands Grazing § 700.837 Confidentiality of archaeological...

  18. 43 CFR 7.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-10-01

    ... ARCHAEOLOGICAL RESOURCES Uniform Regulations § 7.18 Confidentiality of archaeological resource information. (a... request for information, concerning the archaeological resources within the requesting Governor's State... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Confidentiality of archaeological...

  19. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ... business information (e.g., discussion of trends) will be treated as confidential business information only... business information shall be addressed to the Secretary, United States International Trade Commission, 500... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information. 201.6...

  20. 38 CFR 17.501 - Confidential and privileged documents.

    Science.gov (United States)

    2010-07-01

    ... were produced by or for the VA in the process of conducting systematic healthcare reviews for the purpose of improving the quality of health care or improving the utilization of healthcare resources in VA... AFFAIRS MEDICAL Confidentiality of Healthcare Quality Assurance Review Records § 17.501 Confidential...

  1. 49 CFR 511.66 - Confidential business information.

    Science.gov (United States)

    2010-10-01

    ... in Cases of Violation of Average Fuel Economy Standards § 511.66 Confidential business information... 49 Transportation 6 2010-10-01 2010-10-01 false Confidential business information. 511.66 Section... view information in support of a petition for settlement which has been determined to be...

  2. 10 CFR 207.4 - Confidentiality of energy information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Confidentiality of energy information. 207.4 Section 207.4 Energy DEPARTMENT OF ENERGY OIL COLLECTION OF INFORMATION Collection of Information Under the Energy Supply and Environmental Coordination Act of 1974 § 207.4 Confidentiality of energy information....

  3. 24 CFR 401.312 - Confidentiality of information.

    Science.gov (United States)

    2010-04-01

    ... PROGRAM (MARK-TO-MARKET) Participating Administrative Entity (PAE) and Portfolio Restructuring Agreement (PRA) § 401.312 Confidentiality of information. A PAE and every other restricted person (as defined in... used in this section, confidential information means information that a PAE or other restricted...

  4. 50 CFR 600.130 - Protection of confidentiality of statistics.

    Science.gov (United States)

    2010-10-01

    ... statistics. 600.130 Section 600.130 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL... Fishery Management Councils § 600.130 Protection of confidentiality of statistics. Each Council must establish appropriate procedures for ensuring the confidentiality of the statistics that may be submitted...

  5. 18 CFR 1312.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Confidentiality of archaeological resource information. 1312.18 Section 1312.18 Conservation of Power and Water Resources TENNESSEE VALLEY AUTHORITY PROTECTION OF ARCHAEOLOGICAL RESOURCES: UNIFORM REGULATIONS § 1312.18 Confidentiality...

  6. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  7. Ombuds’ corner: Open door and confidentiality

    CERN Multimedia

    Vincent Vuillemin

    2013-01-01

    For the Open Days, CERN will be transparent for all visitors. It's also the occasion to remember that the Ombuds' door is fully open every day of the year for all persons working for or on behalf of CERN.   The door is open, but as soon as it's closed for a discussion, the office becomes a place where total confidentiality is preserved. This may appear as a contradiction, no? The Ombuds is available to help everyone in all circumstances, but his clause of confidentiality prevents him from acting without the consent of his “visitors”. How can he possibly resolve the in-house conflicts in groups, or units, if all the parties do not voluntarily participate in its resolution? The answer is clear: the job of the Ombuds is to help the parties resolve their conflict by themselves. He will provide a few rules of communication, a process of mutual respect, suggest some possibilities that the parties may want to follow, and mediate the dispute so that people...

  8. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be sent to...

  9. Confidential Declaration of Family Situation (CDFS)

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Confidential Declaration of Family Situation (CDFS) becomes a new computerized EDH form from October 2005 In accordance with Article R IV 1.17 of the Staff Regulations, Staff Members and Fellows, married or separated, must notify any changes in their spouse's income or health insurance cover in writing to CERN, within 30 calendar days of the change. This is necessary for the Organization to determine if a supplementary contribution is payable to the CERN Health Insurance Scheme (CHIS) for the spouse's coverage and, if so, the amount. Until now a paper form called « Confidential Declaration of Family Situation » (CDFS) was used for that purpose.  From early October 2005 the CDFS will be computerized for the whole Organization. Henceforth, any changes in a spouse's income or health insurance cover must be notified using EDH (Electronic Document Handling). Additionally, annual updates of the declaration will be required and will be requested by automatic e-mail. Early October an email will be...

  10. Position Statement On Climate Change.

    Science.gov (United States)

    2016-05-01

    The North Carolina Environmental Justice Network (NCEJN), a coalition of grassroots organizations, developed a statement to explain our environmental justice perspective on climate change to predominantly white environmental groups that seek to partner with us. NCEJN opposes strategies that reduce greenhouse emissions while maintaining or magnifying existing social, economic, and environmental injustices. Wealthy communities that consume a disproportionate share of resources avoid the most severe consequences of their consumption by displacing pollution on communities of color and low income. Therefore, the success of climate change activism depends on building an inclusive movement based on principles of racial, social and economic justice, and self-determination for all people.

  11. Avoiding health information.

    Science.gov (United States)

    Barbour, Joshua B; Rintamaki, Lance S; Ramsey, Jason A; Brashers, Dale E

    2012-01-01

    This study investigated why and how individuals avoid health information to support the development of models of uncertainty and information management and offer insights for those dealing with the information and uncertainty inherent to health and illness. Participants from student (n = 507) and community (n = 418) samples reported that they avoided health information to (a) maintain hope or deniability, (b) resist overexposure, (c) accept limits of action, (d) manage flawed information, (e) maintain boundaries, and (f) continue with life/activities. They also reported strategies for avoiding information, including removing or ignoring stimuli (e.g., avoiding people who might provide health advice) and controlling conversations (e.g., withholding information, changing the subject). Results suggest a link between previous experience with serious illness and health information avoidance. Building on uncertainty management theory, this study demonstrated that health information avoidance is situational, relatively common, not necessarily unhealthy, and may be used to accomplish multiple communication goals.

  12. Statement on Human Cloning

    Science.gov (United States)

    ... for the Advancement of Science Statement on Human Cloning Tweet The American Association for the Advancement of ... for this statement on human cloning. Ban Reproductive Cloning AAAS endorses a legally enforceable ban on efforts ...

  13. Financial Statements Analysis

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  14. Financial Statements Analysis

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-10-01

    Full Text Available This article focuses on analyzing of a consolidated financial statements of a hypothetically SME. The interpretation of the financial position and performances is based on the more than 40 financial key ratios computed by using financial data from consolidated income statement, consolidated financial position and cash flow. However additional data from notes to financial statements are provided.

  15. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  16. Confidentiality versus duty to inform--an empirical study on attitudes towards the handling of genetic information.

    Science.gov (United States)

    Wolff, Katharina; Brun, Wibecke; Kvale, Gerd; Nordin, Karin

    2007-01-15

    We set out to investigate whether potential relatives want to be informed about the existence of hereditary conditions within their family and under which conditions they want healthcare providers to breach confidentiality to inform them. We hypothesized that the willingness to be informed about a hereditary condition in the family would be influenced by characteristics of the disease and by individual characteristics. Surveys were administered to a Norwegian random sample (N = 2,400) to a Swedish random sample (N = 1,200), and to a Norwegian student sample (n = 607). Eight different disease scenarios were constructed, systematically varying three disease characteristics: fatality, penetrance, and availability of treatment. Results show that a majority of participants wished to be informed about the existence of a hereditary disease within their family. The desire to be informed and the acceptability of breaches of confidentiality were predicted by the treatability of the disease, uncertainty avoidance, and age, but not by self-efficacy or worry.

  17. Bird Avoidance Model

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is an unpublished report on the bird avoidance model to predict bird strike hazards with low flying aircraft. Included is peak periods for different species of...

  18. Avoiding Computer Viruses.

    Science.gov (United States)

    Rowe, Joyce; And Others

    1989-01-01

    The threat of computer sabotage is a real concern to business teachers and others responsible for academic computer facilities. Teachers can minimize the possibility. Eight suggestions for avoiding computer viruses are given. (JOW)

  19. Confidentiality, disclosure and doping in sports medicine.

    Science.gov (United States)

    McNamee, M; Phillips, N

    2011-03-01

    The manner in which healthcare and medical professionals serve their athlete patients is governed by a variety of relevant codes of conduct. A range of codified rules is presented that refer both the welfare of the patient and the maintaining of confidentiality, which is at the heart of trustworthy relations. The 2009 version of the World Anti-Doping Code (WADC), however, appears to oblige all healthcare professionals not to assist athletes if they are known to be engaged in doping behaviours under fear of removal from working with athletes from the respective sports. In contrast, serving the best interests of their athlete patients may oblige healthcare professionals to give advice and guidance, not least in terms of harm minimisation. In so far as the professional conduct of a healthcare professional is guided both by professional code and World Anti-Doping Code, they are obliged to fall foul of one or the other. We call for urgent and pressing inter-professional dialogue with the World Anti-Doping Agency to clarify this situation.

  20. Color-avoiding percolation

    CERN Document Server

    Krause, Sebastian M; Zlatić, Vinko

    2016-01-01

    Many real world networks have groups of similar nodes which are vulnerable to the same failure or adversary. Nodes can be colored in such a way that colors encode the shared vulnerabilities. Using multiple paths to avoid these vulnerabilities can greatly improve network robustness. Color-avoiding percolation provides a theoretical framework for analyzing this scenario, focusing on the maximal set of nodes which can be connected via multiple color-avoiding paths. In this paper we extend the basic theory of color-avoiding percolation that was published in [Krause et. al., Phys. Rev. X 6 (2016) 041022]. We explicitly account for the fact that the same particular link can be part of different paths avoiding different colors. This fact was previously accounted for with a heuristic approximation. We compare this approximation with a new, more exact theory and show that the new theory is substantially more accurate for many avoided colors. Further, we formulate our new theory with differentiated node functions, as s...

  1. About AGU Statement

    Science.gov (United States)

    Landau, Elizabeth

    2010-07-01

    AGU occasionally releases statements on relevant science policy issues that affect our members. The purpose of these statements is to support the global community of Earth and space scientists by providing relevant information to members, policy makers, and the public. We encourage our members to share and discuss this information with others as one way to engage in science outreach and expand scientific discourse. Statements are written with collaboration between AGU member experts along with AGU leadership and staff. Seismologists who work internationally participated in the writing of the accompanying statement. Comments are welcome.

  2. 77 FR 65177 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-10-25

    ...''), representing the data hosting and cloud computing industry, in relevant part expressed a general concern with... regulatory framework for swaps and security-based swaps.\\2\\ The legislation was enacted to reduce risk... Chairman of the CFTC and the Chairman of the Securities and Exchange Commission (``Chairmen'')...

  3. 77 FR 26709 - Swap Data Repositories: Interpretative Statement Regarding the Confidentiality and...

    Science.gov (United States)

    2012-05-07

    ... Internal Markets and Services,\\13\\ highlighting their desire for international cooperation. In the letter... Commissioner for Internal Markets and Services, European Commission, dated June 8, 2011. On September 1, 2011... international approach to the registration and regulation of SDRs, and consulted extensively with...

  4. Can you keep a secret? Confidentiality in psychotherapy.

    Science.gov (United States)

    Younggren, Jeffrey N; Harris, Eric A

    2008-05-01

    Confidentiality is the secret-keeping duty that arises from the establishment of the professional relationship psychologists develop with their clients. It is a duty created by the professional relationship, it is set forth in the American Psychological Association's (2002) Ethical Principles and Code of Conduct, and it is codified in many state regulations. However, the difference between confidentiality and legal privilege; how, why, and when it can be violated; and the reasons for so doing are not well understood by many practitioners. While on the surface confidentiality might seem to be an easy concept to apply to professional practice, in fact it is quite complex and filled with exceptions that frequently differ from circumstance to circumstance and from state to state. A lack of respect for and a lack of familiarity with the significance of these exceptions could have dire professional consequences. This article reviews the ethical imperative of confidentiality and then provides examples of legal cases that help to better understand its complexity. Then, we offer strategies designed to help metal health practitioners when they are confronted with questions regarding confidentiality and privilege.

  5. Computer Security: confidentiality is everybody’s business

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Recently, a zip file with confidential information was mistakenly made public on one of CERN’s websites. Although the file was only intended for members of an internal committee, when placing it onto the CERN website, someone made a mistake when setting the access permissions and, thus, made the file accessible to everyone visiting the site!   Unfortunately, this is but one example of such mistakes. We have seen other documents made accessible to a much wider audience than originally intended… CERN takes serious measures to ensure the confidentiality of data. Confidential or “sensitive” documents (following the nomenclature set out in the CERN Data Protection Policy) deserve professional handling and access protections given only to the people who really need to access them. As such, they must not be widely circulated as attachments in e-mails and, most definitely, must not be stored on random public websites for the sole purpose of shari...

  6. 76 FR 10360 - Access to Confidential Business Information by Guident Technologies Inc. and Its Identified...

    Science.gov (United States)

    2011-02-24

    ... AGENCY Access to Confidential Business Information by Guident Technologies Inc. and Its Identified... contractor, Guident Technologies, Inc. of Herndon, VA and Its Identified Subcontractors, to access...). Some of the information may be claimed or determined to be Confidential Business Information...

  7. 77 FR 76028 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2012-12-26

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and... (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Science Applications International... (TSCA). Some of the information may be claimed or determined to be Confidential Business...

  8. 75 FR 70235 - Access to Confidential Business Information by Industrial Economics, Incorporated

    Science.gov (United States)

    2010-11-17

    ... AGENCY Access to Confidential Business Information by Industrial Economics, Incorporated AGENCY... will authorize its contractor, Industrial Economics, Incorporated (IEc) to access Confidential Business..., Industrial Economics, Incorporated (IEc) will assist the Office of Enforcement and Compliance...

  9. 77 FR 69585 - Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations for...

    Science.gov (United States)

    2012-11-20

    ... AGENCY 40 CFR Part 98 Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality... rule titled ``Greenhouse Gas Reporting Program: Proposed Amendments and Confidentiality Determinations... is (202) 566- 1742. FOR FURTHER INFORMATION CONTACT: Carole Cook, Climate Change Division, Office...

  10. 49 CFR Appendix A to Part 512 - Certificate in Support of Request for Confidentiality

    Science.gov (United States)

    2010-10-01

    ...) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION CONFIDENTIAL BUSINESS... business to release the information for which a claim of confidentiality has been made to ascertain whether... of my knowledge, information and belief, the information for which (company) has claimed...

  11. On partitions avoiding right crossings

    CERN Document Server

    Yan, Sherry H F

    2011-01-01

    Recently, Chen et al. derived the generating function for partitions avoiding right nestings and posed the problem of finding the generating function for partitions avoiding right crossings. In this paper, we derive the generating function for partitions avoiding right crossings via an intermediate structure of partial matchings avoiding 2-right crossings and right nestings. We show that there is a bijection between partial matchings avoiding 2-right crossing and right nestings and partitions avoiding right crossings.

  12. 78 FR 66697 - Access to Confidential Business Information by Science Applications International Corporation and...

    Science.gov (United States)

    2013-11-06

    ... AGENCY Access to Confidential Business Information by Science Applications International Corporation and...: EPA has authorized its contractor, Science Applications International Corporation (SAIC) of McLean, VA... Confidential Business Information (CBI). DATES: Access to the confidential data occurred on or about August...

  13. 43 CFR 20.203 - Exclusion from confidential financial disclosure requirement for certain special Government...

    Science.gov (United States)

    2010-10-01

    ... § 20.203 Exclusion from confidential financial disclosure requirement for certain special Government... reporting requirements of the OGE Form 450. Any confidential financial disclosure requirement must be... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Exclusion from confidential...

  14. 45 CFR 5.65 - Exemption four: Trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-10-01

    ... be expected if the information is disclosed? (c) Designation of certain confidential information. A... Exemption four: Trade secrets and confidential commercial or financial information. We will withhold trade... confidential. (a) Trade secrets. A trade secret is a secret, commercially valuable plan, formula, process,...

  15. Confidencialidad e intimidad Confidentiality and privacy

    Directory of Open Access Journals (Sweden)

    M. Iraburu

    2006-01-01

    patients frequently continues to be violated, perhaps because we live in a society that trivialises these questions, and the health milieu is not immune to this way of thinking. Besides, the new information technologies have added a new danger by enormously facilitating access to personal data. This article reviews the ethical and legal aspects of this issue, the results of research carried out on the way the professionals of eight Spanish hospitals deal with confidentiality, and some recommendations are outlined in an attempt to encourage reflection by the professionals who interact in a scenario where the patient is obliged to lay himself bare in body and soul.

  16. Decisions about Confidentiality in Medical Student Mental Health Settings.

    Science.gov (United States)

    Lindenthal, Jacob Jay; And Others

    1984-01-01

    Examined responses of psychologists and psychiatrists in medical schools (N=59) to vignettes representing student problems. Results suggested practitioners were generally unwilling to break confidentiality in response to problems involving suicidal tendencies, sexual coercion/seduction, social transgressions, or falsifying data. Only suggestions…

  17. 36 CFR 296.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-07-01

    ... archaeological resource information. 296.18 Section 296.18 Parks, Forests, and Public Property FOREST SERVICE... Confidentiality of archaeological resource information. (a) The Federal land manager shall not make available to... provision of law, information concerning the nature and location of any archaeological resource, with...

  18. 32 CFR 229.18 - Confidentiality of archaeological resource information.

    Science.gov (United States)

    2010-07-01

    ... § 229.18 Confidentiality of archaeological resource information. (a) The Federal land manager shall not... provision of law, information concerning the nature and location of any archaeological resource, with the... archaeological resource or area about which information is sought; (ii) The purpose for which the information...

  19. 48 CFR 1552.227-76 - Project employee confidentiality agreement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Project employee confidentiality agreement. 1552.227-76 Section 1552.227-76 Federal Acquisition Regulations System ENVIRONMENTAL... electrical services, provisions which shall conform substantially to the language of this clause,...

  20. Effective verification of confidentiality for multi-threaded programs

    NARCIS (Netherlands)

    Ngo, Minh Tri; Stoelinga, Mariëlle; Huisman, Marieke

    2014-01-01

    This paper studies how confidentiality properties of multi-threaded programs can be verified efficiently by a combination of newly developed and existing model checking algorithms. In particular, we study the verification of scheduler-specific observational determinism (SSOD), a property that charac

  1. Zerber: r-Confidential Indexing for Distributed Documents

    NARCIS (Netherlands)

    Zerr, Sergej; Demidova, Elena; Olmedilla, Daniel; Nejdl, Wolfgang; Winslett, Marianne; Mitra, Soumyadeb

    2008-01-01

    Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008). Zerber: r-Confidential Indexing for Distributed Documents. In J. Teubner (Eds.), Proceedings of the 11th International Conference on Extending Database Technology (pp. 287-298). March, 25-29, 2008, Nantes, France.

  2. 15 CFR 295.9 - Protection of confidential information.

    Science.gov (United States)

    2010-01-01

    ... confidential basis in connection with the activities of any business or joint research and development venture...) Information on the business operation of any member of the business or joint venture; (2) Trade secrets possessed by any business or any member of the joint venture....

  3. 40 CFR 144.5 - Confidentiality of information.

    Science.gov (United States)

    2010-07-01

    ... Section 144.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER PROGRAMS... submissions, by stamping the words “confidential business information” on each page containing such... which deals with the existence, absence, or level of contaminants in drinking water....

  4. 48 CFR 1415.207-71 - Confidentiality of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... the Government for evaluation or advice shall be approved in writing by the HCA; (2) Outside... proposal evaluation. 1415.207-71 Section 1415.207-71 Federal Acquisition Regulations System DEPARTMENT OF... Receipt of Proposals and Information 1415.207-71 Confidentiality of proposal evaluation. (a)...

  5. [Confidentiality in medical oaths: (When the white crow becomes gray...)].

    Science.gov (United States)

    Gelpi, R J; Pérez, M L; Rancich, A M; Mainetti, J A

    2000-01-01

    Confidentiality, together with the ethical principles of beneficence and non-maleficence, is the most important rule in Medical Oaths at the present time. However, the scientific-technical advances in medicine have made this rule one of the most controversial ones because of its exceptions. In consequence, the aim of the present paper is to comparatively analyze the rule of confidentiality in Medical Oaths of different places, times, origins and in different versions of the Hippocratic Oath in order to determine what should be kept a secret and with what degree of commitment (absolute or "prima facie"). Of the thirty six analyzed Oaths, twenty-seven manifest this rule and nine do not. No relation was found between the manifestation of this rule and the place, time, origin and different versions of the Hippocratic Oath. Most pledges suggest not to reveal what has been seen or heard during the medical act, the same as in the Hippocratic Oath. Seven texts point out that confidentiality should be absolute and four give exceptions in connection with beneficence and justice principles and the moral duty of causing no damage to third parties. Two pledges specify protection of privacy. In conclusion, today confidentiality is considered to be a moral duty for the benefit of the patient and out of consideration for his autonomy; however, at the present time in medicine the duty of keeping absolute secrecy is being reconsidered.

  6. 15 CFR 30.60 - Confidentiality of Electronic Export Information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Confidentiality of Electronic Export Information. 30.60 Section 30.60 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade BUREAU OF THE CENSUS, DEPARTMENT OF COMMERCE FOREIGN TRADE REGULATIONS General Administrative...

  7. 50 CFR 229.11 - Confidential fisheries data.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Confidential fisheries data. 229.11 Section 229.11 Wildlife and Fisheries NATIONAL MARINE FISHERIES SERVICE, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS AUTHORIZATION FOR COMMERCIAL FISHERIES UNDER THE...

  8. Secondary School Administrators' Attitudes toward Confidentiality in School Counseling

    Science.gov (United States)

    O'Connell, William P.

    2012-01-01

    The school counseling literature emphasizes the importance of confidentiality in the counseling relationship. In some circumstances, school policy may require disclosure of content discussed in counseling unrelated to threat of harm to self or others. This pilot study investigated secondary school principals' attitudes toward the practice of…

  9. 18 CFR 1b.20 - Request for confidential treatment.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Request for confidential treatment. 1b.20 Section 1b.20 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... disclosure requirements of the Freedom of Information Act (5 U.S.C. 552), is information referred to in 18...

  10. 18 CFR 1b.9 - Confidentiality of investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Confidentiality of investigations. 1b.9 Section 1b.9 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... Freedom of Information Act disclosure are set forth in 18 CFR part 3b and § 1b.20. A request...

  11. Farm and Ranch Financial Statements

    OpenAIRE

    Israelsen, Clark; Feuz, Dillon

    2014-01-01

    This fact sheet is a brief overview of the financial statements and budgeting tools that are likely a part of most farm financial record keeping systems. Links are provided for additional detail on any one financial report or topic. A brief description of a Balance Sheet, a Profit Loss Statement or Income Statement, Statement of Cash Flows and Enterprise Analysis is included.

  12. Public expectations concerning confidentiality protection of adolescents' sexual and reproductive health care in Lithuania

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Lazarus, Jeffrey Victor

    2014-01-01

    OBJECTIVE: An adolescent's right to confidential healthcare is protected by international law and professional consensus. However, parental and social support for confidential sexual and reproductive health (SRH) services, in particular, varies greatly. This study documents Lithuanian residents...... for confidentiality using a five-point Likert scale for eight types of SRH consultations. RESULTS: Public anticipation for confidentiality depended on whether issues related to sexual behaviour or to its consequences were addressed during adolescent consultation. Only younger respondents had higher expectations...... or a sexually transmitted infection. This implies a need for targeted information strategies for the general population and explicit guidance for physicians on when and for whom care should remain confidential....

  13. Data security and patient confidentiality: the manager's role.

    Science.gov (United States)

    Fisher, F; Madge, B

    1996-10-01

    The maintenance of patient confidentiality is of utmost importance in the doctor patient relationship. With the advent of networks such as the National Health Service Wide Area Network in the UK, the potential to transmit identifiable clinical data will become greater. Links between general practitioners (GPs) and hospitals will allow the rapid transmission of data which if intercepted could be potentially embarrassing to the patient concerned. In 1994 the British Medical Association launched a draft bill on privacy and confidentiality and in association with this bill it is pushing for encryption of all clinical data across electronic networks. The manager's role within an acute hospital, community units and general practice, is to ensure that all employees are aware of the principles of data protection, security of hospital computer systems and that no obvious breaches of security can occur at publicly accessible terminals. Managers must be kept up to date with the latest developments in computer security such as digital signatures and be prepared to instigate these developments where practically possible. Managers must also take responsibility for the monitoring of access to terminals and be prepared to deal severely with staff who breach the code of confidentiality. Each manager must be kept informed of employees status with regard to their 'need to know' clearance level and also to promote confidentiality of patient details throughout the hospital. All of the management team must be prepared to train new staff in the principles of data security as they join the organisation and recognise their accountability if the programme fails. Data security and patient confidentiality is a broad responsibility in any healthcare organisation, with the Chief Executive accountable. In family practice, the partners are responsible and accountable. The British Medical Association believes as a matter of policy, that allowing access to personal health data without the patients

  14. Predicting attention and avoidance: when do avoiders attend?

    Science.gov (United States)

    Klein, Rupert; Knäuper, Bärbel

    2009-09-01

    Three avoidance measures, the Miller Behavioural Style Scale (MBSS), Index of Self-Regulation of Emotion (ISE) and Mainz Coping Inventory (MCI), were compared in their ability to predict attention and avoidance of threats in the emotional Stroop task. It was also examined if the avoidance mechanism of individuals who would normally avoid threat-indicating words becomes disrupted under conditions of dopamine reduction. Results show that only the ISE predicted attention/avoidance of threat-indicating words. In addition, the avoidance mechanism, as measured by the ISE and MCI, was not activated when regular smokers abstained from smoking.

  15. Avoidable waste management costs

    Energy Technology Data Exchange (ETDEWEB)

    Hsu, K.; Burns, M.; Priebe, S.; Robinson, P.

    1995-01-01

    This report describes the activity based costing method used to acquire variable (volume dependent or avoidable) waste management cost data for routine operations at Department of Energy (DOE) facilities. Waste volumes from environmental restoration, facility stabilization activities, and legacy waste were specifically excluded from this effort. A core team consisting of Idaho National Engineering Laboratory, Los Alamos National Laboratory, Rocky Flats Environmental Technology Site, and Oak Ridge Reservation developed and piloted the methodology, which can be used to determine avoidable waste management costs. The method developed to gather information was based on activity based costing, which is a common industrial engineering technique. Sites submitted separate flow diagrams that showed the progression of work from activity to activity for each waste type or treatability group. Each activity on a flow diagram was described in a narrative, which detailed the scope of the activity. Labor and material costs based on a unit quantity of waste being processed were then summed to generate a total cost for that flow diagram. Cross-complex values were calculated by determining a weighted average for each waste type or treatability group based on the volume generated. This study will provide DOE and contractors with a better understanding of waste management processes and their associated costs. Other potential benefits include providing cost data for sites to perform consistent cost/benefit analysis of waste minimization and pollution prevention (WMIN/PP) options identified during pollution prevention opportunity assessments and providing a means for prioritizing and allocating limited resources for WMIN/PP.

  16. The problems related to confidentiality and effectiveness of health care.

    Science.gov (United States)

    Scherrer, J R

    1983-08-01

    The problem of the impact of confidentiality on health effectiveness is discussed along five points: (1) Communication facilities between health departments are main features of health information systems. (2) Efforts, costs, limits of data protection. The privacy violation risks have to be related to the data protection costs. (3) Paradox of the fundamental rights to confidentiality regarding privacy of the individual and the preponderant interest of the State. (4) Facing the increasing health costs, the need for medical and hospital control systems is assessed. (5) New benefits in medicine and in the quality of care are partly the results of more or less extensive studies in epidemiology at national levels. The general conclusion is concerned with the risks that the computer could become an instrumental substitute for human reason with the progressive drop out of responsibility of health officers.

  17. On the Compound MIMO Broadcast Channels with Confidential Messages

    CERN Document Server

    Kobayashi, Mari; Shamai, Shlomo; Debbah, Merouane

    2009-01-01

    We study the compound multi-input multi-output (MIMO) broadcast channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state set but does not know the realization of the state. We study achievable rates with perfect secrecy in the high SNR regime by characterizing an achievable secrecy degree of freedom (s.d.o.f.) region for two models, the Gaussian MIMO-BCC and the ergodic fading multi-input single-output (MISO)-BCC without a common message. We show that by exploiting an additional temporal dimension due to state variation in the ergodic fading model, the achievable s.d.o.f. region can be significantly improved compared to the Gaussian model with a constant state, although at the price of a larger delay.

  18. [Ethics in pediatric emergencies: Care access, communication, and confidentiality].

    Science.gov (United States)

    Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H

    2015-05-01

    Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality.

  19. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  20. Medical confidentiality versus disclosure: Ethical and legal dilemmas.

    LENUS (Irish Health Repository)

    Agyapong, V I O

    2009-02-01

    A case is described of a fifty year old single man who made disclosures about criminal sexual practices during a psychiatric assessment. In common practice with other professional men, a doctor is under a duty not to disclose, without the consent of his patient, information which he has gained in his professional capacity other than in exceptional circumstances. We discuss the ethical and legal considerations surrounding issues of medical confidentiality and the dilemma that sometimes face clinicians, when they feel obliged, in the public interest, to disclose information they have gained in confidence. Breach of confidences can have deleterious consequences; particularly for the doctor-patient relationship, but failure to disclose in some situations could have serious implications for the well-being of the wider society. Doctors should be aware of the basic principles of confidentiality and the ethical and legal framework around which they are built.

  1. Analysis of LYSA-calculus with explicit confidentiality annotations

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Hanne Riis

    2006-01-01

    protocols. A static analysis approach is developed for analyzing protocols specified in the extended LYSA. The proposed approach will over-approximate the possible executions of protocols while keeping track of all messages communicated over the network, and furthermore it will capture the potential...... malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols....

  2. Data Classification Based on Confidentiality in Virtual Cloud Environment

    Directory of Open Access Journals (Sweden)

    Munwar Ali Zardari

    2014-10-01

    Full Text Available The aim of this study is to provide suitable security to data based on the security needs of data. It is very difficult to decide (in cloud which data need what security and which data do not need security. However it will be easy to decide the security level for data after data classification according to their security level based on the characteristics of the data. In this study, we have proposed a data classification cloud model to solve data confidentiality issue in cloud computing environment. The data are classified into two major classes: sensitive and non-sensitive. The K-Nearest Neighbour (K-NN classifier is used for data classification and the Rivest, Shamir and Adelman (RSA algorithm is used to encrypt sensitive data. After implementing the proposed model, it is found that the confidentiality level of data is increased and this model is proved to be more cost and memory friendly for the users as well as for the cloud services providers. The data storage service is one of the cloud services where data servers are virtualized of all users. In a cloud server, the data are stored in two ways. First encrypt the received data and store on cloud servers. Second store data on the cloud servers without encryption. Both of these data storage methods can face data confidentiality issue, because the data have different values and characteristics that must be identified before sending to cloud severs.

  3. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Directory of Open Access Journals (Sweden)

    Malashree K S

    2014-05-01

    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  4. Consolidating Financial Statements.

    Science.gov (United States)

    Wood, Marcia R.

    This publication is designed to be a desktop reference and assist financial officers in both public and independent institutions of higher education in the preparation of consolidated financial statements. Chapter 1 covers generally accepted accounting principles and other accounting literature, and summarizes reporting rules of the Financial…

  5. 3 CFR - Presidential Signing Statements

    Science.gov (United States)

    2010-01-01

    ... issued statements addressing constitutional or other legal questions upon signing bills into law (signing... of the use of signing statements to raise constitutional objections to statutory provisions. There is no doubt that the practice of issuing such statements can be abused. Constitutional...

  6. 76 FR 72403 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-11-23

    ...] Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions, Inc.,...

  7. Airborne Collision Avoidance System X

    Science.gov (United States)

    2015-06-01

    avoidance system on behalf of the Federal Aviation Adminis- tration (FAA). The current Traffic Alert and Collision Avoidance System II (TCAS II...transformations to the National Airspace System are being imple- mented through the FAA’s Next-Genera- tion Air Transportation System (NextGen). With the goal...weighted states to provide a single, optimal action. If a collision avoidance This work is sponsored by the Federal Aviation Administration under Air

  8. Stimulus conflict triggers behavioral avoidance.

    Science.gov (United States)

    Dignath, David; Eder, Andreas B

    2015-12-01

    According to a recent extension of the conflict-monitoring theory, conflict between two competing response tendencies is registered as an aversive event and triggers a motivation to avoid the source of conflict. In the present study, we tested this assumption. Over five experiments, we examined whether conflict is associated with an avoidance motivation and whether stimulus conflict or response conflict triggers an avoidance tendency. Participants first performed a color Stroop task. In a subsequent motivation test, participants responded to Stroop stimuli with approach- and avoidance-related lever movements. These results showed that Stroop-conflict stimuli increased the frequency of avoidance responses in a free-choice motivation test, and also increased the speed of avoidance relative to approach responses in a forced-choice test. High and low proportions of response conflict in the Stroop task had no effect on avoidance in the motivation test. Avoidance of conflict was, however, obtained even with new conflict stimuli that had not been presented before in a Stroop task, and when the Stroop task was replaced with an unrelated filler task. Taken together, these results suggest that stimulus conflict is sufficient to trigger avoidance.

  9. Chemical avoidance responses of fishes.

    Science.gov (United States)

    Tierney, Keith B

    2016-05-01

    The hydrosphere is a repository for all of our waste and mistakes, be they sewage, garbage, process-affected waters, runoff, and gases. For fish living in environments receiving undesirable inputs, moving away seems an obvious way to avoid harm. While this should occur, there are numerous examples where it will not. The inability to avoid harmful environments may lead to sensory impairments that in turn limit the ability to avoid other dangers or locate benefits. For avoidance to occur, the danger must first be perceived, which may not happen if the fish is 'blinded' in some capacity. Second, the danger must be recognized for what it is, which may also not happen if the fish is cognitively confused or impaired. Third, it is possible that the fish may not be able to leave the area, or worse, learns to prefer a toxic environment. Concerning generating regulations around avoidance, there are two possibilities: that an avoidance threshold be used to set guidelines for effluent release with the intention of driving fishes away; the second is to set a contaminant concentration that would not affect the avoidance or attraction responses to other cues. With the complexities of the modern world in which we release diverse pollutants, from light to municipal effluents full of 1000s of chemicals, to the diversity present in ecosystems, it is impossible to have avoidance data on every stimulus-species combination. Nevertheless, we may be able to use existing avoidance response data to predict the likelihood of avoidance of untested stimuli. Where we cannot, this review includes a framework that can be used to direct new research. This review is intended to collate existing avoidance response data, provide a framework for making decisions in the absence of data, and suggest studies that would facilitate the prediction of risk to fish health in environments receiving intentional and unintentional human-based chemical inputs.

  10. Institutional review boards' use and understanding of certificates of confidentiality.

    Directory of Open Access Journals (Sweden)

    Laura M Beskow

    Full Text Available Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants' privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public's health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders' views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions' use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or 'unsure'. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an 'extra layer' of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to

  11. Python Switch Statement

    Directory of Open Access Journals (Sweden)

    2008-06-01

    Full Text Available The Python programming language does not have a built in switch/case control structure as found in many other high level programming languages. It is thought by some that this is a deficiency in the language, and the control structure should be added. This paper demonstrates that not only is the control structure not needed, but that the methods available in Python are more expressive than built in case statements in other high level languages.

  12. Re Inquiry into the Confidentiality of Health Records in Ontario.

    Science.gov (United States)

    1978-06-30

    Several members of the Royal Canadian Mounted Police testified at hearings conducted by a commission appointed to study the confidentiality of health records. On approximately 300 occasions, the police had obtained medical information from physicians and hospitals in Ontario without the prior consent of the patient. The court established that the identity of persons who had furnished the information was privileged information for physicians and other persons subject to the control of a hospital board, but not for various employees of the hospital who were not subject to professional standards of discipline.

  13. Attitude of Lithuanian residents to confidentiality of adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents.......To assess the attitudes of Lithuanian residents towards the protection of confidentiality in the sexual and reproductive health care of adolescents....

  14. University Student Expectations of Confidentiality When Disclosing Information to Their Professors

    Science.gov (United States)

    Harris, Gregory E.; Dalton, Stephanie

    2014-01-01

    The purpose of this study was to explore university students' expectations of confidentiality when they make disclosures to their university professors. A secondary purpose was to consider if students have a higher expectation of confidentiality when talking with Psychology professors versus professors in other disciplines. Students were asked to…

  15. 19 CFR 206.7 - Confidential business information; furnishing of nonconfidential summaries thereof.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Confidential business information; furnishing of... NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL AND BILATERAL SAFEGUARD ACTIONS, MARKET DISRUPTION, TRADE DIVERSION, AND REVIEW OF RELIEF ACTIONS General § 206.7 Confidential business...

  16. 34 CFR 21.32 - Confidentiality of information about net worth.

    Science.gov (United States)

    2010-07-01

    ... established procedures under the Freedom of Information Act (34 CFR part 5). (Authority: 5 U.S.C. 504(c)(1)) ... 34 Education 1 2010-07-01 2010-07-01 false Confidentiality of information about net worth. 21.32... One Apply for an Award? § 21.32 Confidentiality of information about net worth. (a) In a proceeding...

  17. 77 FR 69820 - Access to Confidential Business Information by Electronic Consulting Services, Inc., and Its...

    Science.gov (United States)

    2012-11-21

    ..., OK and Dell Services Federal Government of Fairfax, VA to access information which has been submitted... AGENCY Access to Confidential Business Information by Electronic Consulting Services, Inc., and Its... claimed or determined to be Confidential Business Information (CBI). DATES: Access to the...

  18. 42 CFR 2.2 - Statutory authority for confidentiality of alcohol abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction § 2.2 Statutory authority for confidentiality of alcohol abuse patient records. The restrictions of these regulations upon the disclosure and use of alcohol abuse patient records were initially...

  19. 41 CFR 105-60.405 - Processing requests for confidential commercial information.

    Science.gov (United States)

    2010-07-01

    ... MATERIALS 60.4-Described Records § 105-60.405 Processing requests for confidential commercial information... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Processing requests for confidential commercial information. 105-60.405 Section 105-60.405 Public Contracts and Property...

  20. 19 CFR 210.39 - In camera treatment of confidential information.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false In camera treatment of confidential information....39 In camera treatment of confidential information. (a) Definition. Except as hereinafter provided... protective orders or orders granting in camera treatment are not made part of the public record and are...

  1. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  2. HIPAA-protecting patient confidentiality or covering something else?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-10-01

    Full Text Available No abstract available. Article truncated at 150 words. A case of a physician fired from the Veterans Administration (VA for violation of the Health Care Portability and Accountability Act of 1996 (HIPAA illustrates a problem with both the law and the VA. Anil Parikh, a VA physician at the Jesse Brown VA in Chicago, was dismissed on a charge of making unauthorized disclosures of confidential patient information on October 19, 2007. On January 3, 2011 the Merit Systems Protection Board (MSPB reversed Dr. Parikh’s removal. Dr. Parikh's initially made disclosures to the VA Office of Inspector General and to Senator Barack Obama and Congressman Luis Gutierrez, in whose district the Jesse Brown VA lies. Dr. Parikh alleged that there were systematic problems within the Jesse Brown VA that resulted in untimely and inadequate patient care. The confidential patient information Parikh disclosed included examples of the misdiagnoses and misdirection of patients within the hospital. Specifically, Dr. Parikh alleged that …

  3. Confidential Communication Through Chaos Encryption in Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuai; ZHONG Xian-xin

    2007-01-01

    A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation, the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed successfully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6, DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level.

  4. Pattern Avoidance in Ternary Trees

    CERN Document Server

    Gabriel, Nathan; Pudwell, Lara; Tay, Samuel

    2011-01-01

    This paper considers the enumeration of ternary trees (i.e. rooted ordered trees in which each vertex has 0 or 3 children) avoiding a contiguous ternary tree pattern. We begin by finding recurrence relations for several simple tree patterns; then, for more complex trees, we compute generating functions by extending a known algorithm for pattern-avoiding binary trees. Next, we present an alternate one-dimensional notation for trees which we use to find bijections that explain why certain pairs of tree patterns yield the same avoidance generating function. Finally, we compare our bijections to known "replacement rules" for binary trees and generalize these bijections to a larger class of trees.

  5. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... Control Act (TSCA) confidential business information (CBI). The Contractor and all of its...

  6. Neuromorphic UAS Collision Avoidance Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Using biologically-inspired neuromorphic optic flow algorithms is a novel approach in collision avoidance for UAS. Traditional computer vision algorithms rely on...

  7. Things to Avoid When Breastfeeding

    Science.gov (United States)

    ... need to avoid fish that are high in mercury, namely, shark, swordfish, king mackerel, and tilefish. When you do eat fish, it’s important to eat varieties that contain less mercury, such as canned light tuna, shrimp, salmon, pollock, ...

  8. Avoiding Gluten Cross-Contamination

    Science.gov (United States)

    ... Avoiding Gluten Cross-Contamination Reviewed by Sharon Denny, MS, RDN Published April 22, 2014 Print Email You might not think twice about the pot you use to boil water, the plate you put your food on or even the ...

  9. Vision-based obstacle avoidance

    Science.gov (United States)

    Galbraith, John

    2006-07-18

    A method for allowing a robot to avoid objects along a programmed path: first, a field of view for an electronic imager of the robot is established along a path where the electronic imager obtains the object location information within the field of view; second, a population coded control signal is then derived from the object location information and is transmitted to the robot; finally, the robot then responds to the control signal and avoids the detected object.

  10. EU Universities’ Mission Statements

    Directory of Open Access Journals (Sweden)

    Liudmila Arcimaviciene

    2015-04-01

    Full Text Available In the last 10 years, a highly productive space of metaphor analysis has been established in the discourse studies of media, politics, business, and education. In the theoretical framework of Conceptual Metaphor Theory and Critical Discourse Analysis, the restored metaphorical patterns are especially valued for their implied ideological value as realized both conceptually and linguistically. By using the analytical framework of Critical Metaphor Analysis and procedurally employing Pragglejaz Group’s Metaphor Identification Procedure, this study aims at analyzing the implied value of the evoked metaphors in the mission statements of the first 20 European Universities, according to the Webometrics ranking. In this article, it is proposed that Universities’ mission statements are based on the positive evaluation of the COMMERCE metaphor, which does not fully correlate with the ideological framework of sustainability education but is rather oriented toward consumerism in both education and society. Despite this overall trend, there are some traceable features of the conceptualization reflecting the sustainability approach to higher education, as related to freedom of speech, tolerance, and environmental concerns. Nonetheless, these are suppressed by the metaphoric usages evoking traditional dogmas of the conservative ideology grounded in the concepts of the transactional approach to relationship, competitiveness for superiority, the importance of self-interest and strength, and quantifiable quality.

  11. Statement on virginity testing.

    Science.gov (United States)

    2015-07-01

    Virginity testing (virginity examination) is a gynecological examination that is intended to correlate the status and appearance of the hymen with previous sexual contact to determine whether a female has had or is habituated to sexual intercourse. Virginity examinations are practiced in many countries, often forcibly, including in detention places; on women who allege rape or are accused of prostitution; and as part of public or social policies to control sexuality. The Independent Forensic Expert Group (IFEG) - thirty-five preeminent independent forensic experts from eighteen countries specialized in evaluating and documenting the physical and psychological effects of torture and ill-treatment - released a statement on the practice in December 2014. In its statement, the IFEG outlines the physical and psychological effects of forcibly conducting virginity examinations on females based on its collective experience. The Group assesses whether, based on the effects, forcibly conducted virginity examinations constitute cruel, inhuman, or degrading treatment or torture. Finally, the IFEG addresses the medical interpretation, relevance, and ethical implications of such examinations. The IFEG concludes that virginity examinations are medically unreliable and have no clinical or scientific value. These examinations are inherently discriminatory and, in almost all instances, when conducted forcibly, result in significant physical and mental pain and suffering, thereby constituting cruel, inhuman and degrading treatment or torture. When virginity examinations are forcibly conducted and involve vaginal penetration, the examination should be considered as sexual assault and rape. Involvement of health professionals in these examinations violates the basic standards and ethics of the professions.

  12. Perceptions of healthcare professionals for colleague confidentiality. A descriptive study.

    Directory of Open Access Journals (Sweden)

    Karkasina Α.

    2013-01-01

    Full Text Available Introduction: Cooperation among nurses is related to Colleague’s Confidentiality Protection, according to Nursing Deontology and their Code of Ethics.The purpose of this study was the evaluation of nursing personnel attitudes, perceptions and behavior towards Colleague’s Confidentiality. Methodology: This study was conducted on the basis of the Master Studies in “Management of health services and crisis management” of University of Peloponnese from July till November of 2011. The sample of the study included nursing personnel of General Hospital of Sparta, of Molai and of Panarkadian Hospital of Tripolis. Based on the study of literature a questionnaire was constructed. Data consistency was tested by Cronbach α (α= 0,81. Specifically, the questionnaire reflected the attitudes and perceptions related to the behavior of the nursing staff regarding the cooperation among them and their collaboration with patients. It also included questions investigating actions made by the participants in case a colleague put in danger patient’s life or risked an infection. Finally, there were questions regarding the participants’ satisfaction from actions taken in case they made a report for a nursing error to the ward they were working. 200 questionnaires were distributed and 177 were finally answered (88.5% respone rate. For the statistical analysis the statistical program SPSS V.16 was used. Results: 9.7% of the participants were men and the rest 90,3% were women. Mean age of the sample was 36,8 years with the lowest to be 20 years old and the highest 58 years old. The majority of the participants (40% said that they had reported an error but they didn’t do it officially. The main reason for non-reporting it was because of the Colleague’s Confidentiality’s Protection. A rate of 48% of the nurses knew Nurses’ Code of Ethics and the law existence supporting it. A rate of 32.5% of the participants considered that by reporting an error, the

  13. Making a Statement with Philanthropy.

    Science.gov (United States)

    Legon, Richard D.

    2001-01-01

    Discusses how a policy statement on board philanthropy can clarify fundraising expectations of all governing and foundation board members. Describes essential components of such a policy statement: mission and vision, recognition of board responsibility for fundraising, specific expectations, and commitment to project and campaign goals. Also…

  14. Aerospace Education. NSTA Position Statement

    Science.gov (United States)

    National Science Teachers Association (NJ1), 2008

    2008-01-01

    National Science Teachers Association (NSTA) has developed a new position statement, "Aerospace Education." NSTA believes that aerospace education is an important component of comprehensive preK-12 science education programs. This statement highlights key considerations that should be addressed when implementing a high quality aerospace education…

  15. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  16. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  17. Approach/avoidance in dreams.

    Science.gov (United States)

    Malcolm-Smith, Susan; Koopowitz, Sheri; Pantelis, Eleni; Solms, Mark

    2012-03-01

    The influential threat simulation theory (TST) asserts that dreaming yields adaptive advantage by providing a virtual environment in which threat-avoidance may be safely rehearsed. We have previously found the incidence of biologically threatening dreams to be around 20%, with successful threat avoidance occurring in approximately one-fifth of such dreams. TST asserts that threat avoidance is over-represented relative to other possible dream contents. To begin assessing this issue, we contrasted the incidence of 'avoidance' dreams with that of their opposite: 'approach' dreams. Because TST states that the threat-avoidance function is only fully activated in ecologically valid (biologically threatening) contexts, we also performed this contrast for populations living in both high- and low-threat environments. We find that 'approach' dreams are significantly more prevalent across both contexts. We suggest these results are more consistent with the view that dreaming is generated by reward-seeking systems than by fear-conditioning systems, although reward-seeking is clearly not the only factor determining the content of dreams.

  18. Motive to Avoid Success, Locus of Control, and Reinforcement Avoidance.

    Science.gov (United States)

    Katovsky, Walter

    Subjects were four groups of 12 college women, high or low in motive to avoid success (MAS) and locus of control (LC), were reinforced for response A on a fixed partial reinforcement schedule on three concept learning tasks, one task consisting of combined reward and punishment, another of reward only, and one of punishment only. Response B was…

  19. Usage of internal statements in making consolidated financial statement

    Directory of Open Access Journals (Sweden)

    V.N. Herman

    2016-12-01

    Full Text Available The emergence of the consolidated financial statements is the result of integration processes in the businesses that lead to pooling of different companies. As consolidated financial statements present an aggregated look at the financial position of a parent and its subsidiaries, they let you gauge the overall health of an entire group of companies as opposed to one company’s standalone position. Consolidation of financial statements requires from the participants of joining elaborating their individual statements. The article describes the general scheme of consolidation process and defines the key trends of consolidation adjustments, in particular, financial investments, internal operations, goodwill and exchange rate differences. It is found out that to get information about internal operations and financial investments such data have to be synthesized from internal statements. This approach allows using the same accounting methods to parent and subsidiary entities. The objects, the users and the subject domain of internal statements are determined in order to make consolidation of financial statements of joining.

  20. Position and Obstacle Avoidance Algorithm in Robot Soccer

    Directory of Open Access Journals (Sweden)

    Awang H. Pratomo

    2010-01-01

    Full Text Available Problem statement: Robot soccer is an attractive domain for researchers and students working in the field of autonomous robots. However developing (coding, testing and debugging robots for such domain is a rather complex task. Approach: This study concentrated on developing position and obstacle avoidance algorithm in robot soccer. This part is responsible for realizing soccer skills such as movement, shoot and goal keeping. The formulation of position and obstacle avoidance was based on mathematical approach. This formula is to make sure that the movement of the robot is valid. Velocity of the robot was calculated to set the speed of the robot. The positioning theory including the coordination of the robot (x,y was used to find the obstacle and avoid it. Results: Some simulations and testing had been carried out to evaluate the usefulness of the proposed algorithms. The functions for shooting, movement and obstacle avoidance had been successfully implemented. Conclusion: The results showed its possibility could be used as strategy algorithms in real robot soccer competition.

  1. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  2. Avoiding unfavourable outcomes in liposuction

    Directory of Open Access Journals (Sweden)

    Atul Khanna

    2013-01-01

    Full Text Available The origin of liposuction can be traced to an adverse event by Dujarrier in 1921 when he used a uterine curette to remove fat from the knees of a ballerina ending in an amputation secondary to damage of the femoral artery. The history of liposuction since then has been one of avoiding complications and optimising outcome. After this adverse event, liposuction was abandoned until the 1960′s when Schrudde revived the practice using small stab incisions and sharp curettage with the secondary suction to aspirate the freed tissue. This technique was associated with a high incidence of complications especially seroma and skin necrosis. Illouz then replaced the curette with a blunt cannula connected to vacuum pump thus avoiding the complications of a sharp curette. Despite the presence of various techniques for liposuction, suction assisted liposuction (SAL is still the standard technique of liposuction. This article aims to discuss literature regarding the various aspects of liposuction (SAL and to highlight the salient points in the literature and in the senior author′s experience in order to avoid unfavourable outcomes in liposuction. A literature review on avoiding complication is in liposuction including some of the seminal papers on liposuction. Liposuction is generally a safe procedure with reproducible outcome. Just like any surgical procedure it should be treated with the utmost care. Illouz published 10 commandments for liposuction in 1989 and we review these commandments to demonstrate how liposuction has evolved.

  3. Avoidance: grammatical or semantic causes?

    NARCIS (Netherlands)

    Hulstijn, J.H.; Marchena, E.

    1989-01-01

    This article follows up on a study by Dagut and Laufer (1985), who found that Hebrew learners of English avoid phrasal verbs, such as ‘let down’, while preferring one-word verbs, such as ‘;disappoint’, since phrasal verbs do not exist in Hebrew. A corollary derived from Dagut and Laufer's study is t

  4. 37 CFR 201.29 - Access to, and confidentiality of, Statements of Account, Verification Auditor's Reports, and...

    Science.gov (United States)

    2010-07-01

    ... Reports, and any other verification information. (2) Audit and Verification Information means the reports....30, and all information relating to a manufacturing or importing party. (3) DART Access Form means... is not an employee or officer of an interested copyright party or a manufacturing or importing...

  5. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  6. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... personal information collected from children. 312.8 Section 312.8 Commercial Practices FEDERAL TRADE... Confidentiality, security, and integrity of personal information collected from children. The operator must... personal information collected from children....

  7. Clean Air Act: Confidential business information security manual (revised). Procedures manual

    Energy Technology Data Exchange (ETDEWEB)

    Toomer, M.W.

    1998-08-01

    The procedures in this manual provide Federal, contractor, and subcontractor employees with the information necessary to utilize Confidential Business Information to perform their assigned duties without violating applicable Federal regulations protecting the rights of its owners.

  8. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Industrial Economics Incorporated AGENCY... Economics Incorporated (IEI) of Cambridge, MA, to access information which has been submitted to EPA...

  9. 78 FR 20101 - Access to Confidential Business Information by Chemical Abstract Services

    Science.gov (United States)

    2013-04-03

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Chemical Abstract Services AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA expects to authorize its contractor, Chemical...

  10. 76 FR 77224 - Access to Confidential Business Information by Primus Solutions, Inc.

    Science.gov (United States)

    2011-12-12

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Primus Solutions, Inc. AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Primus Solutions,...

  11. 32 CFR 727.8 - Confidential and privileged character of service provided.

    Science.gov (United States)

    2010-07-01

    ... legal sense as outlined in the Code of Professional Responsibility, as opposed to confidential in the... individual legal assistance client by name or any other particular, such as social security number, shall...

  12. 19 CFR 206.66 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... business information under administrative protective order. 206.66 Section 206.66 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO GLOBAL... certain confidential business information under administrative protective order. In an investigation...

  13. Confidential Financial Disclosure Form for Environmental Protection Agency Special Government Employees (EPA Form 3110-48)

    Science.gov (United States)

    EPA uses the Confidential Financial Disclosure Form to determine whether there is a conflict of interest or the appearance of a lack of impartiality with regard to the topic under review by the FIFRA Scientific Advisory Panel.

  14. 7 CFR 4279.137 - Financial statements.

    Science.gov (United States)

    2010-01-01

    ... § 4279.137 Financial statements. (a) The lender will determine the type and frequency of submission of financial statements by the borrower. At a minimum, annual financial statements prepared by an accountant in... 7 Agriculture 15 2010-01-01 2010-01-01 false Financial statements. 4279.137 Section...

  15. Attitudes toward medical and genetic confidentiality in the Saudi research biobank: An exploratory survey.

    Science.gov (United States)

    Alahmad, Ghiath; Hifnawy, Tamer; Abbasi, Badaruddin; Dierickx, Kris

    2016-03-01

    Achieving a balance between giving access to information and respecting donors' confidentiality is a crucial issue for any biobank, with its large number of samples and associated information. Despite the existence of much empirical literature on confidentiality, there are too few surveys in the Middle East about the topic, particularly in the Saudi context. A survey was conducted of 200 respondents at King Abdulaziz Medical City in Riyadh, Saudi Arabia, among 5 groups of equal size, comprised of researchers, physicians, medical students, donors and laypersons, respectively. The majority of participants agreed that confidentiality is an important issue and that it is well protected in the Saudi biobank. All 5 groups showed different attitudes toward disclosing information to various third parties. They were in favor of allowing treating physicians, and to a certain extent family members, to have access to medical and genetic results from research. No significant differences were found between views on medical and genetic confidentiality. The majority of respondents agreed that confidentiality might be breached in cases with specific justified reasons. Even considering differences in religion, culture and other factors, the results of the study were consistent with those reported in the literature and research conducted in other countries. We therefore place emphasis on the importance of protecting and promoting patient/donor confidentiality and privacy.

  16. Obstacle Avoidance Through Visual Teleoperation

    Directory of Open Access Journals (Sweden)

    Muhammad Usman Keerio

    2009-01-01

    Full Text Available This paper presents a novel controlling approach forHumanoid Robot to work safely in critical situations like badlight environment using Visual Teleoperation. In this regardmodeling environments for Humanoid Teleoperation Systemis developed. Here virtual reality modeling environmentincludes development of virtual Humanoid BHR-2, andvirtual objects like table etc. The main goal of this work is toenhance our visual teleoperation system for BHR-2 in orderto avoid any collision during real time operation. SoftwareMaya is used for modeling and simulations. Maya plug-insin VC++ provides efficient modeling rule, real timeinteraction, and time saving rendering approach in a virtualenvironment. In this paper the validity of proposed scheme isshown by conducting experiments using offline step overtrajectory to avoid obstacle in bad light environment.

  17. Consumer Privacy and Marketing Avoidance

    OpenAIRE

    Il-Horn Hann; Kai-Lung Hui; Sang-Yong Tom Lee; Ivan Png

    2005-01-01

    We introduce consumer avoidance into analytical marketing research. We show that consumer efforts to conceal themselves and to deflect marketing have a crucial impact on sellers¡¯ marketing strategy. Under reasonable conditions, seller marketing is a strategic complement with consumer concealment. Hence, consumer measures to conceal themselves from marketing will increase its cost-effectiveness and lead sellers to market more. Policies that encourage consumers to conceal their identities woul...

  18. Financial statements in selected business corporation

    OpenAIRE

    2016-01-01

    The master thesis solvesissuesof the financial statements as a procedure where both compilation of statements and problems of preliminary and other actions, related with financial statements and final accounts are analysed. The thesis includes the theoretical basis and analytical part. The mainaim of the projectis evaluating the financial statements procedure in a chosen business corporation. The theoretical basis characterizes basic information about the financial statements, concerning t...

  19. When security and medicine missions conflict: confidentiality in prison settings.

    Science.gov (United States)

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  20. Confidentiality Protection of Digital Health Records in Cloud Computing.

    Science.gov (United States)

    Chen, Shyh-Wei; Chiang, Dai Lun; Liu, Chia-Hui; Chen, Tzer-Shyong; Lai, Feipei; Wang, Huihui; Wei, Wei

    2016-05-01

    Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for those whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).

  1. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  2. Jam avoidance with autonomous systems

    CERN Document Server

    Tordeux, Antoine

    2016-01-01

    Many car-following models are developed for jam avoidance in highways. Two mechanisms are used to improve the stability: feedback control with autonomous models and increasing of the interaction within cooperative ones. In this paper, we compare the linear autonomous and collective optimal velocity (OV) models. We observe that the stability is significantly increased by adding predecessors in interaction with collective models. Yet autonomous and collective approaches are close when the speed difference term is taking into account. Within the linear OV models tested, the autonomous models including speed difference are sufficient to maximise the stability.

  3. Learning to Avoid Risky Actions

    OpenAIRE

    Malfaz, María; Miguel A. Salichs

    2011-01-01

    When a reinforcement learning agent executes actions that can cause frequent damage to itself, it can learn, by using Q-learning, that these actions must not be executed again. However, there are other actions that do not cause damage frequently but only once in a while, for example, risky actions such as parachuting. These actions may imply punishment to the agent and, depending on its personality, it would be better to avoid them. Nevertheless, using the standard Q-learning algorithm, the a...

  4. An Integrated Architecture for Automatic Indication, Avoidance and Profiling of Kernel Rootkit Attacks

    Science.gov (United States)

    2014-08-20

    Architecture for Automatic Indication, Avoidance of and Profiling of Kernel Rootkit Attacks 5a. CONTRACT NUMBER and Profiling of... Kernel Rootkit Attacks 5b. GRANT NUMBER FA9550-10-1-0099 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Xu, Dongyan...STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT The objective of this project is to mitigate or eliminate threats of kernel rootkits against

  5. Spanish Consensus Statement

    Science.gov (United States)

    Rey, Guillermo Álvarez; Cuesta, Jordi Ardevol; Loureda, Rafael Arriaza; España, Fernando Ávila; Matas, Ramón Balius; Pazos, Fernando Baró; de Dios Beas Jiménez, Juan; Rosell, Jorge Candel; Fernandez, César Cobián; Ros, Francisco Esparza; Colmenero, Josefina Espejo; de Prado, Jorge Fernández; Cota, Juan José García; González, Jose Ignacio Garrido; Santander, Manuela González; Munilla, Miguel Ángel Herrador; Ruiz, Francisco Ivorra; Díaz, Fernando Jiménez; Marqueta, Pedro Manonelles; Fernandez, Antonio Maestro; Benito, Juan José Muñoz; Vilás, Ramón Olivé; Teres, Xavier Peirau; Amaro, José Peña; Roque, Juan Pérez San; Parenteu, Christophe Ramírez; Serna, Juan Ribas; Álvarez, Mikel Sánchez; Marchori, Carlos Sanchez; Soto, Miguel del Valle; Alonso, José María Villalón; García, Pedro Guillen; de la Iglesia, Nicolas Hugo; Alcorocho, Juan Manuel Lopez

    2016-01-01

    On the 21st of March, 2015, experts met at Clínica CEMTRO in Madrid, Spain, under the patronage of The Spanish Society for Sports Traumatology (SETRADE), The Spanish Federation of Sports Medicine (FEMEDE), The Spanish Association of Medical Services for Football Clubs (AEMEF), and The Spanish Association of Medical Services for Basketball Clubs (AEMB) with the aim of establishing a round table that would allow specialists to consider the most appropriate current general actions to be taken when treating muscle tears in sport, based on proven scientific data described in the medical literature. Each expert received a questionnaire prior to the aforementioned meeting comprising a set of questions concerning therapeutic indications generally applied in the different stages present during muscle repair. The present Consensus Document is the result of the answers to the questionnaire and resulting discussion and consensus over which are the best current indications in the treatment of muscle tears in sport. Avoiding immobilization, not taking nonsteroidal anti-inflammatory drugs (NSAIDs) randomly, fostering early mobilization, increasing vascularization of injured, site and regulating inflammatory mechanisms—without inhibiting these from the early stages of the recovery period—all stood out as main points of the Consensus Document. Additionally, there is controversy concerning cell stimulation techniques and the use of growth factors or cell inhibitors. The decision concerning discharge was unanimous, as was the criteria considered when it came to performing sport techniques without pain. PMID:27213161

  6. Knowledge and practice of confidential data handling in the Welsh Deanery: a brief report.

    Science.gov (United States)

    Jackson, L E; Lim, M W

    2011-01-01

    Recent large-scale personal data loss incidents highlighted the need for public bodies to more securely handle confidential data. We surveyed trainees from all specialties in the Welsh Deanery for their knowledge and practice. All registered trainees were invited to participate in an online anonymised survey. There were 880 completed and non-duplicated responses (52.9% response rate). Responses were analysed using Microsoft Access. Over 40% (388/880 (44.1%)) did not use formal guidelines on storage or disposal of confidential data. The majority appeared to dispose of confidential paper documents securely, that is, using shredders and white shredder bags. However, there were significant numbers of unmarked responses. Clinical documents, such as theatre lists, were taken home by 281/880 (31.9%) of trainees. The majority secured their computers (569/871 (65.3%)) by either not keeping patient identifiable data on them or using encryption. However, 302/871 (34.7%) did not adequately secure their computers. The surgical and anaesthetic specialties were least aware of formal confidentiality guidelines (95/178 (53.4%)) and 52/102 (51.0%) respectively) and least secured their computers (106/178 (59.6%) and 63/102 (61.8%) respectively). Education is needed to improve knowledge and practice of confidential data handling. This may be delivered through workshops during induction programmes or as part of European Computer Driving Licence (ECDL) modules. Training is especially indicated for the surgical and anaesthetic specialties.

  7. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  8. The end of medical confidentiality? Patients, physicians and the state in history.

    Science.gov (United States)

    Rieder, Philip; Louis-Courvoisier, Micheline; Huber, Philippe

    2016-09-01

    Medical confidentiality has come under attack in the public sphere. In recent disasters both journalists and politicians have questioned medical confidentiality and claimed that in specific contexts physicians should be compelled to communicate data on their patients' health. The murders of innocent individuals by a suicidal pilot and a Swiss convicted criminal have generated polemical debates on the topic. In this article, historical data on medical confidentiality is used to show that medical practices of secrecy were regularly attacked in the past, and that the nature of medical confidentiality evolved through time depending on physicians' values and judgements. Our demonstration is based on three moments in history. First, at the end of the 16th century, lay authorities put pressure on physicians to disclose the names of patients suffering from syphilis. Second, in the 18th century, physicians faced constant demands for information about patients' health from relatives and friends. Third, employers and insurance companies in the 20th century requested medical data on sick employees. In these three different situations, history reveals that the concept of medical confidentiality was plastic, modelled in the first instance to defend well-to-do patients, in the second instance it was adapted to accommodate the physician's social role and, finally, to defend universal values and public health. Medical secrecy was, and is today, a medical and societal norm that is shaped collectively. Any change in its definition and enforcement was and should be the result of negotiations with all social actors concerned.

  9. Do self-statements enhance the effectiveness of virtual reality exposure therapy? A comparative evaluation in acrophobia.

    Science.gov (United States)

    Krijn, M; Emmelkamp, P M G; Olafsson, R P; Schuemie, Martijn J; van der Mast, Charles A P G

    2007-06-01

    There is a clear need for more detailed analysis of the role of cognitive self-statements in virtual reality exposure therapy (VRET). To date, no research on this topic has been done. The primary aim of this study was to investigate whether coping self-statements would enhance the effectiveness of VRET. In a randomized crossover design, 26 patients with acrophobia (DSM-IV diagnosis of specific phobia) were randomly assigned to two sessions of VRET followed by two sessions of VRET plus coping self-statements, or the other way around: first two sessions of VRET plus coping self-statements followed by two sessions of VRET. Results showed that VRET, regardless of addition of coping self-statements, decreased anxiety of heights, decreased avoidance of height situations, and improved attitudes towards heights. However, at 6-month follow-up, most gains during treatment were not fully retained.

  10. Statement of The American Society of Human Genetics on cystic fibrosis carrier screening

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The identification in 1989 of the cystic fibrosis (CF) gene and its most common mutation immediately raised the possibility of CF carrier detection by DNA analysis. The American Society of Human Genetics (ASHG) issued a statement recommending that CF carrier testing should be made available to individuals with a family history of CF. It was also stated that screening of individuals or couples in the general population should not be offered until the rate of CF carrier detection improves. An additional prerequisite emphasized the need for the establishment of effective educational and counseling programs consistent with previous widely accepted principles. An NIH workshop reached similar conclusions. ASHG recommendations are that screening be limited to individuals with a family history of CF, testing should be accompanied by education and counseling, screening should be voluntary and confidential with appropriate laboratory quality controls, and efforts should be expanded to educate health care providers and the public.

  11. Why does geoprivacy matter? The scientific publication of confidential data presented on maps.

    Science.gov (United States)

    Kounadi, Ourania; Leitner, Michael

    2014-10-01

    We examined published maps containing sensitive data, and the protection methods, if any, that were used. We investigated whether the many published warnings about disclosure risk have been effective in reducing privacy risk. During an 8-year period (2005-2012), 19 journals related to GIScience, geography, spatial crime analysis, and health geography were examined. We identified 41 articles that display actual confidential information and 16 articles where confidential information is protected by the use of a geographical mask. During the investigated time frame, the numbers of articles with unmasked confidential data increased, and in total more than 68,000 home addresses were disclosed. One of the more significant findings of this study is that efforts to instill sensitivity to location privacy and disclosure risk have been relatively unsuccessful.

  12. [Confidentiality in HIV-infection/AIDS--a comment on the Communicable Disease Control Act].

    Science.gov (United States)

    Frich, J C

    1995-05-10

    The new Communicable Diseases Control Act has come into force in Norway. It makes it compulsory for a physician to warn a third party if it is obvious that a HIV-positive patient, with a high degree of certainty, puts the third party at risk of being infected with HIV. Some philosophers characterize medical confidentiality as an intransigent and absolute obligation, others as a prima facie duty. This article supports the latter view, but the author still argues that strict conditions have to be fulfilled before a physician should consider breaking medical confidentiality: The doctor must try repeatedly to gain the consent or co-operation of the patient involved. Possible negative long-term consequences for the preventive HIV-work support strict medical confidentiality.

  13. Maternal mortality in Bahrain 1987-2004: an audit of causes of avoidable death.

    Science.gov (United States)

    Sandhu, A K; Mustafa, F E

    2008-01-01

    The aim of this report was to establish the national maternal mortality rate in Bahrain over the period 1987-2004, to identify preventable factors in maternal deaths and to make recommendations for safe motherhood. There were 60 maternal deaths out of 243 232 deliveries giving an average maternal mortality rate of 24.7 per 100 000 total births. The main causes of death were sickle-cell disease (25.0%), hypertension (18.3%), embolism (13.3%), haemorrhage (13.3%), heart disease (11.7%), infection (8.3%) and other (10.0%). In an audit of care, 17 (28.3%) out of 60 deaths were judged to be avoidable, nearly half of which were due to a shortage of intensive care beds. We recommend that a confidential enquiry of maternal deaths be conducted at the national level every 3 to 5 years.

  14. Avoidant/Restrictive Food Intake Disorder

    Science.gov (United States)

    ... for the Professional Version Eating Disorders Definition of Eating Disorders Anorexia Nervosa Avoidant/Restrictive Food Intake Disorder Binge Eating ... about what they eat. Eating Disorders Definition of Eating Disorders Anorexia Nervosa Avoidant/Restrictive Food Intake Disorder Binge Eating ...

  15. COMPARATIVE FINANCIAL STATEMENTS. CONVERGENCE VERSUS DIVERGENCE

    Directory of Open Access Journals (Sweden)

    Nicolae ECOBICI

    2010-09-01

    Full Text Available In this paper I compared the Romanian financial statements with the US GAAP financial statements in terms of two criteria: first the reference period and secondly the shape, structure and content of financial statements. Nowadays the two accounting systems, the French and Anglo-Saxon, tend to harmonize. I will present the convergences and the divergences between the financial statements of Romania, subject to OMFP 3055/2009, in parallel with the Anglo-Saxon accounting system.

  16. Lithuanian general practitioners' knowledge of confidentiality laws in adolescent sexual and reproductive healthcare: a cross-sectional study

    DEFF Research Database (Denmark)

    Lazarus, Jeff; Jaruseviciene, Lina; Liljestrand, Jerker

    2008-01-01

    In Lithuania, the legislation addressing confidentiality in adolescent healthcare is contradictory and vague. Previous studies have also revealed that medico-legal knowledge among physicians is poor, and attitudes play a correspondingly greater role than legal knowledge in ensuring the confidenti...

  17. 21 CFR 860.5 - Confidentiality and use of data and information submitted in connection with classification and...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality and use of data and information submitted in connection with classification and reclassification. 860.5 Section 860.5 Food and Drugs FOOD... DEVICE CLASSIFICATION PROCEDURES General § 860.5 Confidentiality and use of data and...

  18. 75 FR 24688 - Access to Confidential Business Information by Guident Technologies Inc.’s Identified Subcontractor

    Science.gov (United States)

    2010-05-05

    ... AGENCY Access to Confidential Business Information by Guident Technologies Inc.'s Identified... subcontractor of its prime contractor, Guident Technologies Inc. of [Herndon, VA, to access information which... information may be claimed or determined to be Confidential Business Information (CBI). DATES: Access to...

  19. Confidentiality Protection of User Data and Adaptive Resource Allocation for Managing Multiple Workflow Performance in Service-Based Systems

    Science.gov (United States)

    An, Ho

    2012-01-01

    In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…

  20. 49 CFR 512.17 - How long should it take to determine whether information is entitled to confidential treatment?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false How long should it take to determine whether information is entitled to confidential treatment? 512.17 Section 512.17 Transportation Other Regulations... TRANSPORTATION CONFIDENTIAL BUSINESS INFORMATION Agency Determination § 512.17 How long should it take...

  1. 21 CFR 814.9 - Confidentiality of data and information in a premarket approval application (PMA) file.

    Science.gov (United States)

    2010-04-01

    ... secret or confidential commercial or financial information under § 20.61. (3) Any adverse reaction report... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Confidentiality of data and information in a premarket approval application (PMA) file. 814.9 Section 814.9 Food and Drugs FOOD AND DRUG...

  2. 21 CFR 601.50 - Confidentiality of data and information in an investigational new drug notice for a biological...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Confidentiality of data and information in an investigational new drug notice for a biological product. 601.50 Section 601.50 Food and Drugs FOOD AND DRUG... Information § 601.50 Confidentiality of data and information in an investigational new drug notice for...

  3. 49 CFR 40.321 - What is the general confidentiality rule for drug and alcohol test information?

    Science.gov (United States)

    2010-10-01

    ... Release of Information § 40.321 What is the general confidentiality rule for drug and alcohol test... explicitly authorize or require the transmission of information in the course of the drug or alcohol testing... 49 Transportation 1 2010-10-01 2010-10-01 false What is the general confidentiality rule for...

  4. Determining Relevant Financial Statement Ratios in Department of Defense Service Component General Fund Financial Statements

    Science.gov (United States)

    2014-06-01

    users of corporate financial statements are included in Table 1. 11 Lenders Investors Managers Suppliers Customers Employees Competitors The... financial statements . For example, lenders and investors may use financial statements to achieve their profit or interest objectives by predicting...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT DETERMINING RELEVANT FINANCIAL STATEMENT RATIOS IN

  5. Paradigm Statements of Educational Objectives.

    Science.gov (United States)

    Gray, Peter J.

    Five distinct format categories are used in this study to describe the form of educational objectives: clarity, range, level of abstractness, behavioralness, and observability. These form concepts are used to describe paradigm statements of three kinds of educational objectives: goals, intended learning outcomes, and behavioral evidence. Goals are…

  6. Accounting Principles and Financial Statements.

    Science.gov (United States)

    Robinson, Daniel D.

    1973-01-01

    This document presents the background and analysis of the American Institute of Certified Public Accountants (AICPA) guide to auditing colleges and universities. Highlights include the approval of the market value option, the treatment of endowment gains, debt services as transfers, the decisions on pledges, the use of financial statements, the…

  7. Cost-Benefit Analysis of Confidentiality Policies for Advanced Knowledge Management Systems

    Energy Technology Data Exchange (ETDEWEB)

    May, D

    2003-03-01

    Knowledge Discovery (KD) processes can create new information within a Knowledge Management (KM) system. In many domains, including government, this new information must be secured against unauthorized disclosure. Applying an appropriate confidentiality policy achieves this. However, it is not evident which confidentiality policy to apply, especially when the goals of sharing and disseminating knowledge have to be balanced with the requirements to secure knowledge. This work proposes to solve this problem by developing a cost-benefit analysis technique for examining the tradeoffs between securing and sharing discovered knowledge.

  8. Confidentiality and parental involvement in adolescent sexual and reproductive health care

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Lazarus, Jeff; Zaborskis, Apolinaras

    2011-01-01

    AIM: We surveyed Lithuanian general practitioners' (GPs) views on the importance of confidentiality for adolescents and on their practices in informing parents about sexual and reproductive health consultations with this age group. METHODS: In this cross-sectional study, a 41-item questionnaire...... was sent to a random sample of 607 Lithuanian GPs. The purpose of this questionnaire was to gain knowledge about current practices of GPs in informing parents on the importance of confidentiality as well as in protecting the privacy of minors. GPs' knowledge of the current legal age limit...... of sexual and reproductive health services for this group in Lithuanian primary care....

  9. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each...

  10. Allergen avoidance: does it work?

    Science.gov (United States)

    Woodcock, A; Custovic, A

    2000-01-01

    The first recorded example of allergen avoidance in the treatment of allergic disorders dates from the 16th century. The Italian physician Gerolamo Cardano (1501-1576) was invited to Scotland by John Hamilton, Archbishop of St Andrews (and brother of the Regent), to give advice on the treatment of his asthma. Cardano recommended that the Archbishop should get rid of his feather bedding, which was followed by a 'miraculous' remission of otherwise troublesome symptoms. The first controlled attempts to treat asthma by environmental manipulation date to the beginning of 20th century. In 1925, the Leopold brothers treated patients with asthma and other allergic disorders by moving them into a dust free room. Storm van Leeuwen created a 'climate' chamber in The Netherlands in 1927 and demonstrated that asthmatic patients improved when moved from their homes into the chamber. One year later, Dekker observed that measures aimed at reducing the amount of dust in bedrooms had a beneficial effect on asthma symptoms in patients allergic to house dust. Van Leeuwen wrote: 'In our endeavours to find the cause of the attack ... we utilised the known fact that the environment of the asthmatic patient is, as a rule, of primary importance in determining the intensity and frequency of his attacks'. Nowadays, more than ever, it is essential to address the environmental influences on the increasing prevalence of asthma and allergic disorders.

  11. Obstacle avoidance sonar for submarines

    Science.gov (United States)

    Dugas, Albert C.; Webman, Kenneth M.

    2002-05-01

    The Advanced Mine Detection Sonar (AMDS) system was designed to operate in poor environments with high biological and/or shallow-water boundary conditions. It provides increased capability for active detection of volume, close-tethered, and bottom mines, as well as submarine and surface target active/passive detection for ASW and collision avoidance. It also provides bottom topography mapping capability for precise submarine navigation in uncharted littoral waters. It accomplishes this by using advanced processing techniques with extremely narrow beamwidths. The receive array consists of 36 modules arranged in a 15-ft-diameter semicircle at the bottom of the submarine sonar dome to form a chin-mounted array. Each module consists of 40 piezoelectric rubber elements. The modules provide the necessary signal conditioning to the element data prior to signal transmission (uplink) through the hull. The elements are amplified, filtered, converted to digital signals by an A/D converter, and multiplexed prior to uplink to the inboard receiver. Each module also has a downlink over which it receives synchronization and mode/gain control. Uplink and downlink transmission is done using fiberoptic telemetry. AMDS was installed on the USS Asheville. The high-frequency chin array for Virginia class submarines is based on the Asheville design.

  12. 41 CFR 304-3.17 - If I am required to file a confidential or public financial disclosure report, must I report...

    Science.gov (United States)

    2010-07-01

    ... a confidential or public financial disclosure report, must I report travel payments I receive from a....17 If I am required to file a confidential or public financial disclosure report, must I report... Ethics in Government Act of 1978). Note: The confidential financial disclosure report is OGE Form 450...

  13. Consolidated financial statements for fiscal year 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The following overview and accompanying audited financial statements have been prepared for Fiscal Year (FY) 1996 to report the financial position and the results of operations of the Department of Energy. These statements include the consolidated Statement of Financial Position and the consolidated Statement of Operations and Changes in Net Position. The statements have been prepared in accordance with the Office of Management and Budget Bulletin No. 94-01, Form and Content for Agency Financial Statements, and were developed in accordance with the hierarchy of accounting standards described therein. The overview provides a narrative on the Department of Energy`s mission, activities, and accomplishments. Utilizing performance measures as the primary vehicle for communicating Departmental accomplishments and results, this overview discusses the most significant measures while others are discussed in the supplemental information to the financial statements.

  14. Disasters of endoscopic surgery and how to avoid them: error analysis.

    Science.gov (United States)

    Troidl, H

    1999-08-01

    For every innovation there are two sides to consider. For endoscopic surgery the positive side is more comfort for the patient, and the negative side is new complications, even disasters, such as injuries to organs (e.g., the bowel), vessels, and the common bile duct. These disasters are rare and seldom reported in the scientific world, as at conferences, at symposiums, and in publications. Today there are many methods for testing an innovation (controlled clinical trials, consensus conferences, audits, and confidential inquiries). Reporting "complications," however, does not help to avoid them. We need real methods for avoiding negative failures. The failure analysis is the method of choice in industry. If an airplane crashes, error analysis starts immediately. Humans make errors, and making errors means punishment. Failure analysis means rigorously and objectively investigating a clinical situation to find clinical relevant information for avoiding these negative events in the future. Error analysis has four important steps: (1) What was the clinical situation? (2) What has happened? (3) Most important: Why did it happen? (4) How do we avoid the negative event or disaster in the future. Error analysis has decisive advantages. It is easy to perform; it supplies clinically relevant information to help avoid it; and there is no need for money. It can be done everywhere; and the information is available in a short time. The other side of the coin is that error analysis is of course retrospective, it may not be objective, and most important it will probably have legal consequences. To be more effective in medicine and surgery we must handle our errors using a different approach. According to Sir Karl Popper: "The consituation is that we have to learn from our errors. To cover up failure is therefore the biggest intellectual sin.

  15. 论法院调解保密原则%Confidentiality in Court's Mediation

    Institute of Scientific and Technical Information of China (English)

    肖建华; 唐玉富

    2011-01-01

    调解保密性是现代社会法院调解程序发展的内在要求。调解保密性包括调解程序保密性和调解信息保密性。我国关于调解保密性的规定主要关注调解程序的保密性,但调解保密性更要求调解信息保密性。明确调解信息保密性的含义,合理规制"调解保密信息"的范围,建构多元化的调解保密适用方式,是多元化纠纷解决机制稳健运行的重要前提。%Confidentiality in mediation is the inherent requirements of mediation proceedings in the modern society.Confidentiality in mediation procedure and confidentiality in mediation information are the integral parts of confidentiality in mediation.However,con

  16. 78 FR 25090 - Proposed Collection, 60-day Comment Request: Certificate of Confidentiality Electronic...

    Science.gov (United States)

    2013-04-29

    ... data collection projects, the Office of Extramural Research (OER) of the National Institutes of Health... Certificates of Confidentiality (CoCs). Written comments and/or suggestions from the public and affected... collection plans and instruments, submit comments in writing, or request more information on the...

  17. 75 FR 70672 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2010-11-18

    ... AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation (CSC) of Chantilly, VA and Its Identified Subcontractors, to access information which has been submitted to EPA under all sections of the Toxic Substances Control Act...

  18. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to access information which has been submitted to EPA under all sections of the Toxic Substances Control Act...

  19. Ensuring Confidentiality of Geocoded Health Data: Assessing Geographic Masking Strategies for Individual-Level Data

    Directory of Open Access Journals (Sweden)

    Paul A. Zandbergen

    2014-01-01

    Full Text Available Public health datasets increasingly use geographic identifiers such as an individual’s address. Geocoding these addresses often provides new insights since it becomes possible to examine spatial patterns and associations. Address information is typically considered confidential and is therefore not released or shared with others. Publishing maps with the locations of individuals, however, may also breach confidentiality since addresses and associated identities can be discovered through reverse geocoding. One commonly used technique to protect confidentiality when releasing individual-level geocoded data is geographic masking. This typically consists of applying a certain amount of random perturbation in a systematic manner to reduce the risk of reidentification. A number of geographic masking techniques have been developed as well as methods to quantity the risk of reidentification associated with a particular masking method. This paper presents a review of the current state-of-the-art in geographic masking, summarizing the various methods and their strengths and weaknesses. Despite recent progress, no universally accepted or endorsed geographic masking technique has emerged. Researchers on the other hand are publishing maps using geographic masking of confidential locations. Any researcher publishing such maps is advised to become familiar with the different masking techniques available and their associated reidentification risks.

  20. 5 CFR 213.3301 - Positions of a confidential or policy-determining nature.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Positions of a confidential or policy-determining nature. 213.3301 Section 213.3301 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL... or policy-determining nature. (a) Upon specific authorization by OPM, agencies may make...

  1. 77 FR 10506 - Access to Confidential Business Information by Syracuse Research Corporation, Inc., and Its...

    Science.gov (United States)

    2012-02-22

    ... AGENCY Access to Confidential Business Information by Syracuse Research Corporation, Inc., and Its...: Notice. SUMMARY: EPA has authorized its contractor, Syracuse Research Corporation (SRC), Inc., of North Syracuse, NY, and its identified subcontractor BeakerTree Corporation to access information which has...

  2. 45 CFR 61.14 - Confidentiality of Healthcare Integrity and Protection Data Bank information.

    Science.gov (United States)

    2010-10-01

    ... Protection Data Bank information. 61.14 Section 61.14 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION HEALTHCARE INTEGRITY AND PROTECTION DATA BANK FOR FINAL ADVERSE INFORMATION ON... and Protection Data Bank § 61.14 Confidentiality of Healthcare Integrity and Protection Data...

  3. 75 FR 60452 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-30

    ... AGENCY Clean Water Act; Contractor Access to Confidential Business Information AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency's (EPA) Office of Water... standards under the Clean Water Act (CWA). Interested persons may submit comments on this intended...

  4. 75 FR 55577 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2010-09-13

    ... AGENCY Clean Water Act; Contractor Access to Confidential Business Information AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: The Environmental Protection Agency's (EPA) Office of Water... of section 308 of the Clean Water Act (CWA). Some information being transferred from the pulp,...

  5. Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.

    Science.gov (United States)

    Ibaida, Ayman; Khalil, Ibrahim

    2013-12-01

    With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as point-of-care (PoC) applications in hospitals around the world. Therefore, huge amount of ECG signal collected by body sensor networks from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level, etc., and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data are being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this paper, a wavelet-based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest. To evaluate the effectiveness of the proposed technique on the ECG signal, two distortion measurement metrics have been used: the percentage residual difference and the wavelet weighted PRD. It is found that the proposed technique provides high-security protection for patients data with low (less than 1%) distortion and ECG data remain diagnosable after watermarking (i.e., hiding patient confidential data) and as well as after watermarks (i.e., hidden data) are removed from the watermarked data.

  6. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    Science.gov (United States)

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.

  7. 21 CFR 20.55 - Indexing trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Indexing trade secrets and confidential commercial... OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION Procedures and Fees § 20.55 Indexing trade... itemization and indexing of the records. If the affected person fails to intervene to defend the exempt...

  8. 6 CFR 25.10 - Confidentiality and protection of Intellectual Property.

    Science.gov (United States)

    2010-01-01

    ... protection of Intellectual Property. (a) General. The Secretary, in consultation with the Office of... 6 Domestic Security 1 2010-01-01 2010-01-01 false Confidentiality and protection of Intellectual Property. 25.10 Section 25.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  9. 12 CFR 261.20 - Confidential supervisory information made available to supervised financial institutions and...

    Science.gov (United States)

    2010-01-01

    ... by the Board or the appropriate Federal Reserve Bank to the supervised financial institution. (b) Disclosure of confidential supervisory information by supervised financial institution—(1) Parent bank... financial institution, its parent bank holding company, or the officers, directors, and employees of...

  10. 76 FR 52659 - Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse...

    Science.gov (United States)

    2011-08-23

    ... AGENCY Access by EPA Contractors to Confidential Business Information (CBI) Related to the Greenhouse Gas... be submitted to EPA under the Greenhouse Gas Reporting Program that may be designated or claimed as... FURTHER INFORMATION CONTACT: Carole Cook, Climate Change Division, Office of Atmospheric Programs...

  11. 77 FR 10434 - Mandatory Reporting of Greenhouse Gases Rule: Confidentiality Determinations and Best Available...

    Science.gov (United States)

    2012-02-22

    ... AGENCY 40 CFR Part 98 RIN 2060-AQ70 Mandatory Reporting of Greenhouse Gases Rule: Confidentiality...) 566-1742. FOR FURTHER INFORMATION CONTACT: Carole Cook, Climate Change Division, Office of Atmospheric... technical information, contact the Greenhouse Gas Reporting Rule Hotline at:...

  12. 21 CFR 601.51 - Confidentiality of data and information in applications for biologics licenses.

    Science.gov (United States)

    2010-04-01

    ...) Adverse reaction reports, product experience reports, consumer complaints, and other similar data and... 21 Food and Drugs 7 2010-04-01 2010-04-01 false Confidentiality of data and information in applications for biologics licenses. 601.51 Section 601.51 Food and Drugs FOOD AND DRUG...

  13. 21 CFR 71.15 - Confidentiality of data and information in color additive petitions.

    Science.gov (United States)

    2010-04-01

    ... § 20.61 of this chapter. (3) Adverse reaction reports, product experience reports, consumer complaints... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Confidentiality of data and information in color additive petitions. 71.15 Section 71.15 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF...

  14. 19 CFR 206.17 - Limited disclosure of certain confidential business information under administrative protective...

    Science.gov (United States)

    2010-04-01

    ... Investigations Relating to Global Safeguard Actions § 206.17 Limited disclosure of certain confidential business... business information under administrative protective order. 206.17 Section 206.17 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION NONADJUDICATIVE INVESTIGATIONS INVESTIGATIONS RELATING TO...

  15. Confidentiality Issues when Minor Children Disclose Family Secrets in Family Counseling

    Science.gov (United States)

    McCurdy, Kenneth G.; Murray, Kenneth C.

    2003-01-01

    The literature addressing ethical issues involved in the disclosure of family secrets in counseling has typically focused on secrets disclosed by adults, ignoring the ethical issues surrounding individual disclosure by minor children and confidentiality within the family counseling context. This article explores family secrets, confidentiality…

  16. 76 FR 77817 - Access to Confidential Business Information by CGI Federal, Inc. and Subcontractor, Innovate, Inc.

    Science.gov (United States)

    2011-12-14

    ... AGENCY Access to Confidential Business Information by CGI Federal, Inc. and Subcontractor, Innovate, Inc..., CGI Federal Inc. (CGI) of Fairfax, VA, and subcontractor, Innovate, Inc. of Alexandria, VA, to access..., contractor CGI of 12601 Fair Lakes Circle, Fairfax, VA, and subcontractor, Innovate, Inc. of 5835 Valley...

  17. 42 CFR 2.1 - Statutory authority for confidentiality of drug abuse patient records.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS Introduction... this section. (b) Purposes and circumstances of disclosure affecting consenting patient and patient... the injury to the patient, to the physician-patient relationship, and to the treatment services....

  18. [Children's medical records, HIV and confidentiality: practices and attitudes of physicians and families].

    Science.gov (United States)

    Suesser, P; Letrait, S; Welniarz, B

    2001-12-01

    The aim of this study is to describe the attitudes and practices of doctors and families regarding the use of the individual child health journal, especially by exploring the contradictions between the validity and confidentiality of its content, in particular with respect to HIV infection. In order to accomplish this, both doctors (N = 380) and families (N = 242) were questioned, most of them living and working in Seine-Saint-Denis, the metropolitan district with the third highest prevalence rate of HIV. The findings indicate that: most families are not always prepared to make sure that the confidential use of the child's health journal is maintained, and even less so those affected by HIV; doctors refrain from recording certain psychological and even medical data in the child health journal for fear of the information's misuse within the social sphere; doctors as well as families expressed their preoccupations concerning the confidentiality of the child health journal, essentially with respect to its content and how it is used in various contexts. A number of possibilities are proposed by the study's participants: establish a vaccination record separate from the child health journal, educate parents on how to maintain its confidential use and train the health workers to this end.

  19. Generalization of socially transmitted and instructed avoidance

    Directory of Open Access Journals (Sweden)

    Gemma eCameron

    2015-06-01

    Full Text Available Excessive avoidance behavior, in which an instrumental action prevents an upcoming aversive event, is a defining feature of anxiety disorders. Left unchecked, both fear and avoidance of potentially threatening stimuli may generalize to perceptually related stimuli and situations. The behavioral consequences of generalization mean that aversive learning experiences with specific threats may lead people to infer that classes of related stimuli are threatening, potentially dangerous, and need to be avoided, despite differences in physical form. Little is known about avoidance generalization in humans and the learning pathways by which it may be transmitted. In the present study, we compared two pathways to avoidance, instructions and social observation, on subsequent generalization of avoidance behavior, fear expectancy and physiological arousal. Participants first learned that one cue was a danger cue (conditioned stimulus, CS+ and another was a safety cue (CS-. Groups then were either instructed that a simple avoidance response in the presence of the CS+ cancelled upcoming shock presentations (instructed-learning group or observed a short movie showing a demonstrator performing the avoidance response to prevent shock (observational-learning group. During generalization testing, danger and safety cues were presented along with generalization stimuli that parametrically varied in perceptual similarity to the CS+. Reinstatement of fear and avoidance was also tested. Findings demonstrate, for the first time, generalization of socially transmitted and instructed avoidance: both groups showed comparable generalization gradients in fear expectancy, avoidance behavior and arousal. Return of fear was evident, suggesting that generalized avoidance remains persistent following extinction testing. The utility of the present paradigm for research on avoidance generalization is discussed.

  20. Breaking patient confidentiality: comparing Chilean and French viewpoints regarding the conditions of its acceptability

    Directory of Open Access Journals (Sweden)

    Cecilia Olivari

    2011-01-01

    Full Text Available The study examined the conditions under which lay people and health professionals living in Chile find it acceptable for a physician to break confidentiality to protect the wife of a patient with a sexually transmitted disease (STD. One hundred sixty-nine lay persons, 10 physicians, 17 psychologists, and 11 paramedical professionals indicated the acceptability of breaking confidentiality in 48 scenarios. The scenarios were all possible combinations of five factors: disease severity (severe, lethal; time taken to discuss this with the patient (little time, much time; patient’s intent to inform his spouse about the disease (none, one of these days, immediately; patient’s intent to adopt protective behaviors (no intent, intent; and physician’s decision to consult an STD expert (yes, no, 2 x 2 x 3 x 2 x 2. The study also compared Chilean and French views, using data gathered previously in France. A cluster analysis conducted on the overall set of raw data revealed groups of participants that found breaking confidentiality “always acceptable” (9%, requiring “consultation with an expert” (5%, “depending on the many circumstances” (70%, and “never acceptable” (11%”. Despite clear differences in legislation and official codes of ethics between their two countries, Chilean and French lay people did not differ much in their personal convictions regarding the circumstances in which patient confidentiality can be broken or must not be broken. By contrast, Chilean physicians, in agreement with their code of ethics, were much less supportive than French physicians of complete respect of patient confidentiality in all cases

  1. Analysis of the ethical aspects of professional confidentiality in dental practice

    Directory of Open Access Journals (Sweden)

    Cléa Adas Saliba Garbin

    2008-02-01

    Full Text Available From the point of view of deontological ethics, privacy is a moral right that patients are entitled to and it is bound to professional confidentiality. Otherwise, the information given by patients to health professionals would not be reliable and a trustable relationship could not be established. The aim of the present study was to assess, by means of questionnaires with open and closed questions, the awareness and attitudes of 100 dentists working in the city of Andradina, São Paulo State, Brazil, with respect to professional confidentiality in dental practice. Most dentists (91.43% reported to have instructed their assistants on professional confidentiality. However, 44.29% of the interviewees showed to act contradictorily as reported talking about the clinical cases of their patients to their friends or spouses. The great majority of professionals (98.57% believed that it is important to have classes on Ethics and Bioethics during graduation and, when asked about their knowledge of the penalties imposed for breach of professional confidentiality, only 48.57% of them declared to be aware of it. Only 28.57% of the interviewees affirmed to have exclusive access to the files; 67.14% reported that that files were also accessed by their secretary; 1.43% answered that their spouses also had access, and 2.86% did not answer. From the results of the present survey, it could be observed that, although dentists affirmed to be aware of professional confidentiality, their attitudes did not adhere to ethical and legal requirements. This stand of health professionals has contributed to violate professional ethics and the law itself, bringing problems both to the professional and to the patient.

  2. Informative privacy and confidentiality for adolescents: the attitude of the Flemish paediatrician anno 2010.

    Science.gov (United States)

    Deneyer, Michel; Devroey, Dirk; De Groot, Etienne; Buyl, Ronald; Clybouw, Ciska; Vandenplas, Yvan

    2011-09-01

    Confidentiality is a major issue in adolescent healthcare, and its perceived absence may be the main barrier for an adolescent to seek medical care. Little is known about the right on informative privacy and confidentiality for adolescents in Belgium, although these rights are unambiguously foreseen in the law on patients' rights since 2002. There are no data available regarding the introduction of a private moment with the physician during a consultation, about the nature and the quantity of information made available to parents by the paediatricians regarding the health situation of adolescents and about the existence of procedures with regard to these matters. The purpose of this study is to map out the current interpretation and the attitude of the paediatrician with regard to the right to confidentiality and informative privacy. The answers of 117 Flemish paediatricians to an anonymous questionnaire were analyzed. An unaccompanied medical visit is not frequent in Belgium (only 1%). Only 35.1% of the paediatricians systematically offer the possibility to have a private conversation with an adolescent. Almost 80% of the paediatricians render, as a rule, all information to the parents. Parents are informed about sensible information regarding psychosocial aspects, including data concerning sexual behaviour, in not less than 83.2% of the consultations by adolescents. Only in 2.9% no information is given to the parents. The paediatricians employ only for 13% the procedures regarding confidentiality for minors. This study reveals that Flemish paediatricians have a paternalistic attitude concerning the right on confidentiality and informative privacy, which is not in line with the Belgian legislation. Paediatricians offer only seldom the possibility for a private conversation to the adolescent. The small incidence of unaccompanied medical consultations contributes to this. Proper application of the legal context, the handling of the watertight procedures and the

  3. Detection And Avoidance Of Obstacles By Helicopters

    Science.gov (United States)

    Cheng, Victor H. L.; Sridhar, Banavar

    1992-01-01

    Report discusses problems relevant to control subsystems enabling helicopters on nap-of-the-Earth flight paths to detect and avoid obstacles automatically. Indicates similarities between this and obstacle-avoidance problem of industrial mobile robots. Two approaches extend two-dimensional obstacle-avoidance concept to three dimensions. First involves direct search of three-dimensional range-map data for indications of openings between obstacles. Second involves compression of data into two-dimensional map for path search.

  4. Mobile Robot Collision Avoidance in Human Environments

    OpenAIRE

    Lingqi Zeng; Gary M. Bone

    2013-01-01

    Collision avoidance is a fundamental requirement for mobile robots. Avoiding moving obstacles (also termed dynamic obstacles) with unpredictable direction changes, such as humans, is more challenging than avoiding moving obstacles whose motion can be predicted. Precise information on the future moving directions of humans is unobtainable for use in navigation algorithms. Furthermore, humans should be able to pursue their activities unhindered and without worrying about the robots around them....

  5. The importance of cardiovascular pathology contributing to maternal death: Confidential Enquiry into Maternal Deaths in South Africa, 2011–2013

    Science.gov (United States)

    Soma-Pillay, Priya; Seabe, Joseph; Soma-Pillay, Priya; Seabe, Joseph; Sliwa, Karen

    2016-01-01

    Summary Aims Cardiac disease is emerging as an important contributor to maternal deaths in both lower-to-middle and higher-income countries. There has been a steady increase in the overall institutional maternal mortality rate in South Africa over the last decade. The objectives of this study were to determine the cardiovascular causes and contributing factors of maternal death in South Africa, and identify avoidable factors, and thus improve the quality of care provided. Methods Data collected via the South African National Confidential Enquiry into Maternal Deaths (NCCEMD) for the period 2011–2013 for cardiovascular disease (CVD) reported as the primary pathology was analysed. Only data for maternal deaths within 42 days post-delivery were recorded, as per statutory requirement. One hundred and sixty-nine cases were reported for this period, with 118 complete hospital case files available for assessment and data analysis. Results Peripartum cardiomyopathy (PPCM) (34%) and complications of rheumatic heart disease (RHD) (25.3%) were the most important causes of maternal death. Hypertensive disorders of pregnancy, HIV disease infection and anaemia were important contributing factors identified in women who died of peripartum cardiomyopathy. Mitral stenosis was the most important contributor to death in RHD cases. Of children born alive, 71.8% were born preterm and 64.5% had low birth weight. Seventy-eight per cent of patients received antenatal care, however only 33.7% had a specialist as an antenatal care provider. Avoidable factors contributing to death included delay in patients seeking help (41.5%), lack of expertise of medical staff managing the case (29.7%), delay in referral to the appropriate level of care (26.3%), and delay in appropriate action (36.4%). Conclusion The pattern of CVD contributing to maternal death in South Africa was dominated by PPCM and complications of RHD, which could, to a large extent, have been avoided. It is likely that there were

  6. Confidentiality of the medical records of HIV-positive patients in the United Kingdom – a medicolegal and ethical perspective

    Directory of Open Access Journals (Sweden)

    Mike Williams

    2011-01-01

    Full Text Available Mike WilliamsHead of Service, Cambridge University Dental Service, Cambridge, UKAbstract: This article examines the legal and ethical issues that surround the confidentiality of medical records, particularly in relation to patients who are HIV positive. It records some historical background of the HIV epidemic, and considers the relative risks of transmission of HIV from individual to individual. It explains the law as it pertains to confidentiality, and reports the professional guidance in these matters. It then considers how these relate to HIV-positive individuals in particular.Keywords: HIV/AIDS, confidentiality, medical records

  7. MEASUREMENT OF APPLICATION OF ISO 27001 OF CUSTOMER CELLULAR CARD CONFIDENTIALITY DATA IN PT. XYZ AREA JAKARTA

    Directory of Open Access Journals (Sweden)

    Krishna Rahadian

    2014-10-01

    Full Text Available The purpose of this study was to evaluate the effects of the process of ISO 27001 with respect to the confidentiality of customer cellular card Jakarta and to improve cellular card customer data confidentiality at PT.XYZ from data leakage of the customer data due to the third party involvement, clean-desk policy, and access right. Recommendation regarding the improvement is provided after reviewing the confidentiality of customer data. The survey in this study is conducted by questionnaire. From the evaluation results of the questionnaire, it is concluded that the larger customer data leaks are mainly caused by the external factors.

  8. Avoiding Disclosure of Individually Identifiable Health Information

    Directory of Open Access Journals (Sweden)

    Sergio I. Prada

    2011-10-01

    Full Text Available Achieving data and information dissemination without harming anyone is a central task of any entity in charge of collecting data. In this article, the authors examine the literature on data and statistical confidentiality. Rather than comparing the theoretical properties of specific methods, they emphasize the main themes that emerge from the ongoing discussion among scientists regarding how best to achieve the appropriate balance between data protection, data utility, and data dissemination. They cover the literature on de-identification and reidentification methods with emphasis on health care data. The authors also discuss the benefits and limitations for the most common access methods. Although there is abundant theoretical and empirical research, their review reveals lack of consensus on fundamental questions for empirical practice: How to assess disclosure risk, how to choose among disclosure methods, how to assess reidentification risk, and how to measure utility loss.

  9. Computer Security: improve software, avoid blunder

    CERN Document Server

    Computer Security Team

    2014-01-01

    Recently, a severe vulnerability has been made public about how Apple devices are wrongly handling encryption. This vulnerability rendered SSL/TLS protection useless, and permitted attackers checking out a wireless network to capture or modify data in encrypted sessions.   In other words, all confidential data like passwords, banking information, etc. could have been siphoned off by a targeted attack. While Apple has been quick in providing adequate security patches for iOS devices and Macs, it is an excellent example of how small mistakes can lead to big security holes. Here is the corresponding code from Apple’s Open Source repository. Can you spot the issue? 1 static OSStatus 2 SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams, uint8_t *signature, UInt16 signatureLen) 3 { 4              OSStatus &nb...

  10. 47 CFR 74.604 - Interference avoidance.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Interference avoidance. 74.604 Section 74.604 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES EXPERIMENTAL RADIO... Stations § 74.604 Interference avoidance. (a) (b) Where two or more licensees are assigned a common...

  11. Avoidable deaths in Greenland 1968-1985

    DEFF Research Database (Denmark)

    Bjerregaard, Peter; Juel, K

    1990-01-01

    The concept of avoidable deaths suggests that certain deaths ought not occur in a given society because it is possible to prevent or treat the disease or condition. A list of avoidable deaths is time and community specific as it reflects the socioeconomic conditions, professional medical capacity...

  12. Confidential dominance relation based rough approximation model%基于置信优势关系的粗糙集近似模型

    Institute of Scientific and Technical Information of China (English)

    苟光磊; 王国胤; 利节; 吴迪

    2014-01-01

    不完备有序信息处理是现实生活中的常见问题。多种拓展优势关系及其粗糙集模型被提出并用于解决不完全的偏好决策问题,但均未考虑序关系特性,与现实语义存在矛盾。对此,提出一种置信优势关系及其粗糙集近似模型,讨论了基于置信优势关系的粗糙集模型与已有模型的关系。与现有的拓展关系相比,该置信优势关系满足序关系特性,避免了语义上的矛盾。定理证明和实例分析表明,置信优势关系粗糙集近似模型的近似精度和分类精度更优。%Incomplete ordered information processing is a common problem in the real life. Various extended dominance relation rough set models are already proposed to solve the incomplete ordinal decision problem. But there exits some ambivalence over the real semantics because the characteristics of the order relation are not considered. Therefore, the confidence dominance relation and its rough set approximation model are presented. Relationships between the confidential dominance relation based rough set model and existing models are discussed. Compared with the current expansion relations, confidence dominance relation fits the characteristics of the order relation to avoid semantic contradiction. Theorem proving and example analysis show that the confidential dominance relation based rough approximation model has better approximate accuracy and classification accuracy.

  13. 7 CFR 900.350 - General statement.

    Science.gov (United States)

    2010-01-01

    ... Determining the Qualification of Cooperative Milk Marketing Associations § 900.350 General statement. Cooperative marketing associations apply for qualification by the Secretary under the Federal milk...

  14. Financial Statement Fraud Detection using Text Mining

    Directory of Open Access Journals (Sweden)

    Rajan Gupta

    2013-01-01

    Full Text Available Data mining techniques have been used enormously by the researchers’ community in detecting financial statement fraud. Most of the research in this direction has used the numbers (quantitative information i.e. financial ratios present in the financial statements for detecting fraud. There is very little or no research on the analysis of text such as auditor’s comments or notes present in published reports. In this study we propose a text mining approach for detecting financial statement fraud by analyzing the hidden clues in the qualitative information (text present in financial statements.

  15. Intellectual Capital Statements -When Rhetoric meets Logic

    DEFF Research Database (Denmark)

    Krag, Lotte

    of representation is calculus and mathematical rules. To illustrate the importance of describing a firm by not only using numbers the article illustrates the differences between intellectual capital statements and traditional balance sheets. The intellectual capital statement is often accused of not being a valid...... document to assess a company's value by, but this article argues that although intellectual capital statements make use of another way of presenting arguments than traditional balance sheets do they are still valid for describing a firm. The article argues that the intellectual capital statement uses...

  16. 7 CFR 1980.445 - Periodic financial statements and audits.

    Science.gov (United States)

    2010-01-01

    ... periodic financial statements to the lender. Lenders must forward copies of the financial statements and the lender's analysis of the statements to the Agency. (a) Audited financial statements. Except as... section shall be considered an impediment to the lender requiring financial statements more......

  17. New statement of leave format

    CERN Multimedia

    HR Department

    2009-01-01

    Following the communication of the Standing Concertation Committee published in Weekly Bulletin No. 18-19 of 27 April 2009, the current statement of leave on monthly pay slips has been replaced with the EDH Leave Transactions report that displays the up-to-date situation of individual leave balances at all times. The report is available on EDH. Additionally, the layout of the pay slip has been modernised. The new version of the pay slip will be send out from September 2009 onwards. Finance and Purchasing Department, Personnel Accounting Human Resources Department, Organisation and Procedures General Infrastructure Services Department, Administrative Information Services

  18. Statement

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In order to meet the requirement of the informatization construction in our country, and to expand the academic exchange channel for the authors, SPAT has acceded to Chinese Academic Journal-CD(CAJ-CD), Chinajournal net and ChinaInfo. The fee of the copyright for the authors will be paid together with the author's remuneration at same time. Those who don't want their articles to be edited into this database may declare at the moment the manuscripts submitted to us so that we can appropriately deal with them. Editorial Board of SPAT

  19. 78 FR 13082 - Draft Environmental Impact Report/Environmental Impact Statement/Environmental Impact Statement...

    Science.gov (United States)

    2013-02-26

    ... Bureau of Reclamation Draft Environmental Impact Report/Environmental Impact Statement/ Environmental...: The Bureau of Reclamation has made available for public review and comment the draft Environmental Impact Report/Environmental Impact Statement/Environmental Impact Statement (EIR/EIS/EIS) for the...

  20. Objectives of Financial Statements. Report of the Study Group on the Objectives of Financial Statements.

    Science.gov (United States)

    American Inst. of Certified Public Accountants, New York, NY.

    This report discusses the objectives of financial statements. Emphasis is placed on the function of objectives; users, their goals, and their information needs; the primary enterprise goal and earning power; accountability and financial statements; financial statements--reporting on the goal attainment of business enterprises; financial…

  1. The break of medical confidentiality for the benefit of public health: a controversial topic

    Directory of Open Access Journals (Sweden)

    Papageorgiou Ε.

    2013-10-01

    Full Text Available Aim: This paper refers to the decision made by the Greek Government to publish photographs and personal data of HIV positive sex workers on the grounds of protecting public health. Method: Initially, the law and theoretical background of medical confidentiality and its break were reviewed and then the conditions and data that led to the specific decision made by the Greek Authorities were investigated. Also the contribution of NGOs in the prevention of Public Health was studied. Conclusion: The survey showed that in this particular case the break of confidentiality was excessive and biased due to the origin and illegal activity of the women. A proper solution to the HIV/AIDS outbreak would be the intensification of prevention. In this sector, NGOs can and should play an active role considering that the primary care in Greece, especially during the economic crisis, shows organizational and operational weaknesses.

  2. Novel virtual user scheme to increase data confidentiality against eavesdropping in OCDMA network

    Institute of Scientific and Technical Information of China (English)

    Vishav Jyoti; R. S. Kaler

    2011-01-01

    We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system.A virtual user technique is analyzed and implemented to make an OCDMA system secure.Using this technique,an eavesdropper will never find an isolated authorized user's signal.When authorized users and virtual users transmit data synchronously and asynchronously,network security increases by 25% and 37.5%,respectively.%We propose a novel technique to increase the confidentiality of an optical code division multiple access (OCDMA) system. A virtual user technique is analyzed and implemented to make an OCDMA system secure. Using this technique, an eavesdropper will never find an isolated authorized user's signal. When authorized users and virtual users transmit data synchronously and asynchronously, network security increases by 25% and 37.5%, respectively.

  3. Balancing confidentiality and the information provided to families of patients in primary care

    Science.gov (United States)

    Perez-Carceles, M; Pereniguez, J; Osuna, E; Luna, A

    2005-01-01

    Objectives: This study aimed to describe family doctors' attitudes to confidentiality and providing patient information to relatives as well as their justifications for sharing information. Method: A descriptive postal questionnaire was self-administered by family doctors. Results: Of 227 doctors, 95.1% provided information to a patient's family and over a third (35%) disclosed information to others without prior patient consent. Conclusions: The findings reveal that family doctors should pay more attention to their patients' rights to information, privacy, and confidentiality, and reflect very carefully on the fine balance between this and the occasional need for the support and collaboration of family members in delivery of care. Emphasis should be placed on ethics and legal problems during undergraduate education and in-service training of doctors. PMID:16131555

  4. Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina

    Directory of Open Access Journals (Sweden)

    Leitner Michael

    2006-10-01

    Full Text Available Abstract Background Geographic Information Systems (GIS can provide valuable insight into patterns of human activity. Online spatial display applications, such as Google Earth, can democratise this information by disseminating it to the general public. Although this is a generally positive advance for society, there is a legitimate concern involving the disclosure of confidential information through spatial display. Although guidelines exist for aggregated data, little has been written concerning the display of point level information. The concern is that a map containing points representing cases of cancer or an infectious disease, could be re-engineered back to identify an actual residence. This risk is investigated using point mortality locations from Hurricane Katrina re-engineered from a map published in the Baton Rouge Advocate newspaper, and a field team validating these residences using search and rescue building markings. Results We show that the residence of an individual, visualized as a generalized point covering approximately one and half city blocks on a map, can be re-engineered back to identify the actual house location, or at least a close neighbour, even if the map contains little spatial reference information. The degree of re-engineering success is also shown to depend on the urban characteristic of the neighborhood. Conclusion The results in this paper suggest a need to re-evaluate current guidelines for the display of point (address level data. Examples of other point maps displaying health data extracted from the academic literature are presented where a similar re-engineering approach might cause concern with respect to violating confidentiality. More research is also needed into the role urban structure plays in the accuracy of re-engineering. We suggest that health and spatial scientists should be proactive and suggest a series of point level spatial confidentiality guidelines before governmental decisions are made

  5. Approaching confidentiality at a familial level in genomic medicine: a focus group study with healthcare professionals

    Science.gov (United States)

    Dheensa, Sandi; Fenwick, Angela; Lucassen, Anneke

    2017-01-01

    Objectives Clinical genetics guidelines from 2011 conceptualise genetic information as confidential to families, not individuals. The normative consequence of this is that the family's interest is the primary consideration and genetic information is shared unless there are good reasons not to do so. We investigated healthcare professionals' (HCPs') views about, and reasoning around, individual and familial approaches to confidentiality and how such views influenced their practice. Method 16 focus groups with 80 HCPs working in/with clinical genetics services were analysed, drawing on grounded theory. Results Participants raised seven problems with, and arguments against, going beyond the individual approach to confidentiality. These problems fell into two overlapping categories: ‘relationships’ and ‘structures’. Most participants had never considered ways to—or thought it was impossible to—treat familial genetic information and personal information differently. They worried that putting the familial approach into practice could disrupt family dynamics and erode patient trust in the health service. They also thought they had insufficient resources to share information and feared that sharing might change the standard of care and make them more vulnerable to liability. Conclusions A familial approach to confidentiality has not been accepted or adopted as a standard, but wider research suggests that some of the problems HCPs perceived are surmountable and sharing in the interest of the family can be achieved. However, further research is needed to explore how personal and familial genetic information can be separated in practice. Our findings are relevant to HCPs across health services who are starting to use genome tests as part of their routine investigations. PMID:28159847

  6. Confidentiality and data sharing: vulnerabilities of the Mexican Genomics Sovereignty Act

    OpenAIRE

    Rojas-Martínez, Augusto

    2015-01-01

    A law known as “Genomic Sovereignty Act”, instituted in 2011, regulates research on the human genome in Mexico. This law establishes Government regulations for the exportation of DNA samples from Mexican nationals for population genetics studies. The Genomic Sovereignty Act protects fundamental human values, as confidentiality and non-discrimination based on personal genetic information. It also supports the development of the genome-based medical biotechnology and the bio-economy. Current la...

  7. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  8. Embedding patients confidential data in ECG signal for healthcare information systems.

    Science.gov (United States)

    Ibaida, Ayman; Khalil, Ibrahim; Al-Shammary, Dhiah

    2010-01-01

    In Wireless tele-cardiology applications, ECG signal is widely used to monitor cardiac activities of patients. Accordingly, in most e-health applications, ECG signals need to be combined with patient confidential information. Data hiding and watermarking techniques can play a crucial role in ECG wireless tele-monitoring systems by combining the confidential information with the ECG signal since digital ECG data is huge enough to act as host to carry tiny amount of additional secret data. In this paper, a new steganography technique is proposed that helps embed confidential information of patients into specific locations (called special range numbers) of digital ECG host signal that will cause minimal distortion to ECG, and at the same time, any secret information embedded is completely extractable. We show that there are 2.1475 × 10(9) possible special range numbers making it extremely difficult for intruders to identify locations of secret bits. Experiments show that percentage residual difference (PRD) of watermarked ECGs can be as low as 0.0247% and 0.0678% for normal and abnormal ECG segments (taken from MIT-BIH Arrhythmia database) respectively.

  9. Confidentiality and data sharing: vulnerabilities of the Mexican Genomics Sovereignty Act.

    Science.gov (United States)

    Rojas-Martínez, Augusto

    2015-07-01

    A law known as "Genomic Sovereignty Act", instituted in 2011, regulates research on the human genome in Mexico. This law establishes Government regulations for the exportation of DNA samples from Mexican nationals for population genetics studies. The Genomic Sovereignty Act protects fundamental human values, as confidentiality and non-discrimination based on personal genetic information. It also supports the development of the genome-based medical biotechnology and the bio-economy. Current laws for the protection of the genomic confidentiality, however, are inexplicit and insufficient, and the legal and technological instruments are primitive and insufficient to safeguard this bioethical principle. In addition, this law may undermine efforts of the national and international scientific communities to cooperate with big-data analysis for the development of the genome-based biomedical sciences. The argument of this article is that deficiencies in the protection of the confidentiality of genomic information and limitations in data sharing severely weaken the objectives and scope of the Genomic Sovereignty Act. In addition, the Act may compromise the national biomedical development and the international cooperation for research and development in the field of human genomics.

  10. 17 CFR 230.252 - Offering statement.

    Science.gov (United States)

    2010-04-01

    ..., language and pagination. The requirements for offering statements are the same as those specified in § 230... Officer, a majority of the members of its board of directors or other governing body, and each selling... that contains the following language: This offering statement shall become qualified on the...

  11. Position Statement on Active Outdoor Play

    Directory of Open Access Journals (Sweden)

    Mark S. Tremblay

    2015-06-01

    Full Text Available A diverse, cross-sectorial group of partners, stakeholders and researchers, collaborated to develop an evidence-informed Position Statement on active outdoor play for children aged 3–12 years. The Position Statement was created in response to practitioner, academic, legal, insurance and public debate, dialogue and disagreement on the relative benefits and harms of active (including risky outdoor play. The Position Statement development process was informed by two systematic reviews, a critical appraisal of the current literature and existing position statements, engagement of research experts (N = 9 and cross-sectorial individuals/organizations (N = 17, and an extensive stakeholder consultation process (N = 1908. More than 95% of the stakeholders consulted strongly agreed or somewhat agreed with the Position Statement; 14/17 participating individuals/organizations endorsed it; and over 1000 additional individuals and organizations requested their name be listed as a supporter. The final Position Statement on Active Outdoor Play states: “Access to active play in nature and outdoors—with its risks— is essential for healthy child development. We recommend increasing children’s opportunities for self-directed play outdoors in all settings—at home, at school, in child care, the community and nature.” The full Position Statement provides context for the statement, evidence supporting it, and a series of recommendations to increase active outdoor play opportunities to promote healthy child development.

  12. An Analysis of Private School Mission Statements

    Science.gov (United States)

    Boerema, Albert J.

    2006-01-01

    This article is a study of private school mission/vision statements using content analysis. Statements from private schools in British Columbia, Canada, that provided instruction to Grade 12 students were analyzed to explore the diversity that lies within the private school sector. The concepts that emerged from the analysis were grouped into five…

  13. 14 CFR 313.6 - Energy statements.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Energy statements. 313.6 Section 313.6... REGULATIONS IMPLEMENTATION OF THE ENERGY POLICY AND CONSERVATION ACT § 313.6 Energy statements. (a) Each major... action taken or to be taken upon energy efficiency and conservation. The administrative law judge or...

  14. 29 CFR 570.101 - Introductory statement.

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS CHILD LABOR REGULATIONS, ORDERS AND STATEMENTS OF INTERPRETATION General Statements of Interpretation of the Child Labor...) This subpart discusses the meaning and scope of the child labor provisions contained in the Fair...

  15. The Role of Statements of Institutional Purpose.

    Science.gov (United States)

    Lang, Daniel W.; Lopers-Sweetman, Rosanne

    1991-01-01

    Examination of 32 college and 12 higher education system mission statements suggests they are effective in some situations but may be disadvantageous in others. Several different roles for the statements emerged: (1) goals clarification; (2) smoke screens for opportunism; (3) descriptions of status quo; (4) aspirations; and (5) marketing tools.…

  16. 19 CFR 10.511 - Supporting statement.

    Science.gov (United States)

    2010-04-01

    ... relevant facts. (c) Language. The supporting statement required to be submitted under paragraph (a) of this section must be completed in the English language. (d) Applicability of supporting statement. The... TREASURY ARTICLES CONDITIONALLY FREE, SUBJECT TO A REDUCED RATE, ETC. United States-Singapore Free...

  17. 27 CFR 7.52 - Mandatory statements.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Mandatory statements. 7.52 Section 7.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT....52 Mandatory statements. (a) Responsible advertiser. The advertisement shall state the name...

  18. 27 CFR 5.63 - Mandatory statements.

    Science.gov (United States)

    2010-04-01

    ....” (2) Optional statement. In addition, the advertisement may also state the alcohol content in degrees... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Mandatory statements. 5.63 Section 5.63 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU,...

  19. 27 CFR 4.62 - Mandatory statements.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Mandatory statements. 4.62 Section 4.62 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT... statements. (a) Responsible advertiser. The advertisement shall state the name and address of the...

  20. 27 CFR 7.54 - Prohibited statements.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Prohibited statements. 7.54 Section 7.54 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU... § 7.54 Prohibited statements. (a) General prohibition. An advertisement of malt beverages must...

  1. Foods to Avoid or Limit during Pregnancy

    Science.gov (United States)

    ... report card Careers Archives Pregnancy Before or between pregnancies Nutrition, weight & fitness Prenatal care Is it safe? Labor & ... more. Stony Point, NY 10980 Close X Home > Pregnancy > Nutrition, weight & fitness > Foods to avoid or limit during ...

  2. GSA IT Reform Cost Savings/Avoidance

    Data.gov (United States)

    General Services Administration — GSA IT provides data related to Agency IT initiatives that save or avoid expenditures. This data is provided as a requirement of OMB's Integrated Data Collection...

  3. Active Collision Avoidance for Planetary Landers Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Advancements in radar technology have resulted in commercial, automotive collision avoidance radars. These radar systems typically use 37GHz or 77GHz interferometry...

  4. Avoid the Consequences of High Blood Pressure

    Science.gov (United States)

    ... Thromboembolism Aortic Aneurysm More Avoid the Consequences of High Blood Pressure Infographic Updated:Oct 31,2016 View a downloadable version of this infographic High Blood Pressure • Home • Get the Facts About HBP • Know Your ...

  5. Your Adolescent: Anxiety and Avoidant Disorders

    Science.gov (United States)

    ... other times, it develops into panic attacks and phobias. Identifying the Signs Anxiety disorders vary from teenager ... may begin to avoid normal activities and routines. Phobias Many fears of younger children are mild, passing, ...

  6. USAID IT Reform Cost Savings/Avoidance

    Data.gov (United States)

    US Agency for International Development — The Office of the Chief Information Officer in the Management Bureau of USAID launched initiatives designed for IT cost savings and avoidance. This dataset includes...

  7. 6 Tips to Avoid Medication Mistakes

    Science.gov (United States)

    ... For Consumers Consumer Updates 6 Tips to Avoid Medication Mistakes Share Tweet Linkedin Pin it More sharing ... dietary supplements you use. back to top Computerized Medication Box FDA has cleared for marketing the Electronic ...

  8. Dual Eligibles and Potentially Avoidable Hospitalizations

    Data.gov (United States)

    U.S. Department of Health & Human Services — About 25 percent of the hospitalizations for dual eligible beneficiaries in 2005 were potentially avoidable. Medicare and Medicaid spending for those potentially...

  9. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  10. The vigilance-avoidance model of avoidant recognition: An ERP study under threat priming.

    Science.gov (United States)

    Zhai, Jing; Chen, Xu; Ma, Jianling; Yang, Qingqing; Liu, Ying

    2016-12-30

    Our study examined attachment-related electrophysiological differences in recognition using event-related potentials (ERPs) measured during a study-test paradigm after threat priming. We identified ERP correlates of recognition by comparing the ERPs of attachment-related positive and negative images between avoidant and secure attachment orientations. Our results revealed that the distribution of early old/new effects was broader in avoidant individuals than in secure individuals, and an early parietal old/new effect was observed in avoidant individuals, which reflected their implicit memory. The late old/new effect was found only in secure individuals when evoked by negative pictures, and was not observed in avoidant individuals. The results suggest that avoidant individuals adopt the "vigilance-avoidance" dual-process model to recognize both positive and negative attachment-related stimuli and carry out preferential familiarity matching at the automatic level and avoidant retrieval at the controlled-processing level.

  11. Information Dilemmas and Blame-Avoidance Strategies

    DEFF Research Database (Denmark)

    Erik, Baekkeskov; Rubin, Olivier

    2016-01-01

    from day one about 2009 H1N1 flu. To explore why, this article links crisis information dilemmas to blame avoidance concepts from democratic political theories. We argue that greater Chinese transparency about infectious disease response reflects evolution in blame avoidance, from heavy reliance...... in place public health specialists and institutions as responsible for H1N1 information and responses, thereby insulating the top-tier leadership....

  12. Mobile Robot Collision Avoidance in Human Environments

    Directory of Open Access Journals (Sweden)

    Lingqi Zeng

    2013-01-01

    Full Text Available Collision avoidance is a fundamental requirement for mobile robots. Avoiding moving obstacles (also termed dynamic obstacles with unpredictable direction changes, such as humans, is more challenging than avoiding moving obstacles whose motion can be predicted. Precise information on the future moving directions of humans is unobtainable for use in navigation algorithms. Furthermore, humans should be able to pursue their activities unhindered and without worrying about the robots around them. In this paper, both active and critical regions are used to deal with the uncertainty of human motion. A procedure is introduced to calculate the region sizes based on worst‐case avoidance conditions. Next, a novel virtual force field‐based mobile robot navigation algorithm (termed QVFF is presented. This algorithm may be used with both holonomic and nonholonomic robots. It incorporates improved virtual force functions for avoiding moving obstacles and its stability is proven using a piecewise continuous Lyapunov function. Simulation and experimental results are provided for a human walking towards the robot and blocking the path to a goal location. Next, the proposed algorithm is compared with five state‐of‐the‐art navigation algorithms for an environment with one human walking with an unpredictable change in direction. Finally, avoidance results are presented for an environment containing three walking humans. The QVFF algorithm consistently generated collision‐free paths to the goal.

  13. The functional asymmetry of negative and positive self-statements.

    Science.gov (United States)

    Safran, J D

    1982-09-01

    Subjects were divided into high and low negative self-statement and high and low positive-self-statement groups on the basis of the assertiveness self-statement test (Schwartz & Gottman, 1976). High negative self-statement subjects reported more anxiety during assertion role plays than did low negative self-statement subjects and were rated by judges as exhibiting more non-verbal anxiety and performing less assertively than low negative self-statement subjects. Judges rated high positive self-statement subjects as more irritable and brusque than low positive self-statement subjects. Theoretical implications are discussed.

  14. ADVERTISING AVOIDANCE PADA IKLAN DI MEDIA TELEVISI

    Directory of Open Access Journals (Sweden)

    Indah Dwi Pratama

    2016-01-01

    Full Text Available One factor that can interfere with the absorption rate of viewers on television advertisement is advertising avoidance which shows the difference between the number of viewers who watch advertisement programs and the number of viewers who watch television programs. The factors that affect advertising avoidance include the demography of the viewers (gender, age, area of residence, and social economic status, or SES, advertising attributes (the television stations, order of ads, genre of the program, and advertising sector, and competition (DayPart. The study attempted to measure the level of advertising avoidance in Indonesia and its relation to various factors that influence it by using the secondary data generated by Nielsen Audience Measurement Indonesia through Television Audience Measurement (TAM. The methods utilized consisted of the t-test independent sample, one way ANOVA, Tukey, Kruskal Wallis, and Dunn Bonferoni. The result showed that the level of advertising avoidance in Indonesia reached by 23%, with relatively similar results to the other studies in various countries. The hypothesis test results also showed a significant relationship between the advertising avoidance and demographic variables, advertising attributes, and competitions affecting this avoidance. On one hand, the findings of the study are expected to be useful for the advertisers to plan their advertisements on television so that they become more effective and efficient. On the other hand, television stations can utilize these findings as a development strategy to expand their audience segmentation and to accommodate the needs of the advertisers more optimally.Keywords: advertising avoidance, television advertisement, TAM, ANOVA, Tukey

  15. Is avoiding an aversive outcome rewarding? Neural substrates of avoidance learning in the human brain.

    Science.gov (United States)

    Kim, Hackjin; Shimojo, Shinsuke; O'Doherty, John P

    2006-07-01

    Avoidance learning poses a challenge for reinforcement-based theories of instrumental conditioning, because once an aversive outcome is successfully avoided an individual may no longer experience extrinsic reinforcement for their behavior. One possible account for this is to propose that avoiding an aversive outcome is in itself a reward, and thus avoidance behavior is positively reinforced on each trial when the aversive outcome is successfully avoided. In the present study we aimed to test this possibility by determining whether avoidance of an aversive outcome recruits the same neural circuitry as that elicited by a reward itself. We scanned 16 human participants with functional MRI while they performed an instrumental choice task, in which on each trial they chose from one of two actions in order to either win money or else avoid losing money. Neural activity in a region previously implicated in encoding stimulus reward value, the medial orbitofrontal cortex, was found to increase, not only following receipt of reward, but also following successful avoidance of an aversive outcome. This neural signal may itself act as an intrinsic reward, thereby serving to reinforce actions during instrumental avoidance.

  16. Cod avoidance by area regulations in Kattegat

    DEFF Research Database (Denmark)

    Eliasen, Søren Qvist

    2014-01-01

    presents two initiatives for cod avoidance in Kattegat; a fisher initiative sharing information about cod bycatch which could lead to real time closures in areas with high bycatch of juveniles, for vessels with low cod quota to avoid catch of all cod, and a Danish Swedish Government initiative of permanent......The article examines the experiences of two initiatives of cod avoidance by area regulations in the Kattegat in the light of the upcoming discard ban in EU fisheries. The first section highlights elements of the discard ban in the reformed EU Common Fisheries Policy (CFP). The second section...... and temporary area closures in Kattegat. The third section discusses the lessons learned in the light of implementation of the discard ban. The fourth section sums up the lessons learned; Regional measures of implementation of the discard ban should include all vessels with quota in the region to be regarded...

  17. Chloroplast avoidance movement reduces photodamage in plants.

    Science.gov (United States)

    Kasahara, Masahiro; Kagawa, Takatoshi; Oikawa, Kazusato; Suetsugu, Noriyuki; Miyao, Mitsue; Wada, Masamitsu

    When plants are exposed to light levels higher than those required for photosynthesis, reactive oxygen species are generated in the chloroplasts and cause photodamage. This can occur even under natural growth conditions. To mitigate photodamage, plants have developed several protective mechanisms. One is chloroplast avoidance movement, in which chloroplasts move from the cell surface to the side walls of cells under high light conditions, although experimental support is still awaited. Here, using different classes of mutant defective in chloroplast avoidance movement, we show that these mutants are more susceptible to damage in high light than wild-type plants. Damage of the photosynthetic apparatus and subsequent bleaching of leaf colour and necrosis occur faster under high light conditions in the mutants than in wild-type plants. We conclude that chloroplast avoidance movement actually decreases the amount of light absorption by chloroplasts, and might therefore be important to the survival of plants under natural growth conditions.

  18. Avoiding barriers in control of mowing robot

    Institute of Scientific and Technical Information of China (English)

    QIU Bai-jing; QIAN Guo-hong; XIANG Zhong-ping; LI Zuo-peng

    2006-01-01

    Due to complicated barriers,it is difficult to track the path of the mowing robot and to avoid barriers.In order to solve the problem,a method based on distance-measuring sensors and fuzzy control inputs was proposed.Its track was composed of beelines and was easy to tail.The fuzzy control inputs were based on the front barrier distance and the difference between the left and right barrier distance measured by ultrasonic sensors;the output was the direction angle.The infrared sensors around the robot improved its safety in avoiding barriers.The result of the method was feasible,agile,and stable.The distance between the robot and the barriers could be changed by altering the inputs and outputs of fuzzy control and the length of the beelines.The disposed sensors can fulfill the need of the robot in avoiding barriers.

  19. Engaging Math-Avoidant College Students

    Directory of Open Access Journals (Sweden)

    M. Paul Latiolais

    2009-07-01

    Full Text Available This paper is an informal, personal account of how we, as two college teachers, became interested in math anxiety, decided to explore it amongst students at our institution in order to inform our teaching, and became convinced that the massive problem is math avoidance. We tried discussion groups, but few students attended, although those that did made useful suggestions. Thus informed, we designed an innovative course, Confronting College Mathematics as a Humanities course with the possibility of credit toward the math requirement, but it was undersubscribed in its first offering and had to be canceled. How can we get college students who avoid math to break through the barrier of math avoidance? We have now begun to explore a new approach: Second Life, where students can engage math—and quantitative literacy—virtually, and anonymously.

  20. Learning processes underlying avoidance of negative outcomes.

    Science.gov (United States)

    Andreatta, Marta; Michelmann, Sebastian; Pauli, Paul; Hewig, Johannes

    2017-04-01

    Successful avoidance of a threatening event may negatively reinforce the behavior due to activation of brain structures involved in reward processing. Here, we further investigated the learning-related properties of avoidance using feedback-related negativity (FRN). The FRN is modulated by violations of an intended outcome (prediction error, PE), that is, the bigger the difference between intended and actual outcome, the larger the FRN amplitude is. Twenty-eight participants underwent an operant conditioning paradigm, in which a behavior (button press) allowed them to avoid a painful electric shock. During two learning blocks, participants could avoid an electric shock in 80% of the trials by pressing one button (avoidance button), or by not pressing another button (punishment button). After learning, participants underwent two test blocks, which were identical to the learning ones except that no shocks were delivered. Participants pressed the avoidance button more often than the punishment button. Importantly, response frequency increased throughout the learning blocks but it did not decrease during the test blocks, indicating impaired extinction and/or habit formation. In line with a PE account, FRN amplitude to negative feedback after correct responses (i.e., unexpected punishment) was significantly larger than to positive feedback (i.e., expected omission of punishment), and it increased throughout the blocks. Highly anxious individuals showed equal FRN amplitudes to negative and positive feedback, suggesting impaired discrimination. These results confirm the role of negative reinforcement in motivating behavior and learning, and reveal important differences between high and low anxious individuals in the processing of prediction errors.

  1. Telerobotics with whole arm collision avoidance

    Energy Technology Data Exchange (ETDEWEB)

    Wilhelmsen, K.; Strenn, S.

    1993-09-01

    The complexity of teleorbotic operations in a cluttered environment is exacerbated by the need to present collision information to the operator in an understandable fashion. In addition to preventing movements which will cause collisions, a system providing some form of virtual force reflection (VFR) is desirable. With this goal in mind, Lawrence Livermore National Laboratory (LLNL) has installed a kinematically master/slave system and developed a whole arm collision avoidance system which interacts directly with the telerobotic controller. LLNL has also provided a structure to allow for automated upgrades of workcell models and provide collision avoidance even in a dynamically changing workcell.

  2. 21 CFR 201.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.61 Section 201.61 Food...: GENERAL LABELING Labeling Requirements for Over-the-Counter Drugs § 201.61 Statement of identity. (a) The... features a statement of the identity of the commodity. (b) Such statement of identity shall be in terms...

  3. 21 CFR 801.61 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Statement of identity. 801.61 Section 801.61 Food... DEVICES LABELING Labeling Requirements for Over-the-Counter Devices § 801.61 Statement of identity. (a... principal features a statement of the identity of the commodity. (b) Such statement of identity shall be...

  4. 20 CFR 404.632 - Statements filed with a hospital.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Statements filed with a hospital. 404.632... § 404.632 Statements filed with a hospital. A statement (generally a hospital admission form) filed with a hospital may serve as a written statement under § 404.630 if the requirements of this section...

  5. Back to Basics: Teaching the Statement of Cash Flows

    Science.gov (United States)

    Cecil, H. Wayne; King, Teresa T.; Andrews, Christine P.

    2011-01-01

    A conceptual foundation for the Statement of Cash Flows based on the ten elements of financial statements provides students with a deep understanding of core accounting concepts. Traditional methods of teaching the statement of cash flows tend to focus on statement preparation rules, masking the effect of business events on the change in cash.…

  6. 40 CFR 1502.9 - Draft, final, and supplemental statements.

    Science.gov (United States)

    2010-07-01

    ... statements. 1502.9 Section 1502.9 Protection of Environment COUNCIL ON ENVIRONMENTAL QUALITY ENVIRONMENTAL IMPACT STATEMENT § 1502.9 Draft, final, and supplemental statements. Except for proposals for legislation as provided in § 1506.8 environmental impact statements shall be prepared in two stages and may...

  7. 12 CFR 263.105 - Statement of net worth.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Statement of net worth. 263.105 Section 263.105... Statement of net worth. (a) General rule. A statement of net worth shall be filed with the application for an award of fees. The statement shall reflect the net worth of the applicant and all affiliates...

  8. Assessing Risk with GASB Statement No. 3.

    Science.gov (United States)

    Wood, Venita M.; Scott, Bob

    1987-01-01

    Discusses a Government Accounting Standards Board (GASB) publication designed to provide financial statement users with information to assess a government's actual and future deposit and investment market and credit risk. (MLF)

  9. 33 CFR 385.7 - Concurrency statements.

    Science.gov (United States)

    2010-07-01

    ... DEFENSE PROGRAMMATIC REGULATIONS FOR THE COMPREHENSIVE EVERGLADES RESTORATION PLAN General Provisions § 385.7 Concurrency statements. The administrative record of the programmatic regulations in this part..., Jacksonville District, 701 San Marco Blvd., Jacksonville, Florida 32207, or by accessing the...

  10. Corporate Statements in the Facilities Industry

    DEFF Research Database (Denmark)

    Holzweber, Markus

    In today’s services business domain, especially in facility services and facilities management (FM), customers are becoming more informed as to the level of choice and competition for their custom. This has led businesses to develop and maintain strategic elements of corporate statements...... that will increase their competitiveness. This article is concerned with the review of the principles of strategic statements and capability coherence. The purpose is to test if there is a relationship between strategic statements and its underlying capability coherence toward profitability. A sample of 27 strategic...... statements from FM organizations was selected and linked to financial data. The article reveals that the FM services industry would benefit from the concept of capability coherence. Findings showed that FM organizations showing higher scores of capability coherence have higher profitability scores....

  11. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  12. DECWEB - Internet Fiscal Statement Submission

    Directory of Open Access Journals (Sweden)

    Mihai Ianciu

    2009-12-01

    Full Text Available The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C. In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet. DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.

  13. DECWEB - Internet Fiscal Statement Submission

    Directory of Open Access Journals (Sweden)

    Mihai Ianciu

    2009-12-01

    Full Text Available

    The latest technologies are used not only in business, considered the most dynamic field of activity, but also in Governmental strategies of interaction with the civil society and  the business environment. The governmental functional and technological requirements created new concepts and approaches of electronic business (G2G, G2B, and G2C. In Romania, the Ministry of Communications and Information Technology was the trend setter. It developed a large number of proofs of concept and pilot projects covering a wide area of services that needed to evolve electronically. Together with the Ministry of Public Finance, it defined the requirements and specifications for DECWEB, the programme that allows companies to submit their fiscal statements via Internet.

    DECWEB system is a keystone programme for the Ministry of Public Finance on its way towards moving administration and services for society to information age. Highly awarded, the first DECWEB initiative was a successful proof of concept and it needed to be upgraded to a new professional version with extended functionalities, higher flexibility and advanced security mechanisms. This paper describes the DECWEB project and how technology and professional services enhanced Governmental activities, why the project was such a success and how it will evolve.

  14. LEGAL-EASE:Analyzing Chinese Financial Statements

    Institute of Scientific and Technical Information of China (English)

    EDWARD; MA

    2008-01-01

    In this article,we will focus on under- standing and analyzing the typical accounts of Chinese financial statements,including the balance sheet and income statement. Accounts are generally incorrectly prepared. This can be due to several factors,incom- petence,as well as more serious cases of deliberate attempts to deceive.Regardless, accounts can be understood and errors or specific acts of misrepresentation uncovered. We will conduct some simple analysis to demonstrate how these can be spotted.

  15. CONSIDERATIONS ON AUDIT OF GROUP FINANCIAL STATEMENTS

    OpenAIRE

    Attila Tamas Szora; Iulian Bogdan Dobra

    2010-01-01

    The objective of this paper is to present a comparative analysis of the consolidatedfinancial statements according to the International Financial Reporting Standards or the EuropeanDirectives and see how such accounting alternative affect the explanatory notes to the consolidatedfinancial statements, especially regarding to the revaluation basis of the assets. The study seeks todetermine if the accounting diversity influences the work of the financial auditor. The resultsindicate that the two...

  16. Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel

    CERN Document Server

    Singh, Raju

    2011-01-01

    The security of bio-metric information - finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.

  17. Avoided by association: acquisition, extinction, and renewal of avoidance tendencies toward conditioned fear stimuli

    NARCIS (Netherlands)

    A.M. Krypotos; M. Effting; I. Arnaudova; M. Kindt; T. Beckers

    2013-01-01

    Traditional theoretical models hold that avoidance reflects the interplay of Pavlovian and instrumental learning. Here we suggest that avoidance tendencies to intrinsically neutral cues may be established by mere Pavlovian association. Following fear conditioning, in which pictures of one object wer

  18. Development of a Measure of Experiential Avoidance: The Multidimensional Experiential Avoidance Questionnaire

    Science.gov (United States)

    Gamez, Wakiza; Chmielewski, Michael; Kotov, Roman; Ruggero, Camilo; Watson, David

    2011-01-01

    Experiential avoidance (EA) has been conceptualized as the tendency to avoid negative internal experiences and is an important concept in numerous conceptualizations of psychopathology as well as theories of psychotherapy. Existing measures of EA have either been narrowly defined or demonstrated unsatisfactory internal consistency and/or evidence…

  19. Reasonable Avoidability, Responsibility and Lifestyle Diseases

    DEFF Research Database (Denmark)

    Andersen, Martin Marchman

    2012-01-01

    In “Health, Luck and Justice” Shlomi Segall argues for a luck egalitarian approach to justice in health care. As the basis for a just distribution he suggests a principle of Reasonable Avoidability, which he takes to imply that we do not have justice-based reasons to treat diseases brought about ...

  20. Organising European technical documentation to avoid duplication.

    Science.gov (United States)

    Donawa, Maria

    2006-04-01

    The development of comprehensive accurate and well-organised technical documentation that demonstrates compliance with regulatory requirements is a resource-intensive, but critically important activity for medical device manufacturers. This article discusses guidance documents and method of organising technical documentation that may help avoid costly and time-consuming duplication.

  1. The Netherlands Bird Avoidance Model, Final Report

    NARCIS (Netherlands)

    Shamoun-Baranes, J.; Bouten, W.; Sierdsema, H.; van Belle, J.; van Gasteren, J.R.; van Loon, E.E.

    2006-01-01

    The NL-BAM was developed as a web-based decision support tool to be used by the bird hazard avoidance experts in the ecology unit of the Royal Netherlands Air Force. The NL-BAM will be used together with the ROBIN 4 radar system to provide BirdTAMS, for real time warnings and flight planning and to

  2. An Examination of Avoided Costs in Utah

    Energy Technology Data Exchange (ETDEWEB)

    Bolinger, Mark; Wiser, Ryan

    2005-01-07

    The Utah Wind Working Group (UWWG) believes there are currently opportunities to encourage wind power development in the state by seeking changes to the avoided cost tariff paid to qualifying facilities (QFs). These opportunities have arisen as a result of a recent renegotiation of Pacificorp's Schedule 37 tariff for wind QFs under 3 MW, as well as an ongoing examination of Pacificorp's Schedule 38 tariff for wind QFs larger than 3 MW. It is expected that decisions made regarding Schedule 38 will also impact Schedule 37. Through the Laboratory Technical Assistance Program (Lab TAP), the UWWG has requested (through the Utah Energy Office) that LBNL provide technical assistance in determining whether an alternative method of calculating avoided costs that has been officially adopted in Idaho would lead to higher QF payments in Utah, and to discuss the pros and cons of this method relative to the methodology recently adopted under Schedule 37 in Utah. To accomplish this scope of work, I begin by summarizing the current method of calculating avoided costs in Utah (per Schedule 37) and Idaho (the ''surrogate avoided resource'' or SAR method). I then compare the two methods both qualitatively and quantitatively. Next I present Pacificorp's four main objections to the use of the SAR method, and discuss the reasonableness of each objection. Finally, I conclude with a few other potential considerations that might add value to wind QFs in Utah.

  3. Avoidance Motivation and Conservation of Energy

    NARCIS (Netherlands)

    Roskes, Marieke; Elliot, Andrew J.; Nijstad, Bernard A.; De Dreu, Carsten K. W.

    2013-01-01

    Compared to approach motivation, avoidance motivation evokes vigilance, attention to detail, systematic information processing, and the recruitment of cognitive resources. From a conservation of energy perspective it follows that people would be reluctant to engage in the kind of effortful cognitive

  4. [Avoidance of patient-prosthesis mismatch].

    Science.gov (United States)

    Sakamoto, Y; Hashimoto, K

    2006-04-01

    To minimize the incidence of patient-prosthesis mismatch (PPM), we have routinely adopted aortic root enlargement to avoid PPM for patients with small aortic annulus. The aim of this study was to review our strategy of avoiding PPM. The Carpentier-Edwards Perimount (CEP) valves were implanted in 53 patients who were mostly aged over 65 and the St. Jude Medical (SJM) mechanical valves were used in 128 patients aged under 65. A standard 21-mm SJM valve was used in only 3 patients and no 19-mm valves were employed. However, 19-mm CEP valves were used in 12 patients with a small body surface area (1.43 +/- 0.14 m2). Of these, 26 patients (14.4%) who had a small aortic annulus and 24 patients aged under 65 underwent aortic root enlargement. No patient receiving an SJM valve had an projected indexed effective orifice area (EOAI) small annulus, the first choice for avoiding PPM is aortic annular enlargement, which may be avoided by high performance mechanical valves with larger EOA.

  5. Teaching Preschool Children to Avoid Poison Hazards

    Science.gov (United States)

    Dancho, Kelly A.; Thompson, Rachel H.; Rhoades, Melissa M.

    2008-01-01

    We evaluated the effectiveness of group safety training and in situ feedback and response interruption to teach preschool children to avoid consuming potentially hazardous substances. Three children ingested ambiguous substances during a baited baseline assessment condition and continued to ingest these substances following group safety training.…

  6. Avoidable costs of comprehensive case management.

    Science.gov (United States)

    Issel, L M; Anderson, R A

    1999-01-01

    Comprehensive case management has become an industry standard and its pervasiveness raises questions about the ubiquitous need for this service. Analyzed from the perspective of transaction cost analysis and access, we argue that in some cases comprehensive case management is an avoidable cost incurred because of system problems that limit access to otherwise eligible clients. Implications are discussed.

  7. HOW TO AVOID SEXIST LANGUAGE IN ENGLISH

    Institute of Scientific and Technical Information of China (English)

    HuZhiqing

    2004-01-01

    Use of Sexist language is one of the serious yet often-neglected mistakes in the English writing and speaking of Chineselearners of English. Sexist language in English can be classifiedinto two categories : ambiguity of referent and stereotyping. Thispaper focuses on some common sexist language in the Englishwriting and speaking of Chinese learners of English and givessome suggestions about how to avoid them.

  8. Simple Obstacle Avoidance Algorithm for Rehabilitation Robots

    NARCIS (Netherlands)

    Stuyt, F.H.A.; Römer, G.R.B.; Stuyt, H.J.A.

    2007-01-01

    The efficiency of a rehabilitation robot is improved by offering record-and-replay to operate the robot. While automatically moving to a stored target (replay) collisions of the robot with obstacles in its work space must be avoided. A simple, though effective, generic and deterministic algorithm fo

  9. Doppler micro sense and avoid radar

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo; Asmolova, Olga

    2015-10-01

    There is a need for small Sense and Avoid (SAA) systems for small and micro Unmanned Aerial Systems (UAS) to avoid collisions with obstacles and other aircraft. The proposed SAA systems will give drones the ability to "see" close up and give them the agility to maneuver through tight areas. Doppler radar is proposed for use in this sense and avoid system because in contrast to optical or infrared (IR) systems Doppler can work in more harsh conditions such as at dusk, and in rain and snow. And in contrast to ultrasound based systems, Doppler can better sense small sized obstacles such as wires and it can provide a sensing range from a few inches to several miles. An SAA systems comprised of Doppler radar modules and an array of directional antennas that are distributed around the perimeter of the drone can cover the entire sky. These modules are designed so that they can provide the direction to the obstacle and simultaneously generate an alarm signal if the obstacle enters within the SAA system's adjustable "Protection Border". The alarm signal alerts the drone's autopilot to automatically initiate an avoidance maneuver. A series of Doppler radar modules with different ranges, angles of view and transmitting power have been designed for drones of different sizes and applications. The proposed Doppler radar micro SAA system has simple circuitry, works from a 5 volt source and has low power consumption. It is light weight, inexpensive and it can be used for a variety of small unmanned aircraft.

  10. Oscillations in two-person avoidance control

    CERN Document Server

    Kish, Lazar

    2016-01-01

    Social interaction dynamics are a special type of group interactions that play a large part in our everyday lives. They dictate how and with whom a certain individual will interact. One of such interactions can be termed "avoidance control". This everyday situation occurs when two fast-walking persons suddenly realize that they are on a frontal collision course and begin maneuvering to avoid collision. If the two walkers' initial maneuverings are in the same direction that can lead to oscillations that lengthen time required to reach a stable avoidance trajectory. We introduce a dynamical model with a feedback loop to understand the origin and properties of this oscillation. For the emergence of the oscillatory behavior, two conditions must be satisfied: i) the persons must initiate the avoidance maneuver in the same direction; ii) the time delays in the feedback loop must reverse the phase of the players' positions at the oscillation frequency. The oscillation can be terminated at any time if one of the walk...

  11. Reducing avoidable pressure ulcers in the community.

    Science.gov (United States)

    Parnham, Alison; Pankhurst, Sarah; Dabell, Wendy

    2015-02-27

    The elimination of avoidable pressure ulcers remains a challenge in healthcare provision, represents an increasing financial burden on resources and continues to affect patients' quality of life. Many pressure ulcers are deemed to be avoidable and there are several factors that can influence this, including the development of a care delivery system and a service delivery strategy that incorporate a comprehensive structure, a meticulous process and measurable outcomes. Nottingham CityCare developed a strategy to reduce avoidable pressure ulcers. The implementation of the strategy in an inner city community setting is discussed. The importance of eliminating pressure ulcers is explored, and the barriers to care delivery are reviewed, demonstrating how a new culture in clinical practice can ensure the elimination of avoidable pressure ulcers. The challenges within the implementation process are reflected on and the implementation of the SSKIN (Surface, Skin inspection, Keep your patient moving, Incontinence and moisture, Nutrition and hydration) phenomenon is reviewed in relation to care delivery, record-keeping and evaluation.

  12. Hydrofluoric acid on dentin should be avoided.

    NARCIS (Netherlands)

    Loomans, B.A.C.; Mine, A.; Roeters, F.J.M.; Opdam, N.J.M.; Munck, J. De; Huysmans, M.C.D.N.J.M.; Meerbeek, B. Van

    2010-01-01

    Hydrofluoric acid can be used for intra-oral repair of restorations. Contamination of tooth substrate with hydrofluoric acid cannot always be avoided. OBJECTIVES: To investigate the bonding effectiveness to hydrofluoric acid contaminated dentin by, micro-tensile bond strength testing, SEM and TEM. M

  13. Measuring Patients’ Attachment Avoidance in Psychotherapy: Development of the Attachment Avoidance in Therapy Scale (AATS

    Directory of Open Access Journals (Sweden)

    András Láng

    2012-11-01

    Full Text Available A new scale measuring patient-therapist attachment avoidance was developed. Attachment Avoidance in Therapy Scale is a new measure based on the Bartholomew model of adult attachment (Bartholomew & Horowitz, 1991 and the Experience in Close Relationships Scale (Brennan, Clark, & Shaver, 1998 to measure patients’ attachment avoidance towards therapists. With 112 patient-therapist dyads participating in the study, validation of a preliminary scale – measuring both attachment anxiety and attachment avoidance in therapy – took place using therapists’ evaluations of patients’ relational behavior and patients’ self-reports about their attitude toward psychotherapy. Analysis of the data revealed six underlying scales. Results showed all six scales to be reliable. Validation of scales measuring attachment anxiety failed. The importance of Attachment Avoidance in Therapy Scale and its subscales is discussed.

  14. Bursting neurons and ultrasound avoidance in crickets

    Directory of Open Access Journals (Sweden)

    Gary eMarsat

    2012-07-01

    Full Text Available Decision making in invertebrates often relies on simple neural circuits composed of only a few identified neurons. The relative simplicity of these circuits makes it possible to identify the key computation and neural properties underlying decisions. In this review, we summarize recent research on the neural basis of ultrasound avoidance in crickets, a response that allows escape from echolocating bats. The key neural property shaping behavioral output is high-frequency bursting of an identified interneuron, AN2, which carries information about ultrasound stimuli from receptor neurons to the brain. AN2's spike train consists of clusters of spikes –bursts– that may be interspersed with isolated, non-burst spikes. AN2 firing is necessary and sufficient to trigger avoidance steering but only high-rate firing, such as occurs in bursts, evokes this response. AN2 bursts are therefore at the core of the computation involved in deciding whether or not to steer away from ultrasound. Bursts in AN2 are triggered by synaptic input from nearly synchronous bursts in ultrasound receptors. Thus the population response at the very first stage of sensory processing –the auditory receptor- already differentiates the features of the stimulus that will trigger a behavioral response from those that will not. Adaptation, both intrinsic to AN2 and within ultrasound receptors, scales the burst-generating features according to the stimulus statistics, thus filtering out background noise and ensuring that bursts occur selectively in response to salient peaks in ultrasound intensity. Furthermore AN2’s sensitivity to ultrasound varies adaptively with predation pressure, through both developmental and evolutionary mechanisms. We discuss how this key relationship between bursting and the triggering of avoidance behavior is also observed in other invertebrate systems such as the avoidance of looming visual stimuli in locusts or heat avoidance in beetles.

  15. Bursting neurons and ultrasound avoidance in crickets.

    Science.gov (United States)

    Marsat, Gary; Pollack, Gerald S

    2012-01-01

    Decision making in invertebrates often relies on simple neural circuits composed of only a few identified neurons. The relative simplicity of these circuits makes it possible to identify the key computation and neural properties underlying decisions. In this review, we summarize recent research on the neural basis of ultrasound avoidance in crickets, a response that allows escape from echolocating bats. The key neural property shaping behavioral output is high-frequency bursting of an identified interneuron, AN2, which carries information about ultrasound stimuli from receptor neurons to the brain. AN2's spike train consists of clusters of spikes - bursts - that may be interspersed with isolated, non-burst spikes. AN2 firing is necessary and sufficient to trigger avoidance steering but only high-rate firing, such as occurs in bursts, evokes this response. AN2 bursts are therefore at the core of the computation involved in deciding whether or not to steer away from ultrasound. Bursts in AN2 are triggered by synaptic input from nearly synchronous bursts in ultrasound receptors. Thus the population response at the very first stage of sensory processing - the auditory receptor - already differentiates the features of the stimulus that will trigger a behavioral response from those that will not. Adaptation, both intrinsic to AN2 and within ultrasound receptors, scales the burst-generating features according to the stimulus statistics, thus filtering out background noise and ensuring that bursts occur selectively in response to salient peaks in ultrasound intensity. Furthermore AN2's sensitivity to ultrasound varies adaptively with predation pressure, through both developmental and evolutionary mechanisms. We discuss how this key relationship between bursting and the triggering of avoidance behavior is also observed in other invertebrate systems such as the avoidance of looming visual stimuli in locusts or heat avoidance in beetles.

  16. Changes in public attitudes towards confidential adolescent sexual and reproductive health services in Lithuania after the introduction of new legislation

    DEFF Research Database (Denmark)

    Jaruseviciene, Lina; Zaborskis, Apolinaras; Sauliune, Skirmante

    2015-01-01

    was employed to estimate absolute differences in prevalence of belief in whether or not adolescents would find confidentiality important when consulting a physician on SRH issues. A log-binomial regression model was fitted to estimate the relative changes (prevalence ratio) of the independent variables....... RESULTS: The total number of respondents was 1054 (response rate 83%) in 2005 and 1002 (response rate 80%) in 2012. The proportion of respondents who reported a belief that adolescents would find confidentiality important when seeing a physician for SRH issues increased significantly from 62% in 2005...... to 73% in 2012. Regardless of their belief in the importance of confidentiality, in 2012 respondents more often indicated positive outcomes on the relations between the physician and the minor patient, such as increased trust of the adolescent in the physician and more frequent visits to physicians...

  17. [When the violation of medical confidentiality is imposed by law: Another side effect of Law N° 20.584].

    Science.gov (United States)

    Vega, Jorge; Quintana, María Soledad

    2016-02-01

    A law of rights and duties of patients was recently enacted in Chile (Law N° 20.584). When someone dies, the law allows his inheritors to have access to part or the totality of the medical record. Therefore, they may become acquainted of information that the patient gave in confidence to his physician, protected by "the medical confidentiality". The original bill included the possibility that a doctor could deny information that could cause harm to the former holder of the clinical record, but this precaution was banned by congressmen, seriously damaging the institution of "medical confidentiality", a cornerstone of the medical-patient relationship since the beginning of medicine.

  18. Cloudy confidentiality: clinical and legal implications of cloud computing in health care.

    Science.gov (United States)

    Klein, Carolina A

    2011-01-01

    The Internet has grown into a world of its own, and its ethereal space now offers capabilities that could aid physicians in their duties in numerous ways. In recent years software functions have moved from the individual's local hardware to a central server that operates from a remote location. This centralization is called cloud computing. Privacy laws that speak to the protection of patient confidentiality are complex and often difficult to understand in the context of an ever-growing cloud-based technology. This article is a review of the legal background of protected health records, as well as cloud technology and physician applications. An attempt is made to integrate both concepts and examine Health Insurance Portability and Accountability Act (HIPAA) compliance for each of the examples discussed. The legal regulations that may inform care and standards of practice are reviewed, and the difficulties that arise in assessment and monitoring of the current situation are analyzed. For forensic psychiatrists who may be asked to provide expert opinions regarding malpractice situations pertaining to confidentiality standards, it is important to become acquainted with the new digital language from which these questions may arise.

  19. The Effect of Attitude and Statement Favorability Upon the Judgment of Attitude Statements

    Science.gov (United States)

    Corenblum, B.; Corfield, Vera K.

    1976-01-01

    Male and female introductory psychology students (N=96) who held extreme attitudes toward legalized abortion judged the favorability of attitude statements on that issue. Judgments of the statements were shown to be largely inconsistent with predictions from social judgment theory and adaptation-level theory, but consistent with accentuation…

  20. Converging evidence of social avoidant behavior in schizophrenia from two approach-avoidance tasks.

    Science.gov (United States)

    de la Asuncion, Javier; Docx, Lise; Sabbe, Bernard; Morrens, Manuel; de Bruijn, Ellen R A

    2015-10-01

    Many people with schizophrenia suffer from social impairments characterized by active social avoidance, which is related to social phobia common in schizophrenia, while motivational impairments can also result in passive social withdrawal. Although social avoidance is frequently reported in this population, this is the first study to directly compare approach-avoidance tendencies in schizophrenia patients (N = 37) and healthy controls (N = 29). Participants performed two tasks: a computerized approach-avoidance task (AAT) to assess response tendencies toward images of happy and angry faces with direct or averted gaze and a one-to-one personal space test (PST) to gauge more naturalistic approach-avoidance behaviors toward a real person bearing a neutral expression. The AAT results showed that both groups showed faster avoidance responses to angry faces and faster approach responses to happy faces with a direct gaze. Happy faces with averted gaze, however, resulted in faster avoidance responses in the patient group only. On the PST, the patients approached the experimenter less than healthy controls did. This measure of interpersonal distance was positively related to positive symptom severity. Delusions of reference and increased sensitivity to social rejection may explain the patients' avoidance tendencies in response to pictures of happy faces with averted gaze and in the presence of an actual person. The current findings demonstrate the importance of others adopting positive and unambiguous attitudes when interacting with schizophrenia patients to minimize behavioral avoidance patterns, which is particularly relevant for relatives and clinicians whose interactions with the patients are crucial to facilitating treatment and promoting healthy social relationships.

  1. Information Dilemmas and Blame-Avoidance Strategies

    DEFF Research Database (Denmark)

    Erik, Baekkeskov; Rubin, Olivier

    2016-01-01

    China and other authoritarian states notoriously keep mum about disasters. Yet two recent but dissimilar Chinese responses to infectious disease epidemics show that authoritarian crisis management can shift from secrecy to openness. China maintained prolonged secrecy during 2003 SARS, yet was open...... from day one about 2009 H1N1 flu. To explore why, this article links crisis information dilemmas to blame avoidance concepts from democratic political theories. We argue that greater Chinese transparency about infectious disease response reflects evolution in blame avoidance, from heavy reliance...... on information control to insulating leaders by using technical experts and agencies as “lightning rods.” In 2003, the Chinese strategy of information containment and secrecy backfired, and the Chinese leadership eventually received blame at home and internationally for crisis mismanagement. In 2009, China put...

  2. How to avoid deferred-compensation troubles.

    Science.gov (United States)

    Freeman, Todd I

    2005-06-01

    Executive compensation packages have long included stock options and deferred compensation plans in order to compete for talent. Last year, Congress passed a law in response to the Enron debacle, in which executives were perceived to be protecting their deferred compensation at the expense of employees, creditors, and investors. The new law is designed to protect companies and their shareholders from being raided by the very executives that guided the company to financial ruin. Physicians who are part owners of medical practices need to know about the changes in the law regarding deferred compensation and how to avoid costly tax penalties. This article discusses how the changes affect medical practices as well as steps physician-owned clinics can take to avoid the risk of penalty, such as freezing deferred compensation and creating a new deferred compensation plan.

  3. Optical Flow based Robot Obstacle Avoidance

    Directory of Open Access Journals (Sweden)

    Kahlouche Souhila

    2008-11-01

    Full Text Available In this paper we try to develop an algorithm for visual obstacle avoidance of autonomous mobile robot. The input of the algorithm is an image sequence grabbed by an embedded camera on the B21r robot in motion. Then, the optical flow information is extracted from the image sequence in order to be used in the navigation algorithm. The optical flow provides very important information about the robot environment, like: the obstacles disposition, the robot heading, the time to collision and the depth. The strategy consists in balancing the amount of left and right side flow to avoid obstacles, this technique allows robot navigation without any collision with obstacles. The robustness of the algorithm will be showed by some examples.

  4. Construction dispute research conceptualisation, avoidance and resolution

    CERN Document Server

    2014-01-01

    There are three specific purposes of Construction Dispute Research. First, this volume aims to summarise studies on construction dispute. Second, apart from the theoretical constructs, where appropriate empirical tests are also included. This approach serves to go beyond the commonly used anecdotal approach for the subject matters. Third, it is the sincere hope of the authors that this book will help shaping research agenda of construction dispute.  The studies are mostly framed from a management perspective drawing on methods and concepts in contract law, economics, psychology and management science.   The book has twenty chapters that are arranged in four parts covering conceptualisation, avoidance, negotiation and mediation. Part 1 is devoted for dispute conceptualisation. A building is only as strong as its foundation. Thus it is no better start to study construction dispute by conceptualisation. The theme of Part 2 is dispute avoidance. The conventional wisdom of ‘prevention is better than cure’ se...

  5. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    The increasing demand to integrate unmanned aircraft systems (UAS) into the national airspace is motivated by the rapid growth of the UAS industry, especially small UAS weighing less than 55 pounds. Their use however has been limited by the Federal Aviation Administration regulations due to collision risk they pose, safety and regulatory concerns. Therefore, before civil aviation authorities can approve routine UAS flight operations, UAS must be equipped with sense-and-avoid technology comparable to the see-and-avoid requirements for manned aircraft. The sense-and-avoid problem includes several important aspects including regulatory and system-level requirements, design specifications and performance standards, intruder detecting and tracking, collision risk assessment, and finally path planning and collision avoidance. In this dissertation, our primary focus is on developing an collision detection, risk assessment and avoidance framework that is computationally affordable and suitable to run on-board small UAS. To begin with, we address the minimum sensing range for the sense-and-avoid (SAA) system. We present an approximate close form analytical solution to compute the minimum sensing range to safely avoid an imminent collision. The approach is then demonstrated using a radar sensor prototype that achieves the required minimum sensing range. In the area of collision risk assessment and collision prediction, we present two approaches to estimate the collision risk of an encounter scenario. The first is a deterministic approach similar to those been developed for Traffic Alert and Collision Avoidance (TCAS) in manned aviation. We extend the approach to account for uncertainties of state estimates by deriving an analytic expression to propagate the error variance using Taylor series approximation. To address unanticipated intruders maneuvers, we propose an innovative probabilistic approach to quantify likely intruder trajectories and estimate the probability of

  6. Potentially Avoidable Peripartum Hysterectomies in Denmark

    DEFF Research Database (Denmark)

    Colmorn, Lotte Berdiin; Krebs, Lone; Langhoff-Roos, Jens

    2016-01-01

    to minimize the number of unnecessary peripartum hysterectomies, obstetricians and anesthesiologists should investigate individual cases by structured clinical audit, and disseminate and discuss the results for educational purposes. An international collaboration is warranted to strengthen our recommendations......OBJECTIVE: To audit the clinical management preceding peripartum hysterectomy and evaluate if peripartum hysterectomies are potentially avoidable and by which means. MATERIAL AND METHODS: We developed a structured audit form based on explicit criteria for the minimal mandatory management...

  7. Robot maps, robot moves, robot avoids

    OpenAIRE

    Farrugia, Claire; Duca, Edward

    2014-01-01

    Robotics is a cornerstone for this century’s innovations. From robot nurses to your own personal assistant, most robots need to know: ‘where is it?’ ‘Where should it go?’ And ‘how to get there?’ Without answers to these questions a robot cannot do much. http://www.um.edu.mt/think/robot-maps-robot-moves-robot-avoids/

  8. Acute carbon dioxide avoidance in Caenorhabditis elegans

    OpenAIRE

    Hallem, Elissa A.; Sternberg, Paul W.

    2008-01-01

    Carbon dioxide is produced as a by-product of cellular respiration by all aerobic organisms and thus serves for many animals as an important indicator of food, mates, and predators. However, whether free-living terrestrial nematodes such as Caenorhabditis elegans respond to CO2 was unclear. We have demonstrated that adult C. elegans display an acute avoidance response upon exposure to CO2 that is characterized by the cessation of forward movement and the rapid initiation of backward movement....

  9. How does a cyclist avoid obstacles?

    Science.gov (United States)

    Miyadait, Masayuki; Uetake, Teruo; Shimoda, Masahiro

    2012-12-01

    The purpose of this research is to examine the ways bicycles swerve off sidewalks onto roads under various conditions. Seven students, five males and two females participated in an experiment on a road with a 100-cm wide sidewalk. Footage of each participant on a bicycle evading obstacles such as a utility pole and pedestrian were taken with a video camera, while a front-wheel view of the path taken by the bicycle was recorded simultaneously with a digital camera. Twelve experimental conditions were used for each participant, consisting of all the combinations of (1) three obstacle types, (2) the side (left or right) to which the bicycle went to avoid the obstacle, and (3) two weather conditions. Based on the two recorded scenes, the path was then analyzed from the viewpoint of how the bicycle swerved to avoid hitting the obstacle. We found that the conditions of riding a bicycle with an umbrella caused a larger swerve to avoid the obstacle than those conditions when the rider did not have an umbrella. In particular, the condition in which the obstacle was a pedestrian who also had an umbrella caused the largest swerve. Furthermore, the distance required to become aligned with the sidewalk when the obstacle was a pedestrian walking toward the cyclist was longer than that for other obstacles. The swerve width data showed interesting results, including a tendency for swerve width to be wider when the obstacle was a utility pole compared with other obstacles.

  10. Knowing and avoiding plagiarism during scientific writing.

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, Svvs; Nagasree, M

    2014-09-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing.

  11. Traffic jam driving with NMV avoidance

    Science.gov (United States)

    Milanés, Vicente; Alonso, Luciano; Villagrá, Jorge; Godoy, Jorge; de Pedro, Teresa; Oria, Juan P.

    2012-08-01

    In recent years, the development of advanced driver assistance systems (ADAS) - mainly based on lidar and cameras - has considerably improved the safety of driving in urban environments. These systems provide warning signals for the driver in the case that any unexpected traffic circumstance is detected. The next step is to develop systems capable not only of warning the driver but also of taking over control of the car to avoid a potential collision. In the present communication, a system capable of autonomously avoiding collisions in traffic jam situations is presented. First, a perception system was developed for urban situations—in which not only vehicles have to be considered, but also pedestrians and other non-motor-vehicles (NMV). It comprises a differential global positioning system (DGPS) and wireless communication for vehicle detection, and an ultrasound sensor for NMV detection. Then, the vehicle's actuators - brake and throttle pedals - were modified to permit autonomous control. Finally, a fuzzy logic controller was implemented capable of analyzing the information provided by the perception system and of sending control commands to the vehicle's actuators so as to avoid accidents. The feasibility of the integrated system was tested by mounting it in a commercial vehicle, with the results being encouraging.

  12. Urban water restrictions: Attitudes and avoidance

    Science.gov (United States)

    Cooper, Bethany; Burton, Michael; Crase, Lin

    2011-12-01

    In most urban cities across Australia, water restrictions remain the dominant policy mechanism to restrict urban water consumption. The extensive adoption of water restrictions as a means to limit demand, over several years, means that Australian urban water prices have consistently not reflected the opportunity cost of water. Given the generally strong political support for water restrictions and the likelihood that they will persist for some time, there is value in understanding households' attitudes in this context. More specifically, identifying the welfare gains associated with avoiding urban water restrictions entirely would be a nontrivial contribution to our knowledge and offer insights into the benefits of alternative policy responses. This paper describes the results from a contingent valuation study that investigates consumers' willingness to pay to avoid urban water restrictions. Importantly, the research also investigates the influence of cognitive and exogenous dimensions on the utility gain associated with avoiding water restrictions. The results provide insights into the impact of the current policy mechanism on economic welfare.

  13. Acute carbon dioxide avoidance in Caenorhabditis elegans.

    Science.gov (United States)

    Hallem, Elissa A; Sternberg, Paul W

    2008-06-10

    Carbon dioxide is produced as a by-product of cellular respiration by all aerobic organisms and thus serves for many animals as an important indicator of food, mates, and predators. However, whether free-living terrestrial nematodes such as Caenorhabditis elegans respond to CO2 was unclear. We have demonstrated that adult C. elegans display an acute avoidance response upon exposure to CO2 that is characterized by the cessation of forward movement and the rapid initiation of backward movement. This response is mediated by a cGMP signaling pathway that includes the cGMP-gated heteromeric channel TAX-2/TAX-4. CO2 avoidance is modulated by multiple signaling molecules, including the neuropeptide Y receptor NPR-1 and the calcineurin subunits TAX-6 and CNB-1. Nutritional status also modulates CO2 responsiveness via the insulin and TGFbeta signaling pathways. CO2 response is mediated by a neural circuit that includes the BAG neurons, a pair of sensory neurons of previously unknown function. TAX-2/TAX-4 function in the BAG neurons to mediate acute CO2 avoidance. Our results demonstrate that C. elegans senses and responds to CO2 using multiple signaling pathways and a neural network that includes the BAG neurons and that this response is modulated by the physiological state of the worm.

  14. Granting silence to avoid wireless collisions

    KAUST Repository

    Choi, Jung Il

    2010-10-01

    We describe grant-to-send, a novel collision avoidance algorithm for wireless mesh networks. Rather than announce packets it intends to send, a node using grant-to-send announces packets it expects to hear others send. We present evidence that inverting collision avoidance in this way greatly improves wireless mesh performance. Evaluating four protocols from 802.11 meshes and 802.15.4 sensor networks, we find that grant-to-send matches or outperforms CSMA and RTS/CTS in all cases. For example, in a 4-hop UDP flow, grantto- send can achieve 96% of the theoretical maximum throughput while maintaining a 99.9% packet delivery ratio. Grant-tosend is also general enough to replace protocol-specific collision avoidance mechanisms common to sensor network protocols. Grant-to-send is simple. For example, incorporating it into 802.11 requires only 11 lines of driver code and no hardware changes. Furthermore, as it reuses existing 802.11 mechanisms, grant-to-send inter-operates with current networks and can be incrementally deployed. © 2010 IEEE.

  15. Rapid Assessment of Avoidable Blindness in India.

    Directory of Open Access Journals (Sweden)

    John Neena

    Full Text Available BACKGROUND: Rapid assessment of avoidable blindness provides valid estimates in a short period of time to assess the magnitude and causes of avoidable blindness. The study determined magnitude and causes of avoidable blindness in India in 2007 among the 50+ population. METHODS AND FINDINGS: Sixteen randomly selected districts where blindness surveys were undertaken 7 to 10 years earlier were identified for a follow up survey. Stratified cluster sampling was used and 25 clusters (20 rural and 5 urban were randomly picked in each district.. After a random start, 100 individuals aged 50+ were enumerated and examined sequentially in each cluster. All those with presenting vision = 50 years were enumerated, and 94.7% examined. Based on presenting vision,, 4.4% (95% Confidence Interval[CI]: 4.1,4.8 were severely visually impaired (vision<6/60 to 3/60 in the better eye and 3.6% (95% CI: 3.3,3.9 were blind (vision<3/60 in the better eye. Prevalence of low vision (<6/18 to 6/60 in the better eye was 16.8% (95% CI: 16.0,17.5. Prevalence of blindness and severe visual impairment (<6/60 in the better eye was higher among rural residents (8.2%; 95% CI: 7.9,8.6 compared to urban (7.1%; 95% CI: 5.0, 9.2, among females (9.2%; 95% CI: 8.6,9.8 compared to males (6.5%; 95% CI: 6.0,7.1 and people above 70 years (20.6%; 95% CI: 19.1,22.0 compared to people aged 50-54 years (1.3%; 95% CI: 1.1,1.6. Of all blindness, 88.2% was avoidable. of which 81.9% was due to cataract and 7.1% to uncorrected refractive errors/uncorrected aphakia. CONCLUSIONS: Cataract and refractive errors are major causes of blindness and low vision and control strategies should prioritize them. Most blindness and low vision burden is avoidable.

  16. See-and-Avoid Collision Avoidance Using ADS-B Signal and Radar Sensing Project

    Data.gov (United States)

    National Aeronautics and Space Administration — IAI proposes an innovative collision avoidance radar and communication technology to detect and track both cooperative and non-cooperative targets. The system...

  17. Avoiding unseen obstacles: Subcortical vision is not sufficient to maintain normal obstacle avoidance behaviour during reaching.

    Science.gov (United States)

    Ross, Alasdair I; Schenk, Thomas; Billino, Jutta; Macleod, Mary J; Hesse, Constanze

    2016-10-03

    Previous research found that a patient with cortical blindness (homonymous hemianopia) was able to successfully avoid an obstacle placed in his blind field, despite reporting no conscious awareness of it [Striemer, C. L., Chapman, C. S., & Goodale, M. A., 2009, PNAS, 106(37), 15996-16001]. This finding led to the suggestion that dorsal stream areas, that are assumed to mediate obstacle avoidance behaviour, may obtain their visual input primarily from subcortical pathways. Hence, it was suggested that normal obstacle avoidance behaviour can proceed without input from the primary visual cortex. Here we tried to replicate this finding in a group of patients (N = 6) that suffered from highly circumscribed lesions in the occipital lobe (including V1) that spared the subcortical structures that have been associated with action-blindsight. We also tested if obstacle avoidance behaviour differs depending on whether obstacles are placed only in the blind field or in both the blind and intact visual field of the patients simultaneously. As expected, all patients successfully avoided obstacles placed in their intact visual field. However, none of them showed reliable avoidance behaviour - as indicated by adjustments in the hand trajectory in response to obstacle position - for obstacles placed in their blind visual field. The effects were not dependent on whether one or two obstacles were present. These findings suggest that behaviour in complex visuomotor tasks relies on visual input from occipital areas.

  18. Final environmental statement for the geothermal leasing program

    Energy Technology Data Exchange (ETDEWEB)

    1973-12-31

    This second of the four volumes of the Geothermal Leasing Program final impact statement contains the individual environmental statements for the leasing of federally owned geothermal resources for development in three specific areas: Clear Lake-Geysers; Mono Lake-Long Valley; and Imperial Valley, all in California. It also includes a summary of the written comments received and departmental responses relative to the Draft Environmental Impact Statement issued in 1971; comments and responses on the Draft Environmental Impact Statement; consultation and coordination in the development of the proposal and in the preparation of the Draft Environmental Statement; and coordination in the review of the Draft Environmental Statement.

  19. The influence of mastery-avoidance goals on performance improvement

    NARCIS (Netherlands)

    Van Yperen, Nico W.; Elliot, Andrew J.; Anseel, Frederik

    2009-01-01

    Two experiments focused on examining the influence of mastery-avoidance goals on performance improvement, and more specifically, on mastery-avoidance goals grounded in an intrapersonal standard. That is, herein, mastery-avoidance goals entail striving to avoid doing worse than one has done before. B

  20. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997)...

  1. 21 CFR 514.12 - Confidentiality of data and information in an investigational new animal drug notice.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Confidentiality of data and information in an investigational new animal drug notice. 514.12 Section 514.12 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS NEW ANIMAL...

  2. The global cost of eliminating avoidable blindness

    Directory of Open Access Journals (Sweden)

    Kirsten L Armstrong

    2012-01-01

    Full Text Available Aims : To complete an initial estimate of the global cost of eliminating avoidable blindness, including the investment required to build ongoing primary and secondary health care systems, as well as to eliminate the ′backlog′ of avoidable blindness. This analysis also seeks to understand and articulate where key data limitations lie. Materials and Methods : Data were collected in line with a global estimation approach, including separate costing frameworks for the primary and secondary care sectors, and the treatment of backlog. Results : The global direct health cost to eliminate avoidable blindness over a 10-year period from 2011 to 2020 is estimated at $632 billion per year (2009 US$. As countries already spend $592 billion per annum on eye health, this represents additional investment of $397.8 billion over 10 years, which is $40 billion per year or $5.80 per person for each year between 2010 and 2020. This is concentrated in high-income nations, which require 68% of the investment but comprise 16% of the world′s inhabitants. For all other regions, the additional investment required is $127 billion. Conclusions : This costing estimate has identified that low- and middle-income countries require less than half the additional investment compared with high-income nations. Low- and middle-income countries comprise the greater investment proportion in secondary care whereas high-income countries require the majority of investment into the primary sector. However, there is a need to improve sector data. Investment in better data will have positive flow-on effects for the eye health sector.

  3. Resource Contingency Program : Draft Environmental Impact Statement.

    Energy Technology Data Exchange (ETDEWEB)

    United States. Bonneville Power Administration.

    1995-02-01

    In 1990, the Bonneville Power Administration (BPA) embarked upon the Resource Contingency Program (RCP) to fulfill its statutory responsibilities to supply electrical power to its utility, industrial and other customers in the Pacific Northwest. Instead of buying or building generating plants now, BPA has purchased options to acquire power later if needed. Three option development agreements were signed in September 1993 with three proposed natural gas-fired, combined cycle combustion turbine CT projects near Chehalis and Satsop Washington and near Hermiston, Oregon. This environmental impact statement addresses the environmental consequences of purchasing power from these options. This environmental impact statement addresses the environmental consequences of purchasing power from these options.

  4. The utility of Pro Forma Income Statements.

    Science.gov (United States)

    Reiboldt, Max; Reiboldt, John

    2002-01-01

    Recent headlines surrounding the financial demise of the nation's seventh largest company, Enron, and its subsequent entanglements with its accounting and consulting firm, Arthur Andersen, have placed a cloud of suspicion upon many reasonable business practices that otherwise are considered standard procedure. The proforma income statement is one of those practices. An oft-used tool in financial management, pro formas play a useful role for projecting financial performance based on predictable forecasts or assumptions. Regardless of the current scrutiny, there is still a valid use for accurately prepared statements.

  5. Statement on the identity of apple snails

    DEFF Research Database (Denmark)

    Baker, R.; Candresse, T.; Dormannsné Simon, E.

    2012-01-01

    Following a request by the European Commission, EFSA’s Panel on Plant Health was asked to deliver a statement to clarify the current scientific knowledge regarding the identity of the apple snails in the context of the evaluation of the pest risk analysis prepared by the Spanish Ministry of Envir......Following a request by the European Commission, EFSA’s Panel on Plant Health was asked to deliver a statement to clarify the current scientific knowledge regarding the identity of the apple snails in the context of the evaluation of the pest risk analysis prepared by the Spanish Ministry...

  6. Tax Anti-avoidance Through Transfer Pricing

    DEFF Research Database (Denmark)

    Rossing, Christian Plesner; Riise Johansen, Thomas; Pearson, Thomas C.

    2016-01-01

    This paper examines the case of Starbucks’ UK branch, which became subject to massive public criticism over alleged tax avoidance. Despite Starbucks arguing that its transfer pricing practices were in full compliance with regulatory requirements, public pressure for higher corporate tax payments...... led Starbucks to increase its UK tax payment on transfer pricing income beyond regulatory requirements. This case study suggests that MNE tax behavior on international transfer pricing is not strictly a matter of compliance with formal tax regulation. We demonstrate the way an MNE attempts to re...

  7. CORPORATE SOCIAL RESPONSIBILITY VERSUS TAX AVOIDANCE PRACTICES

    Directory of Open Access Journals (Sweden)

    Stoian Ciprian-Dumitru

    2012-07-01

    Full Text Available Worldwide crisis has made multinational companies that are engaged in corporate social responsibility actions to manage their businesses through the lens of various tax avoidance practices. The content of this paper is important due to the fact that tries to identify the impact in case of companies active in corporate social responsibility actions versus their tax structures orientation. Corporate social responsibility literature did not paid enough attention on the impact of the tax avoidance practices of companies. Tax, as a concept, brings in itself an important corporate financial impact with subsequent effects for the life of multiple citizens in countries where private entities are operating. Even though companies are usually expressing their ethical and responsible conduct in respect of the social environment, there are many cases when the business practices were not aligned with the declared corporate behavior. This paper seeks firstly to examine whether companies engaged in tax avoidance practices (ex. offshore tax havens consider that continue to act socially responsible. Secondly, the paper examines the influence on attending the stakeholders’ goals for those companies practicing tax avoidance and its implications on corporate social responsibility actions. Moreover, the paper focuses also on the aspects described before from the perspective of the corporate entities operating in Romania. This paper’s intention is to use and to develop the results of previous research carried out by Lutz Preus (University of London and, subsequently, by Senators Levin, Coleman and Obama in their “Stop Tax Haven Abuse Bill”. The implications and the objectives of this material are to highlight, to identify and to spot clearly the relations and the influences of the tax haven practices of corporations versus their undertaken social responsibility actions. Moreover, this paper brings a fresh perspective of this topic from the

  8. Avoiding Lawsuits for Wage and Hour Violations.

    Science.gov (United States)

    Silberman, Cherie L

    2016-01-01

    Due to the highly technical language in the wage and hour laws and regulations, employers often find that they have unknowingly violated the Fair Labor Standards Act (FLSA). This can occur because employers have improperly classified an employee as exempt or because employers do not realize that certain time should be paid in full. Improperly classifying employees as exempt or failing to compensate nonexempt employees for all time worked can lead to costly lawsuits, audits, or enforcement actions by the Wage and Hour Division of the Department of Labor. This article discusses the most common FLSA exemptions and provides best practices to avoid liability under the FLSA.

  9. Conflict Avoidance by Descent Behind the Intruder

    Directory of Open Access Journals (Sweden)

    Tone Magister

    2004-03-01

    Full Text Available The paramount priorities for safe implementation of a singlepilot manned cockpit concept and the futuristic concept of asingle pilot acting as a supervisor for a fully automated aircraftflying on incessantly self-optimised trajectories are eliminationsof the risk of mid-air collisions and of conflicts resulting fromthe lack of safe airborne separations. Avoidance procedureswith initiation of descent behind the intruder for conflict resolutionbetween a pair of aircraft where one of them is in the vicinityof the top of its descent represents merely one little piece ofthis giant puzzle.

  10. Contact Dermatitis, Patch Testing, and Allergen Avoidance.

    Science.gov (United States)

    Burkemper, Nicole M

    2015-01-01

    In patients presenting with a complaint of rash, contact dermatitis is often the underlying diagnosis making it an entity with which health care providers should be familiar. Contact dermatitis can be divided into irritant contact dermatitis and allergic contact dermatitis. In a patient suspected of having allergic contact dermatitis, patch testing can be done to identify specific allergens. Education focused on allergen avoidance and safe products is an integral part of treatment for the contact dermatitis patient. Knowledge of the most common allergens is helpful for clinicians to be able to provide this education.

  11. Wireless vehicular networks for car collision avoidance

    CERN Document Server

    2013-01-01

    Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks. The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

  12. Guide to the collision avoidance rules

    CERN Document Server

    Cockcroft, A N

    2004-01-01

    A Guide to the Collision Avoidance Rules is the essential reference to the safe operation of all vessels at sea. Published continuously since 1965, this respected and expert guide is the classic text for all who need to, practically and legally, understand and comply with the Rules. This sixth edition incorporates all of the amendments to the International Regulations for Preventing Collisions at Sea which came into force in November 2003.The books sets out all of the Rules with clear explanation of their meaning, and gives detailed examples of how the rules have been used in practice

  13. Avoiding plagiarism: guidance for nursing students.

    Science.gov (United States)

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission.

  14. AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

    Directory of Open Access Journals (Sweden)

    Dr. L. Arockiam

    2015-02-01

    Full Text Available Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be kept in the public cloud storage. Safety and security are the top most issues in cloud storage. The confidentiality parameter provides data storage security. This paper proposes a security service algorithm named AROcrypt to ensure the security of data stored in cloud storage. It also describes Security as a Service (SEaaS in the cloud environment. Simulation was conducted using a security analysis tool with existing techniques. The proposed technique provides better performance and good security when compared with existing techniques.

  15. Substandard emergency obstetric care - a confidential enquiry into maternal deaths at a regional hospital in Tanzania

    DEFF Research Database (Denmark)

    Sorensen, Bjarke Lund; Elsass, Peter; Nielsen, Brigitte Bruun;

    2010-01-01

    OBJECTIVE: (i) To identify clinical causes of maternal deaths at a regional hospital in Tanzania and through confidential enquiry (CE) assess major substandard care and make a comparison to the findings of the internal maternal deaths audits (MDAs); (ii) to describe hospital staff reflections...... in 46 (74%) of the 62 cases reviewed. During the same time period MDA identified substandard care in 18 cases. Staff perceived poor organization of work and lack of training as important causes for substandard care. Local MDA was considered useful although time-consuming and sometimes threatening...... on causes of substandard care. METHODS: A CE into maternal deaths was conducted based on information available from written sources supplemented with participatory observations and interviews with staff. The compiled information was summarized and presented anonymously for external expert review to assess...

  16. Child’s right to be Heard in Chilean Family Courts: Confidential Hearing

    Directory of Open Access Journals (Sweden)

    Elena Salum Alvarado

    2016-04-01

    Full Text Available This work addresses the views family court judges have on The Right of Children to be heard (0-14 years and the importance they give this as one of the components of the Best Interests of the Child. This qualitative study is framed into the empirical Legal Sociology. To this effect, semi structured interviews to Family Court Judges were applied, focusing on Family Courts processes, specifically in the Confidential Hearing Audience. We argue that there would be a misalignment between the legislation which aims to give life to the Convention on the Rights of the Child’s guiding principles and Family Courts, specifically, on how this legislation plans on implementing the right to be heard.

  17. Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    The essence of this study is first to highlight the cyber-security challenges confronting SMEs in developing economies, and to model a framework for safeguarding their assets, to ensure continuous optimal business operations, and to participate and compete securely in the ubiquitous cyber......-market. As more SMEs today continue to use networks and the Internet as vital business tools, the need for a secured organization cannot be over-emphasized. SMEs are utilizing the opportunities offered by advances in ICTs to adopt innovative business operations, to offer user-friendly products and services......, to develop customer-centric strategies. While connectivity is indispensable for achieving business success, being connected also implies being exposed to a myriad of cyber-security challenges, such as vulnerabilities of confidentiality, integrity and availability (CIA). As vulnerabilities are exploited...

  18. 77 FR 46790 - Environmental Impact Statement: Dane County, WI

    Science.gov (United States)

    2012-08-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement: Dane County, WI AGENCY: Federal Highway Administration (FHWA), DOT. ACTION: Notice of Intent to Prepare an Environmental Impact Statement. SUMMARY:...

  19. Positive self-statements: power for some, peril for others.

    Science.gov (United States)

    Wood, Joanne V; Perunovic, W Q Elaine; Lee, John W

    2009-07-01

    Positive self-statements are widely believed to boost mood and self-esteem, yet their effectiveness has not been demonstrated. We examined the contrary prediction that positive self-statements can be ineffective or even harmful. A survey study confirmed that people often use positive self-statements and believe them to be effective. Two experiments showed that among participants with low self-esteem, those who repeated a positive self-statement ("I'm a lovable person") or who focused on how that statement was true felt worse than those who did not repeat the statement or who focused on how it was both true and not true. Among participants with high self-esteem, those who repeated the statement or focused on how it was true felt better than those who did not, but to a limited degree. Repeating positive self-statements may benefit certain people, but backfire for the very people who "need" them the most.

  20. 32 CFR 1636.10 - Statement of reasons for denial.

    Science.gov (United States)

    2010-07-01

    ... CLASSIFICATION OF CONSCIENTIOUS OBJECTORS § 1636.10 Statement of reasons for denial. (a) Denial of a conscientious objector claim by a board must be accompanied by a statement specifying the reason(s) for...

  1. Underactuated spacecraft formation reconfiguration with collision avoidance

    Science.gov (United States)

    Huang, Xu; Yan, Ye; Zhou, Yang

    2017-02-01

    Underactuated collision-free controllers are proposed in this paper for multiple spacecraft formation reconfiguration in circular orbits with the loss of either the radial or in-track thrust. A nonlinear dynamical model of underactuated formation flying is introduced, which is then linearized about circular orbits for controllability and feasibility analyses on underactuated formation reconfiguration. By using the inherent dynamics coupling of system states, reduced-order sliding mode controllers are then designed for either case to indirectly stabilize the system trajectories to the desired formations. In consideration of the collision-avoidance requirement, the artificial potential function method is then employed to design novel underactuated collision-avoidance maneuvers. Rigorous proof substantiates the capabilities of such maneuvers in preventing collisions even in the absence of radial or in-track thrust. Furthermore, a Lyapunov-based analysis ensures the asymptotic stability of the overall closed-loop system. Numerical simulations are performed in a J2-perturbed environment to verify the validity of the proposed underactuated control schemes for collision-free reconfiguration.

  2. Shape optimization of self-avoiding curves

    Science.gov (United States)

    Walker, Shawn W.

    2016-04-01

    This paper presents a softened notion of proximity (or self-avoidance) for curves. We then derive a sensitivity result, based on shape differential calculus, for the proximity. This is combined with a gradient-based optimization approach to compute three-dimensional, parameterized curves that minimize the sum of an elastic (bending) energy and a proximity energy that maintains self-avoidance by a penalization technique. Minimizers are computed by a sequential-quadratic-programming (SQP) method where the bending energy and proximity energy are approximated by a finite element method. We then apply this method to two problems. First, we simulate adsorbed polymer strands that are constrained to be bound to a surface and be (locally) inextensible. This is a basic model of semi-flexible polymers adsorbed onto a surface (a current topic in material science). Several examples of minimizing curve shapes on a variety of surfaces are shown. An advantage of the method is that it can be much faster than using molecular dynamics for simulating polymer strands on surfaces. Second, we apply our proximity penalization to the computation of ideal knots. We present a heuristic scheme, utilizing the SQP method above, for minimizing rope-length and apply it in the case of the trefoil knot. Applications of this method could be for generating good initial guesses to a more accurate (but expensive) knot-tightening algorithm.

  3. Honey bees selectively avoid difficult choices.

    Science.gov (United States)

    Perry, Clint J; Barron, Andrew B

    2013-11-19

    Human decision-making strategies are strongly influenced by an awareness of certainty or uncertainty (a form of metacognition) to increase the chances of making a right choice. Humans seek more information and defer choosing when they realize they have insufficient information to make an accurate decision, but whether animals are aware of uncertainty is currently highly contentious. To explore this issue, we examined how honey bees (Apis mellifera) responded to a visual discrimination task that varied in difficulty between trials. Free-flying bees were rewarded for a correct choice, punished for an incorrect choice, or could avoid choosing by exiting the trial (opting out). Bees opted out more often on difficult trials, and opting out improved their proportion of successful trials. Bees could also transfer the concept of opting out to a novel task. Our data show that bees selectively avoid difficult tasks they lack the information to solve. This finding has been considered as evidence that nonhuman animals can assess the certainty of a predicted outcome, and bees' performance was comparable to that of primates in a similar paradigm. We discuss whether these behavioral results prove bees react to uncertainty or whether associative mechanisms can explain such findings. To better frame metacognition as an issue for neurobiological investigation, we propose a neurobiological hypothesis of uncertainty monitoring based on the known circuitry of the honey bee brain.

  4. Convective Weather Avoidance with Uncertain Weather Forecasts

    Science.gov (United States)

    Karahan, Sinan; Windhorst, Robert D.

    2009-01-01

    Convective weather events have a disruptive impact on air traffic both in terminal area and in en-route airspaces. In order to make sure that the national air transportation system is safe and efficient, it is essential to respond to convective weather events effectively. Traffic flow control initiatives in response to convective weather include ground delay, airborne delay, miles-in-trail restrictions as well as tactical and strategic rerouting. The rerouting initiatives can potentially increase traffic density and complexity in regions neighboring the convective weather activity. There is a need to perform rerouting in an intelligent and efficient way such that the disruptive effects of rerouting are minimized. An important area of research is to study the interaction of in-flight rerouting with traffic congestion or complexity and developing methods that quantitatively measure this interaction. Furthermore, it is necessary to find rerouting solutions that account for uncertainties in weather forecasts. These are important steps toward managing complexity during rerouting operations, and the paper is motivated by these research questions. An automated system is developed for rerouting air traffic in order to avoid convective weather regions during the 20- minute - 2-hour time horizon. Such a system is envisioned to work in concert with separation assurance (0 - 20-minute time horizon), and longer term air traffic management (2-hours and beyond) to provide a more comprehensive solution to complexity and safety management. In this study, weather is dynamic and uncertain; it is represented as regions of airspace that pilots are likely to avoid. Algorithms are implemented in an air traffic simulation environment to support the research study. The algorithms used are deterministic but periodically revise reroutes to account for weather forecast updates. In contrast to previous studies, in this study convective weather is represented as regions of airspace that pilots

  5. Consent, compulsion and confidentiality in relation to testing for HIV infection: the views of WA doctors.

    Science.gov (United States)

    Grove, D I; Mulligan, J B

    1990-02-19

    A survey was undertaken of all of the consultant staff members of Perth's major teaching hospitals together with all the fellows of The Royal Australian College of General Practitioners in Western Australia in order to define their views on the issues of informed consent, compulsion in relation to surgery, and confidentiality in a particular circumstance, when testing for infection with the human immunodeficiency virus (HIV). Of the 701 individuals surveyed, 548 (78.2%) responded. Of these, 74.3% considered that it was not always necessary to gain informed consent, 22.0% believed that it was always necessary to do so, while 2.3% were undecided. General practitioners (38.4%) were more likely to think it necessary to obtain consent than were hospital consultants (19.0%), but otherwise the field of specialty had little effect on opinion. Of the respondents, 39.0% believed that testing before elective surgery is mandatory for all patients, while 53.0% considered that it should be compulsory in high-risk groups. Similar views were held about compulsory HIV antibody testing after emergency surgery. Similar responses were obtained from all specialty groups. When asked about whether they would tell a sexual partner of a patient's HIV status when the patient refused, 10.5% of doctors stated they would never advise the partner, 24.7% of doctors would on some occasions, 41.0% of doctors would tell a partner, and 23.8% always were undecided. Many individuals commented that they failed to see why HIV infection was being treated differently from other serious diseases. We have found that the majority opinion of the most senior members of the medical profession is that specific, informed consent should not always be required, that there is great support for compulsory testing, and that confidentiality may be broken under certain circumstances. These views must be recognized by administrators and legislators when framing measures to control this infection.

  6. 42 CFR 2.22 - Notice to patients of Federal confidentiality requirements.

    Science.gov (United States)

    2010-10-01

    ...) A statement that reports of suspected child abuse and neglect made under State law to appropriate... qualified personnel for research, audit, or program evaluation. Violation of the Federal law and regulations... suspected child abuse or neglect from being reported under State law to appropriate State or...

  7. IAS 1 Presentation of Financial Statements - A Closer Look

    OpenAIRE

    Muthupandian, K S

    2008-01-01

    The International Accounting Standards Committee issued the International Accounting Standard 1 Presentation of Financial Statements. The objective of IAS 1 is to prescribe the basis for presentation of general purpose financial statements (GPFS), to ensure comparability both with the entity's financial statements of previous periods and with the financial statements of other entities. The objective of GPFS is to provide information about the financial position, financial performance, and cas...

  8. The Interim Financial Statements: The Case of Greece

    OpenAIRE

    Rogdaki, E.I.; Kazantzis, Ch.

    1999-01-01

    The following paper refers to the accounting and auditing issues which emerge in the preparation of the interim financial statements of the companies: Firstly, the interim financial statements are defined as being the financial statements that provide useful information about the financial position and the financial results of a company which are realized and accrued during the fiscal year. The interim financial statements can be prepared on a monthly basis, on a quarterly basis or covering a...

  9. Health claims and other health-related statements in the labeling and advertising of alcohol beverages (99R-199P). Final rule, Treasury decision.

    Science.gov (United States)

    2003-03-03

    TTB is amending the regulations to prohibit the appearance on labels or in advertisements of any health-related statement, including a specific health claim, that is untrue in any particular or tends to create a misleading impression. A specific health claim on a label or in an advertisement is considered misleading unless the claim is truthful and adequately substantiated by scientific evidence; properly detailed and qualified with respect to the categories of individuals to whom the claim applies; adequately discloses the health risks associated with both moderate and heavier levels of alcohol consumption; and outlines the categories of individuals for whom any levels of alcohol consumption may cause health risks. In addition, TTB will consult with the Food and Drug Administration (FDA), as needed, on the use of specific health claims on labels. If FDA determines that a specific health claim is a drug claim that is not in compliance with the requirements of the Federal Food, Drug, and Cosmetic Act, TTB will not approve the use of such statement on a label. Health-related statements that are not specific health claims or health-related directional statements will be evaluated on a case-by-case basis to determine if they tend to mislead consumers. The final rule provides that health-related directional statements (statements that direct or refer consumers to a third party or other source for information regarding the effects on health of alcohol consumption) will be presumed misleading unless those statements include a brief disclaimer advising consumers that the statement should not encourage consumption of alcohol for health reasons, or some other appropriate disclaimer to avoid misleading consumers. TTB believes that the final regulations will ensure that labels and advertisements do not contain statements or claims that would tend to mislead the consumer about the significant health consequences of alcohol consumption.

  10. 5 CFR 610.302 - Policy statement.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Policy statement. 610.302 Section 610.302 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS HOURS OF DUTY Administrative... ordinarily would be covered by the scheduling of leave, furlough, or the assignment of other work. Insofar...

  11. The 7 Aarhus Statements on Climate Change

    DEFF Research Database (Denmark)

    Basse, Ellen Margrethe; Svenning, Jens-Christian; Olesen, Jørgen E

    2009-01-01

    ; Nanotechnology solutions for a sustainable future; Citizens and society, and The Arctic. The main responsible scientists for the seven conference themes and representatives from the think-tank CONCITO delivered 'The 7 Aarhus Statements on Climate Change' as part of the closing session of the conference...

  12. 37 CFR 2.33 - Verified statement.

    Science.gov (United States)

    2010-07-01

    ... behalf of the applicant under § 2.193(e)(1). (b)(1) In an application under section 1(a) of the Act, the... likely, when applied to the goods or services of the other person, to cause confusion or mistake, or to... 44 of the Act, the verified statement must allege: That the applicant has a bona fide intention...

  13. 78 FR 42893 - Statement on Regulatory Burden

    Science.gov (United States)

    2013-07-18

    ... serve the credit needs of its customers, i.e., America's farmers, ranchers, aquatic producers and... CREDIT ADMINISTRATION 12 CFR Chapter VI RIN 3052-AC88 Statement on Regulatory Burden AGENCY: Farm Credit Administration. ACTION: Notice of intent; request for comment. SUMMARY: The Farm Credit Administration (FCA,...

  14. 76 FR 63957 - Consumer Product Policy Statement

    Science.gov (United States)

    2011-10-14

    ... COMMISSION Consumer Product Policy Statement AGENCY: Nuclear Regulatory Commission. ACTION: Proposed revision... general public (consumer products). While the NRC is not making any significant changes to the policy... intended for use by the general public (consumer products). Under this policy, the AEC and then the...

  15. Academic Program Statement of Sangamon State University.

    Science.gov (United States)

    Sangamon State Univ., Springfield, IL.

    The Statement is divided into four parts. The first part discusses the goals and organization of Sangamon State University. The institution will open in the Fall of 1970 as an upper division and graduate institution with emphasis on the liberal arts and the general area of public affairs, government, and related professions. It will operate on a…

  16. 29 CFR 511.8 - Prehearing statements.

    Science.gov (United States)

    2010-07-01

    ... PROCEDURE FOR AMERICAN SAMOA § 511.8 Prehearing statements. (a) Every employer, employee, trade association, trade union, or group of employers, employees, associations, or unions in the industry as defined, or in... section 6(c) of the Administrative Procedure Act, the industry committee shall, after considering...

  17. Resonating Statements: Discursive acts in IT projects

    DEFF Research Database (Denmark)

    Hjelholt, Morten; Jensen, Tina Blegind

    2015-01-01

    IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept of ...... as part of a feedback loop to re-attach the localized IT project to the broader national discourse. The paper concludes with reflections on how to actively build on resonating statements as a strategic resource for legitimizing IT projects.......IT projects are often complex arrangements of technological components, social actions, and organizational transformation that are difficult to manage in practice. This paper takes an analytical discourse perspective to explore the process of legitimizing IT projects. We introduce the concept...... of resonating statements to highlight how central actors navigate in various discourses over time. Particularly, the statements and actions of an IT project manager are portrayed to show how individuals can legitimize actions by connecting statements to historically produced discourses. The case study...

  18. 12 CFR 611.515 - Information statement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information statement. 611.515 Section 611.515 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM ORGANIZATION Transfer of Authorities... letters and boldface type, that: THE FARM CREDIT ADMINISTRATION HAS NEITHER APPROVED NOR PASSED UPON...

  19. 21 CFR 201.50 - Statement of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Statement of identity. 201.50 Section 201.50 Food... identity. (a) The label of prescription and insulin-containing drugs in package form shall bear as one of its principal features a statement of the identity of the drug. (b) Such statement of identity...

  20. 46 CFR 298.42 - Reporting requirements-financial statements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Reporting requirements-financial statements. 298.42... OBLIGATION GUARANTEES Defaults and Remedies, Reporting Requirements, Applicability of Regulations § 298.42 Reporting requirements—financial statements. (a) In general. The financial statements of the Company...

  1. 40 CFR 156.212 - Personal protective equipment statements.

    Science.gov (United States)

    2010-07-01

    ...: (body protection statement); (glove statement, if applicable); (footwear statement, if applicable... shall be based on the more toxic (lower numbered) category. 2 For labeling language for chemical-resistant gloves, see paragraph (f) of this section. 3 For labeling language for respiratory...

  2. 48 CFR 552.270-24 - Statement of Lease.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Statement of Lease. 552... Statement of Lease. As prescribed in 570.603, insert the following clause: Statement of Lease (SEP 1999) (a... this clause and, if such is the case, that (1) the lease is in full force and effect; and (2) the...

  3. 14 CFR 21.130 - Statement of conformity.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Statement of conformity. 21.130 Section 21... conformity. Each holder or licensee of a type certificate only, for a product manufactured in the United... Administrator a statement of conformity (FAA Form 317). This statement must be signed by an authorized...

  4. 12 CFR 563c.102 - Financial statement presentation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Financial statement presentation. 563c.102... REQUIREMENTS Financial Statement Presentation § 563c.102 Financial statement presentation. This section... used to present details of loans if considered a more appropriate presentation. The...

  5. 39 CFR 3001.115 - Participant statement or brief.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Participant statement or brief. 3001.115 Section... Participant statement or brief. (a) Participant statement. Upon the filing of the petition for review of a... or she may file a brief as described in paragraph (b) of this section presenting the arguments,...

  6. Pedagogical Declarations: Feminist Engagements with the Teaching Statement

    Science.gov (United States)

    Brown, Sarah; Collard, Rosemary-Claire; Hoogeveen, Dawn

    2014-01-01

    To produce a teaching statement, current and aspiring teachers undertake the ostensibly straightforward task of putting their teaching philosophy onto paper. But upon close examination, the teaching statement--a seemingly simple object--is much more complex. The teaching statement is full of dual functions, many of which can be conceived of as…

  7. 7 CFR 1427.1081 - General statement and administration.

    Science.gov (United States)

    2010-01-01

    ... with approval of the Director, KCCO, or the Director's designee. Financial statements shall show the... by the Director, KCCO, or the Director's designee, the financial statement of a parent company, which... Linters,” (2) A current financial statement on Form WA-51, “Financial Statement”, supported by...

  8. 7 CFR 1775.21 - Audit or financial statements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Audit or financial statements. 1775.21 Section 1775... Audit or financial statements. The grantee will provide an audit report or financial statements as follows: (a) Grantees expending $500,000 or more Federal funds per fiscal year will submit an...

  9. 27 CFR 5.40 - Statements of age and percentage.

    Science.gov (United States)

    2010-04-01

    .... (b) Statements of age for rum, brandy, and Tequila. Age may, but need not, be stated on labels of rums, brandies, and Tequila, except that an appropriate statement with respect to age shall appear on... immature brandies) not required to bear a statement of age, and rum and Tequila aged for not less than...

  10. 12 CFR 328.3 - Official advertising statement requirements.

    Science.gov (United States)

    2010-01-01

    ... OF GENERAL POLICY ADVERTISEMENT OF MEMBERSHIP § 328.3 Official advertising statement requirements. (a... advertising statement in advertisements—(1) General requirement. Except as provided in § 328.3(d), each... not insured in all of its advertisements requiring use of the official advertising statement....

  11. 42 CFR 426.517 - CMS' statement regarding new evidence.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false CMS' statement regarding new evidence. 426.517... DETERMINATIONS Review of an NCD § 426.517 CMS' statement regarding new evidence. (a) CMS may review any new... experts; and (5) Presented during any hearing. (b) CMS may submit a statement regarding whether the...

  12. Don't Like RDF Reification? Making Statements about Statements Using Singleton Property.

    Science.gov (United States)

    Nguyen, Vinh; Bodenreider, Olivier; Sheth, Amit

    2014-04-11

    Statements about RDF statements, or meta triples, provide additional information about individual triples, such as the source, the occurring time or place, or the certainty. Integrating such meta triples into semantic knowledge bases would enable the querying and reasoning mechanisms to be aware of provenance, time, location, or certainty of triples. However, an efficient RDF representation for such meta knowledge of triples remains challenging. The existing standard reification approach allows such meta knowledge of RDF triples to be expressed using RDF by two steps. The first step is representing the triple by a Statement instance which has subject, predicate, and object indicated separately in three different triples. The second step is creating assertions about that instance as if it is a statement. While reification is simple and intuitive, this approach does not have formal semantics and is not commonly used in practice as described in the RDF Primer. In this paper, we propose a novel approach called Singleton Property for representing statements about statements and provide a formal semantics for it. We explain how this singleton property approach fits well with the existing syntax and formal semantics of RDF, and the syntax of SPARQL query language. We also demonstrate the use of singleton property in the representation and querying of meta knowledge in two examples of Semantic Web knowledge bases: YAGO2 and BKR. Our experiments on the BKR show that the singleton property approach gives a decent performance in terms of number of triples, query length and query execution time compared to existing approaches. This approach, which is also simple and intuitive, can be easily adopted for representing and querying statements about statements in other knowledge bases.

  13. Economic values and corporate financial statements.

    Science.gov (United States)

    Magness, Vanessa

    2003-07-01

    Corporate financial statements do not include environmental values. This deficiency has contributed to the criticism that company managers do not include environmental impacts in the internal decision-making process. The accounting profession has not developed effective environmental reporting guidelines. This situation contributes to a second problem: the apparent inability of corporate reports to provide useful information to external parties. It has been suggested that by using nonmarket valuation methodologies, financial statements can be used to measure progress toward sustainable development. Nonmarket valuations are not generally accepted by the accounting profession. They are too subjective to support effective decisions, and too costly to obtain. Furthermore, demand for this sort of information appears small. Some of these issues may be resolved over time. The most serious challenge, however, concerns how enhanced financial reports would be used. Financial statements are supposed to help investors assess the amount, timing, and uncertainty of future cash flows. A substantial portion of environmental value is based on nonuse benefits, much of which will never be realized in company cash flows. In other words, the role of financial statements would have to change. Furthermore, since there is no general agreement as to the meaning of "sustainable development," efforts to operationalize the term have been fraught with difficulty. Moreover, monetization of environmental values could jeopardize their preservation, leaving some to question the overall objective of this form of reporting. For these reasons, while it is to be hoped that better reporting of environmental impacts will be forthcoming, the greatest advances will likely be outside the financial statements themselves.

  14. SOME DISCLOSURE ASPECTS REGARDING CONSOLIDATED FINANCIAL STATEMENTS

    Directory of Open Access Journals (Sweden)

    Cirstea Andreea

    2013-07-01

    Full Text Available The purpose of this article is to analyze the current state of consolidated reporting practice harmonization concerning the choice of presenting the income statement, the changes in equity, the methods used for presenting the cash flow statement, the extant methods for evaluating and reporting goodwill, the extant methods in which jointly controlled entities are accounted in the consolidated financial statements, or the choice for recognizing investments in subsidiaries, jointly controlled entities and associates in the separate statements of the parent company. In order to achieve our goal we selected the first 10 groups, in order of their capitalization value, that were listed on each of the following capital markets: London Stock Exchange, NYSE Euronext (Paris Stock Exchange and Deutsche Börse (Frankfurt Stock Exchange and we analyzed, in a qualitative and in a quantitative manner, for a period of six years starting with 2007, their consolidated financial statements with the design to establish exactly which of the aspects stated in the International Financial Reporting Standards were being used for the items presented above. In order to complete the empirical research part of the paper that addresses from a comparative perspective the evaluation of the degree of material harmony between the reporting practices of groups listed on the three stock exchanges above-mentioned, we used statistical and mathematical methods represented by the I Index first described by Van der Tas. Taking into account the fact that since 2005 all listed companies on the European stock exchanges were required to adopt the international accounting standards for their consolidated financial disclosures, the degree of material harmony was studied only in reference to those requirements that presented two methods or possibilities of disclosure.Our findings suggest that the groups analyzed present a high degree of material harmonization with respect to the reporting

  15. Avoidable cancers in the Nordic countries. Radiation

    DEFF Research Database (Denmark)

    Winther, J F; Ulbak, Kaare; Dreyer, L;

    1997-01-01

    Exposure to solar and ionizing radiation increases the risk for cancer in humans. Some 5% of solar radiation is within the ultraviolet spectrum and may cause both malignant melanoma and non-melanocytic skin cancer; the latter is regarded as a benign disease and is accordingly not included in our......, it was estimated that the exposure of the Nordic populations to natural sources of ionizing radiation other than radon and to medical sources will each give rise to an annual total of 2120 cancers at various sites. For all types of ionizing radiation, the annual total will be 4420 cancer cases, or 3.9% of all...... estimation of avoidable cancers. Under the assumption that the rate of occurrence of malignant melanoma of the buttocks of both men and women and of the scalp of women would apply to all parts of the body in people completely unexposed to solar radiation, it was estimated that approximately 95% of all...

  16. DENIS Galaxies in the Zone of Avoidance

    CERN Document Server

    Schröder, A; Mamon, G A; Ruphy, S; Paris-Meudon, Obs.

    1997-01-01

    We investigated the potential of using DENIS for studies of galaxies behind the obscuration layer of our Milky Way, and mapping the Galactic extinction. As a pilot study, we examined DENIS I-, J-, and K-band images of heavily obscured galaxies from a deep optical (B_J-band) galaxy survey in the Zone of Avoidance. We tried to uncover additional galaxies at latitudes where the Milky Way remains fully opaque, i.e. we conducted a `blind' search at |b| 4-5 mag. Furthermore, we determined the I, J and K magnitudes of galaxies in the low-latitude, nearby, rich cluster Abell 3627 and compared the resulting colour-colour diagram with that of an unobscured cluster.

  17. Avoiding Quantum Chaos in Quantum Computation

    CERN Document Server

    Berman, G P; Izrailev, F M; Tsifrinovich, V I

    2001-01-01

    We study a one-dimensional chain of nuclear $1/2-$spins in an external time-dependent magnetic field. This model is considered as a possible candidate for experimental realization of quantum computation. According to the general theory of interacting particles, one of the most dangerous effects is quantum chaos which can destroy the stability of quantum operations. According to the standard viewpoint, the threshold for the onset of quantum chaos due to an interaction between spins (qubits) strongly decreases with an increase of the number of qubits. Contrary to this opinion, we show that the presence of a magnetic field gradient helps to avoid quantum chaos which turns out to disappear with an increase of the number of qubits. We give analytical estimates which explain this effect, together with numerical data supporting

  18. Avoiding sexual harassment liability in veterinary practices.

    Science.gov (United States)

    Lacroix, C A; Wilson, J F

    1996-05-15

    Harassment based on gender violates the rule of workplace equality established by Title VII of the Civil Rights Act and enforced by the EEOC. In 1986, the US Supreme Court, in Meritor Savings Bank v Vinson, established the criteria that must be met for a claim of hostile environment sexual harassment to be considered valid. Plaintiffs must show that they were subjected to conduct based on their gender, that it was unwelcome, and that it was severe and pervasive enough to alter their condition of employment, resulting in an abusive working environment. There have been few sexual harassment cases involving veterinary professionals, and it is our goal to help keep the number of filed actions to a minimum. The most effective way to avoid hostile environment sexual harassment claims is to confront the issue openly and to adopt a sexual harassment policy for the practice. When it comes to sexual harassment, an ounce of prevention is unquestionably worth a pound of cure.

  19. Collision Avoidance of Trains Using Arm7

    Directory of Open Access Journals (Sweden)

    Dr. K. R. R. Mohan Rao

    2015-11-01

    Full Text Available Railways are the popular mode of Transport in almost all major cities of the World. Railways are the most widely used and comfortable modes of transportation system. The major cause for railway accidents is collision of trains on the same track. The main aim of this anti collision system is to identify collision points and to report these error cases to main control room nearer to the station as well as grid control station. Majority of accidents occurred due to improper communication among the network between drivers and control room, due to wrong signaling, worst atmospheric condition, immediate change of route. The train driver doesn’t get proper information in time leading to hazardous situations. So this system by using zigbee protocol provides communication in between trains, which provide information or track id of one train to another train to avoid collision.

  20. Experiential Avoidance and Technological Addictions in Adolescents.

    Science.gov (United States)

    García-Oliva, Carlos; Piqueras, José A

    2016-06-01

    Background and aims This study focuses on the use of popular information and communication technologies (ICTs) by adolescents: the Internet, mobile phones, and video games. The relationship of ICT use and experiential avoidance (EA), a construct that has emerged as underlying and transdiagnostic to a wide variety of psychological problems, including behavioral addictions, is examined. EA refers to a self-regulatory strategy involving efforts to control or escape from negative stimuli such as thoughts, feelings, or sensations that generate strong distress. This strategy, which may be adaptive in the short term, is problematic if it becomes an inflexible pattern. Thus, the aim of this study was to explore whether EA patterns were associated with addictive or problematic use of ICT in adolescents. Methods A total of 317 students of the Spanish southeast between 12 and 18 years old were recruited to complete a questionnaire that included questions about general use of each ICTs, an experiential avoidance questionnaire, a brief inventory of the Big Five personality traits, and specific questionnaires on problematic use of the Internet, mobile phones, and video games. Results Correlation analysis and linear regression showed that EA largely explained results regarding the addictive use of the Internet, mobile phones, and video games, but not in the same way. As regards gender, boys showed a more problematic use of video games than girls. Concerning personality factors, conscientiousness was related to all addictive behaviors. Discussion and conclusions We conclude that EA is an important construct that should be considered in future models that attempt to explain addictive behaviors.

  1. On precision and accuracy (bias) statements for measurement procedures

    Energy Technology Data Exchange (ETDEWEB)

    Bruckner, L.A.; Hume, M.W.; Delvin, W.L.

    1988-01-01

    Measurement procedures are often required to contain precision and accuracy of precision and bias statements. This paper contains a glossary that explains various terms that often appear in these statements as well as an example illustrating such statements for a specific set of data. Precision and bias statements are shown to vary according to the conditions under which the data were collected. This paper emphasizes that the error model (an algebraic expression that describes how the various sources of variation affect the measurement) is an important consideration in the formation of precision and bias statements.

  2. Inferences are for doing: the impact of approach and avoidance states on the generation of spontaneous trait inferences.

    Science.gov (United States)

    Crawford, Matthew T; McCarthy, Randy J; Kjærstad, Hanne Lie; Skowronski, John J

    2013-03-01

    Spontaneous trait inferences (STIs) are ubiquitous and occur when perceivers spontaneously infer actor traits from actor behaviors. Previous research has elucidated the processes underlying STIs, but little work has focused on the functions of STIs. This article proposes that these unintentional early inferences serve a general approach or avoidance function. Two studies are reported in which external approach and avoidance motivations elicited via flexion-extension (Study 1) or physical warmth (Study 2) affect the encoding of trait-implying behavioral statements in a valence-matching manner. The results suggest that somatic states can act as cues that affect unintentional social information processing independently of the actual experience of the psychological states associated with those somatic states. Implications for a functional perspective on STIs are discussed.

  3. Pregnant Women Should Avoid Zika-Hit Texas Town: CDC

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_162573.html Pregnant Women Should Avoid Zika-Hit Texas Town: CDC ... 15, 2016 THURSDAY, Dec. 15, 2016 (HealthDay News) -- Pregnant women should avoid traveling to a south Texas ...

  4. US Forest Service Aerial Fire Retardant Hydrographic Avoidance Areas: Aquatic

    Data.gov (United States)

    US Forest Service, Department of Agriculture — A map services on the www depicting aerial retardant avoidance areas for hydrographic feature data. Aerial retardant avoidance area for hydrographic feature data are...

  5. Associations between confidentiality requirements, support seeking and burnout among university hospital physicians in Norway, Sweden, Iceland and Italy (the HOUPE study).

    Science.gov (United States)

    Løvseth, Lise Tevik; Fridner, Ann; Jónsdóttir, Lilja Sigrun; Marini, Massimo; Linaker, Olav Morten

    2013-12-01

    Concerns about protecting patient's privacy are experienced as a limitation in the opportunity to obtain and utilize social support by many physicians. As resources of social support can modify the process of burnout, patient confidentiality may increase risk of this syndrome by interfering with proper stress adaptation. This study investigates if experiencing limitations in seeking social support due to confidentiality concerns are associated with burnout. University hospital physicians in four European countries completed measures of burnout, (Index) of Confidentiality as a Barrier for Support (ICBS), and factors of social resources and job demands. Linear regression analysis showed that ICBS was significantly associated with the burnout dimension of Exhaustion and not with Disengagement. These findings were present when controlling for factors known to diminish or increase the likelihood of burnout. These results are the first to demonstrate that patient confidentiality is associated with burnout in the process of stress management among physicians.

  6. Disclosure avoidance techniques used in petroleum marketing data

    Energy Technology Data Exchange (ETDEWEB)

    Griffey, M.J.; Bournazian, J. (Energy Information Administration, Washington, DC (United States))

    1993-01-01

    With the creation of new survey forms and publications containing four-dimensional data, the Petroleum Marketing Division within the Energy Information Administration was faced with a difficult task to insure confidentiality of respondent data. PMD's solution applies a liner-programming technique to identify initially which cells disclose individual respondent-level data and reviews the suppression pattern by an automated program that is table independent and unrestricted by table size to add complementary suppression. The solution allows changes in the suppression formula and level of suppression, as well as additions and deletions from the publication without significant changes to the software. 3 refs., 7 figs., 1 tab.

  7. Saving Mothers' Lives: Reviewing maternal deaths to make motherhood safer: 2006-2008. The Eighth Report of the Confidential Enquiries into Maternal Deaths in the United Kingdom.

    LENUS (Irish Health Repository)

    Cantwell, Roch

    2011-03-01

    In the triennium 2006-2008, 261 women in the UK died directly or indirectly related to pregnancy. The overall maternal mortality rate was 11.39 per 100,000 maternities. Direct deaths decreased from 6.24 per 100,000 maternities in 2003-2005 to 4.67 per 100,000 maternities in 2006–2008 (p = 0.02). This decline is predominantly due to the reduction in deaths from thromboembolism and, to a lesser extent, haemorrhage. For the first time there has been a reduction in the inequalities gap, with a significant decrease in maternal mortality rates among those living in the most deprived areas and those in the lowest socio-economic group. Despite a decline in the overall UK maternal mortality rate, there has been an increase in deaths related to genital tract sepsis, particularly from community acquired Group A streptococcal disease. The mortality rate related to sepsis increased from 0.85 deaths per 100,000 maternities in 2003-2005 to 1.13 deaths in 2006-2008, and sepsis is now the most common cause of Direct maternal death. Cardiac disease is the most common cause of Indirect death; the Indirect maternal mortality rate has not changed significantly since 2003-2005. This Confidential Enquiry identified substandard care in 70% of Direct deaths and 55% of Indirect deaths. Many of the identified avoidable factors remain the same as those identified in previous Enquiries. Recommendations for improving care have been developed and are highlighted in this report. Implementing the Top ten recommendations should be prioritised in order to ensure the overall UK maternal mortality rate continues to decline.

  8. Performance of humans in concurrent avoidance/positive-reinforcement schedules

    OpenAIRE

    Ruddle, H. V.; Bradshaw, C M; Szabadi, E; Foster, T M

    1982-01-01

    Performance maintained under concurrent schedules consisting of a variable-interval avoidance component and a variable-interval positive-reinforcement component was studied in three human subjects using points exchangeable for money as the reinforcer. The rate of responding in the avoidance component increased, and the rate of responding in the positive-reinforcement component declined, as a function of the frequency of point-losses avoided in the avoidance component. The performance of all t...

  9. Neuroimaging the temporal dynamics of human avoidance to sustained threat.

    Science.gov (United States)

    Schlund, Michael W; Hudgins, Caleb D; Magee, Sandy; Dymond, Simon

    2013-11-15

    Many forms of human psychopathology are characterized by sustained negative emotional responses to threat and chronic behavioral avoidance, implicating avoidance as a potential transdiagnostic factor. Evidence from both nonhuman neurophysiological and human neuroimaging studies suggests a distributed frontal-limbic-striatal brain network supports avoidance. However, our understanding of the temporal dynamics of the network to sustained threat that prompts sustained avoidance is limited. To address this issue, 17 adults were given extensive training on a modified free-operant avoidance task in which button pressing avoided money loss during a sustained threat period. Subsequently, subjects underwent functional magnetic resonance imaging while completing the avoidance task. In our regions of interest, we observed phasic, rather than sustained, activation during sustained threat in dorsolateral and inferior frontal regions, anterior and dorsal cingulate, ventral striatum and regions associated with emotion, including the amygdala, insula, substantia nigra and bed nucleus of the stria terminalis complex. Moreover, trait levels of experiential avoidance were negatively correlated with insula, hippocampal and amygdala activation. These findings suggest knowledge that one can consistently avoid aversive outcomes is not associated with decreased threat-related responses and that individuals with greater experiential avoidance exhibit reduced reactivity to initial threat. Implications for understanding brain mechanisms supporting human avoidance and psychological theories of avoidance are discussed.

  10. Social anxiety predicts avoidance behaviour in virtual encounters

    NARCIS (Netherlands)

    Rinck, M.; Rörtgen, T.; Lange, W.G.; Dotsch, R.; Wigboldus, D.H.J.; Becker, E.S.

    2010-01-01

    Avoidant behaviour is critical in social anxiety and social phobia, being a major factor in the maintenance of anxiety. However, almost all previous studies of social avoidance were restricted to using self-reports for the study of intentional aspects of avoidance. In contrast, the current study use

  11. 14 CFR 121.356 - Collision avoidance system.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Collision avoidance system. 121.356 Section... Collision avoidance system. Effective January 1, 2005, any airplane you operate under this part must be equipped and operated according to the following table: Collision Avoidance Systems If you operate...

  12. Effects of optimism on creativity under approach and avoidance motivation

    NARCIS (Netherlands)

    Icekson, Tamar; Roskes, Marieke; Moran, Simone

    2014-01-01

    Focusing on avoiding failure or negative outcomes (avoidance motivation) can undermine creativity, due to cognitive (e.g., threat appraisals), affective (e.g., anxiety), and volitional processes (e.g., low intrinsic motivation). This can be problematic for people who are avoidance motivated by natur

  13. 14 CFR 129.18 - Collision avoidance system.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Collision avoidance system. 129.18 Section... § 129.18 Collision avoidance system. Effective January 1, 2005, any airplane you, as a foreign air... Avoidance Systems If you operate in the United States any . . . Then you must operate that airplane with:...

  14. 14 CFR 437.65 - Collision avoidance analysis.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Collision avoidance analysis. 437.65..., DEPARTMENT OF TRANSPORTATION LICENSING EXPERIMENTAL PERMITS Safety Requirements § 437.65 Collision avoidance... permittee must obtain a collision avoidance analysis from United States Strategic Command. (b) The...

  15. 14 CFR 417.231 - Collision avoidance analysis.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Collision avoidance analysis. 417.231..., DEPARTMENT OF TRANSPORTATION LICENSING LAUNCH SAFETY Flight Safety Analysis § 417.231 Collision avoidance analysis. (a) General. A flight safety analysis must include a collision avoidance analysis...

  16. 20 CFR 606.23 - Avoidance of tax credit reduction.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Avoidance of tax credit reduction. 606.23... Tax Credit Reduction § 606.23 Avoidance of tax credit reduction. (a) Applicability. Subsection (g) of... receipts and benefit outlays under the law in effect for the year for which avoidance is requested, as...

  17. Avoidance learning : a review of theoretical models and recent developments

    NARCIS (Netherlands)

    Krypotos, Angelos-Miltiadis; Effting, Marieke; Kindt, Merel; Beckers, Tom

    2015-01-01

    Avoidance is a key characteristic of adaptive and maladaptive fear. Here, we review past and contemporary theories of avoidance learning. Based on the theories, experimental findings and clinical observations reviewed, we distill key principles of how adaptive and maladaptive avoidance behavior is a

  18. 20 CFR 606.24 - Application for avoidance.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Application for avoidance. 606.24 Section 606... Credit Reduction § 606.24 Application for avoidance. (a) Application. (1) The Governor of the State shall... respect to which a State requests avoidance of tax credit reduction. The Governor is required to...

  19. 50 CFR 600.510 - Gear avoidance and disposal.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Gear avoidance and disposal. 600.510 Section 600.510 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND... Gear avoidance and disposal. (a) Vessel and gear avoidance. (1) FFV's arriving on fishing grounds...

  20. 78 FR 35262 - Detection and Avoidance of Counterfeit Electronic Parts

    Science.gov (United States)

    2013-06-12

    ... Defense Acquisition Regulations System Detection and Avoidance of Counterfeit Electronic Parts AGENCY... and the private sector regarding the electronic parts detection and avoidance coverage proposed to be... about the requirements for detection and avoidance of counterfeit electronic parts in DoD contracts....

  1. Effects of vasopressin on active and passive avoidance behavior

    NARCIS (Netherlands)

    Bohus, B.; Ader, R.; Wied, D. de

    1972-01-01

    Male rats were trained in an active avoidance and/or a “step-through” type of passive avoidance situation. Lysine vasopressin administration resulted in resistance to extinction of active avoidance behavior if it was injected 1 hr prior to the third and final acquisition session; peptide treatment 6

  2. 34 CFR 75.611 - Avoidance of flood hazards.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Avoidance of flood hazards. 75.611 Section 75.611... by a Grantee? Construction § 75.611 Avoidance of flood hazards. In planning the construction, a...) Evaluate flood hazards in connection with the construction; and (b) As far as practicable, avoid...

  3. 47 CFR 51.609 - Determination of avoided retail costs.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Determination of avoided retail costs. 51.609... (CONTINUED) INTERCONNECTION Resale § 51.609 Determination of avoided retail costs. (a) Except as provided in § 51.611, the amount of avoided retail costs shall be determined on the basis of a cost study...

  4. Geoengineering to Avoid Overshoot: An Analysis of Uncertainty

    Science.gov (United States)

    Tanaka, Katsumasa; Cho, Cheolhung; Krey, Volker; Patt, Anthony; Rafaj, Peter; Rao-Skirbekk, Shilpa; Wagner, Fabian

    2010-05-01

    assumptions are used in the GAINS model to generate pollutants emissions scenarios. Such scenarios are combined with a set of GGI low mitigation scenarios and prescribed to the climate and carbon cycle model ACC2. ACC2 is employed to quantify the warming due to air pollution abatement and the geoengineering profile to avoid such a warming. Furthermore, the implications of such geoengineering interventions (e.g. ecosystem impact and adaptation capacity) are examined. References AMS (Americal Meteorological Society) (2009) A Policy Statement on 20 July 2009. http://www.ametsoc.org/policy/2009geoengineeringclimate_amsstatement.pdf Andreae (2005) Nature, 435, 1187-1190, doi:10.1038/nature03671. Crutzen (2006) Climatic Change, 77, 211-219. Kloster et al. (2009) Climate Dynamics, 33, doi:10.1007/s00382-009-0573-0. Meinshausen et al. (2009) Nature, 458, 1158-1162, doi:10.1038/nature08017. Raddatz and Tanaka (2010) Prepared for a re-submission to Geophysical Research Letters. Rasch et al. (2008) Philosophical Transactions of The Royal Society A, 366, 4007-4037, doi:10.1098/rsta.2008.0131. Riahi et al. (2007) Technological Forecasting and Social Change, 74, 887-935, doi:10.1016/j.techfore.2006.05.026. Robock (2008) Bulletin of the Atomic Scientists, 64, 14-18, doi: 10.2968/064002006. Tanaka (2008) Ph.D. thesis. International Max Planck Research School on Earth System Modelling, Hamburg, Germany. http://www.sub.uni-hamburg.de/opus/volltexte/2008/3654/ Tanaka et al. (2009) Geophysical Research Letters, 36, L16709, doi:10.1029/2009GL039642. Wigley (2008) Science, 314, 452-454, doi:10.1126/science.1131728.

  5. Saving Mothers' Lives: the continuing benefits for maternal health from the United Kingdom (UK) Confidential Enquires into Maternal Deaths.

    Science.gov (United States)

    Lewis, Gwyneth

    2012-02-01

    The actions that have followed the recommendations of successive publications of the UK Confidential Enquiries into Maternal Deaths have helped save mothers' lives and reduced ill health and morbidity. Through the implementation of their recommendations, they have helped improve access to, and the quality of, the maternity care provided for all pregnant women in the United Kingdom. The enquires help review, assess, and identify the underlying remediable factors that contributed to mothers' deaths and aggregate the lessons learned to make recommendations to develop services that help overcome many of the barriers to safe, high-quality maternity care, which vulnerable women continue to face. This chapter provides a short summary of the positive contributions the successive reports on Confidential Enquiries into Maternal Deaths, "Saving Mothers' Lives," have made to maternal health outcomes in the United Kingdom for more than half a century. It also demonstrates why such systems continue to be beneficial around the world, including countries with very low maternal mortality rates.

  6. Action Knowledge in Intellectual Capital Statements

    DEFF Research Database (Denmark)

    Ravn, Ib

    2004-01-01

    Within the field of intellectual capital and knowledge management, the concept of knowledge is burdened by the naïve view of knowledge as passive representations of external reality. An alternative definition is proposed. ''Action knowledge'' is the categories and distinctions that guide human...... activity in appropriate ways. In the organisation, this definition highlights the intelligent actions taken by organisational members in pursuit of their goals. The paper offers a design for an intellectual capital statement that emphasises action knowledge in the organisation. A case is presented......: the intellectual capital statement of the Danish consulting firm, Nellemann Konsulenterne A/S. It shows a major concern with knowledge sharing and learning activities that bring out the dynamic nature of knowledge, as opposed to the ''amount'' of knowledge stored in databases and intranets...

  7. Approach and avoidance motivation in eating disorders.

    Science.gov (United States)

    Harrison, Amy; Treasure, Janet; Smillie, Luke D

    2011-08-15

    It has been proposed that approach and avoidance processes may be critically involved in the development and maintenance of eating disorders (EDs), including anorexia nervosa (AN) and bulimia nervosa (BN). The Behavioural Inhibition System and Behavioural Activation System Scales (BIS/BAS) and Appetitive Motivation Scale (AMS) questionnaires were administered to 286 participants: 91 healthy controls (HCs), 121 participants with a current ED, either AN (restrictive and binge purge subtypes), or BN and 74 participants recovered from an ED. Individuals with EDs had higher levels of sensitivity to punishment and lower levels of reward reactivity than controls. Individuals in recovery from an ED scored the same as those in the acute group, with the exception of BAS fun seeking, for which they scored significantly higher than those with restricting AN. Discriminant analysis revealed that HCs were maximally separated from those in the acute and recovered ED groups along a dimension reflecting high punishment sensitivity and low reward sensitivity. Classification analysis demonstrated that ED and HC group membership was predicted from reward and punishment sensitivity measures; however recovered participants tended to be misclassified as ED. This study suggests high punishment sensitivity and low reward reactivity/sensitivity might form a personality cluster associated with the risk of developing an ED.

  8. Management of Sigmoid Volvulus Avoiding Sigmoid Resection

    Science.gov (United States)

    Katsikogiannis, Nikolaos; Machairiotis, Nikolaos; Zarogoulidis, Paul; Sarika, Eirini; Stylianaki, Aikaterini; Zisoglou, Maria; Zervas, Vasilis; Bareka, Metaxia; Christofis, Christos; Iordanidis, Alkis

    2012-01-01

    Acute sigmoid volvulus is typically caused by an excessively mobile and redundant segment of colon with a stretched mesenteric pedicle. When this segment twists on its pedicle, the result can be obstruction, ischemia and perforation. A healthy, 18-year-old Caucasian woman presented to the emergency department complaining of cramping abdominal pain, distention, constipation and obstipation for the last 72 h, accompanied by nausea, vomiting and abdominal tenderness. The patient had tympanitic percussion tones and no bowel sounds. She was diagnosed with acute sigmoid volvulus. Although urgent resective surgery seems to be the appropriate treatment for those who present with acute abdominal pain, intestinal perforation or ischemic necrosis of the intestinal mucosa, the first therapeutic choice for clinically stable patients in good general condition is considered, by many institutions, to be endoscopic decompression. Controversy exists on the decision of the time, the type of definitive treatment, the strategy and the most appropriate surgical technique, especially for teenagers for whom sigmoid resection can be avoided. PMID:22754489

  9. Management of Sigmoid Volvulus Avoiding Sigmoid Resection

    Directory of Open Access Journals (Sweden)

    Nikolaos Katsikogiannis

    2012-05-01

    Full Text Available Acute sigmoid volvulus is typically caused by an excessively mobile and redundant segment of colon with a stretched mesenteric pedicle. When this segment twists on its pedicle, the result can be obstruction, ischemia and perforation. A healthy, 18-year-old Caucasian woman presented to the emergency department complaining of cramping abdominal pain, distention, constipation and obstipation for the last 72 h, accompanied by nausea, vomiting and abdominal tenderness. The patient had tympanitic percussion tones and no bowel sounds. She was diagnosed with acute sigmoid volvulus. Although urgent resective surgery seems to be the appropriate treatment for those who present with acute abdominal pain, intestinal perforation or ischemic necrosis of the intestinal mucosa, the first therapeutic choice for clinically stable patients in good general condition is considered, by many institutions, to be endoscopic decompression. Controversy exists on the decision of the time, the type of definitive treatment, the strategy and the most appropriate surgical technique, especially for teenagers for whom sigmoid resection can be avoided.

  10. Can low metallicity binaries avoid merging?

    CERN Document Server

    de Mink, S E; Pols, O R

    2007-01-01

    Rapid mass transfer in a binary system can drive the accreting star out of thermal equilibrium, causing it to expand. This can lead to a contact system, strong mass loss from the system and possibly merging of the two stars. In low metallicity stars the timescale for heat transport is shorter due to the lower opacity. The accreting star can therefore restore thermal equilibrium more quickly and possibly avoid contact. We investigate the effect of accretion onto main sequence stars with radiative envelopes with different metallicities. We find that a low metallicity (Z<0.001), 4 solar mass star can endure a 10 to 30 times higher accretion rate before it reaches a certain radius than a star at solar metallicity. This could imply that up to two times fewer systems come into contact during rapid mass transfer when we compare low metallicity. This factor is uncertain due to the unknown distribution of binary parameters and the dependence of the mass transfer timescale on metallicity. In a forthcoming paper we w...

  11. The amygdala: securing pleasure and avoiding pain

    Science.gov (United States)

    Fernando, Anushka B. P.; Murray, Jennifer E.; Milton, Amy L.

    2013-01-01

    The amygdala has traditionally been associated with fear, mediating the impact of negative emotions on memory. However, this view does not fully encapsulate the function of the amygdala, nor the impact that processing in this structure has on the motivational limbic corticostriatal circuitry of which it is an important structure. Here we discuss the interactions between different amygdala nuclei with cortical and striatal regions involved in motivation; interconnections and parallel circuitries that have become increasingly understood in recent years. We review the evidence that the amygdala stores memories that allow initially motivationally neutral stimuli to become associated through pavlovian conditioning with motivationally relevant outcomes which, importantly, can be either appetitive (e.g. food) or aversive (e.g. electric shock). We also consider how different psychological processes supported by the amygdala such as conditioned reinforcement and punishment, conditioned motivation and suppression, and conditioned approach and avoidance behavior, are not only psychologically but also neurobiologically dissociable, being mediated by distinct yet overlapping neural circuits within the limbic corticostriatal circuitry. Clearly the role of the amygdala goes beyond encoding aversive stimuli to also encode the appetitive, requiring an appreciation of the amygdala's mediation of both appetitive and fearful behavior through diverse psychological processes. PMID:24367307

  12. The amygdala: securing pleasure and avoiding pain

    Directory of Open Access Journals (Sweden)

    Anushka B P Fernando

    2013-12-01

    Full Text Available The amygdala has traditionally been associated with fear, mediating the impact of negative emotions on memory. However, this view does not fully encapsulate the function of the amygdala, nor the impact that processing in this structure has on the motivational limbic corticostriatal circuitry of which it is an important structure. Here we discuss the interactions between different amygdala nuclei with cortical and striatal regions involved in motivation; interconnections and parallel circuitries that have become increasingly understood in recent years. We review the evidence that the amygdala stores memories that allow initially motivationally neutral stimuli to become associated through pavlovian conditioning with motivationally relevant outcomes which, importantly, can be either appetitive (e.g. food or aversive (e.g. electric shock. We also consider how different psychological processes supported by the amygdala such as conditioned reinforcement and punishment, conditioned motivation and suppression, and conditioned approach and avoidance behavior, are not only psychologically but also neurobiologically dissociable, being mediated by distinct yet overlapping neural circuits within the limbic corticostriatal circuitry. Clearly the role of the amygdala goes beyond encoding aversive stimuli to also encode the appetitive, requiring an appreciation of the amygdala’s mediation of both appetitive and fearful behavior through diverse psychological processes.

  13. Aerial vehicles collision avoidance using monocular vision

    Science.gov (United States)

    Balashov, Oleg; Muraviev, Vadim; Strotov, Valery

    2016-10-01

    In this paper image-based collision avoidance algorithm that provides detection of nearby aircraft and distance estimation is presented. The approach requires a vision system with a single moving camera and additional information about carrier's speed and orientation from onboard sensors. The main idea is to create a multi-step approach based on a preliminary detection, regions of interest (ROI) selection, contour segmentation, object matching and localization. The proposed algorithm is able to detect small targets but unlike many other approaches is designed to work with large-scale objects as well. To localize aerial vehicle position the system of equations relating object coordinates in space and observed image is solved. The system solution gives the current position and speed of the detected object in space. Using this information distance and time to collision can be estimated. Experimental research on real video sequences and modeled data is performed. Video database contained different types of aerial vehicles: aircrafts, helicopters, and UAVs. The presented algorithm is able to detect aerial vehicles from several kilometers under regular daylight conditions.

  14. Hanford science and technology needs statements document

    Energy Technology Data Exchange (ETDEWEB)

    Piper, L.L.

    1997-12-31

    This document is a compilation of the Hanford science and technology needs statements for FY 1998. The needs were developed by the Hanford Site Technology Coordination Group (STCG) with full participation and endorsement of site user organizations, stakeholders, and regulators. The purpose of this document is to: (a) provide a comprehensive listing of Hanford science and technology needs, and (b) identify partnering and commercialization opportunities with industry, other federal and state agencies, and the academic community. The Hanford STCG reviews and updates the needs annually. Once completed, the needs are communicated to DOE for use in the development and prioritization of their science and technology programs, including the Focus Areas, Cross-Cutting Programs, and the Environmental Management Science Program. The needs are also transmitted to DOE through the Accelerating Cleanup: 2006 Plan. The public may access the need statements on the Internet on: the Hanford Home Page (www.hanford.gov), the Pacific Rim Enterprise Center`s web site (www2.pacific-rim.org/pacific rim), or the STCG web site at DOE headquarters (em-52.em.doegov/ifd/stcg/stcg.htm). This page includes links to science and technology needs for many DOE sites. Private industry is encouraged to review the need statements and contact the Hanford STCG if they can provide technologies that meet these needs. On-site points of contact are included at the ends of each need statement. The Pacific Rim Enterprise Center (206-224-9934) can also provide assistance to businesses interested in marketing technologies to the DOE.

  15. Perambulator: An Artist’s Statement

    Directory of Open Access Journals (Sweden)

    Clare Qualmann

    2016-12-01

    Full Text Available This artist’s statement describes the development of a participatory performance project ‘Perambulator’. Conceived in response to the shift in walking practice experienced in early motherhood, the project invited other pram users (predominantly mothers to walk together exploring and highlighting the everyday awkwardness of pram use in the city. Alongside an overview of the projects’ methods: walking, talking and mapping, connections to walking art and participatory art practices are considered.

  16. The 7 Aarhus Statements on Climate Change

    Science.gov (United States)

    Margrethe Basse, Ellen; Svenning, Jens-Christian; Olesen, Jørgen E.; Besenbacher, Flemming; Læssøe, Jeppe; Seidenkrantz, Marit-Solveig; Lange, Lene

    2009-03-01

    More than 1000 prominent representatives from science, industry, politics and NGOs were gathered in Aarhus on 5-7 March 2009 for the international climate conference 'Beyond Kyoto: Addressing the Challenges of Climate Change'. Thematically, Beyond Kyoto was divided into seven areas of particular interest for understanding the effects of the projected future climate change and how the foreseen negative impacts can be counteracted by mitigation and adaptation measures. The themes were: Climate policy: the role of law and economics; Biodiversity and ecosystems; Agriculture and climate change; Nanotechnology solutions for a sustainable future; Citizens and society, and The Arctic. The main responsible scientists for the seven conference themes and representatives from the think-tank CONCITO delivered 'The 7 Aarhus Statements on Climate Change' as part of the closing session of the conference. The statements were also communicated to the Danish Government as well as to the press. This article is the product of the collective subsequent work of the seven theme responsibles and is a presentation of each theme statement in detail, emphasizing the current state of knowledge and how it may be used to minimize the expected negative impacts of future climate change.

  17. Avoidance learning, Pavlovian conditioning, and the development of phobias.

    Science.gov (United States)

    Siddle, D A; Bond, N W

    1988-10-01

    This paper examines the role of Pavlovian conditioning in the acquisition, maintenance and elimination of human phobias. Because many conceptualizations of human fears and phobias are based on data from studies of avoidance learning in animals, we first review theories of avoidance. Our conclusion is that none of the extant theories provides an adequate account of avoidance learning, and we propose a model of avoidance that involves Pavlovian, but not instrumental learning. We then analyse critically arguments that Pavlovian conditioning plays only a small role in the aetiology of fears. Finally, the paper examines the implications of a conditioning model of avoidance for the study of human fears and phobias.

  18. Velocity of chloroplast avoidance movement is fluence rate dependent.

    Science.gov (United States)

    Kagawa, Takatoshi; Wada, Masamitsu

    2004-06-01

    In Arabidopsis leaves, chloroplast movement is fluence rate dependent. At optimal, lower light fluences, chloroplasts accumulate at the cell surface to maximize photosynthetic potential. Under high fluence rates, chloroplasts avoid incident light to escape photodamage. In this paper, we examine the phenomenon of chloroplast avoidance movement in greater detail and demonstrate a proportional relationship between fluence rate and the velocity of chloroplast avoidance. In addition we show that the amount of light-activated phototropin2, the photoreceptor for the avoidance response, likely plays a role in this phenomenon, as heterozygous mutant plants show a reduced avoidance velocity compared to that of homozygous wild type plants.

  19. Education and smoking: were Vietnam war draft avoiders also more likely to avoid smoking?

    Science.gov (United States)

    Grimard, Franque; Parent, Daniel

    2007-09-01

    We use the Vietnam war draft avoidance behavior documented by Card and Lemieux [Card, D., Lemieux, T., May 2001. Did draft avoidance raise college attendance during the Vietnam war? American Economic Review 91 (2), 97-102] as a quasi experiment to infer causation from education to smoking and find strong evidence that education, whether measured in years of completed schooling or in educational attainment categories, reduces the probability of smoking at the time of the interview, more particularly the probability of smoking regularly. However, while we find that more education substantially increases the probability of never smoking, our instrumental procedure yields imprecise estimates of the effect of education on smoking cessation. Potential mechanisms linking education and smoking are also explored.

  20. Regulating the communication of genetic risk information: the Italian legal approach to questions of confidentiality and disclosure.

    Science.gov (United States)

    Battistuzzi, L; Ciliberti, R; Forzano, F; De Stefano, F

    2012-09-01

    Communication of genetic risk is a complex process in which the rights of the individual and those of relatives may conflict with regard to the information revealed by DNA testing. If patients who participate in clinical genetic testing refuse to share their genetic information with at-risk relatives, healthcare professionals need to reach a proper ethical balance between the right of individual patients regarding the confidentiality of their genetic test result and the right of families to be informed about their genetic risk. Rules and legislation in most countries generally protect the confidentiality of medical information but allow limited disclosure of genetic test results without the patient's consent in specific cases when certain conditions are met. The aim of this article is to draw attention to how Italian policymakers have attempted to balance protection of autonomy and confidentiality, and protection of health by means of a hybrid instrument. Furthermore, we show that some of the requirements of that instrument depart from the most widely recognized standards for non-consensual disclosure of genetic risk information, while at the same time allowing an unusually high level of discretion to healthcare professionals involved in genetic counseling and testing.