Sample records for identity theft prevention

  1. Identity theft prevention in the healthcare setting.

    PubMed

    Warren, Bryan

    2005-01-01

    How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated.

  2. 17 CFR 162.30 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., prevention, and mitigation of identity theft. 162.30 Section 162.30 Commodity and Securities Exchanges... REPORTING ACT Identity Theft Red Flags § 162.30 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope of this subpart. This section applies to financial institutions or...

  3. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    ERIC Educational Resources Information Center

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  4. 17 CFR 248.201 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ..., prevention, and mitigation of identity theft. 248.201 Section 248.201 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S-ID Regulation S-ID: Identity Theft Red Flags § 248.201 Duties regarding the detection, prevention, and mitigation of identity theft...

  5. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...

  6. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...

  7. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...

  8. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...

  9. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...

  10. 12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...

  11. 12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...

  12. 12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...

  13. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  14. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  15. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  16. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  17. Identity theft and your practice.

    PubMed

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  18. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  19. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...

  20. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  1. 12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  2. 12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  3. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  4. 12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  5. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  6. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  7. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  8. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...

  9. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...

  10. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...

  11. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. Link to an amendment published at 77 FR 72715, Dec. 6, 2012. (a...

  12. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...

  13. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...

  14. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...

  15. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...

  16. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    PubMed

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  17. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    PubMed

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  18. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    DTIC Science & Technology

    2017-03-01

    representative said that they felt they needed to provide their customers with some benefit and offered the services to give their customers peace of...satisfaction or reassurance. Some companies told us that they offered free identity theft services to give their customers peace of mind or provide...IDENTITY THEFT SERVICES Services Offer Some Benefits but Are Limited in Preventing Fraud Report to Congressional

  19. Identity Theft in Community Mental Health Patients

    PubMed Central

    Klopp, Jonathon; Konrad, Shane; Yanofski, Jason

    2007-01-01

    Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented. PMID:20806029

  20. Is your practice at risk for medical identity theft?

    PubMed

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  1. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    NASA Astrophysics Data System (ADS)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  2. Impact of identity theft on methods of identification.

    PubMed

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  3. Exploring medical identity theft.

    PubMed

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  4. Exploring Medical Identity Theft

    PubMed Central

    Mancilla, Desla; Moczygemba, Jackie

    2009-01-01

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017

  5. Medical identity theft: an emerging problem for informatics.

    PubMed

    Gillette, William; Patrick, Timothy B

    2007-10-11

    This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.

  6. 17 CFR Appendix B to Part 162 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation B Appendix B to Part 162 Commodity and Securities... Detection, Prevention, and Mitigation Section 162.30 requires each financial institution or creditor that...

  7. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...

  8. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...

  9. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...

  10. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...

  11. Identity Theft: Trends and Issues

    DTIC Science & Technology

    2010-01-05

    mitigate the effects of identity theft, one option Congress may consider is whether to strengthen data breach notification requirements. Such requirements...identity theft complaints to the FTC as well as in the number of reported data breaches placing personally identifiable information at risk. This report...23 Effects of Data Breaches ..................................................................................................... 24

  12. The Relationship between Cell Phone Use and Identity Theft

    ERIC Educational Resources Information Center

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  13. Investigating the Identity Theft Prevention Strategies in M-Commerce

    ERIC Educational Resources Information Center

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  14. 17 CFR Appendix A to Subpart C of... - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation A Appendix A to Subpart C of Part 248 Commodity and...

  15. Exploring the psychological and somatic impact of identity theft.

    PubMed

    Sharp, Tracy; Shreve-Neiger, Andrea; Fremouw, William; Kane, John; Hutton, Shawn

    2004-01-01

    Identity theft is a new and growing form of white-collar crime. This exploratory study examined the psychological and somatic impact of identity theft and coping methods utilized by victims. Thirty-seven victims of identity theft participated in regional victim focus groups. Participants completed a victim impact questionnaire designed by the authors and the Brief Symptom Inventory-18 (BSI-18). The majority of participants expressed an increase in maladaptive psychological and somatic symptoms post victimization. Results on the BSI indicated that identity theft victims with unresolved cases, in contrast to those with resolved cases, were more likely to have clinically elevated scores when compared with a normative sample. Relatively similar coping mechanisms were utilized across victims. The results from this study suggest that victims of identity theft do have increased psychological and physical distress, and for those whose cases remain unresolved, distress is maintained over time.

  16. On the Statistical Dependency of Identity Theft on Demographics

    NASA Astrophysics Data System (ADS)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  17. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  18. Do Data Breach Disclosure Laws Reduce Identity Theft?

    ERIC Educational Resources Information Center

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  19. What Price Privacy? (and why identity theft is about neither identity nor theft)

    DTIC Science & Technology

    2004-01-01

    justify. It might be pos- sible to collect data on occurrence of identity theft correlated with consumer behavior so that probabilities of at least...needs to learn from experience, so consumer behavior is likely to lag behind any current reality. So one answer is that the expected cost 6 of privacy

  20. College Students, Internet Use, and Protection from Online Identity Theft

    ERIC Educational Resources Information Center

    Norum, Pamela S.; Weagley, Robert O.

    2007-01-01

    The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…

  1. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    DTIC Science & Technology

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  2. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    PubMed Central

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  3. Medical identity theft in the emergency department: awareness is crucial.

    PubMed

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  4. Identity Theft - The National Guard

    Science.gov Websites

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front name. Social Security Numbers - If after doing everything in your power to clear up the effects of identity theft you discover someone is still fraudulently using your Social Security Number, you can

  5. Identity Theft in the Academic World Leads to Junk Science.

    PubMed

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  6. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... of motor vehicles. E-mail is now included as a means to submit the target area designations. Under the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  7. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  8. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  9. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  10. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  11. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  12. 12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...

  13. 12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...

  14. 12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...

  15. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... foreseeable risks to customers or to the safety and soundness of the financial institution or creditor from...) Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding... the Customer Identification Program rules implementing 31 U.S.C. 5318(l) (31 CFR 103.121); and (b...

  16. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... control reasonably foreseeable risks to customers or to the safety and soundness of the financial...; and (5) Notice from customers, victims of identity theft, law enforcement authorities, or other... verification set forth in the Customer Identification Program rules implementing 31 U.S.C. 5318(l)(31 CFR 103...

  17. Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making

    ERIC Educational Resources Information Center

    Jefson, Cristy A.

    2007-01-01

    Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…

  18. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    PubMed

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  19. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has...

  20. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This petition is... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...

  1. The Thief With a Thousand Faces and the Victim With None: Identifying Determinants for Online Identity Theft Victimization With Routine Activity Theory.

    PubMed

    Reyns, Bradford W; Henson, Billy

    2016-08-01

    Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims' online routine activities and their online identity theft victimization. It was found that certain routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed. © The Author(s) 2015.

  2. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  3. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    ... and unlock all doors or to unlock only the driver's door, preventing forced entry into the vehicle... From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This...

  4. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    ERIC Educational Resources Information Center

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  5. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  6. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of... assemblies in motor vehicles related to performance. Volkswagen stated that it believes the immobilizer... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention...

  7. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... immobilizer device occurs automatically when the vehicle is started without any further action by the driver... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention...

  8. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  9. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety... accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  10. Growing trend of identity theft poses safety and billing loss threats.

    PubMed

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  11. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  12. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-15

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention...

  13. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... document grants in full the Mazda Motor Corporation (Mazda) petition for an exemption of the CX-5 vehicle... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...

  14. The Cultural Phenomenon of Identity Theft and the Domestication of the World Wide Web

    ERIC Educational Resources Information Center

    Caeton, Daniel A.

    2007-01-01

    Through a critique of the rhetorical configurations of identity theft, this article contributes to the emerging body of theory contending with the social effects of digital information technologies (DIT). It demonstrates how the politics of fear manipulate technosocial matrices in order to derive consent for radical changes such as the…

  15. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ...This document grants in full the Hyundai-Kia Motors Corporation (HATCI) petition for exemption of the Hyundai VI vehicle line in accordance with 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that the antitheft device to be placed on the line as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard.

  16. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  17. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    ERIC Educational Resources Information Center

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  18. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    ERIC Educational Resources Information Center

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  19. 2013 Vehicle Theft Prevention Quick Reference Guide for the Law Enforcement Community

    DOT National Transportation Integrated Search

    2013-08-01

    "This and future versions of the Vehicle TheftPrevention Quick Reference Guide for the Law Enforcement Community will provide comprehensive information for vehicle lines. The parts-marking requirements have been : extended to include: : all passe...

  20. Basic bookkeeping and avoiding theft.

    PubMed

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  1. A study for prevent theft of the bike design and analysis

    NASA Astrophysics Data System (ADS)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  2. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-11

    ...This document grants in full the petition of Hyundai-Kia Motors Corporation (HATCI) in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention Standard, for the Kia Amanti vehicle line beginning with model year (MY) 2009. This petition is granted because the agency has determined that the antitheft device to be placed on the line as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard. HATCI requested confidential treatment for its information and attachments submitted in support of its petition. In a letter dated January 30, 2008, the agency denied HATCI's request for confidential treatment. Subsequently, HATCI requested reconsideration of the determination. In a letter dated September 25, 2008, the agency granted the petitioner's request for reconsideration of confidential treatment of the indicated areas of its petition.

  3. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B Appendix B to Part 541—Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject...

  4. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... requirements of the Theft Prevention Standard(49 CFR part 541) for the Audi A4 allroad vehicle line beginning... new Audi A4 allroad vehicle line. VW will install its passive, transponder-based electronic engine...

  5. 75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ..., Inc. (Nissan). In its comments, VW informed the agency that the entries for the Audi RS4, Audi A8, Audi A4/A4 Quattro/S4/S4 Avant and Audi RS4 were listed with incorrect manufacturer designations. The final theft data has been revised to reflect that Audi is the manufacturer for [[Page 11007

  6. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY: National Highway Traffic Safety Administration, Department of Transportation (DOT). ACTION: Grant of...

  7. 75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-09

    ..., Inc. (Nissan). In its comments, VW informed the agency that the entries for the Audi RS4, Audi A8, Audi A4/A4 Quattro/S4/S4 Avant and Audi RS4 were listed with incorrect manufacturer designations. The final theft data has been revised to reflect that Audi is the manufacturer for the Audi RS4, Audi A8...

  8. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-21

    ...This final rule announces NHTSA's determination that there are no new model year (MY) 2011 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.

  9. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ...This final rule announces NHTSA's determination that there are no new model year (MY) 2012 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.

  10. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-23

    ...This final rule announces NHTSA's determination that there are no new model year (MY) 2014 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.

  11. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  12. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  13. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  14. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  15. Design of power cable grounding wire anti-theft monitoring system

    NASA Astrophysics Data System (ADS)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  16. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... of petition for exemption. SUMMARY: This document grants in full the Porsche Cars North America, Inc... the occupant compartment of the car. The ignition key contains a radio signal transponder, which...

  17. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  18. Seduction and Betrayal: An Insider's View of Insider Theft of Rare Materials.

    ERIC Educational Resources Information Center

    Traister, Daniel

    1994-01-01

    Discusses alternatives for dealing with insider theft of rare library materials, including publicizing losses and prosecuting. An example of insider theft is detailed. Ideas for preventing theft, including hiring practices and restricting access to materials, are considered. Suggestions for thinking through procedures to deal with the…

  19. 77 FR 51612 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-24

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of America, Inc. AGENCY: National... petition for exemption. SUMMARY: This document grants in full the Mitsubishi Motors R&D of America, Inc.'s...

  20. Tricks of the trade: Mechanism of brood theft in an ant

    PubMed Central

    Paul, Bishwarup

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies’ vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the ‘tricks’ adopted by thieves. PMID:29489858

  1. Tricks of the trade: Mechanism of brood theft in an ant.

    PubMed

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  2. Combating employee theft in the healthcare industry.

    PubMed

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  3. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 12 2011-01-01 2011-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... different from the present address; the capacity of person certifying, if other than owner; the identity of...

  4. Deterring and remedying employee theft.

    PubMed

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  5. Essays on electricity theft

    NASA Astrophysics Data System (ADS)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  6. Media coverage of controlled substance diversion through theft or loss.

    PubMed

    Brushwood, David B; Kimberlin, Carole A

    2004-01-01

    To determine the frequency of media reports of controlled substance diversion. Quantitative search of news articles from LexisNexis Academic, using search strings related to four different types of controlled substance diversion. Not applicable. Not applicable. Number of media reports about diversion of controlled substances at the prescriber or dispenser levels, through pharmacy robberies or thefts, and through hijackings or robberies of shipments. Media reports of controlled substance diversion indicate that theft and loss are important problems and that inappropriate prescribing and dispensing are substantial problems as well. Leaks of controlled substances from the closed system of distribution seem to be increasing as rapidly through theft and loss as through inappropriate prescribing and dispensing. During the five biennia between 1993 and 2002, these percentage increases in media reports were observed for the different types of diversion: 200% for prescribers; 350% for dispensers; 133% for pharmacy robberies and thefts; and 1,800% for thefts from shipping channels. A balanced approach to the prevention of controlled substance diversion, aimed at reducing illicit acquisition of drugs from theft and loss as well as from prescribing and dispensing, may produce the greatest success without adversely affecting the quality of patient care.

  7. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-04

    ... agency comparing its proposed device to antitheft devices already installed in the Aston Martin Vantage... effective in contributing to a 63.5% reduction in the theft rate for the Aston Martin Vantage Line... Martin Vantage vehicle line and 0.6784 for the MY 2007. MBUSA also referenced theft data published by the...

  8. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  9. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    PubMed Central

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  10. 25 CFR 11.412 - Theft.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  11. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  12. Motor Vehicle Theft. Special Report.

    ERIC Educational Resources Information Center

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  13. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  14. Gun Theft and Crime.

    PubMed

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  15. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK

    PubMed Central

    Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use. PMID:27643788

  16. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    PubMed

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  17. 12 CFR 1022.123 - Appropriate proof of identity.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Appropriate proof of identity. 1022.123 Section...) Duties of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity... information consumers shall provide to constitute proof of identity for purposes of sections 605A, 605B, and...

  18. 12 CFR 1022.123 - Appropriate proof of identity.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Appropriate proof of identity. 1022.123 Section...) Duties of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity... information consumers shall provide to constitute proof of identity for purposes of sections 605A, 605B, and...

  19. 12 CFR 1022.123 - Appropriate proof of identity.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Appropriate proof of identity. 1022.123 Section...) Duties of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity... information consumers shall provide to constitute proof of identity for purposes of sections 605A, 605B, and...

  20. A Developmental Study of School Theft.

    ERIC Educational Resources Information Center

    Dodson, Peter K.; Evans, Ellis D.

    1985-01-01

    Students (N=200) in grades 4 through 8 and 10 completed questionnaire measuring perceptions of school theft incidence and seriousness, personal responsibility for correcting theft, causal attributions of theft, and perceived consequences of thievery. Main grade effect was observed for personal responsibility and consequences, but represented…

  1. Identity Theft Prevention Act of 2011

    THOMAS, 112th Congress

    Rep. Paul, Ron [R-TX-14

    2011-01-07

    House - 02/08/2011 Referred to the Subcommittee on Government Organization, Efficiency, and Financial Management . (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Anti Theft Mechanism Through Face recognition Using FPGA

    NASA Astrophysics Data System (ADS)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  3. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... theft prevention standard. Criteria 1. Retail price of the vehicle line. 2. Vehicle image or marketing strategy. 3. Vehicle lines with which the new line is intended to compete, and the theft rates of such...

  4. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    PubMed

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  5. A novel anti-theft security system for photovoltaic modules

    NASA Astrophysics Data System (ADS)

    Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong

    2017-04-01

    Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.

  6. Employee satisfaction and theft: testing climate perceptions as a mediator.

    PubMed

    Kulas, John T; McInnerney, Joanne E; DeMuth, Rachel Frautschy; Jadwinski, Victoria

    2007-07-01

    Employee theft of both property and time is an expensive and pervasive problem for American organizations. One antecedent of theft behaviors is employee dissatisfaction, but not all dissatisfied employees engage in withdrawal or theft behaviors. The authors tested a model of theft behavior by using an organization's climate for theft as an explanatory mechanism. They found that dissatisfaction influenced employee theft behaviors through the intermediary influence of employees' individual perceptions of the organization's climate for theft. The authors encourage organizations to pay attention to such climate elements and take action to alter employee perceptions if they reflect permissive attitudes toward theft.

  7. The Neurocognition of Conduct Disorder Behaviors: Specificity to Physical Aggression and Theft After Controlling for ADHD Symptoms

    PubMed Central

    Barker, Edward D.; Tremblay, Richard E.; van Lier, Pol A.C.; Vitaro, Frank; Nagin, Daniel S.; Assaad, Jean-Marc; Séguin, Jean R.

    2012-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. PMID:21046606

  8. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    PubMed

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  9. 14 CFR 1214.609 - Loss or theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  10. 26 CFR 1.165-8 - Theft losses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  11. 27 CFR 24.265 - Losses by theft.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  12. Development of car theft crime index in peninsular Malaysia

    NASA Astrophysics Data System (ADS)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  13. 75 FR 19673 - Petition for Exemption From the Vehicle Theft Prevention Standard; Saab

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-15

    ... module (BCM), passive entry passive start module (PEPS), intrusion/inclination sensor, an immobilizer... must be performed by communication between the PEPS and the BCM jointly with the UID (key fob... Saab 9-3, has been designed to enhance the functionality and theft protection provided by Saab's first...

  14. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 6 2014-10-01 2014-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...

  15. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 6 2012-10-01 2012-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...

  16. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 6 2011-10-01 2011-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...

  17. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ...The National Highway Traffic Safety Administration (NHTSA) published a document in the Federal Register of June 21, 2010, announcing NHTSA's determination that there were no new model year (MY) 2011 light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention standard. The final rule also identified those vehicle lines that had been granted an exemption from the parts- marking requirements for the 2011 model year and those vehicle lines the agency removed because certain vehicle lines had been discontinued more than 5 years ago. This document corrects certain information published in the SUPPLEMENTARY INFORMATION section and Appendix A-I listing of the final rule. All previous information associated with the published notice remains the same.

  18. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    PubMed Central

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  19. Medicare Identity Theft Prevention Act of 2012

    THOMAS, 112th Congress

    Rep. Johnson, Sam [R-TX-3

    2011-04-13

    Senate - 12/21/2012 Received in the Senate and Read twice and referred to the Committee on Finance. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  20. Tax Crimes and Identity Theft Prevention Act

    THOMAS, 113th Congress

    Rep. Castor, Kathy [D-FL-14

    2013-02-06

    House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Dog Theft: A Case for Tougher Sentencing Legislation.

    PubMed

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  2. 27 CFR 555.165 - Failure to report theft or loss.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  3. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    PubMed

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  4. 19 CFR 158.26 - Loss or theft in public stores.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  5. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... risks to customers or to the safety and soundness of the financial institution or creditor from identity... unusual use of, or other suspicious activity related to, a covered account; and (5) Notice from customers... policies and procedures regarding identification and verification set forth in the Customer Identification...

  6. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... risks to customers or to the safety and soundness of the financial institution or creditor from identity... unusual use of, or other suspicious activity related to, a covered account; and (5) Notice from customers... policies and procedures regarding identification and verification set forth in the Customer Identification...

  7. 19 CFR 112.46 - Report of loss or theft.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  8. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.

  9. Unlocking the condoms: The effect on sales and theft

    PubMed Central

    Ashwood, Daniel; Farris, Karen B.; Campo, Shelly; Aquilino, Mary L.; Losch, Mary

    2010-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Objective Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies Methods Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Results Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. Conclusion After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies. PMID:25132889

  10. Unlocking the condoms: The effect on sales and theft.

    PubMed

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  11. Death during theft from electric utilities.

    PubMed

    Taylor, Allison J; McGwin, Gerald; Brissie, Robert M; Rue, Loring W; Davis, Gregory G

    2003-06-01

    Utilities that supply power are subject to theft of service and theft of hardware used to provide service. Individuals who try to steal from a power utility risk electrocution. We conducted a retrospective study of all individuals examined by the Jefferson County Coroner Medical Examiner Office from January 1981 through December 2001 and found that 8 individuals died trying to steal from a power utility. All decedents were men, with an average age of 33 years. Seven decedents were stealing copper, and 1 was stealing electricity. Only 1 decedent survived long enough to be admitted to a hospital. Five decedents were intoxicated, 3 with ethanol, 1 with cocaine, and 1 with both cocaine and ethanol. Seven decedents sustained electrical burns in keeping with the high voltage to which they were subjected. The unburned decedent died of laceration of the aorta at its origin from the heart, an injury sustained when the decedent fell from the power pole. All 8 decedents attempted their theft during daylight. Items found in the decedent's pockets, the presence of a ladder nearby, or the presence of electrical tools around the body may help to establish the attempted act of theft.

  12. The Use of Electronic Book Theft Detection Systems in Libraries.

    ERIC Educational Resources Information Center

    Witt, Thomas B.

    1996-01-01

    Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…

  13. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  14. 7 CFR 331.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...

  15. 7 CFR 331.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...

  16. 7 CFR 331.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...

  17. 7 CFR 331.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...

  18. 7 CFR 331.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...

  19. Dog Theft: A Case for Tougher Sentencing Legislation

    PubMed Central

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  20. Controlling hospital library theft

    PubMed Central

    Cuddy, Theresa M.; Marchok, Catherine

    2003-01-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal. PMID:12883573

  1. Controlling hospital library theft.

    PubMed

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  2. Developmental Trajectories of Male Physical Violence and Theft

    PubMed Central

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  3. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  4. RxPATROL: a Web-based tool for combating pharmacy theft.

    PubMed

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  5. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  6. 27 CFR 478.33a - Theft of firearms.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  7. 27 CFR 478.39a - Reporting theft or loss of firearms.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... Administrative and Miscellaneous Provisions § 478.39a Reporting theft or loss of firearms. Each licensee shall report the theft or loss of a firearm from the licensee's inventory (including any firearm which has been...

  8. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-13

    ... the Security Controller as long as the PET is in close proximity to the car and the driver either... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an exemption of the Model S vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft...

  9. Modeling the number of car theft using Poisson regression

    NASA Astrophysics Data System (ADS)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  10. Electrical injuries due to theft of copper.

    PubMed

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  11. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    PubMed

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  12. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    ERIC Educational Resources Information Center

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  13. E-dating, identity and HIV prevention: theorising sexualities, risk and network society.

    PubMed

    Davis, Mark; Hart, Graham; Bolding, Graham; Sherr, Lorraine; Elford, Jonathan

    2006-05-01

    This paper addresses how London gay men use the internet to meet sexual partners, or for e-dating. Based on qualitative interviews conducted face-to-face or via the internet, this research develops an account of how information technologies mediate the negotiation of identity and risk in connection with sexual practice. E-dating itself is a bricolage, or heterogeneous DIY practice of internet-based-communication (IBC). A central aspect of IBC is "filtering" in and out prospective e-dates based on the images and texts used to depict sexual identities. Interpretations and depictions of personal HIV risk management approaches in IBC are framed by the meanings of different identities, such as the stigma associated with being HIV positive. This paper argues for a sexualities perspective in a theory of network society. Further, HIV prevention in e-dating can potentially be addressed by considering the interplay of the HIV prevention imperatives associated with different HIV serostatus identities. There is a case for encouraging more explicit IBC about risk in e-dating and incorporating the expertise of e-daters in prevention activity. There is also a need to rethink traditional conceptions of risk management in HIV prevention to make space for the risk management bricolage of network society.

  14. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution

    PubMed Central

    Alavi, Hamid Reza

    2011-01-01

    Background Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals’ tendency to addiction, theft and prostitution in Kerman city, Iran. Methods The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents’ self-esteem was Eysenck Self-esteem Inventory. Findings Self-esteem had a meaningful role in the individual’s tendency to addiction, theft and prostitution. Conclusion On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual’s self-esteem in order to decrease their tendency to addiction, theft and prostitution. PMID:24494126

  15. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., and (ii) The damage, loss, or theft is not due to an act of God. (2) Equipment replaced. If the... § 3015.169(c) or (ii) The damage, loss, or theft is due to an act of God. (2) Recipient not compensated...

  16. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  17. Sim-based detection tools to minimize motorcycle theft

    NASA Astrophysics Data System (ADS)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  18. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    PubMed Central

    Setti, Ilaria; van der Velden, Peter G.; Sommovigo, Valentina; Ferretti, Maria S.; Giorgi, Gabriele; O'Shea, Deirdre; Argentero, Piergiorgio

    2018-01-01

    Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV), psycho-somatic well-being (General Health Questionnaire, GHQ-12), job satisfaction (a single item). Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6) and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7), based on the last event (N = 319). Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being. PMID:29515488

  19. 19 CFR 122.185 - Report of loss or theft of Customs access seal.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...

  20. 19 CFR 122.185 - Report of loss or theft of Customs access seal.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...

  1. The Technical Problems of Anti-theft Diagnostics in a Traction Network

    NASA Astrophysics Data System (ADS)

    Mikulski, Jerzy; Młynczak, Jakub

    2012-02-01

    The paper presents an analysis of traction lines theft in the Katowice division of the Railroad Development Company (Zakład Linii Kolejowych - ZLK) as well as the principles for the anti-theft protection system, currently in development. The problem of theft is a very important issue concerning the safety of rail transportation. It is also a significant economic problem, as the cost of recreating a stolen network is very high. Moreover, the Administrator of the infrastructure bears the cost of compensation for any delays in train schedules.

  2. Identity theft and consumers' reaction to preventive technological innovations.

    PubMed

    Ainscough, Thomas L; Brody, Richard G; Trocchia, Philip J

    2007-08-01

    The use of identification technology by commercial entities has broad and, for some consumers, disturbing social implications. This two-phase study was done to specify consumers' concerns regarding various identification technologies which may be encountered in retail environments. From the qualitative findings, a 26-item survey was constructed to quantify identified areas of concern with 303 survey participants (147 women and 156 men), whose mean age category was 30 to 39 years. Using exploratory factor analysis (principal components with varimax rotation), five dimensions of consumers' concern emerged: privacy, ethics, health, humanity, and complexity.

  3. Social Security Number Fraud and Identity Theft Prevention Act

    THOMAS, 111th Congress

    Rep. Coffman, Mike [R-CO-6

    2009-05-19

    House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Taxpayer Identity Theft Prevention and Enforcement Act of 2014

    THOMAS, 113th Congress

    Rep. Marchant, Kenny [R-TX-24

    2014-07-29

    House - 09/26/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...

  6. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...

  7. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...

  8. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation A Appendix A to Part 681 Commercial Practices FEDERAL TRADE COMMISSION...

  9. 42 CFR 73.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...

  10. 42 CFR 73.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...

  11. 9 CFR 121.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...

  12. 9 CFR 121.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...

  13. 9 CFR 121.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...

  14. 42 CFR 73.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...

  15. 42 CFR 73.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...

  16. 9 CFR 121.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...

  17. 42 CFR 73.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...

  18. 9 CFR 121.19 - Notification of theft, loss, or release.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...

  19. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...

  20. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...

  1. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...

  2. 12 CFR Appendix to Subpart C of... - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the financial institution or creditor should take steps to ensure that the activity of the service... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation Appendix to Subpart C of Part 391 Banks and Banking FEDERAL DEPOSIT...

  3. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...

  4. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...

  5. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...

  6. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...

  7. 12 CFR Appendix to Subpart C of... - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the financial institution or creditor should take steps to ensure that the activity of the service... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation Appendix to Subpart C of Part 391 Banks and Banking FEDERAL DEPOSIT...

  8. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...

  9. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 222 Banks and Banking FEDERAL RESERVE SYSTEM...

  10. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Detection, Prevention, and Mitigation J Appendix J to Part 41 Banks and Banking COMPTROLLER OF THE CURRENCY...

  11. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... should take steps to ensure that the activity of the service provider is conducted in accordance with... financial institution or creditor detects a fraud or active duty alert; (c) Implementing any requirements... Detection, Prevention, and Mitigation J Appendix J to Part 334 Banks and Banking FEDERAL DEPOSIT INSURANCE...

  12. A Report on the Moffitt Undergraduate Library Book Theft Study.

    ERIC Educational Resources Information Center

    Kaske, Neal K.; Thompson, Donald D.

    A study was conducted at the Moffitt Undergraduate Library of the University of California at Berkeley to determine the extent and the cost of book losses due to theft and to determine the cost-effectiveness of book security systems. A sample inventory was taken and the theft rate (13.7%) was statistically derived. The rate of loss was translated…

  13. New consumer load prototype for electricity theft monitoring

    NASA Astrophysics Data System (ADS)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  14. Sweet sins: frequency and psychiatric motivation for theft among adolescents with type 1 diabetes.

    PubMed

    Butwicka, Agnieszka; Fendler, Wojciech M; Zalepa, Adam; Szadkowska, Agnieszka; Gmitrowicz, Agnieszka; Młynarski, Wojciech M

    2011-06-01

    Behavioral problems are an issue among adolescents with type 1 diabetes (T1D). The authors hypothesize that theft, possibly because of an underlying psychiatric morbidity, may be a way of procuring sweets leading to worse glycemic control. To evaluate psychiatric morbidity and the association of theft and metabolic control among children and adolescents with T1D, using data from an interim analysis of an ongoing quality-of-life and psychiatric comorbidity study. One hundred and nine consecutively hospitalized individuals aged 8-18 years with T1D were asked about incidents of theft. The data on psychiatric morbidity were taken from an ongoing longitudinal study using semi-structured diagnostic interview (KSADS-PL). Overall, 10 children (9%) reported that they had committed theft. Primary motivation for theft was reported as either direct or indirect gain of sweets. Patients who admitted to theft were more likely to have worse metabolic control expressed by glycated hemoglobin (HbA1c) [10.4% (interquartile range 9.8-11.8) vs. 7.7% (6.9-8.8); p < 0.0001] and higher odds of having psychiatric morbidity (odds ratio 8.2; 95% confidence interval 1.9-34.2) than their peers. In the subgroup analysis of patients with psychiatric morbidity, HbA1c was significantly higher if having committed a theft was reported [10.2% (9.4-11.9) vs. 8.1% (7.2-9.2); p < 0.001]. No significant differences in socioeconomic status, clinical factors, or rates of complications were found. Theft may be a factor negatively affecting metabolic control in children with T1D and underlying psychiatric co-morbidity. Psychiatric morbidity is more frequent among patients with T1D and a history of theft. © 2011 John Wiley & Sons A/S.

  15. Developmental trajectories of male physical violence and theft: relations to neurocognitive performance.

    PubMed

    Barker, Edward D; Séguin, Jean R; White, Helene Raskin; Bates, Marsha E; Lacourse, Eric; Carbonneau, René; Tremblay, Richard E

    2007-05-01

    Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Accelerated cohort-sequential, longitudinal design. Rutgers Health and Human Development Project. Six hundred ninety-eight men. Self-reports of physical violence (ages 12-24 years) and theft (ages 12-31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but were unrelated to theft [corrected]. Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms.

  16. Kleptomania or common theft - diagnostic and judicial difficulties.

    PubMed

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  17. Children's Stealing: A Review of Theft-Control Procedures for Parents and Teachers.

    ERIC Educational Resources Information Center

    Williams, Ruth Lyn Meese

    1985-01-01

    Guidelines are offered to parents and teachers for dealing with "normal" and aberrant theft while maintaining respect for the child's right to privacy. It is noted that theft is resistant to traditional intervention; however, successful behavioral interventions have been devised. (Author/CL)

  18. Theft reduction in a grocery store through product identification and graphing of losses for employees

    PubMed Central

    Carter, Ned; Holmström, Anne; Simpanen, Monica; Melin, Lennart

    1988-01-01

    Shoplifting and employee theft constitute a major problem for retailers. Previous research has described techniques for effectively reducing either type of theft but has not addressed the problem of thefts of unspecified origin. In a grocery store we evaluated the effect of identifying for employees frequently stolen products from three groups of items and graphing, twice weekly in the lunchroom, losses for the separate groups. After the products were identified and losses graphed, thefts from the three groups dropped from eight per day to two per day. PMID:16795718

  19. Whose guns are stolen? The epidemiology of Gun theft victims.

    PubMed

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  20. Using aerial infrared thermography to detect utility theft of service

    NASA Astrophysics Data System (ADS)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  1. CargoTIPS: an innovative approach to combating cargo theft

    NASA Astrophysics Data System (ADS)

    Toth, Gail E.

    1998-12-01

    Cargo theft has been estimated by the Federal Bureau o Investigations to be 6 billion annually, while others believe it to be more than 10 billion annually. Opportunistic thieves, street gangs, traditional organized crime groups, and new organized crime groups have been targeting cargo. They steal from warehouses, terminals, equipment, truck stops, or any place where freight comes to a rest. With zero inventory levels, our trailers have become virtual warehouses on wheels and easy targets for thieves. Without information and communication cargo thieves can thrive. The industry and law enforcement are forced into being reactive instead of developing proactive policies and procedures. Cargo thieves cross town lines, county lines, state lines and country borders. This makes communication within the law enforcement community imperative. CargoTIPS (cargo theft information processing system) was developed in response to the need for cargo theft information. The system allows us to collect cargo theft statistics to analyze the problem, assess the threat and develop a response on a national level. CargoTIPS includes a bulletin board, which allows users to communicate with each other, pass on alerts or seek information. The system is also used as an investigative tool. CargoTIPS can identify the mode of transportation (truck, small parcel, air, rail or ocean). It was designed to take in international data. Currently the system has identified that food products are the number one targeted commodity, followed by electronic products and third, computers and computer parts.

  2. 47 CFR 76.1209 - Theft of service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service... equipment that would violate 47 U.S.C. 553 or any other provision of law intended to preclude the...

  3. 47 CFR 76.1209 - Theft of service.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service... equipment that would violate 47 U.S.C. 553 or any other provision of law intended to preclude the...

  4. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  5. When accepting a gift can be professional misconduct and theft.

    PubMed

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  6. 16 CFR 602.1 - Effective dates.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... identification of possible instances of identity theft; (iii) Section 115, concerning truncation of the social... theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of identity theft complaint investigations; (vii) Section 154...

  7. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  8. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  9. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  10. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  11. Worst theft losses are for Mercedes model; 2 of 3 worst are for acura

    DOT National Transportation Integrated Search

    2000-05-13

    The Highway Loss Data Institute's annual list of vehicles with worst theft losses has Mercedes S class heading the list of passenger vehicles with the highest insurance losses for theft. Overall losses for this car are 10 times higher than the averag...

  12. Opportunistic brood theft in the context of colony relocation in an Indian queenless ant.

    PubMed

    Paul, Bishwarup; Paul, Manabi; Annagiri, Sumana

    2016-10-31

    Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusocial subfamily Ponerinae. Pupae was the preferred stolen item both in laboratory conditions and in natural habitat and a small percentage of the members of a colony acting as thieves stole about 12% of the brood of the victim colony. Stolen brood were not consumed but became slaves. We propose a new dimension to the risks of relocation in the form of brood theft by conspecific neighbours and speculate that examination of this phenomenon in other primitively eusocial species will help understand the origin of brood theft in ants.

  13. 14 CFR § 1214.609 - Loss or theft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Space Shuttle Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space... missing shall immediately report the loss to the Johnson Space Center Security Office and the NASA...

  14. Opportunistic brood theft in the context of colony relocation in an Indian queenless ant

    PubMed Central

    Paul, Bishwarup; Paul, Manabi; Annagiri, Sumana

    2016-01-01

    Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusocial subfamily Ponerinae. Pupae was the preferred stolen item both in laboratory conditions and in natural habitat and a small percentage of the members of a colony acting as thieves stole about 12% of the brood of the victim colony. Stolen brood were not consumed but became slaves. We propose a new dimension to the risks of relocation in the form of brood theft by conspecific neighbours and speculate that examination of this phenomenon in other primitively eusocial species will help understand the origin of brood theft in ants. PMID:27796350

  15. Options for reducing copper theft : final report 657.

    DOT National Transportation Integrated Search

    2009-10-01

    This research investigated the theft of copper, including scope, impacts, and countermeasures. The researchers : completed a literature review to demonstrate a global perspective of the problem. They took a survey of other : state departments of tran...

  16. 12 CFR 222.1 - Purpose, scope, and effective dates.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Section 114, concerning procedures for the identification of possible instances of identity theft; (iii...)(1), concerning the summary of rights of identity theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of...

  17. 14 CFR 1214.609 - Loss or theft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Loss or theft. 1214.609 Section 1214.609 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT Mementos Aboard Space Shuttle... immediately report the loss to the Johnson Space Center Security Office and the NASA Inspector General. ...

  18. 14 CFR 1214.609 - Loss or theft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Loss or theft. 1214.609 Section 1214.609 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT Mementos Aboard Space Shuttle... immediately report the loss to the Johnson Space Center Security Office and the NASA Inspector General. ...

  19. 14 CFR 1214.609 - Loss or theft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Loss or theft. 1214.609 Section 1214.609 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT Mementos Aboard Space Shuttle... immediately report the loss to the Johnson Space Center Security Office and the NASA Inspector General. ...

  20. 76 FR 66086 - Agency Information Collection Activities; Proposed Collection, Comments Requested: Reinstatement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... Approved Collection for Which Approval Has Expired, Identity Theft Supplement (ITS) to the National Crime... approved collection for which approval has expired. (2) Title of the Form/Collection: Identity Theft... United States. The Identity Theft Supplement (ITS) to the National Crime Victimization Survey collects...

  1. 76 FR 50758 - Agency Information Collection Activities: Proposed Collection; Comments Requested-Reinstatement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Approved Collection for Which Approval Has Expired, Identity Theft Supplement (ITS) to the National Crime... Form/Collection: Identity Theft Supplement (ITS) to the National Crime Victimization Survey. (3) Agency... administered to persons 16 years or older in NCVS sampled households in the United States. The Identity Theft...

  2. Reducing the burden of caring for Alzheimer's disease through the amelioration of "delusions of theft" by drug therapy.

    PubMed

    Shigenobu, Kazue; Ikeda, Manabu; Fukuhara, Ryuji; Maki, Naruhiko; Hokoishi, Kazuhiko; Nebu, Akihiko; Komori, Kenjiro; Tanabe, Hirotaka

    2002-03-01

    Delusions of theft (delusions involving the theft of possessions) are one of the most frequent neuropsychiatric manifestations of Alzheimer's disease (AD). The current study investigated the presence and extent of such delusions before and after drug treatment in a group of AD patients, and the consequent effects on the burden of care on caregivers. The study was an open-label cohort design. The delusions studied consisted only of those involving theft of possessions. Sixteen AD patients served as subjects in order to assess the efficacy of Risperidone administration, in the reduction or elimination of these delusions. The caregiver burden was evaluated using the Zarit Caregiver Burden Interview (ZBI) before the administration of Risperidone and 12 weeks after administration, for cases where delusions of theft were eliminated or reduced. The burden of care on caregivers was significantly reduced (p < 0.001) through the elimination or reduction of delusions of theft. Delusions of theft are considered to be a major factor in increasing the burden of care, and the treatment of these, through appropriate drug therapy, is therefore of great importance in the continuation of satisfactory care in the home. Copyright 2002 John Wiley & Sons, Ltd.

  3. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  4. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  5. 34 CFR 685.215 - Discharge for false certification of student eligibility or unauthorized payment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the individual's eligibility for a Direct Loan as a result of the crime of identity theft committed... applied to charges owed by the student to the school. (4) Identity theft. In the case of an individual... identity theft and is requesting a discharge, the individual shall— (i) Certify that the individual did not...

  6. 78 FR 53171 - Agency Information Collection Activities: Submission to OMB for Reinstatement, With Change, of a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... risks to FCU members or to an FCU's safety and soundness. Each FCU also must develop an Identity Theft... forms of activity that indicate the possible existence of identity theft. In addition, 12 CFR 717.90 requires each FCU to establish reasonable policies and procedures to address the risk of identity theft...

  7. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    PubMed

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  8. Social Security Number Privacy and Identity Theft Prevention Act of 2009

    THOMAS, 111th Congress

    Rep. Tanner, John S. [D-TN-8

    2009-07-23

    07/24/2009 Sponsor introductory remarks on measure. (All Actions) Notes: For further action, see S.3789, which became Public Law 111-318 on 12/18/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. 27 CFR 478.33a - Theft of firearms.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...

  10. 27 CFR 478.33a - Theft of firearms.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...

  11. 27 CFR 478.33a - Theft of firearms.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...

  12. 27 CFR 478.33a - Theft of firearms.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...

  13. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    PubMed

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  14. 34 CFR 682.208 - Due diligence in servicing a loan.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 90 days of its acquisition of the loan. (3) Upon receipt of a valid identity theft report as defined... bureau that information furnished by the lender is a result of an alleged identity theft as defined in... identity theft report, the lender receives from the borrower evidence specified in § 682.402(e)(3)(v), the...

  15. Preventing employee theft: 15 techniques for preventing bookkeeping embezzlement.

    PubMed

    Hills, Laura Sachs

    2004-01-01

    Medical practices are unfortunately the target of embezzlement more often than you might think. This article offers practical suggestions for keeping your employees honest and thwarting a would-be embezzler. It describes the common symptoms of an embezzler at work and offers 15 practical techniques for preventing bookkeeping embezzlement. This article also suggests a simple method for conducting mini-audits from time to time and precautions to take to ensure the reliability of computer passwords. The article advocates keeping tighter control of office supplies and a method for spotting telephone abuse. Finally, it offers suggestions for dealing with employees who steal time on the job.

  16. Moderno love: sexual role-based identities and HIV/STI prevention among men who have sex with men in Lima, Peru.

    PubMed

    Clark, Jesse; Salvatierra, Javier; Segura, Eddy; Salazar, Ximena; Konda, Kelika; Perez-Brumer, Amaya; Hall, Eric; Klausner, Jeffrey; Caceres, Carlos; Coates, Thomas

    2013-05-01

    Role-based sexual identities structure male same-sex partnerships and influence HIV/STI epidemiology among MSM in Latin America. We explored shifting relationships between sexual roles, identities and practices among MSM in Lima, Peru, and implications for HIV/STI prevention. Patterns of HIV/STI epidemiology reflected differential risks for transmission within role-based partnerships with relatively low prevalences of HIV, syphilis, and HSV-2 but higher prevalences of urethral gonorrhea/chlamydia among activo MSM compared with moderno and pasivo participants. Qualitative analysis of how MSM in Peru integrate sexual identities, roles, and practices identified four key themes: pasivo role as a gay approximation of cultural femininity; activo role as a heterosexual consolidation of masculinity; moderno role as a masculine reconceptualization of gay identity; and role-based identities as social determinants of partnership, network, and community formation. The concept of role-based sexual identities provides a framework for HIV prevention for Latin American MSM that integrates sexual identities, practices, partnerships, and networks.

  17. Moderno Love: Sexual Role-Based Identities and HIV/STI Prevention Among Men Who Have Sex with Men in Lima, Peru

    PubMed Central

    Salvatierra, Javier; Segura, Eddy; Salazar, Ximena; Konda, Kelika; Perez-Brumer, Amaya; Hall, Eric; Klausner, Jeffrey; Caceres, Carlos; Coates, Thomas

    2012-01-01

    Role-based sexual identities structure male same-sex partnerships and influence HIV/STI epidemiology among MSM in Latin America. We explored shifting relationships between sexual roles, identities and practices among MSM in Lima, Peru, and implications for HIV/STI prevention. Patterns of HIV/STI epidemiology reflected differential risks for transmission within role-based partnerships with relatively low prevalences of HIV, syphilis, and HSV-2 but higher prevalences of urethral gonorrhea/chlamydia among activo MSM compared with moderno and pasivo participants. Qualitative analysis of how MSM in Peru integrate sexual identities, roles, and practices identified four key themes: pasivo role as a gay approximation of cultural femininity; activo role as a heterosexual consolidation of masculinity; moderno role as a masculine reconceptualization of gay identity; and role-based identities as social determinants of partnership, network, and community formation. The concept of role-based sexual identities provides a framework for HIV prevention for Latin American MSM that integrates sexual identities, practices, partnerships, and networks. PMID:22614747

  18. Reducing theft and embezzlement by encouraging ethical behavior.

    PubMed

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  19. Employee theft and fraud: bigger than ever and getting worse.

    PubMed

    2001-02-01

    Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.

  20. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    PubMed Central

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  1. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings

    PubMed Central

    Carter, Ned; Kindstedt, Angeli; Melin, Lennart

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities—price reduction and increased exposure, in combination and separately—on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts. PMID:16795853

  2. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    PubMed

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  3. Vehicle Theft Identification and Intimation Using GSM & IOT

    NASA Astrophysics Data System (ADS)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  4. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  5. Fighting the scourge of metal theft.

    PubMed

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  6. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    PubMed

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  7. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    ERIC Educational Resources Information Center

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  8. 12 CFR 391.23 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of..., App. Appendix to Subpart C of Part 391—Interagency Guidelines on Identity Theft Detection, Prevention...

  9. 27 CFR 555.165 - Failure to report theft or loss.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... report a theft of explosive materials in accordance with § 555.30 will be fined under title 18 U.S.C., imprisoned not more than 5 years, or both. [T.D. ATF-87, 46 FR 40384, Aug. 7, 1981, as amended by ATF No. 1...

  10. 27 CFR 555.165 - Failure to report theft or loss.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... report a theft of explosive materials in accordance with § 555.30 will be fined under title 18 U.S.C., imprisoned not more than 5 years, or both. [T.D. ATF-87, 46 FR 40384, Aug. 7, 1981, as amended by ATF No. 1...

  11. 27 CFR 555.165 - Failure to report theft or loss.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... report a theft of explosive materials in accordance with § 555.30 will be fined under title 18 U.S.C., imprisoned not more than 5 years, or both. [T.D. ATF-87, 46 FR 40384, Aug. 7, 1981, as amended by ATF No. 1...

  12. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    ERIC Educational Resources Information Center

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  13. Theft of information in the take-grant protection model

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is a theoretical tool for examining such issues because conditions necessary and sufficient for information to flow between two objects, and for rights to objects to be obtained or stolen, are known. These results are extended by examining the question of information flow from an object the owner of which is unwilling to release that information. Necessary and sufficient conditions for such theft of information to occur are derived, and bounds on the number of subjects that must take action for the theft to occur are presented. To emphasize the usefulness of these results, the security policies of complete isolation, transfer of rights with the cooperation of an owner, and transfer of information (but not rights) with the cooperation of the owner are presented; the last is used to model a simple reference monitor guarding a resource.

  14. Major Software Vendor Puts Students on Many Campuses at Risk of Identity Theft

    ERIC Educational Resources Information Center

    Foster, Andrea

    2008-01-01

    At least 18 colleges are scrambling to inform tens of thousands of students that they are at risk of having their identities stolen after SunGard, a leading software vendor, reported that a laptop owned by one of its consultants was stolen. The extent of the problem is still unknown, though many of the campuses that have been identified are in…

  15. Avoiding Medical Identity Theft

    MedlinePlus

    ... was not received, even when there is no money owed Maintain copies of your healthcare records Beware ... learned that a PHR saves time, energy, and money. And it saved my life! A woman's Facebook ...

  16. Drive-away policing and situational crime prevention in China: an analysis of motorcycle ban (jinmo) policy in Guangzhou.

    PubMed

    Xu, Jianhua

    2012-04-01

    Using the example of motorcycle ban policy in Guangzhou, the capital of Guangdong province, this article examines how situational crime prevention strategies are used in contemporary urban China. The article argues that although a motorcycle ban policy may reduce motorcycle snatch theft (feiche qiangduo) in Guangzhou, it inevitably caused a problem of displacement. However, some types of displacement are desirable for local government. An argument about drive-away policing is proposed in this article to understand policing styles in contemporary China. In addition, the article argues that motorcycle ban, as a strategy to prevent snatch theft and robbery, is also a strategy to deal with the crisis in police legitimacy. Therefore, crime prevention in China has more social and political significance than just reducing crime.

  17. 76 FR 14119 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-15

    ... embarrassment or harm to the reputations of the record subjects, harm to economic or property interests, identity theft or fraud, or harm to the programs (whether maintained by VA or another agency or entity... respond to the suspected or confirmed compromise and prevent, minimize, or remedy such harm. This routine...

  18. Who Am I? Identity and the Facilitation of Local Youth Lives within Sexuality Education as an HIV Prevention Strategy

    ERIC Educational Resources Information Center

    Gacoin, Andrée E.

    2016-01-01

    Sexuality education as an HIV prevention strategy is positioned as a way to empower youth in relation to their sexual identities and behaviours. While the youth subject is recognized as complex, the underlying premise is that identity can be targeted "through" sexuality education. In this paper, I present data from an ethnographic…

  19. Sexuality, gendered identities and exclusion: the deployment of proper (hetero)sexuality within an HIV-prevention text from South Africa.

    PubMed

    Gacoin, Andrée

    2010-05-01

    HIV prevention discourses concern lives, the protection of bodily rights and people's active involvement in the policies and programmes that affect them. HIV prevention discourses also create lives, relying upon the deployment of normative sexual identities at the same time as they invite complex and fluid youth identities to embody the norms of prevention. This paper examines a particular HIV prevention text that is available to teachers in the Western Cape province of South Africa to support the implementation of the national Life Orientation programme. Rather than considering this text as a neutral 'scaffold' upon which teachers and students add cultural meanings, it is important to interrogate the ways in which texts rely upon and reiterate particular discursive constructions of the youth sexual subject. This paper argues that the text deploys a particular discursive framework in order to construct a 'normal' (and hetero) sexuality that validates, rather than questions, social constructions of masculine privilege within heterosexuality. This is achieved through the deployment of a scientific expertise of sexuality; the mobilisation of a valued hetero/homosexual binary to create a 'safe' heterosexuality; the normalisation of bourgeois sexuality through the ideology of marriage; and the naturalisation of heterosexual masculine and feminine identities.

  20. Teachers' Guide: Rural Crime Prevention Guide for Young People.

    ERIC Educational Resources Information Center

    Wurschmidt, Todd N.; Phillips, G. Howard

    Crimes against property (vandalism, theft, and burglary) committed by teenagers are increasing at an alarming rate in rural America. The content of this manual aims to reverse this pernicious trend by providing rural Ohio secondary students with preventative education which supplements existing civics and government courses. Hopefully, presenting…

  1. Technology for Anonymity: Names By Other Nyms.

    ERIC Educational Resources Information Center

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  2. 34 CFR 682.411 - Lender due diligence in collecting guaranty agency loans.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... receives a valid identity theft report or notification from a credit bureau that information furnished is a result of an alleged identity theft as defined in § 682.402(e)(14). (Approved by the Office of Management...

  3. Personal messages reduce vandalism and theft of unattended scientific equipment

    PubMed Central

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-01-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40–60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure. PMID:25866614

  4. Personal messages reduce vandalism and theft of unattended scientific equipment.

    PubMed

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  5. 19 CFR 146.53 - Shortages and overages.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., as such, of any: (1) Theft or suspected theft of merchandise; (2) Merchandise not properly admitted.... Except in a case of theft or suspected theft, the operator need not file a report with the port director... otherwise secure damaged merchandise to preserve its identity as damaged merchandise. ...

  6. 19 CFR 146.53 - Shortages and overages.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ..., as such, of any: (1) Theft or suspected theft of merchandise; (2) Merchandise not properly admitted.... Except in a case of theft or suspected theft, the operator need not file a report with the port director... otherwise secure damaged merchandise to preserve its identity as damaged merchandise. ...

  7. Boxer crabs induce asexual reproduction of their associated sea anemones by splitting and intraspecific theft.

    PubMed

    Schnytzer, Yisrael; Giman, Yaniv; Karplus, Ilan; Achituv, Yair

    2017-01-01

    Crabs of the genus Lybia have the remarkable habit of holding a sea anemone in each of their claws. This partnership appears to be obligate, at least on the part of the crab. The present study focuses on Lybia leptochelis from the Red Sea holding anemones of the genus Alicia (family Aliciidae). These anemones have not been found free living, only in association with L. leptochelis . In an attempt to understand how the crabs acquire them, we conducted a series of behavioral experiments and molecular analyses. Laboratory observations showed that the removal of one anemone from a crab induces a "splitting" behavior, whereby the crab tears the remaining anemone into two similar parts, resulting in a complete anemone in each claw after regeneration. Furthermore, when two crabs, one holding anemones and one lacking them, are confronted, the crabs fight, almost always leading to the "theft" of a complete anemone or anemone fragment by the crab without them. Following this, crabs "split" their lone anemone into two. Individuals of Alicia sp. removed from freshly collected L. leptochelis were used for DNA analysis. By employing AFLP (Fluorescence Amplified Fragments Length Polymorphism) it was shown that each pair of anemones from a given crab is genetically identical. Furthermore, there is genetic identity between most pairs of anemone held by different crabs, with the others showing slight genetic differences. This is a unique case in which one animal induces asexual reproduction of another, consequently also affecting its genetic diversity.

  8. Copper wire theft and high voltage electrical burns.

    PubMed

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  9. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... name and address of lender of record; (iii) Capacity of person certifying; (iv) Full identification of... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or...

  10. 27 CFR 478.39a - Reporting theft or loss of firearms.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...

  11. 27 CFR 478.39a - Reporting theft or loss of firearms.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...

  12. 27 CFR 478.39a - Reporting theft or loss of firearms.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...

  13. 27 CFR 478.39a - Reporting theft or loss of firearms.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...

  14. Developmental links between trajectories of physical violence, vandalism, theft, and alcohol-drug use from childhood to adolescence.

    PubMed

    van Lier, Pol A C; Vitaro, Frank; Barker, Edward D; Koot, Hans M; Tremblay, Richard E

    2009-05-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of physical violence decreased. Children who engaged in the high trajectories of vandalism, theft, and alcohol-drug use had a high probability of also being high in physical violence. Compared to males, females were less likely to be on the high trajectory of physical violence, and their trajectories of other antisocial behaviors were less strongly associated with high levels of physical violence. The results suggest that physical violence during pre-adolescence and adolescence has a different developmental pattern than other forms of antisocial behavior, and that its relation to these other forms of antisocial behavior differs by sex.

  15. Copper wire theft and high voltage electrical burns

    PubMed Central

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  16. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    ERIC Educational Resources Information Center

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  17. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    PubMed Central

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  18. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    PubMed

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  19. 78 FR 38771 - Self-Regulatory Organizations; Financial Industry Regulatory Authority, Inc.; Order Approving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-27

    ... information that raises significant identity theft, personal safety, or privacy concerns that are not... raises personal safety or privacy concerns is released to the public when considering whether to release... customer information or information that raises identity theft, personal safety or privacy concerns that do...

  20. Severity of Organized Item Theft in Computerized Adaptive Testing: A Simulation Study

    ERIC Educational Resources Information Center

    Yi, Qing; Zhang, Jinming; Chang, Hua-Hua

    2008-01-01

    Criteria had been proposed for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria resulted from theoretical derivations that assumed uniformly randomized item selection. This study investigated potential damage caused by organized item theft in computerized adaptive…

  1. MALE HOMOSEXUAL IDENTITIES, RELATIONSHIPS, AND PRACTICES AMONG YOUNG MEN WHO HAVE SEX WITH MEN IN VIETNAM: IMPLICATIONS FOR HIV PREVENTION

    PubMed Central

    Ngo, Duc Anh; Ross, Michael W.; Phan, Ha; Ratliff, Eric A.; Trinh, Thang; Sherburne, Lisa

    2010-01-01

    Rapid socioeconomic transformation in Vietnam in last 15 years has been followed by more liberation of sexual expression and representation of sexual identity among young people. There has been an increase in the visibility of homosexual men in major cities of Vietnam who were largely an unknown population until the emergence of the HIV epidemic. Men who have sex with men (MSM) are now considered as one of the target groups in many HIV prevention programs. This qualitative study examines local identities, relationships, and sexual practices among young MSM aged 15–24 in the cities of Hanoi and Ho Chi Minh City. Our analyses were based on 26 in-depth interviews and 10 focus group discussions with young MSM recruited through public place intercepts and cruising areas. Data document the linguistic classification, sexual relationships and behaviors, identity and process of homosexual identification, and the potential linkage between sexual identity and sexual behaviors of MSM in Vietnam. Data also highlight the stages of homosexual community development in urban Vietnam and important differences between Vietnam and the West in the representation of homosexual identity, relationships, and practices. In light of the findings, we suggest that the continuing development and elaboration of a homosexual community in Hanoi and Ho Chi Minh City offers significant opportunities for targeted HIV/AIDS prevention activities in the Vietnamese MSM population. PMID:19519239

  2. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    PubMed

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p < 0.05). About 13.6% of patients who were cohabiting with family members and 66.7% of patients who were living alone were included in the D-group (p < 0.05). About 35.1% of patients who had a neurotic personality and 5.3% of patients who did not were included in the D-group (p < 0.05). There were no significant differences in scores on HDS-R, MMSE and COGNISTAT sub-scales, except for 'speech sample', between the two groups. In the 'speech sample', 38.7% of patients who understood a relationship between two boys and 12.0% of patients who did not were included in the D-group (p < 0.05). These results indicated that delusion of theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  3. 27 CFR 19.263 - Claims on spirits, denatured spirits, articles, or wines lost or destroyed in bond-specific...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... spirits, articles, or wines in bond must include the following information: (1) Identity of containers... of claim. The total amount of tax for which the claim is filed; (4) Identity of distilled spirits... research, development, or testing; (8) Theft. If lost by theft, the facts establishing that the loss did...

  4. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of... bills, immediate advice, with a full description of the bill or bills involved, should be sent to the... be given, instructions and necessary blank forms will be furnished. ...

  5. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of... bills, immediate advice, with a full description of the bill or bills involved, should be sent to the... be given, instructions and necessary blank forms will be furnished. ...

  6. High-voltage electrical burns due to copper theft - Case series.

    PubMed

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  7. Beating the Red Gold Rush: Copper Theft and Homeland Security

    DTIC Science & Technology

    2015-12-01

    with the bulk 52 of the copper wiring rendering each of the turbines inoperable.116 Electrical infrastructure is, of course, not the only kind of...resulted in significant speed restrictions and stop orders for the country’s premier TGV high- speed service.119 Aside from rail lines and wind turbines ... Wind Turbines ,” France 24, May 28, 2014, http://www.france24.com/en/20140528-france-metal-organised-thefts- wind - turbines -copper, accessed August 22

  8. School Security Gap (with Related Video)

    ERIC Educational Resources Information Center

    Skurnac, Steve

    2012-01-01

    Data security breaches in the educational sector can be devastating to institutions and the students and employees they serve. They carry the potential for identity theft, violations of federal and state laws, and loss of trust of students, alumni and employees. The Identity Theft Resource Center says that as of October 2011, education…

  9. School-based administration of ADHD drugs decline, along with diversion, theft, and misuse.

    PubMed

    Dupont, Robert L; Bucher, Richard H; Wilford, Bonnie B; Coleman, John J

    2007-12-01

    Since 2000 researchers have reported a decline in the administration of attention-deficit/hyperactivity disorder (ADHD) medications given by school nurses, although no decline has been noted in the incidence of ADHD in school-age populations. Government data for the same period show reduced levels of methylphenidate abuse as measured by its involvement in hospital emergency department (ED) admissions. Offsetting this, however, is an increase in the involvement of amphetamine-dextroamphetamine in hospital ED admissions for the same period. Because ADHD medications are often administered in the school setting, a survey of school nurses was undertaken to identify factors related to the administration as well as to the diversion, theft, and misuse of ADHD medications. Of 311 school nurses responding, 295 (95%) reported a significant or moderate decline between 2002 and 2004 in the need for school-based administration of ADHD medications. Respondents also reported reductions in diversion, theft, and misuse of ADHD drugs.

  10. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...

  11. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...

  12. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...

  13. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...

  14. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... include an electronically coded key fob, Body Control Module (BCM), Engine Control Module (ECM) and a... results are identical, the BCM will send data to the ECM allowing the vehicle to start. If either the key..., Suzuki stated that the ECM will prohibit operation of the vehicle. In addressing the specific content...

  15. 34 CFR 682.211 - Forbearance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...

  16. 34 CFR 682.211 - Forbearance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...

  17. 34 CFR 682.211 - Forbearance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...

  18. 49 CFR Appendix B to Part 591 - Section 591.5(f) Bond for the Entry of More Than a Single Vehicle

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591... Federal motor vehicle safety, or bumper, or theft prevention standards; and WHEREAS, pursuant to 49 CFR... to conform to the Federal motor vehicle safety, bumper, and theft prevention standards; and WHEREAS...

  19. 49 CFR 567.4 - Requirements for manufacturers of motor vehicles.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... statement: “This vehicle conforms to all applicable Federal motor vehicle safety and theft prevention... conforms to the applicable Federal motor vehicle theft prevention standard in effect on the date of...

  20. Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs.

    PubMed

    Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L

    2006-12-01

    Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.

  1. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    ERIC Educational Resources Information Center

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  2. 75 FR 67453 - Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-02

    ... reasonable policies and procedures that a user of consumer reports must employ when a user receives a notice... policies and procedures for users of consumer reports to enable a user to form a reasonable belief that it knows the identity of the person for whom it has obtained a consumer report, and reconcile the address...

  3. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    PubMed

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  4. Drinker Identity: Key Risk Factor for Adolescent Alcohol Use.

    PubMed

    Lee, Chia-Kuei; Corte, Colleen; Stein, Karen F

    2018-03-01

    Adolescent alcohol use continues to be a critical public health problem with both short- and long-term negative health consequences. Defining oneself in terms of alcohol, a drinking-related identity, has been shown to predict high levels of alcohol use. Because adolescence is the developmental period during which identity development is most salient, preventing the development of the drinker identity and early identification of youth who have a developing drinker identity may be important for prevention and early intervention. We review the theory- and evidence-based literature about identity development and the effects of a drinker identity on alcohol use behaviors in adolescents, discuss potential determinants of the drinker identity, and discuss future implications for practice and research. There is some evidence that the drinker identity forms in early adolescence and becomes more well-developed during adolescence. The drinker identity predicts alcohol use behaviors both concurrently and over time in adolescence and young adulthood. There is also some evidence that early exposure to alcohol may contribute to formation of the drinker identity. Identity-based approaches may be promising strategies to identify adolescents who are at risk for alcohol use and to intervene with early prevention or treatment within the school setting. © 2018, American School Health Association.

  5. 28 CFR 29.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.1 Purpose. (a) The purpose of this part is to implement the Motor Vehicle Theft Prevention Act, 42 U.S.C. 14171, which... vehicle theft prevention program. The program will be implemented by states and localities, at their sole...

  6. Diabetes prevention among American Indians: the role of self-efficacy, risk perception, numeracy and cultural identity.

    PubMed

    Simonds, Vanessa W; Omidpanah, Adam; Buchwald, Dedra

    2017-10-02

    According to the Risk Perception Attitude (RPA) framework, classifying people according to their perceptions of disease risk and their self-efficacy beliefs allows us to predict their likelihood for engaging in preventive behaviors. Health interventions can then be targeted according to RPA group. We applied the framework to type 2 diabetes prevention behaviors among American Indians and expanded it to include culture and numeracy. Using a cross-sectional study design, we surveyed a sample of Northern Plains American Indians in a reservation community setting on self-reported perceptions of diabetes risk, objective diabetes risk, self-efficacy, engagement in healthy behaviors, knowledge of diabetes risk factors, and covariates including demographics, numeracy, and cultural identity. We used the RPA framework to classify participants into four groups based on their perceptions of risk and self-efficacy. Analyses of variance and covariance estimated inter-group differences in behaviors associated with type 2 diabetes prevention. Among 128 participants, our only finding consistent with the RPA framework was that self-efficacy and risk perception predicted knowledge about diabetes risk factors. We found limited evidence for the influence of cultural identity within the RPA framework. Overall, participants had lower numeracy skills which tended to be associated with inaccurate perceptions of higher levels of risk. The theoretical framework may benefit from inclusion of further contextual factors that influence these behaviors. Attention to numeracy skills stands out in our study as an important influence on the RPA framework, highlighting the importance of attending to numeracy when targeting and tailoring risk information to participants segmented by the RPA framework.

  7. 34 CFR 682.211 - Forbearance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... disability; (6) Upon receipt of a valid identity theft report as defined in section 603(q)(4) of the Fair... furnished by the lender is a result of an alleged identity theft as defined in § 682.402(e)(14), for a... requirements of the teacher loan forgiveness program in § 682.216; and (iii) In yearly increments (or a lesser...

  8. 27 CFR 28.302 - Notice to exporter.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft; (d) That allowance... transportation, as described in § 28.301, whether by theft or otherwise, the appropriate TTB officer may require...

  9. 27 CFR 28.316 - Notice to exporter.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... unlawfully diverted, or had been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft... described in § 28.315, whether by theft or otherwise, the appropriate TTB officer may require the exporter...

  10. 27 CFR 28.302 - Notice to exporter.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft; (d) That allowance... transportation, as described in § 28.301, whether by theft or otherwise, the appropriate TTB officer may require...

  11. 27 CFR 28.316 - Notice to exporter.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... unlawfully diverted, or had been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft... described in § 28.315, whether by theft or otherwise, the appropriate TTB officer may require the exporter...

  12. Energy Theft in the Advanced Metering Infrastructure

    NASA Astrophysics Data System (ADS)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  13. 12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... appendix J, the following definitions apply: (1) Account means a continuing relationship established by a... directors, a designated employee at the level of senior management. (3) Covered account means: (i) An... offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and...

  14. 16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... following definitions apply: (1) Account means a continuing relationship established by a person with a... employee at the level of senior management. (3) Covered account means: (i) An account that a financial... for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the...

  15. 12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... section and appendix J, the following definitions apply: (1) Account means a continuing relationship... 15 U.S.C. 1681a(r)(5). (5) Creditor has the same meaning as in 15 U.S.C. 1681a(r)(5). (6) Customer..., or a designated employee at the level of senior management in the oversight, development...

  16. 12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Appendix J, the following definitions apply: (1) Account means a continuing relationship established by a... directors, a designated employee at the level of senior management. (3) Covered account means: (i) An... offers or maintains for which there is a reasonably foreseeable risk to customers or to the safety and...

  17. 12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... following definitions apply: (1) Account means a continuing relationship established by a person with a... employee at the level of senior management. (3) Covered account means: (i) An account that a financial... for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the...

  18. 12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... section and appendix J, the following definitions apply: (1) Account means a continuing relationship... board of directors, a designated employee at the level of senior management. (3) Covered account means... institution or creditor offers or maintains for which there is a reasonably foreseeable risk to customers or...

  19. High-voltage electrical burns due to copper theft – Case series

    PubMed Central

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  20. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    PubMed

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. 78 FR 72749 - Reports, Forms and Record Keeping Requirements; Agency Information Collection Activity Under OMB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-03

    ... Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards. OMB Number: 2127-0002... Federal motor vehicle safety, bumper, and theft prevention standards administered by NHTSA. The... vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper, and theft...

  2. InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices

    NASA Astrophysics Data System (ADS)

    Gupta, Anand; Gupta, Deepank; Gupta, Nidhi

    People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).

  3. Crash test and evaluation of locking architectural mailboxes.

    DOT National Transportation Integrated Search

    2014-09-01

    Some homeowners and businesses are becoming increasingly concerned about mail-identity theft. : Consequently, there is a growing demand for the use of locking mailboxes for theft deterrence and vandal : resistance. There are a number of mailbox produ...

  4. Crash testing and evaluation of multiple mailbox supports for use with locking architectural mailboxes.

    DOT National Transportation Integrated Search

    2017-02-01

    Some homeowners and businesses are becoming increasingly concerned about mail-identity theft. Consequently, there is a growing demand for the use of locking mailboxes for theft deterrence and vandal resistance. There are a number of mailbox products ...

  5. 28 CFR 29.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.2 Definitions. For the purposes of this part: (a) The Act or the MVTPA means the Motor Vehicle Theft Prevention Act. (b) Owner... used automobile dealerships. (c) The Program refers to the National Voluntary Motor Vehicle Theft...

  6. Scientific misconduct and theft: case report from 17th century.

    PubMed

    Fatović-Ferencić, Stella

    2008-02-01

    Gjuro Armen Baglivi was one of the most famous medical authorities of the 17th century. Apart from his numerous books and publications, several extensive collections of his correspondence have been preserved and are available in libraries around the world. They provide new information about the 17th century scientific culture and place of Baglivi's work in the scientific European context. Also, they shed light on his personality more than other writings intended for the public eye. In this paper I will present the case of a theft of intellectual property, which Baglivi described in one of his letters to Jean Jacques Manget.

  7. STOP Identity Theft Act of 2013

    THOMAS, 113th Congress

    Sen. Klobuchar, Amy [D-MN

    2013-01-24

    Senate - 03/06/2014 Placed on Senate Legislative Calendar under General Orders. Calendar No. 316. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. STOP Identity Theft Act of 2014

    THOMAS, 113th Congress

    Rep. Wasserman Schultz, Debbie [D-FL-23

    2013-02-15

    Senate - 09/09/2014 Received in the Senate. Read twice. Placed on Senate Legislative Calendar under General Orders. Calendar No. 555. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  9. Perspectives on Sexual Identity Formation, Identity Practices, and Identity Transitions Among Men Who Have Sex With Men in India.

    PubMed

    Tomori, Cecilia; Srikrishnan, Aylur K; Ridgeway, Kathleen; Solomon, Sunil S; Mehta, Shruti H; Solomon, Suniti; Celentano, David D

    2018-01-01

    Men who have sex with men (MSM) remain at high risk for HIV infection. Culturally specific sexual identities, encompassing sexual roles, behavior, and appearance, may shape MSM's experiences of stigmatization and discrimination, and affect their vulnerability to HIV. This multi-site qualitative study (n = 363) encompassing 31 focus group discussions (FGDs) and 121 in-depth interviews (IDIs) across 15 sites in India investigated sexual identity formation, identity practices, and transitions and their implications for HIV prevention. IDIs and FGDs were transcribed, translated, and underwent thematic analysis. Our findings document heterogeneous sexual identity formation, with MSM who have more gender nonconforming behaviors or appearance reporting greater family- and community-level disapproval, harassment, violence, and exclusion. Concealing feminine aspects of sexual identities was important in daily life, especially for married MSM. Some participants negotiated their identity practices in accordance with socioeconomic and cultural pressures, including taking on identity characteristics to suit consumer demand in sex work and on extended periods of joining communities of hijras (sometimes called TG or transgender women). Participants also reported that some MSM transition toward more feminine and hijra or transgender women identities, motivated by intersecting desires for feminine gender expression and by social exclusion and economic marginalization. Future studies should collect information on gender nonconformity stigma, and any changes in sexual identity practices or plans for transitions to other identities over time, in relation to HIV risk behaviors and outcomes.

  10. Smartphone Theft Prevention Act

    THOMAS, 113th Congress

    Sen. Klobuchar, Amy [D-MN

    2014-02-12

    Senate - 02/12/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year...: Notice of availability. SUMMARY: This notice announces publication by NHTSA of the annual insurer report... helpful to the public, the law enforcement community, and Congress. As required by section 33112(c), this...

  12. Scientific Misconduct and Theft: Case Report from 17th Century

    PubMed Central

    Fatović-Ferenčić, Stella

    2008-01-01

    Gjuro Armen Baglivi was one of the most famous medical authorities of the 17th century. Apart from his numerous books and publications, several extensive collections of his correspondence have been preserved and are available in libraries around the world. They provide new information about the 17th century scientific culture and place of Baglivi’s work in the scientific European context. Also, they shed light on his personality more than other writings intended for the public eye. In this paper I will present the case of a theft of intellectual property, which Baglivi described in one of his letters to Jean Jacques Manget. PMID:18293461

  13. The Attractiveness of Materials in Advanced Nuclear Fuel Cycles for Various Proliferation and Theft Scenarios

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bathke, C. G.; Wallace, R. K.; Ireland, J. R.

    2010-09-01

    This paper is an extension to earlier studies1,2 that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no “silver bullet” has beenmore » found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of "attractiveness levels" that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities.3 The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.« less

  14. The attractiveness of materials in advanced nuclear fuel cycles for various proliferation and theft scenarios

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bathke, Charles G; Wallace, Richard K; Ireland, John R

    2009-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has beenmore » found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.« less

  15. 49 CFR 544.1 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... insurers to report to the National Highway Traffic Safety Administration information about motor vehicle thefts and recoveries, the effects of the Federal motor vehicle theft prevention standard on those thefts...

  16. Data Hemorrhages in the Health-Care Sector

    NASA Astrophysics Data System (ADS)

    Johnson, M. Eric

    Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.

  17. Young children will lie to prevent a moral transgression.

    PubMed

    Harvey, Teresa; Davoodi, Telli; Blake, Peter R

    2018-01-01

    Children believe that it is wrong to tell lies, yet they are willing to lie prosocially to adhere to social norms and to protect a listener's feelings. However, it is not clear whether children will lie instrumentally to intervene on behalf of a third party when a moral transgression is likely to occur. In three studies (N=270), we investigated the conditions under which 5- to 8-year-olds would tell an "interventional lie" in order to misdirect one child who was seeking another child in a park. In Study 1, older children lied more when the seeker intended to steal a toy from another child than when the seeker intended to give cookies to the child. In Study 2, the transgression (stealing) was held constant, but harm to the victim was either emphasized or deemphasized. Children at all ages were more likely to lie to prevent the theft when harm was emphasized. In Study 3, harm to the victim was held constant and the act of taking was described as either theft or a positive action. Children at all ages were more likely to lie when the transgression was emphasized. We conclude that by 5years of age, children are capable of lying to prevent a moral transgression but that this is most likely to occur when both the transgression and the harm to the victim are salient. Published by Elsevier Inc.

  18. 49 CFR 541.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... same make. (4) 1990/91 median theft rate means 3.5826 thefts per thousand vehicles produced. (5...

  19. Special report. Update on EAS (electronic article surveillance) systems: protecting against patient wandering, infant abduction, property theft.

    PubMed

    1993-10-01

    Concern about wandering patients and infant abduction on the part of hospitals has sparked renewed interest in Electronic Article Surveillance (EAS) systems. Such systems had their origins in department stores and libraries where they are almost universally used. They also have applications in hospitals for preventing the theft of supplies and equipment. A number of companies provide EAS products for the health care field. How do you select the system that is best for your needs? "Talk to users. Pick out a number of profit and non-profit hospitals to get their views," advises Ted Algaier, vice president, marketing and sales, Innovative Control Systems, Inc., Waukesha, WI. "Examine the history of the company or vendor to determine if it understands the health care market and find out if the product really works." In this report, we'll review a number of EAS systems currently on the market, and present information on how they work, how effective they are, and costs involved. Also included are comments from users who have installed such systems.

  20. 31 CFR 306.111 - Procedure for applying for relief.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or... some other person, the capacity in which he represents the owner. (b) The identity of the security by...

  1. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    ERIC Educational Resources Information Center

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  2. 31 CFR 306.111 - Procedure for applying for relief.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or defacement of a... person, the capacity in which he represents the owner. (b) The identity of the security by title of loan...

  3. 49 CFR 544.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Theft Prevention to prevent or discourage the theft of motor vehicles, to prevent or discourage the sale or distribution in interstate commerce of used parts removed from stolen motor vehicles, and to help reduce the cost to consumers of comprehensive insurance coverage for motor vehicles. [62 FR 33756, June...

  4. Modeling And Simulation Of Electrical Prevenion System Using Arduino Uno,Gsm Modem, And Acs712 Current Sensor

    NASA Astrophysics Data System (ADS)

    Khair, Ummul; Jabbar Lubis, Abdul; Agustha, Indra; Dharmawati; Zulfin, M.

    2017-12-01

    The current electricity needs is very primary, all objects including electronics require power, it encourages people not to be able to save electricity so the theft of electric power would be done. The use of ACS712 current sensor as the sensor with arduino uno would find out the power consumption continuously and prevent the theft of electricity because of the use of electricity which has been determined by PLN and the people fetl that it is not enough for every house, so the author made a tool for prevention of theft of electric power by using the arduino uno, buzzer, ACS712 current sensor, lcd, and relay then the power usage can be controlled according to the use to prevent the occurrence of theft of electricity so the use can be seen directly on the lcd 16x2and GSM modem to give information to employees of PLN so that it can reduceelectrical theft by the public.

  5. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... institution or creditor or to a fraudulent Web site. Appropriate responses may include the following: (a... consumer report; or b. The Social Security Number (SSN) has not been issued, or is listed on the Social...

  6. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., procedures, and other arrangements that control reasonably foreseeable risks to customers or to the safety... other suspicious activity related to, a covered account; and (5) Notice from customers, victims of... policies and procedures regarding identification and verification set forth in the Customer Identification...

  7. 12 CFR Appendix J to Part 717 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... consumer report. 2. A consumer reporting agency provides a notice of credit freeze in response to a request for a consumer report. 3. A consumer reporting agency provides a notice of address discrepancy, as defined in § 717.82(b) of this part. 4. A consumer report indicates a pattern of activity that is...

  8. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  9. 12 CFR Appendix J to Part 171 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  10. 12 CFR Appendix J to Part 171 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  11. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  12. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  13. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  14. 12 CFR Appendix J to Part 171 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    .... III. Detecting Red Flags The Program's policies and procedures should address the detection of Red... detect relevant Red Flags that may arise in the performance of the service provider's activities, and... or creditor detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of...

  15. 49 CFR 567.7 - Requirements for persons who alter certified vehicles.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Federal motor vehicle safety, Bumper, and Theft Prevention standards, and (2) Assumes legal responsibility... Vehicle Safety, Bumper and Theft Prevention Standards affected by the alteration and in effect in (month... vehicles. 567.7 Section 567.7 Transportation Other Regulations Relating to Transportation (Continued...

  16. 49 CFR 543.9 - Terminating or modifying an exemption.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION... compliance with the parts-marking requirements of part 541 in reducing and deterring motor vehicle theft... exemption has not been as effective as parts-marking in reducing and deterring motor vehicle theft. (2...

  17. 49 CFR 543.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.2 Purpose. The purpose of... passenger motor vehicles to obtain an exemption from the parts-marking requirements of the vehicle theft... motor vehicle theft as compliance with the parts-marking requirements. This part also provides the...

  18. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    PubMed

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  19. Workplace violence: impact, causes, and prevention.

    PubMed

    Dillon, Bobbie L

    2012-01-01

    Using a variety of sources, the author explores the complex reasons for aggression and violence in workplace settings, as well as suggesting means of prevention and intervention. Literature Review. Studies indicate workplace violence affects more than half of U.S. organizations, yet nearly 70 percent have no programs or policies to deal with this problem. Research indicates that aggressive behavior of a psychological nature often precedes physical violence in the workforce, yet employers regularly ignore warning signs even when reported by employees. Costs to U.S. employers are estimated in the millions due to employee absences, medical costs, theft, and costs related to litigation. Organizations with cultures which support fair working conditions and zero-tolerance for workplace aggression have been shown to help mitigate workplace violence.

  20. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 6 2013-10-01 2013-10-01 false Procedures for selecting low theft light duty truck lines with a majority of major parts interchangeable with those of a passenger motor vehicle line. 542.2 Section 542.2 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION,...

  1. 76 FR 57103 - Reports, Forms and Recordkeeping Requirements Agency Information Collection Activity Under OMB...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-15

    ... Federal Motor Vehicle Theft Prevention Standard was extended to include all passenger cars and... Vehicle Theft Prevention Standard (Part 541), all passenger cars, and multipurpose passenger vehicles with..., 565 and 567. Part 541 The Motor Vehicle Information and Cost Savings Act was amended by the Anti-Car...

  2. An approach to meeting the spent fuel standard

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Makhijani, A.

    1996-05-01

    The idea of the spent fuel standard is that there should be a high surface gamma radiation to prevent theft. For purposes of preventing theft, containers should be massive, and the plutonium should be difficult to extract. This report discusses issues associated with the spent fuel standard.

  3. Investigation of natural gas theft by magnetic remanence mapping.

    PubMed

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  4. Sexual identity formation and AIDS prevention: an exploratory study of non-gay-identified Puerto Rican MSM from working class neighborhoods.

    PubMed

    Finlinson, H Ann; Colón, Héctor M; Robles, Rafaela R; Soto, Mayra

    2006-09-01

    As a subgroup of men who have sex with men (MSM), non-gay-identified (NGI) behaviorally bisexual Latino MSM are associated with heightened probabilities of HIV transmission, yet they have eluded HIV/AIDS interventionists. This exploratory study of Puerto Rican MSM drug users employed multi-session qualitative interviews to examine early life experiences related to gender identity and sexual orientation, and the place of risky drug and sexual behaviors in the process of sexual identity formation. NGI participants experienced sexual debut between ages 13 and 20, and most were recruited to prostitution as young teens by NGI age mates who were also members of drug use networks. Participants emphasized their role as insertive sexual partners and that they maintained relationships with pasivo biological males. It is feasible to recruit NGI MSM through primary male sexual partners and drug use networks. HIV/AIDS prevention based on awareness of developmental histories holds promise for intervening before NGI youth engage in male prostitution or injection drug use.

  5. Reducing Shrinkage in Convenience Stores by the Use of the PSI.

    ERIC Educational Resources Information Center

    Terris, William; Jones, John W.

    This bibliography contains over 1,200 behavioral and property is a rapidly growing problem. Successful strategies are needed to reduce employee theft; new loss prevention techniques need to be developed and evaluated. Two loss prevention programs aimed at reducing employees' theft were compared by the measures of shrinkage rates. Initially, a…

  6. Understanding public confidence in government to prevent terrorist attacks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered tomore » small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.« less

  7. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-17

    ... 38 GENERAL MOTORS CHEVROLET MALIBU 423 155,433 2.7214 39 KIA RIO 92 35,014 2.6275 40 AUDI AUDI S8/S8.../SOLARA 390 257,638 1.5138 81 FORD MOTOR CO MERCURY GRAND MARQUIS 66 44,071 1.4976 82 AUDI AUDI A3/A3... HYUNDAI ELANTRA 160 109,498 1.4612 86 AUDI AUDI A6/A6 QUATTRO/S6/S6 AVANT 24 16,651 1.4414 87 KIA SPORTAGE...

  8. 78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-09

    ... NISSAN ALTIMA 387 179,269 2.1588 18 AUDI AUDI A8 10 4,751 2.1048 19 MAZDA 6 52 25,456 2.0427 20 GENERAL...,821 1.5360 34 TOYOTA YARIS 38 24,850 1.5292 35 AUDI AUDI A3 10 6,734 1.4850 36 CHRYSLER 300 42 28,373....1383 59 FORD MOTOR CO...... FUSION 239 211,964 1.1276 60 AUDI AUDI A6 8 7,108 1.1255 61 CHRYSLER 200 72...

  9. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ...) 2009 vehicles produced) 1 AUDI AUDI S8 2 227 8.8106 2 FORD MOTOR CO...... SHELBY GT 5 581 8.6059 3 BMW... 31,667 3.3789 13 CHRYSLER SEBRING 65 19,588 3.3184 14 AUDI AUDI A8 6 1,810 3.3149 15 VOLVO V70 3 996...,346 1.3532 73 NISSAN FRONTIER PICKUP.... 31 23,030 1.3461 74 VOLVO S40 9 6,743 1.3347 75 AUDI AUDI A3...

  10. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-14

    ... ``Quattro'' and ``Avant'' should be deleted from the Volkswagen and Audi vehicle line nomenclature. The..., Quattro and Avant have been deleted from the vehicle line nomenclature for the Volkswagen and Audi vehicle lines. Therefore, the entry for the Audi A6/A6 Quattro/S6/ S6 Avant has been changed to the Audi A6 and...

  11. 77 FR 38024 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... AUDI AUDI S4/S5...... 11 7,068 1.5563 38 NISSAN PATHFINDER...... 16 10,308 1.5522 39 GENERAL MOTORS............ DODGE NITRO..... 17 19,432 0.8748 88 AUDI AUDI A3......... 4 4,587 0.8720 89 HYUNDAI GENESIS......... 25... CROSSTOUR 29 34,114 0.8501 93 HONDA CIVIC 217 259,907 0.8349 94 AUDI AUDI TT......... 1 1,201 0.8326 95...

  12. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-22

    ... produced) 1 AUDI AUDI S8 2 227 8.8106 2 FORD MOTOR CO SHELBY GT 5 581 8.6059 3 BMW M5 2 264 7.5758 4... 107 31,667 3.3789 12 CHRYSLER SEBRING 65 19,588 3.3184 13 AUDI AUDI A8 6 1,810 3.3149 14 VOLVO V70 3... FRONTIER PICKUP........ 31 23,030 1.3461 74 VOLVO S40 9 6,743 1.3347 75 AUDI AUDI A3 5 3,761 1.3294 76 FORD...

  13. 77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-21

    ......... CHEVROLET CAMARO.... 190 117,961 1.6107 36 FORD MOTOR CO....... FOCUS 279 176,089 1.5844 37 AUDI AUDI S4/S5....8783 87 CHRYSLER DODGE NITRO......... 17 19,432 0.8748 88 AUDI AUDI A3 4 4,587 0.8720 89 HYUNDAI... ACCORD CROSSTOUR.... 29 34,114 0.8501 93 HONDA CIVIC 217 259,907 0.8349 94 AUDI AUDI TT 1 1,201 0.8326 95...

  14. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... description and diagram of the identity, design and location of the components of the antitheft device for the... the antitheft device and the immobilization features are constructed and designed within the vehicle's... test. Additionally, FUSA stated that since the immobilization features are designed and constructed...

  15. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-29

    ... identity, design, and location of the components of the antitheft device for the Subaru [confidential.... Additionally, FUSA stated that because the immobilization features are designed and constructed within the... provided a comparative table showing how its device is similar to other manufacturers' devices that have...

  16. 49 CFR 541.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.2 Purpose. The purpose of this standard is to reduce the incidence of motor vehicle thefts by facilitating the tracing and...

  17. 49 CFR 591.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... AND THEFT PREVENTION STANDARDS § 591.2 Purpose. The purpose of this part is to ensure that motor vehicles and motor vehicle equipment permanently imported into the United States conform with theft...

  18. SMR forum: Too many hands in the corporate cookie jar.

    PubMed

    Bullard, P D; Resnik, A J

    1983-01-01

    Theft by employees costs American businesses and their customers many billions of dollars each year. Despite concerted efforts to reduce the problem, it appears to continue to grow. Most of these efforts concentrate on limiting the opportunity to steal. However, because the motivations for theft are varied, preventing it often requires more than tighter security. In this paper, the authors explore the extent of the problem, its causes, motivations behind employee theft, and some cost-effective ways of reducing the incidence of theft.

  19. Control of Cell Identity in Pancreas Development and Regeneration

    PubMed Central

    Stanger, Ben Z.; Hebrok, Matthias

    2013-01-01

    The endocrine and exocrine cells in the adult pancreas are not static, but can change differentiation state in response to injury or stress. This concept of cells in flux means that there may be ways to generate certain types of cells (such as insulin-producing β-cells) and prevent formation of others (such as transformed, neoplastic cells). We review different aspects of cell identity in the pancreas, discussing how cells achieve their identity during embryonic development and maturation, and how this identity remains plastic, even in the adult pancreas. PMID:23622126

  20. 49 CFR 541.3 - Application.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.3 Application. (a) Except... high theft in accordance with 49 CFR 542.1; and (iv) Light duty trucks with a gross vehicle weight...

  1. Managing identity impacts associated with disclosure of HIV status: a qualitative investigation

    PubMed Central

    Frye, Victoria; Fortin, Princess; MacKenzie, Sonja; Purcell, David; Edwards, Lorece V.; Mitchell, Shannon Gwin; Valverde, Eduardo; Garfein, R.; Metsch, Lisa; Latka, Mary H

    2011-01-01

    Disclosure of HIV status to potential and current sex partners by HIV-positive people (HIVPP) is a complex issue that has received a significant amount of attention. Research has found that disclosure depends upon the evaluation by HIVPP of potential benefits and risks, especially of the risks stemming from the profound social stigma of HIV and AIDS. Drawing on concepts from Goffman’s classic stigma theory and Anderson’s more recently developed cultural-identity theory of drug abuse, we analyzed data from in-depth, post-intervention qualitative interviews with 116 heterosexually active, HIV-positive injection drug users enrolled in a randomized trial of a behavioral intervention to prevent HIV transmission. We explored how disclosure experiences lead to “identity impacts” defined as: (1) identity challenges (i.e. interactions that challenge an individual’s self-concept as a “normal” or non-deviant individual); and (2) identity transformations (i.e. processes whereby an individual comes to embrace a new identity and reject behaviors and values of an old one, resulting in the conscious adoption of a social and/or public identity as an HIV-positive individual). Participants engaged in several strategies to manage the identity impacts associated with disclosure. Implications of these findings for research and prevention programming are discussed. PMID:20024764

  2. 78 FR 23637 - Identity Theft Red Flags Rules

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-19

    ... Address Control Issues with Implementing Cloud Computing (May 2010), available at http://www.gao.gov/new.items/d10513.pdf (discussing information security implications of cloud computing); Department of...

  3. 77 FR 13449 - Identity Theft Red Flags Rules

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-06

    ... Address Control Issues with Implementing Cloud Computing (May 2010) (available at http://www.gao.gov/new.items/d10513.pdf ) (discussing information security implications of cloud computing); Department of...

  4. Eating Disorder Symptomatology and Identity Formation in Adolescence: A Cross-Lagged Longitudinal Approach.

    PubMed

    Verschueren, Margaux; Claes, Laurence; Bogaerts, Annabel; Palmeroni, Nina; Gandhi, Amarendra; Moons, Philip; Luyckx, Koen

    2018-01-01

    Introduction: Eating disorder symptomatology, comprising both psychological and behavioral aspects of subclinical eating concerns, constitutes a clear precursor of developing eating disorders. It is crucial to investigate its antecedents and correlates to subsequently inform eating disorder prevention programs. The present study focused on identity formation, a core developmental task in adolescence, that has increasingly been linked to eating disorder development. Our main aim was to examine the temporal sequence between eating disorder symptomatology and identity formation. Methods: Data on eating disorder symptomatology and identity formation were collected in 530 high school students (at Time 1: mean age = 15 years; SD = 1.84; range: 12-18 years; 50.6% females) using self-report questionnaires at three annual measurement points. Cross-lagged structural equation modeling was performed to examine the directionality of effects. Results: Results indicated bidirectional effects between eating disorder symptomatology and identity formation. Identity confusion seemed to increase vulnerability to body dissatisfaction and bulimia symptoms, whereas identity synthesis seemed to protect against their development. Additionally, identity synthesis seemed to protect against the development of drive for thinness as well. At the same time, body dissatisfaction and bulimia symptoms positively predicted identity confusion and negatively predicted identity synthesis over time. Conclusion: The present study adds to the growing body of literature on identity and eating disorders by focusing on their temporal interplay in a community sample of adolescents. As bidirectional effects emerged, a greater emphasis on identity formation in eating disorder prevention programs is advocated.

  5. Eating Disorder Symptomatology and Identity Formation in Adolescence: A Cross-Lagged Longitudinal Approach

    PubMed Central

    Verschueren, Margaux; Claes, Laurence; Bogaerts, Annabel; Palmeroni, Nina; Gandhi, Amarendra; Moons, Philip; Luyckx, Koen

    2018-01-01

    Introduction: Eating disorder symptomatology, comprising both psychological and behavioral aspects of subclinical eating concerns, constitutes a clear precursor of developing eating disorders. It is crucial to investigate its antecedents and correlates to subsequently inform eating disorder prevention programs. The present study focused on identity formation, a core developmental task in adolescence, that has increasingly been linked to eating disorder development. Our main aim was to examine the temporal sequence between eating disorder symptomatology and identity formation. Methods: Data on eating disorder symptomatology and identity formation were collected in 530 high school students (at Time 1: mean age = 15 years; SD = 1.84; range: 12–18 years; 50.6% females) using self-report questionnaires at three annual measurement points. Cross-lagged structural equation modeling was performed to examine the directionality of effects. Results: Results indicated bidirectional effects between eating disorder symptomatology and identity formation. Identity confusion seemed to increase vulnerability to body dissatisfaction and bulimia symptoms, whereas identity synthesis seemed to protect against their development. Additionally, identity synthesis seemed to protect against the development of drive for thinness as well. At the same time, body dissatisfaction and bulimia symptoms positively predicted identity confusion and negatively predicted identity synthesis over time. Conclusion: The present study adds to the growing body of literature on identity and eating disorders by focusing on their temporal interplay in a community sample of adolescents. As bidirectional effects emerged, a greater emphasis on identity formation in eating disorder prevention programs is advocated. PMID:29915548

  6. 16 CFR 603.1 - Terms defined in the Fair Credit Reporting Act.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... other information about the perpetrator, if known. (3) Name(s) of information furnisher(s), account numbers, or other relevant account information related to the identity theft. (4) Any other information.... (a) The term “identity theft” means a fraud committed or attempted using the identifying information...

  7. Financial Fraud and Child Abuse

    ERIC Educational Resources Information Center

    Little, Allison Dare

    2014-01-01

    A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.

  8. 78 FR 63571 - Advisory Council to the Internal Revenue Service; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-24

    ... Hotel, 2430 Pennsylvania Ave. NW., Potomac Ballroom, Washington, DC 20036. Issues to be discussed... Clients that are Victims of Identity Theft, Guidance to Practitioners Regarding Professional Obligations...

  9. Young women as smokers and nonsmokers: a qualitative social identity approach.

    PubMed

    Lennon, Alexia; Gallois, Cindy; Owen, Neville; McDermott, Liane

    2005-12-01

    The authors used a social identity perspective to explore young women's perceptions of smoking. They carried out 13 focus groups and 6 intercept interviews with women aged 16 to 28 years in regards to the social identities that might influence young women's smoking behavior. Three identities emerged: the cool smoker applied to the initiation of smoking; considerate smokers, who were older addicted smokers; and the actual and anticipated good mother identity, which applied to young women who quit smoking during pregnancy. These identities add to our understanding of the meaning of smoking within the lives of young women and might allow more focused initiatives with this group to prevent the progression to regular addicted smoking.

  10. Metal Theft Prevention Act of 2013

    THOMAS, 113th Congress

    Sen. Klobuchar, Amy [D-MN

    2013-02-27

    Senate - 06/17/2013 Placed on Senate Legislative Calendar under General Orders. Calendar No. 88. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Metal Theft Prevention Act of 2013

    THOMAS, 113th Congress

    Rep. Paulsen, Erik [R-MN-3

    2013-02-27

    House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Behavioural indicators of motives for barroom aggression: implications for preventing bar violence.

    PubMed

    Graham, Kathryn; Bernards, Sharon; Wells, Samantha; Osgood, D Wayne; Abbey, Antonia; Felson, Richard B; Saltz, Robert F

    2011-09-01

    To develop new strategies for preventing violence in high-risk licensed premises, we identify behavioural indicators of apparent motives for aggression in these settings and outline the implications of different motivations for prevention. The four types of motives for aggressive or coercive acts defined by the theory of coercive actions framed the research: gaining compliance, expressing grievances/restoring justice, attaining a favourable social identity and pursuing fun/excitement. Incidents of aggression from the Safer Bars evaluation research were analysed to identify behavioural indicators of each motivation. Compliance-motivated aggression typically takes the form of unwanted social overtures, third party intervention to stop conflicts or staff rule enforcement. Prevention strategies include keeping the aggressor's focus on compliance to avoid provoking grievance and identity motives that are likely to escalate aggression. Grievance motives are typically elicited by perceived wrongdoing and therefore prevention should focus on eliminating sources of grievances and adopting policies/practices to resolve grievances peacefully. Social identity motives are endemic to many drinking establishments especially among male patrons and staff. Prevention involves reducing identity cues in the environment, hiring staff who do not have identity concerns, and training staff to avoid provoking identity concerns. Aggression motivated by fun/excitement often involves low-level aggression where escalation can be prevented by avoiding grievances and attacks on identity. Knowledge of behavioural indicators of motives can be used to enhance staff hiring and training practices, reduce environmental triggers for aggression, and develop policies to reduce motivation for aggression. © 2011 Australasian Professional Society on Alcohol and other Drugs.

  13. THE ATTRACTIVENESS OF MATERIALS IN ADVANCED NUCLEAR FUEL CYCLES FOR VARIOUS PROLIFERATION AND THEFT SCENARIOS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bathke, C. G.; Ebbinghaus, Bartley B.; Collins, Brian A.

    2012-08-29

    We must anticipate that the day is approaching when details of nuclear weapons design and fabrication will become common knowledge. On that day we must be particularly certain that all special nuclear materials (SNM) are adequately accounted for and protected and that we have a clear understanding of the utility of nuclear materials to potential adversaries. To this end, this paper examines the attractiveness of materials mixtures containing SNM and alternate nuclear materials associated with the plutonium-uranium reduction extraction (Purex), uranium extraction (UREX), coextraction (COEX), thorium extraction (THOREX), and PYROX (an electrochemical refining method) reprocessing schemes. This paper provides amore » set of figures of merit for evaluating material attractiveness that covers a broad range of proliferant state and subnational group capabilities. The primary conclusion of this paper is that all fissile material must be rigorously safeguarded to detect diversion by a state and must be provided the highest levels of physical protection to prevent theft by subnational groups; no 'silver bullet' fuel cycle has been found that will permit the relaxation of current international safeguards or national physical security protection levels. The work reported herein has been performed at the request of the U.S. Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for, the nuclear materials in DOE nuclear facilities. The methodology and findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security is discussed.« less

  14. Design of remote car anti-theft system based on ZigBee

    NASA Astrophysics Data System (ADS)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  15. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs

    PubMed Central

    Paul, Manabi

    2017-01-01

    Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources. PMID:28178276

  16. 76 FR 61147 - Advisory Committee to the Internal Revenue Service; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-03

    ...-resident alien taxation and tax reporting, withholding tax issues, identity theft, tax credit bonds... changes may preclude advance notice. Due to limited seating and security requirements, please call or e...

  17. [Background and practical use of the assessment of identity development in adolescence (AIDA)].

    PubMed

    Birkhölzer, Marc; Goth, Kirstin; Schrobildgen, Christian; Schmeck, Klaus; Schlüter-Müller, Susanne

    2015-01-01

    A paradigm shift towards early detection and intervention of personality disorders in adolescence to prevent persistent and chronic suffering is currently taking place. Aside further distinct areas of impaired psychosocial integrity, disturbed identity development is seen as one core component of personality disorders. Thus, the detection of early antecedents of impaired identity development is an important step to allow for early intervention. The self-report questionnaire Assessment of Identity Development in Adolescence (AIDA) is a reliable and valid diagnostic instrument to detect disturbed identity development. This questionnaire allows for global assessment of identity and a differentiation in fundamental subdomains as well and distinguishes between identity diffusion on one side and consolidated and stable identity on the other. In clinical practice, it supports the differentiation between severely disturbed identity as the core component of personality disorders and identity crisis or stable identity development that can be found in other mental disorders.

  18. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... a separate encrypted message to the body control module, the PEP/RFA module and the PCM. Ford... for the Volvo S60 for MYs 2006-2008 are 1.3803, 0.6907 and 2.3543 respectively. Using an average of 3...(a)(3): Promoting activation; preventing defeat or circumvention of the device by unauthorized...

  19. Prevention for HIV-Seropositive Persons: Successive Approximation Toward a New Identity

    ERIC Educational Resources Information Center

    Lightfoot, Marguerita; Rotheram-Borus, Mary Jane; Milburn, Norweeta G.; Swendeman, Dallas

    2005-01-01

    This article presents a three-module intervention based on social action theory that focuses on health promotion and social identity formation for seropositive youth. The modules are designed to reduce transmission of HIV by reducing sexual and substance abuse acts, increasing healthy acts and adherence to care, and maintaining positive behavioral…

  20. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    ERIC Educational Resources Information Center

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  1. Gender Identity Disparities in Cancer Screening Behaviors.

    PubMed

    Tabaac, Ariella R; Sutter, Megan E; Wall, Catherine S J; Baker, Kellan E

    2018-03-01

    Transgender (trans) and gender-nonconforming adults have reported reduced access to health care because of discrimination and lack of knowledgeable care. This study aimed to contribute to the nascent cancer prevention literature among trans and gender-nonconforming individuals by ascertaining rates of breast, cervical, prostate, and colorectal cancer screening behaviors by gender identity. Publicly available de-identified data from the 2014-2016 Behavioral Risk Factor Surveillance System surveys were utilized to evaluate rates of cancer screenings by gender identity, while controlling for healthcare access, sociodemographics, and survey year. Analyses were conducted in 2017. Weighted chi-square tests identified significant differences in the proportion of cancer screening behaviors by gender identity among lifetime colorectal cancer screenings, Pap tests, prostate-specific antigen tests, discussing prostate-specific antigen test advantages/disadvantages with their healthcare provider, and up-to-date colorectal cancer screenings and Pap tests (p<0.036). Weighted logistic regressions found that although some differences based on gender identity were fully explained by covariates, trans women had reduced odds of having up-to-date colorectal cancer screenings compared to cisgender (cis) men (AOR=0.20) and cis women (AOR=0.24), whereas trans men were more likely to ever receive a sigmoidoscopy/colonoscopy as compared to cis men (AOR=2.76) and cis women (AOR=2.65). Trans women were more likely than cis men to have up-to-date prostate-specific antigen tests (AOR=3.19). Finally, trans men and gender-nonconforming individuals had reduced odds of lifetime Pap tests versus cis women (AOR=0.14 and 0.08, respectively), and gender-nonconforming individuals had lower odds of discussing prostate-specific antigen tests than cis men (AOR=0.09; all p<0.05). The findings indicate that gender identity disparities in cancer screenings persist beyond known sociodemographic and healthcare

  2. 27 CFR 19.623 - Records of inventories.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... of the inventory; (2) The identity of the container(s); (3) The kind and quantity of spirits, denatured spirits, and wines; (4) Any losses (whether by theft, voluntary destruction or otherwise), gains...

  3. 75 FR 61853 - Advisory Committee to the Internal Revenue Service; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... taxation and tax reporting, withholding tax issues, Identity Theft, Form 1099-DIV, Box 10, foreign tax paid... basis allocation for direct rollovers. Last minute agenda changes may preclude advance notice. Due to...

  4. 12 CFR 41.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... consumer report information. In addition, the purpose of this part is to specify the extent to which... national banks must take to combat consumer fraud and related crimes, including identity theft. (b...

  5. Acculturative dissonance, ethnic identity, and youth violence.

    PubMed

    Le, Thao N; Stockdale, Gary

    2008-01-01

    Studies suggest that the process of acculturation for immigrant youth, particularly for second-generation youth, is significantly associated with delinquency and violence. This study explored the acculturation-violence link with respect to acculturative dissonance and ethnic identity. The results revealed in a sample of 329 Chinese, Cambodian, Mien/Laotian, and Vietnamese youth that acculturative dissonance was significantly predictive of serious violence, with full mediation through peer delinquency. Ethnic identity was not significantly associated with peer delinquency or serious violence. Although acculturative dissonance and ethnic identity accounted for a small percentage of variance in violence compared with peer delinquency, it cannot be discounted as trivial. Structural equation analyses provided support for both measurement and structural invariance across the four ethnic groups, lending support for cross-cultural comparisons. The results also lend support for the inclusion of cultural factors in youth violence prevention and intervention efforts. 2008 APA

  6. 32 CFR 310.14 - Notification when information is lost, stolen, or compromised.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., social security numbers, and dates of birth are involved, it is critical that the individual be advised... the Federal Trade Commission's public Web site on identity theft at http://www.consumer.gov/idtheft...

  7. 39 CFR 762.42 - Request for substitute disbursement postal money orders; requirements for undertaking of indemnity.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... the following classes of cases: (1) If the Postal Service is satisfied that the loss, theft... Service is satisfied as to the identity of the Disbursement Postal Money Order presented and that any...

  8. 12 CFR 222.83 - Disposal of consumer information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Duties of Users of Consumer Reports Regarding Identity Theft § 222.83 Disposal of consumer information. (a) Definitions as used in this section. (1) You means...

  9. 5 CFR 1690.15 - Freezing an account-administrative holds.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the death of a participant; (4) Upon suspicion or knowledge of fraudulent account activity or identity theft; (5) In response to litigation pertaining to an account; (6) For operational reasons (e.g., to...

  10. 39 CFR 762.42 - Request for substitute disbursement postal money orders; requirements for undertaking of indemnity.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the following classes of cases: (1) If the Postal Service is satisfied that the loss, theft... Service is satisfied as to the identity of the Disbursement Postal Money Order presented and that any...

  11. 5 CFR 1690.15 - Freezing an account-administrative holds.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... the death of a participant; (4) Upon suspicion or knowledge of fraudulent account activity or identity theft; (5) In response to litigation pertaining to an account; (6) For operational reasons (e.g., to...

  12. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... prohibitions to be applied and the means of enforcing them; (3) The means used to establish the identity of... individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for any other reason... establish his or her identity in accordance with this part or to account for his or her presence. Any such...

  13. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... prohibition to be applied and the means of enforcing them; (3) The means used to establish the identity of... individual's claim of loss or theft. (3) If an individual cannot present his or her TWIC for any other reason..., upon the request of vessel personnel or a law enforcement officer, to establish his or her identity in...

  14. Lead theft--a study of the "uniqueness" of lead from church roofs.

    PubMed

    Bond, John W; Hainsworth, Sarah V; Lau, Tien L

    2013-07-01

    In the United Kingdom, theft of lead is common, particularly from churches and other public buildings with lead roofs. To assess the potential to distinguish lead from different sources, 41 samples of lead from 24 church roofs in Northamptonshire, U.K, have been analyzed for relative abundance of trace elements and isotopes of lead using X-ray fluorescence (XRF) and inductively coupled plasma mass spectrometry, respectively. XRF revealed the overall presence of 12 trace elements with the four most abundant, calcium, phosphorus, silicon, and sulfur, showing a large weight percentage standard error of the mean of all samples suggesting variation in the weight percentage of these elements between different church roofs. Multiple samples from the same roofs, but different lead sheets, showed much lower weight percentage standard errors of the mean suggesting similar trace element concentrations. Lead isotope ratios were similar for all samples. Factors likely to affect the occurrence of these trace elements are discussed. © 2013 American Academy of Forensic Sciences.

  15. Worldview, Identity, and Prevention in American Indian Communities.

    ERIC Educational Resources Information Center

    Sage, Grace Powless

    Those who come from non-American Indian cultures have dominated traditional models for healing and prevention. The assumption that current training strategies, program manuals, and levels of competence with regard to cross-cultural skills and knowledge are sufficient is arguable. If training programs for mental health, physical health, and…

  16. Children and End-State Renal Disease (ERSD)

    MedlinePlus

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... last 3 years by working and paying Social Security taxes. You (or your spouse) are getting, or ...

  17. The President’s Identity Theft Task Force Report

    DTIC Science & Technology

    2008-09-01

    effeCtIve, RISk-BASed ReSPOnSeS tO dAtA BReACheS SUffeRed By fedeRAl AGenCIeS Issue Data Breach Guidance to Agencies Publish a “Routine Use...and developing a data breach response plan. The FTC will continue to seek opportunities to work with state and local officials and policymakers...of fiscal year 2008. ReCOMMendAtIOn 4: enSURe effeCtIve, RISk-BASed ReSPOnSeS tO dAtA BReACheS SUffeRed By fedeRAl AGenCIeS The Task Force

  18. No Identity Theft in Health Care Act of 2013

    THOMAS, 113th Congress

    Rep. Holding, George [R-NC-13

    2013-12-04

    House - 01/27/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Identity Theft: Gentrification, Latinidad, and American Girl Marisol Luna

    ERIC Educational Resources Information Center

    Rudolph, Jennifer Domino

    2009-01-01

    Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll's accompanying narrative depicts her Chicago neighborhood of Pilsen as "dangerous" and recounts her family's move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of…

  20. Medicare

    MedlinePlus

    ... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... the U.S. Centers for Medicare & Medicaid Services. 7500 Security Boulevard, Baltimore, MD 21244 Sign Up / Change Plans ...

  1. Constructing nurses' professional identity through social identity theory.

    PubMed

    Willetts, Georgina; Clarke, David

    2014-04-01

    The profession of nursing continues to struggle with defining and clarifying its professional identity. The definitive recognition of nursing as a profession was the moving of training from the hospital apprentice model to the tertiary sector. However, this is only part of the story of professional identity in nursing. Once training finishes and enculturation into the workplace commences, professional identity becomes a complicated social activity. This paper proposes social identity theory as a valuable research framework to assist with clarifying and describing the professional identity of nurses. The paper outlines the key elements of a profession and then goes on to describe the main concepts of social identity theory. Lastly, a connection is made between the usefulness of using social identity theory in researching professional identity in nursing, recognizing the contextual nature of the social activity of the profession within its workplace environment. © 2013 Wiley Publishing Asia Pty Ltd.

  2. Federal Trade Commission

    MedlinePlus

    ... a Consumer Complaint Report Identity Theft Get Your Free Credit Report Register for Do Not Call Get Scam Alerts ... File a claim if you were scammed via money transfer Ed tech, Privacy Workshop FTC, Department of ...

  3. Prevalence of Past-Year Sexual Assault Victimization Among Undergraduate Students: Exploring Differences by and Intersections of Gender Identity, Sexual Identity, and Race/Ethnicity.

    PubMed

    Coulter, Robert W S; Mair, Christina; Miller, Elizabeth; Blosnich, John R; Matthews, Derrick D; McCauley, Heather L

    2017-08-01

    A critical step in developing sexual assault prevention and treatment is identifying groups at high risk for sexual assault. We explored the independent and interaction effects of sexual identity, gender identity, and race/ethnicity on past-year sexual assault among college students. From 2011 to 2013, 71,421 undergraduate students from 120 US post-secondary education institutions completed cross-sectional surveys. We fit multilevel logistic regression models to examine differences in past-year sexual assault. Compared to cisgender (i.e., non-transgender) men, cisgender women (adjusted odds ratios [AOR] = 2.47; 95% confidence interval [CI] 2.29, 2.68) and transgender people (AOR = 3.93; 95% CI 2.68, 5.76) had higher odds of sexual assault. Among cisgender people, gays/lesbians had higher odds of sexual assault than heterosexuals for men (AOR = 3.50; 95% CI 2.81, 4.35) but not for women (AOR = 1.13; 95% CI 0.87, 1.46). People unsure of their sexual identity had higher odds of sexual assault than heterosexuals, but effects were larger among cisgender men (AOR = 2.92; 95% CI 2.10, 4.08) than cisgender women (AOR = 1.68; 95% CI 1.40, 2.02). Bisexuals had higher odds of sexual assault than heterosexuals with similar magnitude among cisgender men (AOR = 3.19; 95% CI 2.37, 4.27) and women (AOR = 2.31; 95% CI 2.05, 2.60). Among transgender people, Blacks had higher odds of sexual assault than Whites (AOR = 8.26; 95% CI 1.09, 62.82). Predicted probabilities of sexual assault ranged from 2.6 (API cisgender men) to 57.7% (Black transgender people). Epidemiologic research and interventions should consider intersections of gender identity, sexual identity, and race/ethnicity to better tailor sexual assault prevention and treatment for college students.

  4. Resolving an identity crisis: Implicit drinking identity and implicit alcohol identity are related but not the same.

    PubMed

    Ramirez, Jason J; Olin, Cecilia C; Lindgren, Kristen P

    2017-09-01

    Two variations of the Implicit Association Test (IAT), the Drinking Identity IAT and the Alcohol Identity IAT, assess implicit associations held in memory between one's identity and alcohol-related constructs. Both have been shown to predict numerous drinking outcomes, but these IATs have never been directly compared to one another. The purpose of this study was to compare these IATs and evaluate their incremental predictive validity. US undergraduate students (N=64, 50% female, mean age=21.98years) completed the Drinking Identity IAT, the Alcohol Identity IAT, an explicit measure of drinking identity, as well as measures of typical alcohol consumption and hazardous drinking. When evaluated in separate regression models that controlled for explicit drinking identity, results indicated that the Drinking Identity IAT and the Alcohol Identity IAT were significant, positive predictors of typical alcohol consumption, and that the Drinking Identity IAT, but not the Alcohol Identity IAT, was a significant predictor of hazardous drinking. When evaluated in the same regression models, the Drinking Identity IAT, but not the Alcohol Identity IAT, was significantly associated with typical and hazardous drinking. These results suggest that the Drinking Identity IAT and Alcohol Identity IAT are related but not redundant. Moreover, given that the Drinking Identity IAT, but not the Alcohol Identity IAT, incrementally predicted variance in drinking outcomes, identification with drinking behavior and social groups, as opposed to identification with alcohol itself, may be an especially strong predictor of drinking outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. 78 FR 78512 - Privacy Act of 1974, as Amended; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-26

    ... Purpose(s): The purpose of this system of records is to establish a manual and electronic database that..., identity theft or fraud, or harm to the security or integrity of this system or other systems or programs...

  6. [Womanhood today--identity experiences and identity crises].

    PubMed

    Kast, V

    1985-01-01

    Modern women's identity crises and the various possibilities of identification along the way towards a new identity can be seen as her attempts to develop out of the depressive situation that her once normal role identity had, to a large extent, placed her in. Under this aspect, even concepts of living that are seen by many to be problematic can be justified as leading along the way towards identity, which is so essential for human relationships and interpersonal empathy.

  7. The Importance of Orientation: Implications of Professional Identity on Classroom Practice and for Professional Learning

    ERIC Educational Resources Information Center

    Hsieh, Betina

    2015-01-01

    Previous work on new teacher professional identity has focused on identity as a process of negotiation between individual and contextual factors. These negotiations are often filled with a struggle between personal agency and structures that prevent the enactment of an ideal professional self. This study introduces and discusses three teacher…

  8. Gender identity, healthcare access, and risk reduction among Malaysia's mak nyah community.

    PubMed

    Gibson, Britton A; Brown, Shan-Estelle; Rutledge, Ronnye; Wickersham, Jeffrey A; Kamarulzaman, Adeeba; Altice, Frederick L

    2016-01-01

    Transgender women (TGW) face compounded levels of stigma and discrimination, resulting in multiple health risks and poor health outcomes. TGW identities are erased by forcing them into binary sex categories in society or treating them as men who have sex with men (MSM). In Malaysia, where both civil and religious law criminalise them for their identities, many TGW turn to sex work with inconsistent prevention methods, which increases their health risks. This qualitative study aims to understand how the identities of TGW sex workers shapes their healthcare utilisation patterns and harm reduction behaviours. In-depth, semi-structured interviews were conducted with 21 male-to-female transgender (mak nyah) sex workers in Malaysia. Interviews were transcribed, translated into English, and analysed using thematic coding. Results suggest that TGW identity is shaped at an early age followed by incorporation into the mak nyah community where TGW were assisted in gender transition and introduced to sex work. While healthcare was accessible, it failed to address the multiple healthcare needs of TGW. Pressure for gender-affirming health procedures and fear of HIV and sexually transmitted infection screening led to potentially hazardous health behaviours. These findings have implications for developing holistic, culturally sensitive prevention and healthcare services for TGW.

  9. Secondary Metal Theft Prevention Act of 2009

    THOMAS, 111th Congress

    Sen. Klobuchar, Amy [D-MN

    2009-02-11

    Senate - 02/11/2009 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Crime Prevention Teaching Kit #2.

    ERIC Educational Resources Information Center

    Commercial Union Insurance Companies, Boston, MA.

    Three lesson plans for grades seven through nine explore the social, moral, and financial impact of auto and bicycle theft and drinking and driving. Used individually or together as a complete unit, the lesson plans contain dramatic skits derived from real-life experiences of adolescents. Students simulate tough decision making in the face of…

  11. 16 CFR 682.2 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT DISPOSAL OF CONSUMER REPORT... consumer fraud and related harms, including identity theft, created by improper disposal of consumer... jurisdiction, that, for a business purpose, maintains or otherwise possesses consumer information. ...

  12. Gender identity, healthcare access, and risk reduction among Malaysia’s mak nyah community

    PubMed Central

    Gibson, Britton A.; Brown, Shan-Estelle; Rutledge, Ronnye; Wickersham, Jeffrey A.; Kamarulzaman, Adeeba; Altice, Frederick L.

    2016-01-01

    Transgender women (TGW) face compounded levels of stigma and discrimination, resulting in multiple health risks and poor health outcomes. TGW identities are erased by forcing them into binary sex categories in society or treating them as men who have sex with men (MSM). In Malaysia, where both civil and religious law criminalize them for their identities, many TGW turn to sex work with inconsistent prevention methods, which increases their health risks. This qualitative study aims to understand how the identities of TGW sex workers shapes their healthcare utilization patterns and harm reduction behaviours. In-depth, semi-structured interviews were conducted with 21 male-to-female transgender (mak nyah) sex workers in Malaysia. Interviews were transcribed, translated into English, and analysed using thematic coding. Results suggest that TGW identity is shaped at an early age followed by incorporation into the mak nyah community where TGW were assisted in gender transition and introduced to sex work. While healthcare was accessible, it failed to address the multiple healthcare needs of TGW. Pressure for gender-affirming health procedures and fear of HIV and sexually transmitted infection screening led to potentially hazardous health behaviours. These findings have implications for developing holistic, culturally-sensitive prevention and healthcare services for TGW. PMID:26824463

  13. What's culture got to do with it? Prevention programs for African American adolescent girls.

    PubMed

    Corneille, Maya A; Ashcroft, Amie M; Belgrave, Faye Z

    2005-11-01

    This paper examines prevention programming for African American girls by placing the prevention process within the larger African and African American cultural context. We provide an overview of the theories and issues we consider most relevant to African American culture, including Africentric theory, ethnic identity, gender identity and relational theory, developmental issues, the community context, and historical considerations. Drawing from our own drug prevention work, we provide examples of how to incorporate culture into prevention programs to make them most relevant for the target population. We also summarize our own efforts to create culturally appropriate prevention interventions and their impact on the girls in our programs. We conclude with suggested directions for future research into culture-specific prevention programs.

  14. De La Salle Christian Brothers' Experiences of Catholic Identity in Higher Education in the United States

    ERIC Educational Resources Information Center

    Kier, Scott A.

    2012-01-01

    Catholic identity is considered to be the single most important issue facing Catholic higher education in the United States. Scholars (Burtchaell, 1998; Gallin, 1999; Gleason, 1995; Heft, 2003; Marsden, 1994; O'Brien, 1994) have suggested that sustaining Catholic identity and preventing secularization depends on the integration of the…

  15. 78 FR 7804 - Privacy Act of 1974; as amended; Notice to Amend an Existing System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Indian Irrigation projects are constructed, including name, social security number, account/ID, whether... information, including name of debtor, address, tax identification number, social security number, ownership... suspected or confirmed compromise there is a risk of harm to economic or property interest, identity theft...

  16. 75 FR 35853 - Privacy Act of 1974: Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-23

    ..., investment advisers, investment companies, self-regulatory organizations, clearing agencies, nationally... securities laws and with rules of self-regulatory organizations and clearing agencies. Records may also... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or...

  17. Social identity change: shifts in social identity during adolescence.

    PubMed

    Tanti, Chris; Stukas, Arthur A; Halloran, Michael J; Foddy, Margaret

    2011-06-01

    This study investigated the proposition that adolescence involves significant shifts in social identity as a function of changes in social context and cognitive style. Using an experimental design, we primed either peer or gender identity with a sample of 380 early- (12-13 years), mid- (15-16 years), and late-adolescents (18-20 years) and then measured the effect of the prime on self-stereotyping and ingroup favouritism. The findings showed significant differences in social identity across adolescent groups, in that social identity effects were relatively strong in early- and late-adolescents, particularly when peer group identity rather than gender identity was salient. While these effects were consistent with the experience of change in educational social context, differences in cognitive style were only weakly related to ingroup favouritism. The implications of the findings for theory and future research on social identity during adolescence are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.

  18. Anti-theft device staining on banknotes detected by mass spectrometry imaging.

    PubMed

    Correa, Deleon Nascimento; Zacca, Jorge Jardim; Rocha, Werickson Fortunato de Carvalho; Borges, Rodrigo; de Souza, Wanderley; Augusti, Rodinei; Eberlin, Marcos Nogueira; Vendramini, Pedro Henrique

    2016-03-01

    We describe the identification and limits of detection of ink staining by mass spectrometry imaging (MSI), as used in anti-theft devices (ATDs). Such ink staining is applied to banknotes during automated teller machine (ATM) explosions. Desorption electrospray ionization (DESI) coupled with high-resolution and high-accuracy orbitrap mass spectrometry (MS) and a moving stage device were applied to obtain 2D molecular images of the major dyes used for staining, that is, 1-methylaminoanthraquinone (MAAQ), rhodamine B (RB) and rhodamine 6G (R6G). MAAQ could not be detected because of its inefficient desorption by DESI from the banknote cellulose surface. By contrast, ATD staining on banknotes is perceptible by the human naked eye only at concentrations higher than 0.2 μg cm(-2), whereas both RB and R6G at concentrations 200 times lower (as low as 0.001 μg cm(-2)) could be easily detected and imaged by DESI-MSI, with selective and specific identification of each analyte and their spatial distribution on samples from suspects. This technique is non-destructive, and no sample preparation is required, which ensures sample preservation for further forensic investigations. Copyright © 2016. Published by Elsevier Ireland Ltd.

  19. Comparative Associations Between Achieved Bicultural Identity, Achieved Ego Identity, and Achieved Religious Identity and Adaptation Among Australian Adolescent Muslims.

    PubMed

    Abu-Rayya, Hisham M; Abu-Rayya, Maram H; White, Fiona A; Walker, Richard

    2018-04-01

    This study examined the comparative roles of biculturalism, ego identity, and religious identity in the adaptation of Australian adolescent Muslims. A total of 504 high school Muslim students studying at high schools in metropolitan Sydney and Melbourne, Australia, took part in this study which required them to complete a self-report questionnaire. Analyses indicated that adolescent Muslims' achieved religious identity seems to play a more important role in shaping their psychological and socio-cultural adaptation compared to adolescents' achieved bicultural identity. Adolescents' achieved ego identity tended also to play a greater role in their psychological and socio-cultural adaptation than achieved bicultural identity. The relationships between the three identities and negative indicators of psychological adaptation were consistently indifferent. Based on these findings, we propose that the three identity-based forces-bicultural identity development, religious identity attainment, and ego identity formation-be amalgamated into one framework in order for researchers to more accurately examine the adaptation of Australian adolescent Muslims.

  20. Swiss identity smells like chocolate: Social identity shapes olfactory judgments

    PubMed Central

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J.

    2016-01-01

    There is extensive evidence that social identities can shape people’s attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties—namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased—but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception. PMID:27725715

  1. Swiss identity smells like chocolate: Social identity shapes olfactory judgments.

    PubMed

    Coppin, Géraldine; Pool, Eva; Delplanque, Sylvain; Oud, Bastiaan; Margot, Christian; Sander, David; Van Bavel, Jay J

    2016-10-11

    There is extensive evidence that social identities can shape people's attitudes and behavior, but what about sensory judgments? We examined the possibility that social identity concerns may also shape the judgment of non-social properties-namely, olfactory judgment. In two experiments, we presented Swiss and non-Swiss participants with the odor of chocolate, for which Switzerland is world-famous, and a control odor (popcorn). Swiss participants primed with Swiss identity reported the odor of chocolate (but not popcorn) as more intense than non-Swiss participants (Experiments 1 and 2) and than Swiss participants primed with individual identity or not primed (Experiment 2). The self-reported intensity of chocolate smell tended to increase as identity accessibility increased-but only among Swiss participants (Experiment 1). These results suggest that identity priming can counter-act classic sensory habituation effects, allowing identity-relevant smells to maintain their intensity after repeated presentations. This suggests that social identity dynamically influences sensory judgment. We discuss the potential implications for models of social identity and chemosensory perception.

  2. Play a Part in Crime Prevention.

    ERIC Educational Resources Information Center

    Commercial Union Insurance Companies, Boston, MA.

    These units of study will help students in grades five through nine understand the effects various crimes have on individuals, families, and communities. They can be used by teachers, police departments, boy and girl scouts, and community groups. The units deal with shoplifting, buying stolen goods, employee theft, and vandalism. Each lesson…

  3. Risky sexual behaviors: The role of ethnic identity in HIV risk in migrant workers.

    PubMed

    Shehadeh, Nancy; McCoy, H Virginia

    2014-01-01

    Migrant workers have been shown to be at a heightened level of risk for HIV, and ethnic identity has been posited to have an impact on engagement in risky sexual behaviors. Our longitudinal study examined associations between baseline and short-term changes in ethnic identity and high-risk sexual behaviors. Baseline (n = 431) and 6-month assessment (n = 270) data were obtained from a larger HIV prevention study conducted among African American and Hispanic migrant workers. Repeated-measures multivariate analysis of covariance and multiple linear regressions were used. Ethnic identity explore, a subscale of ethnic identity, was a significant predictor of overall sexual risk [F(8, 422) = 6.953, p < .001] and unprotected vaginal acts [F(8, 422) = 8.444, p < .001] at baseline. However, ethnic identity had no bearing on changes in risky sexual behaviors. Ethnic identity explore was associated with safer sexual behaviors. Copyright © 2014 Association of Nurses in AIDS Care. Published by Elsevier Inc. All rights reserved.

  4. Characterization of anti-theft devices directly from the surface of banknotes via easy ambient sonic spray ionization mass spectrometry.

    PubMed

    Schmidt, Eduardo Morgado; Franco, Marcos Fernando; Cuelbas, Claudio José; Zacca, Jorge Jardim; de Carvalho Rocha, Werickson Fortunato; Borges, Rodrigo; de Souza, Wanderley; Sawaya, Alexandra Christine Helena Frankland; Eberlin, Marcos Nogueira; Correa, Deleon Nascimento

    2015-09-01

    Using Brazilian banknotes as a test case, forensic examination and identification of Rhodamine B dye anti-theft device (ATD) staining on banknotes were performed. Easy ambient sonic spray ionization mass spectrometry (EASI-MS) was used since it allows fast and simple analysis with no sample preparation providing molecular screening of the surface with direct desorption and ionization of the security dye. For a more accurate molecular characterization of the ATD dye, Q Exactive Orbitrap™ Fourier transform (tandem) mass spectrometry using eletrospray ionization (ESI-HRMS/MS) was also applied. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  5. 77 FR 49444 - Agency Information Collection Activities: Proposed Collection Renewal; Comment Request (3064-0152)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ...: Office of Information and Regulatory Affairs, Office of Management and Budget, New Executive Office... regarding identity theft with respect to their account holders and customers; (ii) regulations requiring... implementing the guidelines to identify possible risks to account holders or customers or to the safety and...

  6. 12 CFR 1022.121 - Active duty alerts.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Active duty alerts. 1022.121 Section 1022.121... Consumer Reporting Agencies Regarding Identity Theft § 1022.121 Active duty alerts. (a) Duration. The duration of an active duty alert shall be twelve months. ...

  7. 12 CFR 1022.121 - Active duty alerts.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Active duty alerts. 1022.121 Section 1022.121... Consumer Reporting Agencies Regarding Identity Theft § 1022.121 Active duty alerts. (a) Duration. The duration of an active duty alert shall be twelve months. ...

  8. 76 FR 7239 - Proposed Privacy Act Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-09

    ... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... notice of a proposed system of records entitled, ``Treasury/DO .225 --TARP Fraud Investigation...: Supervisory Fraud Specialist, Office of Financial Stability, 1500 Pennsylvania Avenue, NW., Washington, DC...

  9. Identity Conflict and Sexual Risk for Black and Latino YMSM.

    PubMed

    Corsbie-Massay, Charisse L'Pree; Miller, Lynn C; Christensen, John L; Appleby, Paul R; Godoy, Carlos; Read, Stephen J

    2017-06-01

    Young (aged 18-30) Black and Latino men who have sex with men are at a higher risk of contracting HIV than their White counterparts. In order to better understand the unique nature of sexual risk-taking, we examined the extent to which ethnic group, ethnic identity, and sexual pride predicted condomless anal sex with casual partners among 161 young men who have sex with men (YMSM) who identify as Black or Latino. Negative binomial regressions were conducted using a cross-sectional design. Sexual pride was a negative predictor of condomless anal sex across all participants, but this effect was moderated by ethnic exploration and ethnic group; the relationship between sexual pride and condomless anal sex was strengthened by greater ethnic exploration among Latino YMSM, and weakened by greater ethnic exploration among Black YMSM. Implications for intersectional identity, identity conflict, and HIV prevention among young gay men of color are discussed.

  10. Targeting and tailoring message-framing: the moderating effect of racial identity on receptivity to colorectal cancer screening among African-Americans.

    PubMed

    Lucas, Todd; Manning, Mark; Hayman, Lenwood W; Blessman, James

    2018-06-07

    This study demonstrates the potential of racial identity to moderate how gain and loss-framed messaging, as well as culturally-targeted messaging, can affect receptivity to preventive health screening. African-Americans (N = 132) who were noncompliant with recommended colorectal cancer (CRC) screening completed a measure of racial identity centrality-encompassing the extent to which racial identity is a core component of self-concept-and then participated in an online education module about CRC screening, during which either gain or loss-framed messaging was introduced. Half of African-Americans were also exposed to a culturally-targeted self-help message about preventing CRC. Theory of Planned Behavior measures of attitudes, normative beliefs, perceived behavioral control, and intentions to obtain a CRC screen served as outcomes. Results confirmed that effects of messaging on receptivity to CRC screening depended on racial identity. Among low racial identity African Americans, gain-framed messaging most effectively increased normative beliefs about obtaining CRC screening, whereas among high racial identity African Americans loss-framed messaging was most compelling. However, these effects most strongly emerged when culturally-targeted self-help messaging was included. We discuss implications for health disparities theory and research, including a potential to simultaneously deploy culturally-targeted and tailored messaging based on racial identity.

  11. IdentityMap Visualization of the Super Identity Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    The Super Identity Model is a collaboration with six United Kingdom universities to develop use cases used to piece together a person's identity across biological, cyber, psychological, and biographical domains. PNNL visualized the model in a web-based application called IdentityMap. This is the first step in a promising new field of research. Interested future collaborators are welcome to find out more by emailing superid@pnnl.gov.

  12. IdentityMap Visualization of the Super Identity Model

    ScienceCinema

    None

    2018-06-08

    The Super Identity Model is a collaboration with six United Kingdom universities to develop use cases used to piece together a person's identity across biological, cyber, psychological, and biographical domains. PNNL visualized the model in a web-based application called IdentityMap. This is the first step in a promising new field of research. Interested future collaborators are welcome to find out more by emailing superid@pnnl.gov.

  13. Mistaken identity: activating conservative political identities induces "conservative" financial decisions.

    PubMed

    Morris, Michael W; Carranza, Erica; Fox, Craig R

    2008-11-01

    Four studies investigated whether activating a social identity can lead group members to choose options that are labeled in words associated with that identity. When political identities were made salient, Republicans (but not Democrats) became more likely to choose the gamble or investment option labeled "conservative." This shift did not occur in a condition in which the same options were unlabeled. Thus, the mechanism underlying the effect appears to be not activated identity-related values prioritizing low risk, but rather activated identity-related language (the group label "conservative"). Indeed, when political identities were salient, Republicans favored options labeled "conservative" regardless of whether the options were low or high risk. Finally, requiring participants to explain the label "conservative" before making their choice did not diminish the effect, which suggests that it does not merely reflect inattention to content or construct accessibility. We discuss the implications of these results for the literatures on identity, priming, choice, politics, and marketing.

  14. Cyber-Gap

    ERIC Educational Resources Information Center

    Salomon-Fernandez, Yves

    2014-01-01

    Within the information technology sector, cybersecurity is considered its own supersector. As information becomes increasingly digitized and a growing array of transactions can be completed in the cloud, people, governments and enterprises become increasingly more vulnerable. The Identity Theft Resources Center (ITRC) reports nearly 5,000 breaches…

  15. 12 CFR 1022.121 - Active duty alerts.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Active duty alerts. 1022.121 Section 1022.121... Consumer Reporting Agencies Regarding Identity Theft § 1022.121 Active duty alerts. (a) Duration. The duration of an active duty alert shall be twelve months. (b) [Reserved] ...

  16. 76 FR 1507 - Departmental Offices; Privacy Act of 1974, as Amended

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    ... governmental, Tribal, self-regulatory or professional organizations if that organization has jurisdiction over... or confirmed compromise there is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  17. 76 FR 31222 - Identification of Enforceable Rules and Orders

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... Reporting Act, except with respect to Part 681 (Identity Theft Rules), Part 682 (Disposal of Consumer Report... BUREAU OF CONSUMER FINANCIAL PROTECTION 12 CFR Chapter X [Docket No.: CFPB-HQ-2011-1] Identification of Enforceable Rules and Orders AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice...

  18. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0031] Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011...

  19. Design of anti-theft/cable cut real time alert system for copper cable using microcontroller and GSM technology

    NASA Astrophysics Data System (ADS)

    Lim, E. K.; Norizan, M. N.; Mohamad, I. S.; Yasin, M. N. M.; Murad, S. A. Z.; Baharum, N. A.; Jamalullail, N.

    2017-09-01

    This paper presents the design of anti-theft/cable cut real time alert system using microcontroller and GSM technology. The detection part is using the electrical circuit wire connection in detecting the voltage drop of the cable inside the microcontroller digital input port. The GSM wireless modem is used to send the location of cable cut directly to the authority mobile phone. Microcontroller SK40C with Microchip PIC16F887 is used as a controller to control the wireless modem and also the detection device. The device is able to detect and display the location of the cable cut on the LCD display besides of and sending out the location of the cable break to the authority mobile phone wirelessly via SMS.

  20. A case control study: White-collar defendants compared with defendants charged with other nonviolent theft.

    PubMed

    Poortinga, Ernest; Lemmen, Craig; Jibson, Michael D

    2006-01-01

    We examined the clinical, criminal, and sociodemographic characteristics of all white-collar crime defendants referred to the evaluation unit of a state center for forensic psychiatry. With 29,310 evaluations in a 12-year period, we found 70 defendants charged with embezzlement, 3 with health care fraud, and no other white-collar defendants (based on the eight crimes widely accepted as white-collar offenses). In a case-control study design, the 70 embezzlement cases were compared with 73 defendants charged with other forms of nonviolent theft. White-collar defendants were found to have a higher likelihood of white race (adjusted odds ratio (adj. OR) = 4.51), more years of education (adj. OR = 3471), and a lower likelihood of substance abuse (adj. OR = .28) than control defendants. Logistic regression modeling showed that the variance in the relationship between unipolar depression and white-collar crime was more economically accounted for by education, race, and substance abuse.