WorldWideScience

Sample records for medical identity theft

  1. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  2. Preventing and responding to medical identity theft.

    Science.gov (United States)

    Amori, Geraldine

    2008-01-01

    Medical identity theft is a crime with two victims: patients and providers. It is easy to commit and lucrative because healthcare record keeping and business interactions are complex and mainly electronic. Patients whose identity has been stolen are vulnerable to both medical error and financial loss. Providers may suffer both reputation loss and financial loss. There are steps to help prevent and to respond appropriately to medical identity theft.

  3. Medical identity theft: an emerging problem for informatics.

    Science.gov (United States)

    Gillette, William; Patrick, Timothy B

    2007-10-11

    This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.

  4. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  5. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  6. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  7. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  8. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  9. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  10. Preventing Identity Theft

    OpenAIRE

    Jensen, Christine

    2004-01-01

    Identity theft is becoming more common and is a very serious crime. Victims of identity theft can spend months or years and a lot of hard earned money cleaning up the mess thieves have made of their good name and credit record. Identity thieves can use your personal information to take over your credit accounts and open new ones. They may even use your good credit to get a job, take out a car loan, or rent an apartment. Identity theft victims may lose job opportunities, be refused loans for e...

  11. Credit and identity theft

    OpenAIRE

    Charles M. Kahn; Roberds, William

    2005-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand and the need to control tr...

  12. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  13. IDENTITY THEFT COMMITTED THROUGH INTERNET

    OpenAIRE

    Adrian Cristian MOISE

    2015-01-01

    In this study, starting with the presentation of some aspects regarding management of identity in cyberspace, it is carried out the analysis of the offence of identity theft committed through Internet. The term “identity theft” describes the criminal acts through which the offender obtains and uses in a fraudulent manner the identity of other person. These criminal acts may be carried out through the use of information and communication technology, too. The cases of identity theft committed t...

  14. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  15. Identity theft prevention in the healthcare setting.

    Science.gov (United States)

    Warren, Bryan

    2005-01-01

    How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated.

  16. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  17. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  18. Identity theft: a pernicious and costly fraud

    OpenAIRE

    Julia S. Cheney

    2003-01-01

    On October 3, 2003, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop on identity theft to examine its growing impact on participants in our payments system. Avivah Litan, vice president and research director of financial services for Gartner Inc., led the workshop. The discussion began and this paper follows with a broad study of identity theft, at times compared with traditional payment fraud, and continues with an evaluation of its overall risk to co...

  19. Identity Theft: A Study in Contact Centres

    Science.gov (United States)

    Moir, Iain; Weir, George R. S.

    This paper explores the recent phenomenon of identity theft. In particular, it examines the contact centre environment as a mechanism for this to occur. Through a survey that was conducted amongst forty-five contact centre workers in the Glasgow area we determined that contact centres can and do provide a mechanism for identity theft. Specifically, we found a particularly high incidence of agents who had previously dealt with phone calls that they considered suspicious. Furthermore, there are agents within such environments who have previously been offered money in exchange for customers' details, or who know of fellow workers who received such offers. Lastly, we identify specific practices within contact centres that may contribute to the likelihood of identity theft.

  20. 77 FR 13449 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2012-03-06

    ... Commission 17 CFR Part 248 Identity Theft Red Flags Rules; Proposed Rule #0;#0;Federal Register / Vol. 77... Part 162 RIN 3038-AD14 SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 248 RIN 3235-AL26 Identity Theft... that are subject to the Commissions' jurisdiction to address identity theft in two ways. First,...

  1. Avoiding Medical Identity Theft

    Science.gov (United States)

    ... and money. And it saved my life! A woman's Facebook PHR saved her life In The Blogs Get To Know Your Healthcare Team Caregiving at an Early Age Your Rights Regarding Your Personal Health Information Start a PHR ...

  2. Identity theft in community mental health patients: two case reports.

    Science.gov (United States)

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason; Everett, Anita

    2007-05-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented.

  3. College Students, Internet Use, and Protection from Online Identity Theft

    Science.gov (United States)

    Norum, Pamela S.; Weagley, Robert O.

    2007-01-01

    The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…

  4. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  5. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  6. Exploring the psychological and somatic impact of identity theft.

    Science.gov (United States)

    Sharp, Tracy; Shreve-Neiger, Andrea; Fremouw, William; Kane, John; Hutton, Shawn

    2004-01-01

    Identity theft is a new and growing form of white-collar crime. This exploratory study examined the psychological and somatic impact of identity theft and coping methods utilized by victims. Thirty-seven victims of identity theft participated in regional victim focus groups. Participants completed a victim impact questionnaire designed by the authors and the Brief Symptom Inventory-18 (BSI-18). The majority of participants expressed an increase in maladaptive psychological and somatic symptoms post victimization. Results on the BSI indicated that identity theft victims with unresolved cases, in contrast to those with resolved cases, were more likely to have clinically elevated scores when compared with a normative sample. Relatively similar coping mechanisms were utilized across victims. The results from this study suggest that victims of identity theft do have increased psychological and physical distress, and for those whose cases remain unresolved, distress is maintained over time.

  7. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2017-01-10

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  8. Identity theft: where do we go from here?

    OpenAIRE

    Julia S. Cheney

    2004-01-01

    The identity theft forum sponsored by the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Gartner Fellows Program brought together a broad range of stakeholders to discuss the important issue of identity theft. Participants from the financial services and merchant industries, Internet service and technology providers, and regulatory and law enforcement agencies examined issues faced by consumers, merchants, and banks in fighting this financial crime. Discussants share...

  9. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  10. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to...

  11. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions...

  12. 75 FR 67453 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Science.gov (United States)

    2010-11-02

    ... Office of Thrift Supervision Identity Theft Red Flags and Address Discrepancies Under the Fair and...: Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of... issue jointly guidelines for financial institutions and creditors regarding identity theft with...

  13. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a)...

  14. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution...

  15. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  16. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  17. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  18. Preventing leaf identity theft with hormones.

    Science.gov (United States)

    Lumba, Shelley; McCourt, Peter

    2005-10-01

    Genetic analysis of plant development has begun to demonstrate the importance of hormone synthesis and transport in regulating morphogenesis. In the case of leaf development, for example, auxin pooling determines where a primordium will emerge and leads to the activation of transcription factors, which determine leaf identities by modulating abscisic acid (ABA) and gibberellic acid (GA) concentrations. Signal transduction studies suggest that negative regulation of transcription factors through protein turnover is commonly used as a mechanism of hormone action. Together, these findings suggest that auxin might degrade a repressor that allows the activation of genes that modulate ABA/GA ratios in emerging leaves. With our increased understanding of the molecular basis of hormone signaling, it is becoming possible to overlay important regulators onto signaling modules that determine morphological outputs.

  19. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  20. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    Directory of Open Access Journals (Sweden)

    Ahmad A. Al-Daraiseh

    2014-12-01

    Full Text Available Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s are making it worse. Facebook (FB, Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ways to use stolen information, examples and other aspects. A study on the local community was also conducted. In the survey, the participants were asked about privacy on SN’s, SN’s privacy policies, and whether they think that SN’s benefits outweigh their risks. A social experiment was also conducted on FB and Twitter to show how fragile the systems are and how easy it is to gain access to private profiles. Results from the survey are scary: 43% of all the accounts are public, 76% of participants do not read the policies, and almost 60% believe that the benefits of SN’s outweigh their risks. Not too far from this, the results of the experiment show that it is extremely easy to obtain information from private accounts on FB and Twitter.

  1. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E... FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights..., provided that the translation is accurate and that it is provided in a language used by the...

  2. Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making

    Science.gov (United States)

    Jefson, Cristy A.

    2007-01-01

    Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…

  3. Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain

    Science.gov (United States)

    Tallón, María Luisa García

    Financial fraud usually goes hand in hand with the complex problem of identity theft in financial transactions. The experience gained in the Complaints Department through the presented cases and queries includes: Traditional falsifications in traditional financial transactions.

  4. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  5. THE ROLE OF THE FORENSIC ACCOUNTANT IN A MEDICARE FRAUD IDENTITY THEFT CASE

    OpenAIRE

    Maria Sanchez

    2012-01-01

    Identity theft is a rampant problem in the United States. It occurs when one’s personal information is stolen for the purpose of impersonating that person, making unauthorized purchases, taking money from bank accounts, opening new lines of credit with the stolen information, or using that information for other financial gain. According to a recent survey by the Javelin Strategy and Research Center, at least one in ten people have been the victim of identity theft. Forensic accountants and ...

  6. Corporate Role in Protecting Consumers from the Risk of Identity Theft

    Directory of Open Access Journals (Sweden)

    Syed (Shawon M. Rahman

    2013-09-01

    Full Text Available The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the past ten years due to lack of transatlantic international corporation between participating countries,coherent information security policies, data aggregation and sound international laws to facilitate prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime elements taking advantage of the Internet as a medium of operations. This paper presents conclusive solution that users, organizations and consumerscan enact to protect themselves from the threat of cyberattacks culminating into identity theft, financial loss or both.

  7. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  8. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  9. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION....g., electronics equipment or jewelry); or b. The customer fails to make the first payment or...

  10. 77 FR 72712 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Science.gov (United States)

    2012-12-06

    ... identify, detect, and respond to possible risks of identity theft relevant to them. \\1\\ 72 FR 63718 (Nov. 9..., mortgage brokers, automobile dealers, utility companies, telecommunications companies, and any other person... requirements of the Red Flags Rule. \\10\\ The Clarification Act does not create any industry-wide exemptions...

  11. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Duties regarding the detection, prevention, and... regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a... Appendix J, the following definitions apply: (1) Account means a continuing relationship established by a...

  12. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Pt. 334, App. J Appendix J to Part 334—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 334.90...

  13. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and.... Examples of Red Flags from each of these categories are appended as Supplement A to this appendix J....

  14. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  15. Identity theft: when bad things happen to your patients' and employees' good name.

    Science.gov (United States)

    Costello, J

    2001-01-01

    What should healthcare facility security directors and administrators do when patients or employees are the victims of identity theft? Taking the right steps to safeguard personal data won't insulate your facility from ever having to deal with this growing crime but, says the author, it will reduce the opportunity and desire for a criminal to steal the data.

  16. The Cultural Phenomenon of Identity Theft and the Domestication of the World Wide Web

    Science.gov (United States)

    Caeton, Daniel A.

    2007-01-01

    Through a critique of the rhetorical configurations of identity theft, this article contributes to the emerging body of theory contending with the social effects of digital information technologies (DIT). It demonstrates how the politics of fear manipulate technosocial matrices in order to derive consent for radical changes such as the…

  17. The Impact of Identity Theft on Perceived Security and Trusting E - Commerce

    Directory of Open Access Journals (Sweden)

    ZAKARIA SALEH

    2013-08-01

    Full Text Available The research into consumer choices and acceptance of new products and services is normally discussed within the framework of diffusion of innovations and has traditionally relied on identifying consumer characteristics while focusing on the characteristics of innovations. The purpose of this study is to examine the impact of Identity theft on the perceived level of security mad trusting E-Commerce.

  18. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  19. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  20. Fighting identity theft with advances in fingerprint recognition

    CSIR Research Space (South Africa)

    Mathekga, D

    2015-10-01

    Full Text Available The ease with which the green South African ID book could be forged has led to many instances of identity fraud, costing retail businesses millions in lost revenue on fraudulently created credit accounts. This has led the government, through...

  1. The Thief With a Thousand Faces and the Victim With None: Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory.

    Science.gov (United States)

    Reyns, Bradford W; Henson, Billy

    2016-08-01

    Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims' online routine activities and their online identity theft victimization. It was found that certain routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed.

  2. “I Just Bought a Flat Screen T.V. in Kolkata?” Application of Laws for International Outsourcing Related Identity Theft

    Directory of Open Access Journals (Sweden)

    Samantha Grant

    2007-04-01

    Full Text Available Because the internet makes it economical to do so, many American companies have sent their customer service jobs overseas. Workers in these outsourced jobs often have access to personal financial information of American citizens. Recent identity thefts, both in America and abroad, highlight the need for laws mandating tighter security by the companies that hold and trade personal information. This paper explores American legislation attempting to deal with identity theft crime as well as parallel laws in India, where many of the outsourced jobs are located. Furthermore, this paper suggests that any federal legislation ought not to preempt state law, as California law is currently protecting consumer privacy stronger than proposed legislation would.

  3. Major Software Vendor Puts Students on Many Campuses at Risk of Identity Theft

    Science.gov (United States)

    Foster, Andrea

    2008-01-01

    At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…

  4. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  5. The medical leadership challenge in healthcare is an identity challenge.

    Science.gov (United States)

    Andersson, Thomas

    2015-01-01

    The purpose of this article is to describe and analyse the identity challenges that physicians with medical leadership positions face. Four qualitative case studies were performed to address the fact that identity is processual, relational and situational. Physicians with managerial roles were interviewed, as well as their peers, supervisors and subordinates. Furthermore, observations were made to understand how different identities are displayed in action. This study illustrates that medical leadership implies identity struggles when physicians have manager positions, because of the different characteristics of the social identities of managers and physicians. Major differences are related between physicians as autonomous individuals in a system and managers as subordinates to the organizational system. There are psychological mechanisms that evoke the physician identity more often than the managerial identity among physicians who are managers, which explains why physicians who are managers tend to remain foremost physicians. The implications of the findings, that there are major identity challenges by being both a physician and manager, suggest that managerial physicians might not be the best prerequisite for medical leadership, but instead, cooperative relationships between physicians and non-physician managers might be a less difficult way to support medical leadership. Acknowledging and addressing identity challenges can be important both in creating structures in organizations and designing the training for managers in healthcare (both physicians and non-physicians) to support medical leadership. Medical leadership is most often related to organizational structure and/or leadership skills, but this paper discusses identity requirements and challenges related to medical leadership.

  6. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  7. Unmasking identity dissonance: exploring medical students' professional identity formation through mask making.

    Science.gov (United States)

    Joseph, Kimera; Bader, Karlen; Wilson, Sara; Walker, Melissa; Stephens, Mark; Varpio, Lara

    2017-04-01

    Professional identity formation is an on-going, integrative process underlying trainees' experiences of medical education. Since each medical student's professional identity formation process is an individual, internal, and often times emotionally charged unconscious experience, it can be difficult for educators to understand each student's unique experience. We investigate if mask making can provide learners and educators the opportunity to explore medical students' professional identity formation experiences. In 2014 and 2015, 30 third year medical students created masks, with a brief accompanying written narrative, to creatively express their medical education experiences. Using a paradigmatic case selection approach, four masks were analyzed using techniques from visual rhetoric and the Listening Guide. The research team clearly detected identity dissonance in each case. Each case provided insights into the unique personal experiences of the dissonance process for each trainee at a particular point in their medical school training. We propose that mask making accompanied by a brief narrative reflection can help educators identify students experiencing identity dissonance, and explore each student's unique experience of that dissonance. The process of making these artistic expressions may also provide a form of intervention that can enable educators to help students navigate professional identity formation and identity dissonance experiences.

  8. Group processes in medical education: learning from social identity theory.

    Science.gov (United States)

    Burford, Bryan

    2012-02-01

    The clinical workplace in which doctors learn involves many social groups, including representatives of different professions, clinical specialties and workplace teams. This paper suggests that medical education research does not currently take full account of the effects of group membership, and describes a theoretical approach from social psychology, the social identity approach, which allows those effects to be explored. The social identity approach has a long history in social psychology and provides an integrated account of group processes, from the adoption of group identity through a process of self-categorisation, to the biases and conflicts between groups. This paper outlines key elements of this theoretical approach and illustrates their relevance to medical education. The relevance of the social identity approach is illustrated with reference to a number of areas of medical education. The paper shows how research questions in medical education may be usefully reframed in terms of social identity in ways that allow a deeper exploration of the psychological processes involved. Professional identity and professionalism may be viewed in terms of self-categorisation rather than simply attainment; the salience of different identities may be considered as influences on teamwork and interprofessional learning, and issues in communication and assessment may be considered in terms of intergroup biases. Social identity theory provides a powerful framework with which to consider many areas of medical education. It allows disparate influences on, and consequences of, group membership to be considered as part of an integrated system, and allows assumptions, such as about the nature of professional identity and interprofessional tensions, to be made explicit in the design of research studies. This power to question assumptions and develop deeper and more meaningful research questions may be increasingly relevant as the nature and role of the medical profession change

  9. Identity Security Awareness

    OpenAIRE

    Philipsen, Nayna C.

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  10. Medical students' professional identity development in an early nursing attachment.

    NARCIS (Netherlands)

    Helmich, E.; Derksen, E.; Prevoo, M.; Laan, R.F.J.M.; Bolhuis, S.; Koopmans, R.T.C.M.

    2010-01-01

    OBJECTIVES: The importance of early clinical experience for medical training is well documented. However, to our knowledge there are no studies that assess the influence of very early nursing attachments on the professional development and identity construction of medical students. Working as an ass

  11. Detecting and detering employee theft.

    Science.gov (United States)

    Stewart, E E

    1997-02-01

    Physician group practices can limit their vulnerability to employee theft by taking steps to detect theft when it occurs and to deter future occurrences. Steps for detecting theft include being wary of an employee's refusal to take earned time off, conducting periodic credit checks on employees, rotating employees' duties, and conducting impromptu reviews of the practice's finances. Steps for detering theft include routing the practice's checks to a lock box; reviewing cash reports; reconciling check with deposit statements; separating employees' duties; reviewing bank, credit card, and ATM statements; setting the tone for prudent financial management; and reporting cases of theft when they occur.

  12. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  13. Consolidation: Thwarting Nuclear Theft

    OpenAIRE

    Bunn, Matthew G.; Harrell, Eben

    2013-01-01

    At the first nuclear security summit in April 2010, the assembled leaders agreed on the goal of securing all vulnerable nuclear material worldwide within four years, including consolidating plutonium and highly enriched uranium (HEU) to fewer locations and minimizing the use of HEU “where technically and economically feasible.†Reducing the number of buildings and sites where nuclear weapons and weapons-usable nuclear material exist is a key element of preventing nuclear theft and nuclear ...

  14. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety Administration (NHTSA) Department of..., Nissan provided a detailed description and diagram of the identity, design and location of the...

  15. A schematic representation of the professional identity formation and socialization of medical students and residents: a guide for medical educators.

    Science.gov (United States)

    Cruess, Richard L; Cruess, Sylvia R; Boudreau, J Donald; Snell, Linda; Steinert, Yvonne

    2015-06-01

    Recent calls to focus on identity formation in medicine propose that educators establish as a goal of medical education the support and guidance of students and residents as they develop their professional identity. Those entering medical school arrive with a personal identity formed since birth. As they proceed through the educational continuum, they successively develop the identity of a medical student, a resident, and a physician. Each individual's journey from layperson to skilled professional is unique and is affected by "who they are" at the beginning and "who they wish to become."Identity formation is a dynamic process achieved through socialization; it results in individuals joining the medical community of practice. Multiple factors within and outside of the educational system affect the formation of an individual's professional identity. Each learner reacts to different factors in her or his own fashion, with the anticipated outcome being the emergence of a professional identity. However, the inherent logic in the related processes of professional identity formation and socialization may be obscured by their complexity and the large number of factors involved.Drawing on the identity formation and socialization literature, as well as experience gained in teaching professionalism, the authors developed schematic representations of these processes. They adapted them to the medical context to guide educators as they initiate educational interventions, which aim to explicitly support professional identity formation and the ultimate goal of medical education-to ensure that medical students and residents come to "think, act, and feel like a physician."

  16. WASp identity theft by a bacterial effector.

    Science.gov (United States)

    Daugherty-Clarke, Karen; Goode, Bruce L

    2008-09-01

    EspF(U), a protein secreted by pathogenic enterohaemorrhagic E. coli (EHEC), activates N-WASp/WASp to induce actin pedestal formation in host cells. Two recent papers in Nature show that EspF(U) exploits a WASp activation strategy so extreme that it may effectively sequester WASp, blinding it to both autoinhibition and cellular regulation.

  17. Identity Theft Prevention in CyberCIEGE

    Science.gov (United States)

    2005-12-01

    the secret agent/espionage genre and the resurgence of fiber art , such as knitting and crochet, in order to engage the player and allow for some...Mary Anne. “Protect Passwords? Not if latte is free.” 6 May 2005. Available from http://www.mercurynews.com/mld/mercurynews/business/11578776.htm

  18. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...

  19. Medical Student Stories of Participation in Patient Care-Related Activities: The Construction of Relational Identity

    Science.gov (United States)

    Warmington, Sally; McColl, Geoffrey

    2017-01-01

    Professional identity formation is acknowledged as one of the fundamental tasks of contemporary medical education. Identity is a social phenomenon, constructed through participation in everyday activities and an integral part of every learning interaction. In this paper we report from an Australian ethnographic study into how medical students and…

  20. The antecedents and consequences of a strong professional identity among medical specialists

    NARCIS (Netherlands)

    Molleman, Eric; Rink, Floor

    2015-01-01

    This article introduces a conceptual framework for understanding the antecedents of a strong professional identity among medical specialists and its consequences for the quality of healthcare. Three work conditions are proposed under which a professional identity improves the overall work productivi

  1. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    pdf/ synovate_report.pdf. 7. See Business Software Alliance, Consumer Confidence in Online Shopping Buoyed by Security Software Protection, BSA...Survey Suggests (Jan. 12, 2006), available at http:// www.bsacybersafety.com/news/2005- Online - Shopping -Confidence.cfm. 8. See Cyber Security Industry

  2. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ....5216 156 VOLKSWAGEN PASSAT 16 31,310 0.5110 157 GENERAL MOTORS......... SATURN SKY 2 4,078 0.4904 158... National Highway Traffic Safety Administration 49 CFR Part 541 Preliminary Theft Data; Motor Vehicle Theft... requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2009...

  3. 77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-09-21

    ... VOLKSWAGEN PASSAT 4 13,204 0.3029 160 GENERAL MOTORS...... GMC TERRAIN......... 13 48,605 0.2675 161 SUZUKI... National Highway Traffic Safety Administration 49 CFR Part 541 Final Theft Data; Motor Vehicle Theft... thefts of model year (MY) 2010 passenger motor vehicles that occurred in calendar year (CY) 2010. The...

  4. 75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-03-10

    ... QUATTRO.. 8 6992 1.1442 111 VOLKSWAGEN..... GOLF/RABBIT/GTI..... 46 41314 1.1134 112 GENERAL MOTORS... National Highway Traffic Safety Administration 49 CFR Part 541 Final Theft Data; Motor Vehicle Theft... thefts of model year (MY) 2007 passenger motor vehicles that occurred in calendar year (CY) 2007. The...

  5. 78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-07-09

    ... 100 181,785 0.5501 132 GENERAL MOTORS..... CADILLAC SRX...... 32 59,077 0.5417 133 VOLKSWAGEN... National Highway Traffic Safety Administration 49 CFR Part 541 Preliminary Theft Data; Motor Vehicle Theft... requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2011...

  6. Employee theft and fraud: bigger than ever and getting worse.

    Science.gov (United States)

    2001-02-01

    Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.

  7. Controlling hospital library theft

    OpenAIRE

    Cuddy, Theresa M.; Marchok, Catherine

    2003-01-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other li...

  8. Medical student stories of participation in patient care-related activities: the construction of relational identity.

    Science.gov (United States)

    Warmington, Sally; McColl, Geoffrey

    2017-03-01

    Professional identity formation is acknowledged as one of the fundamental tasks of contemporary medical education. Identity is a social phenomenon, constructed through participation in everyday activities and an integral part of every learning interaction. In this paper we report from an Australian ethnographic study into how medical students and patients use narrative to construct their identities. The dialogic narrative analysis employed focused on the production of meaning through the use of language devices in a given context, and the juxtaposition of multiple perspectives. Two stories told by students about their participation in patient care-related activities reveal how identities are constructed in this context through depictions of the relationships between medical students, patients and clinical teachers. These students use the rhetorical functions of stories to characterise doctors and patients in certain ways, and position themselves in relation to them. They defend common practices that circumvent valid consent processes, justified by the imperative to maximise students' participation in patient care-related activities. In doing so, they identify patients as their adversaries, and doctors as allies. Both students are influenced by others' expectations but one reveals the active nature of identity work, describing subtle acts of resistance. These stories illustrate how practices for securing students' access to patients can influence students' emerging identities, with implications for their future disclosure and consent practices. We argue that more collaborative ways of involving medical students in patient care-related activities will be facilitated if students and clinical teachers develop insight into the relational nature of identity work.

  9. The 1978 U.S. Medical School Graduates: Career Plans by Racial/Ethnic Identity.

    Science.gov (United States)

    Cuca, Janet Melei

    1980-01-01

    Career plans, based on responses to the Association of American Medical Colleges' first annual graduation questionnaire concerning the racial/ethnic identity of 1978 U.S. medical graduates, are reported. The data show that the six racial/ethnic groups follow similar general trends, though group differences do appear. (MLW)

  10. The design of a corporate identity for a department of medical illustration: a case study.

    Science.gov (United States)

    Thompson, G

    2001-06-01

    This paper outlines the author's attempt to design and introduce a corporate identity into the Department of Medical Illustration at the South Buckinghamshire NHS Trust. It is intended to furnish the reader with an insight into the process of designing a corporate identity and to relate one department's experience. This may be useful for those who wish to develop a corporate identity of their own or contribute, as a department, towards an identity for their own Trust or other institution. A major change in government policy about the identity of NHS Trusts has meant that use of the department's new logo has had to be abandoned in favour of the new NHS corporate identity.

  11. Caring, Competence and Professional Identities in Medical Education

    Science.gov (United States)

    MacLeod, Anna

    2011-01-01

    This paper considers the multiple discourses that influence medical education with a focus on the discourses of competence and caring. Discourses of competence are largely constituted through, and related to, biomedical and clinical issues whereas discourses of caring generally focus on social concerns. These discourses are not necessarily equal…

  12. [The identity of medical psychology: a historical quest].

    Science.gov (United States)

    Steinberg, Holger

    2014-11-01

    The starting point of this study is the current uncertainty in German-speaking medical psychology about its actual and very own natural area of expertise. The current study ventures to advance the hypothesis that part of this uncertainty is due to the fact that during the scientific area in its history (approx. 1850-1960) medical psychology abandoned its historical core competence as it emerged and developed during the age of enlightenment (end of 17(th)-18(th) centuries). To make this change clear, different examples of the 2 opposing conceptualisations of medical psychology are discussed, of course in a selected and maybe even provocative way. The change in concept also led to the fact that the interrelationships with and differentiation from its neighbouring disciplines are not clear and sharp either, since at times 2 or more disciplines declare themselves competent for one and the same thing. This is exemplified on the manifold overlappings with clinical psychology. Given the lack of resources now and in the future, this lack of a clear definition of competence might lead to continued uncertainty as well as to conflicts over distribution. On the other hand though, the look into the history of the subject reveals that at all times it has been a matter of individual approach or attitude as to what was regarded as core area of interest and competence of medical psychology and how far it overlapped with neighbouring disciplines. From the point of view of the history of psychiatry and on the basis of carefully selected historic material, this paper presents the core of 2 different concepts of medical psychology to elaborate this hypothesis. © Georg Thieme Verlag KG Stuttgart · New York.

  13. Narrative reflective practice in medical education for residents: composing shifting identities

    Directory of Open Access Journals (Sweden)

    Jean Clandinin

    2010-12-01

    Full Text Available Jean Clandinin1, Marie Thérèse Cave2, Andrew Cave21Center for Research for Teacher Education and Development, University of Alberta, Edmonton, Alberta, Canada; 2Department of Family Medicine, Faculty of Medicine and Dentistry, University of Alberta, Edmonton, Alberta, CanadaAbstract: As researchers note, medical educators need to create situations to work with physicians in training to help them attend to the development of their professional identities. While there is a call for such changes to be included in medical education, educational approaches that facilitate attention to the development of medical students' professional identities, that is, who they are and who they are becoming as physicians, are still under development. One pedagogical strategy involves narrative reflective practice as a way to develop physician identity. Using this approach, medical residents first write narrative accounts of their experiences with patients in what are called "parallel charts". They then engage in a collaborative narrative inquiry within a sustained inquiry group of other residents and two researcher/facilitators (one physician, one narrative researcher. Preliminary studies of this approach are underway. Drawing on the experiences of one medical resident in one such inquiry group, we show how this pedagogical strategy enables attending to physician identity making.Keywords: physician identity formation, residency

  14. Abuse of Modernity: The Korean Medical Journal and Colonial Identity

    Directory of Open Access Journals (Sweden)

    Mark Caprio

    2014-03-01

    Full Text Available Medical researcher Kubo Takeshi’s contributions to professional publications, such as Chōsen igakkai zasshi (The Korean medical journal, and more popular magazines, such as Chōsen oyobi Manshū (Korea and Manchuria, reflected many of the prejudicial attitudes that Japanese held toward Koreans during the first decade of colonial rule. His scholarship was based on biological determinist thinking, an approach developed by eighteenth-century European medical researchers to establish race, class, and gender hierarchies. For Kubo this approach provided a means for exploiting scientific inquiry to establish and manage Japanese superiority over Korean subjects in a more stable manner than one based on more malleable cultural differences. A people could adjust its customs or mannerisms to amalgamate with a suzerain culture but could not do so with hereditarily determined features, such as blood type or cranium size, shape, or weight. Practitioners, however, often linked the physical with the cultural by arguing that a people’s physical structure was a product of its cultural heritage. The subjectivity injected into this seemingly objective research methodology abused the lay community’s blind trust in modern science in two ways. First, it employed this inquiry to verify biased observations, rather than to uncover new truths; second, it altered the approach, rather than the conclusions, when this inquiry demonstrated the desired truths to be inaccurate. Biological determinism proved useful in substantiating a Japanese-Korean colonial relationship that acknowledged historically similar origins while arguing for the historically different evolutions of the two peoples.

  15. Competency is not enough: integrating identity formation into the medical education discourse.

    Science.gov (United States)

    Jarvis-Selinger, Sandra; Pratt, Daniel D; Regehr, Glenn

    2012-09-01

    Despite the widespread implementation of competency-based medical education, there are growing concerns that generally focus on the translation of physician roles into "measurable competencies." By breaking medical training into small, discrete, measurable tasks, it is argued, the medical education community may have emphasized too heavily questions of assessment, thereby missing the underlying meaning and interconnectedness of how physician roles shape future physicians. To address these concerns, the authors argue that an expanded approach be taken that includes a focus on professional identity development. The authors provide a conceptual analysis of the issues and language related to a broader focus on understanding the relationship between the development of competency and the formation of identities during medical training. Including identity alongside competency allows a reframing of approaches to medical education away from an exclusive focus on "doing the work of a physician" toward a broader focus that also includes "being a physician." The authors consider the salient literature on identity that can inform this expanded perspective about medical education and training.

  16. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety Administration (NHTSA), Department of... diagram of the identity, design and location of the components of the antitheft device for the...

  17. Theft of electricity in Indonesia

    Science.gov (United States)

    Priatna, Dedy Supriadi

    In 1996, among 196 million Indonesian people, only 47.6% had access to electricity; 45.4% in rural areas and 51.5% in urban. 64% of population lived in 61,975 villages, and electric power was supplied to 69% of villages. The government has set a goal to achieve nearly universal services by the year 2014. The government can use existing installed capacity of PLN's system more efficiently. Theft of electricity, which currently constitutes a large share of PLN's losses, should be reduced. The potential of the private sector including captive power and local communities, to participate in electric power generation can also be utilized. The large interest that has been shown by the private sector might be followed by making electric power provision profitable and therefore attractive for the private sector. PLN profits, that in 1996 were only 5.22% instead of the 8% recommended by the World Bank as the best practice for Indonesia, have to be increased by improving their performance levels. The government should also seek solutions for the extremely poor households who will never be able to afford both connection charges and a monthly bill. In 1996 the extremely poor households included 5,251,788 households, constituting 12.1% of the total Indonesian households. Only 1.2% of these households had access to electricity. The objective of this study is to seek the policies that can be implemented in Indonesia that will make it possible to generate and deliver electricity profitably, and reduce theft while providing nearly universal services. For this purpose, the options that are proposed in this study are reducing theft of electricity; something like the CAMPFIRE that has successfully reduced poaching of elephants in Africa: that is, consumer-owned systems, both partially (distribution facilities) and completely (generation and distribution facilities); performance-based regulation (PBR); and solutions for supplying the extremely poor based on the minimum subsidies from the

  18. Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree

    Directory of Open Access Journals (Sweden)

    Simon Fong

    2012-01-01

    Full Text Available User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user’s medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents’ medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data. Questions can be abstracted to various level of resolution (hence sensitivity of private data for use in the authentication process. The method is described and a case study is given in this paper.

  19. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  20. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  1. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...

  2. Assimilating South African medical students trained in Cuba into the South African medical education system: reflections from an identity perspective.

    Science.gov (United States)

    Donda, B M; Hift, R J; Singaram, V S

    2016-10-24

    In terms of the Nelson Mandela Fidel Castro Medical Collaboration programme, an agreement between the governments of South Africa and Cuba, cohorts of South African students receive their initial five years medical training at a Cuban university before returning to South Africa for a six to twelve months orientation before integration into the local final year class. It is common for these students to experience academic difficulty on their return. Frequently this is viewed merely as a matter of a knowledge deficit. We argue that the problem arises from a fundamental divergence in the outcomes of the Cuban and South African medical curricula, each of which is designed with a particular healthcare system in mind. Using the discrepancy theory of identity proposed by Higgins in 1987, we discuss the challenges experienced by the returning Nelson Mandela Fidel Castro Medical Collaboration students in terms of a potential crisis of identity and suggest interventions which may prove valuable in promoting academic success and successful integration. Though providing additional training to address the gap in skills and knowledge in returning students is an important part of their successful reintegration, this could be insufficient on its own and must be complemented by a range of measures designed to ameliorate the discrepancies in identity which arise from the transition from one educational model to another.

  3. Integrating the teaching role into one's identity: a qualitative study of beginning undergraduate medical teachers.

    Science.gov (United States)

    van Lankveld, T; Schoonenboom, J; Kusurkar, R A; Volman, M; Beishuizen, J; Croiset, G

    2016-06-18

    Beginning medical teachers often see themselves as doctors or researchers rather than as teachers. Using both figured worlds theory and dialogical self theory, this study explores how beginning teachers in the field of undergraduate medical education integrate the teacher role into their identity. A qualitative study was performed, involving 18 beginning medical teachers at a Dutch medical school. The teachers were interviewed twice and kept a logbook over a period of 7 months. The study shows that the integration of the teacher role into the teachers' identity was hampered by the idea that teaching is perceived by others as a low status occupation. Some teachers experienced significant tension because of this, while others showed resilience in resisting the negative associations that were thought to exist regarding teaching. The teachers used five different identity narratives in order to integrate the teacher role into their identity, in which the positions of teacher and doctor or researcher were found to be combined, adopted or rejected in diverse ways. The five identity narratives were: (1) coalition between the I-position of teacher and other I-positions; (2) no integration of the I-position of teacher: holding on to other I-positions; (3) construction of the I-position of teacher and other I-positions as opposites; (4) coalition between the I-position of teacher and a third position of coordinator; and (5) meta-position: trivialising the importance of status. These identity narratives offer starting points for supporting undergraduate teachers during their early professional years.

  4. A patient-identity security mechanism for electronic medical records during transit and at rest.

    Science.gov (United States)

    Chao, Hui-Mei; Twu, Shih-Hsiung; Hsu, Chin-Ming

    2005-09-01

    This paper proposes a patient-identity security mechanism, including an identity cipher/decipher and a user-authentication protocol, to ensure the confidentiality and authentication of patients' electronic medical records (EMRs) during transit and at rest. To support the confidentiality of an EMR, the identity cipher/decipher uses a data-hiding function and three logical-based functions to encrypt/decrypt a patient's identifying data and medical details in an EMR. The ciphertext of the patient's identifying data is patient-EMR related, whereas that of medical details is healthcare agent-EMR related. To support the authentication of an EMR, the user-authentication protocol based on a public key infrastructure uses certificates and dynamic cookies for verification/identification. The identity cipher has been simulated using C programming language running on a 1500 MHz Pentium PC with 512 MB of RAM. The experimental results show that healthcare agents can install large amounts of patients' encrypted EMRs in healthcare databases efficiently. In addition, separately storing the keys in a user's token and an EMR database for decryption increases the safety of patients' EMRs. For each user-authentication trail, the use of certificates and dynamic cookies for verification/identification ensures that only authorized users can obtain access to the EMR, and anyone involved cannot make false claims on the transmission made.

  5. Professional identity formation in the transition from medical school to working life

    DEFF Research Database (Denmark)

    De Lasson, Lydia; Just, Eva; Stegeager, Nikolaj W.M.

    2016-01-01

    Background The transition from student to medical doctor is challenging and stressful to many junior doctors. To practice with confidence and professionalism the junior doctors have to develop a strong professional identity. Various suggestions on how to facilitate formation of professional ident...... and acting as a doctor), adoption to medical culture, career planning and managing a healthy work/life-balance. Further studies in different contexts are recommended as well as studies using other methods to test the results of this qualitative study.......: Adoption to medical culture, career planning, and work/life-balance. The junior doctors found the coaching intervention highly useful in order to cope with these challenges. Furthermore, the group was a forum where the junior doctors could share thoughts and feelings with colleagues without being afraid...... identity have been offered including the possible positive effect of group-coaching courses. The purpose of this study was to explore how group-coaching might facilitate professional identity formation among junior doctors in the transition period. Methods Group-coaching courses comprising three whole...

  6. 75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-09

    ... QUATTRO... 8 6992 1.1442 111 VOLKSWAGEN GOLF/RABBIT/GTI...... 46 41314 1.1134 112 GENERAL MOTORS... GENERAL MOTORS........ BUICK RENDEZVOUS..... 14 29187 0.4797 176 VOLKSWAGEN NEW BEETLE 13 27249 0.4771 177... National Highway Traffic Safety Administration 49 CFR Part 541 Final Theft Data; Motor Vehicle Theft...

  7. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  8. Professional Identity Development Through Service Learning: A Qualitative Study of First-Year Medical Students Volunteering at a Medical Specialty Camp.

    Science.gov (United States)

    Beck, Jimmy; Chretien, Katherine; Kind, Terry

    2015-11-01

    To describe the experience of medical students volunteering at a camp for children with a variety of medical conditions. Rising second-year medical students who had served as counselors for 1 week at a medical specialty camp were invited to participate. We conducted a 2-part qualitative study using on-site focus groups and follow-up individual interviews. Nine medical students participated. Students described their experience as motivating and career reinforcing. It helped them "move beyond the textbook" and deepened their commitment to serving future patients with compassion. One theme that emerged was the idea that their camp experience fostered the development of their professional identities. A 1-week, immersive community service experience at a medical specialty camp played a role in influencing the early formative professional identities of rising second-year medical students. Medical schools could use camps as a promising community service-learning experiences to foster professional identity. © The Author(s) 2015.

  9. Indigenous Identity at the Intersection of Medical Genetics Discourses- DNA and Indigeneity Symposium

    OpenAIRE

    Rosalina James

    2015-01-01

    Beginning in the early twenty-first century, the genomic age has seen academic interests expand beyond Indigenous global migrations to more medically-driven population genetic research. In this environment, scientific narratives tend to privilege race-based biological explanations for physical and mental health phenomena. Similarly, academic frameworks for individual and group identity are increasingly described through a lens of genetic-derived logic over the cultural, political, historical,...

  10. Leadership Identity Development Through Reflection and Feedback in Team-Based Learning Medical Student Teams.

    Science.gov (United States)

    Alizadeh, Maryam; Mirzazadeh, Azim; Parmelee, Dean X; Peyton, Elizabeth; Mehrdad, Neda; Janani, Leila; Shahsavari, Hooman

    2017-07-28

    Studies on leadership identity development through reflection with Team-Based Learning (TBL) in medical student education are rare. We assumed that reflection and feedback on the team leadership process would advance the progression through leadership identity development stages in medical students within the context of classes using TBL. This study is a quasi-experimental design with pretest-posttest control group. The pretest and posttest were reflection papers of medical students about their experience of leadership during their TBL sessions. In the intervention group, TBL and a team-based, guided reflection and feedback on the team leadership process were performed at the end of all TBL sessions. In the other group, only TBL was used. The Stata 12 software was used. Leadership Identity was treated both as a categorical and quantitative variable to control for differences in baseline and gender variables. Chi-square, t tests, and linear regression analysis were performed. The population was a cohort of 2015-2016 medical students in a TBL setting at Tehran University of Medical Sciences, School of Medicine. Teams of four to seven students were formed by random sorting at the beginning of the academic year (intervention group n = 20 teams, control group n = 19 teams). At baseline, most students in both groups were categorized in the Awareness and Exploration stage of leadership identity: 51 (52%) in the intervention group and 59 (55%) in the control group: uncorrected χ(2)(3) = 15.6, design-based F(2.83, 108) = 4.87, p = .003. In the posttest intervention group, 36 (36%) were in exploration, 33 (33%) were in L-identified, 20 (20%) were in Leadership Differentiated, and 10 (10%) were in the Generativity. None were in the Awareness or Integration stages. In the control group, 3 (20%) were in Awareness, 56 (53%) were in Exploration, 35 (33%) were in Leader Identified, 13 (12%) were in Leadership Differentiated. None were in the Generativity and Integration stages

  11. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    Science.gov (United States)

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  12. The Impact of Everyday Discrimination and Racial Identity Centrality on African American Medical Student Well-Being: a Report from the Medical Student CHANGE Study.

    Science.gov (United States)

    Perry, Sylvia P; Hardeman, Rachel; Burke, Sara E; Cunningham, Brooke; Burgess, Diana J; van Ryn, Michelle

    2016-09-01

    Positive psychological well-being is an important predictor of and contributor to medical student success. Previous work showed that first-year African American medical students whose self-concept was highly linked to their race (high racial identity centrality) were at greater risk for poor well-being. The current study extends this work by examining (a) whether the psychological impact of racial discrimination on well-being depends on African American medical students' racial identity centrality and (b) whether this process is explained by how accepted students feel in medical school. This study used baseline data from the Medical Student Cognitive Habits and Growth Evaluation (CHANGE) Study, a large national longitudinal cohort study of 4732 medical students at 49 medical schools in the USA (n = 243). Regression analyses were conducted to test whether medical student acceptance mediated an interactive effect of discrimination and racial identity centrality on self-esteem and well-being. Both racial identity centrality and everyday discrimination were associated with negative outcomes for first-year African American medical students. Among participants who experienced higher, but not lower, levels of everyday discrimination, racial identity centrality was associated with negative outcomes. When everyday discrimination was high, but not low, racial identity was negatively related to perceived acceptance in medical school, and this in turn was related to increased negative outcomes. Our results suggest that discrimination may be particularly harmful for African American students who perceive their race to be central to their personal identity. Additionally, our findings speak to the need for institutional change that includes commitment and action towards inclusivity and the elimination of structural racism.

  13. Public health policy and the building up of a Brazilian medical identity.

    Science.gov (United States)

    de Castro-Santos, L A

    2005-12-01

    Since George Herbert Mead studied "the social self" and the interactionists went further in distinguishing "images of self", a lecture on the building up of a Brazilian medical identity should try to focus on the patterns of self-images, presented images, and aspired-to images among the Brazilian medical elites during the First Republic (1889-1930). In no other period of Brazilian history were those "images" of professional identity so close--in contrast, later periods of Brazilian history witnessed an almost permanent "collision" or the clashing of such images among public health specialists. Oswaldo Cruz, Carlos Chagas, Artur Neiva and Belisário Pena are perhaps the best examples of successful careers as "sanitarians" (to recall John Duffy's historical work on luminaries before and after the "New Public Health" in the United States), and as important political actors during Brazil's First Republic. In light of the prominent political, policy-oriented, and scientific roles public health professionals played in Brazil, it is interesting to suggest that in large part such prominence resulted from the symbolic impact of the ideologies of sanitary reform on the political agenda of that period of Brazilian history. Where many studies look for personal rivalries and disputes around Chagas and Neiva as public figures, we may also see the importance of finding identity-building processes among public health specialists as an integrated group (e.g., trying to appear as "significant others" for the new generations of medical graduates in the country), regardless of existing rivalries. Cruz and Chagas, especially, were names with great impact in the Brazilian press (pro and con), a circumstance made possible largely by their easy and direct access to the Brazilian presidents Rodrigues Alves and Epitácio Pessoa, and, most clearly, by public health being one of Brazil's political priorities to find a place among the "civilized nations" of the world. A task that further

  14. Does the traditional healer have a modern medical identity in South Africa?

    Directory of Open Access Journals (Sweden)

    Gabriel Louw

    2017-02-01

    Full Text Available Background Research supports the view that the South African traditional healer does not hold a modern medical identity, but developed from the traditional African religions and cultural environment as a kind of caregiver. The name healer with a medical connotation arose from early colonists and missionaries misunderstanding the role of a traditional healer in Africa, especially in early South Africa. There is even a misunderstanding today about the African meaning of spiritual healing. As such, the traditional healer is a remnant from a previous, pre-modern time. Traditional healers were forced to the foreground recently in South Africa by the Traditional Health Practitioners Act No 22 (2007. This act makes the traditional healer an exclusive healthcare practitioner with statutory status under the name traditional health practitioner. Such a healer can practice in the formal healthcare sector, including the public hospitals. The Act gives the healer the right to diagnose, treat and make, and prescribe pre-modern health products to his/hers clients unhindered. It is clear that the various resolutions and implementations of the Traditional Health Practitioners Act No 22 (2007 intend to bring the South African traditional healer into the practice domain of the South African medical doctor. Aims The study aimed to determine if the traditional healer has a medical identity in modern South Africa. Methods This is an exploratory and descriptive study that makes use of an historical approach by means of investigation and a literature review. The emphasis is on using current documentation like articles, books and newspapers as primary sources to reflect on the traditional healer’s medical identity in modern South Africa. The findings are offered in narrative form. Results The New South Africa did not start changing socially, economically and politically after 1994. They have started to move into new cultural and life domains centuries ago. Some left

  15. [A mourning case that referred with sexual identity disorder secondary to a general medical condition].

    Science.gov (United States)

    Yilmaz, Ayşegül; Ceri, Ozge; Tatlidil, Elif; Koçak, Orhan Murat; Soykan, Atilla

    2009-01-01

    D.G. was a 59-year-old male patient who was retired and married, and had 3 children. He reported no psychopathology prior to a myocardial infarction he had in 1996. Following bypass surgery he had erectile dysfunction. Subsequently, gynecomastia developed as a side effect of spironolactone and digoxin treatment. After a long period of depression he claimed was caused by non-adaptation to the changes in his body, he realized differences about himself; he began to feel like a woman. Upon referral to our clinic, he said that he had decided to continue his life as a woman and wished to get pink colored (as opposed to blue for male) identity card issued by the Turkish Government for female Turkish citizens. He reported that his wish was to learn how to become a woman. This is the first case in the medical literature defined as sexual identity disorder secondary to a general medical condition. The case is discussed in terms of pathological grief reaction.

  16. Legends of Organ Theft: The Moral Dilemma of Contemporary Society

    Directory of Open Access Journals (Sweden)

    Dragana Antonijević

    2016-03-01

    story. On the other side, the legend- rumors of Third and Second World, in my view, sent an opposite message, showing the reverse side of the transplantation issue, medical progress and a deeper, existential dilemma of life and death, sickness and health, exposing the doubts intertwined with organ transplantation. Interestingly the legends of organ theft that appeared in Serbia during 2007 had more in common with the legends of the Third world, than with the narratives of the developed societies. In the essay, the interposition of the legends from Serbia, that were instigated by the transitional nature of its socioeconomic reality, are elaborated. That has inspired me to put forward a scheme of narrative, geographical and social transformation of the organ theft legends, thus showing their development intertwined with motifs and spatial markers disperses a system of performances around the world.

  17. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  18. 78 FR 23637 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2013-04-19

    ... cash flows into a bank account controlled by the thieves--leaving the victim in a dispute with the... 2007.\\16\\ Some commenters raised questions about the scope of the proposal and the meaning of certain... the SEC's statements in the Proposing Release regarding the possibility that some investment advisers...

  19. Identity theft and consumers' reaction to preventive technological innovations.

    Science.gov (United States)

    Ainscough, Thomas L; Brody, Richard G; Trocchia, Philip J

    2007-08-01

    The use of identification technology by commercial entities has broad and, for some consumers, disturbing social implications. This two-phase study was done to specify consumers' concerns regarding various identification technologies which may be encountered in retail environments. From the qualitative findings, a 26-item survey was constructed to quantify identified areas of concern with 303 survey participants (147 women and 156 men), whose mean age category was 30 to 39 years. Using exploratory factor analysis (principal components with varimax rotation), five dimensions of consumers' concern emerged: privacy, ethics, health, humanity, and complexity.

  20. Identity Theft: Gentrification, Latinidad, and American Girl Marisol Luna

    Science.gov (United States)

    Rudolph, Jennifer Domino

    2009-01-01

    Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll's accompanying narrative depicts her Chicago neighborhood of Pilsen as "dangerous" and recounts her family's move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of…

  1. The President’s Identity Theft Task Force Report

    Science.gov (United States)

    2008-09-01

    Homeland Security Jim Nussle Office of Management and Budget Alexander Lazaroff United States Postal Service Ben S. Bernanke Federal Reserve System...consequences for the functioning of our economy .2 The efforts of the Task Force over the past year to implement the Plan’s recommendations have under...this plain-language brochure offers businesses practical tips on securing sensitive data, based on the principle that many breaches can be prevented

  2. The Identity of Patients in 12th Century Medical Text in Persian: a Sociolinguistic Perspective

    Directory of Open Access Journals (Sweden)

    Manizheh Abdollahi

    2013-05-01

    Full Text Available This study investigates linguistic expressions featuring the patient in a medical textbook written in the 12th century in Persian. At this time, medical practice is noticed to be more scientific than those written years before or even many centuries after because, keeping a distance from superstitious views, the practice follows the scientific procedures of the day. The present study adopts a sociolinguistics perspective to examine the social status of the patient in the text. The textbook – “Khofi Alayee” – was chosen to be examined mainly because it was considered as a scientific book written for public  use; also it was published as  a kind of pocket book for people to use while on trip or, more importantly, when the doctors were in emergency situations. This text, like other medical texts, is expected to be written impartially, but this is not usually the case. The result of the study showed that the patient was primarily viewed as an object with no social status considered for revered citizen. On the other hand, in occasions when the patient was treated as a person, he represented a male belonging to the middle or higher classes of the society.   Keywords: Patient identity, power, gender, CDA

  3. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    This article studies the involuntary transfer of property rights by theft - a topic almostunexplored in the law and economics literature. The question is whether a buyer of a stolen goodshould obtain title to the good if he/she has purchased it in good faith. As described in the articledifferent ...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory......This article studies the involuntary transfer of property rights by theft - a topic almostunexplored in the law and economics literature. The question is whether a buyer of a stolen goodshould obtain title to the good if he/she has purchased it in good faith. As described in the articledifferent...... jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...

  4. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  5. Developing a patient focussed professional identity: an exploratory investigation of medical students' encounters with patient partnership in learning.

    Science.gov (United States)

    Barr, Jennifer; Bull, Rosalind; Rooney, Kim

    2015-05-01

    Patient encounters are central to the provision of learning opportunities for medical students and their development as medical professionals. The primary aim of the study reported in this paper was to discover how partnering medical students with patients with chronic illness in undergraduate learning influenced the development of a patient centred professional identity and professionalism. An exploratory interpretive research design was used to address the research aim within a patient partner program (P3). Three qualitative data collection methods were used: (1) focus groups (2) extended response questionnaire and (3) semi-structured interviews. Data were coded and analysed thematically. The professional identity of medical students is constructed along traditional lines in the preclinical years. Patient-partnership offers a disruption to this development by way of an intersection with patients with chronic illness which potentially allows meaningful construction of what a patient-centred identity should be. This point of reflection provides an opportunity to engage at a higher level in medical identity development and professionalism. The findings discussed in this paper further stimulate the patient-centred agenda by understanding the conflict associated with the student-patient nexus in medical education and its potential for building professionalism and a patient-centred professional identity. To continue the drive for a patient-centred professional identity there must be ongoing engagement with patients in medical education, preferably commencing early in a student's journey so that it becomes the expected norm. This study has highlighted that a true patient-centred emphasis is being encountered too late in their socialisation process.

  6. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B Appendix B to Part 541—Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject...

  7. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  8. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  9. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  10. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... National Highway Traffic Safety Administration 49 CFR Part 541 RIN 2127-AK81 Federal Motor Vehicle Theft... areas on high theft major parts of motor vehicles. E-mail is now included as a means to submit the... motor vehicle lines subject to parts marking, and manufacturers of replacement parts designed for...

  11. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE... or theft of an identification card shall be promptly reported by the cardholder to the port director....

  12. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  13. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine......-grained insight into the semantic affinities of one or more lexemes. The main premise is that the semantic properties of a linguistic unit are reflected in its distributional characteristics, and, thus, by observing association patterns of a lexeme we can gain useful insights into its semantic affinities. Thus...

  14. Anti-Theft Automatic Metering Interface

    Directory of Open Access Journals (Sweden)

    Abhijeet Das

    2015-08-01

    Full Text Available Abstract Electricity is now more than a necessity and its need is increasing day by day resulting in power theft and power scarcity. The purpose of this project is to provide automatic control and monitoring of the Domestic Energy Meter enabling the Electricity Department to read meter readings without anyone visiting each house and also prevent electricity theft .This can be achieved by the use of a Microcontroller Unit that continuously monitors and records the Energy Meter readings in its permanent memory location. This system also makes use of a GSM module for remote monitoring and control of Energy Meter with the help of an interfacing circuitry. The Microcontroller based system continuously records the readings and the live meter reading can be sent to the Electricity department after a count period or on request. This system also can be used to disconnect the power supply to the house in case of non-payment of electricity bills. The Substation will be the receiving end. The data received is fed to a microcontroller at the Substation which will automatically calculate the bill based on tariff provider and display it.

  15. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  16. "I'm just not that sick": pain medication and identity in Mexican American women with chronic pain.

    Science.gov (United States)

    Monsivais, Diane B; Engebretson, Joan C

    2012-09-01

    To describe the beliefs and attitudes about self-identity and pain medication in a sample of Mexican American women with chronic pain living in the El Paso, Texas, area. The findings are drawn from a larger qualitative study of 15 women describing the expression and communication of chronic pain symptoms, pain-related cultural beliefs, decision making, and treatment preferences of chronic pain. Participants who had chronic pain syndromes for at least 1 year were recruited from a pain clinic and fibromyalgia support group. In-depth, open-ended interviews, fieldwork, and participant observation were used to gather information using a focused clinical ethnographic approach. Interviews were audiotaped and transcribed verbatim. A shared central theme was controlling the use of pain medications to control perceived negative associations with pain medication. The negative associations resulted in women rejecting use of medication to preserve their legitimate identity. This perception can be destructive and can lead to poor pain control. Providing patients with anticipatory guidance about common barriers to taking pain medication may allow medication use consistent with improved pain control.

  17. AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA

    Directory of Open Access Journals (Sweden)

    Veena G.S

    2013-12-01

    Full Text Available The proposed work aims to create a smart application camera, with the intention of eliminating the need for a human presence to detect any unwanted sinister activities, such as theft in this case. Spread among the campus, are certain valuable biometric identification systems at arbitrary locations. The application monitosr these systems (hereafter referred to as “object” using our smart camera system based on an OpenCV platform. By using OpenCV Haar Training, employing the Viola-Jones algorithm implementation in OpenCV, we teach the machine to identify the object in environmental conditions. An added feature of face recognition is based on Principal Component Analysis (PCA to generate Eigen Faces and the test images are verified by using distance based algorithm against the eigenfaces, like Euclidean distance algorithm or Mahalanobis Algorithm. If the object is misplaced, or an unauthorized user is in the extreme vicinity of the object, an alarm signal is raised.

  18. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  19. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  20. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  1. Identity or Behavior: A Moral and Medical Basis for LGBTQ Rights.

    Science.gov (United States)

    Solomon, Andrew

    2014-09-01

    The progress of lesbian, gay, bisexual, transsexual, and queer rights entails the erosion of prejudice, and erosion is a slow process. Much press accrues to the dramatic advancement of gay marriage, but that progress reflects decades of committed activism that antedate the sea change. Social science, physical science, politics, philosophy, religion, and innumerable other fields have bearing on the emergence of healthy LGBTQ identities. The field of bioethics is implicated both in revolutionizing attitudes and in determining how best to utilize such ameliorated positions. For decades, the debate around homosexuality has centered on whether it is a choice or an inherent quality. A growing segment of the population believes that gay people are "made that way" and therefore do not deserve to be treated with the prejudice they might warrant if they had simply elected what others resisted. In effect, they are like disabled people, who can't help the challenges they face, and unlike murderers, who could choose not to kill. Anti-gay arguments tend to hinge on a view of gayness as a behavior; the liberatory ones, on gayness as an identity. A behavior can be avoided; an identity is integral and therefore warrants acceptance-or even celebration. People have a right to their identities, even if they have the capacity to act out other, different identities. Bioethics is the field in which this distinction between gay acts and a gay self may be argued most directly. © 2014 by The Hastings Center.

  2. Professional identity formation in the transition from medical school to working life

    DEFF Research Database (Denmark)

    de Lasson, Lydia; Just, Eva; Stegeager, Nikolaj W.M.;

    2016-01-01

    that this would endanger their professional career. Many found new ways to respond to everyday challenges mainly through a new awareness of patterns of thinking and feeling. Conclusions The participants found that the group-coaching course supported their professional identity formation (thinking, feeling...... identity have been offered including the possible positive effect of group-coaching courses. The purpose of this study was to explore how group-coaching might facilitate professional identity formation among junior doctors in the transition period. Methods Group-coaching courses comprising three whole...... a background as health professionals combined with coaching educations. Data was obtained through observations, open-ended questionnaires and interviews. A generic thematic analysis was applied. Results Forty-five doctors participated in six coaching groups. The three main themes emerging in the sessions were...

  3. Preventing thefts and damage to property

    CERN Multimedia

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  4. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Multimedia

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  5. Professional identity formation in medical education for humanistic, resilient physicians: pedagogic strategies for bridging theory to practice.

    Science.gov (United States)

    Wald, Hedy S; Anthony, David; Hutchinson, Tom A; Liben, Stephen; Smilovitch, Mark; Donato, Anthony A

    2015-06-01

    Recent calls for an expanded perspective on medical education and training include focusing on complexities of professional identity formation (PIF). Medical educators are challenged to facilitate the active constructive, integrative developmental process of PIF within standardized and personalized and/or formal and informal curricular approaches. How can we best support the complex iterative PIF process for a humanistic, resilient health care professional? How can we effectively scaffold the necessary critical reflective learning and practice skill set for our learners to support the shaping of a professional identity?The authors present three pedagogic innovations contributing to the PIF process within undergraduate and graduate medical education (GME) at their institutions. These are (1) interactive reflective writing fostering reflective capacity, emotional awareness, and resiliency (as complexities within physician-patient interactions are explored) for personal and professional development; (2) synergistic teaching modules about mindful clinical practice and resilient responses to difficult interactions, to foster clinician resilience and enhanced well-being for effective professional functioning; and (3) strategies for effective use of a professional development e-portfolio and faculty development of reflective coaching skills in GME.These strategies as "bridges from theory to practice" embody and integrate key elements of promoting and enriching PIF, including guided reflection, the significant role of relationships (faculty and peers), mindfulness, adequate feedback, and creating collaborative learning environments. Ideally, such pedagogic innovations can make a significant contribution toward enhancing quality of care and caring with resilience for the being, relating, and doing of a humanistic health care professional.

  6. 医生社会认同与医德的相关研究%Research on the Social Identity and Medical Ethics of Doctors

    Institute of Scientific and Technical Information of China (English)

    赵时蕙; 邓治文

    2015-01-01

    为了揭示医生社会认同与医德之间的关系,根据Tajfel的社会认同理论(social identity the-ory,SIT)和中国医生的实际情况分别确定医德和社会认同的维度,编制《医生医德问卷》和《医生社会认同问卷》,得出三大结论:(1)医生社会认同由认知、情感、动机、行为四个维度构成,医生医德由服务宗旨、秉承医德、和谐医患、廉洁行医、规范施治构成;(2)虽然医生的医德与社会认同总体相关不显著,但医德的五个维度与社会认同的四个维度之间呈现出不同程度的显著相关;(3)社会认同的认知维度对医德具有显著影响,医德的服务宗旨和和谐医患维度对社会认同具有显著影响.这些结论为积极培育医生医德,提升医生的社会认同具有理论与实践意义.%In order to reveal the relationship between doctors' social identity and medical ethics.According to the Tajfel the-ory SIT (identity) and Chinese doctors' actual conditions, respectively, the medical ethics and social identity of the dimension, the preparation of the "medical ethics questionnaire" and "doctors social identity questionnaire". Draw three conclusions: (1) consists of four dimensions: cognition, emotion, motivation, behavior constitutes the social identity of the doctor, doctor medical ethics by the purpose of service, adhering to the medical ethics, harmonious relationship between doctor and patient, honest practice, standardized treatment composition;(2) although the doctor's medical ethics and social identity overall was not significantly correlated, but between the four dimensions of medical ethics of the five dimensions and social identity showing varying degrees of significant correlation; (3)the cognitive dimension of social identity of medical ethics has significant effect, medical ethics principle of service and harmonious doctor-patient dimensions of social identity has significantly affected. These conclusions are of

  7. Technology identity: the role of sociotechnical representations in the adoption of medical devices.

    Science.gov (United States)

    Ulucanlar, S; Faulkner, A; Peirce, S; Elwyn, G

    2013-12-01

    This study explored the sociotechnical influences shaping the naturally-occurring adoption and non-adoption of device technologies in the UK's National Health Service (NHS), amid increasing policy interest in this area. The study was informed by Science and Technology Studies and structuration and Actor Network Theory perspectives, drawing attention to the performative capacities of the technology alongside human agentic forces such as agendas and expectations, in the context of structural and macro conditions. Eight technologies were studied using a comparative ethnographic case study design and purposive and snowball sampling to identify relevant NHS, academic and industry participants. Data were collected between May 2009 and February 2012, included in-depth interviews, conference observations and printed and web-based documents and were analysed using constructivist grounded theory methods. The study suggests that while adoption decisions are made within the jurisdiction of healthcare organisations, they are shaped within a dynamic and fluid 'adoption space' that transcends organisational and geographic boundaries. Diverse influences from the industry, health care organisation and practice, health technology assessment and policy interact to produce 'technology identities.' Technology identities are composite and contested attributes that encompass different aspects of the technology (novelty, effectiveness, utility, risks, requirements) and that give a distinctive character to each. We argue that it is these socially constructed and contingent heuristic identities that shape the desirability, acceptability, feasibility and adoptability of each technology, a perspective that policy must acknowledge in seeking to intervene in health care technology adoption.

  8. VEHICLE THEFT ALERT SYSTEM USING GSM

    Directory of Open Access Journals (Sweden)

    LAXMI

    2013-05-01

    Full Text Available In this technical world where technology is growing up day by day and scientific researches are presenting a new era of discoveries, we need security in all the areas. As theft activities are increasing around, we have need of more security in Automobiles/Vehicles. Today automobile industry is a major industry of the world and the vehicles need to be secured otherwise they will be packed gifts for the criminals given by our own hands. The main aim of this paper is to use wireless technology to intimate the owner of the vehicle about each and every unauthorized attempt of entry to his/her vehicle. The auto-generated Short Message Service by system is used to give information to the owner’s cell phone. And one more advantage of this project is that a back Short Message Service can be send by vehicle’s owner which will disable the ignition of the vehicle system and vehicle will be stopped. If system is active and if any unauthorized person tries to start the vehicle, the microcontroller used insystem gets an interrupt through a switch which is connected to the security system. Instantly microcontroller commands the Global System for Mobile modem to send an auto-generated message. The owner receives the Short Message Service alert in the form of some written text which is predefined in the system. If he is not sure about the jumper, owner can send a back message to the Global System for Mobile modem to ‘stop’. The Global System for Mobile modem which is interfaced to the microcontroller receives the message, according to the output of Global System for Mobile modem, micro controller disables the ignition, and it will result in stopping of the vehicle. Advancement to this system is that we can transmit auto-generated Multimedia Message Service instead of Short Message Service by using smart phone.

  9. ‘We Come as Doctors, We Come as Servants’ Medical Confidentiality and Professional Identity during the Great War

    Directory of Open Access Journals (Sweden)

    Noortje Jacobs

    2014-11-01

    Full Text Available This article explores discussions in the Nederlandsch Tijdschrift voor Geneeskunde (NTvG, the Dutch Journal of Medicine, over the limits of medical confidentiality during the First World War. In the early twentieth century, physicians in the Netherlands struggled with the socio-legal limits of the ‘physician’s oath’ (i.e. ‘artseneed’, the vow of secrecy sworn by Dutch medical doctors since 1878 at Dutch universities upon the acceptance of their profession. While the 1865 codification of medical confidentiality in the Netherlands had significantly contributed to the socio-legal status of the profession vis-à-vis ‘quacks’, it became clear in the late nineteenth and early twentieth century that the traditional ideal of the secret absolu did not fit well with the growth of modern state structures. With the development of elaborate bureaucratic institutions and the subsequent need for population statistics and formalized accountability mechanisms, Dutch physicians were asked more and more often to provide information which had traditionally fallen within the realm of medical confidentiality to third parties. This article examines this ‘dilemma of modernity’ by looking into discussions in the NTvG over the respective identities of military and civilian physicians between 1914 and 1918, and argues that, during the war years, the professional identity of the health officer – with his explicit double function as doctor and as servant – came to function as a projection screen for civilian physicians in the Netherlands to debate existing anxieties regarding their role in the modern Dutch state.

  10. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover... is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Federal Motor Vehicle Theft Prevention Standard, 49 CFR part...

  11. 77 FR 23320 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2006...

    Science.gov (United States)

    2012-04-18

    ... cars. The Act also addressed several other actions to reduce motor vehicle theft, such as increased... assist in deterring thefts. Rental and leasing companies also are required to provide annual theft reports to the agency. In accordance with 49 CFR 544.5, each insurer, rental and leasing company to...

  12. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... experienced a significant theft rate reduction after installation of a Pass-Key like antitheft device as... Bureau of Investigation's National Crime Information Center (NCIC) and compiled by the agency, show that theft rates are lower for exempted GM models equipped with the PASS-Key systems than the theft rates...

  13. [Social psychological determinants of the formation of medical students' professional identity. Possibilities of development].

    Science.gov (United States)

    Csörsz, Ilona

    2011-03-20

    Systematic observations regarding techniques of medical career-socialization has hardly ever appeared in Hungarian technical literature yet. Focusing on the need for practical medical training the author elaborated a career-socialization program consisting of a three-level, three-branch training technique. This consisted of a Junior Bálint-group, an imaginative visualization technique, and an expressive, drama-pedagogical working method completed with a projective technique. This career-socialization program focuses on the physician's personality, capability-expansion in relationship management, and practicing a set of professional behavior-roles. During the empirical observations connected to the work the author examined medical students' patient-representation, their relation to the patients, and the development of the physician's professional character. Within the frames of this three-level, three-branch training technique program it enables us to observe which training technique is able to reveal all those psychological qualities that can contribute to the conformation of the representations, thus to the process of career-socialization in the most effective way. The content-analyses of the cases of Junior Bálint-groups (n = 60) revealed that the most frequent problems are fear of intimacy, of bodily contact, communication with patients in a chronic or terminal state, and the fear of medical practice. The content-analyses of imaginary patient-images (n = 62) with Rorschach-signs confirmed that the psychological burdens mentioned above are the most serious problems for medical students. The process-, and content-analyses of drama-games, the integrative healing contact training groups (n = 74) showed that group work primarily intensifies the relationship responsiveness, the ability to adopt the other's (the patient's) viewpoints, and enables an involuntary and distressless identification with the patient and the physician, both agents in the healing relationship

  14. Language barriers and professional identity: A qualitative interview study of newly employed international medical doctors and Norwegian colleagues.

    Science.gov (United States)

    Skjeggestad, Erik; Gerwing, Jennifer; Gulbrandsen, Pål

    2017-08-01

    To explore how language barriers influence communication and collaboration between newly-employed international medical doctors and Norwegian health personnel. Interviews were conducted with 16 doctors who had recently started working in Norway and 12 Norwegian born health personnel who had extensive experience working with international medical doctors. Analyses were consistent with principles of systematic text condensation. All participants experienced that language barriers caused difficulties in their everyday collaboration. Furthermore, the participants' descriptions of "language barriers" encompassed a wide range of topics, including semantics (e.g., specialized professional vocabulary, system knowledge), pragmatics (e.g., using language in doctor-patient and interprofessional interactions), and specific culturally sensitive topics. All participants described that language barriers provoked uncertainty about a doctor's competence. Newly employed international medical doctors and their colleagues are concerned by ineffective communication due to language barriers. Experiences of language barriers threaten professional identity as a competent and effective doctor. Newly employed doctors who are non-native speakers could benefit from support in understanding and handling the array of barriers related to language. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. “The problem here is that they want to solve everything with pills”: Medication use and identity among Mainland Puerto Ricans

    Science.gov (United States)

    Adams, Wallis E.; Todorova, Irina L. G.; Guzzardo, Mariana T.; Falcon, Luis M.

    2014-01-01

    Taking medications are complex symbolic acts, infused with diverse meanings regarding body and identity. This paper focuses on the meanings of medications for older Puerto Ricans living on the United States mainland, a population experiencing stark health disparities. We aim to gain an understanding of the way multiple cultural and personal meanings of medications are related to and integrated in identity, and to understand how they are situated within Puerto Rican culture, history and situation on the US mainland. Data is drawn from thirty qualitative interviews, transcribed and translated, with older Puerto Ricans living on mainland United States. Thematic Analysis indicated four prevalent themes: Embodiment of medication use; Medications redefining self through the fabric of daily life; Healthcare experience defined through medication; and Medicine dividing the island and the mainland. While identity is impacted by experience of chronic illness, the experience of medication prescription and consumption is further related to the construction of the sense of self in distinct ways. For these individuals, medication use captures the dilemma of immigration. While cultural belonging and well-being remains on the island of Puerto Rico, the mainland hosts both easier access to and excess reliance on medication. PMID:25720591

  16. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  17. An Authentication Middleware for Prevention of Information Theft

    Directory of Open Access Journals (Sweden)

    S. Kami Makki

    2015-05-01

    Full Text Available Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacity and data transmission speed. Furthermore, these devices can easily be misplaced or stolen and sensitive data can easily be exposed. In this paper we present a multilevel password verification system for prevention of information theft by removable devices to protect data leakage by various portable devices. Our proposed system consists of three main modules: 1 portable storage device monitoring, 2 activity logging and data encryption, and 3 device authorization. These modules cooperate with each other to provide required security, and prevent information theft from the individual users and companies.

  18. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  19. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  20. A novel anti-theft security system for photovoltaic modules

    Science.gov (United States)

    Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong

    2017-04-01

    Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.

  1. Identity construction in the medical field of the current Colombian health system: an approach from Pierre Bourdieu’s field analysis

    Directory of Open Access Journals (Sweden)

    Victoria E. González C

    2012-02-01

    Full Text Available This paper presents the possibility of addressing the issue of identity construction from the standpoint of Pierre Bourdieu’s field analysis. The question addressed in the review is “how is field theory applied to identity construction?” Initially, a brief overview of the micro/macro and action/structure integration in contemporary sociology is presented together with Bourdieu’s field theory. Then, the concept of identity is presented from the standpoint of distinguishability. Finally, and as an example, the authors discuss the application of field analysis to the theoretical and methodological approach of the medical field.

  2. “Just Advil”: Harm reduction and identity construction in the consumption of Over-The-Counter medication for chronic pain Social Science & Medicine

    Science.gov (United States)

    2015-01-01

    Direct-to-consumer marketing has sparked ongoing debate concerning whether ads empower consumers to be agents of their own care or shift greater control to the pharmaceutical industry. Ads for over-the-counter (OTC) medications in particular portend to offer simple, harmless solutions for meeting the demands of social life. Rather than join the longstanding debate between consumer agency and social control in pharmaceutical advertising, I approach self-medication with over-the-counter (OTC) analgesics using Harm Reduction as a framework. From this perspective, consumption of OTC analgesics by chronic pain sufferers is a means of seeking some level of relief while also avoiding the stigma associated with prescription pain medication. Qualitative methods are used to analyze data from two sources: (1) semi-structured qualitative interviews with 95 participants in a trial examining the effectiveness of Traditional Chinese Medicine for Temporomandibular Disorders (TMD) from 2006 to 2011 in Tucson, AZ and Portland, OR; and (2) print, online, and television advertisements for three major brands of OTC pain medication. Participants described their use of OTC medications as minimal, responsible, and justified by the severity of their pain. OTC medication advertising, while ostensibly ambiguous and targeting all forms of pain, effectively lends support to the consumption of these medication as part of the self-projects of chronic pain sufferers, allowing them to reconcile conflicting demands for pain relief while being stoic and maintaining a positive moral identity. Describing OTC medication as “just over-the-counter” or “not real pain medication,” sufferers engage in ideological harm reduction, distinguishing themselves from “those people who like taking pain medication” while still seeking relief. Justifying one’s use of OTC medication as minimal and “normal,” regardless of intake, avoids association with the addictive potential of prescription pain

  3. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  4. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  5. Automatic Meter Reading and Theft Control System by Using GSM

    Directory of Open Access Journals (Sweden)

    P. Rakesh Malhotra

    2013-04-01

    Full Text Available This paper deals with automatic meter reading and theft control system in energy meter. Current transformer is used to measure the total power consumption for house or industrial purpose. This recorded reading is transmitted to the electricity board for every 60 days once. For transmitting the reading of energy meter GSM module is used. To avoid theft, infrared sensor is placed in the screw portion of energy meter seal. If the screw is removed from the meter a message is sent to the electricity board. The measuring of energy meter and monitoring of IR sensor is done with a PIC microcontroller.The informative system will be helpful for the electricity board to monitor the entire supply and the correct billing accordingly without any mishap. This model reduces the manual manipulation work andtheft control.

  6. Smartphone User Identity Verification Using Gait Characteristics

    OpenAIRE

    Robertas Damaševičius; Rytis Maskeliūnas; Algimantas Venčkauskas; Marcin Woźniak

    2016-01-01

    Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers). The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. ...

  7. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors ...magazine-feature-article-september-2014. pdf ?sfvrsn=2, 12. 2 “Copper Theft Threatens U.S. Critical Infrastructure,” Federal Bureau of Investigation...www.nerc.com/files/6_Dabdoub_10-20_v2. pdf . 10 Jasvir Gill, Continuous Monitoring: A New Approach to Secure Critical Infrastructure (Atlanta, GA: North

  8. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  9. Why is online piracy ethically different from theft? A vignette experiment.

    OpenAIRE

    Wojciech Hardy; Michał Krawczyk; Joanna Tyrowicz

    2013-01-01

    This study employs a vignette experiment to inquire, which features of online “piracy” make it ethically discernible from a traditional theft. This question is pertinent since the social norm concerning traditional theft is starkly different from the evidence on ethical evaluation of online “piracy”. We specifically distinguish between contextual features of theft, such as for example the physical loss of an item, breach of protection, availability of alternatives, emotional proximity to the ...

  10. Hands in medicine: understanding the impact of competency-based education on the formation of medical students’ identities in the United States

    Directory of Open Access Journals (Sweden)

    Catherine Gonsalves

    2016-08-01

    Full Text Available Purpose There have been critiques that competency training, which defines the roles of a physician by simple, discrete tasks or measurable competencies, can cause students to compartmentalize and focus mainly on being assessed without understanding how the interconnected competencies help shape their role as future physicians. Losing the meaning and interaction of competencies can result in a focus on ‘doing the work of a physician’ rather than identity formation and ‘being a physician.’ This study aims to understand how competency-based education impacts the development of a medical student’s identity. Methods Three ceramic models representing three core competencies ‘medical knowledge,’ ‘patient care,’ and ‘professionalism’ were used as sensitizing objects, while medical students reflected on the impact of competency-based education on identity formation. Qualitative analysis was used to identify common themes. Results Students across all four years of medical school related to the ‘professionalism’ competency domain (50%. They reflected that ‘being an empathetic physician’ was the most important competency. Overall, students agreed that competency-based education played a significant role in the formation of their identity. Some students reflected on having difficulty in visualizing the interconnectedness between competencies, while others did not. Students reported that the assessment structure deemphasized ‘professionalism’ as a competency. Conclusion Students perceive ‘professionalism’ as a competency that impacts their identity formation in the social role of ‘being a doctor,’ albeit a competency they are less likely to be assessed on. High-stakes exams, including the United States Medical Licensing Exam clinical skills exam, promote this perception.

  11. Hands in medicine: understanding the impact of competency-based education on the formation of medical students’ identities in the United States

    Directory of Open Access Journals (Sweden)

    Catherine Gonsalves

    2016-08-01

    Full Text Available Purpose There have been critiques that competency training, which defines the roles of a physician by simple, discrete tasks or measurable competencies, can cause students to compartmentalize and focus mainly on being assessed without understanding how the interconnected competencies help shape their role as future physicians. Losing the meaning and interaction of competencies can result in a focus on ‘doing the work of a physician’ rather than identity formation and ‘being a physician.’ This study aims to understand how competency-based education impacts the development of a medical student’s identity. Methods Three ceramic models representing three core competencies ‘medical knowledge,’ ‘patient care,’ and ‘professionalism’ were used as sensitizing objects, while medical students reflected on the impact of competency-based education on identity formation. Qualitative analysis was used to identify common themes. Results Students across all four years of medical school related to the ‘professionalism’ competency domain (50%. They reflected that ‘being an empathetic physician’ was the most important competency. Overall, students agreed that competency-based education played a significant role in the formation of their identity. Some students reflected on having difficulty in visualizing the interconnectedness between competencies, while others did not. Students reported that the assessment structure deemphasized ‘professionalism’ as a competency. Conclusion Students perceive ‘professionalism’ as a competency that impacts their identity formation in the social role of ‘being a doctor,’ albeit a competency they are less likely to be assessed on. High-stakes exams, including the United States Medical Licensing Exam clinical skills exam, promote this perception.

  12. Hands in medicine: understanding the impact of competency-based education on the formation of medical students’ identities in the United States

    Science.gov (United States)

    2016-01-01

    Purpose There have been critiques that competency training, which defines the roles of a physician by simple, discrete tasks or measurable competencies, can cause students to compartmentalize and focus mainly on being assessed without understanding how the interconnected competencies help shape their role as future physicians. Losing the meaning and interaction of competencies can result in a focus on ‘doing the work of a physician’ rather than identity formation and ‘being a physician.’ This study aims to understand how competency-based education impacts the development of a medical student’s identity. Methods Three ceramic models representing three core competencies ‘medical knowledge,’ ‘patient care,’ and ‘professionalism’ were used as sensitizing objects, while medical students reflected on the impact of competency-based education on identity formation. Qualitative analysis was used to identify common themes. Results Students across all four years of medical school related to the ‘professionalism’ competency domain (50%). They reflected that ‘being an empathetic physician’ was the most important competency. Overall, students agreed that competency-based education played a significant role in the formation of their identity. Some students reflected on having difficulty in visualizing the interconnectedness between competencies, while others did not. Students reported that the assessment structure deemphasized ‘professionalism’ as a competency. Conclusion Students perceive ‘professionalism’ as a competency that impacts their identity formation in the social role of ‘being a doctor,’ albeit a competency they are less likely to be assessed on. High-stakes exams, including the United States Medical Licensing Exam clinical skills exam, promote this perception. PMID:27572244

  13. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... various electromagnetic radiations. Suzuki stated that although there is no theft data available to show... publication requirements incident to the disposition of all part 543 petitions. Advanced listing,...

  14. Boxer crabs induce asexual reproduction of their associated sea anemones by splitting and intraspecific theft.

    Science.gov (United States)

    Schnytzer, Yisrael; Giman, Yaniv; Karplus, Ilan; Achituv, Yair

    2017-01-01

    Crabs of the genus Lybia have the remarkable habit of holding a sea anemone in each of their claws. This partnership appears to be obligate, at least on the part of the crab. The present study focuses on Lybia leptochelis from the Red Sea holding anemones of the genus Alicia (family Aliciidae). These anemones have not been found free living, only in association with L. leptochelis. In an attempt to understand how the crabs acquire them, we conducted a series of behavioral experiments and molecular analyses. Laboratory observations showed that the removal of one anemone from a crab induces a "splitting" behavior, whereby the crab tears the remaining anemone into two similar parts, resulting in a complete anemone in each claw after regeneration. Furthermore, when two crabs, one holding anemones and one lacking them, are confronted, the crabs fight, almost always leading to the "theft" of a complete anemone or anemone fragment by the crab without them. Following this, crabs "split" their lone anemone into two. Individuals of Alicia sp. removed from freshly collected L. leptochelis were used for DNA analysis. By employing AFLP (Fluorescence Amplified Fragments Length Polymorphism) it was shown that each pair of anemones from a given crab is genetically identical. Furthermore, there is genetic identity between most pairs of anemone held by different crabs, with the others showing slight genetic differences. This is a unique case in which one animal induces asexual reproduction of another, consequently also affecting its genetic diversity.

  15. ' Emotional Learning and Identity Development in Medicine : A Cross-Cultural Qualitative Study Comparing Taiwanese and Dutch Medical Undergraduates

    NARCIS (Netherlands)

    Helmich, Esther; Yeh, Huei-Ming; Yeh, Chi-Chuan; de Vries-Erich, Joy M; Tsai, Daniel Fu-Chang; Dornan, Tim

    Purpose Current knowledge about the interplay between emotions and professional identity formation is limited and largely based on research in Western settings. This study aimed to broaden understandings of professional identity formation cross-culturally. Method In fall 2014, the authors

  16. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor... is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... the MY 2014 S60 vehicle line is effective in reducing and deterring motor vehicle theft. Volvo...

  17. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor... on the line as standard equipment is likely to be as effective in reducing and deterring motor... deterring motor vehicle theft as compliance with ] the parts-marking requirements of the Theft...

  18. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ... passenger cars. The Act also addressed several other actions to reduce motor vehicle theft, such as... taken by insurers to assist in deterring thefts. Rental and leasing companies also are required to... leasing company to which this regulation applies must submit a report annually not later than October...

  19. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... vehicle lines experienced a significant theft rate reduction after installation of a Pass-Key like... by the Federal Bureau of Investigation's National Crime Information Center (NCIC) and compiled by the agency, show that theft rates are lower for exempted GM models equipped with the PASS-Key like...

  20. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... antitheft devices already installed in the Aston Martin Vantage, BMW 6-series and Porsche 911 vehicle lines... average theft rate for the BMW 6-series with an immobilizer was 2.3505 in MY/CY 2005 and 1.6227 in MY/CY... effective in contributing to an additional (31%) reduction in the theft rate of the BMW 6-series...

  1. Considering effect of organizational identity and commitment on job performance of staff of Guilan University of medical science regarding mediating role of organizational citizenship behavior

    Directory of Open Access Journals (Sweden)

    Fereshteh Ebrahimzadeh

    2016-12-01

    Full Text Available The main goal of this research is studying the effect of organizational commitment and identity on job performance of staff of Guilan University of medical science regarding mediating role of organizational citizenship behavior. Current research is descriptive and its goal is applied and method of data collection is field and its tool is questionnaire. In current research considering statistical society are staff of Guilan University of medical science about 540 people. Regarding the whole number of statistical society and Morgan table number of sample volume are 224 people that 550 questionnaires were distributed by using simple random sampling. Finally 226 questionnaires were collected from staff and information wereanalyzed. Result showed that organizational commitment, organizational identity an organizational citizenship behavior has positive and direct effect on job performance of staff. Also occurrence of organizational citizenship behavior cansincrease severity of effect of identity and commitment of organization on job performance of staff. Organizations can increase job performance of staff by using result of this research and seeming positive effect of organizational commitment and identity and citizenship behavior and strengthening each one and lead in the direction of organizational goals.

  2. JavaScript Theft Detection using Birthmark and Subgraph Isomorphism

    OpenAIRE

    Nayakoji, Snehal N; Sonavane, S P

    2014-01-01

    In the web community, JavaScript has become one of the widely used languages. The facility of view source code, provided by many browsers, made easy to copy the JavaScript source code of any webpage. It leads to a serious threat of IPR law infringement. This problem of JavaScript theft can be addressed effectively with the help of novel scheme of deriving a birthmark which is the signature drawn from the program. As software birthmark represents unique characteristics of the program, this can...

  3. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to..., therefore, whether such line will be subject to the requirements of this theft prevention standard. Purpose...

  4. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  5. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  6. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  7. Personal messages reduce vandalism and theft of unattended scientific equipment

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-01-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40–60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure. PMID:25866614

  8. Automotive Parking Lot and Theft Detection through Image Processing

    Directory of Open Access Journals (Sweden)

    2013-10-01

    Full Text Available Automotive parking lot and theft detection through image processing is a smart parking lot which will save time for the owner to park his car in a more organized way and also prevent theft of the car. It is a technology to optimize the checkout process by analysing a database of images of number plates of cars. The heart of the project is based on image processing. The images of number plates will be detected by Matlab and a picture of the driver will be saved in a similar database. As soon as both the images are saved, the garage entrance pole will shift 90 degrees upward using a DC MOTOR and will remain in that position for 30 seconds to allow the car to enter. After 30 seconds it will return back to its previous position. When the car exits the earlier steps will be repeated and Matlab will match both the images that were taken during entering and leaving. Meanwhile the seven segment display will show that a car has left the parking lot, by decrementing a number from its display. The cars are controlled by a microcontroller which is also able to detect and display if a vacant parking space is available. If there is no vacancy a red LED lights up, where as a green LED is used to display presence of parking space along with how many parking spots are available. It is applicable to be used in super market car parking lots and also apartment garages.

  9. Developing a Patient Focussed Professional Identity: An Exploratory Investigation of Medical Students' Encounters with Patient Partnership in Learning

    Science.gov (United States)

    Barr, Jennifer; Bull, Rosalind; Rooney, Kim

    2015-01-01

    Patient encounters are central to the provision of learning opportunities for medical students and their development as medical professionals. The primary aim of the study reported in this paper was to discover how partnering medical students with patients with chronic illness in undergraduate learning influenced the development of a patient…

  10. YI Suki's Yŏksimanpil and the Professional Identity of a Chung'in Medical Official in Eighteenth Century Chosŏn Korea.

    Science.gov (United States)

    Yi, Kiebok

    2013-08-01

    About one hundred years after the publication of Tongŭibogam (1613), a physician at the court YI Suki (1664-?) wrote a medical manuscript titled Yŏksimanpil (Miscellaneous Jottings on Medical Experiences and Tests, 1734). As indicated in its title, Yŏksimanpil was a medical essay composed of 130 medical case histories, drawing on what YI Suki himself had experienced in his medical practices. This paper examines the messages YI Suki in Yŏksimanpil tried to address to his fellow Korean doctors, and by doing so illuminates an aspect of the medicine in the late Chosŏn period. The argument goes that YI Suki wrote Yŏksimanpil as a vehicle for promulgating his professional identity as a bureaucratic physician who belonged to the network of the chung'in technical officials-a group of government technical functionaries in late Chosŏn Korea. Throughout the late Chosŏn period, the chung'in technical officials had been discriminated, institutionally and socioculturally, against the yangban literati, while their promotion to honored higher positions was blocked. It was in the late 17th and early 18th century that a group of chung'in officials tried to secure their sociocultural places for their professional activity, thus bringing to light their social and professional identity in Chosŏn society. A member of the network of the chung'in technical officials in the early 18th century, YI Suki was in an effort to position himself as a doctor somewhere between the medical tradition and the Confucian literary tradition. In these sociocultural contexts, we can see more clearly what YI Suki tried to speak of in his book and the historical meaning of the medical writing Yŏksimanpil. First, the way he practiced medicine was testing and confirming what the received medical textbooks had asserted (Chŭnghŏmkobang). This style of practicing medicine could be viewed as a reflection of the comprehensivity trait of bureaucratic court physicians network YI Suki belonged to. Also this

  11. Stealing land in the name of religion: A Rastafari religio-political critique of land theft by global imperial forces

    Directory of Open Access Journals (Sweden)

    Roderick Hewitt

    2016-02-01

    Full Text Available The issue of land has been central to Rastafari origins and ideological construct. Ethiopia, Africa, Babylon, Zion and Jamaica are symbols that point not only to physical location but also their ideological and psychological identity formation. This article uses Rastafari hermeneutics to critique the phenomenon of African Jamaican uprooting and dispossession of and from their land by powerful and global conglomerate forces that use the instrument of politics, economic and religion to accomplish their agenda. This article uses the Rastafari theological reflections, a theoretical framework that employs the phenomenon of faith, tradition and experience to interrogate the phenomenon of displacement of people through land theft. The religio-political narrative of Jamar Rolando McNaughton Jr, a young Jamaican reggae artist popularly known by his stage name Chronixx, will serve as the principal lens through which to interrogate the phenomenon of landlessness among the poor, primarily within the Jamaican context.

  12. Evaluation of a MEMS based theft detection circuit for RFID labels

    Science.gov (United States)

    Ranasinghe, Damith C.; Cole, Peter H.

    2005-06-01

    In the proliferation of RFID technology anti-theft labels are continuing to evolve. In the functional hierarchy of RFID labels the battery-powered labels are a set of higher class labels referred to as active labels. Often these labels are employed for the tagging of expensive goods, with aim of both tracking and preventing the theft of the item. The battery powering such active labels must have very low internal and external current drain in order to prolong the life of the battery while being in a state of functionality to signal a theft of the labelled item. However due to circuit complexity or the desired operating range the electronics may drain the battery more rapidly than desired and the label may not last the shelf life of the product. The theft detection mechanism presented in this paper conserves power and thus prolongs the battery life of an active anti-theft label. A solution available for the development of such a theft detection circuit uses electroacoustic energy conversion using a MEMS device on a label IC to provide a high sensitivity result. This paper presents the results of an analysis conducted to evaluate the performance and the capabilities of such a theft detection circuit.

  13. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National Highway Traffic Safety Administration... full General Motors Corporation's (GM) petition for an exemption of the Cadillac SRX vehicle line...

  14. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK

    Science.gov (United States)

    Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use. PMID:27643788

  15. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... body control module/immobilizer control (BCM), an immobilizer antenna, security indicator light... Insurance Crime Bureau's data which it stated showed a 70% reduction in theft when comparing the MY...

  16. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov...

  17. On Using TPM for Secure Identities in Future Home Networks

    Directory of Open Access Journals (Sweden)

    Georg Carle

    2011-01-01

    Full Text Available Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

  18. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... Detection, Prevention, and Mitigation J Appendix J to Part 571 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Pt. 571, App. J Appendix J to Part 571... to this Appendix J. (1) Alerts, notifications, or other warnings received from consumer...

  19. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Pt. 717, App. J Appendix J to Part 717... appended as Supplement A to this appendix J. (1) Alerts, notifications, or other warnings received...

  20. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Pt. 41, App. J Appendix J to Part 41—Interagency Guidelines... J. (1) Alerts, notifications, or other warnings received from consumer reporting agencies or...

  1. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    monitoring service. FTC and others have suggested that consumers take advantage of the free credit monitoring that is sometimes offered after a data breach...its unfair billing practices, reimburse consumers approximately $55,000, and pay a $1.2 million civil money penalty. • Consumerinfo.com/Experian...federal laws and regulations that govern the sharing and protection of personal information, and that prohibit unfair or deceptive acts or practices

  2. Cyber self-defense expert advice to avoid online predators, identity theft, and cyberbullying

    CERN Document Server

    Moore, Alexis

    2014-01-01

    Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies from former cyberstalking victim, Alexis Moore. As the founder of Survivors in Action, Moore explains how to identify potential cyberattackers and how to recover from a cybercrime if you've been attacked. Her indispensable book can help you remain secure and safe in today's dangerous digital world and take back control of your life. 

  3. Online Identity Theft%在线身份窃取攻击

    Institute of Scientific and Technical Information of China (English)

    杜跃进

    2005-01-01

    通过网络仿冒进行金融欺诈活动是当前的安全热点问题之一,越来越引起人们的重视.本文介绍了网络仿冒等在线身份窃取类攻击的有关情况和技术特点,并介绍了应对此类攻击的一些问题.

  4. Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors

    Directory of Open Access Journals (Sweden)

    Thomas Nagunwa

    2015-05-01

    Full Text Available Increased consumer anti-phishing awareness and improved anti-spam technologies has gradually reduced the impact of traditional phishing spams in recent years. To keep up their game in a multi-billion dollar cybercrime industry, hackers have been continuously innovative in developing polymorphic phishing vectors. Spear phishing, malware, search engines poisoning, use of rogue Secure Socket Layer (SSL certificates, mobile and social media attacks are among the modern and prominent vectors for phishing attacks today. This paper examines today’s most adopted phishing vectors by cybercriminals as observed by security vendors, security analysts and anti-phishing campaigners. Learning the current landscape of these vectors is a key step in developing effective technological, social and legal devices to mitigate the impacts of these threats across the globe. The paper concludes that almost of all today’s phishing attacks begin with spear phishing. Phishers focus more their attacks towards small and medium enterprises. Malware toolkits are the key player in all major attacks. Mobile and social media attacks have rapidly grown recently and promise to be the future of phishing.

  5. Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors

    OpenAIRE

    Thomas Nagunwa

    2015-01-01

    Increased consumer anti-phishing awareness and improved anti-spam technologies has gradually reduced the impact of traditional phishing spams in recent years. To keep up their game in a multi-billion dollar cybercrime industry, hackers have been continuously innovative in developing polymorphic phishing vectors. Spear phishing, malware, search engines poisoning, use of rogue Secure Socket Layer (SSL) certificates, mobile and social media attacks are among the modern and prominent vectors for ...

  6. Protection of Patient Identity and Privacy Using Vascular Biometrics

    OpenAIRE

    C.Lakshmi Deepika; A.Kandaswamy; C.Vimal

    2010-01-01

    Biometric systems are being used in hospitals to streamline patient registration and identification, as an effective measure to protect patient privacy and prevent identity theft. Many Hospitals and Healthcare institutions are turning towards Vascular Biometrics which complement the biometric recognition with hygiene and improved accuracy. In this paper, a multimodal hand vein system and a multibiometric fingerprint-hand vein biometric system are proposed. The multimodal hand vein system is a...

  7. Ontology Of Trusted Identity In Cyberspace

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2011-04-01

    Full Text Available The nation’s digital infrastructure is in jeopardy because of inadequate provisions for privacy, identity, and security.  Recent Internet activity has resulted in an onslaught of identity theft, fraud, digital crime, and an increasing burden to responsible citizens.  The computer security and Internet communities have been generally responsive but apparently ineffective, so it is time for a third party to step in, take charge, and provide an infrastructure to assist in protecting individuals and non-person entities.  This paper is a contribution to the domain of ontological commitment as it applies to a description of subjects, objects, actions, and relationships as they pertain to the National Strategy of Trusted Identity in Cyberspace initiative.     

  8. Digital Identities and the Promise of the Technology Trio: PKI, Smart Cards, and Biometrics

    Directory of Open Access Journals (Sweden)

    A. M. Al-Khouri

    2007-01-01

    Full Text Available This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust and trusted identification and authentication infrastructure. The article concludes that such infrastructure may provide the foundation for e-government and e-commerce initiatives as it addresses the need for strong user authentication of virtual identities.

  9. RECURRENCE OF THEFTS IN THE SYSTEM OF ACQUISITIVE CRIMES AND ITS PREVENTION

    Directory of Open Access Journals (Sweden)

    Elnur Mamadalieva MELIKOV

    2015-01-01

    Full Text Available The article focuses on the status of acquisitive crimes in Russia, including the territory of the Siberian Federal district. The article presents points of views of different scientists, makes the analysis of criminal cases considered by the Octyabrsky District Court of Novosibirsk in 2011-2014 against perpetrators of repeated thefts, describes the main types of thefts in the Russian Federation and their share in the overall structure of crimes, reflects the main reasons for their occurrence and objects of theft, analyzes the thefts of other people’s properties committed in complicity, as well as crimes that have not been completed for reasons not depending on criminals, i.e. attempted crimes. The article proposes effective measures to prevent theft, both at the level of the state and of the victims, includes recommendations for the protection of houses from burglars. It is recommended to revive by the government the pioneering institute in the primary education system of the country, to revive the national ideology and the devotion to the Homeland, law and society, conscientious attitude to labour and public property, the development of spiritual culture, to organize leisure and instill moral and ethical norms of behavior of juveniles. 

  10. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  11. Augmenting the Cartesian medical discourse with an understanding of the person's lifeworld, lived body, life story and social identity.

    Science.gov (United States)

    Sunvisson, Helena; Habermann, Barbara; Weiss, Sara; Benner, Patricia

    2009-10-01

    Using three paradigm cases of persons living with Parkinson's Disease (PD) the authors make a case for augmenting and enriching a Cartesian medical account of the pathophysiology of PD with an enriched understanding of the lived body experience of PD, the lived implications of PD for a particular person's concerns and coping with the illness. Linking and adding a thick description of the lived experience of PD can enrich caregiving imagination and attunement to the patient's possibilities, concerns and constraints. The work of Merleau-Ponty is used to articulate the middle terms of the lived experience of dwelling in a lifeworld. Examining lived experience of embodied intentionality, skilled bodily capacities as highlighted in Merleau-Ponty's non-mechanistic physiology opens new therapeutic, coping and caregiving possibilities. Matching temporal rhythms can decrease the stress of being assisted with activities of daily living. For example, caregivers and patients alike can be taught strategies for extending their lived bodily capacities by altering rhythms, by shifting hyperactivity to different parts of the body and other strategies that change the perceptual experience associated with walking in different environment. A medical account of the pathophysiology of PD is nessessary and useful, but not sufficient for designing caregiving in ways that enrich and extend the existential skills of dwelling of persons with PD. The dominance of mechanistic physiology makes caregivers assume that it is the 'real discourse' about the disease, causing researchers and caregivers alike to overlook the equally real lived experience of the patient which requires different descriptive discourses and different sources of understanding. Lack of dialogue between the two discourses is tragic for patients because caregivers need both in order to provide attuned, effective caregiving.

  12. Identity Change

    Science.gov (United States)

    Burke, Peter J.

    2006-01-01

    This research examines two mechanisms by which persons' identities change over time. First, on the basis of identity control theory (ICT), I hypothesize that while identities influence the way in which a role is played out, discrepancies between the meanings of the identity standard and the meanings of the role performance will result in change.…

  13. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... TRANSPORTATION National Highway Traffic Safety Administration Federal Motor Vehicle Theft Prevention Standard... to the requirements of the Federal motor vehicle theft prevention standard. The final rule also... INFORMATION section and Appendix A-I listing of the final rule. All previous information associated with the...

  14. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence

    NARCIS (Netherlands)

    Koot, H.M..; Lier, van P.A.C.; Vitaro, F.; Tremblay, R.; Barker, E.D.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism

  15. The intermediate function: From the figure of the trainee in the community to the medical record as a biographical document for recomposition of identity

    Directory of Open Access Journals (Sweden)

    Francesca Sandri

    2014-09-01

    Full Text Available This work originates from a reflection on trainees connecting and mediation potentials held inside a community structure. These potentials are characterized by the trainees role which is temporary and by a temporary sense of belonging. These potentials may enable the trainee to become a functional component in the healing process and assume different roles left open by operators, families and services, so as to strengthen the working net. Our reflection indicates that the biographical reconstruction of a patient activates a recovery process of his family narrative history and also a deeper consciousness of his mental suffering during his life, which involves the team, patient and his family. The deeper consciousness enables a redefinition of individual projects that are coherent with the history and needs of the patient. A medical record may therefore become a biographical document, where different narratives converge, including the delirious one and that which is broken up by the patient who participates in a possible healing process, where the patient continuously regains possession of a coherent version of his identity and history, through his surrounding environment.Keywords: Community psychotherapy; Network working group; Medical record as a biographical document

  16. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  17. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  18. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  19. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  20. Corporate Visual Identity of the University of Medical Sciences of Cienfuegos. Identidad visual corporativa de la Universidad de Ciencias Médicas de Cienfuegos.

    Directory of Open Access Journals (Sweden)

    Gehnny Riverón Álvarez

    2011-10-01

    Full Text Available Law No. 218/2009, issued by the Ministry of Economy and Planning on May 15th, 2009 states the transformation of the "Medicine School of Cienfuegos: Dr. Raúl Dorticós Torrado", into the "University of Medical Sciences of Cienfuegos", maintaining the same name. Therefore, the need for a new Corporate Visual Identity that allows our institution a new projection towards society has emerged and a corporate branding strategy has been designed for its identification. The present article describes the creative process, its foundations and symbols taken into account as it is described and regulated in the manual. This manual has been adopted by the Direction Board of University of Medical Sciences of Cienfuegos in the meeting from May 26th, 2011.En la Resolución No 218/2009, emitida por el Ministerio de Economía y Planificación el 15 de mayo del 2009 queda la Facultad de Ciencias Médicas de Cienfuegos - Dr. Raúl Dorticós Torrado- denominada Universidad de Ciencias Médicas de Cienfuegos. Surge entonces la necesidad de una nueva identidad visual corporativa que le permita proyectarse como una nueva entidad ante la sociedad. Por ello, se procede a la creación de una marca corporativa para la identificación de esta entidad. En este artículo se expone el proceso creativo, los fundamentos, simbolismos tomados en consideración, descritos y regulados en un manual. Este quedó aprobado por el Consejo Dirección de la Universidad de Ciencias Médicas de Cienfuegos, en su reunión de 26 de mayo del 2011.

  1. 医学科研院所的形象识别系统研究%Study of corporation identity system in Medical Scientific Research Institutions

    Institute of Scientific and Technical Information of China (English)

    车艳春; 何春艳; 王晓辉; 邵聪文

    2009-01-01

    企业形象识别系统战略的独特管理理论及主要方法已在许多企业中得以成功运用,自然也成为当前新形势下医学科研院所进行现代化管理值得借鉴的模式之一.根据企业形象识别系统的理论,对新形势下中国医学科学院、北京协和医学院医学牛物学研究所的形象识别系统进行了研究和设计,并在实际工作中逐步导入.通过埘企业形象识别系统导入过程的具体实践分析,探讨了其在医学科研院所管理工作中的重要作用及其导入过程中值得关注的问题.%The characteristic theory and main methods of the Corporation Identity System(CIS)have Successfully been applied in many corporations,resulting in simultaneous use by some medical scientif ic research institutions in their modern management under current new situations.In this paper,the new CIS system of the Institute was studied and designed based upon the CIS system theory followed by gradual introduction in the practical works.Via the demiled analysis of this CIS introduction in practice,the significance of this CIS system in management of medical scientific research institutions was investigated and some critical points needed to take care in the CIS intreduction process were concluded.

  2. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor... Transportation (DOT). ACTION: Grant of petition for exemption. SUMMARY: This document grants in full Toyota Motor... to be as effective in reducing and deterring motor vehicle theft as compliance with the...

  3. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor... of Toyota Motor North America, Inc's., (Toyota) petition for an exemption of the Corolla vehicle line... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with...

  4. 19 CFR 122.185 - Report of loss or theft of Customs access seal.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft of Customs access seal. 122.185 Section 122.185 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND... be promptly reported in writing by the employee to the port director. The Customs access seal may...

  5. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  6. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... Standard; Jaguar Land Rover North America Llc AGENCY: National Highway Traffic Safety Administration (NHTSA... full the Jaguar Land Rover North America LLC's, (Jaguar) petition for an exemption of the F-Type..., 2012, Jaguar requested an exemption from the parts-marking requirements of the Theft Prevention...

  7. Deterrence in the workplace: perceived certainty, perceived severity, and employee theft.

    Science.gov (United States)

    Hollinger, R C; Clark, J P

    1983-12-01

    The phenomenon of employee theft is examined empirically, utilizing a deterrence paradigm. Employees selected randomly from three different industry sectors and metropolitan areas were asked to self-report their involvement in a number of property theft activities within the employment setting. Using a weighted least-squares logit regression analysis, the study found that the perception of both the certainty and severity of organizational sanctions were related to employee theft. Males reported more theft than did females, but contrary to previous research, no gender/certainty or gender/severity interactions were observed. The best-fit model did, however, contain two significant first-order interactions: age/certainty and age/severity. These interactions strongly suggest that younger employees are not as deterrable as their older peers, especially under conditions of both high certainty and high severity of punishment. While a number of possible explanations might account for differential deterrability according to age, a commitment to or stakes in conformity explanation is proposed.

  8. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... Theft Prevention Standard; TESLA AGENCY: National Highway Traffic Safety Administration (NHTSA... full the petition of Tesla Motors Inc's. (Tesla) for an exemption of the Model S vehicle line in... Prevention Standard. Tesla requested confidential treatment for specific information in its petition. The...

  9. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... Standards; Theft Protection and Rollaway Prevention AGENCY: National Highway Traffic Safety Administration... rule published December 12, 2011, at 76 FR 77183, is extended. Comments must be received on or before... Privacy Act Statement in the Federal Register published on April 11, 2000 (65 FR 19477-78). Docket:...

  10. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... appropriate TTB officer that the beer cannot be salvaged and returned to the market for consumption or sale... unmerchantable, and must state why the beer cannot be salvaged and returned to the market for consumption or sale... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft...

  11. Development of an Anti-Theft Device using Motion Detection and Body Temperature

    Directory of Open Access Journals (Sweden)

    Rhowel Dellosa

    2014-12-01

    Full Text Available –The researcher aimed to design, assemble and determine the performance of the anti-theft device using motion detection and body temperature. The study utilized developmental design to observe the functionality of the device. Study showed that the anti-theft device can detect motion from a moving object for those with body temperature like human being, animals. A signal from the sensor circuits will trigger the receiver circuit to produce an audible sound that served as alarm. It was also found out that the output of the study is accurate in terms of detecting moving objects with body temperature during day and night times. The researchers formulated an evaluation instrument to determine its performance. Results showed that the device had a good performance and acceptable in terms of functionality. It is strongly recommended that further studies be conducted to enrich the anti-theft device using motion detection and body temperature in a controlled environment like museum and banks to determine the effectiveness of the integration of the anti-theft device.

  12. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT ISSUE AND SALE OF TREASURY... Bureau of the Public Debt, Division of Securities Operations, Department of the Treasury, Washington, DC... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft...

  13. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  14. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance... device to antitheft devices already installed in the Audi A3, Audi A4, and the Volkswagen Passat vehicle... the agency for the Audi A4 and Volkswagen Passat vehicle lines (with an immobilizer) which showed a...

  15. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ... Standard; Volkswagen AGENCY: National Highway Traffic Safety Administration (NHTSA), U.S. Department of... Volkswagen Group of America's (VW) petition for exemption of the Audi A4 allroad vehicle line in accordance... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  16. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  17. "Bait vehicle" technologies and motor vehicle theft along the southwest border.

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2007-09-01

    In 2005, over 33% of all the vehicles reported stolen in the United States occurred in the four southwestern border states of California, Arizona, New Mexico, and Texas, which all have very high vehicle theft rates in comparison to the national average. This report describes the utilization of 'bait vehicles' and associated technologies in the context of motor vehicle theft along the southwest border of the U.S. More than 100 bait vehicles are estimated to be in use by individual agencies and auto theft task forces in the southwestern border states. The communications, tracking, mapping, and remote control technologies associated with bait vehicles provide law enforcement with an effective tool to obtain arrests in vehicle theft 'hot spots'. Recorded audio and video from inside the vehicle expedite judicial proceedings as offenders rarely contest the evidence presented. At the same time, law enforcement is very interested in upgrading bait vehicle technology through the use of live streaming video for enhanced officer safety and improved situational awareness. Bait vehicle effectiveness could be enhanced by dynamic analysis of motor theft trends through exploitation of geospatial, timeline, and other analytical tools to better inform very near-term operational decisions, including the selection of particular vehicle types. This 'information-led' capability would especially benefit from more precise and timely information on the location of vehicles stolen in the United States and found in Mexico. Introducing Automated License Plate Reading (ALPR) technology to collect information associated with stolen motor vehicles driven into Mexico could enhance bait vehicle effectiveness.

  18. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  19. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  20. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  1. Investigation of the influence of professional identity on the personal development of medical post-graduates%专业认同对医学研究生个人发展的影响探讨

    Institute of Scientific and Technical Information of China (English)

    夏欧东; 孙乐栋; 余杨; 郑玮

    2016-01-01

    The professional identity of medical postgraduates has great influence on their profes-sional learning, career development and realization of self-value. The effect factors of the professional iden-tity are as following:the conflict between personal needs and professional requirements, professional employ-ment prospect, the social recognition of medical profession and individuality. In this article, we suggest a feasible way to improve the professional identity for medical postgraduates by developing an interest in medical profession, optimizing specialty structure and improving personal comprehensive quality.%医学研究生对所学专业的认同度会影响其学习进程、职业发展及自我价值的实现。个人需要和专业需要的矛盾、专业就业前景、专业社会认可度及个人人格等因素,将是医学研究生专业认同度高低的影响因素。建议从培养医学研究生专业兴趣、优化专业结构、正确的社会舆论及提高自我综合素质等方面,探索提高医学研究生专业认同度的可行之路。

  2. Study on the relationship between work engagement and specialty identity of medical students%医学生学习投入与专业认同关系的研究

    Institute of Scientific and Technical Information of China (English)

    刘玉梅; 薛勤; 姜珍珍; 邹扬; 汪年松

    2014-01-01

    Objective To know the status of work engagement and specialty identity of medical students. Methods Based on Utrecht work engagement scale (UWES) and vocational identity scale, 195 medical students and 99 non-medical students from Shanghai Jiao Tong University were investigated. Results Scores of work engagement and specialty identity of students from clinical medicine and stomatology were higher than that of students from preventive and laboratory medicine and nursing, with statistical significance. Students from clinical medicine had the highest score of specialty identity, while students from preventive and medicine had the lowest. Undergraduate students from clinical medicine had higher scores of work engagement and specialty identity than graduate students. There was a positive correlation between work engagement and specialty identity. There was no statistical significance in work engagement and specialty identity between medical and non-medical students. But medical students had higher sense of dedication, certainty, significance, self-efficacy and self-decision, with statistical significance. Conclusions The more specialty identity, the more work engagement. Work engagement and specialty identity of students in our study is not very much, but medical students had higher sense than non-medical students.%目的:了解医学生的学习投入与专业认同的情况。方法采用乌得勒支学习投入量表和职业认同量表,对上海交通大学医学院195名医学生进行调查,同时选取该校99名非医学生作为对照。结果临床医学、口腔医学专业学生专业课程与非专业课程学习投入较预防医学与医学检验、护理学专业学生高,专业认同强,差异有统计学意义。临床医学专业学生的专业认同最强,预防医学与医学检验专业学生的专业认同最弱。临床医学专业本科生较研究生专业课程学习投入多,专业认同强。医学不同专业、不同学历

  3. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  4. Securing the communication of medical information using local biometric authentication and commercial wireless links.

    Science.gov (United States)

    Ivanov, Vladimir I; Yu, Paul L; Baras, John S

    2010-09-01

    Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.

  5. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  6. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  7. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  8. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  9. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    2017-01-01

    , and theoretical foundation of the dissertation. Philosophically, the research rests on the central ANT concepts of symmetry, associations, and enactment with an inherent value of multiplicity. The philosophical position implies that the study of identity must be understood as the study of practices. This, in turn......Research in identity in general and professional identity specifically has seen an immense increase in recent years (Bauman 2004, Lawler 2014). Due to societal and technological developments, notions of what constitutes ‘the professional’ are subject to change. Thus, this dissertation rests...... on an understanding of professional identity as a moving concept that must be understood through its spatial and temporal contexts (Scanlon 2011). Accepting this position necessitates a reconsideration of the role that formal education plays in the development of professional identity of students. Researchers within...

  10. InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices

    Science.gov (United States)

    Gupta, Anand; Gupta, Deepank; Gupta, Nidhi

    People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).

  11. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  12. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  13. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  14. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available BACKGROUND: Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. METHODOLOGY AND PRINCIPAL FINDINGS: We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions. CONCLUSIONS AND SIGNIFICANCE: The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  15. Bridging Identities through Identity Change

    Science.gov (United States)

    Cantwell, Allison M.; Martiny, Sarah E.

    2010-01-01

    As indicated by Deaux and Burke (this volume), sociology and psychology have shared a tradition of discourse allowing social psychologists to build upon each other's ideas. A conversation between social identity theory and identity theory was initiated fifteen years ago and addressed the similarities and differences between these theories. This…

  16. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  17. Doctors aren't immune to theft and fraud

    Science.gov (United States)

    Marcus, Gary

    1995-01-01

    A chartered accountant says the problem of fraud within medical practices is far from rare, even though prevention is relatively simple. Gary Marcus provides advice to physicians about ways to spot fraud within their practices and things they can do to prevent it. No matter how small your practice or how long you have had the same employees, says Marcus, given the right circumstances anyone might steal from you. Imagesp940-a PMID:7697586

  18. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  19. 医学研究生创造性动机与专业认同及人格的关系%The Relationship between Creative Motivation and Specialty Identity , Personality in Medical Postgraduate

    Institute of Scientific and Technical Information of China (English)

    朱姝; 信宏

    2012-01-01

    The study of creative motivation of medical postgraduate in Jilin by questionnaires show that Unequal internal needs causes the difference between creative motivation and specialty identity of medical postgraduate in gender, degree type and specialty properties. The intrinsic motivation is closely related to the rewards of creative motivation and specialty identity. Creative motivation and personality are reciprocal causation. Openness to experience and extraversion of the personality has remarkable moderate in specialty identity influence on creative motivation.%通过问卷对吉林省医学院校研究生的创造性动机进行研究,结果表明,医学研究生的创造性动机和专业认同在性别、学位类型、专业性质方面的差异是由内在需要的差异所导致的;创造性动机中的内在动机和报酬与专业认同紧密相关,创造性动机与人格互为因果;人格中的开放性和外倾性在专业认同对创造性动机的影响过程中具有显著的调节作用.

  20. THE WEB IDENTITY PREVENTION: FACTORS TO CONSIDER IN THE ANTI-PHISHING DESIGN

    Directory of Open Access Journals (Sweden)

    Mitesh Bargadiya,

    2010-07-01

    Full Text Available Phishing is the immorally deceitful process of attempting to acquire sensitive information such as user names, passwords and financial credentials by covered as a trustworthy entity in a communication. Phishing is normally starts with e-mail or bulk messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. We discuss a few factors that can be used to the web identity theft prevention such as evaluation of user psychology & educational efforts; source identification, URLs, certification authority, Mutual Authentication, Client & Server Side Security, recognition of phishing Messages etc.

  1. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notio...... Christian Lammers, Saxo-Instituttet - Arkæologi, Etnologi, Historie og Græsk og Latin; Gert Sørensen, Institut for Engelsk, Germansk og Romansk ; Anne Ring Petersen, Institut for Kunst- og Kulturvidenskab...

  2. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  3. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand the...

  4. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence.

    Science.gov (United States)

    van Lier, Pol A C; Vitaro, Frank; Barker, Edward D; Koot, Hans M; Tremblay, Richard E

    2009-05-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of physical violence decreased. Children who engaged in the high trajectories of vandalism, theft, and alcohol-drug use had a high probability of also being high in physical violence. Compared to males, females were less likely to be on the high trajectory of physical violence, and their trajectories of other antisocial behaviors were less strongly associated with high levels of physical violence. The results suggest that physical violence during pre-adolescence and adolescence has a different developmental pattern than other forms of antisocial behavior, and that its relation to these other forms of antisocial behavior differs by sex.

  5. Discussion on Boundaries between Theft and Fraud%浅谈盗窃罪与诈骗罪的界限

    Institute of Scientific and Technical Information of China (English)

    马颖

    2012-01-01

    Theft and fraud belong to property crime.In current judicial practice,there are many complex types of cases of infringement of property consisting of means of fraud and theft,which makes it very difficult do conviction and sentencing for the judicial departments.The key to distinguishing theft and fraud is the disposition of property.%盗窃罪与诈骗罪同属财产型犯罪,而目前司法实践中,出现了诸多掺杂有诈骗手段和窃取手段的复杂侵犯财产类案件,使司法部门在定罪与量刑上困难重重。盗窃罪与诈骗罪区分的关键在于对财物的处分行为。

  6. Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies

    Directory of Open Access Journals (Sweden)

    Garba Suleiman

    2016-07-01

    Full Text Available Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for committing criminal activities more than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The development of a vehicle theft alert and location identification system becomes more necessary for vehicle owners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM application developed and installed in a mobile phone device which is embedded in the vehicle to communicate with the vehicle owner’s mobile phone. The communication is established via SMS (i.e. between the installed mobile phone device and that of the vehicle owner. The communications established include; (i. Sending an SMS alert from installed mobile phone device to vehicle owner mobile phone when the car ignition is put on. (ii. Sending an SMS from the vehicle owner’s mobile phone to start and stop the installed mobile phone device application. The location identification function makes use of a web application developed to; (i. Determine the real time location of a vehicle by means of tracking using GPS. (ii. Broadcast missing or stolen vehicle information to social media and security agency. The implementation of the installed mobile phone device application was done using JAVA because of its capabilities in programming mobile applications while PHP and MySQL was used for the web application functions. Integration testing of the system was carried out using

  7. Relationships of Ownership: Art and Theft in Bob Dylan’s 1960s Trilogy

    Directory of Open Access Journals (Sweden)

    Michael Rodgers

    2012-05-01

    Full Text Available Bob Dylan’s corpus is one continually engaged with appropriation and pilfering. This paper will look, predominantly, at three songs from his 1960s’ trilogy – ‘She Dylan problematizes the interrelationship between art, theft, and ownership. I argue that, similar to the urban artist Banksy, Dylan challenges, toys with, and appropriates cultural images in order to continually question the concept of proprietorship whilst rescuing cultural images from esoterica and attempting to put them back into the public domain.

  8. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens......In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  9. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    scanning, etc., to discussions of Shari'a law versus common civil law in India; from the study of religious cult in ancient city states to the processes of constitutional reconstruction in former Communist countries; and from attempts at conflict resolution and prevention between Jewish and Arab citizens...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...... of technology and of law. If such a field can be established, the answers to those questions might be relevant to such contemporary issues as inter-ethnic, religious, and -cultural conflict or reconciliation, migration and nationality, civil rights and surveillance, security and privacy, bureaucracy and inter...

  10. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  11. Consumer Identity

    OpenAIRE

    Young, Melissa Marie

    2009-01-01

    The purpose of this thesis is to prove that despite consumers' impression that they are alone in deciding their consumption decision they are wrong. Consumers are manipulated on various levels by marketers. It is the marketer who decides what consumer identities should be created. Consumers are persuaded by marketers on different levels beginning with consumers' needs. Marketers begin by appealing to consumer drives, motivations and emotions to persuade their consumers to purchase their brand...

  12. Trigonometric identities

    Directory of Open Access Journals (Sweden)

    Malvina Baica

    1986-01-01

    Full Text Available In this paper the author obtains new trigonometric identities of the form 2(p−1(p−22∏k=1p−2(1−cos2πkpp−1−k=pp−2 which are derived as a result of relations in a cyclotomic field ℛ(ρ, where ℛ is the field of rationals and ρ is a root of unity.

  13. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional, with an understand......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......, as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  14. Identity Activities

    Science.gov (United States)

    2016-08-03

    of shared beliefs, values, customs, behaviors, and artifacts that members of a society use to cope with their world and with one another. Culture is...transported to the location by helicopter to exploit any and all useful artifacts or paperwork for future intelligence value or prosecution efforts...field medical hospitals are assembled and operational. All individuals who receive medical attention within the disaster area are immediately

  15. Applying Geostatistical Analysis to Crime Data: Car-Related Thefts in the Baltic States

    Science.gov (United States)

    Kerry, Ruth; Goovaerts, Pierre; Haining, Robert P.; Ceccato, Vania

    2011-01-01

    Geostatistical methods have rarely been applied to area-level offense data. This article demonstrates their potential for improving the interpretation and understanding of crime patterns using previously analyzed data about car-related thefts for Estonia, Latvia, and Lithuania in 2000. The variogram is used to inform about the scales of variation in offense, social, and economic data. Area-to-area and area-to-point Poisson kriging are used to filter the noise caused by the small number problem. The latter is also used to produce continuous maps of the estimated crime risk (expected number of crimes per 10,000 habitants), thereby reducing the visual bias of large spatial units. In seeking to detect the most likely crime clusters, the uncertainty attached to crime risk estimates is handled through a local cluster analysis using stochastic simulation. Factorial kriging analysis is used to estimate the local- and regional-scale spatial components of the crime risk and explanatory variables. Then regression modeling is used to determine which factors are associated with the risk of car-related theft at different scales. PMID:22190762

  16. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  17. A Practical Design of Anti-Theft Car Protection System Based on Microcontroller

    Directory of Open Access Journals (Sweden)

    Mohammed Abuzalata

    2012-01-01

    Full Text Available Problem statement: This study presents a new design for an anti-theft protection System as an inexpensive solution to protect cars from theft and from non-authorized users by using microcontroller-based system. Approach: Three stages of protection to strengthen the security of the car: Firstly, when the user access the car by the car key and entered the wrong password, the power is remain disable. If the power shifted by others, the second level comes by disabling the starter motor from being turned on, so the stolen keys cannot turn the car on. Results: Assuming that the thief or non-authorized person connected the starter motor directly to the car battery, the car well not turned on because the directional valve is set to the case where the fuel is fed back to the fuel tank and no fuel is pumped into the engine, which is the third security level. Conclusion/Recommendations: A microcontroller is programmed using C language, a directional valve is controlled by microcontroller to take the proper valve position to allow the engine to start or not. This system is worked properly and tested successfully.

  18. 12 CFR 222.1 - Purpose, scope, and effective dates.

    Science.gov (United States)

    2010-01-01

    ... procedures for the identification of possible instances of identity theft; (iii) Section 115, concerning... of rights of identity theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of identity theft...

  19. Smartphone User Identity Verification Using Gait Characteristics

    Directory of Open Access Journals (Sweden)

    Robertas Damaševičius

    2016-09-01

    Full Text Available Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, accelerometers. The method is based on the application of the Random Projections method for feature dimensionality reduction to just two dimensions. Then, a probability distribution function (PDF of derived features is calculated, which is compared against known user PDF. The Jaccard distance is used to evaluate distance between two distributions, and the decision is taken based on thresholding. The results for subject recognition are at an acceptable level: we have achieved a grand mean Equal Error Rate (ERR for subject identification of 5.7% (using the USC-HAD dataset. Our findings represent a step towards improving the performance of gait-based user identity verification technologies.

  20. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... exempted lines, the agency also granted Hyundai-Kia America Technical Center, Inc., a full exemption from the parts-marking requirement of the Theft Prevention Standard for the Kia Amanti vehicle line... Hyundai and Kia operations to treat them as two separate manufacturers. We note that the agency...

  1. The Effect on Faculty Research of Theft and Mutilation of Library Materials in an Academic Library: A Study in Perception.

    Science.gov (United States)

    Springer, John A.

    A questionnaire study assessed 143 faculty members at Kent State University to determine if the problem of theft and mutilation of library materials causes faculty members to view the library as well as the miscreants responsible for this behavior in a negative light. It is hypothesized that a majority of faculty members responding to the survey…

  2. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... Standard; BMW of North America, LLC AGENCY: National Highway Traffic Safety Administration (NHTSA... full the BMW of North America, LLC (BMW) petition for exemption of the Carline 4 vehicle line in... parts-marking requirements of the Theft Prevention Standard (49 CFR part 541). BMW...

  3. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... Standard; BMW of North America, LLC AGENCY: National Highway Traffic Safety Administration (NHTSA... full the BMW of North America, LLC (BMW) petition for exemption of the X4 vehicle line in accordance...-marking requirements of the Theft Prevention Standard (49 CFR part 541). BMW requested...

  4. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... Standard; Volkswagen Group of America, Inc. AGENCY: National Highway Traffic Safety Administration (NHTSA... full the Volkswagen Group of America, Inc.'s (Volkswagen) petition for exemption of the Volkswagen Eos... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  5. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested confidential treatment for... Standard; Volkswagen Group of America, Inc. AGENCY: National Highway Traffic Safety Administration (NHTSA... full the Volkswagen Group of America, Inc.'s (Volkswagen) petition for exemption of the Audi...

  6. 医学人文教育提升高职护生职业认同感的途径初探%Study on the Ways to Promote the Career Identity of Nursing Students by Medical Humanistic Education

    Institute of Scientific and Technical Information of China (English)

    王元元; 汪长如; 刘岩; 郭卫红

    2016-01-01

    Along with the changes of the traditional medical mod-el, higher demands are raised in medical education. Then the nursing students in higher vocational colleges are the professional nursing staff as expected, it is very important of whom to have humanistic solicitude with professional skills. Discussing the sit-uation of medical humanistic education in higher vocational col-leges about the nursing students, some practical suggestions are provided to promote the curricula's reform and improve profes-sional judgment and career identity of the nursing students in higher vocational colleges.%医学模式的转变对医学教育提出了更高的要求,医学具有强烈的人文属性。高职护生作为未来的专业护理人员,应同时具备医学人文关怀精神。文章对高职医学院校护理医学人文教育的现状进行梳理,对通过医学人文教育提升在校护生职业认同感的方法进行理论探讨,为促进高职护生医学人文课程教学改革、提高护生职业生涯适应力而提出参考建议。

  7. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    CERN Multimedia

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  8. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    CERN Multimedia

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  9. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  10. Identity Style, Parental Authority, and Identity Commitment.

    Science.gov (United States)

    Berzonsky, Michael D.

    2004-01-01

    The role that parental authority patterns and social-cognitive identity styles may play in establishing identity commitments was investigated. The results indicated that family authority and identity style variables combined accounted for 50% of the variation in strength of identity commitment. As hypothesized, the relationship between parental…

  11. 刍议医患关系对医学生职业认同感的影响%Efffects of worsening doctor-patient relationship on medical studentsˊprofessional identity

    Institute of Scientific and Technical Information of China (English)

    张灵烨

    2014-01-01

    In the light of current doctor-patient relationship and related investigations, we knew the fact that increasing tension between doctors and patients led to a poor professional identity in healthcare industry. To explain the effect, we proposed that growing emotional sloth, lower social status, occupational security risks and even challenges what medical students faced during internship training all might be responsible for the decline satisfaction of professional identity. Finally, we briefly gave relevant ways to improve the healthcare environment.%根据医患关系现状和相关调查,提出紧张的医患关系导致医学生对于医疗行业的职业认同感下降。究其原因,与日渐增多的倦怠情绪、社会地位的降低、职业安全隐患、医学生成长面临障碍等密切相关,并就此简述相关的解决对策。

  12. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  13. Counselor Identity: Conformity or Distinction?

    Science.gov (United States)

    McLaughlin, Jerry E.; Boettcher, Kathryn

    2009-01-01

    The authors explore 3 debates in other disciplines similar to counseling's identity debate in order to learn about common themes and outcomes. Conformity, distinction, and cohesion emerged as common themes. They conclude that counselors should retain their distinctive, humanistic approach rather than conforming to the dominant, medical approach.

  14. 青少年偷窃的类型化分析%Type Analysis of Adolescent Theft

    Institute of Scientific and Technical Information of China (English)

    刘录护

    2012-01-01

    The juvenile theft is of serious danger for young people and society. Therefore, attention should be paid to teenager theft. It is conducive to strengthen the study of juvenile theft by combining juvenile delinquency type analysis and psychology theory about theft.By comparison of 3 similar cases, the study finds that: Firstly, low spiritual satisfaction leads to children's bad behavior, and low material satisfaction results in the theft behavior; Secondly, objective factor affecting children's spiritual satisfaction is parents" career time and factor influencing students" substance meeting in big cities is subjective education of parents. When the child was unable to gain spiritual satisfaction because of objective constraints, giving more substance to meet with the child is a better policy. Thirdly, responding to child's theft and bad behavior, the spiritual cares of teachers are more effective than criticism and punishment.%青少年偷窃行为对青少年自身和社会具有严重危害性,因此,对青少年偷窃行为应加以重视。将青少年犯罪的类型化分析与心理学有关偷窃的解释理论相结合,有利于加强对青少年偷窃行为的研究。对3个案例的研究发现:精神满足低导致孩子的不良行为,同时物质满足低导致学生的偷窃行为:影响孩子精神满足的客观因素是家长职业时间,在大城市影响学生物质满足的因素则是家长主观上的教育方式。在孩子因客观制约而无法获得精神满足时,给与孩子较多的物质满足是更优策略;应对孩子的偷窃与其他不良行为,教师的精神关怀比批评与惩罚更有效。

  15. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making t...... measures aimed at detecting such actions. The discussed technical issues can prove useful in designing increasingly refined security measures and ways to detect electricity theft....

  16. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  17. Development of Deaf Identity: An Ethnographic Study

    Science.gov (United States)

    McIlroy, Guy; Storbeck, Claudine

    2011-01-01

    This ethnographic study explores the identity development of 9 deaf participants through the narratives of their educational experiences in either mainstream or special schools for the Deaf. This exploration goes beyond a binary conceptualization of deaf identity that allows for only the medical and social models and proposes a bicultural…

  18. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Multimedia

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  19. Digital Identity Management Systems

    OpenAIRE

    Kuhar, Marko

    2010-01-01

    The goal of this thesis is a review of existing systems and technologies for managing digital identities. After the selection of the two most promising systems there will be a detailed comparison for a typical environment. In the first part of my thesis, the theory for understanding issues of identity management is introduced. Furthermore, the difference between identity and digital identity is explained and identity management itself is interpreted. An example of identity management solut...

  20. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    Institute of Scientific and Technical Information of China (English)

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  1. The Attractiveness of Materials in Advanced Nuclear Fuel Cycles for Various Proliferation and Theft Scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Bathke, C. G.; Wallace, R. K.; Ireland, J. R.; Johnson, M. W.; Hase, Kevin R.; Jarvinen, G. D.; Ebbinghaus, B. B.; Sleaford, Brad W.; Bradley, Keith S.; Collins, Brian A.; Smith, Brian W.; Prichard, Andrew W.

    2010-09-01

    This paper is an extension to earlier studies1,2 that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no “silver bullet” has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of "attractiveness levels" that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities.3 The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  2. The attractiveness of materials in advanced nuclear fuel cycles for various proliferation and theft scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Bathke, Charles G [Los Alamos National Laboratory; Wallace, Richard K [Los Alamos National Laboratory; Ireland, John R [Los Alamos National Laboratory; Johnson, M W [Los Alamos National Laboratory; Hase, Kevin R [Los Alamos National Laboratory; Jarvinen, Gordon D [Los Alamos National Laboratory; Ebbinghaus, Bartley B [LLNL; Sleaford, Brad A [LLNL; Bradley, Keith S [LLNL; Collins, Brian W [PNNL; Smith, Brian W [PNNL; Prichard, Andrew W [PNNL

    2009-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  3. Automated Water Supply System and Water Theft Identification Using PLC and SCADA

    Directory of Open Access Journals (Sweden)

    Prof. Anubha Panchal,

    2014-04-01

    Full Text Available In today’s world rapid growing urban residential areas, to avoid scarcity of water problems and requirements of consumers, therefore it is supposed to supply adequate water distribution networks are managed automatically. Along with this another problem in the water supply system is that public is using suction pumps to suck the water directly from the home street pipeline. The best way to improve the automation and monitoring architectures which contain a supervision and control system for the real time installation, programmable logic controllers with basic functions communication systems, standard interfaces or dedicated ones with proximity sensors, electrical drive elements, measuring devices, etc. In this project it is proposed to develop the PLC & SCADA based water monitoring and theft prevention. Control System is further coupled to SCADA unit .This paper focuses particularly to a control system for controlling and monitoring within a Water Distribution System. Process automation system based upon utilization of an industrial PLC and PC systems including all the network components represents the best way to improve the water distribution technological process.

  4. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    CERN Multimedia

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  5. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  6. Personal Identity in Italy

    Science.gov (United States)

    Crocetti, Elisabetta; Rabaglietti, Emanuela; Sica, Luigia Simona

    2012-01-01

    This chapter discusses specifics of identity formation in Italian adolescents and emerging adults. We review consistent evidence illustrating that, in Italy, a progressive deferral of transition to adulthood strongly impacts youth identity development by stimulating identity exploration and postponement of identity commitments. We also consider…

  7. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  8. THE ATTRACTIVENESS OF MATERIALS IN ADVANCED NUCLEAR FUEL CYCLES FOR VARIOUS PROLIFERATION AND THEFT SCENARIOS

    Energy Technology Data Exchange (ETDEWEB)

    Bathke, C. G.; Ebbinghaus, Bartley B.; Collins, Brian A.; Sleaford, Brad W.; Hase, Kevin R.; Robel, Martin; Wallace, R. K.; Bradley, Keith S.; Ireland, J. R.; Jarvinen, G. D.; Johnson, M. W.; Prichard, Andrew W.; Smith, Brian W.

    2012-08-29

    We must anticipate that the day is approaching when details of nuclear weapons design and fabrication will become common knowledge. On that day we must be particularly certain that all special nuclear materials (SNM) are adequately accounted for and protected and that we have a clear understanding of the utility of nuclear materials to potential adversaries. To this end, this paper examines the attractiveness of materials mixtures containing SNM and alternate nuclear materials associated with the plutonium-uranium reduction extraction (Purex), uranium extraction (UREX), coextraction (COEX), thorium extraction (THOREX), and PYROX (an electrochemical refining method) reprocessing schemes. This paper provides a set of figures of merit for evaluating material attractiveness that covers a broad range of proliferant state and subnational group capabilities. The primary conclusion of this paper is that all fissile material must be rigorously safeguarded to detect diversion by a state and must be provided the highest levels of physical protection to prevent theft by subnational groups; no 'silver bullet' fuel cycle has been found that will permit the relaxation of current international safeguards or national physical security protection levels. The work reported herein has been performed at the request of the U.S. Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for, the nuclear materials in DOE nuclear facilities. The methodology and findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security is discussed.

  9. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    Energy Technology Data Exchange (ETDEWEB)

    Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

    2011-10-05

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  10. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  11. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity as inte......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon.......Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity...

  12. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making...... the issue of electricity theft still relevant is the common physical access of the end users to the installations or meters. The article presents not only the factors encouraging energy consumers to engage in dishonest behavior and the techniques they use to achieve the intended result, but also technical...... measures aimed at detecting such actions. The discussed technical issues can prove useful in designing increasingly refined security measures and ways to detect electricity theft....

  13. Protect The Internet Consumer’s Identity against Attacks by Phishers

    Directory of Open Access Journals (Sweden)

    chirag ishwarbhai jagani

    2012-08-01

    Full Text Available Can users believe what their browsers tell them? Even sophisticated web users decide whether or not to trust a server based on browser cues such as location bar information, SSL icons, SSL warnings, certificated information and response time. In their seminal work on Web spoofing, (Felten-1996 showed how, in 1996, a malicious server could forge some of these cues. However, this work used genuine SSL sessions and Web Technology has evolved much since 1996. The web has since become the per-eminent medium for electronic service delivery to remote users, and the security of many commerce, government and an academic network application critically rests on the assumption that users can authenticate the servers with which they interact. This situation raises the question: is the browser-user communication model today secure enough to warrant this assumption? Keywords: - swindler, phishing, identity theft, consumer’s personal identity, keylogging

  14. El imaginario del sueño americano y videojuegos: análisis de Grand Theft Auto

    OpenAIRE

    Jirón Polo, Francisco Andrés

    2015-01-01

    Muchas veces no se entiende cómo las personas pueden pasar largas horas jugando en consolas de videojuego o computadoras. Esto se debe en parte, a que no se comprende los juegos de video y se cree que no existe un argumento o un discurso en el desarrollo de una historia durante el juego. En el caso específico de Grand Theft Auto existe una historia principal y varias historias secundarias, con el agregado de que el jugador forma parte del elenco. En esta serie de juegos los protagonistas inte...

  15. 医学生职业认同、伦理教育与职业道德发展水平关系研究%Research on the Relationship between Medical Students' Career Identity, Ethical Education and Professional Ethics Development

    Institute of Scientific and Technical Information of China (English)

    张雷; 陈玲; 张文佳; 王黎源

    2016-01-01

    The cultivation of medical students' professional ethics as doctors must be emphasized, but there remain many problems in the current cultivation model of medical students' professional ethics, resulting in an unsatisfactory cultivation effect. This paper explores the factors affecting professional ethics and focuses on the interrelationship between career identity and professional ethics cultivation. It also analyzes the current situation of medical ethnics teaching, and proposes the countermeasures to improve medical students' professional ethics, including enhancing the teaching of medical ethics and improving medical students' ca-reer identity.%医生职业道德是医学生在校期间必须要着重培养的,但现有的医学生职业道德的培养模式存在很多问题,培养效果并不令人满意。文章探寻了职业道德的影响因素,着重考察了职业认同与职业道德培养的相互关系。分析了现有医学伦理学教学的现状,提出了加强医学伦理学教学,提高医学生职业认同感从而提高其职业道德水平的对策。

  16. Negotiating work identity

    Directory of Open Access Journals (Sweden)

    Tamsen Saayman

    2011-03-01

    Full Text Available Orientation: The study explored the dynamics of work identity negotiation and construction.Research purpose: The aim of the study was to investigate identity tensions and demands that mobilise identity work in the work environment.Motivation for the study: The study hoped to improve the understanding of the dynamics of identity construction and negotiation.Research design, approach and method: Using grounded theory methodology in the context of qualitative field research, the researchers conducted two unstructured interviews with 28 employees of a South African manufacturing company.Main findings: The five primary dimensions the data yielded were personal identity, individual agency, social identity, social practice and job.Practical/managerial implications: This study has implications for organisations that want to improve productivity through understanding work identity.Contribution/value-add: The article presents a conceptual model of the demands and tensions that influence work identity.

  17. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  18. Diversity of deaf identities.

    Science.gov (United States)

    Bat-Chava, Y

    2000-12-01

    Social Identity Theory (Tajfel, 1981) posits that members of minority groups achieve positive social identity by (a) attempting to gain access to the mainstream through individual mobility or (b) working with other group members to bring about social change. Some people may use a combination of both strategies. Through the use of cluster analysis, the existence of three identities associated with these strategies was discerned in a sample of 267 deaf adults: culturally hearing identity, culturally deaf identity, and bicultural identity, each comprising about a third of the sample. A subset of 56 people were interviewed in depth; excerpts are presented to illustrate the identity types. Qualified support was found for the prediction that people with culturally deaf and bicultural identities would have higher self-esteem.

  19. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    2014-01-01

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...

  20. Language, Power and Identity

    Science.gov (United States)

    Wodak, Ruth

    2012-01-01

    How are identities constructed in discourse? How are national and European identities tied to language and communication? And what role does power have--power in discourse, over discourse and of discourse? This paper seeks to identify and analyse processes of identity construction within Europe and at its boundaries, particularly the diversity of…

  1. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...

  2. Teachers' Interpersonal Role Identity

    Science.gov (United States)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C. A.; Pennings, Helena J. M.

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' appraisals and interpersonal identity standards…

  3. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their custo

  4. Gender identity disorder.

    LENUS (Irish Health Repository)

    De Gascun, C

    2006-05-01

    Gender Identity Disorder (GID) is a relatively rare condition of atypical gender development in which there is a psychological perception of self as masculine or feminine which is incongruent with ones phenotype. GID replaced the term Transsexualism in DSM-IV in 1994. The demographics of GID in Ireland have not been established. Since 2000 we have received 52 referrals of individuals with confirmed GID to our endocrine service for consideration for hormonal treatment (HT). Of the 52 patients 45 have male to female (MTF) GID (mean age 38.9 years) and 7 have female to male (FTM) GID (mean age 30.7 years). The age at presentation in this group is approximately 9 years older than in international series for both MTF (39 years v 30yrs) and FTM (31 yrs v 22yrs). The karyotype where analysed has been normal for their phenotypic sex. Twenty-three of the patients had received HT prior to attending our clinic that in only one case had been prescribed by a specialist. A number of patients had obtained HT via the internet or from overseas sources without medical review. Eighteen of the patients have been or are married and 14 of the group have children. The scale of referrals confirms that GID exists in the Irish population to a significant degree. Thus an appropriate care pathway for people with the condition needs to be established. This will facilitate optimum medical management of the patient group and a coherent approach to the many difficult social issues faced individuals with this disorder.

  5. Social Identity and Preferences*

    Science.gov (United States)

    Benjamin, Daniel J.; Choi, James J.; Strickland, A. Joshua

    2009-01-01

    Social identities prescribe behaviors for people. We identify the marginal behavioral effect of these norms on discount rates and risk aversion by measuring how laboratory subjects’ choices change when an aspect of social identity is made salient. When we make ethnic identity salient to Asian-American subjects, they make more patient choices. When we make racial identity salient to black subjects, non-immigrant blacks (but not immigrant blacks) make more patient choices. Making gender identity salient has no effect on intertemporal or risk choices. PMID:20871741

  6. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  7. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    -Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt...... on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro...... aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers....

  8. Current Trends of Periodical Circulation Policies Relative to Attitudes by Librarians Toward Causes of Mutilation and Theft in 92 Four-Year Colleges and Universities.

    Science.gov (United States)

    Martin, Ron G.

    This study was designed to accomplish three objectives relating to periodical circulation in college and university libraries: 1) to establish present circulation policy trends, 2) to obtain attitudinal information on mutilation and theft of periodicals from serial librarians, and 3) to ascertain if there were, at present, any workable methods of…

  9. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  10. Commons of Identity: Sherpa Identity Management

    Directory of Open Access Journals (Sweden)

    Leif Rune Loland

    2006-12-01

    Full Text Available The recent history of Sherpas demonstrates how identities can be scarce goods. While ‘Sherpa’ refers to an ethnic identity, ‘Sherpa’ refers to a crucial occupation in the trekking industry.i Their privileged position in Nepal’s international tourist industry is related to their common reputation. Their collective use of identity seems to help them getting access to an economic niche, and work in tourism seems to be an aspect of being Sherpa. Thus, an individual that operates in the tourist market does not only manage material assets but also identity assets to maintain the Sherpa reputation. Consequently, one can expect it to be a collective concern to husband their image, ie to control each member’s behaviour which could affect the Sherpa image. This article on Sherpa identity in encounters with outsiders analyses Sherpaness as a manageable resource that constitutes a collectively sanctioned commons. My point of departure is Barth’s analysis of ethnic boundary dynamics (1969, 1994 combined with Bourdieu’s concept of ‘capital’ and Hardin’s perspective on commons.DOI: 10.3126/dsaj.v1i0.288Dhaulagiri Vol.1 (2005 pp.176-192

  11. Current Legislation Status and Suggestion of Network Theft Crime of China%我国网络盗窃犯罪的立法现状及建议

    Institute of Scientific and Technical Information of China (English)

    郑毅

    2014-01-01

    电子商务的蓬勃发展,使盗窃电子货币、虚拟财产、重要商业信息数据的网络盗窃犯罪越演越烈。我国网络盗窃犯罪立法的滞后、分散、量刑与犯罪后果不匹配等一系列问题,导致现有法律对网络盗窃犯罪的打击和惩戒力度有限,既将司法置于尴尬境地,也间接导致了网络盗窃犯罪行为的高发。加强和完善网络盗窃犯罪立法,应着重从提高立法层级、将网络盗窃犯罪明确入刑、拓展其犯罪主体范围、明晰虚拟财产的法律地位等方面入手。%With the vigorous development of Electronic commerce,a series of Network Theft Crime such as theft of Elec-tronic money,Virtual Property,important Commercial information and data also became more and more.A series of problems such as the legislative lag,Disperse legislation,unmatchable of Sentencing and the consequences made the law only give a very limited Combat and punishment to the Network Theft Crime,which put the Judicial on a spot,and led a high incidence rate of Network Theft Crime indirectly.In order to Strengthen and perfect the Network Theft Crime Legis-lation,we should emphasize the improvement of the legislative level,write the network theft crime in the criminal law, expand the scope of subject of Network Theft Crime,and give clear legal status of virtual property and so on.

  12. Grey('s) Identity: Complications of Learning and Becoming in a Popular Television Show

    Science.gov (United States)

    Jubas, Kaela

    2013-01-01

    In this article, the author outlines an analysis of the American show "Grey's Anatomy" as an example of how popular culture represents identity and the process of professional identity construction in a medical workplace, particularly the surgical service of a large urban hospital. In discussing identity, she connects professional identity to…

  13. The Practice of Infant Anti-theft System Based on Things Technology%物联网技术在医院婴儿防盗中的应用实践

    Institute of Scientific and Technical Information of China (English)

    叶青

    2016-01-01

    随着我国医疗物联网技术的发展和成熟,婴儿防盗系统在医院中将起到越来越重要的作用。本文主要介绍基于RFID技术的医疗物联网在医院婴儿防盗中的实践,重点讨论婴儿防盗系统的建设、业务流程及功能,实现以物联网技术代替传统的人防系统,从而大大提高了防盗安全系数和医院的管理效率。%With the development of medical technology and the maturity of Things, infant security systems play an increasingly important role in the hospital. This paper describes based RFID technology medical Things practice in a hospital nursery security in, focusing on construction, business processes and functions infant security system, the realization of Things technology instead of the traditional air defense systems, thus greatly improving the anti-theft security coefficient and hospital management efficiency.

  14. Genetics and identity.

    Science.gov (United States)

    Nordgren, Anders

    2008-01-01

    For the last 20 years the concepts of identity and identification have been subject to much interest in the humanities and social sciences. However, the implications of genetics for identity and identification have been largely neglected. In this paper, I distinguish various conceptions of identity (as continuity over time, as basic kind of being, as unique set of properties, and as social role) and identification (as subjective experience of identity in various senses and as social ascription of identity in various senses), and investigate systematically genetic perspectives on each of these conceptions. I stress the importance of taking the genetic perspectives seriously but also their limitations. In particular, I pinpoint conceptual problems that arise when a genetic approach to identity is adopted.

  15. Identity and total institution

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2015-01-01

    Full Text Available This paper analyses a psychiatric institution resident’s identity (self- construction processes. Our quest was grounded on constructivist theoretical paradigm that sees identity as a manner a person defines oneself in accordance with offered social repertoire. In other words, the total institution milieu offers limited range of identities to its residents. On the other hand, the latter are not just passive subjects that identity is imposed upon. They are able to use a number of adjustment mechanisms to the knowledge about themselves - ranging from symbolic escape to open resistance against the imposed image about them; to obedience, and we were interested to understand the (supposed complex dynamic of identity (re-building in, so-called, special or forensic patients. In order to understand this process and attempting to discover, besides the manifest also the latent layer of the story about self, the local, or personal, identity understanding was examined.

  16. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... identity, design, and location of the components of the antitheft device for the new vehicle line. Chrysler... addition to the design and production validation test criteria, Chrysler stated that the SKIS also... Liberty, a similar 5-door, All Wheel Drive, crossover/ Sport Utility Vehicle as the Jeep Patriot...

  17. Athletic identity foreclosure.

    Science.gov (United States)

    Brewer, Britton W; Petitpas, Albert J

    2017-08-01

    Athletic identity foreclosure refers to commitment to the athlete role in the absence of exploration of occupational or ideological alternatives. This article traces the theoretical underpinnings of the construct, examines the role of sport participation in identity development, and provides an overview of the course, correlates, and consequences of athletic identity foreclosure. Implications for future research are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  19. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  20. Body integrity identity disorder.

    Directory of Open Access Journals (Sweden)

    Rianne M Blom

    Full Text Available INTRODUCTION: Body Integrity Identity Disorder (BIID is a rare, infrequently studied and highly secretive condition in which there is a mismatch between the mental body image and the physical body. Subjects suffering from BIID have an intense desire to amputate a major limb or severe the spinal cord in order to become paralyzed. Aim of the study is to broaden the knowledge of BIID amongst medical professionals, by describing all who deal with BIID. METHODS: Somatic, psychiatric and BIID characteristic data were collected from 54 BIID individuals using a detailed questionnaire. Subsequently, data of different subtypes of BIID (i.e. wish for amputation or paralyzation were evaluated. Finally, disruption in work, social and family life due to BIID in subjects with and without amputation were compared. RESULTS: Based on the subjects' reports we found that BIID has an onset in early childhood. The main rationale given for their desire for body modification is to feel complete or to feel satisfied inside. Somatic and severe psychiatric co-morbidity is unusual, but depressive symptoms and mood disorders can be present, possibly secondary to the enormous distress BIID puts upon a person. Amputation and paralyzation variant do not differ in any clinical variable. Surgery is found helpful in all subjects who underwent amputation and those subjects score significantly lower on a disability scale than BIID subjects without body modification. CONCLUSIONS: The amputation variant and paralyzation variant of BIID are to be considered as one of the same condition. Amputation of the healthy body part appears to result in remission of BIID and an impressive improvement of quality of life. Knowledge of and respect for the desires of BIID individuals are the first steps in providing care and may decrease the huge burden they experience.

  1. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  2. “C’è un furto con scasso in ogni vera lettura”. Calvino’s Thefts from Ariosto

    Directory of Open Access Journals (Sweden)

    Martin McLaughlin

    2013-06-01

    Full Text Available Calvino’s love for Ariosto throughout his writing life is well known. However, despite this life-long enthusiasm for Ariosto, there are some variations. In a 1980 interview with Tullio Pericoli Calvino used the metaphor of “stealing” words from other texts and discussed notions of artistic thievery, citing his own “thefts” from Ariosto. The article examines how Calvino carries out his thefts, and how he then systematically develops in his own way what he has “stolen”, concentrating on key episodes from Il cavaliere inesistente and Il castello dei destini incrociati. What emerges is that in the first phase of his literary career Calvino was more concerned with the content of the Furioso, while in later years he became fascinated by the poem’s structural and stylistic qualities.

  3. Identity of psychology, identity and psychology

    Directory of Open Access Journals (Sweden)

    Mirjana Nastran Ule

    2003-09-01

    Full Text Available The article deals with epistemic issues of modern psychology with the starting hypothesis being that scientific psychology must satisfy three main interests: scientific, practical and emancipatory interest. Particularly important is the emancipatory interest, which is based on the social reflection of scientific work and conclusions. Psychological knowledge involves not only neutral descriptions of facts, but also implicit rules, expectations regarding values or norms, and criticism of undesirable behavior. The traditional psychological model attempts to satisfy the scientific interest and partly practical interest, while avoiding emancipatory interest. But I believe modern socio-historical models of psychology to be significant precisely owing to the inclusion of emancipatory interest. The difference between these two models of psychology is most obvious in their perception of identity i.e. individuality. Conventional perceptions follow the logic of "possessive individualism" in which the individual is seen as an autonomous bearer and owner of his/her psychological states and processes. The conventional model of identity supports the modernist concept of the individual as being focused on his/her self or personal identity. Socio-historical models, on the other hand, see the individual as a being embedded in social relations and social interactions, and one who builds and expresses his/her individuality through the reflection on social interactions, discursive practices, and response to the hierarchy of power and social mechanisms of control. According to this model, identity evolves through a series of social constructions which are embodied in the individual and represent him/her in society. Identity thus becomes a notion that combines individuality and social context, subjectivation and objectivation of the individual, and historical and biographical time.

  4. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  5. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  6. Capturing Chemical Identity Thinking

    Science.gov (United States)

    Ngai, Courtney; Sevian, Hannah

    2017-01-01

    Chemical identity, the idea that every substance has at least one property that makes it unique and able to be differentiated from other substances, is core to the practice of chemistry. Such practice requires using properties to classify as well as to differentiate. Learning which substance properties are productive in chemical identity thinking…

  7. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  8. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  9. Teachers' interpersonal role identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2014-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  10. Teachers' Interpersonal Role Identity

    NARCIS (Netherlands)

    van der Want, Anna C.; den Brok, Perry; Beijaard, Douwe; Brekelmans, Mieke; Claessens, Luce C A; Pennings, Helena J M

    2015-01-01

    This article investigates the link between teachers' appraisal of specific interpersonal situations in classrooms and their more general interpersonal identity standard, which together form their interpersonal role identity. Using semi-structured and video-stimulated interviews, data on teachers' ap

  11. Cultural Identity Through CLIL

    OpenAIRE

    Oprescu Monica

    2015-01-01

    The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  12. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  13. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  14. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  15. Medicare Preventive and Screening Services

    Science.gov (United States)

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... often is it covered? Medicare Part B (Medical Insurance) covers: Abdominal aortic aneurysm screening Alcohol misuse screenings & ...

  16. Preventive Visit and Yearly Wellness Exams

    Science.gov (United States)

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... often is it covered? Medicare Part B (Medical Insurance) covers: A "Welcome to Medicare" preventive visit: You ...

  17. On Identity Theft Prevention and Control of the Legal System%防范及治理身份盗用的若干思考

    Institute of Scientific and Technical Information of China (English)

    舒晓; 陈奎余

    2009-01-01

    从法律角度对身份盗用的慨念进行分析,指出身份盗用的对象,盗用与冒用的区别及身份盗用的二个阶段.列举了身份盗用主要的表现形式,阐述了其危害后果,最后从完善立法、建立专门机构及加强大众的防范意识三个方面对如何防范及治理身份盗用提出建议.

  18. 美国打击盗窃身份犯罪方略(一)%Measures Taken to Fight against Identity Theft in the US

    Institute of Scientific and Technical Information of China (English)

    杨欣欣

    2009-01-01

    在美国,盗窃身份犯罪是一项严重的犯罪,给公众个人造成了极大的损失.为避免这种犯罪的发生以及严厉打击此类犯罪,美国采取了有效措施并积累了丰富的经验.

  19. 关于"身份盗窃"行为的入罪化思考%A Study of the Condemnation of the Crime of Identity Theft

    Institute of Scientific and Technical Information of China (English)

    于志刚

    2011-01-01

    "身份盗窃"行为的日益普遍造成了巨大的现实危害,现行刑法的制裁体系严重滞后.依赖于"招摇撞骗罪"和"伪造公司、企业、事业单位、人民团体印章罪,伪造、变造身份证罪"的制裁体系,虽然在客观上可以部分实现对于"身份盗窃"行为的刑事制裁,但这一体系的形成,更多地不是一种立法的主观追求,而是一种意外形成的立法效果.深入思考和研究"身份盗窃"行为对于传统刑事立法的冲击和对于传统刑法理论的挑战,逐步实现"身份盗窃"行为的独立入罪化,已经越来越有必要.

  20. 美国打击盗窃身份犯罪方略(二)%Measures Taken to Fight against Identity Theft in the US

    Institute of Scientific and Technical Information of China (English)

    杨欣欣

    2010-01-01

    在美国,盗窃身份犯罪是一项严重的犯罪,给公众个人造成了极大的损失.为避免这种犯罪的发生以及严厉打击此类犯罪,美国采取了有效措施并积累了丰富的经验.在这本小册子里,共列举了14种情况供美国民众参考,并为受害者提供了应对的方法.

  1. 美国如何打击身份盗窃犯罪%U.S.A.'s Measures to Crack Down on Identity Theft Crime

    Institute of Scientific and Technical Information of China (English)

    杨欣欣

    2010-01-01

    12种身份失窃犯罪在美国是个普遍存在的问题.为使民众更好地保护自己的个人信息不受侵犯,美国贸易委员会出版了一系列的小册子,提醒民众加以预防.在美国,联邦贸易委员会希望消费者和商家更多地了解个人信息和隐私的重要性.美国公众可以随时免费获得这些宣传手册,也可以浏览联邦贸易委员会网站或者阅读该委员会的众多期刊,以获得更多的此类信息.

  2. Identity Theft and The Police Response%美国的个人身份信息被盗与警方的应对

    Institute of Scientific and Technical Information of China (English)

    徐信芬

    2006-01-01

    信息安全是各国政府和警方高度关注的中心问题之一,而盗窃身份信息是一种新出现的犯罪活动,但是预防身份信息被盗是相当困难的.为了防范个人身份信息被盗,警方有必要收集与个人身份信息相关联的各种特殊情报,打一场积极主动的防御战.警方对市民的防范教育和警示不失为相当有效的办法.

  3. 美国"身份盗窃"立法、评析与启示%US "Identity Theft" Legislation, Evaluation and Enlightenment

    Institute of Scientific and Technical Information of China (English)

    党玺

    2010-01-01

    "身份盗窃"成为美国最为严重的犯罪之一,引起了严重的社会经济问题."社会安全号码"的滥用、新技术带来的危险、商业部门转嫁的损失和政府的碌碌无为是导致"身份盗窃"的四大主要因为.尽管美国出台多部法律以规范"身份盗窃"问题,但是这些法律存在不少的缺陷与不足."身份盗窃"在我国发展很快,危害性越演越烈,尤其在金融领域中表现突出.为此,我国应当在参考美国经验的基础上,加强对"身份盗窃"的规范力度,健全金融法律体系,促进金融立法改革.

  4. An Overview of Identity Theft-Governance and Research Trend%身份盗用的发展及其治理和研究趋势

    Institute of Scientific and Technical Information of China (English)

    闵庆飞; 季绍波; 仲秋雁

    2007-01-01

    身份盗用是指为了取得金钱、物品、服务等利益或者逃避义务和责任,盗窃他人身份证明信息以非法冒用他人身份的行为.根据西方发达国家的统计,身份盗用是近几年来发展最迅猛的犯罪活动,给个人、企业和社会都带来了巨大危害.中国作为一个经济迅猛发展、网民最多并渴望发展电子商务的国家,也日益面临着身份盗用的严重威胁.但我们对这一问题的认识还远远不够全面和深入.目的是要系统、全面的介绍身份盗用问题的内涵、发展,各国对身份盗用的治理实践以及学术界对这一问题的研究现状,以期为研究、预防和解决中国的身份盗用问题提供一定基础.为此,回顾了有关身份识别的理论;讨论了身份盗用的危害和影响范围、身份盗用的类型和过程;分析了身份盗用蔓延的原因以及身份盗用和身份欺诈的关系;并从政府治理、企业管理和消费者个人防护三个层面介绍了各国应对身份盗用的实践活动.最后讨论了对身份盗用问题的理论研究趋势和前景.作者希望引起学术同行们对身份盗用问题的重视,为深入研究中国的身份盗用问题起到抛砖引玉的作用.

  5. The Research on US Identity Theft and Supervision Policy%美国身份盗用的有关情况及监管措施研究

    Institute of Scientific and Technical Information of China (English)

    占云生

    2016-01-01

    近年来,身份盗用(未经授权使用他人身份识别信息的未遂或确认欺诈)事件在美国增长非常迅速,美国政府对此非常重视,连续出台了多项法律法规及监管措施,形成了较为完善的监管框架.研究和借鉴美国相关经验对我国应对类似问题具有重要的现实意义.

  6. 美国打击盗窃身份犯罪方略(三)%Measures Taken to Fight against Identity Theft in the US

    Institute of Scientific and Technical Information of China (English)

    杨欣欣

    2010-01-01

    在美国,盗窃身份犯罪是一项严重的犯罪,给公众个人造成了极大的损失.为避免这种犯罪的发生以及严厉打击此类犯罪,美国采取了有效措施并积累了丰富的经验.在这本小册子里,共列举了14种情况供美国民众参考,并为受害者提供了应对的方法.

  7. [Diagnosing gender identity].

    Science.gov (United States)

    Kaltiala-Heino, Riittakerttu; Mattila, Aino; Kärnä, Teemu; Joutsenneimi, Kaisla

    2015-01-01

    Transsexualism and other variations of gender identity are based on a stable sense of identity. The aetiology of this phenomenon is not fully known. Suffering caused by gender dysphoria is alleviated with sex reassignment. The psychiatric assessment of both adolescents and adults has been centralized in Finland to two university hospitals, the Helsinki University Hospital and Tampere University Hospital. In both hospitals, multidisciplinary teams aim at differential diagnosis by using well-known psychiatric and psychological instruments. Wishes for sex reassignment that are caused by a mental health disorder are excluded. Assessment in adolescence is challenging because the identity in youth is still forming.

  8. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  9. Adolescence: Search for an Identity

    Science.gov (United States)

    Kasinath, H. M.

    2013-01-01

    James Marcia (1991, 1994, 1999, 2002) expanded on Erikson's theory of identity formation. Specifically, he focused on two essential processes in achieving a mature identity: exploration and commitment. Erikson's observations about identity were extended by Marcia, who described four identity statuses: identity diffusion, foreclosure, moratorium…

  10. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  11. [Clarification of a break-in theft crime by multiplex PCR analysis of cigarette butts].

    Science.gov (United States)

    Hochmeister, M; Haberl, J; Borer, V; Rudin, O; Dirnhofer, R

    1995-01-01

    This paper describes the first use of multiplex PCR amplification kits for the analysis of DNA extracted from cigarette butts in a criminal case. Two suspects could be excluded as potential contributors to the samples, whereas the multi locus PCR-based DNa profile derived from the cigarette butts was consistent with a DNA profile derived from a third suspect. For identity testing in criminal cases where cigarette butts are involved, commercially available PCR amplification kits provide currently the most powerful tool. Furthermore this PCR-based analysis can be implemented into most application orientated laboratories.

  12. Gender Identity: Intersex Individuals

    Directory of Open Access Journals (Sweden)

    Ilhame Khabar

    2016-12-01

    Full Text Available According to past beliefs and social norms, society has been taught that their has only been two types of biological structures regarding the ideal male and female. The majority of society has also believed that gender identity was specific only to those structures, as most have had a very fixed perspective of men and women and the sexual organs that are associated. In today's society, there has been an observed increase of many variations in sexual orientation, gender identity, gender expression, and sex anatomy. Awareness has been subtle, yet growing on gender identity and intersex individuals; however, some studies and popular media stories have also shown that many of these individuals have experienced trauma and hardship due to their ambiguous genitalia and how it has affected their gender identity.

  13. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    of the financial industry. Findings: The paper finds that members of a dead organization construct a bankruptcy narrative that is also a legacy organizational identity narrative including a legacy organizational identity transformation and several identities that have positive and negative aspects...... evidence on ways that legacy organizational identity from a dead organization play a substantial role in a living organization. Research limitations/implications: Because of the chosen research approach, the research results may lack generalizability. Practical implications: The paper holds insight...... that can help practitioners understand members of a dying organization -- including the ways they come to form and perform in a new organizational context; an understanding that is a prerequisite for helping and supporting these members in coming to perform satisfyingly in the new organization. Originality/value...

  14. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...

  15. Autoethnography: Inquiry into Identity

    Science.gov (United States)

    Hoppes, Steve

    2014-01-01

    This chapter provides guidelines and suggestions for assessing student development using autoethnography, a qualitative research method. Autoethnography guides students in examining the nexus between personal and professional identities, including skills, challenges, values, histories, and hopes for the future.

  16. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  17. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    aiming to develop strong brands with a limited marketing budget. Based on the Supermalt case, suggestions are made regarding branding in relation to ethnic minorities. Originality/value - This article provides a study of a brand that has become strong within a narrowly defined group of consumers.......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...... and brand identity in a qualitative study to explore how Brixtonbased Afro-Caribbean consumers construct their self-identities and the brand identity of Supermalt. Semi-structured interviews were conducted with 14 Afro-Caribbean consumers. Each interview was divided into three parts. The first part focused...

  18. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  19. Esperanto & cultural identity

    OpenAIRE

    Lehrmann, Ask; Christensen, Julie Hellesøe; Dzieza, Malgorzata; Hansen, Nathalie Gylling

    2007-01-01

    The topic of this project is the relationship between culture, cultural identity and language, and their relationship to the ambiguous concept of neutrality. Taking a case study of Esperanto, an artificial language designed with the specific intention of being a completely neutral and nationless language, we will explore how languages relate to the world. By comparing the thoughts on culture and group identity of various authors, we will then try to explore the concept of neutrality – for can...

  20. Visual identity and rebranding

    OpenAIRE

    Katarzyna Wrona

    2015-01-01

    The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further comp...

  1. Cultural Identity Through CLIL

    Directory of Open Access Journals (Sweden)

    Oprescu Monica

    2015-11-01

    Full Text Available The CLIL approach is a modern manner of teaching English, which has been adapted in Romanian schools and universities. An interesting aspect of learning a foreign language is the contact with its culture/s and the changes it produces in terms of identity. Therefore, a challenging question to be answered is whether a CLIL approach focusing on culture influences students' cultural identity.

  2. Anti-theft and Tracking System of Valuable Information Equipments%贵重信息设备防盗及追踪系统设计

    Institute of Scientific and Technical Information of China (English)

    赖韬; 王锋; 杨洪

    2014-01-01

    Based on WebGIS technology and in combination of wireless sensor networks and GPS,this paper proposes a scheme that can achieve anti-theft monitoring,location tracking,anti-theft of visualization management and tracking system. This scheme can help solve the security problem of valuable-information equipments within the government organizations military units and institutes etc.%提出一种基于WebGIS技术,并结合无线传感网络和GPS实现设备的防盗监控、失窃后的定位追踪和可视化管理的防盗及追踪系统的设计方案,解决政府、军工单位、学校等场合的贵重信息设备的防盗问题。

  3. Boxer crabs induce asexual reproduction of their associated sea anemones by splitting and intraspecific theft

    Directory of Open Access Journals (Sweden)

    Yisrael Schnytzer

    2017-01-01

    Full Text Available Crabs of the genus Lybia have the remarkable habit of holding a sea anemone in each of their claws. This partnership appears to be obligate, at least on the part of the crab. The present study focuses on Lybia leptochelis from the Red Sea holding anemones of the genus Alicia (family Aliciidae. These anemones have not been found free living, only in association with L. leptochelis. In an attempt to understand how the crabs acquire them, we conducted a series of behavioral experiments and molecular analyses. Laboratory observations showed that the removal of one anemone from a crab induces a “splitting” behavior, whereby the crab tears the remaining anemone into two similar parts, resulting in a complete anemone in each claw after regeneration. Furthermore, when two crabs, one holding anemones and one lacking them, are confronted, the crabs fight, almost always leading to the “theft” of a complete anemone or anemone fragment by the crab without them. Following this, crabs “split” their lone anemone into two. Individuals of Alicia sp. removed from freshly collected L. leptochelis were used for DNA analysis. By employing AFLP (Fluorescence Amplified Fragments Length Polymorphism it was shown that each pair of anemones from a given crab is genetically identical. Furthermore, there is genetic identity between most pairs of anemone held by different crabs, with the others showing slight genetic differences. This is a unique case in which one animal induces asexual reproduction of another, consequently also affecting its genetic diversity.

  4. IMMIGRATION, IDENTITY AND LITERATURE

    Directory of Open Access Journals (Sweden)

    Semran CENGİZ

    2010-12-01

    Full Text Available The leading problems incidental to the globalization are the immigration, the poverty, the adaptation problems of the immigrants, the identity and the cultural conflicts. The globalization actors that are transforming the whole world to a huge market, consider to commercialize the product even to the people at the other end of the world. Therefore they lay emphasis on its local identity and remark its variety as its richness. In this way the limits are easily exceeded and the consumption culture becomes available to be instilled upon even the people at the back of the beyond. However one party always wins; the more some people consume, the more some people make profit. The people who does not have any power to consume anymore, becomes the guest of the ones who get them adopt this habit and desires to receive a share from this profit.The modern world people who are not pleased with this situation, have made every effort to alienate the immigrants from the center but they could not succeed. The situation that gave rise to a conflict between parties, have also led the identity problems to occur. In the present situation, the immigrants are trying to take place in the modern world as people with hybrid identities. The music produced by the children of the immigrants with double identities, attracts attention of the world where the immigrant identity, changing its shell, promises hope as the conciliation area of the new century.

  5. Names and Collective Identity

    Directory of Open Access Journals (Sweden)

    Otto Krogseth

    2012-08-01

    Full Text Available The preceding two decades have displayed a remarkable awareness for a connection between the concepts "identity" and "cultural memory". David Lowenthal speaks of a "current craze for heritage"! Cultural heritage has become extremely popular, especially in combination with tourism, and has accordingly been converted into a modern system of meaning a type of "secular religion". With reference to collective identity and cultural memory, it is important to ask the cul- tural analytical questions: "Why identity now? Why heritage now?" My reply is that we experience a critical identity crisis. Three central aspects signify individual and collective identity: Continuity, coherence and individuality. The three aspects, constituting the concept of identity, are exposed to serious threats in the post-modern era: The danger of changeability, fragmentation and standardisation. This ten- dency has, however, met various compensating counter reactions like for instance "re-traditionalisation". In my presentation, I will examine the phenomenon cultural memory through examples from the German tradition -- principally from the works of Aleida and Jan Assmann.

  6. On a New Trigonometric Identity

    Science.gov (United States)

    Chen, Hongwei

    2002-01-01

    A new trigonometric identity derived from factorizations and partial fractions is given. This identity is used to evaluate the Poisson integral via Riemann sum and to establish some trigonometric summation identities.

  7. School-Based Administration of ADHD Drugs Decline, along with Diversion, Theft, and Misuse

    Science.gov (United States)

    DuPont, Robert L.; Bucher, Richard H.; Wilford, Bonnie B.; Coleman, John J.

    2007-01-01

    Since 2000 researchers have reported a decline in the administration of attention-deficit/hyperactivity disorder (ADHD) medications given by school nurses, although no decline has been noted in the incidence of ADHD in school-age populations. Government data for the same period show reduced levels of methylphenidate abuse as measured by its…

  8. 基于GPS-GSM的汽车短信防盗系统设计%GPS-GSM-BASED VEHICLE ANTI-THEFT MESSAGE SYSTEM DESIGN

    Institute of Scientific and Technical Information of China (English)

    刘柏楠; 张修红; 娄海波; 陈学旭

    2011-01-01

    Aiming at current problems in vehicle anti-theft devices and the market prospect, the authors put forward a new vehicle anti-theft system design proposal. The system consists of STC89C52 SCM, TC35i wireless communication module, XN934 + integrated GPS module, relay and other components. After testing, the system can be real-time monitoring of vehicles with the positioning accuracy 5 meters which realizes the anti-theft function.%针对目前汽车防盗设备存在的问题及市场应用前景,作者提出了一种新的汽车防盗系统的设计方案.本系统由STC89C52单片机、TC35i无线通信模块、XN934+一体化GPS模块、继电器等元件构成.经测试,本系统可以对汽车进行实时监控,且其定位精度为5 m,实现了汽车防盗功能.

  9. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  10. Moral identity in psychopathy

    Directory of Open Access Journals (Sweden)

    Andrea L. Glenn

    2010-12-01

    Full Text Available Several scholars have recognized the limitations of theories of moral reasoning in explaining moral behavior. They have argued that moral behavior may also be influenced by moral identity, or how central morality is to one's sense of self. This idea has been supported by findings that people who exemplify moral behavior tend to place more importance on moral traits when defining their self-concepts (Colby and Damon, 1995. This paper takes the next step of examining individual variation in a construct highly associated with IMMORAL behavior --- psychopathy. In Study 1, we test the hypothesis that individuals with a greater degree of psychopathic traits have a weaker moral identity. Within a large online sample, we found that individuals who scored higher on a measure of psychopathic traits were less likely to base their self-concepts on moral traits. In Study 2, we test whether this reduced sense of moral identity can be attributed to differences in moral judgment, which is another factor that could influence immoral behavior. Our results indicated that the reduced sense of moral identity among more psychopathic individuals was independent of variation in moral judgment. These results suggest that individuals with psychopathic traits may display immoral behavior partially because they do not construe their personal identities in moral terms.

  11. Narrating Career, Positioning Identity: Career Identity as a Narrative Practice

    Science.gov (United States)

    LaPointe, Kirsi

    2010-01-01

    In contrast to traditional definitions of career identity as an individual construct, this article argues for a discursive approach to career identity as a narrative practice. Career identity is conceptualized as a practice of articulating, performing and negotiating identity positions in narrating career experiences. By using the concept of…

  12. [The methods for the protection against counterfeit medications. Part 1. The estimation of the quality of metoprolol succinate substance and tablets from different manufacturers in terms of "identity" and "active ingredient content"].

    Science.gov (United States)

    Iakushev, V A; Morozova, M A; Elizarova, T E; Fitilev, S B; Pletneva, T V

    2012-01-01

    This paper was designed to report the results of analysis of metoprolol succinate substance and tablets obtained from two manufacturers, Akrikhin (Russia) and AstraZeneca (Sweden). The analysis was performed by spectroscopy in the near IR region and followed by the chemometric treatment of the data obtained. The method was used to confirm the "identity" of metoprolol succinate tablets. The approach to distinguishing the differences between pharmaceutical dosage forms produced by different manufacturers is proposed. Also, the method for the qualitative determination of metoprolol succinate in the pharmaceutical formulations has been developed.

  13. Ototoxic Medications (Medication Effects)

    Science.gov (United States)

    ... Information for the Public / Hearing and Balance Ototoxic Medications (Medication Effects) By Barbara Cone, Patricia Dorn, Dawn Konrad- ... Audiology Information Series [PDF]. What Is Ototoxicity? Certain medications can damage the ear, resulting in hearing loss, ...

  14. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    Within the current higher education context, early career researchers (ECRs) face a ‘risk-career’ in which predictable, stable academic careers have become increasingly rare. Traditional milestones to signal progress toward a sustainable research career are disappearing or subject...... to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  15. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity......The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...

  16. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    National Research Council Canada - National Science Library

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    .... Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card...

  17. Identity work and identity regulation in managers' personal development training

    OpenAIRE

    Andersson, Thomas

    2008-01-01

    This article describes the role of personal development training in managers’ identity processes. Personal development training constitutes a local management discourse, which can influence both identity work and identity regulation processes. The study emphasizes the importance of personal life stories in understanding how managers are influenced by personal development training. The training provokes different processes of identity work and identity regulation, and managers actively work wi...

  18. 基于STM32与GSM的汽车报警系统设计%Design of Vehicle Anti-theft System Based on STM32 and GSM

    Institute of Scientific and Technical Information of China (English)

    吴昌东; 袁红兵; 戴俊源

    2014-01-01

    应用GSM模块,实现无线的传输控制,通过终端反馈的汽车状态信息,实现用户对车的双向控制;RFID模块可以识别车主身份,传感器模块用以判断汽车的状态,通过传感器的感应读取,有效地检测汽车的异常状态,再由GSM网络通知车主以及相关部门。结合STM32处理器系统,实现了相关系统的硬件电路,介绍了相关模块的软件实现方法。该系统克服了传统的防盗系统可靠性低、反应慢等特点。%GSM module is used in the system to control the wireless transmission,get car status information through the terminal e-quipment and achieve the two-way control. The RFID module is used to identify the driver’ s identity. The sensor module is for detec-ting the vehicle’ s status. If the abnormal condition is detected,it is handled and senf to the related departments and driver. Combi-ning the internal structure of STM32 CPU,the system hardware circuit is designed, and the software design method is introduced. The traditional vehicle anti-theft system’ s disadvantages,such as low reliability and slow response are overcome in this system.

  19. Professions and their Identities

    DEFF Research Database (Denmark)

    Krejsler, John

    2005-01-01

    PROFESSIONS AND THEIR IDENTITIES: HOW TO EXPLORE PROFESSIONAL DEVELOPMENT AMONG (SEMI-)PROFESSIONS This article explores conditions for discussing what it means to be professional among teachers, pre-school teachers, nurses and social workers. From an epistemological point of view it explores how...... analytical strategies can frame in sufficiently complex ways what it means to be a professional today. It is assumed that at least four main issues must be dealt with in order to conduct a satisfactory analysis of professions and their identities. Firstly, it is of fundamental strategic importance that one...

  20. Splitting Ward identity

    Energy Technology Data Exchange (ETDEWEB)

    Safari, Mahmoud [Institute for Research in Fundamental Sciences (IPM), School of Particles and Accelerators, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of)

    2016-04-15

    Within the background-field framework we present a path integral derivation of the splitting Ward identity for the one-particle irreducible effective action in the presence of an infrared regulator, and make connection with earlier works on the subject. The approach is general in the sense that it does not rely on how the splitting is performed. This identity is then used to address the problem of background dependence of the effective action at an arbitrary energy scale. We next introduce the modified master equation and emphasize its role in constraining the effective action. Finally, application to general gauge theories within the geometric approach is discussed. (orig.)

  1. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    is that the opportunity and incentive structures clearly affect collective identities and the organising processes of the Turkish minority groups within in the three countries. The analysis shows that the immigrant organisations adapt to the structural limitations and claims and identities are negotiated within...... in terms of career paths. In Germany the integration activities are increasingly being pushed over to the immigrant organisations which now share the role of being service providers together with the welfare organisations, which also stipulates increased competition. The analysis also shows...

  2. Identity-based encryption

    CERN Document Server

    Chatterjee, Sanjit

    2011-01-01

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Ide

  3. 论《偷窃》中蕴藏的犹太伦理%On Jewish Ethics in A Theft

    Institute of Scientific and Technical Information of China (English)

    尤广杰

    2014-01-01

    阐述了索尔·贝娄在1989年出版的中篇小说《偷窃》中蕴藏的犹太伦理:重视个人内省、自新和精神上的自我净化,呼唤人们过一种有道德的生活,宣扬人与人之间的真爱。认为《偷窃》体现了贝娄一贯的深切的道德关怀,指出蕴藏其中的犹太伦理对现代人同样具有指导意义。%The paper expounds the Jewish ethics in Saul Bellow ’ s novella A Theft published in 1989. The novella emphasizes self-introspection, self-renewal, and self-purification, calls on man to live a moral life, and advocates true love between men. It embodies Bellow’ s consist-ent and profound moral concern. The embedded Jewish ethics also have guidance significance to us modern people.

  4. Grand Theft Auto IV comes to Singapore: effects of repeated exposure to violent video games on aggression.

    Science.gov (United States)

    Teng, Scott Kie Zin; Chong, Gabriel Yew Mun; Siew, Amy Sok Cheng; Skoric, Marko M

    2011-10-01

    Given the increasingly dominant role of video games in the mainstream entertainment industry, it is no surprise that the scholarly debate about their impact has been lively and well attended. Although >100 studies have been conducted to examine the impact of violent video games on aggression, no clear consensus has been reached, particularly in terms of their long-term impact on violent behavior and aggressive cognitions. This study employs a first-ever longitudinal laboratory-based experiment to examine longer-term effects of playing a violent video game. One hundred thirty-five participants were assigned either to the treatment condition where they played a violent video game in a controlled laboratory setting for a total of 12 hours or to the control group where they did not play a game. Participants in the treatment group played Grand Theft Auto IV over a period of 3 weeks and were compared with a control group on the posttest measures of trait aggression, attitudes toward violence, and empathy. The findings do not support the assertion that playing a violent video game for a period of 3 weeks increases aggression or reduces empathy, but they suggest a small increase in proviolence attitudes. The implications of the findings are discussed.

  5. Transsexual emergence: gender variant identities in Thailand.

    Science.gov (United States)

    Ocha, Witchayanee

    2012-01-01

    This paper aims to contribute to understanding of emergent gender/sexual identities in Thailand. Thailand has become a popular destination for sex change operations by providing the medical technology for a complete transformation, with relatively few procedures and satisfactory results at a reasonable price. Data were gathered from 24 transsexual male-to-female sex workers working in Pattaya and Patpong, well-known sex-tourism hot spots in Thailand. Findings suggest the emergence of new understandings of gender/sexual identity. Sex-tourism/sex work significantly illuminates the process through which gender is contested and re-imagined. The coming together of cultures in Thailand's sex industry, coupled with advances in medical technology, has resulted in the emergence of new concepts of gender.

  6. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  7. On the fundamentals of identity.

    NARCIS (Netherlands)

    van der Gaag, Mandy

    2016-01-01

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  8. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity......Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... approach to understanding the emergence of brand identity is employed in case studies of 10 case companies reflecting both B-to-B and B-to-C companies. Findings: In all cases we see that brand identity is not a clear, enduring identity as suggested in the literature but is formed in a co-creative process...

  9. Identity-based consumer behavior.

    OpenAIRE

    Reed, Americus; Forehand, Mark; Puntoni, Stefano; Warlop, Luk

    2012-01-01

    Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity. Identity can be defined as any category label with which a consumer self-associates that is amenable to a clear picture ...

  10. Fluidity, Identity, and Organizationality

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    2015-01-01

    that the organizationality of a social collective is accomplished through “identity claims”—i.e., speech acts that concern what the social collective is or does—and negotiations on whether or not these claims have been made on the collective's behalf. We empirically examine the case of the hacker collective Anonymous...

  11. Gendered Avatar Identity

    Science.gov (United States)

    Woolums, Viola

    2011-01-01

    Gendered appearance in "World of Warcraft" is of particular interest because it seems to infiltrate interactions between individuals without serving a functional purpose within the game itself. It provides an opportunity to look at avatar choice in environments that have a primary purpose aside from existing as an arena for creating identity, and…

  12. Dissociative Identity Disorder

    Science.gov (United States)

    Schmidt, Tom

    2007-01-01

    Few psychological disorders in the Diagnostic Statistical Manual have generated as much controversy as Dissociative Identity Disorder (DID). For the past 35 years diagnoses of DID, previously referred to as Multiple Personality Disorder (MPD), have increased exponentially, causing various psychological researchers and clinicians to question the…

  13. The Visual Identity Project

    Science.gov (United States)

    Tennant-Gadd, Laurie; Sansone, Kristina Lamour

    2008-01-01

    Identity is the focus of the middle-school visual arts program at Cambridge Friends School (CFS) in Cambridge, Massachusetts. Sixth graders enter the middle school and design a personal logo as their first major project in the art studio. The logo becomes a way for students to introduce themselves to their teachers and to represent who they are…

  14. Bilingualism versus identity

    DEFF Research Database (Denmark)

    Hermann, Jesper

    1988-01-01

    During the last hundred years psychologists, philosophers and theologians have developed two different conceptions of personal identity. One of them insists that each person is a unique and transcendental being, whereas the other finds the personality deriving from interaction with other persons........ (This is the prevailing view today.) These theories are placed in relation to the difficulties an immigrant encounters....

  15. Gender, Identity and CMC.

    Science.gov (United States)

    Yates, Simeon J.

    1997-01-01

    Some research and popularized accounts have claimed computer-mediated communication (CMC) based interactions are free of gender inequality though a growing body of research has documented gender differences in access and practice. This article examines both positions and cultural aspects of gender identities to make clear the centrality of gender…

  16. What about Linguistic Identity?

    Science.gov (United States)

    Andrews, Micah

    2010-01-01

    The recent influx of Latino immigrants in the Mid-West U.S. has also increased the number of Mexican students in schools. As recent immigrants, one of the challenges Mexican students face besides learning a different language is the construction of new identities in unfamiliar environments. Learning a language involves acquiring another identity…

  17. Teaching European Identities

    Science.gov (United States)

    Raento, Pauliina

    2008-01-01

    The political, cultural and social make-up of Europe is changing fast. A new European identity is under construction, but old contradictions and diversity challenge its contents, forms and boundaries. Migration, the changing role of the nation-state and Europe's regions, the reshaping of politico-administrative and perceptional boundaries, the…

  18. Language and Identity Explored

    Directory of Open Access Journals (Sweden)

    Thomas Rozanov

    2016-06-01

    Full Text Available The relationship between language and identity is widely discussed in applied linguistics, sociology, communications and other related scholarly fields. Furthermore, many researchers have focused on the post-Soviet region, which given its unique historical context allows for testing of this relationship. The widespread bilingualism as a result of historical russification and the linguistic transformations that occurred after the collapse of the Soviet Union make the region a ‘sociolinguistic playground’. Recent events in Ukraine have given grounds to further explore this relationship, now in attempt to link language and identity as potential forces for geopolitical change in the region. This paper presents an overview of existing research, theories, and opposing perspectives related to the relationship between language and identity, and considers complications such as historical russification, religious influence, socioeconomic factors, and education with regards to the Ukrainian and post-Soviet context.  I aim to illustrate the significance of language and its effects on socio-political change in the case of Ukraine, by presenting arguments and complications in support of the relationship between language and identity.

  19. Spatial Identity in Gagauzia

    Directory of Open Access Journals (Sweden)

    A. V. Salavatova

    2015-01-01

    Full Text Available Historically the gagauz developed a self-perception based on their difference from Moldova as well as the ‘Turkish world’. The article argues that this fact has determined their pro-Russian political orientation as the only possible way of maintaining their identity

  20. Graduate Identity and Employability

    Science.gov (United States)

    Hinchliffe, Geoffrey William; Jolly, Adrienne

    2011-01-01

    This paper develops the concept of graduate identity as a way of deepening the understanding of graduate employability. It does this through presenting research in which over 100 employers in East Anglia were asked to record their perceptions of graduates in respect of their employability. The findings suggest a composite and complex graduate…

  1. Language and Social Identity

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    A person' s language and social identity are in fact an inseparable entity. When I was in Australia, as I can recall, my neighbour practised his speaking every morning, making it both pleasant and a privilege to hear, for the purpose of getting into parliament.

  2. Migration, Narration, Identity

    DEFF Research Database (Denmark)

    Leese, Peter

    three consecutive summers from 2010 to 2012. The articles focus on various aspects of the migrant experience and try to answer questions about migrant identity and its representations in literature and the media. The book closes with an original play by Carlos Morton, the Chicano playwright working...

  3. Discourses of Identity

    Science.gov (United States)

    Van Leeuwen, Theo

    2009-01-01

    This lecture discusses the concept of lifestyle, which emerged in the field of marketing in the 1970s, as a new, and increasingly pervasive, discourse of identity cutting through older "demographic" discourses. Distributed by mediated experts and role models, and realized through the semiotics of "composites of connotation", it redraws the…

  4. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...

  5. Story Telling: Crafting Identities

    Science.gov (United States)

    McMahon, Mary; Watson, Mark

    2013-01-01

    Career guidance clients are seeking to craft new identities that better position them in their careers. The focus of the present article is on narrative career counselling's potential contribution in providing a meaningful and useful experience for career guidance clients. To illustrate the potential of narrative career counselling, the story…

  6. Imagining Geographies, Mapping Identities

    Directory of Open Access Journals (Sweden)

    Matthew Graves

    2015-03-01

    Full Text Available The ambition of this issue of Portal is to reach across the methodological boundaries of history, politics, literature and geography to apply their complementary perspectives to the study of identity and its relation to space and place, an aim that involves attempting to identify the many different ways the notoriously slippery concepts of identity and geography may intersect. For this issue we have selected articles that cast a fresh perspective on two areas where identity and geography intersect: the construction of identity through the imaginative recreation of place in literature: Mapping Literary Spaces; and the study of the shifting relationships of centre and periphery, exclusion and inclusion in urban settings and geopolitical confrontations: Social and Political Peripheries. Gerard Toal has written that geography is not a noun but a verb: it does not describe what space is but studies what we do with space, imaginatively and politically. The articles in this issue illustrate the exercise of the literary and political imagination and the role of materiality and memory in the creation of geographic representation. They show too a new awareness of the centrality of space in the constitution of identities, and the need for a new geocritical reading of its discourse, as the interrelations of place and community are played out on the many scales of social and political life, from the local to the global.   The special issue is organised thus: Introduction Matthew Graves (Aix-Marseille University & Liz Rechniewski (Sydney University: “Imagining Geographies, Mapping Identities.” I. Mapping Literary Spaces - Isabelle Avila (University of Paris XIII, "Les Cartes de l'Afrique au XIXe siècle et Joseph Conrad : Perceptions d'une Révolution Cartographique." - Daniela Rogobete (University of Craiova, "Global vs Glocal: Dimensions of the post-1981 Indian English Novel." II. Social and Political Peripheries - Elizabeth Rechniewski (Sydney

  7. Music and collective identities

    Directory of Open Access Journals (Sweden)

    Milanović Biljana

    2007-01-01

    Full Text Available This paper presents some introductory observations on the ways in which the opposition between the modern and post-modern understanding of social identities can be overcome in the context of musicology. It is based on the consideration of identities as dynamic and changeable categories, as well as on the importance of the relation between individual and collective positionings, on the complexities of the multiple identifications and on the understanding of music as a social construction of identity. Due attention is paid to basic theoretical and methodological aspects in the interdisciplinary analysis of ′self′ and ′other′. In music, the problems of self-presentation appropriation, difference, power, control, authenticity, hybridity, as well as other issues that blur the boundaries between musicology, ethnomusicology and the studies of popular music, are made relevant by these interdisciplinary terms. Both the modern and post-modern understanding of identity can first be placed in the context of the binary questions: ′How to construct the identity and maintain it?′ and ′How to avoid the construction of the fixed identity and thus leave the door open for the possibility of change?′. It seems that the deconstruction of these opposite approaches has now grown in importance. This paper focuses especially on that kind of theorizing about music and socio-cultural identities. The views of Georgina Born and David Hesmondhalgh, that older and recent models of music representation are not ′either/or′ categories but rather complement each other, are especially singled out. These authors show by numerous examples that music can invariably both reflect existing identities and construct new ones. They conclude that possible shortcomings, such as the danger of essentialism in the earlier approach, and of later reductionism, could be avoided by carefully using the homology and process models of music representation. Their typology of music

  8. The higher vocational medical inspection technology present situation investigation and study of students' professional identity--Take Langfang health vocational college for example%高职医学检验技术学生的专业认同现状调查研究--以廊坊卫生职业学院为例

    Institute of Scientific and Technical Information of China (English)

    马杰; 彭海平; 史志春; 李婷

    2015-01-01

    目的:从专业认知、专业情感、专业意志、专业价值观、专业技能、专业期望六个维度描述廊坊卫生职业学院医学检验技术专业学生专业认同的现状,提出强化学生专业认同的策略,以促进医学检验技术专业的发展、促进学生成长、成才。方法:对我校93名高职检验技术专业学生专业认同情况进行问卷调查,运用SPSS软件对调查数据进行描述性统计。结果:廊坊卫生职业学院高职医学检验技术专业一年级学生在六个维度方面评分均稍高于二年级学生。在专业价值观方面(t=2.80,P=0.01,P<0.05),有统计学意义。结论:加强专业紧迫感教育,建立见习机制,加强就业指导,使其看到自己的未来,提高学生专业认同感。%Objective:from the professional cognition, emotion, will, professional values, professional skills, professional expectations six dimensions to describe Langfang vocational college health medical inspection technology professional students' recognition of the status quo, put forward the strategies of the students' professional identity, to promote the development of professional medical test technology, promote the students' growth and success. Methods:carry questionnaire survey on 93 inspection technology major students about professional identity, using SPSS software to descriptive statistics survey data. Results:Langfang health vocational college first-year students in the major of higher vocational medical inspection technology in six dimensions scores are slightly higher than the second grade students. In the aspect of professional values (t=2.80, P=0.01, P<0.05), with statistical significance. Conclusion:the sense of urgency to strengthen the professional education, set up the mechanism of trainee, strengthen employment guidance, make them care about their own future, to improve students' professional identity.

  9. Identity Development and Identity Formation: A Theoretical Assessment

    Directory of Open Access Journals (Sweden)

    Hasan Atak

    2011-03-01

    Full Text Available Basic function of adolescence -one of the human life periods when physical and mental changes are experienced most heavily- is suggested to be identity development. Recent developmental psychology studies hypothesized that identity development starts during adolescence but intensifies during transi-tion to adulthood. This study addresses identity concept, in detail, from a theoretical point of view and in the scope of empirical studies. Literature offers quite different explanations and models as well as a few basic theories in this framework. The number of studies on identity subject is higher than the number of studies on other psycho-social study subjects. This study presents the theories offering basic explanations about identity (such as the works of Erikson, Marcia, Berzonsky, Waterman and the theories referring to identity (such as the works of Blos, Arnett, Kegan. Theories related to identity are addressed under the titles of identity exploration, identity status and identity styles. Almost all of the identity studies conducted in Turkey focused on identity status. In this context, new theories and tendencies may be taken into consideration in the studies to be made in Turkey on identity development.

  10. Transformation from Identity Stone Age to Digital Identity

    Directory of Open Access Journals (Sweden)

    Mohit Kohli

    2011-05-01

    Full Text Available Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization.People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  11. Transformation from Identity Stone Age to Digital Identity

    CERN Document Server

    Kohli, Mohit

    2011-01-01

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience. This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.

  12. Social identities and risk

    DEFF Research Database (Denmark)

    Blok, Anders; Jensen, Mette; Kaltoft, Pernille

    2008-01-01

    Expert-based environmental and health risk regulation is widely believed to suffer from a lack of public understanding and legitimacy. On controversial issues such as genetically modified organisms and food-related chemicals, a "lay-expert discrepancy" in the assessment of risks is clearly visible...... of social identities. On the basis of qualitative interviews with citizens and experts, respectively, we focus on the multiple ways in which identities come to be employed in actors' risk accounts. Empirically, we identify salient characteristics of "typical" imagined experts and lay-people, while arguing...... that these conceptions vary identifiably in-between four groups of citizens and experts. On the basis of our findings, some implications for bridging the lay-expert discrepancy on risk issues are sketched out....

  13. Novell Identity Manager 4

    Institute of Scientific and Technical Information of China (English)

    王志超

    2010-01-01

    本刊讯 5月27日,Novell推出Identity Manager 4解决方案系列,它可在跨物理、虚拟和云环境中安全地进行身份和访问管理。Novell Identity Manager4是业界首个在企业整体IT生态系统中,可确保身份、安全和合规策略连贯一致的解决方案,并在云环境中提供与数据中心环境相同水平的高安全性和稳定性。

  14. Holy Nations. Global Identities

    DEFF Research Database (Denmark)

    Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical and histo......Along with the processes of globalisation and the end of the cold war we have seen an upsurge in religious nationalism and an increasing focus on the role of religion as a legitimising force in democratic secular states. Holy Nations & Global Identities draws on the combined theoretical...... and historical insight of historians, political scientists and social scientists on the question of nationalism and globalisation with the methodological knowledge of religion presented by sociologists of religion. The book brings genuine theoretical explorations and original case studies on civil religion...

  15. Identity in craft

    Directory of Open Access Journals (Sweden)

    Agneta Knutas

    2013-06-01

    Full Text Available In contrast to efficiency, a bakery on the countryside in Norway is known for its slow pace of work. The slow pace allows the product, as well as the craftsperson, time in production and quality in relation to market. Therefore, the emphasis is on the importance of the aesthetic in craft, the building of identity as well as the association of tradition as part of the craft. Furthermore, allowing the time to understand both craft and tradition is what makes knowledge meaningful (Arendt, 1998/1958. Closely following craftsmen at a bakery in Norway, for two days, allowed the collection of observations and interviews. This paper is presented in narrative format. The study utilises support from Sennett (2009 and Arendt (1998/1958 in the analysis of the collected empirical data. The results regarding identity and enhancing vocational education in craft point towards the importance of concentration, judgement, an unhurried education process and a sociable master.

  16. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  17. Identity Construction, Negotiation, and Resistance: Reconsideration of "Japanese" Identity

    Science.gov (United States)

    Fukuda, Chie

    2010-01-01

    This dissertation explores identity construction, mainly focusing on the ethnonational identity of "Japanese," in contrast to that of "non-Japanese" from ethnomethodological and social constructionist perspectives. Within these approaches, identity is not given "a priori" but emerges through sociohistorical contexts…

  18. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  19. Does Everyone Have a Musical Identity?: Reflections on "Musical Identities"

    Science.gov (United States)

    Gracyk, Theodore

    2004-01-01

    The book, "Musical Identities" (Raymond MacDonald, David Hargreaves, Dorothy Miell, eds.; Oxford and New York: Oxford University Press, 2002) consists of 11 essays on the psychology of music. The editors divided the essays into two groups: those on developing musical identities ("identities in music" involving recognizable social and cultural…

  20. Identity Styles and Religiosity: Examining the Role of Identity Commitment

    Science.gov (United States)

    Grajales, Tevni E.; Sommers, Brittany

    2016-01-01

    This study observed the role of identity styles, identity commitment, and identity statuses in predicting religiosity in a sample of undergraduate students attending a Seventh-day Adventist university (N = 138). Two structural models were evaluated via path analysis. Results revealed two strong models for the prediction of religiosity. Identity…

  1. Android平台手机防盗系统的安全解决方案%Security Solution for Mobile Anti-theft System Based on Android

    Institute of Scientific and Technical Information of China (English)

    江燕良; 黄海于

    2013-01-01

    In the Android mobile application development,mobile phone anti-theft function is an important security technology.Based on Android,this paper brings forth the security solution to mobile phone's anti-theft technology,using a mobile phone cloud platform related technologies through the realization of three functional modules including anti-theft tracing,remote control and instant messaging.First,we introduce the framework of the overall system structure and then have a detailed analysis of specific implementation for each module.Finally,the web-side access and remote control to the Android smart phone are achieved by the development of specific instance and fully test on the equipment providing important clues to track the mobile phone for its owner.%在Android移动应用开发中,手机防盗是一项重要的安全技术.基于Android手机平台,提出并设计了一种手机防盗的安全解决方案,利用一种手机云平台的相关技术,实现了防盗追踪、远程控制和即时通信三个功能模块.首先介绍了整个系统的框架结构,然后详细分析了各个模块的具体实现,最后在手机上进行了测试.实现了通过Web网页的形式对被盗手机进行远程控制,为用户找回手机提供重要的线索.

  2. 我国身份盗窃的刑法规制研究——兼与美国身份盗窃刑法规制的比较%On the Criminal Regulation about Identity Theft in China——And the Comparative Analysis with the United States' Criminal regulation about Identity Theft

    Institute of Scientific and Technical Information of China (English)

    傅芸

    2013-01-01

    身份盗窃具有严重的法益侵害性,应当运用刑法予以规制.但是我国现行刑法并没有为其设置专门罪名,而是通过对其预备行为与后续行为的禁止来实现对身份盗窃的间接规制.并且相关规范在行为的内容、主体、对象以及主观方面等要素的规定上存在严重的不足,无法满足规制的需要.而美国联邦及所属州和地区却通过不同模式的制定法为我们展现了运用刑法对身份盗窃进行直接规制的可能.这些模式大致分为两类,两类模式各有优劣.本文在比较分析的基础上,探索分析了我国完善身份盗窃刑法规制的途径与措施.

  3. Entrepreneurship Education as Identity Workspace

    DEFF Research Database (Denmark)

    Frederiksen, Signe Hedeboe

    2016-01-01

    and identities. Exposed to identity work practices in class, learners experienced conflicting demands participating as succesful students and participating as potential entrepreneurs. The study draws attention to how an education setting contextualises identity work as a social practice. It critisises......Entrepreneurship education theory and practice show increasing interest in identity work as an important part of entrepreneurial learning. Entrepreneurship programs become identity workspaces where pedagogical designs stimulate entrepreneurial identity work and support individuals’ discovery...... of themselves as entrepreneurs. This article investigates how entrepreneurship education is practiced as an identity workspace, when reflective identity work is turned into a pedagogical strategy for entrepreneurial learning. I present empirical data from a qualitative fieldstudy in an eleven week mandatory...

  4. Object Identity in Database Systems

    Institute of Scientific and Technical Information of China (English)

    李天柱

    1995-01-01

    The concept of object identity and implementation of object identity in some systems have been explained in literature.Based on an analysis on the idea of data scheme in ANSI/X3/SPARC,this paper presents the concept of full-identity,which includes entity identity,conceptual object identity,and internal object identity,In addition,the equality of objects,which is richer and more practical,is discussed based on the full identity of objects.Therefore,the semantics and constructions of the identity for the complex objects are fully observed,and some appliactions in object management,version management,and user interface are found.Also,it could support the combination of O-O model with V-O model.

  5. Genetics, Identity, and Justice- DNA and Indigeneity Symposium

    OpenAIRE

    Daryl Pullman

    2015-01-01

    Drawing on some recent cases from Newfoundland and Labrador (e.g. repatriation of Beothuk remains; membership in the Qalipu Mi’kmaq ‘landless’ tribe), this presentation explores differing notions of identity (e.g. genetic, cultural, and otherwise) as well as various conceptions of justice (distributive, compensatory, retributive, restorative) relating them to issues of repatriation, tribal identity, and land claims. Dr. Daryl Pullman is Professor of Medical Ethics at Memorial University ...

  6. John locke on personal identity.

    Science.gov (United States)

    Nimbalkar, Namita

    2011-01-01

    John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self) to be founded on consciousness (viz. memory), and not on the substance of either the soul or the body.

  7. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Nimbalkar Namita

    2011-01-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  8. John locke on personal identity

    Directory of Open Access Journals (Sweden)

    Namita Nimbalkar

    2011-03-01

    Full Text Available John Locke speaks of personal identity and survival of consciousness after death. A criterion of personal identity through time is given. Such a criterion specifies, insofar as that is possible, the necessary and sufficient conditions for the survival of persons. John Locke holds that personal identity is a matter of psychological continuity. He considered personal identity (or the self to be founded on consciousness (viz. memory, and not on the substance of either the soul or the body.

  9. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    number of people G = identity group (e.g. gender, ethnicity, etc.) D = identity (e.g. male/ female , White/Black/Spanish/… etc.) R = real resources for an...actions as part of a collective. The collective actions are driven by social identity entrepreneurs (SIDs) (Haslam & Reicher, 2007; Lal, 1997). These...social identity entrepreneurs only advocate a collective action on behalf of the group when they perceive benefits of advocating being greater than

  10. Health identities: from expert patient to resisting consumer.

    Science.gov (United States)

    Fox, Nick; Ward, Katie

    2006-10-01

    This article explores the formation of 'health identities': embodied subjectivities that emerge out of complex psychosocial contexts of reflexive modernity, in relation to data on health and illness practices among groups of people and patients using medical technologies including weight-loss drugs and the erectile dysfunction drug sildenafil (Viagra). We examine a range of health identities, from the 'expert patient'--a person who broadly adopts a biomedical model of health and illness, to a 'resisting consumer', who fabricates a health identity around lay experiential models of health and the body. The understanding of health identities is developed within a theoretical framework drawing on previous work on body/self and the work of Deleuze and Guattari. It is concluded that the constellation of health identities reflects the diversity of relations in an industrialized, technology-driven, consumer-oriented and media-saturated society.

  11. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    2008-01-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through reco

  12. Identity Development in Deaf Adolescents

    Science.gov (United States)

    Kunnen, E. Saskia

    2014-01-01

    We studied identity development during 5 years in seven deaf adolescents who attended a school for deaf children in the highest level of regular secondary education (age between 14 and 18 years), administering identity interviews every year. Identity development is conceptualized as the processes of exploration and commitment formation (Bosma,…

  13. New identities for sessile drops

    CERN Document Server

    Hajirahimi, Maryam; Fatollahi, Amir H

    2014-01-01

    A new set of mathematical identities is presented for axi-symmetric sessile drops on flat and curved substrates. The geometrical parameters, including the apex curvature and height, and the contact radius, are related by the identities. The validity of the identities are checked by various numerical solutions both for flat and curved substrates.

  14. Ethnic Identity: Crisis and Resolution.

    Science.gov (United States)

    Ruiz, Aureliano Sandoval

    1990-01-01

    Presents Chicano/Latino ethnic identity development model that fosters understanding of ethnic identity conflicts particular to Chicano and Latino clients. Presents five stages (causal, cognitive, consequence, working through, and successful resolution) in relationship to ethnic identity conflicts, interventions, and resolution. Combines several…

  15. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss...... in opposite directions towards the fulfillment of desire at one end of experience and a world of fear and despair at the other, and in relation to its notion of a better society, what interests literature is a society of contented families joined through the marriage of their adult children....

  16. Digital identity management

    CERN Document Server

    Laurent, Maryline

    2015-01-01

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT)), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analys

  17. FINDING MY IDENTITY

    Institute of Scientific and Technical Information of China (English)

    Keith Farnish

    2010-01-01

    @@ I have found an identity. Is that really such a big deal? The thing is,I didn't realize I was missing one.There are so many things I could call myself: a human,male,a father,a husband,a writer,a thinker,a gardener,a campaigner...so many things that I feel pretty comfortable with,yet until a couple of weeks ago I didn't realize there was something missing; something that yawned inside me,empty and lacking substance.

  18. Shifting Design Consultancy Identities

    DEFF Research Database (Denmark)

    Larsen, Henry; Huijboom, Nina; Holm Nielsen, Anne

    2014-01-01

    and identities that resonate more with freelancing and portfolio careers than with the intention of creating firms that are intended to expand. We recognized a pattern where freelancers build up their work as a portfolio by moving from one engagement to another, a process that we will call sequential freelancing...... on design for innovation as a strategy for growth might well benefit if they understand that other companies in their municipality can grow if they actively support designers and help them develop their networking capabilities....

  19. What is digital identity?

    OpenAIRE

    Ertzscheid, Olivier

    2016-01-01

    The question of digital identity and e-reputation is central in today’s Internet ecosystem, both in terms of individual and collective use. This book is an accessible guide to cutting-edge research on the subject and provides an overview of the fundamental issues that individuals need to master in order to retain control over their or their organization’s online presence. This is a book for readers who wish to discover more about this rich and complex issue, as well as for businesses, organi...

  20. Understanding your digital identity

    OpenAIRE

    Williams, Shirley Ann; Fleming, Sarah Christine; Lundqvist, Karsten Oster; Parslow, Patrick Neil

    2010-01-01

    The term “Digital Identity” is used here to describe the persona a person projects across the internet. Your Digital Identity as perceived by other people is made up of material that you post yourself (for example photographs on Flickr and your own web page) but it also is made up of material other people put there about you (blog posts that mention you, photographs in which you are tagged). The “This is Me” project has developed resources that can be used by students and others to appreci...

  1. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  2. 车辆抵押他人又窃回的行为性质之辨析%Study on Actor Possessing a Fake National Identity Card Mortgages its Motor Vehicle and Stoles back to Owner

    Institute of Scientific and Technical Information of China (English)

    陈姣莹; 潘庸鲁

    2012-01-01

    The defendant borrows his relative's motor vehicle, and he gains a seventy-two thousands RMB by possessing a fake national identity and driving license mortgages to the victim, and then he stoles back to the owner. The defendant implements two behaviors in the whole case, including fraud and theft. In fraud, the victim is his relative on the basis of bona fide acquisition. Xue is affirmed victim's identity only if the defendant implements the theft. Apparently theft is to sever defendant's fraud. So we can affirm that the implicated relation between two actions depend on the judgment rule of implicated offender. Therefore, the case should be convicted crime of larceny on the basis of double-aggravated principle.%被告人孙某借用亲戚弓某的车辆后,通过伪造弓某身份证和机动车证将车质押给被害人薛某,从中骗取7万余元,随后又将车偷回还给弓某。在整个案件中被告人实施了诈骗和盗窃两个行为。在诈骗行为中,根据善意取得原则实际的被害人应是弓某而非薛某,只有被告人实施盗窃行为后薛某的被害人身份才得以确立。显然,盗窃行为的实施只不过服务于被告人诈骗行为的既遂。因而根据牵连犯判断规则可以认定两行为之间构成牵连关系。因此,根据从一重罪处断原则,本案应以盗窃罪定罪处罚。

  3. Negotiating hearing disability and hearing disabled identities

    DEFF Research Database (Denmark)

    Lykke Hindhede, Anette

    2012-01-01

        Using disability theory as a framework and social science theories of identity to strengthen the arguments, this paper explores empirically how working-age adults confront the medical diagnosis of hearing impairment. For most participants hearing impairment threatens the stability of social...... interaction and the construction of hearing disabled identities is seen as shaped in the interaction with the hearing impaired person‟s surroundings. In order to overcome the potential stigmatisation the „passing‟ as normal becomes predominant. For many the diagnosis provokes radical redefinitions of the self....... The discursively produced categorisation and subjectivity of senescence mean that rehabilitation technologies such as hearing aids identify a particular life-style (disabled) which determines their social significance. Thus wearing a hearing aid works against the contemporary attempt to create socially ideal...

  4. Contextuality of identical particles

    Science.gov (United States)

    Kurzyński, Paweł

    2017-01-01

    There exist quantum phenomena that cannot be explained by noncontextual hidden-variable theories, yet the majority of them requires measurements that are performed on a single quantum system at a time. This fact constrains the phenomenon of contextuality to the microscopic domain. It is therefore natural to ask if quantum contextuality can be observed in measurements on collections of particles. Since particles in nature are identical, one can expect that such contextuality would be linked to bosonic and fermionic properties. Analysis of quantum contextuality in such scenarios would broaden our understanding of nonclassical effects in composite systems and perhaps would give us a hint on how to observe quantum phenomena in the macroscopic world. In this work I propose a generalization of quantum contextuality to the case of many identical particles. I show that a type of contextuality exhibited by a collection of particles (state dependent, state independent, or noncontextual) depends on their type and their number. I also discuss further properties of this generalization and identify major open questions.

  5. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  6. Gender Socialization and Identity Theory

    Directory of Open Access Journals (Sweden)

    Michael J. Carter

    2014-05-01

    Full Text Available Gender socialization is examined through a social psychological lens by applying identity theory and identity control theory. Current research from the fields of family and sociological social psychology are surveyed to provide a better conception of how the family operates as agents of socialization, and how identities that are cultivated and fostered in youth provide meaning throughout the life course and maintain the social order. The application of identity theory shows how gender is a diffuse status characteristic, which is salient in person, role, and social (group identities, and also across social situations. Identity control theory is applied to show how emotions operate within an internal control system to stabilize gendered identities and perpetuate the social structure. Both theories are specifically applied to understand socialization dynamics that exist for children and families.

  7. Implementation of Mobile Phone Anti-theft Tracking Based on Android%基于Android平台手机防盗追踪功能的实现

    Institute of Scientific and Technical Information of China (English)

    张浩; 陈盛云

    2011-01-01

    In the Android mobile application development,mobile phone anti-theft tracking function is an important security technology.In order to accomplish this purpose,using Android radio mechanism this application will monitor mobile phone whether started background after cell phone users open anti-theft tracking function.Through monitoring the change of the IMSI code of the cell phone users′SIM,the application intercept and analyze the security messages,and realize the function that the illegal users′mobile phone number to send a special message to the security number of the legitimate users preset.%在Android移动应用开发中,手机防盗追踪功能是一项重要的安全技术。为了达到此目的,利用Android广播机制,当手机用户开启防盗追踪后,本程序将后台监听手机开机启动,通过监听手机用户SIM卡的IMSI码改变来判断手机安全状态,监听并截获安全短信内容,实现非法用户的手机号码向合法用户预先设置的安全号码发送特殊信息的功能。

  8. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...... information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...

  9. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...

  10. Identities at Odds

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2015-01-01

    This study offers an interaction analytic account of how linguistic identities in internationalized workplaces in Denmark are indexed against members’ institutional positions in particular interactional settings. Where language policy may not be explicitly articulated between members, it is still...... embedded in how participants micro-manage their interactions, and implicit in how member’s display orientations to deviance, in the case of encountering others in the workplace whose language repertoires or preferences do not meet with expectation pertaining to the institutional position they hold....... The study uses recordings of naturally occurring interaction in different international workplace settings, and argues for greater attention to be paid to the actual language-policy practices in international workplace settings, as a entry point into developing a more nuanced understanding of the practices...

  11. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... of the Workshop are: The European Biometrics Forum, The Danish Biometrics Research Project Consortium, the UK Biometrics Institute and the Institution of Engineering and Technology. The BIOID workshop was jointly organized and held at the Roskilde University in Denmark from May 7 — May 9, 2008....

  12. Identities in Conflict

    DEFF Research Database (Denmark)

    Andersen, Dorte Jagetic

    2015-01-01

    the national public school system. The main hypothesis is, that parts of the dysfunction stems from the national lack of semantics and competence to understand and discuss experience with warzone extremes, children and spouses of Danish Soldiers and Veterans miss the language to talk and be silent. I propose......, that systems theory is both able and competent to analyze the missing gaps and empty spaces of the competing identities inside and outside the forms of peace and war. Through the use of Luhmannian systems theory and form analysis, the children and partners of war veterans give us the chance to observe...... 'inbetween'. In public education, those Soldier-kids often show abnormal behaviour and dysfunctional social integration and mental regulation. Health Care Systems and social workers turn to diagnoses of secondary traumatization, attachment disorder and develop therapies to calm the effects of exposure to War...

  13. Scripting Professional Identities

    DEFF Research Database (Denmark)

    Bévort, Frans; Suddaby, Roy

    2016-01-01

    This article examines how individual accountants subjectively interpret competing logics of professionalism as they transform from practicing accountants to managerial roles and as their organizations transform from traditional professional partnerships to more corporate organizational forms. Based...... on a longitudinal ethnography of professionals in a Big Four accounting firm we analyse the process by which individual professionals make sense of their new roles and integrate the conflicting demands of professional and managerial logics. We find that individuals are active authors of their own identity scripts...... logics is based less of inter-subjective interactions, as prior literature has assumed, and is, instead, based on individual cognition and interpretive subjectivity. We also contribute to research in professional service firms by offering a conceptual model of the individual micro-processes required...

  14. Nostalgia and lost identity.

    Science.gov (United States)

    Pourtova, Elena

    2013-02-01

    Nostalgia for the Soviet Union is a major social phenomenon in Russia today due to the irrevocable losses of the recent past in which Soviet citizens involuntarily became immigrants in their own country. With reference to discussions of nostalgia in philosophical and psychoanalytic literature, I suggest that nostalgia may represent either a defensive regression to the past or a progressive striving for wholeness through re-connecting with what has been lost in the service of a greater integration. I compare this with the processes of adaptation seen in immigrants and provide a clinical illustration of a young man coming to terms with loss and change in the post-Soviet era. When nostalgia is recognized as a legitimate emotional experience it may facilitate mourning and enable the integration of the past with the present and the development of a new identity.

  15. When design meets identities

    DEFF Research Database (Denmark)

    Dau, Susanne

    2013-01-01

    The aim of this paper is to present result from the first period of implementing models of blended learning in two Danish educations centers at a University College. The question addressed is how activation of blended learning models in undergraduate education for teacher and radiography affects...... through a critical hermeneutical process of prefiguration, configuration and refiguration. The results illustrate a significant impact of students identities as a part of the referential whole, since it is both prerequisite and an obstruction in the activation of blended learning environments...... knowledge development and which are the constraints or challenges to take into consideration in the process of implementation. The research takes its departure in the two different models of blended learning designed by teachers in undergraduate education centers. This is an investigation of the first...

  16. Creation, Identity and Reflection

    Directory of Open Access Journals (Sweden)

    Alina Beatrice Cheşcă

    2015-05-01

    Full Text Available The paper “Creation, Identity and Reflection” approaches the identification in the “mirror” of reality with creation, in other words seeking the authors’ identity in the reflected images. Reflection means attempting to find oneself, the mirror being the main principle of creation. Many characters become interesting only when they step into the world beyond the mirror, when their faces are doubled by the other self or when their selves are returned by other characters. The narcissistic concept of the mirror, i.e. the reflection in the mirror and the representation of the mirror itself, is a recurrent one in literature, but the reflection of the self which is not the self (as it is a reflection does not necessarily appear in a mirror or in a photograph or portrait. Sometimes, the not-self is returned to the self by another person or character. As far as Oscar Wilde’s theories are concerned, the main idea is that people are interesting for their masks, not for their inner nature. What Wilde calls “inner nature” is the characters’ un-reflected self and the mask is the reflection, the self in the mirror. Some characters’ relationships develop within a fiction that they dramatically try to preserve and protect with the risk of suffering. They refuse to take off the masks which define them in the others’ minds and hearts; the narcissistic individuals (both artists and characters seek and love their own image which they project upon facts, thus creating a fictive realm.

  17. Identity at work: Exploring strategies for Identity Work

    Directory of Open Access Journals (Sweden)

    Byron G. Adams

    2012-01-01

    Full Text Available Orientation: This study explored strategies for identity work that are central to the negotiation and regulation of employee work identity.Research purpose: The main aim of this study was to explore employee narratives and identify the strategies available to them in the process of identity work, as they defined themselves at work.Motivation for the study: As there is a scarcity of research on identity work in South Africa, this study wanted to advance knowledge about identity work and the strategies used for regulating and negotiating an identity at work by exploring these constructs in this context.Research design, approach and method: A qualitative research process formed the basis for this study. Nineteen employees from a global manufacturing company participated in two semi-structured in-depth interviews. Grounded theory was applied to analyse and interpret the data.Main findings: Nine strategies for identity work were identified and categorised into four broad themes (personal philosophies; relationships; career management and negotiating balance.Practical/managerial implications: Employees followed various strategies for defining themselves at work and this may have some implications for employee work engagement and productivity.Contribution/value-add: This study expands on current theoretical knowledge of identity work, and provides insights into the strategies people use to regulate and negotiate their identities at work. 

  18. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    Science.gov (United States)

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  19. 76 FR 7213 - ACRAnet, Inc.; SettlementOne Credit Corporation, and Sackett National Holdings, Inc.; Fajilan and...

    Science.gov (United States)

    2011-02-09

    ... access can result in grave consumer harm through identity theft. The significant impact and cost of identity theft are well documented. Although reports regarding the impact of identity theft do not always... estimated that in 2005 alone 8.3 million consumers fell victim to identity theft. We found that 1.8...

  20. Drug-Related Identity Change

    Directory of Open Access Journals (Sweden)

    ferydoon Seyed Rabiee

    2004-02-01

    Full Text Available Our study is concentrating on understanding drug-related identity process which may enter important sociological visions into drug abuse pathology. It is in the framework of symbolic proactivity، cultural studies and the existing model for analyzing drug-related identity (Anderson – 1994. In this study، we have used a qualitative survey and a model test in a statistical sample cosisting white/black males and females who are under drug abuse treatment in Middle Michigan. Our data shows that identity change occures during childihood or early adolescence and is accompanied with experiences of isolationism before drug abuse which facilitates the creation of an afflicted identity as well as the loss of the ability to control the personal identity. Assimilation and drug abuse subculture have represented altenative identities for resolving such an unsuitable situation.

  1. Personal identity and eastern thought

    Directory of Open Access Journals (Sweden)

    Correia Carlos João

    2009-01-01

    Full Text Available This paper aims to show that the problem of personal identity is a fundamental question of the classical Indian thought. Usually we tend to think that personal identity is a Western philosophical subject, and so we tend to forget the significance of the Self (Atman in Hinduism and even in Buddhism. The author shows how the Indian thought approached the question of personal identity and which was the singular solution outlined in the work consensually attributed to Gotama, the Buddha.

  2. An 'open source' networked identity

    DEFF Research Database (Denmark)

    Larsen, Malene Charlotte

    2013-01-01

    , but also an important part of their self-presentation online. It is discussed why these emotional statements are almost always publically available – or even strategically, intentionally placed on the young people's profiles. In relation to this, it is argued that young people – through their emotional...... communicative actions – are not only performing their own identity, but are becoming co-constructors of each other's identities, which the author characterizes as an 'open source' networked identity....

  3. Amending Miller's Pyramid to Include Professional Identity Formation.

    Science.gov (United States)

    Cruess, Richard L; Cruess, Sylvia R; Steinert, Yvonne

    2016-02-01

    In 1990, George Miller published an article entitled "The Assessment of Clinical Skills/Competence/Performance" that had an immediate and lasting impact on medical education. In his classic article, he stated that no single method of assessment could encompass the intricacies and complexities of medical practice. To provide a structured approach to the assessment of medical competence, he proposed a pyramidal structure with four levels, each of which required specific methods of assessment. As is well known, the layers are "Knows," "Knows How," "Shows How," and "Does." Miller's pyramid has guided assessment since its introduction; it has also been used to assist in the assessment of professionalism.The recent emphasis on professional identity formation has raised questions about the appropriateness of "Does" as the highest level of aspiration. It is believed that a more reliable indicator of professional behavior is the incorporation of the values and attitudes of the professional into the identity of the aspiring physician. It is therefore proposed that a fifth level be added at the apex of the pyramid. This level, reflecting the presence of a professional identity, should be "Is," and methods of assessing progress toward a professional identity and the nature of the identity in formation should be guided by currently available methods.

  4. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    UZUN, Vassilya; BILGIN, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  5. Threading "Stitches" to Approach Gender Identity, Sexual Identity, and Difference

    Science.gov (United States)

    North, Connie E.

    2010-01-01

    As LGBTQI (lesbian, gay, bisexual, transgender, queer/questioning, and intersex) issues become increasingly integrated into multicultural education discourses, we as educators need to examine the implications of our pedagogies for teaching about gender and sexual identities. This article explores my teaching of non-conforming gender identities in…

  6. High School Identity Climate and Student Identity Development

    Science.gov (United States)

    Rich, Yisrael; Schachter, Elli P.

    2012-01-01

    This research investigated whether schools characterized by high school students as being rich in identity promoting features contribute to student identity development. A theoretical model posited that student perceptions of teachers as caring role models and their school as cultivating the whole student will foster student exploration and…

  7. Networked identity: how immigrant youth employ online identity resources

    NARCIS (Netherlands)

    Prinsen, Fleur; de Haan, Mariette; Leander, Kevin

    2015-01-01

    In recent years, practices of online social networking and their implications for migrant youth identity development have been heavily debated. The nature of access to resources for identification is changing, and by using a social network perspective, this research conceptualizes identity as a netw

  8. Social Identity Change: Shifts in Social Identity during Adolescence

    Science.gov (United States)

    Tanti, Chris; Stukas, Arthur A.; Halloran, Michael J.; Foddy, Margaret

    2011-01-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then…

  9. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  10. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    Science.gov (United States)

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  11. Identity Support, Identity Devaluation, and Well-Being among Lesbians

    Science.gov (United States)

    Beals, Kristin P.; Peplau, Letitia Anne

    2005-01-01

    This research tested predictions about the association of identity support and identity devaluation with psychological well-being (self-esteem, life satisfaction, and depression). Lesbian women completed baseline surveys (N=42), then provided daily experience reports during a 2-week period (n=38), and completed a 2-month follow-up survey (n=34).…

  12. ID THEFT IN CYBERSPACE

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2014-06-01

    Full Text Available Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person’s activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer systems or through electronic means of communications, should be considered as a crime and punished accordingly.

  13. ID THEFT IN CYBERSPACE

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2014-05-01

    Full Text Available Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person’s activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer systems or through electronic means of communications, should be considered as a crime and punished accordingly.

  14. Professional identity and role transitions in clinical managers.

    Science.gov (United States)

    Spehar, Ivan; Frich, Jan C; Kjekshus, Lars Erik

    2015-01-01

    The purpose of this paper is to investigate how clinicians' professional background influences their transition into the managerial role and identity as clinical managers. The authors interviewed and observed 30 clinicians in managerial positions in Norwegian hospitals. A central finding was that doctors experienced difficulties in reconciling the role as health professional with the role as manager. They maintained a health professional identity and reported to find meaning and satisfaction from clinical work. Doctors also emphasized clinical work as a way of gaining legitimacy and respect from medical colleagues. Nurses recounted a faster and more positive transition into the manager role, and were more fully engaged in the managerial aspects of the role. The authors advance that health care organizations need to focus on role, identity and need satisfaction when recruiting and developing clinicians to become clinical managers. The study suggests that the inclusion of aspects from identity and need satisfaction literature expands on and enriches the study of clinical managers.

  15. Medical marijuana

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000899.htm Medical marijuana To use the sharing features on this ... have legalized marijuana for medical use. How Does Medical Marijuana Work? Medical marijuana may be: Smoked Vaporized ...

  16. Data Hemorrhages in the Health-Care Sector

    Science.gov (United States)

    Johnson, M. Eric

    Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.

  17. 《治百病方》不等于《武威汉代医简》%Zhi bai bing fang (Recipes for All Diseases) not identical with Wuwei Han dai yi jian (Wuwei Medical Bamboo Slips of Han Dynasty)

    Institute of Scientific and Technical Information of China (English)

    张雷

    2013-01-01

    1972年甘肃省武威县出土的汉代简牍,包括2种竹简和1种木牍,由隶书和章草2种字体书写,竹简分别编联,木牍未曾编联,具体内容可分医方、日书、药价3个方面.种种现象表明,这批简牍并非纯一的书籍或资料,“治百病方”只是其中1种竹简的名称.而有《中国医学史》教材和工具书在介绍《治百病方》和《武威汉代医简》时,将二者完全等同而论,实属以偏概全,有失妥当,应予更正.%The Han medical bamboo slips unearthed from Wuwei County,Gansu Province in 1972 included 2 kinds of bamboo slips and a wooden tablet,written with li calligraphy and zhangcao script.The bamboo slips was organized and bound as a series,while the wooden tablet wasn' t.The contents were related to medical recipes,almanacs and price of drugs.Various phenomena reflected that these slips and tablet were not merely a whole book or materials,and the Zhi bai bingfang was but a tide of one of the bamboo slips.However,Wuwei Han dai yi jian and Zhi bai bing fang sometimes were regarded as an identical one in some teaching materials of History of Chinese Medicine or reference books,which was an incorrect and one -sided information,and should be corrected.

  18. Supporting Biracial Children's Identity Development.

    Science.gov (United States)

    Morrison, Johnetta Wade; Bordere, Tashel

    2001-01-01

    Discusses stages of identity development in early childhood, as well as ways teachers can be supportive of that development. Addresses components of identity development in young children, parental preferences, valuing diversity, and curriculum recommendations. Provides suggestions appropriate for children of any racial combination. (SD)

  19. Teacher Investment in Learner Identity

    Science.gov (United States)

    Reeves, Jenelle

    2009-01-01

    From a sociocultural perspective, teacher identity is constructed in relation to others, including other teachers and students. Drawing on positioning theory and the concept of investment, this study analyzed the case of a secondary English teacher who negotiated his teacher identity in relation to English language learners (ELLs). Findings…

  20. Identity and the Management Project

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Dehlin, Erlend

    and family resemblance. As such, managing identity in organizations is closely linked to rules and family resemblance. Organizations manage identity through the definition of norms and values for right or wrong, appropriate or inappropriate, to name but a few. Norms and values are important as reference...