WorldWideScience

Sample records for theft

  1. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  2. Kosher theft?

    National Research Council Canada - National Science Library

    Kanj, Jamal

    2014-01-01

    ..." wishes of 96 percent of voters as theft. Using the same parallels, how about Israeli annexation of East Jerusalem and the Golan Heights? It is this thief which Ms. Powers supports at the U.N. Security Council to expropriate occupied land to build "Jewish only" homes. Unlike the Crimean apparent democratic vote, Israel did not bother to seek the ...

  3. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  4. Credit and identity theft

    OpenAIRE

    Kahn, Charles M.; Roberds, William

    2005-01-01

    The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a desire to avoid costly or invasive monitoring of individuals on the one hand and the need to control tr...

  5. Avoiding Medical Identity Theft

    Science.gov (United States)

    ... victim’s name leaving a trail of falsified information in medical records that can plague your medical and financial life for years, or even put your health at risk. Tips for Preventing and Detecting Medical Identity Theft ...

  6. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  7. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  8. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  9. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  10. Theft in nineteenth century Malta

    OpenAIRE

    Pullicino, Evelyn

    2016-01-01

    Malta’s crime history has been rather limited focusing mainly on sensational crimes and the prison. This article studies the different aspects of theft in 19th century Malta including motivations for theft and the disposal of the stolen items. Thieves and their victims exposed their social and economic problems when they appeared at the Criminal Court in Valletta. The statistics gleaned from the Criminal Court records from 1838-1888 reveal links between the occurrence of theft and...

  11. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  12. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...

  13. Identity theft prevention in the healthcare setting.

    Science.gov (United States)

    Warren, Bryan

    2005-01-01

    How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated.

  14. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  15. Identity Theft: Trends and Issues

    Science.gov (United States)

    2010-05-27

    addition to the costs incurred by consumers, identity theft presents cost burdens to the financial services industry as well. However, this cost is... financial services industry . 3 Federal Trade Commission, Consumer Sentinel Network Data Book for January – December, 2009, February, 2010, http...widespread.82 Some industries, such as the financial services industry , have stricter requirements for safeguarding personally identifying information

  16. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  17. Medical identity theft: an emerging problem for informatics.

    Science.gov (United States)

    Gillette, William; Patrick, Timothy B

    2007-10-11

    This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.

  18. Theft of electricity in Indonesia

    Science.gov (United States)

    Priatna, Dedy Supriadi

    In 1996, among 196 million Indonesian people, only 47.6% had access to electricity; 45.4% in rural areas and 51.5% in urban. 64% of population lived in 61,975 villages, and electric power was supplied to 69% of villages. The government has set a goal to achieve nearly universal services by the year 2014. The government can use existing installed capacity of PLN's system more efficiently. Theft of electricity, which currently constitutes a large share of PLN's losses, should be reduced. The potential of the private sector including captive power and local communities, to participate in electric power generation can also be utilized. The large interest that has been shown by the private sector might be followed by making electric power provision profitable and therefore attractive for the private sector. PLN profits, that in 1996 were only 5.22% instead of the 8% recommended by the World Bank as the best practice for Indonesia, have to be increased by improving their performance levels. The government should also seek solutions for the extremely poor households who will never be able to afford both connection charges and a monthly bill. In 1996 the extremely poor households included 5,251,788 households, constituting 12.1% of the total Indonesian households. Only 1.2% of these households had access to electricity. The objective of this study is to seek the policies that can be implemented in Indonesia that will make it possible to generate and deliver electricity profitably, and reduce theft while providing nearly universal services. For this purpose, the options that are proposed in this study are reducing theft of electricity; something like the CAMPFIRE that has successfully reduced poaching of elephants in Africa: that is, consumer-owned systems, both partially (distribution facilities) and completely (generation and distribution facilities); performance-based regulation (PBR); and solutions for supplying the extremely poor based on the minimum subsidies from the

  19. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  20. Identity Theft in Community Mental Health Patients

    Science.gov (United States)

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason

    2007-01-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented. PMID:20806029

  1. Identity theft: a pernicious and costly fraud

    OpenAIRE

    Julia S. Cheney

    2003-01-01

    On October 3, 2003, the Payment Cards Center of the Federal Reserve Bank of Philadelphia sponsored a workshop on identity theft to examine its growing impact on participants in our payments system. Avivah Litan, vice president and research director of financial services for Gartner Inc., led the workshop. The discussion began and this paper follows with a broad study of identity theft, at times compared with traditional payment fraud, and continues with an evaluation of its overall risk to co...

  2. Preventing and responding to medical identity theft.

    Science.gov (United States)

    Amori, Geraldine

    2008-01-01

    Medical identity theft is a crime with two victims: patients and providers. It is easy to commit and lucrative because healthcare record keeping and business interactions are complex and mainly electronic. Patients whose identity has been stolen are vulnerable to both medical error and financial loss. Providers may suffer both reputation loss and financial loss. There are steps to help prevent and to respond appropriately to medical identity theft.

  3. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  4. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  5. Identity Theft: A Study in Contact Centres

    Science.gov (United States)

    Moir, Iain; Weir, George R. S.

    This paper explores the recent phenomenon of identity theft. In particular, it examines the contact centre environment as a mechanism for this to occur. Through a survey that was conducted amongst forty-five contact centre workers in the Glasgow area we determined that contact centres can and do provide a mechanism for identity theft. Specifically, we found a particularly high incidence of agents who had previously dealt with phone calls that they considered suspicious. Furthermore, there are agents within such environments who have previously been offered money in exchange for customers' details, or who know of fellow workers who received such offers. Lastly, we identify specific practices within contact centres that may contribute to the likelihood of identity theft.

  6. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    44 David Thomas , “Clamping Down on Metal Theft,” Security, February 1, 2013, accessed August 15, 2015, http://www.safecommunitiesalgarve.com/wp...main service providers operating in the country: Enel, Edison , E. On, and Edipower.177 Each of the providers has been adversely affected by copper...jun/02/copper-theft-rise-across-us/307532/. Thomas , David. “Clamping Down on Metal Theft.” Security, February 1, 2013. Accessed August 15, 2015. http

  7. BOOK-ENTRY SECURITIES AS THE SUBJECT OF THEFT

    OpenAIRE

    Groshev A. V.; Shulga A. V.

    2015-01-01

    Book-entry securities as the subject of theft. The article deals with the questions of legal assessment of crimes, targeted at embezzlement of book-entry securities. The article reports author's position concerning the expediency of creation in Russian criminal law system, the criminal liability for book-entry security taking in articles about theft and property crimes. The plot of the article requires the discussion in terms of recognizing book-entry securities the subject of theft, and crea...

  8. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... Appendix B to Part 541—Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject...

  9. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    This article studies the involuntary transfer of property rights by theft - a topic almostunexplored in the law and economics literature. The question is whether a buyer of a stolen goodshould obtain title to the good if he/she has purchased it in good faith. As described in the articledifferent ...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory......This article studies the involuntary transfer of property rights by theft - a topic almostunexplored in the law and economics literature. The question is whether a buyer of a stolen goodshould obtain title to the good if he/she has purchased it in good faith. As described in the articledifferent...... that a rule of law where good faith is irrelevant in determining the issue of property rightsPareto dominates a rule where good faith may protect an innocent buyer. Thus, an owner of an assetwill spend more resources on protecting his property and potential buyers will incur higher costs inorder to verify...

  10. Identity theft in community mental health patients: two case reports.

    Science.gov (United States)

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason; Everett, Anita

    2007-05-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented.

  11. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  12. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  13. Behind the Box: A Sociological Analysis of Theft, Tampering and ...

    African Journals Online (AJOL)

    The study revealed that indeed mail theft, pilfering, tampering and mishandling of postal items are present at the Post Offices in Ghana. Among others, we identify factors such as social solidarity among workers, social pressure and 'conducive' working environment as contributing to mail theft, pilfering and mishandling of ...

  14. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    .../30/2011). List of Subjects in 49 CFR Part 541 Crime, Labeling, Motor vehicles, Reporting and... National Highway Traffic Safety Administration 49 CFR Part 541 RIN 2127-AK81 Federal Motor Vehicle Theft... areas on high theft major parts of motor vehicles. E-mail is now included as a means to submit the...

  15. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    The costs paid by these farmers to enhance security in the environs of their livestock roughly precede the financial planning meant for production. However, the research on the extent, economic impact, dark figures and problem areas of stock theft in rural areas remain limited. The National Crime Statistics about stock theft ...

  16. Ole Jija : Rethinking theft in the Yoruba ethical system | Balogun ...

    African Journals Online (AJOL)

    The paper rethinks the moral controversies surrounding theft within the Yoruba ethical paradigms. It argues that the concept of theft has a broader theoretical perspective amongst the Yoruba people of south-west Nigeria than its narrow conception of taking without the consent of the owner to do so, prevalent especially in ...

  17. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  18. College Students, Internet Use, and Protection from Online Identity Theft

    Science.gov (United States)

    Norum, Pamela S.; Weagley, Robert O.

    2007-01-01

    The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…

  19. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  20. Exploring the psychological and somatic impact of identity theft.

    Science.gov (United States)

    Sharp, Tracy; Shreve-Neiger, Andrea; Fremouw, William; Kane, John; Hutton, Shawn

    2004-01-01

    Identity theft is a new and growing form of white-collar crime. This exploratory study examined the psychological and somatic impact of identity theft and coping methods utilized by victims. Thirty-seven victims of identity theft participated in regional victim focus groups. Participants completed a victim impact questionnaire designed by the authors and the Brief Symptom Inventory-18 (BSI-18). The majority of participants expressed an increase in maladaptive psychological and somatic symptoms post victimization. Results on the BSI indicated that identity theft victims with unresolved cases, in contrast to those with resolved cases, were more likely to have clinically elevated scores when compared with a normative sample. Relatively similar coping mechanisms were utilized across victims. The results from this study suggest that victims of identity theft do have increased psychological and physical distress, and for those whose cases remain unresolved, distress is maintained over time.

  1. Anti-Theft Automatic Metering Interface

    Directory of Open Access Journals (Sweden)

    Abhijeet Das

    2015-08-01

    Full Text Available Abstract Electricity is now more than a necessity and its need is increasing day by day resulting in power theft and power scarcity. The purpose of this project is to provide automatic control and monitoring of the Domestic Energy Meter enabling the Electricity Department to read meter readings without anyone visiting each house and also prevent electricity theft .This can be achieved by the use of a Microcontroller Unit that continuously monitors and records the Energy Meter readings in its permanent memory location. This system also makes use of a GSM module for remote monitoring and control of Energy Meter with the help of an interfacing circuitry. The Microcontroller based system continuously records the readings and the live meter reading can be sent to the Electricity department after a count period or on request. This system also can be used to disconnect the power supply to the house in case of non-payment of electricity bills. The Substation will be the receiving end. The data received is fed to a microcontroller at the Substation which will automatically calculate the bill based on tariff provider and display it.

  2. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  3. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  4. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  5. Automatic electronic and mechanical system to avoid vehicle theft

    Energy Technology Data Exchange (ETDEWEB)

    Tejeda, J.O.

    1988-05-24

    An automatic vehicle anti-theft system having an anti-theft mode and an anti-hijack mode, for a vehicle having both an ignition switch and an open door switch for a door is described comprising in combination: (a) an electrically controlled fuel supply system supplied with switched electrical current by the ignition switch S; (b) a momentary switch supplied with switched electrical current by the ignition switch; (c) an electronic valve; (d) an open door override switch to selectively disable the open door switch and to disable the anti-hijack mode; and (e) a valet parking override switch to selectively disable the anti-theft mode while the vehicles in the valet mode. The automatic vehicle anti-theft system permits the owner of the vehicle to disable either of two protection modes.

  6. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  7. Identity theft: where do we go from here?

    OpenAIRE

    Julia S. Cheney

    2004-01-01

    The identity theft forum sponsored by the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Gartner Fellows Program brought together a broad range of stakeholders to discuss the important issue of identity theft. Participants from the financial services and merchant industries, Internet service and technology providers, and regulatory and law enforcement agencies examined issues faced by consumers, merchants, and banks in fighting this financial crime. Discussants share...

  8. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  9. Media coverage of controlled substance diversion through theft or loss.

    Science.gov (United States)

    Brushwood, David B; Kimberlin, Carole A

    2004-01-01

    To determine the frequency of media reports of controlled substance diversion. Quantitative search of news articles from LexisNexis Academic, using search strings related to four different types of controlled substance diversion. Not applicable. Not applicable. Number of media reports about diversion of controlled substances at the prescriber or dispenser levels, through pharmacy robberies or thefts, and through hijackings or robberies of shipments. Media reports of controlled substance diversion indicate that theft and loss are important problems and that inappropriate prescribing and dispensing are substantial problems as well. Leaks of controlled substances from the closed system of distribution seem to be increasing as rapidly through theft and loss as through inappropriate prescribing and dispensing. During the five biennia between 1993 and 2002, these percentage increases in media reports were observed for the different types of diversion: 200% for prescribers; 350% for dispensers; 133% for pharmacy robberies and thefts; and 1,800% for thefts from shipping channels. A balanced approach to the prevention of controlled substance diversion, aimed at reducing illicit acquisition of drugs from theft and loss as well as from prescribing and dispensing, may produce the greatest success without adversely affecting the quality of patient care.

  10. Preventing thefts and damage to property

    CERN Multimedia

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  11. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Multimedia

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  12. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... Standards; Theft Protection and Rollaway Prevention AGENCY: National Highway Traffic Safety Administration... FURTHER INFORMATION CONTACT: For technical issues: Ms. Gayle Dalrymple, Office of Crash Avoidance... (FMVSS) No. 114, Theft Protection and Rollaway Prevention. In the NPRM, the agency addressed safety...

  13. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  14. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  15. 19 CFR 122.185 - Report of loss or theft of Customs access seal.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...

  16. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  17. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    .... Ford referenced the agency's published theft rate data for the Volvo S60 for comparison purposes... would be similar to the Volvo S60 in design and architecture. Ford stated that the Volvo S60's theft... which published data is available. Specifically, the agency's data show that theft rates for the Volvo...

  18. 75 FR 67453 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Science.gov (United States)

    2010-11-02

    ... Office of Thrift Supervision Identity Theft Red Flags and Address Discrepancies Under the Fair and...: Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of... issue jointly guidelines for financial institutions and creditors regarding identity theft with respect...

  19. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    providers with whom we spoke believed that identity monitoring was an important element of an identity theft service , and these providers, FTC, one...individual’s identity is stolen—restoration services may be identity theft services ’ most important benefit. However, identity restoration service ...organizations have collected and analyzed information about the quality of individual providers’ services : • Service providers. Several identity theft

  20. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  1. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  2. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  3. Theft and Mutilation in an Academic Library: College of Medicine ...

    African Journals Online (AJOL)

    Theft and Mutilation in an Academic Library: College of Medicine, University of Lagos experience. ... The findings showed the enormity of books and journals that were stolen and pilfered, about 20.57% of the respondents admitted that they had stolen a book or journal form the library while 16.14% agreed to have ripped out ...

  4. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  5. THEfT AND ROBBERY IN CHRYSOSTOM'S TIME

    African Journals Online (AJOL)

    this negative feature of the ancient world, since homilies are always important sources for information on social issues. It becomes clear ... on the New Testament concerning theft and robbery. Homilies are very important sources for .... In the first place there was a seal upon the tomb. There were also many watchmen and ...

  6. Evaluation of Theft, Lying, and Fighting in Adolescence.

    Science.gov (United States)

    Keltikangas-Jarvinen, Liisa; Lindeman, Marjaana

    1997-01-01

    Age and gender differences in evaluating three immoral behaviors (theft, lying, and fighting) were studied with 2,594 Finnish preadolescents, midadolescents, and late adolescents. Boys accepted all immoral acts better than girls, and acceptance of these behaviors was highest in middle adolescence. There was flexible use of different rationales for…

  7. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  8. A novel anti-theft security system for photovoltaic modules

    Science.gov (United States)

    Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong

    2017-04-01

    Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.

  9. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  10. 'Golfiana': A Theft from the National Library of Scotland

    Directory of Open Access Journals (Sweden)

    Ann Matheson

    2002-03-01

    Full Text Available The American writer, Paul Gallico, once commented: ‚If there is any larceny in a man, golf will bring it out’. This case study deals with the theft of three golfing pamphlets from the printed collections of the National Library of Scotland in the autumn of 1993. Unusually, in the context of theft, it is a story with a happy ending, but my account deals with our experiences in dealing with the incident, and it illustrates some of the points that we will wish to discuss at this conference. The central character in this particular drama has since become known in other research libraries in Europe. His name was Perry, although as we discovered in the aftermath, he turned out to have a plethora of names and identities.

  11. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  12. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  13. Whose guns are stolen? The epidemiology of Gun theft victims

    OpenAIRE

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-01-01

    Background: Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Methods: Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November...

  14. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  15. Beating the red gold rush: copper theft and homeland security

    OpenAIRE

    Cook, James A.

    2015-01-01

    Approved for public release; distribution is unlimited This thesis is a comparative case study comparing and contrasting the efforts of three countries (United Kingdom, France, Italy) in their fight to reduce copper wire theft incidents within their nations. The ultimate goal of the research is to highlight the significant threat posed to critical infrastructure from copper thieves and to offer best practice recommendations to policymakers within theUnited States in response, based on the ...

  16. RFID based Anti-theft System for Metropolia UAS Electronics laboratories

    OpenAIRE

    Weldemedhin, Desta

    2016-01-01

    The aim of this thesis is to study different types of RFID based anti-Theft system implementation suitable for Metropolia Electronics laboratory environment to deter theft taking into account several installation requirements. The operating frequencies of the RFID anti-theft system are from low frequency to High frequencies range and governed by different standards based on the region it is going to be implemented. The introduction of this thesis will go through Radio Frequency Identifica...

  17. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  18. The Role of Denial in the 'Theft of Nature': Comparing Biopiracy and Climate Change

    OpenAIRE

    Wyatt, Tanya; Brisman, Avi

    2017-01-01

    Since its inception, green criminology has highlighted, examined and analysed environmental degradation and destruction. The ‘theft of nature’ is both an example and a driver of illegal and ‘lawful but awful’ acts and omissions that degrade the environment. Even though this theft is widespread and sometimes well known, it persists because powerful actors put forward an influential narrative of denial that obstructs interventions. This paper explores the role of denial in two thefts of nature—...

  19. Theft reduction in a grocery store through product identification and graphing of losses for employees.

    Science.gov (United States)

    Carter, N; Holmström, A; Simpanen, M; Melin, L

    1988-01-01

    Shoplifting and employee theft constitute a major problem for retailers. Previous research has described techniques for effectively reducing either type of theft but has not addressed the problem of thefts of unspecified origin. In a grocery store we evaluated the effect of identifying for employees frequently stolen products from three groups of items and graphing, twice weekly in the lunchroom, losses for the separate groups. After the products were identified and losses graphed, thefts from the three groups dropped from eight per day to two per day.

  20. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  1. Protecting personal information in the era of identity theft: just how ...

    African Journals Online (AJOL)

    It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace. KEYWORDS: Identity theft; fraud; theft; cybercrime; personal information; data; ...

  2. 77 FR 72712 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Science.gov (United States)

    2012-12-06

    ... CFR Part 681 RIN 3084-AA94 Identity Theft Red Flags and Address Discrepancies Under the Fair and... George, Attorney, Federal Trade Commission, Division of Privacy and Identity Protection, Bureau of... ``financial institutions'' and ``creditors'' to develop and implement a written identity theft program to...

  3. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  4. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  5. Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making

    Science.gov (United States)

    Jefson, Cristy A.

    2007-01-01

    Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…

  6. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  7. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E... FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights..., provided that the translation is accurate and that it is provided in a language used by the recipient...

  8. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  9. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  10. ‘Paradise Lost’: A Theft from Helsinki University Library

    Directory of Open Access Journals (Sweden)

    Esko Häkli

    2002-03-01

    Full Text Available Traditionally, research libraries in the Nordic countries have followed the policy of being open, public libraries. They have been rather reluctant to apply restrictions even to the use of their rare materials. In this liberal atmosphere, libraries and, above all, their staff have based their own behaviour on trust. They have believed that their users are honest and will not cause any damage to the collections, much less display any criminal intent. Serious abuse of this trust – if we exclude the everyday behaviour of university students – has been extremely rare, and this has encouraged staff in these beliefs. Thefts and mutilation of items from the collections have seldom occurred. This background explains, at least partly, why the thefts last year in my Library were such a serious shock, and so upset some members of staff. We had to admit that we were no longer living in a paradise, or in a safe haven. As a result of the globalisation of crime, the world had lost its innocence even in remote Helsinki.

  11. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  12. Legends of Organ Theft: The Moral Dilemma of Contemporary Society

    Directory of Open Access Journals (Sweden)

    Dragana Antonijević

    2016-03-01

    Full Text Available Legends and rumors of organ theft became a global phenomenon in the beginning of the 80s, with the information originating from the "Third world" countries. Victims where poor and powerless, typically children. The rumor engaged a series of actions from anthropologists, NGO’s and media trying to ascertain their validity. Before long, the world was divided into two camps: on the one hand where those who believed the rumors, condemning the West for its exploitation of the underdeveloped and the poor that lead to organ theft from healthy individuals, to satisfy the needs of the rich white patients; and the other faction that, through the data, tried to negate these assertions as unfounded and illogical. At the beginning of the 90s, similar reports surfaced in the highly developed societies of Europe and the USA. Unlike the rumors, these where developed, structured narratives with specific content – legends of kidney theft, whose victims were left alive. Internet has brought about the expansion of such stories. None the less, they remained the under-analyzed, not attracting the attention of the politically minded and militant anthropologists who, in the Third world rumors, recognized material for their anti-colonial and mediatory theories. Few have tried to explain the legend and folklore origins of the First world narratives and to ascertain their function without insightful analysis. That is why I engaged in a semantic analysis of the legend in the context of the highly developed societies, with the intent of exposing their message of a deep moral dilemma concerning organ donation. I found that their hidden meaning is "revolutionary", not an inversion that I thought previously, but in accordance with the public discourse that encourages voluntary and legal donations, from cadaver as from living donors, wich is real disadaptive problem for those soceties. I proposed such a meaning by analysing the most unusual and astonishing element in the

  13. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  14. The Technical Problems of Anti-theft Diagnostics in a Traction Network

    Science.gov (United States)

    Mikulski, Jerzy; Młynczak, Jakub

    2012-02-01

    The paper presents an analysis of traction lines theft in the Katowice division of the Railroad Development Company (Zakład Linii Kolejowych - ZLK) as well as the principles for the anti-theft protection system, currently in development. The problem of theft is a very important issue concerning the safety of rail transportation. It is also a significant economic problem, as the cost of recreating a stolen network is very high. Moreover, the Administrator of the infrastructure bears the cost of compensation for any delays in train schedules.

  15. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  16. 77 FR 65767 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2012-10-30

    ... within the car's interior, the engine will be disabled and the vehicle will be immobilized after two... inclusion of a standard immobilizer system resulted in a 52 percent net average reduction in vehicle thefts...

  17. 78 FR 53500 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2013-08-29

    ..., the engine will be disabled and the vehicle will be immobilized after two seconds of running. To avoid... that NHTSA's theft data for the Jeep Grand Cherokee indicates that the inclusion of a standard...

  18. Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain

    Science.gov (United States)

    Tallón, María Luisa García

    Financial fraud usually goes hand in hand with the complex problem of identity theft in financial transactions. The experience gained in the Complaints Department through the presented cases and queries includes: Traditional falsifications in traditional financial transactions.

  19. 2013 Vehicle Theft Prevention Quick Reference Guide for the Law Enforcement Community

    Science.gov (United States)

    2013-08-01

    "This and future versions of the Vehicle TheftPrevention Quick Reference Guide for the Law Enforcement Community will provide comprehensive information for vehicle lines. The parts-marking requirements have been : extended to include: : all passe...

  20. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  1. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  2. RESTORATIVE JUSTICE AS AN ALTERNATIVE CRIMINAL DISPUTE RESOLUTION FOR THE OFFENCE OF THEFT

    OpenAIRE

    Ab Aziz, Norjihan; Mohamad Amin, Noorshuhadawati; Ab Hamid, Zuraini

    2017-01-01

    Under thetraditional justice system, theft is an offence against a state. Once theoffender is found guilty by the court, he will be punished accordingly. InMalaysia, the Penal Code provides punishment for an offence of theft withimprisonment for a term not exceeding 7 years, or fine or with both. The aim isto punish the offender for the offence that he had committed, while the victimhas no place in the process. However, restorative justice sees a crime isagainst an individual which allows the...

  3. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  4. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  5. Resource Theft in Tropical Forest Communities: Implications for Non-timber Management, Livelihoods, and Conservation

    Directory of Open Access Journals (Sweden)

    Amy E. Duchelle

    2011-03-01

    Full Text Available Increased devolution of forest ownership and management rights to local control has the potential to promote both conservation and livelihood development in remote tropical regions. Such shifts in property rights, however, can generate conflicts, particularly when combined with rapidly increasing values of forest resources. We explored the phenomenon of Brazil nut (Bertholletia excelsa theft in communities in Western Amazonia. Through interviews with 189 Brazil nut collectors in 12 communities in Bolivia and Brazil and participation in the 2006 and 2007 harvests, we quantified relative income derived from Brazil nuts, reported nut thefts, and nut collection and management practices. We found a much greater incidence of reported Brazil nut thefts in Pando, Bolivia than in the adjacent state of Acre, Brazil. Our analyses suggest that three factors may have affected nut thefts in the forest: (1 contrasts in the timing and process of formally recognizing property rights, (2 different historic settlement patterns, and (3 varying degrees of economic dependence on Brazil nuts. Threat of theft influenced Brazil nut harvest regimes, with potentially long-term implications for forest-based livelihoods, and management and conservation of Brazil nut-rich forests in Western Amazonia.

  6. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  7. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  8. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  9. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence

    NARCIS (Netherlands)

    van Lier, P.A.C.; Vitaro, F.; Barker, E.D.; Koot, H.M.; Tremblay, R.E.

    2008-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism

  10. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence

    NARCIS (Netherlands)

    van Lier, P.A.C.; Vitaro, F.; Barker, E.D.; Koot, H.M.; Tremblay, R.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism

  11. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  12. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  13. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  14. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  15. Theft in an ultimatum game: chimpanzees and bonobos are insensitive to unfairness.

    Science.gov (United States)

    Kaiser, Ingrid; Jensen, Keith; Call, Josep; Tomasello, Michael

    2012-12-23

    Humans, but not chimpanzees, punish unfair offers in ultimatum games, suggesting that fairness concerns evolved sometime after the split between the lineages that gave rise to Homo and Pan. However, nothing is known about fairness concerns in the other Pan species, bonobos. Furthermore, apes do not typically offer food to others, but they do react against theft. We presented a novel game, the ultimatum theft game, to both of our closest living relatives. Bonobos and chimpanzee 'proposers' consistently stole food from the responders' portions, but the responders did not reject any non-zero offer. These results support the interpretation that the human sense of fairness is a derived trait.

  16. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  17. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  18. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  19. 27 CFR 478.39a - Reporting theft or loss of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...

  20. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  1. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance... immobilization device occurs when the ignition is turned to the ``OFF'' position and all the doors are closed and locked through the use of the key or the remote control mechanism. Deactivation occurs when all the doors...

  2. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ...), Fuel Delivery, Starter Motor Circuit, and a Shaft Lock Module. Maserati's keyless ignition system will consist of a Key Fob with Remote Keyless Entry (RKE) Transmitter, RFHub and Keyless Ignition Node (KIN... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...

  3. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking... that activation of the immobilization device occurs when the ignition is turned to the ``OFF'' position and all the doors are closed and locked through the use of the key or the remote control mechanism...

  4. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... immobilization device occurs when the ignition is turned to the ``OFF'' position and all the doors are closed and locked through the use of the key or the remote control mechanism. Deactivation occurs when all the doors...

  5. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  6. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  7. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... National Highway Traffic Safety Administration Volkswagen Petition for Exemption From the Vehicle Theft... (NHTSA) published a document in the Federal Register of May 27, 2010, granting in full Volkswagen Group of America's (Volkswagen) petition for an exemption of a new vehicle line in accordance with 49 CFR...

  8. Identity theft: when bad things happen to your patients' and employees' good name.

    Science.gov (United States)

    Costello, J

    2001-01-01

    What should healthcare facility security directors and administrators do when patients or employees are the victims of identity theft? Taking the right steps to safeguard personal data won't insulate your facility from ever having to deal with this growing crime but, says the author, it will reduce the opportunity and desire for a criminal to steal the data.

  9. The Cultural Phenomenon of Identity Theft and the Domestication of the World Wide Web

    Science.gov (United States)

    Caeton, Daniel A.

    2007-01-01

    Through a critique of the rhetorical configurations of identity theft, this article contributes to the emerging body of theory contending with the social effects of digital information technologies (DIT). It demonstrates how the politics of fear manipulate technosocial matrices in order to derive consent for radical changes such as the…

  10. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  11. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... Ballard, Office of International Policy, Fuel Economy and Consumer Programs, NHTSA, West Building, W43-439... Corporation for the Buick Riviera and Oldsmobile Aurora (58 FR 44872, August 25, 1993), and Cadillac Seville vehicle lines (62 FR 20058, April 24, 1997) from the parts-marking requirements of the theft prevention...

  12. Environmental risk factors influencing bicycle theft: A spatial analysis in London, UK

    NARCIS (Netherlands)

    Mburu, L; Helbich, M

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific

  13. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor... full the petition of Tesla Motors Inc's. (Tesla) for an exemption of the Model S vehicle line in... is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...

  14. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National Highway Traffic Safety Administration... full General Motors Corporation's (GM) petition for an exemption of the Cadillac SRX vehicle line in...

  15. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... National Highway Traffic Safety Administration Ford Petition for Exemption From the Vehicle Theft... (NHTSA) published a document in the Federal Register of May 28, 2010, granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part...

  16. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ... electrical and electronic assemblies in motor vehicles related to performance. VW provided a detailed list of... unauthorized persons; preventing operation of the vehicle by unauthorized entrants; and ensuring the... National Highway Traffic Safety Administration Petition for Exemption from the Vehicle Theft Prevention...

  17. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... electrical and electronic assemblies in motor vehicles related to performance. Volkswagen stated that it... circumvention of the device by unauthorized persons; preventing operation of the vehicle by unauthorized... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention...

  18. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... radiation and electric conduction. Mazda stated that the antitheft device and operation of the electronic... by unauthorized persons; preventing operation of the vehicle by unauthorized entrants; and ensuring... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention...

  19. "Bait vehicle" technologies and motor vehicle theft along the southwest border.

    Energy Technology Data Exchange (ETDEWEB)

    Aldridge, Chris D.

    2007-09-01

    In 2005, over 33% of all the vehicles reported stolen in the United States occurred in the four southwestern border states of California, Arizona, New Mexico, and Texas, which all have very high vehicle theft rates in comparison to the national average. This report describes the utilization of 'bait vehicles' and associated technologies in the context of motor vehicle theft along the southwest border of the U.S. More than 100 bait vehicles are estimated to be in use by individual agencies and auto theft task forces in the southwestern border states. The communications, tracking, mapping, and remote control technologies associated with bait vehicles provide law enforcement with an effective tool to obtain arrests in vehicle theft 'hot spots'. Recorded audio and video from inside the vehicle expedite judicial proceedings as offenders rarely contest the evidence presented. At the same time, law enforcement is very interested in upgrading bait vehicle technology through the use of live streaming video for enhanced officer safety and improved situational awareness. Bait vehicle effectiveness could be enhanced by dynamic analysis of motor theft trends through exploitation of geospatial, timeline, and other analytical tools to better inform very near-term operational decisions, including the selection of particular vehicle types. This 'information-led' capability would especially benefit from more precise and timely information on the location of vehicles stolen in the United States and found in Mexico. Introducing Automated License Plate Reading (ALPR) technology to collect information associated with stolen motor vehicles driven into Mexico could enhance bait vehicle effectiveness.

  20. Re-Positioning the Law of Theft in View of Recent Developments in ICTS – The Case of South Africa

    Directory of Open Access Journals (Sweden)

    Mzukisi Niven Njotini

    2016-12-01

    Full Text Available This article examines the impact of information and communication technologies (ICTs on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of property, for example corporeals and incorporeals. Therefore, it is enquired whether the non-traditional forms of property, for example information or data is or can be regarded as property that is capable of being stolen for legal purposes or not.

  1. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... Section 632.124 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR INDIAN AND NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  2. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  3. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... corporate requirements for electrical and electronic assemblies in motor vehicles related to performance... unauthorized persons; preventing operation of the vehicle by unauthorized entrants; and ensuring the... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention...

  4. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  5. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  6. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  7. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  8. Recidivism and dynamics of mobile equipment theft in the town Puente Aranda, Bogota, Colombia

    OpenAIRE

    Saavedra Ayala, Andrea Marcely; Vargas, Sandra Mireya; Lopez Riaño, Yed Milton

    2016-01-01

    This paper presents an analysis of the behavior of recidivism cellular theft, evidenced in the operation of catches made in 2014 in the town 16 Puente Aranda; to demonstrate this phenomenon the case study methodology was used in five subjects who have committed this crime in the area in question but have additionally made in other localities in Bogota. Revision was made in open and closed sources of information and interviews with expert actors to understand the notion of the phenomenon.

  9. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  10. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  11. The Thief With a Thousand Faces and the Victim With None: Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory.

    Science.gov (United States)

    Reyns, Bradford W; Henson, Billy

    2016-08-01

    Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims' online routine activities and their online identity theft victimization. It was found that certain routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed. © The Author(s) 2015.

  12. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  13. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  14. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence.

    Science.gov (United States)

    van Lier, Pol A C; Vitaro, Frank; Barker, Edward D; Koot, Hans M; Tremblay, Richard E

    2009-05-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of physical violence decreased. Children who engaged in the high trajectories of vandalism, theft, and alcohol-drug use had a high probability of also being high in physical violence. Compared to males, females were less likely to be on the high trajectory of physical violence, and their trajectories of other antisocial behaviors were less strongly associated with high levels of physical violence. The results suggest that physical violence during pre-adolescence and adolescence has a different developmental pattern than other forms of antisocial behavior, and that its relation to these other forms of antisocial behavior differs by sex.

  15. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  16. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    OpenAIRE

    Clara Victoria Meza-Maya; Sandra Marcela Lobo-Ojeda

    2017-01-01

    Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V). Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes...

  17. Recidivism and dynamics of mobile equipment theft in the town Puente Aranda, Bogota, Colombia

    Directory of Open Access Journals (Sweden)

    Saavedra Ayala, Andrea Marcely

    2016-04-01

    Full Text Available This paper presents an analysis of the behavior of recidivism cellular theft, evidenced in the operation of catches made in 2014 in the town 16 Puente Aranda; to demonstrate this phenomenon the case study methodology was used in five subjects who have committed this crime in the area in question but have additionally made in other localities in Bogota. Revision was made in open and closed sources of information and interviews with expert actors to understand the notion of the phenomenon.

  18. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  19. Applying Geostatistical Analysis to Crime Data: Car-Related Thefts in the Baltic States.

    Science.gov (United States)

    Kerry, Ruth; Goovaerts, Pierre; Haining, Robert P; Ceccato, Vania

    2010-01-01

    Geostatistical methods have rarely been applied to area-level offense data. This article demonstrates their potential for improving the interpretation and understanding of crime patterns using previously analyzed data about car-related thefts for Estonia, Latvia, and Lithuania in 2000. The variogram is used to inform about the scales of variation in offense, social, and economic data. Area-to-area and area-to-point Poisson kriging are used to filter the noise caused by the small number problem. The latter is also used to produce continuous maps of the estimated crime risk (expected number of crimes per 10,000 habitants), thereby reducing the visual bias of large spatial units. In seeking to detect the most likely crime clusters, the uncertainty attached to crime risk estimates is handled through a local cluster analysis using stochastic simulation. Factorial kriging analysis is used to estimate the local- and regional-scale spatial components of the crime risk and explanatory variables. Then regression modeling is used to determine which factors are associated with the risk of car-related theft at different scales.

  20. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  1. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ..., NHTSA, W43- 439, 1200 New Jersey Avenue SE., Washington, DC 20590. Ms. Ballard's phone number is (202... (Forester, Tribeca, Impreza, Legacy and Outback models) and it believes the data show immobilization has had.... Specifically, the agency's theft rate data for the Subaru Tribeca, Forester, Impreza, Legacy and Outback...

  2. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... (MINI Cooper). Using an average of 3 MYs data (2007-2009), theft rates for those lines are: 0.2383, 0.... To ensure reliability and durability of the device, BMW conducted tests based on its own specified... requirements for each test. BMW provided a detailed list of the tests conducted in its June 2012 request for...

  3. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... requirements, including those for electrical and electronic assemblies in motor vehicles related to performance... the device by unauthorized persons; preventing operation of the vehicle by unauthorized entrants; and... National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention...

  4. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    CERN Multimedia

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  5. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    CERN Multimedia

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  6. Paternity for sale: anxieties over "demographic theft" and undocumented migrant reproduction in Germany.

    Science.gov (United States)

    Castañeda, Heide

    2008-12-01

    Women's experiences of migration, and their relationship to a host country, vary significantly from those of migrant men simply because pregnancy is a possibility. The concept of "demographic theft" highlights popular anxieties regarding high fertility among foreigners, including undocumented migrants. This article examines pregnant undocumented women's experiences with the health care system and relationship to the state in Germany. It also provides a discussion of how a restrictive immigration climate, particular models of citizenship, and liberal family laws have resulted in unique practices surrounding paternity claims. It is based on long-term ethnographic data to highlight contradictions and ambiguities in the policy environment and utilizes the notion of stratified reproduction to bring new evidence regarding mothers' deportability and practices of paternity.

  7. Parallel risks of automobile collisions and thefts: a potential means of separating driver and vehicle factors.

    Science.gov (United States)

    Field, S; Clarke, R V

    1993-06-01

    This paper examines the value of data published by the Highway Loss Data Institute (HLDI) on the collision frequency of different automobile models as a potential guide to vehicle safety. It is argued that these data fail to control for factors other than design, including vehicle usage and driving quality. An alternative measure of collision risk, controlled for some of these factors, is constructed employing the fact that theft risk is determined by many of the same usage characteristics as collision risk. This alternative measure is validated by demonstrating that it is a more effective predictor of injury risk than collision frequency. In conclusion it is argued that if HLDI collision data are to provide a more useful guide to the relative design safety of different automobile models, the data need to be controlled for a wider range of potentially confounding factors.

  8. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  9. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Document Server

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  10. Buddhism and Legislative Measures on Theft in Mongolia (The 18th Century–the Early 20th Century

    Directory of Open Access Journals (Sweden)

    Vesna Wallace

    2017-11-01

    Full Text Available This article examines the issue of theft as addressed in two legal texts—the Khalkha Regulations and the Laws and Regulations to Actually Follow—which functioned as the customary and statutory laws for Khalkha Mongolia at different periods, and which governed the life of lay and monastic Buddhists. The article approaches the concept of theft as a broader category that encompasses both the direct and indirect modes of theft that involve various types of deception and fraud, whereby a person can defraud the another of his rightful belongings. The analysis of the given topic in this paper is based on the two texts from that administered the conduct of monks and laity who belonged to the personal estate, or Great Shavi, to Jebtsundamba Khutukhtus of Mongolia, the record of actual course cases dealt by the Ministry of Great Shavi, and the Mongol Code of Law instituted by the Qing administration for its Mongolian colony. Although a comparative analysis of these laws with the minor banner laws or those instituted among Oirats may reveal some important differences, it is beyond the scope of the article and deserves a through study.

  11. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Directory of Open Access Journals (Sweden)

    Manabi Paul

    Full Text Available Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  12. The attractiveness of materials in advanced nuclear fuel cycles for various proliferation and theft scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Bathke, Charles G [Los Alamos National Laboratory; Wallace, Richard K [Los Alamos National Laboratory; Ireland, John R [Los Alamos National Laboratory; Johnson, M W [Los Alamos National Laboratory; Hase, Kevin R [Los Alamos National Laboratory; Jarvinen, Gordon D [Los Alamos National Laboratory; Ebbinghaus, Bartley B [LLNL; Sleaford, Brad A [LLNL; Bradley, Keith S [LLNL; Collins, Brian W [PNNL; Smith, Brian W [PNNL; Prichard, Andrew W [PNNL

    2009-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  13. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    CERN Multimedia

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  14. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    Directory of Open Access Journals (Sweden)

    Clara Victoria Meza-Maya

    2017-01-01

    Full Text Available Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V. Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes de un colegio de Bogotá. Resultados y conclusiones: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  15. Boxer crabs induce asexual reproduction of their associated sea anemones by splitting and intraspecific theft.

    Science.gov (United States)

    Schnytzer, Yisrael; Giman, Yaniv; Karplus, Ilan; Achituv, Yair

    2017-01-01

    Crabs of the genus Lybia have the remarkable habit of holding a sea anemone in each of their claws. This partnership appears to be obligate, at least on the part of the crab. The present study focuses on Lybia leptochelis from the Red Sea holding anemones of the genus Alicia (family Aliciidae). These anemones have not been found free living, only in association with L. leptochelis. In an attempt to understand how the crabs acquire them, we conducted a series of behavioral experiments and molecular analyses. Laboratory observations showed that the removal of one anemone from a crab induces a "splitting" behavior, whereby the crab tears the remaining anemone into two similar parts, resulting in a complete anemone in each claw after regeneration. Furthermore, when two crabs, one holding anemones and one lacking them, are confronted, the crabs fight, almost always leading to the "theft" of a complete anemone or anemone fragment by the crab without them. Following this, crabs "split" their lone anemone into two. Individuals of Alicia sp. removed from freshly collected L. leptochelis were used for DNA analysis. By employing AFLP (Fluorescence Amplified Fragments Length Polymorphism) it was shown that each pair of anemones from a given crab is genetically identical. Furthermore, there is genetic identity between most pairs of anemone held by different crabs, with the others showing slight genetic differences. This is a unique case in which one animal induces asexual reproduction of another, consequently also affecting its genetic diversity.

  16. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  17. PENGALAMAN REMAJA BERUSIA DI BAWAH 18 TAHUN DALAM BERMAIN GRAND THEFT AUTO GAME

    Directory of Open Access Journals (Sweden)

    Fikri Yumna Aqila

    2017-06-01

    Full Text Available GTA (Grand Theft Auto is a video game containing sexual and violent content classified as a mature category (18+. However in Indonesia, this video game is often played by teenegers under 18 years old. This research purposes to describe teeneger’s experience on playing GTA game and the factors influencing them to play the game. The informants of this research are 6 teenegers who have been playing this game with under 18 years old obtained by using snowball sample technique. The method used in this research is qualitative with phenomenological approach. The data were collected through semi-structured interview. The result of this research shows that teenegers who play this game said that they could gain new experiences like being outside of country situation. For teenegers it was exciting because they could perform things that they could not do in the real life like kill, rob, and fight beetwen gang. The factors influencing them to play GTA game come from their playmates, parent’s supervision, and also education level. Playmates are the main cause for teenegers to play GTA game. Teenagers playing GTA game without parent's supervision will tend to get negative impact. While higher level of teeneger education decreases the intensity of playing GTA game. Therefore, in order to minimize negative impact obtained by teenegers in playing GTA game, it requires the parent supervision so that the teenegers know time limit to play and the certain behavior in the game that may or may not be imitated in the real life.

  18. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  19. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  20. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus).

    Science.gov (United States)

    Brandlová, Karolína; Bartoš, Luděk; Haberová, Tamara

    2013-01-01

    Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus) and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves) or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female). Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts) the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  1. El imaginario del sueño americano y videojuegos: análisis de Grand Theft Auto

    OpenAIRE

    Jirón Polo, Francisco Andrés

    2015-01-01

    Muchas veces no se entiende cómo las personas pueden pasar largas horas jugando en consolas de videojuego o computadoras. Esto se debe en parte, a que no se comprende los juegos de video y se cree que no existe un argumento o un discurso en el desarrollo de una historia durante el juego. En el caso específico de Grand Theft Auto existe una historia principal y varias historias secundarias, con el agregado de que el jugador forma parte del elenco. En esta serie de juegos los protagonistas inte...

  2. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting new light duty truck... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.1 Procedures for selecting new light duty truck lines that are likely to have high...

  3. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    the issue of electricity theft still relevant is the common physical access of the end users to the installations or meters. The article presents not only the factors encouraging energy consumers to engage in dishonest behavior and the techniques they use to achieve the intended result, but also technical...

  4. Design of anti-theft/cable cut real time alert system for copper cable using microcontroller and GSM technology

    Science.gov (United States)

    Lim, E. K.; Norizan, M. N.; Mohamad, I. S.; Yasin, M. N. M.; Murad, S. A. Z.; Baharum, N. A.; Jamalullail, N.

    2017-09-01

    This paper presents the design of anti-theft/cable cut real time alert system using microcontroller and GSM technology. The detection part is using the electrical circuit wire connection in detecting the voltage drop of the cable inside the microcontroller digital input port. The GSM wireless modem is used to send the location of cable cut directly to the authority mobile phone. Microcontroller SK40C with Microchip PIC16F887 is used as a controller to control the wireless modem and also the detection device. The device is able to detect and display the location of the cable cut on the LCD display besides of and sending out the location of the cable break to the authority mobile phone wirelessly via SMS.

  5. Stealing land in the name of religion: A Rastafari religio-political critique of land theft by global imperial forces

    Directory of Open Access Journals (Sweden)

    Roderick Hewitt

    2016-02-01

    Full Text Available The issue of land has been central to Rastafari origins and ideological construct. Ethiopia, Africa, Babylon, Zion and Jamaica are symbols that point not only to physical location but also their ideological and psychological identity formation. This article uses Rastafari hermeneutics to critique the phenomenon of African Jamaican uprooting and dispossession of and from their land by powerful and global conglomerate forces that use the instrument of politics, economic and religion to accomplish their agenda. This article uses the Rastafari theological reflections, a theoretical framework that employs the phenomenon of faith, tradition and experience to interrogate the phenomenon of displacement of people through land theft. The religio-political narrative of Jamar Rolando McNaughton Jr, a young Jamaican reggae artist popularly known by his stage name Chronixx, will serve as the principal lens through which to interrogate the phenomenon of landlessness among the poor, primarily within the Jamaican context.

  6. “C’è un furto con scasso in ogni vera lettura”. Calvino’s Thefts from Ariosto

    Directory of Open Access Journals (Sweden)

    Martin McLaughlin

    2013-06-01

    Full Text Available Calvino’s love for Ariosto throughout his writing life is well known. However, despite this life-long enthusiasm for Ariosto, there are some variations. In a 1980 interview with Tullio Pericoli Calvino used the metaphor of “stealing” words from other texts and discussed notions of artistic thievery, citing his own “thefts” from Ariosto. The article examines how Calvino carries out his thefts, and how he then systematically develops in his own way what he has “stolen”, concentrating on key episodes from Il cavaliere inesistente and Il castello dei destini incrociati. What emerges is that in the first phase of his literary career Calvino was more concerned with the content of the Furioso, while in later years he became fascinated by the poem’s structural and stylistic qualities.

  7. Identity Theft in Electronic Environment: : Does the current approach to the penal legislation of European Union and Lithuania adequate for combating cybercrime?

    OpenAIRE

    Klangauskas, Audrius

    2012-01-01

    Worldwide and regional information society is facing unlimited challenges regarding the cybercrime sphere, due to the novelty of the cybercrimes and fast changing backgrounds of it. Regions, specific countries seemed not to be able to provide legal and technical measures which would be considered as up to date and would ensure efficient regulation field. One of this dangerous cybercrimes is identity theft, as the vast majority of the electronic crimes is committed in accordance with identity ...

  8. A theoretical and practical test of geographical profiling with serial vehicle theft in a U.K. context.

    Science.gov (United States)

    Tonkin, Matthew; Woodhams, Jessica; Bond, John W; Loe, Trudy

    2010-01-01

    Geographical profiling is an investigative methodology sometimes employed by the police to predict the residence of an unknown offender from the locations of his/her crimes. The validity of geographical profiling, however, has not been fully explored for certain crime types. This study, therefore, presents a preliminary test of the potential for geographical profiling with a sample of 145 serial vehicle thieves from the U.K. The behavioural assumptions underlying geographical profiling (distance decay and domocentricity) are tested and a simple practical test of profiling using the spatial mean is presented. There is evidence for distance decay but not domocentricity among the spatial behaviour of car thieves from the U.K. A degree of success was achieved when applying the spatial mean on a case-by-case basis. The level of success varied, however, and neither series length in days nor number of crimes could account for the variation. The findings question previously held assumptions regarding geographical profiling and have potential theoretical and practical implications for the study and investigation of vehicle theft in the U.K. 2009 John Wiley & Sons, Ltd.

  9. Grand Theft Auto IV comes to Singapore: effects of repeated exposure to violent video games on aggression.

    Science.gov (United States)

    Teng, Scott Kie Zin; Chong, Gabriel Yew Mun; Siew, Amy Sok Cheng; Skoric, Marko M

    2011-10-01

    Given the increasingly dominant role of video games in the mainstream entertainment industry, it is no surprise that the scholarly debate about their impact has been lively and well attended. Although >100 studies have been conducted to examine the impact of violent video games on aggression, no clear consensus has been reached, particularly in terms of their long-term impact on violent behavior and aggressive cognitions. This study employs a first-ever longitudinal laboratory-based experiment to examine longer-term effects of playing a violent video game. One hundred thirty-five participants were assigned either to the treatment condition where they played a violent video game in a controlled laboratory setting for a total of 12 hours or to the control group where they did not play a game. Participants in the treatment group played Grand Theft Auto IV over a period of 3 weeks and were compared with a control group on the posttest measures of trait aggression, attitudes toward violence, and empathy. The findings do not support the assertion that playing a violent video game for a period of 3 weeks increases aggression or reduces empathy, but they suggest a small increase in proviolence attitudes. The implications of the findings are discussed.

  10. The great land theft

    Directory of Open Access Journals (Sweden)

    Scott Leckie

    2005-07-01

    Full Text Available The tsunami has reminded us of the need for a rights-based approach to post-disaster reconstruction. If housing, land and property rights are put at the heart of a post-disaster plan – rather than cast aside as too complicated or expensive – the chances are that it will succeed. If these rights are ignored or, more ominously, systematically violated, not only will rights be abused but also reconstruction will fail.

  11. ID THEFT IN CYBERSPACE

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2014-05-01

    Full Text Available Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person’s activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer systems or through electronic means of communications, should be considered as a crime and punished accordingly.

  12. The application of a figure of merit for nuclear explosive utility as a metric for material attractiveness in a nuclear material theft scenario

    Energy Technology Data Exchange (ETDEWEB)

    King, Wayne E., E-mail: weking@llnl.go [Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Bradley, Keith [Global Security Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Jones, Edwin D. [Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Kramer, Kevin J.; Latkowski, Jeffery F. [Engineering Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Robel, Martin [Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Sleaford, Brad W. [Engineering Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States)

    2010-11-15

    Effective integration of nonproliferation management into the design process is key to the broad deployment of advanced nuclear energy systems, and is an explicit goal of the Laser Inertial Fusion Energy (LIFE) project at Lawrence Livermore National Laboratory. The nuclear explosives utility of a nuclear material to a state (proliferator) or sub-state (terrorist) is a critical factor to be assessed and is one aspect of material attractiveness. In this work, we approached nuclear explosives utility through the calculation of a 'figure of merit' (FOM) that has recently been developed to capture the relative viability and difficulty of constructing nuclear explosives starting from various nuclear material forms and compositions. We discuss the integration of the figure of merit into an assessment of a nuclear material theft scenario and its use in the assessment. This paper demonstrates that material attractiveness is a multidimensional concept that embodies more than the FOM. It also seeks to propose that other attributes may be able to be quantified through analogous FOMs (e.g., transformation) and that, with quantification, aggregation may be possible using concepts from the risk community.

  13. Distribution of illegal incident characteristics: cases of bank fraud and embezzlement, computer-related crime, and insider theft from drug manufacturers and distributors

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J M

    1979-10-01

    Three data sets were used to estimate joint and conditional probability distributions between various variables of interest in bank fraud and embezzlement (BF and E) cases of $10,000 dollars or more, computer-related crime cases of various types, and cases of insider theft from drug manufacturers and distributors. This report describes in tabular form the information contained in the three rather extensive data sets from industries facing insider threats which, in one or more dimensions, are analogous to insider threats potentially confronting managers in the nuclear industry. The data in Tables 1 through 29 were computed from the 313 cases of bank fraud and embezzlement (BF and E) representing losses of $10,000 or more reported to the Federal Deposit Insurance Corporation (FDIC) for the period 1977 to 1978. The data in Tables 30 through 64 were computed from the 461 cases of computer-related crime obtained from SRI International for the period 1958 to 1978. These incidents include inventory manipulations designed to hide errors, phony entries used to cover embezzlements, schemes used to penetrate a system and surreptitiously bring about a system crash, and sabotage. The data in Tables 65 through 67 were computed from data reported by the Drug Enforcement Agency (DEA) for the period 1973 to 1978. These data, though limited, provided several interesting insights into the insider-threat problem.

  14. Preventing thefts and wilful damage

    CERN Multimedia

    DG Unit

    2011-01-01

    The best means of preventing crime is to make it difficult to commit. As the summer holidays begin, in everybody’s interest we advise the following precautions: 1. MONEY, VALUABLES & KEYS Never leave money or objects of value unattended in offices or changing rooms, even locked. Keys and spares must always be taken away or kept in a safe place. Supposedly “safe” hiding places such as drawers, even locked, metal boxes and flower pots, are well known to burglars and should be avoided. Change lock codes regularly. 2. DOORS & WINDOWS Offices, workshops and meeting-rooms, etc. should be locked when vacated. Care should also be taken that windows are properly shut, especially if they are easily accessible from the outside. 3. VANDALISM If you witness an act of vandalism of public or private property, please report all the facts and your observations immediately to the CERN Fire Brigade (74444). 4. REPORTING INCIDENTS Every misdemeanour solved increases the chances of others be...

  15. Classification system of radioactive sources to attend radiological emergencies, the last three cases of theft in Mexico; Sistema de clasificacion fuentes radiactivas para atender emergencias radiologicas, los tres ultimos casos de robo en Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz C, M. A.; Garcia M, T., E-mail: marcoa.ruiz@inin.gob.mx [ININ, Carretera Mexico-Toluca s/n, 52750 Ocoyoacac, Estado de Mexico (Mexico)

    2014-10-15

    Following last three cases of theft of radioactive material in Mexico is convenient to describe how to classify radioactive sources and make decisions to confront the emergency. For this there are IAEA publications, which determine the Dangerous values or value D, for different radionuclides and activity values usually used in practice, and employees in industry, medicine and research. The literature also describes the different scenarios to determine the activity of different radioisotopes that can cause deterministic effects to workers or the population and thus classify the degree of relative risk that these sources may be involved in an accident. Defined the classification of sources, we can make decisions to respond to emergencies in their proper perspective also alert the public to the description of the risks associated with the sources in question, without this leading to a situation of greater crisis. (Author)

  16. Análisis contrastivo sobre la traducción del lenguaje soez y la subtitulación de videojuegos : estudio del caso Grand Theft Auto V

    OpenAIRE

    Martínez Fernández, Lidia

    2015-01-01

    Treball Final de Grau en Traducció i Interpretació. Codi: TI0983. Curs: 2014/2015 El presente trabajo se centra en investigar la traducción del argot inglés al español en el videojuego Grand Theft Auto V. En la revisión teórica del trabajo se abarca la clasificación de los videojuegos según su género y su clasificación por edad y por contenido. Además, se examina el argot desde el punto de vista traductológico como una de las armas indispensable para crear y mantener ciertos ambientes. Se ...

  17. Preventing thefts and damage to property

    CERN Multimedia

    2013-01-01

    The best means of preventing crime is to make it difficult to commit. As the summer holidays begin, in everybody's interest we advise the following precautions.   1. Money, valuables and keys Never leave money or objects of value unattended in offices or changing rooms, even if they are locked. Keys and spares must always be taken away or kept in a safe place. Supposedly "safe" hiding places such as drawers, even locked ones, metal boxes and flower pots, are well known to burglars and should be avoided. Change lock codes regularly. 2. Doors and windows Offices, workshops and meeting rooms, etc. should be locked when vacated. Care should also be taken that windows are properly shut, especially if they are easily accessible from the outside. 3. Vandalism If you witness an act of vandalism of public or private property, please report all the facts and your observations immediately to the CERN Fire Brigade (74444). 4. Reporting incidents Every misdemeanour solved increase...

  18. The President's Identity Theft Task Force Report

    National Research Council Canada - National Science Library

    2008-01-01

    .... The executive order charged 15 federal departments and agencies with crafting a comprehensive national strategy to combat more effectively this pernicious crime, which afflicts millions of Americans...

  19. Preventing leaf identity theft with hormones.

    Science.gov (United States)

    Lumba, Shelley; McCourt, Peter

    2005-10-01

    Genetic analysis of plant development has begun to demonstrate the importance of hormone synthesis and transport in regulating morphogenesis. In the case of leaf development, for example, auxin pooling determines where a primordium will emerge and leads to the activation of transcription factors, which determine leaf identities by modulating abscisic acid (ABA) and gibberellic acid (GA) concentrations. Signal transduction studies suggest that negative regulation of transcription factors through protein turnover is commonly used as a mechanism of hormone action. Together, these findings suggest that auxin might degrade a repressor that allows the activation of genes that modulate ABA/GA ratios in emerging leaves. With our increased understanding of the molecular basis of hormone signaling, it is becoming possible to overlay important regulators onto signaling modules that determine morphological outputs.

  20. WASp identity theft by a bacterial effector.

    Science.gov (United States)

    Daugherty-Clarke, Karen; Goode, Bruce L

    2008-09-01

    EspF(U), a protein secreted by pathogenic enterohaemorrhagic E. coli (EHEC), activates N-WASp/WASp to induce actin pedestal formation in host cells. Two recent papers in Nature show that EspF(U) exploits a WASp activation strategy so extreme that it may effectively sequester WASp, blinding it to both autoinhibition and cellular regulation.

  1. 77 FR 38024 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-06-26

    ... 72,346 2.2392 21 GENERAL MOTORS... CHEVROLET COBALT 260 116,273 2.2361 22 VOLVO C70 5 2,238 2.2341 23.... 32 MITSUBISHI....... ENDEAVOR........ 8 4,674 1.7116 33 VOLVO S40 12 7,306 1.6425 34 CHRYSLER...... CHEVROLET 12 25,073 0.4786 COLORADO PICKUP. 137 VOLVO V50 1 2,148 0.4655 138 FORD MOTOR CO.... MERCURY...

  2. 75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-09

    .......... 166 67104 2.4738 33 HYUNDAI SONATA 302 123439 2.4466 34 VOLVO S40 53 21905 2.4195 35 HYUNDAI ELANTRA... SUZUKI SX4 15 15421 0.9727 126 VOLVO S80 10 10805 0.9255 127 GENERAL MOTORS........ PONTIAC VIBE... B9 TRIBECA 8 11538 0.6934 153 BMW 3 97 139966 0.6930 154 MAZDA CX-7 52 75137 0.6921 155 VOLVO S60 14...

  3. 77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-09-21

    .......... MUSTANG 162 72,346 2.2392 21 GENERAL MOTORS...... CHEVROLET COBALT.... 260 116,273 2.2361 22 VOLVO C70 5 2.... 16 9,219 1.7355 32 MITSUBISHI ENDEAVOR 8 4,674 1.7116 33 VOLVO S40 12 7,306 1.6425 34 CHRYSLER JEEP... MOTORS...... CHEVROLET COLORADO 12 25,073 0.4786 PICKUP. 137 VOLVO V50 1 2,148 0.4655 138 FORD MOTOR CO...

  4. 78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-07-09

    ... 136,721 1.1556 55 TOYOTA SCION XB 23 19,909 1.1553 56 VOLVO S40 5 4,352 1.1489 57 SUZUKI KIZASHI 7 6......... LINCOLN MKT....... 4 4,274 0.9359 73 VOLVO S80 4 4,281 0.9344 74 BMW M3 7 7,575 0.9241 75 GENERAL MOTORS.......... 12 13,171 0.9111 78 VOLVO C30 5 5,530 0.9042 79 JAGUAR LAND ROVER.. LAND ROVER LR2.... 3 3,333 0.9001...

  5. 75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-03-10

    ... 302 123439 2.4466 35 VOLVO S40 53 21905 2.4195 36 HYUNDAI........ ELANTRA 192 80133 2.3960 37 NISSAN... SUZUKI......... SX4 15 15421 0.9727 126 VOLVO S80 10 10805 0.9255 127 GENERAL MOTORS. PONTIAC VIBE...-7 52 75137 0.6921 155 VOLVO S60 14 20268 0.6907 156 CHRYSLER....... JEEP PATRIOT........ 20 29421 0...

  6. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... 1,465 0.0000 231 MAZDA B SERIES PICKUP...... 0 1,884 0.0000 232 MERCEDES-BENZ MAYBACH 57 0 76 0.0000 233 MERCEDES-BENZ MAYBACH 62 0 67 0.0000 234 MERCEDES-BENZ SLR-CLASS 0 105 0.0000 235 NISSAN INFINITI...

  7. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-10-24

    ... 222 MAZDA MX-5 MIATA......... 0 4,293 0.0000 223 MERCEDES-BENZ...... MAYBACH 57......... 0 27 0.0000 224 MERCEDES-BENZ...... MAYBACH 62......... 0 18 0.0000 225 MERCEDES-BENZ...... MAYBACH LANDAULET.. 0...

  8. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... 1,465 0.0000 229 MAZDA B SERIES PICKUP 0 1,884 0.0000 230 MERCEDES-BENZ MAYBACH 57 0 76 0.0000 231 MERCEDES-BENZ MAYBACH 62 0 67 0.0000 232 MERCEDES-BENZ SLR-CLASS 0 105 0.0000 233 NISSAN INFINITI FX45 0...

  9. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ... LOTUS EXIGE 0 27 0.0000 221 MAZDA MX-5 MIATA 0 4,293 0.0000 222 MERCEDES-BENZ MAYBACH 57 0 27 0.0000 223 MERCEDES-BENZ MAYBACH 62 0 18 0.0000 224 MERCEDES-BENZ MAYBACH LANDAULET...... 0 2 0.0000 225 MERCEDES-BENZ...

  10. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    financial services industry on...financial regulatory agencies, should gather information from stakeholders—including the financial services industry , law enforcement agencies, the...program established by the financial services industry , has helped approximately 13,000 victims resolve problems with disputed accounts and

  11. What Price Privacy? (and why identity theft is about neither identity nor theft)

    Science.gov (United States)

    2004-01-01

    impressions or notes may be made when one goes to a pharmaceutical (or illegal) drug site, a gay rights site, or the web site of an accused terrorist...actually cause more harm than good. This is not likely to deter spammers who have access to large numbers of zombie machines that will count as legitimate

  12. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Directory of Open Access Journals (Sweden)

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  13. Doctors aren't immune to theft and fraud

    Science.gov (United States)

    Marcus, Gary

    1995-01-01

    A chartered accountant says the problem of fraud within medical practices is far from rare, even though prevention is relatively simple. Gary Marcus provides advice to physicians about ways to spot fraud within their practices and things they can do to prevent it. No matter how small your practice or how long you have had the same employees, says Marcus, given the right circumstances anyone might steal from you. Imagesp940-a PMID:7697586

  14. Bystander reactions to a violent theft: crime in Jerusalem.

    Science.gov (United States)

    Schwartz, S H; Gottlieb, A

    1976-12-01

    Seventy-two male Israeli students were exposed to a violent crime in the course of a bogus discussion. Their awareness of other bystanders' lack of reaction to the emergency (social influence) and others' awareness of their actions (evaluation apprehension) were crossed in a 2 X 2 factorial design. An "alone" condition in which the subject was the only bystander controlled for the effects of others' mere presence (diffusion of responsibility). Helping was reduced by diffusion of responsibility and slowed by negative social influence but was increased by evaluation apprehension. Differences traceable to social influence appeared prior to those from the other processes. Implications of these findings for the measurement of helping and the interpretation of bystander decision making are discussed.

  15. Fighting identity theft with advances in fingerprint recognition

    CSIR Research Space (South Africa)

    Mathekga, D

    2015-10-01

    Full Text Available The ease with which the green South African ID book could be forged has led to many instances of identity fraud, costing retail businesses millions in lost revenue on fraudulently created credit accounts. This has led the government, through...

  16. Jacked: The Outlaw Story of Grand Theft Auto

    National Research Council Canada - National Science Library

    Samuel Tobin

    2014-01-01

      [...]there is no real game history or criticism, just a sometimes compelling story of how a few British game designers came to America to make games and to make their games pop- ular by making the news...

  17. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative... importing, manufacturing, or dealing in firearms, any firearm in the licensee's business inventory that has...

  18. 77 FR 13449 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2012-03-06

    ...-screen, filter, redact, refuse, or remove any or all submissions from www.cftc.gov that it may deem to be..., enforcement, and supervisory powers over many consumer financial products and services, as well as the... Than $150 Million in Assets Under Management, and Foreign Private Advisers, Investment Advisers Act...

  19. 78 FR 23637 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2013-04-19

    ... Promoting Innovation in the Global Digital Economy (Feb. 2012), available at http://www.whitehouse.gov/sites... Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework, at Section I (2010... arose during early increases in the use of digital data). \\2\\ A recent survey found that in 2012, over 5...

  20. The President’s Identity Theft Task Force Report

    Science.gov (United States)

    2008-09-01

    To Receive Information from Financial Institutions Initiate Discussions with the Financial Services Industry on Countermeasures to Identity Thieves...among other things, have resulted in prohibitions on individuals working in the financial services industry , personal cease and desist orders...U.S. Postal Inspection Service, DOJ, and the FTC, have met jointly with a number of financial services industry representatives to discuss improving

  1. Grand Theft Education: Wasteful Education Spending in California.

    Science.gov (United States)

    Izumi, Lance T.; Billingsley, K. Lloyd; Dphrepaulezz, Diallo

    This paper asserts that California's system of education funding is rife with waste. A state commission found that the system was "convoluted--driving up administrative costs, diverting attention from educational concerns, and depriving the public of readily accessible, comparative information." The paper suggests that the California…

  2. Identity Theft: Gentrification, Latinidad, and American Girl Marisol Luna

    Science.gov (United States)

    Rudolph, Jennifer Domino

    2009-01-01

    Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll's accompanying narrative depicts her Chicago neighborhood of Pilsen as "dangerous" and recounts her family's move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of…

  3. Identity theft and consumers' reaction to preventive technological innovations.

    Science.gov (United States)

    Ainscough, Thomas L; Brody, Richard G; Trocchia, Philip J

    2007-08-01

    The use of identification technology by commercial entities has broad and, for some consumers, disturbing social implications. This two-phase study was done to specify consumers' concerns regarding various identification technologies which may be encountered in retail environments. From the qualitative findings, a 26-item survey was constructed to quantify identified areas of concern with 303 survey participants (147 women and 156 men), whose mean age category was 30 to 39 years. Using exploratory factor analysis (principal components with varimax rotation), five dimensions of consumers' concern emerged: privacy, ethics, health, humanity, and complexity.

  4. Assessing the Effects of Pilferage, Mutilation and Theft of Library ...

    African Journals Online (AJOL)

    The study conclude that lack of policy guarding use and misuse of resources contributed significantly and negatively to safeguarding available resources, punitive measures and administration. It therefore recommends punishment on leaving the library with resources not in circulation or not properly checkout. Culprit should ...

  5. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... material. (a) Each licensee who possesses one gram or more of contained uranium-235, uranium-233, or... operates an uranium enrichment facility shall notify the NRC Operations Center within 1 hour of discovery of any unauthorized production of enriched uranium. For centrifuge enrichment facilities the...

  6. "Grand Theft South Africa": Games, Literacy and Inequality in Consumer Childhoods

    Science.gov (United States)

    Walton, Marion; Pallitt, Nicola

    2012-01-01

    Discussions of "game literacy" focus on the informal learning and literacies associated with games but seldom address the diversity in young people's gaming practices, and the highly differentiated technologies of digital gaming in use. We use available survey data to show how, in South Africa, income inequalities influence consumption…

  7. A system dynamics case study of resilient response to IP theft from a cyber- attack

    DEFF Research Database (Denmark)

    Sepúlveda Estay, Daniel Alberto; Khan, Omera

    dynamics model from an actual case of resilient response after a cyber-attack. Both casespecific and generic structures are extracted from the case data analysis, and a reaction mechanism is proposed that results in the observed behavior. The identification of these structures should eventually aid...... and swiftness of the supply chain response (resilience). However, current resilience frameworks are qualitative, do not address evolution over time as a relevant aspect, and thus do not provide indications on how to design a resilient response. This paper contributes to closing this gap by developing a system...... decision makers in the process of designing a resilient supply chain response....

  8. A system dynamics case study of resilient response to IP theft from a cyber- attack

    OpenAIRE

    Sepúlveda Estay, Daniel Alberto; Khan, Omera

    2017-01-01

    Undesirable changes in supply chain physical operations derived from disruptions in the transmission or storage of digital information are reported daily despite the Information Technology (IT) protection available. Once a disruption materializes, the company losses will depend on the coherence and swiftness of the supply chain response (resilience). However, current resilience frameworks are qualitative, do not address evolution over time as a relevant aspect, and thus do not provide indicat...

  9. Wildlife DNA forensics against crime: resolution of a case of tortoise theft.

    Science.gov (United States)

    Mucci, Nadia; Mengoni, Chiara; Randi, Ettore

    2014-01-01

    A paternity test was used to investigate a robbery case involving captive individuals of Greek tortoise (Testudo graeca). Six tortoises were allegedly stolen from a private breeder and offered for sale on the web by the supposed thief. The stolen tortoises were confiscated by the rangers of the State Forestry Corps (CFS). A panel of 14 autosomal microsatellite loci was used to genotype the seized tortoises and ten individuals assumed to be legally owned by the breeder. Kinship analyses reliably reconstructed the tortoise pedigree, demonstrating parent-offspring relationships among the owned and the stolen tortoises. As correctly declared by the breeder, four of the six stolen individuals belonged to the same family group of the ten legally owned tortoises. Results indicate that genetic identification procedures can provide valuable evidence and give useful support against illegal wildlife traffic. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  10. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... section and appendix J, the following definitions apply: (1) Account means a continuing relationship... 15 U.S.C. 1681a(r)(5). (5) Creditor has the same meaning as in 15 U.S.C. 1681a(r)(5). (6) Customer..., or a designated employee at the level of senior management in the oversight, development...

  11. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... antitheft device will include a transponder key, Electronic Time and Alarm Control System Electronic Control Unit (ETACS ECU) and an Electric Vehicle Electronic Control Unit (EV ECU), key ring antenna and a... device prevents unauthorized starting of the engine. The transponder is located in a traditional key that...

  12. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... key that is fully integrated into the vehicle's electric system. After a normal delay time (pre-arm... central locking system and an immobilizer. Key components of the antitheft device consist of a Driver... remote control key (physical key) or keyless remote vehicle entry. In both versions of the central...

  13. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ...: Ms. Deborah Mazyck, Office of International Policy, Fuel Economy and Consumer Standards, NHTSA, W43- 443, 1200 New Jersey Avenue, SE., Washington, DC 20590. Ms. Mazyck's phone number is (202) 366-4139... for the key cylinders and key plates for its outer gutter keys and approximately 10,000 for its inner...

  14. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    .... FOR FURTHER INFORMATION CONTACT: Ms. Deborah Mazyck, Office of International Policy, Fuel Economy and Consumer Standards, NHTSA, W43- 443, 1200 ] New Jersey Avenue SE., Washington, DC 20590. Ms. Mazyck's phone... being broken. There are so many key cylinder combinations and key plates for its gutter keys that it...

  15. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... this notice is effective beginning with the 2012 model year. FOR FURTHER INFORMATION CONTACT: Ms... Jersey Avenue, SE., Washington, DC 20590. Ms. Ballard's telephone number is (202) 366-0846. Her fax... hood release, counterfeit resistant VIN plates, secondary VINs inscribed on the body, and an exterior...

  16. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... year (MY). FOR FURTHER INFORMATION CONTACT: Ms. Carlita Ballard, Office of International Policy, Fuel... 20590. Ms. Ballard's phone number is (202) 366-5222. Her fax number is (202) 493-2990. SUPPLEMENTARY... steering lock, cabin access, a hood release, counterfeit resistant VIN plates and secondary VINs as...

  17. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... effective beginning with the 2014 model year (MY). FOR FURTHER INFORMATION CONTACT: Ms. Carlita Ballard... Avenue SE., Washington, DC 20590. Ms. Ballard's phone number is (202) 366-5222. Her fax number is (202... being broken. Toyota further stated that there are so many key cylinder combinations and key plates for...

  18. Teaching Cross-Racial Texts: Cultural Theft in "The Secret Life of Bees"

    Science.gov (United States)

    Grobman, Laurie

    2008-01-01

    Author Sue Monk Kidd, who is white, employs stereotypes of African Americans and problematically appropriates features of black writing in her novel "The Secret Life of Bees." Nevertheless, this book is worth teaching, not only because it has acquired much cultural capital but also because it offers students a way to examine relationships between…

  19. 76 FR 77183 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2011-12-12

    ... and bystanders can hear when the vehicle is not in ``park'' and the driver exits the vehicle. Add a... controls, combined with the new alerts, will have the same effect. We believe these new requirements are... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION...

  20. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ..., ignition lock, and a passive immobilizer. Key components of the IAwPB device are electronic keyfob, remote... Standard; Ford Motor Company AGENCY: National Highway Traffic Safety Administration (NHTSA), Department of... Motor Company's (Ford) petition for an exemption of the Edge vehicle line in accordance with Sec. 543.9...

  1. An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases

    Science.gov (United States)

    2011-02-01

    information and trade secrets, or salespersons with access to critical business plans and customer information. Each group stands to profit by...The most prevalent positions held by insiders were engineer or scientist (44 percent), manager (18 percent), salesperson (14 percent), and programmer

  2. Cyber self-defense expert advice to avoid online predators, identity theft, and cyberbullying

    CERN Document Server

    Moore, Alexis

    2014-01-01

    Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies from former cyberstalking victim, Alexis Moore. As the founder of Survivors in Action, Moore explains how to identify potential cyberattackers and how to recover from a cybercrime if you've been attacked. Her indispensable book can help you remain secure and safe in today's dangerous digital world and take back control of your life. 

  3. Theft of Virtual Property — Towards Security Requirements for Virtual Worlds

    Science.gov (United States)

    Beyer, Anja

    The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.

  4. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... release; (iv) The environment into which the release occurred (e.g., in building or outside of building... release. 121.19 Section 121.19 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE VIRUSES, SERUMS, TOXINS, AND ANALOGOUS PRODUCTS; ORGANISMS AND VECTORS POSSESSION...

  5. 76 FR 53072 - Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft...

    Science.gov (United States)

    2011-08-25

    ... to, title fraud, odometer fraud, or the sale of stolen vehicles. For the purposes of this final rule... classifications include passenger car, multipurpose passenger vehicle (``MPV''), truck, bus, motorcycle, trailer... more than $100 million annually (adjusted for inflation with the base year of 1995). Before...

  6. 76 FR 2631 - Certification; Importation of Vehicles and Equipment Subject to Federal Safety, Bumper, and Theft...

    Science.gov (United States)

    2011-01-14

    ... fraud, or the sale of stolen vehicles. For the purposes of this rulemaking, the phrase ``convicted of a... regulations at 49 CFR 571.3. Those type classifications include passenger car, multipurpose passenger vehicle... more than $100 million annually (adjusted for inflation with the base year of 1995). Before...

  7. Translating Missions in James Worral's Game "Grand Theft Auto's Missions"

    Science.gov (United States)

    Rahmi, Zelika

    2018-01-01

    The objectives of the study was to know the difficult words encountered by the gamers and to know their strategies in translating this unknown word. The researcher used interview as the instrument to collect the material needed for this particular study. It is found that unknown word combined with certain feeling such as disappointment creates…

  8. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... account; (g) Not attempting to collect on a covered account or not selling a covered account to a debt.... The Social Security Number (SSN) has not been issued, or is listed on the Social Security...

  9. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... collect on a covered account or not selling a covered account to a debt collector; (h) Notifying law... example: a. The address does not match any address in the consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration's Death Master File...

  10. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... account; (g) Not attempting to collect on a covered account or not selling a covered account to a debt... report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social Security...

  11. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... existing covered account; (g) Not attempting to collect on a covered account or not selling a covered... consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social...

  12. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... collect on a covered account or not selling a covered account to a debt collector; (h) Notifying law... example: a. The address does not match any address in the consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration's Death Master File...

  13. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... collect on a covered account or not selling a covered account to a debt collector; (h) Notifying law... example: a. The address does not match any address in the consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration's Death Master File...

  14. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... encrypted message to the powertrain contol module (PCM). In the IAwPB device, when the ``startstop'' button... encrypted message to the body control module (BCM), the PEP/RFA module and the PCM. Ford pointed out that in... concludes that the device will provide four of the five types of performance listed in Sec. 543.6(a)(3...

  15. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... major components of the SKIS device consist of: A Powertrain Control Module (PCM), a Totally Integrated... stated that the BCM sends an invalid key message to the Powertrain Control Module (PCM), and the PCM will... Prevention Standard (49 CFR 541). The agency concludes that the device will provide four of the five types of...

  16. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... system that requires the service brake to be depressed before the transmission can be shifted out of... motion. S3. Application. This standard applies to all passenger cars, and to trucks and multipurpose.... Combination means a variation of the key that permits the starting system of a particular vehicle to be...

  17. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... control unit, optional keyless entry system and electronic parking brake. The device will also be equipped... Prevention Standard; Porsche Cars North America, Inc. AGENCY: National Highway Traffic Safety Administration... document grants in full the Porsche Cars North America, Inc. (Porsche) petition for exemption of the Macan...

  18. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    .... Carlita Ballard, International Policy, Fuel Economy and Consumer Programs, NHTSA, W43-439, 1200 New Jersey... Liberty, a similar 5-door, All Wheel Drive, crossover/ Sport Utility Vehicle as the Jeep Patriot indicates...

  19. Repeated evolution of crop theft in fungus-farming ambrosia beetles.

    Science.gov (United States)

    Hulcr, Jiri; Cognato, Anthony I

    2010-11-01

    Ambrosia beetles, dominant wood degraders in the tropics, create tunnels in dead trees and employ gardens of symbiotic fungi to extract nutrients from wood. Specificity of the beetle-fungus relationship has rarely been examined, and simple vertical transmission of a specific fungal cultivar by each beetle species is often assumed in literature. We report repeated evolution of fungal crop stealing, termed mycocleptism, among ambrosia beetles. The mycocleptic species seek brood galleries of other species, and exploit their established fungal gardens by tunneling through the ambient mycelium-laden wood. Instead of carrying their own fungal sybmbionts, mycocleptae depend on adopting the fungal assemblages of their host species, as shown by an analysis of fungal DNA from beetle galleries. The evidence for widespread horizontal exchange of fungi between beetles challenges the traditional concept of ambrosia fungi as species-specific symbionts. Fungus stealing appears to be an evolutionarily successful strategy. It evolved independently in several beetle clades, two of which have radiated, and at least one case was accompanied by a loss of the beetles' fungus-transporting organs. We demonstrate this using the first robust phylogeny of one of the world's largest group of ambrosia beetles, Xyleborini. © 2010 The Author(s). Evolution© 2010 The Society for the Study of Evolution.

  20. Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, technical and procedural mechanisms to protect their IT systems. Of all IT systems, laptops are the probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is difficult to protect

  1. Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    Organizations rely on physical, digital and social mechanisms to protect their IT systems. Of all IT systems, laptops are probably the most troublesome to protect, since they are easy to remove and conceal. When the thief has physical possession of the laptop, it is also difficult to protect the

  2. Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    Organizations rely on physical, technical and procedural mechanisms to protect their physical assets. Of all physical assets, laptops are the probably the most troublesome to protect, since laptops are easy to remove and conceal. Organizations open to the public, such as hospitals and universities,

  3. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... device to antitheft devices already installed in the Audi A3, Audi A4, and the Volkswagen Passat vehicle... the agency for the Audi A4 and Volkswagen Passat vehicle lines (with an immobilizer) which showed a...'s 2008 and 2009 for the Volkswagen Passat respectively. MBUSA stated that its proposed device is...

  4. 76 FR 68260 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2011-11-03

    ... key is not within the car's interior, the engine will be disabled and the vehicle will be immobilized... that the inclusion of a standard immobilizer system resulted in a 52 percent net average reduction in...

  5. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... financial institution or creditor to obtain a product or service for personal, family, household or business... institution or creditor offers or maintains, primarily for personal, family, or household purposes, that... has the same meaning as in 15 U.S.C. 1681a(r)(5), and includes lenders such as banks, finance...

  6. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ..., household or business purposes. Account includes: (i) An extension of credit, such as the purchase of... household purposes, that involves or is designed to permit multiple payments or transactions, such as a...) Creditor has the same meaning as in 15 U.S.C. 1681a(r)(5), and includes lenders such as banks, finance...

  7. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ... financial institution or creditor to obtain a product or service for personal, family, household or business... institution or creditor offers or maintains, primarily for personal, family, or household purposes, that... has the same meaning as in 15 U.S.C. 1681a(r)(5), and includes lenders such as banks, finance...

  8. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ..., family, household or business purposes. Account includes: (i) An extension of credit, such as the..., family, or household purposes, that involves or is designed to permit multiple payments or transactions... lenders such as banks, finance companies, automobile dealers, mortgage brokers, utility companies, and...

  9. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Science.gov (United States)

    2010-01-01

    ..., household or business purposes. Account includes: (i) An extension of credit, such as the purchase of... household purposes, that involves or is designed to permit multiple payments or transactions, such as a...) Creditor has the same meaning as in 15 U.S.C. 1681a(r)(5), and includes lenders such as banks, finance...

  10. Major Software Vendor Puts Students on Many Campuses at Risk of Identity Theft

    Science.gov (United States)

    Foster, Andrea

    2008-01-01

    At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…

  11. A system dynamics case study of resilient response to IP theft from a cyber- attack

    DEFF Research Database (Denmark)

    Sepúlveda Estay, Daniel Alberto; Khan, Omera

    Undesirable changes in supply chain physical operations derived from disruptions in the transmission or storage of digital information are reported daily despite the Information Technology (IT) protection available. Once a disruption materializes, the company losses will depend on the coherence a...

  12. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... cycling, high and low temperature cycling, mechanical shock, random vibration, thermal stress/shock tests... concludes that the device will provide the five types of performance listed in Sec. 543.6(a)(3): promoting...

  13. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... description and diagram of the identity, design, and location of the components of the antitheft device for... the line. Key features of the antitheft device will include an electronically coded key fob, Body... alarm feature as standard equipment. The lights will flash and the horn will sound in the event of...

  14. 75 FR 15621 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2010-03-30

    ... National Highway Traffic Safety Administration 49 CFR Part 571 RIN 2127-AK38 Federal Motor Vehicle Safety... Federal Motor Vehicle Safety Standard No. 114 that certain motor vehicles with an automatic transmission..., or ``Act'') was signed into law.\\1\\ This Act relates to several aspects of motor vehicle safety...

  15. Boxer crabs induce asexual reproduction of their associated sea anemones by splitting and intraspecific theft

    Directory of Open Access Journals (Sweden)

    Yisrael Schnytzer

    2017-01-01

    Full Text Available Crabs of the genus Lybia have the remarkable habit of holding a sea anemone in each of their claws. This partnership appears to be obligate, at least on the part of the crab. The present study focuses on Lybia leptochelis from the Red Sea holding anemones of the genus Alicia (family Aliciidae. These anemones have not been found free living, only in association with L. leptochelis. In an attempt to understand how the crabs acquire them, we conducted a series of behavioral experiments and molecular analyses. Laboratory observations showed that the removal of one anemone from a crab induces a “splitting” behavior, whereby the crab tears the remaining anemone into two similar parts, resulting in a complete anemone in each claw after regeneration. Furthermore, when two crabs, one holding anemones and one lacking them, are confronted, the crabs fight, almost always leading to the “theft” of a complete anemone or anemone fragment by the crab without them. Following this, crabs “split” their lone anemone into two. Individuals of Alicia sp. removed from freshly collected L. leptochelis were used for DNA analysis. By employing AFLP (Fluorescence Amplified Fragments Length Polymorphism it was shown that each pair of anemones from a given crab is genetically identical. Furthermore, there is genetic identity between most pairs of anemone held by different crabs, with the others showing slight genetic differences. This is a unique case in which one animal induces asexual reproduction of another, consequently also affecting its genetic diversity.

  16. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    National Research Council Canada - National Science Library

    Clara Victoria Meza-Maya; Sandra Marcela Lobo-Ojeda

    2017-01-01

    ...: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  17. 75 FR 19673 - Petition for Exemption From the Vehicle Theft Prevention Standard; Saab

    Science.gov (United States)

    2010-04-15

    ... immobilizer control module and a user identification device (UID). Activation of the immobilization device... specific content requirements of Sec. 543.6. Saab stated that before the vehicle can operate, driver... generated 32-bit challenge and identifier. If the data matches the command and response values...

  18. Life, liberty, and the pursuit of swords and armor: regulating the theft of virtual goods

    National Research Council Canada - National Science Library

    Arias, Andrea Vanina

    2008-01-01

    ... There is no longer a bright line between Massively-Multiplayer Online Role-Playing Games (MMORPGs) and reality. The more that virtual-world activities affect real-world economics and property interests, the more that virtual worlds will require legal regulation.3 A MMORPG is an online role-playing game in which a large number of players interact with one a...

  19. Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons

    Directory of Open Access Journals (Sweden)

    Gary Shiffman

    2013-02-01

    Full Text Available Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals and attackers. However, this method faces significant policy and resource constraints. Social science research, specifically in law and economics, concerning common-pool resources suggests an organic approach to cyber security may yield an appropriate solution. This cyber commons method involves treating the internet as a commons and encouraging individuals and institutions to voluntarily implement innovative and adaptive monitoring mechanisms. Such mechanisms are already in use and in many cases have proven more effective than attribution mechanisms in resisting and tracing the source of cyber attacks.

  20. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    OpenAIRE

    Stefan IOVAN; Marius Bogdan DINU

    2014-01-01

    Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity t o steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals...

  1. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ...; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of This Standard and Exempted..., announcing NHTSA's determination that there were no new model year (MY) 2011 light-duty truck lines subject...

  2. The Gift and the Theft: an Economic-Political Interpretation of Rwandan Missionary Diaries of White Fathers (1900-1910

    Directory of Open Access Journals (Sweden)

    Silvia Cristofori

    2012-11-01

    Full Text Available This article proposes an economic/political interpretation of two missionary Diaries drafted in Rwanda in the first decade of the last century. The events recorded in these documents aid the reader in understanding how the missions were, in that period, centers of power that interacted with the local environment in a manner which was relatively independent of a colonial administration that was still weak. As a result, while the missionaries learned and incorporated certain Rwandan socio-political logics, they also introduced embryonic forms of capitalism. From this paper the reader can understand how, thogether with these elements of capitalism in the daily life of mission, a policy of ethnicization and feudalization of rwandan society started to take shape. A policy, with was to be fully realized twenty years later under Belgian colonial rule.

  3. Space and crime in Dutch built environments: Macro and micro scale spatial conditions for residential burglaries and thefts from cars

    OpenAIRE

    Lopez, M.J.J.; Van Nes, A.

    2007-01-01

    At this moment, more knowledge is available on the physical characteristics of the built environment and their relationship to criminal opportunity rather than the spatial characteristics of potential targets and the public and private space between them. To improve this situation, a research project was started in the Dutch cities Gouda and Alkmaar that aimed to address several spatial characteristics of the built environment, to develop a method to quantify these characteristics and to rela...

  4. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... adjusted annually for inflation with base year of 1995). The assessment may be combined with other.... 6. CX-7. CX-9. MX-5 Miata. Millenia. Mercedes-Benz smart USA fortwo. SL-Class \\1\\ (the models within...

  5. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... private sector, of more than $100 million annually ($120.7 million as adjusted annually for inflation with... lines 3. 5. 6. CX-5. CX-7. CX-9. MX-5 Miata. Tribute. MERCEDES-BENZ smart USA fortwo. SL-Class (the...

  6. The Anatomy of a Crime Discovery after 25 Years. A Notable Case of Book Theft and its Detection

    Directory of Open Access Journals (Sweden)

    Jesper Düring Jørgensen

    2007-04-01

    Full Text Available The 11th September 2003 was quite an ordinary working day in the Royal Library - at least for the first few hours in the morning. At approximately 11.00 a.m., however, I was interrupted by the telephone. A polite lady introduced herself as the rare book specialist from Christie’s in London. From a consignor she had received the following work for sale: Propalladia de Bartholome de Torres Naharro. Dirigida... Napoles: por Ioan Pasqueto de Sallo, Naples 1517. Her investigation of a critical edition of Torres Naharro’s works from 1943 had established that only two copies of this particular work were known to exist. One incomplete copy in the National Library of Spain in Madrid, and one complete copy in The Royal Library in Copenhagen. This puzzled the keeper of books at the auction company, and she was keen to know whether she had a historic sensation in her hands or simply a stolen book.

  7. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... document grants in full the petition of Hyundai-Kia Motors Corporation (HATCI) in accordance with Sec. 543... Technical Center, Inc., on behalf of Kia Motors Corporation (Kia) requested an exemption from the parts... Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National Highway Traffic Safety Administration...

  8. Fúria assassina e carnificina : a experiência lúdica da violência no grand theft auto

    OpenAIRE

    Oliveira Neto, Jair Rocha de

    2014-01-01

    A partir das questões que envolvem relações de causa e efeito muitos trabalhos vêm sendo desenvolvidos com o intuito de descobrir se a violência dos jogos leva a comportamentos violentos. No entanto, outras questões que antecedem esta não vêm recebendo a devida atenção, tanto pelo senso comum, como pela academia. Por que realizar violência nos videogames? Esta dissertação teve por objetivo investigar a experiência da violência dos jogos eletrônicos, a partir dos significados atribuídos pelos ...

  9. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... immobilizer system and the alarm system in accordance with the EEC, UNECE, Korea standard and Hyundai in-house... device for the new vehicle line. Hyundai will install its passive Smart-key Immobilizer device and alarm... is removed from the smart-key immobilizer control unit. The audible and visual alarm system is...

  10. 77 FR 51612 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of...

    Science.gov (United States)

    2012-08-24

    ... INFORMATION CONTACT: Ms. Deborah Mazyck, Office of International Policy, Fuel Economy and Consumer Programs..., Lancer, Outlander Sport and i-MiEV vehicle lines have been equipped with a similar type of immobilizer... Sport and i-MiEV are not available. Therefore, Mitsubishi has concluded that the antitheft device...

  11. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... Standards Division, Office of International Policy, Fuel Economy and Consumer Programs, NHTSA, West Building... Sonic, Range Rover Evoque, Outlander Sport, Suzuki Kizashi, Toyota Corolla and the VW Audi A8. ] We note...'' as one that is likely to result in a rule that may: (1) Have an annual effect on the economy of $100...

  12. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... and Consumer Standards, NHTSA, W43- 302, 1200 New Jersey Avenue, SE., Washington, DC 20590. Ms.... FUSA stated that it presently has immobilizer devices on all of its product lines (Forester, Tribeca...

  13. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ..., an electronically coded vehicle immobilizer/car access system (EWS/CAS) control unit and a passive... immobilizer device also fulfills the requirements of the European vehicle insurance companies, in that the...

  14. Nectar Theft and Floral Ant-Repellence: A Link between Nectar Volume and Ant-Repellent Traits?

    Science.gov (United States)

    Ballantyne, Gavin; Willmer, Pat

    2012-01-01

    As flower visitors, ants rarely benefit a plant. They are poor pollinators, and can also disrupt pollination by deterring other flower visitors, or by stealing nectar. Some plant species therefore possess floral ant-repelling traits. But why do particular species have such traits when others do not? In a dry forest in Costa Rica, of 49 plant species around a third were ant-repellent at very close proximity to a common generalist ant species, usually via repellent pollen. Repellence was positively correlated with the presence of large nectar volumes. Repellent traits affected ant species differently, some influencing the behaviour of just a few species and others producing more generalised ant-repellence. Our results suggest that ant-repellent floral traits may often not be pleiotropic, but instead could have been selected for as a defence against ant thieves in plant species that invest in large volumes of nectar. This conclusion highlights to the importance of research into the cost of nectar production in future studies into ant-flower interactions. PMID:22952793

  15. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... Rover LR2, Mazda CX-5, Mitsubishi i-MiEV, Nissan Juke, Subaru XV Crosstrek, Toyota Prius and the... believe that republishing a list containing vehicle lines that have not been in production for a...

  16. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    National Research Council Canada - National Science Library

    Rockwell, Roy

    2002-01-01

    This research describes the results of a field experiment which examines the effects of warnings on system trust and individual awareness in government computer systems through the use of email forgery...

  17. By Royal Authority (Investigation Data, Concerning Mines Theft in Fort Navaginsky of the Black Sea Coastal Frontier. 1851

    Directory of Open Access Journals (Sweden)

    Vyacheslav I. Menkovsky

    2013-01-01

    Full Text Available The article, basing on archive data, considers one of the most celebrated criminal cases, controlled by the Russian Emperor Nicholas I during the Caucasian War. It is concerned with the divulgence of state military secret – new types of the defensive arms, namely galvanic cell mines. The state secret was divulged in Fort Navaginsky of the Black Sea coastal frontier in summer, 1851. The article reconstructs the crime, attaching special attention to the daily life of the fort, difficulties of the garrison life, shows reasons for social misconduct of some servicemen, describes relations between Russian administration and mountain tribes, particularly with Ubykhs

  18. 7 CFR 226.6 - State agency administrative responsibilities.

    Science.gov (United States)

    2010-01-01

    ... integrity. A lack of business integrity includes fraud, antitrust violations, embezzlement, theft, forgery..., antitrust violations, embezzlement, theft, forgery, bribery, falsification or destruction of records, making... integrity. A lack of business integrity includes fraud, antitrust violations, embezzlement, theft, forgery...

  19. Authentication Based Solutions to Counterfeiting of Manufactured Goods

    OpenAIRE

    Kilcullen, Joseph

    2015-01-01

    Counterfeiting of manufactured goods is presented as the theft of intellectual property, patents, copyright etc. accompanied by identity theft. The purpose of the identity theft is to facilitate the intellectual property theft. Without it the intellectual property theft would be obvious and the products would be confiscated and destroyed. Authentication solutions, to prevent identity theft, were then developed for the two categories of manufactured goods i.e. goods which can be subjected to d...

  20. 78 FR 63007 - Suspended Counterparty Program

    Science.gov (United States)

    2013-10-23

    ..., embezzlement, theft, conversion, forgery, bribery, perjury, making false statements or claims, tax evasion... of such action involved fraud, embezzlement, theft, conversion, forgery, bribery, perjury, making...

  1. 19 CFR 112.30 - Suspension or revocation of license.

    Science.gov (United States)

    2010-04-01

    ... produced upon demand; (2) His vehicle or vessel is not properly marked, as required by § 112.27; (3) The... constitute a felony, or a misdemeanor involving theft, smuggling, or a theft-connected crime. Any change in...) prior to conviction of a misdemeanor involving theft, smuggling, or a theft-connected crime, resulting...

  2. 12 CFR 222.1 - Purpose, scope, and effective dates.

    Science.gov (United States)

    2010-01-01

    ... procedures for the identification of possible instances of identity theft; (iii) Section 115, concerning... of rights of identity theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of identity theft complaint...

  3. 38 CFR 75.112 - Definitions and terms.

    Science.gov (United States)

    2010-07-01

    ... of the individual after the individual experiences identity theft. Identity theft has the meaning given such term under section 603 of the Fair Credit Reporting Act (15 U.S.C. 1681a). Identity theft... the effects and results of identity theft of the insured individual. Individual means a single human...

  4. Among pasta-loving Mafiosos, drug-selling Columbians and noodle-eating Triads – Race, humour and interactive ethics in Grand Theft Auto III

    OpenAIRE

    Dymek, Mikolaj

    2005-01-01

    This paper explores the intersection of race, humour and interactivity in GTA3. Interactivity has been extensively researched, race issues in games have been scarcely studied (Leonard 2003), but hitherto no research has focused on humour aspects of games despite the popularity of this subject in non-academic discussions on the Internet (BBC News 2001; Perry 2001). Previously, content analysis of games has been focused on narrative aspects (Aarseth 1997; Murray 1998) or psychological links bet...

  5. Grand Theft Auto is a "Sandbox" Game, but There are Weapons, Criminals, and Prostitutes in the Sandbox: Response to Ferguson and Donnellan (2017).

    Science.gov (United States)

    Gabbiadini, Alessandro; Bushman, Brad J; Riva, Paolo; Andrighetto, Luca; Volpato, Chiara

    2017-12-01

    In this issue, (Ferguson, C. J., & Donnellan, B. D., Journal of Youth and and Adolescence, published online 21 June 2017) criticize one of our studies (Gabbiadini, A., Riva, P., Andrighetto, L., Volpato, C., & Bushman, B. J., PLoS ONE, 11: 1-14, 2016) that found violent sexist video games can reduce empathy for female violence victims in male players who identify with violent male game characters, and do so by increasing masculine beliefs. Their main criticism is a "straw person" argument built on a claim that we never made (i.e., a direct effect of sexist-violent video games on empathy). They also made several other criticisms of our article. We appreciate the opportunity to respond to their criticisms in this article. We also point out some flaws in their reanalysis. Despite their criticisms, the core contributions of our original article remain intact.

  6. Crash test and evaluation of locking architectural mailboxes.

    Science.gov (United States)

    2014-09-01

    Some homeowners and businesses are becoming increasingly concerned about mail-identity theft. : Consequently, there is a growing demand for the use of locking mailboxes for theft deterrence and vandal : resistance. There are a number of mailbox produ...

  7. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events ... for a Refund in an FTC Case Report Identity Theft List a Number on the National Do ...

  8. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... FTC Apply for a Refund in an FTC Case Report Identity Theft List a Number on the National ... FTC Apply for a Refund in an FTC Case Report Identity Theft List a Number on the National ...

  9. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar ... for a Refund in an FTC Case Report Identity Theft List a Number on the National Do Not ...

  10. 48 CFR 1852.223-75 - Major breach of safety or security.

    Science.gov (United States)

    2010-10-01

    ..., equipment or property damage from vandalism greater than $250,000, or theft greater than $250,000. (c) In... from vandalism greater than $250,000, or theft greater than $250,000. (End of clause) ...

  11. 76 FR 50758 - Agency Information Collection Activities: Proposed Collection; Comments Requested-Reinstatement...

    Science.gov (United States)

    2011-08-16

    ... statistics on the prevalence, economic cost, and consequences of identity theft on victims. (5) An estimate...--Reinstatement, With Change, of a Previously Approved Collection for Which Approval Has Expired, Identity Theft... Form/Collection: Identity Theft Supplement (ITS) to the National Crime Victimization Survey. (3) Agency...

  12. 77 FR 59706 - Submission for OMB Review; Comment Request

    Science.gov (United States)

    2012-09-28

    ... collection. Title: Identity Theft Affidavit. Form: 14039. Abstract: The primary purpose of the form is to provide a method of reporting identity theft issues to the IRS so that the IRS may document situations where individuals are or may be victims of identity theft. Additional purposes include the use in the...

  13. 75 FR 80529 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2010-12-22

    ... economic or property interests, identity theft or fraud, or harm to the security or integrity of this... harm to economic or property interests, identity theft or fraud, or harm to the security or integrity... harm to economic or property interests, identity theft or fraud, or harm to the security or integrity...

  14. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    ...) as a primary personal identifier. Originally intended for the very limited purpose of tracking social security benefits, the value of the SSN as a unique identifier was quickly recognized, and its use rapidly grew...

  15. Cyber Intrusion into U.S. Office of Personnel Management: In Brief

    Science.gov (United States)

    2015-07-17

    motivations might have been. Theft of personally identifiable information (PII) may be used for identity theft and financially motivated cybercrime...information (PII) may be used for identity theft25 and financially motivated cybercrime, such as credit card fraud.26 However, experts have been...technology systems and data, potentially compromising the personal information of about 4.2 million former and current federal employees . Later that month

  16. Towards non-repudiable authentication through biometrics and smart cards

    CSIR Research Space (South Africa)

    Msiza, I

    2012-10-01

    Full Text Available ? Classified information access ? Employment access ? Insurance claims ? Medical identity theft ? Criminal identity theft ? System reproduction ? Hobbyism Identity Theft: How is it Done? ? CSIR 2012 Slide 6 ? Knowledge based platform ? e.g. PIN... ? biometrics and smart cards Part B: Biometrics ? CSIR 2012 Slide 7 Biometric Authentication ? CSIR 2012 Slide 8 ? A science that uses a person?s behavioral and/or physiological traits to establish their identify, or verify their claimed identity...

  17. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer ... IoT Home Inspector Challenge Robocalls: Humanity Strikes Back DetectaRobo Zapping ...

  18. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection ... IoT Home Inspector Challenge Robocalls: Humanity Strikes Back DetectaRobo ...

  19. Intelligent techniques applied in identifying fraudsters industrial consumers of electricity; Tecnicas inteligentes aplicadas na identificacao de consumidores industriais fraudadores de energia eletrica

    Energy Technology Data Exchange (ETDEWEB)

    Ramos, Caio C.O.; Souza, Andre N. de; Pereira, Lucas I.; Gastaldello, Danilo S. [Universidade Estadual Paulista (UNESP), Bauru, SP (Brazil). Dept. de Engenharia Eletrica], Emails: caioramos@gmail.com, andrejau@feb.unesp.br, ra510611@feb.unesp.br, danilosg@feb.unesp.br; Zago, Maria G. [Universidade de Sao Paulo (EP/USP), SP (Brazil) Escola Politecnica], Email: mgzago@usp.br; Papa, Joao P. [Universidade Estadual Paulista (UNESP), Bauru, SP (Brazil). Dept. da Computacao], Email: papa.joaopaulo@gmail.com

    2009-07-01

    The development of a computational intelligent tools based on neural network to identify commercial losses or fraud (theft energy), considering information from a database electric utility, is presented.

  20. 38 CFR 47.2 - Reporting to State Licensing Boards.

    Science.gov (United States)

    2010-07-01

    ... credentials; (g) Falsification of medical records or prescriptions; (h) Theft of drugs; (i) Inappropriate... diagnostic or treatment capability; errors in transcribing, administering or documenting medication...

  1. 39 CFR 601.113 - Debarment, suspension, and ineligibility.

    Science.gov (United States)

    2010-07-01

    ..., forgery, bribery, falsification or destruction of records, making false statements, tax evasion, or..., theft, forgery, bribery, falsification or destruction of records, or receipt of stolen property, or any...

  2. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Tools for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly Calendar Weekly Calendar ...

  3. 77 FR 71714 - Final Rule

    Science.gov (United States)

    2012-12-04

    ..., passenger cars are subject to safety, bumper, and theft prevention standards; therefore, a passenger car... vehicle type classification (e.g., passenger car, multipurpose passenger vehicle, truck, bus, motorcycle... safety, bumper, and theft prevention standards in effect on the date of manufacture shown above.'' The...

  4. A Comparison of the Act and Frequency of Plagiarism between Technical and Non-Technical Programme Undergraduates

    Science.gov (United States)

    BavaHarji, Madhubala; Chetty, Thiba Naraina; Ismail, Zalina Bt; Letchumanan, Krishnaveni

    2016-01-01

    Concerned with intellectual theft, we decided to examine intellectual theft among undergraduates at a private higher education institution. The aim of this study was to compare the act and frequency of plagiarism, particularly between programmes, gender, year of study and academic performance. This study adopted the quantitative approach, using a…

  5. Can the United States be Partners with China?

    Science.gov (United States)

    2013-04-16

    15 Intellectual Theft and Counterfeiting .......................................................................................16...Recently, China has been defensive against accusations of unethical behavior, to include currency manipulation, intellectual theft, counterfeiting and...of imported merchandise from China is its currency manipulation. China’s undervalued currency is forcing the U.S. to work through the WTO in an

  6. An approach to meeting the spent fuel standard

    Energy Technology Data Exchange (ETDEWEB)

    Makhijani, A. [Institute for Energy and Environmental Research, Takoma Park, MD (United States)

    1996-05-01

    The idea of the spent fuel standard is that there should be a high surface gamma radiation to prevent theft. For purposes of preventing theft, containers should be massive, and the plutonium should be difficult to extract. This report discusses issues associated with the spent fuel standard.

  7. Florida Postsecondary Education Security Information Act. Annual Report of Campus Crime Statistics 1991-93 and Annual Assessment of Physical Plant Safety 1994.

    Science.gov (United States)

    Florida State Dept. of Education, Tallahassee. Office of Postsecondary Education Coordination.

    This state-mandated report presents crime statistics at higher education institutions in Florida and an assessment of physical plant security. The crime data list numbers of homicides, forcible sex offenses, robberies, aggravated assaults, burglaries/breaking and entering, larcenies and thefts, and motor vehicle thefts for each state university,…

  8. Marked by Fire: Anishinaabe Articulations of Nationhood in Treaty Making with the United States and Canada

    Science.gov (United States)

    Stark, Heidi Kiiwetinepinesiik

    2012-01-01

    The story, known as "The Theft of Fire," illustrates numerous meanings and teachings crucial to understanding Anishinaabe nationhood. This story contains two discernible points. First, it reveals how the Anishinaabe obtained fire. The second discernible feature within this story is the marking of the hare by his theft of fire. Stories…

  9. 7 CFR 331.3 - PPQ select agents and toxins.

    Science.gov (United States)

    2010-01-01

    ... variegated chlorosis strain). (c) Genetic elements, recombinant nucleic acids, and recombinant organisms: (1... this part: (1) Any select agent or toxin that is in its naturally occurring environment, provided that... secures the seized agent or toxin against theft, loss, or release, and reports any theft, loss, or release...

  10. 42 CFR 73.4 - Overlap select agents and toxins.

    Science.gov (United States)

    2010-10-01

    ... Equine Encephalitis virus (c) Genetic Elements, Recombinant Nucleic Acids, and Recombinant Organisms: (1... occurring environment provided that the select agent or toxin has not been intentionally introduced... toxin against theft, loss, or release, and reports any theft, loss, or release of such agent or toxin...

  11. 42 CFR 73.3 - HHS select agents and toxins.

    Science.gov (United States)

    2010-10-01

    ..., and Recombinant Organisms: (1) Nucleic acids that can produce infectious forms of any of the select... naturally occurring environment provided the select agent or toxin has not been intentionally introduced... against theft, loss, or release, and reports any theft, loss, or release of such agent or toxin, and (3...

  12. Compliance with library rules and regulation: a review | Alokun ...

    African Journals Online (AJOL)

    A survey assessing patrons\\' compliance with library rules and regulation as they affect loaning, theft and mutilation of books over a period of ten years at Yaba College of Technology Library. Efforts have been made to present the statistical data of books borrowed by both staff and students in this college, the extent of theft ...

  13. Improving the Security and Resilience of U.S. Postal Service Mail Products and Services Using the CERT (registered trademark) Resilience Management Model

    Science.gov (United States)

    2014-01-01

    federal statutes addressing electronic crimes, mail fraud, mail theft, identity theft, child exploitation, and prohibited mailings such as bombs and...headquartered in Berne , Switzerland, is a unit of the United Nations that regulates the postal services of 192 member countries. These postal

  14. 78 FR 63196 - Privacy Act System of Records

    Science.gov (United States)

    2013-10-23

    ... suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft...' speeches, formal photographs and other significant public affairs files; Correspondence, subject and other... suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft...

  15. 75 FR 61169 - Privacy Act; Notification of a New Privacy Act System of Records, Homeless Families Impact Study...

    Science.gov (United States)

    2010-10-04

    ...-and speech-impaired individuals (TTY) is available at (800) 877-8339 (Federal Information Relay... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... to economic or property interests, identity theft or fraud, or harm to the security or integrity of...

  16. 75 FR 4458 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-01-27

    ... incident of identity theft and provide information and documentation related to or in support of the..., identity theft or fraud, or harm to the security, confidentiality, or integrity of this system or other... therapeutic radiology technologists, social workers, speech pathologists, contracting specialists, building...

  17. 75 FR 29818 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-27

    ... incident of identity theft and provide information and/or documentation related to or in support of the... interests, identity theft or fraud, or harm to the security, confidentiality, or integrity of this system or... organizations: Name and educational degree of investigator; VHA title; academic affiliation and title; hospital...

  18. 78 FR 66709 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2013-11-06

    ... academic organizations; and members of the public. CATEGORIES OF RECORDS IN THE SYSTEM: Records contain... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft...

  19. Identity Security Awareness

    OpenAIRE

    Philipsen, Nayna C.

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  20. 34 CFR 682.211 - Forbearance.

    Science.gov (United States)

    2010-07-01

    ... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...

  1. Keep on Blockin’ in the Free World

    NARCIS (Netherlands)

    Rieback, Melanie

    2007-01-01

    I am here today to talk about some of the security implications of Radio Frequency Identification. RFID tags are remotely-powered data carriers that resemble the theft control tags that you might find in a sweater when buying clothing from a store. Like theft-control tags, RFID tags are powered

  2. Formulating specialised legislation to address the growing spectre ...

    African Journals Online (AJOL)

    subject' of a crime when it is used as an 'instrument' to commit traditional crimes such as fraud, theft, extortion, or 'new' types of criminal activity such as denial of service attacks and malware, identity theft, child pornography, copyright infringement, ...

  3. Contracting with the Enemy: The Contracting Officer’s Dilemma

    Science.gov (United States)

    2015-06-01

    subcontract Violations of federal or state antitrust laws Embezzlement, theft, forgery , bribery, etc. Intentionally misusing "Made in America" designation...subcontract Violations of federal or state antitrust laws Embezzlement, theft, forgery , bribery, etc. Intentionally misusing "Made in America" designation

  4. 75 FR 43709 - Privacy Act of 1974; New and Revised Systems of Records

    Science.gov (United States)

    2010-07-26

    ... or to proper financial organization, and to investigate alleged forgery, theft or unlawful... evidence may be released to the U.S. Postal Service for investigation of alleged forgery or theft of..., and/or forgery of Medicare checks. h. Information may be furnished to the State licensing boards for...

  5. 27 CFR 20.203 - Losses on premises.

    Science.gov (United States)

    2010-04-01

    ... discovery of any loss due to casualty, theft or other unusual causes. (b) Claims. A claim for allowance of... to theft or unlawful use or removal, the permittee shall file a claim for allowance of losses regardless of the quantity involved. (Approved by the Office of Management and Budget under control number...

  6. 76 FR 7213 - ACRAnet, Inc.; SettlementOne Credit Corporation, and Sackett National Holdings, Inc.; Fajilan and...

    Science.gov (United States)

    2011-02-09

    ... estimated that in 2005 alone 8.3 million consumers fell victim to identity theft. We found that 1.8 million... breaches that should have alerted them to problems with the data security of some customers, respondents... access can result in grave consumer harm through identity theft. The significant impact and cost of...

  7. Modeling And Simulation Of Electrical Prevenion System Using Arduino Uno,Gsm Modem, And Acs712 Current Sensor

    Science.gov (United States)

    Khair, Ummul; Jabbar Lubis, Abdul; Agustha, Indra; Dharmawati; Zulfin, M.

    2017-12-01

    The current electricity needs is very primary, all objects including electronics require power, it encourages people not to be able to save electricity so the theft of electric power would be done. The use of ACS712 current sensor as the sensor with arduino uno would find out the power consumption continuously and prevent the theft of electricity because of the use of electricity which has been determined by PLN and the people fetl that it is not enough for every house, so the author made a tool for prevention of theft of electric power by using the arduino uno, buzzer, ACS712 current sensor, lcd, and relay then the power usage can be controlled according to the use to prevent the occurrence of theft of electricity so the use can be seen directly on the lcd 16x2and GSM modem to give information to employees of PLN so that it can reduceelectrical theft by the public.

  8. Prediksi Kerawanan Wilayah Terhadap Tindak Pencurian Sepeda Motor Menggunakan Metode (SARIMA Dan CART

    Directory of Open Access Journals (Sweden)

    Pradita Eko Prasetyo Utomo

    2017-07-01

    Full Text Available Motor vehicle theft is a crime that is most common in Indonesia. Growth of vehicle motorcycle significant in each year accompanied by the increasing theft of motorcycles in each year, we need a system that is able to forecast the development and the theft of the motorcycle. This research proposes the development of forecasting models vulnerability criminal offense of theft of motorcycles with ARIMA forecasting method. This method not only forecast from variable of theft but also residents, vehicles and unemployment. The study also determined the classification level of vulnerability to the crime of theft of a motorcycle using a method based on the Decision Tree CART ARIMA forecasting method. Forecasting time series data with ARIMA method performed by each of the variables to produce the best ARIMA forecasting model which varies based on the data pattern of each of those variables. The results of classification by CART method to get the value of accuracy of 92% for the city of Yogyakarta and 85% for DIY. Based on the above, the results of ARIMA forecasting and classification CART can be used in determining the level of vulnerability to the crime of theft of motorcycles.

  9. Fear of property crime: examining the effects of victimization, vicarious victimization, and perceived risk.

    Science.gov (United States)

    Cook, Carrie L; Fox, Kathleen A

    2011-01-01

    Fear of crime research has primarily focused on fear of crime in general or on fear of specific types of violent crimes. This study builds from this line of research by focusing exclusively on the night fear of six types of property crimes, including fear of burglary while away from home, vehicle theft, bicycle theft, property theft, vandalism, and vehicle burglary. This study examines the effects of victimization, vicarious victimization, and perceived risk on fear of property crime. Survey data from college students reveal that victimization and vicarious victimization were not significant predictors of fear of property crime, whereas perceived risk was a consistent and significant predictor of fear of all property crimes.

  10. El robo de La Gioconda en la prensa española (1911-1914. El nacimiento de un icono artístico / The theft of La Gioconda as seen through the Spanish press (1911-1914.The birth of an artistic icon

    Directory of Open Access Journals (Sweden)

    Jesús F. Pascual Molina

    2011-07-01

    Full Text Available In August 1911, Leonardo da Vinci!s most famous painting was stolen. The repercussions of the case in the written press made the painting omnipresent for people who till then knew very little about it, giving it from that moment on the status of an authentic myth and art icon, a role that it had begun to assume in the middle of the nineteenth century. As happened in other places, the Spanish press spread the news of the event, bringing it, the painting, and its history closer to the Spanish people of the beginning of the twentieth century. At the same time, mass media outlets like the press, advertising, and cinema made use of the art work as a selling point, taking advantage of its popularity.RESUMEN: En agosto de 1911 el cuadro más famoso de Leonardo da Vinci fue robado. La repercusión del caso en la prensa escrita llevó al cuadro a ser omnipresente para la masa que hasta entonces poco sabía de él, alcanzando desde entonces el estatus de auténtico mito e icono del arte, papel que había comenzado a poseer desde mediados del siglo XIX. Como ocurrió en otros lugares la prensa española también se hizo eco de la noticia acercando el suceso, el cuadro y su historia al pueblo español de principios del siglo XX. Al mismo tiempo, los medios de masas como la propia prensa, la publicidad y el cine, emplearon la obra como reclamo, apoyándose en su popularidad.

  11. An Agent-Based Simulation of Car Theft: further evidence of the rational choice theory of crime/Uma Simulação de Furto de Carros Baseada em Agentes: evidências adicionais da teoria da escolha racional do crime

    National Research Council Canada - National Science Library

    Luiz Marcelo Berger; Denis Borenstein

    2013-01-01

    ..., particularly those related to the so-called crimes of opportunity. The apparent contradiction challenges common claims concerning the correlation between wealth distribution and various types of urban offences...

  12. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... the FTC Apply to the FTC Testimonials News & Events Press Releases Commission Actions Media Resources Consumer Finance ... Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly Calendar Weekly Calendar Archive ...

  13. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly ... Business Center Advertising & Marketing Credit & Finance Guidance Privacy & Security Selected Industries Legal Resources Business Blog Competition Guidance ...

  14. Ethical Issues in Cooperative Education--The Practitioner's Perspective.

    Science.gov (United States)

    Mark, Joan

    2001-01-01

    Raises issues of unethical student behavior in cooperative education, with examples of theft, abuse of workplace e-mail, fraudulent timesheets, and wrongful unemployment claims. Discusses new opportunities for unethical behavior created by technology and ways educators can respond. (SK)

  15. Online Safety: Fraud, Security, Phishing, Vishing

    Science.gov (United States)

    ... Report Scams and Frauds Identity Theft Online Safety Privacy Online Safety Be aware of these scams when you're online. What's on This Page Online Security and Safety Internet Fraud Phishing and Vishing Online ...

  16. Terrorism and Cybercrime

    National Research Council Canada - National Science Library

    Chargualaf, Jr, Joseph

    2008-01-01

    .... However, what is not as well publicized is their use of the Internet to conduct cybercrimes such as identity theft and credit card fraud for the express intent of raising finds in support of terrorist...

  17. 26 CFR 1.469-2 - Passive activity loss.

    Science.gov (United States)

    2010-04-01

    ...); (vi) Gross income attributable to the reimbursement of a loss from fire, storm, shipwreck, or other..., storm, shipwreck, or other casualty, or from theft (as such terms are used in section 165(c)(3)) if...

  18. 78 FR 71671 - Proposed Information Collection; Qualification/Certification Program Request for MSHA Individual...

    Science.gov (United States)

    2013-11-29

    ... Identity Theft, which requires Federal agencies to better secure government held data. II. Desired Focus of... collection and the collection of this information does not employ statistical methods. Type of Review...

  19. Page 1 852 Ethiopian Journal of Environmental Studies ...

    African Journals Online (AJOL)

    USER

    2016-11-22

    , the use of drugs, deaths due to flooding and collapse of lotto pits, theft, inflation, and prostitution, sexually transmitted diseases is prevalent. The study suggest interventions such as; reclaiming open pits, dredging of streams, ...

  20. 77 FR 68204 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-11-15

    ... Engraving and Printing: 14th & C Streets SW., Washington, DC 20228. (5) Fiscal Services: 401 14th Street SW..., identity theft or fraud, or harm to the security or integrity of this system or other systems or programs...

  1. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... The Do Not Call Registry Tools for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and ... Early Termination Notices Current Thresholds Filing Fee Information Post-Consummation Filings (HSR Violations) Medicare Act Filings HSR ...

  2. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Actions Media Resources Consumer Finance Mergers and Competition Mobile Technology The Do Not Call Registry Tools for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly ...

  3. 3 CFR 8347 - Proclamation 8347 of February 27, 2009. National Consumer Protection Week, 2009

    Science.gov (United States)

    2010-01-01

    ... on home foreclosure, identity theft, and protecting businesses. Working together, consumers... Consumer Protection Week, 2009 8347 Proclamation 8347 Presidential Documents Proclamations Proclamation 8347 of February 27, 2009 Proc. 8347 National Consumer Protection Week, 2009By the President of the...

  4. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Not Call Registry Tools for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security ... Advice For Consumers For Military Consumers Business Center Advertising & Marketing Credit & Finance Guidance Privacy & Security Selected Industries ...

  5. 76 FR 66949 - Privacy Act of 1974; Notification of the Establishment of a Privacy Act System of Records, HUD...

    Science.gov (United States)

    2011-10-28

    ... device for hearing- and speech-impaired individuals (TTY) is available at 1-(800) 877-8339 (Federal..., there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the...

  6. 75 FR 81635 - Privacy Act of 1974: Notice of New System of Records, Single Family Computerized Homes...

    Science.gov (United States)

    2010-12-28

    .... A telecommunications device for hearing- and speech-impaired persons (TTY) is available at 1-800-877... property interests, identity theft or fraud, or harm to the security or integrity of this system or other...

  7. 76 FR 66950 - Privacy Act; Notice of Revision of System of Records, the Single Family Housing Enterprise Data...

    Science.gov (United States)

    2011-10-28

    ... (202) 708- 2121. (These are not toll-free numbers.) Telecommunication device for hearing-and speech... property interests, identity theft or fraud, or harm to the security or integrity of this system or other...

  8. Anatomy of a Cancer Treatment Scam

    Science.gov (United States)

    ... for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly Calendar Weekly Calendar Archive Speeches Audio/Video Featured Videos FTC Events For Consumers ...

  9. 76 FR 71067 - Privacy Act of 1974; Notification To Delete and Create a New System of Records, “HUD/FHA Lender...

    Science.gov (United States)

    2011-11-16

    ... 20410, telephone number (202) 402-8214. A telecommunications device for hearing- and speech-impaired... compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the...

  10. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly Calendar Weekly Calendar Archive Speeches Audio/Video Featured Videos FTC Events For Consumers ...

  11. 76 FR 20003 - Privacy Act of 1974: Notice of New System of Records, Integrated Disbursement & Information...

    Science.gov (United States)

    2011-04-11

    ..., Telephone Number (202) 402-8138. A telecommunications device for hearing-and speech-impaired persons (TTY... property interests, identity theft or fraud, or harm to the security or integrity of this system, then the...

  12. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Science.gov (United States)

    2010-07-29

    ... telecommunication device for hearing- and speech- impaired individuals (TTY) is available at 1-800-877-8339 (Federal..., identity theft or fraud, or harm to the security or integrity of this system or other systems or programs...

  13. 75 FR 44804 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Mortgage...

    Science.gov (United States)

    2010-07-29

    ...-and speech-impaired individuals (TTY) is available at 1-800-877-8339 (Federal Information Relay... property interests, identity theft or fraud, or harm to the security or integrity of this system or other...

  14. Federal Trade Commission

    Science.gov (United States)

    ... for Consumers Truth In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly Calendar Weekly Calendar Archive Speeches Audio/Video Featured Videos FTC Events For Consumers ...

  15. 76 FR 56196 - Agency Information Collection Activities; Proposed Collection; Comment Request

    Science.gov (United States)

    2011-09-12

    ... addition, don't include any `` rade secret or any commercial or financial information which is obtained... completing a police report, if appropriate, and, as also may be necessary, an identity theft report. See 16...

  16. Researcher Profile: An Interview with Axton Betz-Hamilton

    Directory of Open Access Journals (Sweden)

    Axton Betz-Hamilton

    2015-07-01

    Full Text Available Dr. Axton Betz-Hamilton teaches consumer studies courses at Eastern Illinois University, including Personal and Family Finance, Housing, and Consumer Issues. She conducts research on identity theft as well as financial abuse within families.

  17. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events Weekly Calendar ... Applications, Petitions, and Requests Merits Briefs Economic Liberty Military Task Force Advisory Opinions Cooperation Agreements Federal Register ...

  18. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  19. Mental Illness and the Family: Recognizing the Warning Signs & How to Cope

    Science.gov (United States)

    ... at home and/or at school Defiance of authority, truancy, theft, and/or vandalism Intense fear Prolonged ... External Resources Find a Local MHA Affiliate Substance Abuse and Mental Health Services Administraton (SAMHSA) Phone 800- ...

  20. 7 CFR 331.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... access, theft, loss, or release. (b) The security plan must be designed according to a site-specific risk... approved individual; (3) Provide for the control of select agents and toxins by requiring freezers...

  1. Percepción de Impunidad

    National Research Council Canada - National Science Library

    Ervyn Hermilzon Norza; María Jimena Peñalosa Otero; Juliana Coronado Neira; Blanca Idalir Duque Morales; Diana Patricia Castro Pérez

    2016-01-01

    .... The objective was to determine the influence of the perception of impunity in the generation of criminality for offenses of theft and murder in Bogota, from the perspective of the three actors...

  2. 77 FR 13959 - National Consumer Protection Week, 2012

    Science.gov (United States)

    2012-03-08

    ... theft, understanding loans and mortgages, and other topics at: www.NCPW.gov . With the leadership of the.... NOW, THEREFORE, I, BARACK OBAMA, President of the United States of America, by virtue of the authority...

  3. Risk management and security services interaction--a must in today's health care environment.

    Science.gov (United States)

    Stultz, M S

    1990-01-01

    The author shows why risk managers and security directors are natural partners in the effort of a hospital to reduce risks from such occurrences as baby kidnappings, serial killers, thefts, and rapes/sexual assaults.

  4. Anatomy of a Cancer Treatment Scam

    Medline Plus

    Full Text Available ... In Advertising Protecting Consumer Privacy Identity Theft and Data Security Military Consumer Protection Events Calendar All Events ... Guides Statutes Consumer Sentinel Network Members Reports Newsletters Data Contributors Criminal Liaison Unit Results CLU Awards Contact ...

  5. 27 CFR 70.603 - Execution and filing of claim.

    Science.gov (United States)

    2010-04-01

    ... determines that a major disaster has occurred. (c) Other causes of loss. (1) Claims for amounts of $250 or... as the result of: (i) Fire, flood, casualty, or other disaster; or (ii) Damage (excluding theft...

  6. Untitled

    Indian Academy of Sciences (India)

    dimensional attributes. This paper contains a detailed discussion on artificial intelligence-based case analysis of theft cases in a real world perspective,. Keywords. Legal reasoning; artificial intelligence, legal predictive system; legal expert systems,.

  7. 40 CFR 246.202-4 - Recommended procedures: Methods of separation and storage.

    Science.gov (United States)

    2010-07-01

    ... placed in balers and compacted into bales. These bales may be stored inside or outside of the facility. The bales should be protected from fire, inclement weather, theft, and vandalism. (b) Stationary...

  8. 32 CFR 223.4 - Policy.

    Science.gov (United States)

    2010-07-01

    ... increasing significantly the likelihood of the illegal production of nuclear weapons or the theft, diversion... DEFENSE UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (DOD UCNI) § 223.4 Policy. It is DoD policy: (a) To...

  9. 5 CFR 180.104 - Allowable claims.

    Science.gov (United States)

    2010-01-01

    ... loss of personal property incident to service with OPM may be considered and allowed. The following are... mobile homes may be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money...

  10. 44 CFR 11.73 - Allowable claims.

    Science.gov (United States)

    2010-10-01

    ... to service with FEMA may be considered and allowed. The following are examples of the principal types... be allowed only in cases of collision, theft, or vandalism. (5) Money. Claims for money in an amount...

  11. Terrorism and Cybercrime

    National Research Council Canada - National Science Library

    Chargualaf, Jr, Joseph

    2008-01-01

    .... However, what is not as well publicized is their use of the Internet to conduct cybercrimes such as identity theft and credit card fraud for the express intent of raising finds in support of terrorist activities. The U.S...

  12. DoD Global Information Grid Mission Assurance

    National Research Council Canada - National Science Library

    Bargar, Anthony

    2008-01-01

    ... for espionage and the criminal theft of data. GIG mission assurance works to ensure the DoD is able to accomplish its critical missions when networks, services, or information are unavailable, degraded, or distrusted...

  13. 28 CFR 105.22 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... individual, partnership, firm, company, corporation or institution that performs security services, whether...) Employees of electronic security system companies acting as technicians or monitors; or (3) Employees whose... equipment); protect against fire, theft, misappropriation, vandalism, violence, terrorism, and other illegal...

  14. 27 CFR 22.123 - Losses on premises.

    Science.gov (United States)

    2010-04-01

    ... unlawful use or removal, the permittee shall file a claim for allowances of losses regardless of the... discovery of any loss due to casualty, theft or other unusual causes. (b) Claims. A claim for allowances of...

  15. Financial Irresponsibility: Background Information for Security Personnel

    Science.gov (United States)

    1991-09-01

    27 9. Financial Crimes by Gender ....................................... 23 vi Introduction Financial irresponsibility is...theft and related forms of dishonesty . 7 No estimate is available of the cost to the U.S. Government from fraud or theft by its own employees. 2 After... dishonesty . Credit records contain many inaccuracies, honest people can accrue bad credit records, and people with clean credit records are not immune to

  16. Defense Logistics: Enhanced Policy and Procedures Needed to Improve Management of Sensitive Conventional Ammunition

    Science.gov (United States)

    2016-02-01

    Vulnerability of Sensitive Defense Material to Theft 54 Table 11: Status of Recommendations from Inventory Management: Handheld Missiles Are...Vulnerable to Theft and Undetected Losses 56 Figures Figure 1: Department of Defense and Military Services’ Automated Information Systems for Security...Category WARS-NT Worldwide Ammunition Reporting System-New Technology This is a work of the U.S. government and is not subject to copyright

  17. Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach

    OpenAIRE

    Grover Kearns

    2010-01-01

    Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting stu...

  18. Attacking Transnational Organized Criminal Networks: Applying Principles of Irregular Warfare to an Emerging Salient Threat

    Science.gov (United States)

    2014-12-04

    counterfeiting, or theft of intellectual property, varies from imitation merchandise leveraging the reputation of known and trusted brand names to theft...of high-tech designs and manufacturing processes to illicit copying and sale of music, video games and movies . United Nations Office on Drugs and...DASD-CN>-funded staff elements, their internal task organization as well as their placement within the staff structure of the Component Command

  19. A National R&D Institute for Information Infrastructure Protecton (I3P)

    Science.gov (United States)

    2000-04-01

    included denial of service, system penetration by outsiders, sabotage of data or networks, theft of proprietary information, and fraud . Resulting financial...losses to the respondents were estimated to total at least $124 million, primarily due to theft and fraud . Overall, the survey confirms that...power and telecommunications infrastructure sectors via the Internet.23 The scripted infrastructure MCI Worldcom reportedly tried for several days to

  20. Car Alarm System Engineered In Arduino Environment

    OpenAIRE

    Järvelä, Sakari

    2014-01-01

    This thesis is targeting to develop and engineer a burglar alarm system prototype using the software and hardware environment Arduino, which is originally manufactured by Smart Projects. The system under development provides a versatile theft inhibition hardware configuration for the holder of the system. It also provides vehicle localization enabling features in case of theft. In the final project, the aim is not to reach commercial benefit. The aim is to get familiar with software libra...

  1. An Analysis of Security and Performance Concerns in Mobile Web Application Development: Challenges and Open Issues

    Directory of Open Access Journals (Sweden)

    Douglas Kunda

    2017-10-01

    Full Text Available The paper focuses on security and performance concerns in mobile web development. The approach used in the study involved surveying journal publications to identify security and performance concerns. The paper highlights some of the contemporary issues currently being faced by application developers as they create, update and maintain mobile web applications including Cross-Site Scripting, Cookie hijacking/theft, location hijacking, history theft, behaviour analysis, session hijacking, API design, security and the type of web server used considered.

  2. Narcoterrorism - A Threat to the United States?

    Science.gov (United States)

    1992-04-21

    hydrochloride (HCL). The capital of the nation is Bogota . There are five major cities in the country. Two of them, Medellin and Cali, are narcotrafficker...absentee rate. The Pinkerton Security Company states that 80 percent of the corporate theft investigated was drug related. 12 The symptoms (and impact) of...his drugs to survive and will do what he must to get those drugs. This may involve theft or even marketing the product. He or she is in a predicament

  3. Process Flow Features as a Host-Based Event Knowledge Representation

    Science.gov (United States)

    2012-06-14

    Abstract Malicious software, or malware, are programs with malicious intent [1], and can exists in the form of viruses , worms, trojan horses , spyware...systems such as worms, viruses and trojan horses to theft related intrusions with the purpose on stealing information such as computer theft, financial...to Carvey [22], some malware may only exist in memory evading anti- virus signature scans. From the data in memory an abstraction to features of

  4. The Determinants of Employee Crime in the UK

    OpenAIRE

    Neil Rickman; Robert Witt

    2003-01-01

    For the first time, we present evidence on employee theft in the UK using data on actual recorded crime. We present a model where employees are ‘rational cheaters’ with ‘consciences’ to produce hypotheses about the role of labour market (wages, unemployment) and social (age, education) influences on employee theft. We then examine the role of these influences using regional crime data supplemented by data from the LFS. Our results provide information on two competing views of motivations for ...

  5. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  6. Violent Mexican Transnational Criminal Organizations in Texas: Political Discourse and an Argument for Reality

    Science.gov (United States)

    2012-09-01

    with murder and child molestation convictions, and auto theft (vehicles are used for smuggling of humans and drugs).201 1. Southwest Border Task Force...How Crime in the United States is Measured, 15. 247 Crimes against society include drug/narcotics, gambling, prostitution, and pornography /obscene... Pornography /Obscene Material Sex Offense (forcible) Extortion/Blackmail Sex Offenses (non- forcible) Fraud Offenses Larceny/Theft Offenses

  7. System Control Applications of Low-Power Radio Frequency Devices

    Science.gov (United States)

    van Rensburg, Roger

    2017-09-01

    This paper conceptualizes a low-power wireless sensor network design for application employment to reduce theft of portable computer devices used in educational institutions today. The aim of this study is to design and develop a reliable and robust wireless network that can eradicate accessibility of a device’s human interface. An embedded system supplied by an energy harvesting source, installed on the portable computer device, may represent one of multiple slave nodes which request regular updates from a standalone master station. A portable computer device which is operated in an undesignated area or in a field perimeter where master to slave communication is restricted, indicating a possible theft scenario, will initiate a shutdown of its operating system and render the device unusable. Consequently, an algorithm in the device firmware may ensure the necessary steps are executed to track the device, irrespective whether the device is enabled. Design outcomes thus far indicate that a wireless network using low-power embedded hardware, is feasible for anti-theft applications. By incorporating one of the latest Bluetooth low-energy, ANT+, ZigBee or Thread wireless technologies, an anti-theft system may be implemented that has the potential to reduce major portable computer device theft in institutions of digitized learning.

  8. Data Hemorrhages in the Health-Care Sector

    Science.gov (United States)

    Johnson, M. Eric

    Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.

  9. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  10. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  11. Nonlinear relationship between income, age and criminal victimization in Brazil

    Directory of Open Access Journals (Sweden)

    E. Sant’Anna

    2016-05-01

    Full Text Available This study was mainly intended to investigate the effects of the income and age of individuals on their risk of becoming victims of physical assault, theft, robbery and attempted theft or robbery. Specifically, we were looking for evidence for a nonlinear relationship between these variables and victimization risk. Data from a national victimization survey were used to estimate victimization probability models. We found that, except for robbery and physical assault, the relationship between personal income and victimization risk has an inverted-U shape. We also found an inverted U-shape relationship between the age of individuals and victimization risk for the four types of crimes analyzed.

  12. Relationship between income and repeat criminal victimization in Brazil

    Directory of Open Access Journals (Sweden)

    Marcelo Justus

    2015-09-01

    Full Text Available This study analyzes the effect of income on repeat criminal victimization in Brazil using data from the 2009 National Household Sample Survey and its special supplement on victimization and access to justice. Two count-data models were estimated for four types of crime: theft, robbery, attempted theft/robbery, and physical assault. A positive nonlinear effect of income on repeat victimization for the three types of property crimes and a negative nonlinear effect of income on physical assault were observed.

  13. Rethinking inventories in the digital age: the case of the Old Bailey

    Directory of Open Access Journals (Sweden)

    Anne Helmreich

    2014-12-01

    Full Text Available This paper uses a computational approach to the formal indictments included in the Old Bailey Online for the period 1740 to 1800, to assess the material world of London as seen through a thief’s eyes. Trial reports detailing theft incorporate an implicit inventory of portable objects marked by a specific kind of circulatory exchange value enabled by London’s evolving consumer society. By identifying patterns of significance within the Old Bailey corpora of theft trials, this article will extend traditional humanities practices of close reading by adding a form of distant reading facilitated by computational analysis.

  14. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance

    CERN Document Server

    Chuvakin, Anton

    2010-01-01

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant?. Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the curre

  15. Simple steps to avoid plagiarism and improve scientific writing

    OpenAIRE

    Peeran, Syed Wali; Ahmed, Aisha Mojtaba; Mugrabi, Marei Hamed; Peeran, Syed Ali

    2013-01-01

    Dear Sir, Plagiarism is defined by the Oxford dictionary as ‘the practice of taking someone else’s work or ideas and passing them off as one’s own’. Plagiarism can be defined simply as literary theft. Historically, it used to take place when one tried to steal other’s work to gain recognition. In the recent times, plagiarism includes literary theft or misappropriation of intellectual property and the substantial unattributed textual copying of another’s work. Plagiarism encompasses either pla...

  16. Virtuelle ting

    DEFF Research Database (Denmark)

    Mathiasen, Peter Dueholm

    2014-01-01

    In the article it is discussed whether virtual items can be described as "rørlige ting” (movable objects) and therefore subject to protection against e.g. theft under the Danish Criminal Code. Norwegian, Swedish and Dutch criminal laws are included in the article.......In the article it is discussed whether virtual items can be described as "rørlige ting” (movable objects) and therefore subject to protection against e.g. theft under the Danish Criminal Code. Norwegian, Swedish and Dutch criminal laws are included in the article....

  17. Directed seed dispersal towards areas with low conspecific tree density by a scatter-hoarding rodent

    NARCIS (Netherlands)

    Hirsch, Ben T.; Kays, Roland; Pereira, Veronica E.; Jansen, Patrick A.

    2012-01-01

    Scatter-hoarding animals spread out cached seeds to reduce density-dependent theft of their food reserves. This behaviour could lead to directed dispersal into areas with lower densities of conspecific trees, where seed and seedling survival are higher, and could profoundly affect the spatial

  18. 75 FR 54698 - Sentencing Guidelines for United States Courts

    Science.gov (United States)

    2010-09-08

    ...) Amendment 8 expanded the scope of Sec. 2B1.5 (Theft of, Damage to, or Destruction of, Cultural Heritage... ``Resources''; by inserting ``or paleontological resource'' before ``, loss''; by striking ``cultural heritage'' after ``to that'' and by striking ``cultural heritage'' after ``of the''. The Commentary to Sec. 2K1.3...

  19. 12 CFR 222.80-222.81 - [Reserved

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false 222.80-222.81 Section 222.80-222.81 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Duties of Users of Consumer Reports Regarding Identity Theft § 222.80-222.81 ...

  20. 12 CFR 222.91 - Duties of card issuers regarding changes of address.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Duties of card issuers regarding changes of address. 222.91 Section 222.91 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.91...

  1. 12 CFR 222.82 - Duties of users regarding address discrepancies.

    Science.gov (United States)

    2010-01-01

    ... FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Duties of Users of Consumer Reports Regarding Identity Theft § 222.82 Duties of users regarding address discrepancies. (a) Scope. This section applies to... consumer's identity in accordance with the requirements of the Customer Identification Program (CIP) rules...

  2. Databases for stolen art: Progress, prospects and limitations | Roodt ...

    African Journals Online (AJOL)

    Addre sing the illicit trade in stolen works of art and other heritage items is notoriously difficult. Before thefts of heritage items can be recorded, the object in question must be identified as having special significance. The investigation of the circumstances in which such an object was acquired and the enforcement of legal ...

  3. 49 CFR Appendix A to Part 541 - Light Duty Truck Lines Subject to the Requirements of This Standard

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines Subject to the Requirements of This Standard A Appendix A to Part 541 Transportation Other Regulations Relating to Transportation... VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. A Appendix A to Part 541—Light Duty Truck Lines Subject to...

  4. 77 FR 43170 - Endangered and Threatened Wildlife and Plants; Publishing Notice of Receipt of Captive-Bred...

    Science.gov (United States)

    2012-07-24

    ... interstate or foreign commerce endangered or threatened wildlife bred in captivity in the United States... of attacks on breeders or on the animals, putting these individuals or organizations at risk of theft... CBW program uses proper breeding methods and humane treatment of their animals. To the extent possible...

  5. 75 FR 38837 - Amendment to Prohibited Transaction Exemption (PTE) 84-14 for Plan Asset Transactions Determined...

    Science.gov (United States)

    2010-07-06

    ... fiduciary; income tax evasion; any felony involving the larceny, theft, robbery, extortion, forgery..., acquire or dispose of assets of a plan, which bank has, as of the last day of its most recent fiscal year... and loan association has, as of the last day of its most recent fiscal year, equity capital (as...

  6. Risk and Resilience Factors Associated with Formal and Informal Income Generation among Homeless Young Adults in Three U.S. Cities

    Science.gov (United States)

    Ferguson, Kristin M.; Bender, Kimberly; Thompson, Sanna J.

    2018-01-01

    This study used the risk and resilience framework to examine predictors of formal and informal sources of income among homeless young adults. Formal sources of income generation consisted of full-time, part-time, or paid, temporary work. Informal sources included earning money from selling personal possessions, selling drugs, and theft. In all,…

  7. Accountable or not accountable: A profile comparison of alleged ...

    African Journals Online (AJOL)

    Observati found not accountable were significantly more likely to be diagnosed with schizophrenia, intellectual disability and substance-induced psychotic disorder, and committed mostly assault, murder and vandalism. Observati found accountable committed mostly rape, murder and theft. Conclusion: The majority of ...

  8. Evil Bands and Violent Narratives in Thirteenth-Century Japan

    DEFF Research Database (Denmark)

    Oxenbøll, Morten

    2010-01-01

    crimes associated with banditry and ‘evil bands’ in general, such as murder, theft and arson, the temples aimed to show the negative impact the conflicts could possibly have on temple economy and estate control. Simultaneously they could emphasize the political and social danger posed by their legal...

  9. Norse Mythology: Literature Curriculum, Levels C-D [Grades Three and Four]; Teacher's Guide.

    Science.gov (United States)

    Oregon Univ., Eugene. Oregon Elementary English Project.

    This curriculum guide is intended to introduce elementary school students to Norse mythology. Nine myths are included: "The Creation,""Yggdrasil,""A Meeting of the Gods,""The Fenris Wolf,""Thor's Journey,""The Theft of Thor's Hammer,""The Death of Balder,""The Punishment of…

  10. Selling security to the poor | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    25 janv. 2011 ... In many parts of the world, a negative turn of events can bring a family to destitution. The death of the main breadwinner, a sick family member who requires medical attention, theft, a fire, or a flood—these misfortunes can wipe out a lifetime of hard work.

  11. Mobile's impact on hospital IT security in 2013: how your institution can adapt to BYOD.

    Science.gov (United States)

    Ho, Bill

    2013-01-01

    Just as ID theft of patient information has become largely a low-tech problem frequently involving the participation of physical security, so does the latest threat to protecting privacy, BYOD. In the article, the author spells out the problems and proposes solutions.

  12. 10 CFR 73.1 - Purpose and scope.

    Science.gov (United States)

    2010-01-01

    ... transportation formula quantities of strategic special nuclear material), §§ 73.50, and 73.60 are exempt from...-trained (including military training and skills) and dedicated individuals, willing to kill or be killed.... (2) Theft or diversion of formula quantities of strategic special nuclear material. (i) A determined...

  13. Beekeeping as an income generating activity: a case study of ...

    African Journals Online (AJOL)

    The major problems were equipment availability, theft, management, lack of credit facilities. The findings emphasize the need to train researchers and extension agents in apiculture so as to generate research findings on bee keeping and to be able to disseminate the knowledge acquired to the beekeepers. (Af J Livestock ...

  14. Defense Science Board (DSB) Task Force on Cyber Deterrence

    Science.gov (United States)

    2017-02-01

    Denial-of-Service Attack ( DDoS ) and North Korea’s Sony hack) or costly cyber intrusions (China’s intellectual property (IP) theft and Russia’s hack of...of Staff CONOP Concept of operations DDoS Distributed Denial-of-Service Attack DIA Defense Intelligence Agency DNI Director of National

  15. STECH, 3(3), S/NO 12, SEPTEMBER, 2014

    African Journals Online (AJOL)

    DR Nneka

    2014-09-12

    Sep 12, 2014 ... cyber-terrorism or attack committed across the network such as malicious intrusion, credit card fraud, identity thefts, and infrastructure attack. Data mining techniques such as classification, anomaly, link analysis and so on are being applied to detect or prevent the aforementioned cyber-terrorism or attack.

  16. Codes of conduct in public schools: a legal perspective

    African Journals Online (AJOL)

    Erna Kinsey

    unisa.ac.za. The governing ... However, effective partnerships in education management and gover- nance are built on good co-operation, mutual ..... In fact, it also means that the learner's theft problem should be addressed to treat the root of the ...

  17. THE AFRICAN MINING VISION: PERSPECTIVES ON MINERAL ...

    African Journals Online (AJOL)

    RAYAN_

    theoretical arguments used in building the conceptual framework underpinning this article.Section 3 ..... 72 Tom Burgis, The Looting Machine: Warlords, Oligarchs, Corporations, Smugglers and the Theft of Africa's Wealth ..... programme clusters of activities constructed around the key tenets. The CMV operations manual ...

  18. An analysis of goat production within subsistence farming systems ...

    African Journals Online (AJOL)

    Department of Animal Sciences

    Abstract. The aims of this research were to study goat production in the rural areas of South Africa and to explore the impact of intervention objectives, namely an increase in kidding percentage and a decrease in kid losses (mortalities, theft and predation) on goat production in subsistence farming systems. A personal.

  19. 32 CFR 310.50 - Lost, stolen, or compromised information.

    Science.gov (United States)

    2010-07-01

    ... reported to: (1) The United States Computer Emergency Readiness Team (US CERT) within one hour of discovering that a breach of personally identifiable information has occurred. Components shall establish...., computer incident, theft, loss of material, etc.) shall continue to be reported in accordance with...

  20. Students in a Teacher College of Education Develop Educational Programs and Activities Related to Intelligent Use of the Web: Cultivating New Knowledge

    Science.gov (United States)

    Wadmany, Rivka; Zeichner, Orit; Melamed, Orly

    2014-01-01

    Students in a teacher training college in Israel have developed and taught curricula on the intelligent use of the Web. The educational programs were based on activities thematically related to the world of digital citizenship, such as the rights of the child and the Internet, identity theft, copyrights, freedom of expression and its limitations,…

  1. A new device for monitoring moorings

    Digital Repository Service at National Institute of Oceanography (India)

    Namboothiri, E.G.; Krishnakumar, V.

    A new device - Mooring Monitoring Unit (MMU), which consists of an inwater unit and a deck unit has been designed to monitor mooring in situ. This device helps tracing underwater moorings, once its marker buoy is removed either by accident or theft...

  2. 12 CFR Supplement I to Part 205 - Official Staff Interpretations

    Science.gov (United States)

    2010-01-01

    ... disclosures. Disclosures may be made in languages other than English, provided they are available in English... request. The request for an access device may be written or oral (for example, in response to a telephone... and the consumer learns of the loss or theft on Wednesday. If the consumer notifies the financial...

  3. Complex Threat Detection: Learning vs. Rules, using a Hierarchy of Features

    NARCIS (Netherlands)

    Burghouts, G.J.; Slingerland, P. van; Hove, R.J.M. ten; Hollander, R.J.M. den; Schutte, K.

    2014-01-01

    Theft of cargo from a truck or attacks against the driver are threats hindering the day to day operations of trucking companies. In this work we consider a system, which is using surveillance cameras mounted on the truck to provide an early warning for such evolving threats. Low-level processing

  4. The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce

    Science.gov (United States)

    Wang, Ping An

    2010-01-01

    This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…

  5. What Ohio U. Learned from a Major IT Crisis

    Science.gov (United States)

    McDavis, Roderick J.

    2008-01-01

    Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…

  6. 21 CFR 205.50 - Minimum requirements for the storage and handling of prescription drugs and for the establishment...

    Science.gov (United States)

    2010-04-01

    ... outdated, damaged, deteriorated, misbranded, or adulterated, or that are in immediate or sealed, secondary... shall be kept to a minimum and be well-controlled. (ii) The outside perimeter of the premises shall be... facilities shall be equipped with a security system that will provide suitable protection against theft and...

  7. Building Information Security Awareness at Wilmington University

    Science.gov (United States)

    Hufe, Mark J.

    2014-01-01

    This executive position paper proposes recommendations for reducing the risk of a data breach at Wilmington University. A data breach could result in identity theft of students, faculty and staff, which is costly to the individual affected and costly to the University. The University has a legal and ethical obligation to provide safeguards against…

  8. 78 FR 9766 - Individuals With Certain Criminal Convictions as Representative Payees

    Science.gov (United States)

    2013-02-11

    ... regarding whether we should prohibit persons who have been convicted of certain crimes from serving as... certain crimes involving violence or theft from serving as a representative payee. We also remove that... imprisonment; (3) kidnapping, rape or other sexual offense requiring registration as a sex offender; (4) first...

  9. Report on Activities and Programs for Countering Proliferation and NBC Terrorism. Volume 1. Executive Summary

    Science.gov (United States)

    2011-05-01

    worldwide from theft and sabotage. Assist in shutting down plutonium producing Russian nuclear reactors. Detect, secure, and eliminate vulnerable...surplus weapons-grade plutonium . Develop and sustain nuclear forensics international coordina- tion through joint exercises, training, and formal...term supply and demand for nuclear chemistry and radiochemistry expertise in the U.S. (over the next 20 years) and provide recommendations for

  10. Fulani herdsmen's pastoral activities, conflict and conflict ...

    African Journals Online (AJOL)

    of crop farmers and nomads respectively had less than 20 years of farming experience Also the results showed that problems encountered by the crop farmers were crop destruction (22.89 %) and sexual harassment (20.65 %) while cattle theft (69.57 %) and language barrier (30.43 %) were those of the nomads. Conflicts ...

  11. Library Building as a Contributory Factor to Users' Deviant ...

    African Journals Online (AJOL)

    Library Building as a Contributory Factor to Users' Deviant Behaviours: A Case Study of University of Abuja Library. ... Similarly, the study revealed that lack of surveillance, number of books available, cost of books, lack of photocopying services and users' attitude are the causes of books theft. However, book mutilation is ...

  12. Library Building as a Contributory Factor to Users' Deviant Behaviours

    African Journals Online (AJOL)

    Library Building as a Contributory Factor to Users' Deviant Behaviours: A Case Study of University of Abuja Library. ... Similarly, the study revealed that lack of surveillance, number of books available, cost of books, lack of photocopying services and users' attitude are the causes of books theft. However, book mutilation is ...

  13. enforcing tertiary school library rules and regulations

    African Journals Online (AJOL)

    2014-10-31

    Oct 31, 2014 ... permanently deprive the library of the books which is the requirement for a conviction for theft. Secondly, there is the general lack of security in university libraries owing to facilities deficiency, staff inadequacy and inefficient/unreliable power supply. According to Olorunsola (1987), there exists a relationship ...

  14. samaru journal information study vol 10

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    their work and the collective improvement of the society? This major dilemma calls for concerted efforts by all to resolve. The problem is also how librarians can go about uncovering thefts, pilferage and mutilations of resources in their libraries. Objectives of the Study. The broad objective of the study is to evaluate the.

  15. Adolescent Machine Gambling and Crime.

    Science.gov (United States)

    Yeoman, Tim; Griffiths, Mark

    1996-01-01

    Examines the relationship between adolescent gambling with gaming machines and criminal activity, primarily theft, in Plymouth, England. The survey was undertaken by police dealing with juveniles, and of 1,851 reports in 1 year, 3.9% were identified as having some association with gaming machine playing. (JPS)

  16. The Insurance Educator, 1999-2000.

    Science.gov (United States)

    Insurance Educator, 2000

    2000-01-01

    This packet contains three issues of "The Insurance Educator," a newsletter published for high school educators as a means to improve the understanding of insurance and its role in society through the education of teachers and students. Some representative articles include the following: "Protecting Your Bike from Theft"; "Tornadoes: Be Prepared";…

  17. They Know I Saw It: Evaluation Apprehension and Diffusion of Responsibility in Bystander Reactions to a Violent Crime.

    Science.gov (United States)

    Gottlieb, Avi; Schwartz, Shalom H.

    Male and female bystanders witnessed a violent theft in the course of a bogus "ESP Experiment." In addition to the subjects' sex, two experimental manipulations were orthogonally crossed. The subject was either the only one to witness the emergency, or witnessed it with an additional participant (diffusion of responsibility), and the subject's…

  18. The good shepherd: remedying the fencing syndrome | Salomon ...

    African Journals Online (AJOL)

    The reintroduction of herding could reap multiple benefits such as improving rural livelihoods, reviving customary practice, reducing stock theft, reducing predation and improving biodiversity management. The paper concludes with some issues for consideration when implementing herding as a multipurpose strategy for ...

  19. 7 CFR 760.611 - Qualifying losses, eligible causes and types of loss.

    Science.gov (United States)

    2010-01-01

    ... loss was due to poor management decisions or poor farming practices, as determined by the FSA county...) Losses caused by a failure of power supply or brownout as defined in § 760.602; (2) Losses caused by the...; (4) Losses caused by the application of chemicals; (5) Losses caused by theft or fire not caused by a...

  20. Financial Fraud and Child Abuse

    Science.gov (United States)

    Little, Allison Dare

    2014-01-01

    A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.

  1. Nigeria's Nascent Democracy and 'WAR' Against Corruption: A Rear ...

    African Journals Online (AJOL)

    User

    2011-04-19

    Apr 19, 2011 ... consideration, Nigeria is placed 121 along with Nepal, Sao Tome and. Principe, Togo and Vietnam. Denmark, New ... Forms of corruption also include nepotism, common theft, overpricing, ... violate rules against the exercise of certain types of private regarding influences”. This definition, expectedly, has in ...

  2. Interpersonal Conflicts and Styles of Managing Conflicts among ...

    African Journals Online (AJOL)

    The study showed that the major sources of conflicts were ethnic differences, religious diversity, sexual abuse, theft and insulting. It was also noted that compromising, avoiding and collaborating were frequently used conflict management styles between students. It is recommended that university leaders and students be ...

  3. Impeding Students' Efforts to Cheat in Online Classes

    Science.gov (United States)

    Hearn Moore, Paula; Head, J. Derrick; Griffin, Richard B.

    2017-01-01

    This paper identifies several methods a student could use to cheat while enrolled in an online course. Problems encountered in conducting an online course and in administering an online exam involve: (1) identifying the test taker, (2) preventing the theft of the exam, (3) combating the unauthorized use of textbooks and/or notes, (4) preparing an…

  4. JPRS Report, Near East and South Asia.

    Science.gov (United States)

    1988-02-16

    cumin seeds, pumpkin seeds, coriander seeds, roasted pear seeds, turpentine trees, henna, dyes and indigo , gypsum, ready-made indoor and outdoor...money were arrested in Ahwaz. The members of this group also kept various types of weapons and they were further active in car theft, kid

  5. Radio Frequency Identification

    Indian Academy of Sciences (India)

    Application of RFIDs in Library. Many libraries are now using RFID systems to allow users to self- issue and return books, keep track of books in the library, prevent thefts, and generate a message to a user a day before books be- come due. This is done by tagging each book in the library with a near-field low-cost RFID tag.

  6. Économie | Page 17 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Every gun that is made, every warship launched, every rocket fired, represents, in the final analysis, a theft from those that hunger and are not fed, are cold and are not clothed." — Dwight D. Eisenhower ... Library and information sciences are experiencing a period of radical change. Today, just as businesses must compete ...

  7. Publications | Page 340 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Results 3391 - 3400 of 6381 ... Every gun that is made, every warship launched, every rocket fired, represents, in the final analysis, a theft from those that hunger and are not fed, are cold and are not clothed." — Dwight D. ... Library and information sciences are experiencing a period of radical change. Today, just as ...

  8. From Defence to Development: Redirecting Military Resources in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Every gun that is made, every warship launched, every rocket fired, represents, in the final analysis, a theft from those that hunger and are not fed, are cold and are not clothed." — Dwight D. Eisenhower. Remember the global peace dividend — the budget surpluses that were supposed to result from the raising of the Iron ...

  9. Development | Page 18 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Every gun that is made, every warship launched, every rocket fired, represents, in the final analysis, a theft from those that hunger and are not fed, are cold and are not clothed." — Dwight D. Eisenhower. Read more about From Defence to Development: Redirecting Military Resources in South Africa. Language English.

  10. 77 FR 46643 - Children's Online Privacy Protection Rule

    Science.gov (United States)

    2012-08-06

    ... 17), at 5; Facebook (comment 50), at 11; Future of Privacy Forum (comment 55), at 3; TechFreedom... authenticating users, improving site navigation, maintaining user preferences, serving contextual advertisements..., serving contextual advertisements, and protecting against fraud or theft.\\41\\ Others raised concerns that...

  11. 77 FR 69539 - Notice of Receipt of Petition for Decision That Nonconforming 2007 Chevrolet Corvette Passenger...

    Science.gov (United States)

    2012-11-19

    ... by either manufacturers or importers who have registered with NHTSA pursuant to 49 CFR part 592. As... Windshield Wiping and Washing Systems, 106 Brake Hoses, 108 Lamps, Reflective Devices and Associated Equipment, 109 New Pneumatic Tires, 113 Hood Latch System, 114 Theft Protection, 116 Motor Vehicle Brake...

  12. 78 FR 13755 - Notice of Receipt of Petition for Decision That Nonconforming 2003 Jeep Wrangler Multi-Purpose...

    Science.gov (United States)

    2013-02-28

    ... importers who have registered with NHTSA pursuant to 49 CFR part 592. As specified in 49 CFR 593.7, NHTSA... Wiping and Washing Systems, 106 Brake Hoses, 113 Hood Latch System, 114 Theft Protection, 116 Motor Vehicle Brake Fluids, 118 Power-Operated Window, Partition, and Roof Panel Systems, 109 New Pneumatic...

  13. 77 FR 40614 - Agency Information Collection Activities; Proposed Collection; Comment Request; Extension

    Science.gov (United States)

    2012-07-10

    ... measures to prevent identity theft and to increase the accuracy of consumer reports. Specifically, section... 315 requires regulations that provide guidance on what users of consumer reports must do when they... the ordinary course of business: (1) Obtain or use consumer reports, directly or indirectly, in...

  14. Ars Dictaminis Perverted: The Personal Solicitation E-Mail as a Genre

    Science.gov (United States)

    Ross, Derek G.

    2009-01-01

    Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…

  15. March 2004.p65

    African Journals Online (AJOL)

    support

    Keywords: nursing auxiliaries; care workers; ethics; homes for older persons. SUMMARY .... overmedication, theft, psychological abuse and institutionalisation abuse ... carer, seemingly from the lack of in-service education. Active neglect was ..... AROSKAR, MA 1983: Ethical dilemmas and nursing practice; 2nd edition.

  16. 27 CFR 555.208 - Construction of type 2 magazines.

    Science.gov (United States)

    2010-04-01

    ..., FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE EXPLOSIVES COMMERCE IN EXPLOSIVES Storage § 555.208..., weather-resistant, theft-resistant, and ventilated. They are to be supported to prevent direct contact... attached to doors by welding, riveting, or bolting (nuts on inside of door). Hinges and hasps must be...

  17. The Use of Technology to Combat Plagiarism in Business Communication Classes

    Science.gov (United States)

    Stowers, Robert H.; Hummel, Julie Y.

    2011-01-01

    Some have called plagiarism literary theft. Plagiarizing is akin to stealing the intellect of another person. At times, plagiarism occurs because of ignorance, sloppy authorship, or lack of knowledge about proper sourcing. Sometimes, it is done purposefully. Experts have suggested that the concept of intellectual ownership is limited to Western…

  18. Politics of Resistance and Emancipation

    African Journals Online (AJOL)

    DR Nneka

    2015-04-14

    Apr 14, 2015 ... war, Oil theft, and Boko Haram, amongst others, rebellion against the “hunters” remains the only option. The hunter can be ..... action against “the dragons of power” (165) and not against Boko Haram insurgents that will not allow the explorations for oil in the Chad Basin. Those in power know what to do, in ...

  19. Detection of hardware backdoor through microcontroller read time ...

    African Journals Online (AJOL)

    I was motivated by the challenges faced by the Nigerian military who have labour onerously to put a stop to the menace of the terrorist group “Boko Haram” but while having achieved some measure of success, are ambushed and killed by terrorists as a result of possible information leakage or intellectual property theft.

  20. Eyewitness Testimony for a Simulated Juvenile Crime by Male and Female Criminals with Consistent or Inconsistent Gender-Role Characteristics

    Science.gov (United States)

    Shapiro, Lauren R.

    2009-01-01

    Eyewitness recall by 60 adolescents and 60 young adults in Experiment 1 and by 64 children and 63 preadolescents in Experiment 2 for a simulated theft in which gender-role characteristics and sex of criminal were manipulated (i.e., masculine male, feminine male, feminine female, masculine female) was investigated. Gender-role flexibility impacted…

  1. 77 FR 72788 - Reduction of Use of Social Security Numbers in the Department of Defense

    Science.gov (United States)

    2012-12-06

    ... for identity theft. The Department of Defense takes the security and protection of its personnel's... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 157 Reduction of Use of Social Security Numbers in the Department of...

  2. 75 FR 28035 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2010-05-19

    ... information cannot be matched because the employee is asserting that there is a mistake in the document, the..., managers, and administrators; and Individuals who may have been victims of identity theft and have chosen...). System Manager and address: Chief, Verification Division, U.S. Citizenship and Immigration Services...

  3. 76 FR 20298 - Insurer Reporting Requirements; List of Insurers; Required To File Reports

    Science.gov (United States)

    2011-04-12

    ... CFR Part 544 Crime insurance, Insurance, Insurance companies, Motor vehicles, Reporting and... appendices list those passenger motor vehicle insurers that are required to file reports on their motor vehicle theft loss experiences. An insurer included in any of these appendices would be required to file...

  4. Computer Ethics Topics and Teaching Strategies.

    Science.gov (United States)

    DeLay, Jeanine A.

    An overview of six major issues in computer ethics is provided in this paper: (1) unauthorized and illegal database entry, surveillance and monitoring, and privacy issues; (2) piracy and intellectual property theft; (3) equity and equal access; (4) philosophical implications of artificial intelligence and computer rights; (5) social consequences…

  5. PUCA: A Pseudonym Scheme with User-Controlled Anonymity for Vehicular Ad-Hoc Networks (VANET)

    NARCIS (Netherlands)

    Förster, David; Kargl, Frank; Löhr, Hans

    2014-01-01

    Envisioned vehicular ad-hoc networks (VANET) standards use pseudonym certificates to provide secure and privacy-friendly message authentication. Revocation of long-term credentials is required to remove participants from the system, e.g. in case of vehicle theft. However, the current approach to

  6. 77 FR 62602 - Privacy Act of 1974, as Amended; System of Records Notice

    Science.gov (United States)

    2012-10-15

    ... Fiscal Service Privacy Act of 1974, as Amended; System of Records Notice AGENCY: Financial Management Service, Fiscal Service, Treasury. ACTION: Notice of systems of records. SUMMARY: In accordance with the... to economic or property interests, identity theft or fraud, or harm to the security or integrity of...

  7. 42 CFR 417.120 - Fiscally sound operation and assumption of financial risk.

    Science.gov (United States)

    2010-10-01

    ... liability claims, fire, theft, fraud, embezzlement, and other casualty risks. (2) Financial plan requirement. (i) If an HMO has not earned a cumulative net operating surplus during the three most recent fiscal years, did not earn a net operating surplus during the most recent fiscal year or does not have positive...

  8. 78 FR 4197 - Sentencing Guidelines for United States Courts

    Science.gov (United States)

    2013-01-18

    ...) A proposed amendment to Sec. 2B1.1 (Theft, Property Destruction, and Fraud) regarding offenses... 818 of the National Defense Authorization Act for Fiscal Year 2012, Public Law 112-81 (December 31... or facility of) interstate or foreign commerce to-- (1) Embezzle, steal, or by fraud or deception...

  9. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  10. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  11. An Investigation on the Rate of Crime in Sokoto State Using ...

    African Journals Online (AJOL)

    ii. Offences against property includes: armed robbery, house and store breakings, forgery, theft/stealing, etc. iii. Offences against lawful authority include: forgery of current notes, gambling, breach of peace, bribery and corruption, etc. iv. Offences against local act include: traffic offences, liquor offences, etc. Causes of Crimes.

  12. Deploying Java Platform to Design a Framework of Protective Shield ...

    African Journals Online (AJOL)

    In addition to the obvious security implications, businesses and the wider software engineering community also risk widespread IP theft - proprietary algorithms, for example, that might be implemented in Java could be easily reverse-engineered and copied. This paper addresses the problem of reverse engineering attacks ...

  13. Radiological analysis of

    African Journals Online (AJOL)

    Dr Olaleye

    may find their way into the environment through routine releases, accidents, thefts, loss and incorrect disposal or ... radionuclides are found in the aquatic environment. The naturally-occurring radionuclides are primordial .... Ondo State, are exposed to radiation through the consumption of aquatic organisms from fresh and.

  14. Refugee Operations: Cultures in Conflict.

    Science.gov (United States)

    1982-12-01

    Lack of control over interpreters’ duties (I,F) Sexual obsession with female workers (F,M) Entire operation was a "human disaster (M) Undesirable...LITERATURE REVIEW -------------------------------- 17 A. EDWARD SAPIR --------------------------------- 17 B. SIGMUND FREUD ... Sexual Misconduct-------------------------49 2. Arson ------------------------------------ 50 3. Theft-------------------------------------50 4. Self

  15. The biology of burls

    Science.gov (United States)

    Kevin T. Smith

    2012-01-01

    Several tree wardens have recently reported thefts of burls from pubhc trees, especially in park areas. A burl is a tree growth in which the grain has grown in a deformed manner. It commonly occurs on a tree trunk or branch as a rounded outgrowth filled with small knots.

  16. Security and privacy in massively-multiplayer online games and social and corporate virtual worlds

    NARCIS (Netherlands)

    Hogben, G.; Barosso, D.; Bartle, R.; Chazeran, C.; de Zwart, M.; Doumen, J.M.; Gorniak, S.; Kaźmierczak, M.; Kaskenmaa, M.; Benavente López, D.; Martin, A.; Naumann, I.; Reynolds, R.; Richardson, J; Rossow, C.; Rywczyoska, A.; Thumann, M.

    2007 was the year of online gaming fraud - with malicious programs that specifically target online games and virtual worlds increasing by 145% and the emergence of over 30,000 new programs aimed at stealing online game passwords. Such malware is invariably aimed at the theft of virtual property

  17. From Users to Designers: Building a Self-Organizing Game-Based Learning Environment

    Science.gov (United States)

    Squire, Kurt; Giovanetto, Levi; Devane, Ben; Durga, Shree

    2005-01-01

    The simultaneous publication of Steven Johnson's Everything Bad is Good for You and appearance of media reports of X-rated content in the popular game Grand Theft Auto has renewed controversies surrounding the social effects of computer and video games. On the one hand, videogames scholars argue that videogames are complex, cognitively challenging…

  18. Promoting Inclusive Education, Civic Scientific Literacy, and Global Citizenship with Videogames

    Science.gov (United States)

    Marino, Matthew T.; Hayes, Michael T.

    2012-01-01

    In this response to Yupanqui Munoz and Charbel El-Hani's paper, "The student with a thousand faces: From the ethics in videogames to becoming a citizen", we examine their critique of videogames in science education. Munoz and El-Hani present a critical analysis of videogames such as "Grand Theft Auto", "Street Fight", "Command and Conquer:…

  19. IJIMAI Editor's Note - Vol. 3 Issue 7

    OpenAIRE

    Oscar Sanjuan-Martinez

    2016-01-01

    The research works presented in this issue are based on various topics of interest, among which are included: SVM and ANN Based Classification, Security in Android, Semantic Data, Planning and Software Agents, Mission Planning, Clustering in Text Mining, Mobile Networks, Weather Radars, Human Activity Recognition, LIF Neurons and DDF, Theft Prevention, Constraint Programming, Measuring Meditations Effects, Neural Networks and Deep Learning.

  20. Leveraging Health IT to Reduce Disparities in Three Underserved Beacon Communities.

    Science.gov (United States)

    Des Jardins, Terrisca; Drone, Shenetta A; Hashisaka, Susan; Hazzard, Jobyna; Hunt, Susan B; Massey, Kimberly; Rein, Alison; Schachter, Abigail; Turske, Scott

    2016-01-01

    Using health information technology (IT) can potentially address health disparities by increasing access to care, delivering higher-quality care, improving patient-provider communication, and enhancing patient safety. It describes challenges encountered by three underserved Beacon Communities that implemented health IT interventions, including inadequate connectivity infrastructure, technical support, expertise, and financial resources; provider shortages and staff turnover; and equipment theft.