Combating Memory Corruption Attacks On Scada Devices
NASA Astrophysics Data System (ADS)
Bellettini, Carlo; Rrushi, Julian
Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.
Execute-Only Attacks against Execute-Only Defenses
2015-11-13
attacks that have been widely used to bypass randomization-based memory corruption defenses. A recent technique, Readactor, provides one of the... corruption defenses with various impacts. We analyze the prevalence of opportunities for such attacks in popular code bases and build two proof-of-concept...our countermeasures introduce only a modest additional overhead. I. INTRODUCTION Memory corruption has been a primary vector of attacks against
Another Discussion about Academic Corruption
ERIC Educational Resources Information Center
Changgeng, Li
2007-01-01
Academic corruption is a commonplace matter about which all people are clearly aware. However, people often overlook many hidden or latent manifestations of academic corruption. This article discusses eight of these manifestations: indiscriminate use of the academic team spirit, the proliferation of "word games," deliberate attacks on…
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2014 CFR
2014-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2013 CFR
2013-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2012 CFR
2012-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
A framework for analyzing the impact of data integrity/quality on electricity market operations
NASA Astrophysics Data System (ADS)
Choi, Dae Hyun
This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.
ERIC Educational Resources Information Center
Xun, Gong
2007-01-01
Against the backdrop of the grave academic crisis in China, editors have become the objects of wooing, favor-currying, connections-seeking, and collusions; they have been targeted for attacks, plots, extortions, and encroachments. Editing and publishing have become avenues for academic irregularities and academic corruption. Editors have the power…
Scalar implicatures: working memory and a comparison with only
Marty, Paul P.; Chemla, Emmanuel
2013-01-01
A Scalar Implicature (SI) arises when the use of a relatively weak sentence (e.g., some politicians are corrupt) implies the denial of an alternative, stronger sentence (e.g., not all politicians are corrupt). The cognitive effort associated with the processing of SIs involves central memory resources (De Neys and Schaeken, 2007; Dieussaert et al., 2011; Marty et al., 2013). The goal of this study is to locate this previous result within the current psycholinguistic debate, and to understand at which level of SI processing these resources are specifically involved. Using a dual-task approach, we show that (1) tapping participant's memory resources interferes with the derivation of SIs, whereas (2) it does not affect the interpretation of sentences involving similar competition mechanisms between a sentence and potential alternatives through the use of only (e.g., only some politicians are corrupt). We explain how these findings suggest that the central memory resources are not involved in the core process at the source of SIs, and discuss how this difference between SIs and only bears on recent linguistic debates on the division of labor between grammar and pragmatics. PMID:23882230
Training for Terror: A Case Study of Al-Qaida
2002-03-01
Khaled Abou el Fadl, a law professor at the University of California at Los Angeles , states that bin Laden and the Taliban are selective in their... Rueda , 2001, p.20). 1. Al-Qaida Attack Chronology Al-Qaida gained notoriety in February 1993 for its bombing of the World Trade Center. This attack...overthrowing any regime that has been 35 corrupted by Western influence (Alexander, 2001, p.2). According to Alexander and Rueda , the following is a
A study of IEEE 802.15.4 security framework for wireless body area networks.
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358
Optically simulating a quantum associative memory
NASA Astrophysics Data System (ADS)
Howell, John C.; Yeazell, John A.; Ventura, Dan
2000-10-01
This paper discusses the realization of a quantum associative memory using linear integrated optics. An associative memory produces a full pattern of bits when presented with only a partial pattern. Quantum computers have the potential to store large numbers of patterns and hence have the ability to far surpass any classical neural-network realization of an associative memory. In this work two three-qubit associative memories will be discussed using linear integrated optics. In addition, corrupted, invented and degenerate memories are discussed.
Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lyle, Keith B.; Lustig, Cindy; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.
2010-01-01
More than 3,000 individuals from seven US cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, one week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas others demonstrate accelerated forgetting. The present paper indicates that (1) the rate of forgetting for flashbulb memories and event memory (memory for details about the event itself) slows after a year, (2) the strong emotional reactions elicited by flashbulb events are remembered poorly, worse than non-emotional features such as where and from whom one learned of the attack, and (3) the content of flashbulb and event memories stabilizes after a year. The results are discussed in terms of community memory practices. PMID:19397377
Security in MANETs using reputation-adjusted routing
NASA Astrophysics Data System (ADS)
Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William
2009-04-01
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.
ERIC Educational Resources Information Center
Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.
2009-01-01
More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…
The Front Line: Corruption of Youth or Ignorance in Action?
ERIC Educational Resources Information Center
Unks, Gerald
1981-01-01
The author decries the tactics of one-issue pressure groups seeking to censor sex education and other educational activities. He sees these groups as an anti-intellectual force attacking the free exchange of ideas, which is the major purpose and function of schools in a democracy. (SJL)
Improving the Rainbow Attack by Reusing Colours
NASA Astrophysics Data System (ADS)
Ågren, Martin; Johansson, Thomas; Hell, Martin
Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.
Libya’s Post-Qaddafi Transition: The Nation-Building Challenge
2012-01-01
corruption, and enable private enterprise to flourish in other areas, such as tourism . • The countries that helped Libya oust Qaddafi must com- mit to... gover - nance. International partners will continue to have a key role to play across all issues. The Benghazi attacks have focused both Libyan and
Information Security in the 1990s: Keeping the Locks on.
ERIC Educational Resources Information Center
Kovac, Ron J.
1999-01-01
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Hirst, William; Phelps, Elizabeth A; Meksin, Robert; Vaidya, Chandan J; Johnson, Marcia K; Mitchell, Karen J; Buckner, Randy L; Budson, Andrew E; Gabrieli, John D E; Lustig, Cindy; Mather, Mara; Ochsner, Kevin N; Schacter, Daniel; Simons, Jon S; Lyle, Keith B; Cuc, Alexandru F; Olsson, Andreas
2015-06-01
Within a week of the attack of September 11, 2001, a consortium of researchers from across the United States distributed a survey asking about the circumstances in which respondents learned of the attack (their flashbulb memories) and the facts about the attack itself (their event memories). Follow-up surveys were distributed 11, 25, and 119 months after the attack. The study, therefore, examines retention of flashbulb memories and event memories at a substantially longer retention interval than any previous study using a test-retest methodology, allowing for the study of such memories over the long term. There was rapid forgetting of both flashbulb and event memories within the first year, but the forgetting curves leveled off after that, not significantly changing even after a 10-year delay. Despite the initial rapid forgetting, confidence remained high throughout the 10-year period. Five putative factors affecting flashbulb memory consistency and event memory accuracy were examined: (a) attention to media, (b) the amount of discussion, (c) residency, (d) personal loss and/or inconvenience, and (e) emotional intensity. After 10 years, none of these factors predicted flashbulb memory consistency; media attention and ensuing conversation predicted event memory accuracy. Inconsistent flashbulb memories were more likely to be repeated rather than corrected over the 10-year period; inaccurate event memories, however, were more likely to be corrected. The findings suggest that even traumatic memories and those implicated in a community's collective identity may be inconsistent over time and these inconsistencies can persist without the corrective force of external influences. (c) 2015 APA, all rights reserved).
El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal
2016-11-01
Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving.
Flashbulb memories of the Paris attacks.
Gandolphe, Marie-Charlotte; El Haj, Mohamad
2017-06-01
Flashbulb memories are vivid autobiographical memories of the circumstances where an individual first learns about emotionally significant public events. Our paper assesses whether these memories were triggered by the attacks of Friday 13 November 2015 in Paris. Two hundred and ninety-one participants answered a web-based questionnaire that assessed their memory of the circumstances in which they first learned of the attacks. The questionnaire also assessed vividness, rehearsal, emotion, surprise and novelty. The results showed substantial and vivid recall of the context in which the participants first learned of the event. This recall was associated with fair rehearsal, negative emotional valence, surprise, and novelty. Regression analysis showed that the flashbulb recall was predicted by negative emotion. Negative emotion seems to play a key role in the formation of flashbulb memories, at least those associated with the Paris attacks. © 2017 Scandinavian Psychological Associations and John Wiley & Sons Ltd.
Random Visitor: Defense against Identity Attacks in P2P Networks
NASA Astrophysics Data System (ADS)
Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno
We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less
Flashbulb memories of Paris attacks
El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal
2016-01-01
Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395
Educational Morality: A Task of Resisting the Economic Corruption of Academic Excellence.
ERIC Educational Resources Information Center
Van Allen, George H.
Although the United States leads the world in spending for education, the quality of education is under attack from all quarters. On college campuses, the perceived necessity to maintain enrollment levels, and a post-60's reluctance to be selective in admissions contributed to waning academic standards. Economic interests have become the dominant…
Serial Dependence across Perception, Attention, and Memory.
Kiyonaga, Anastasia; Scimeca, Jason M; Bliss, Daniel P; Whitney, David
2017-07-01
Information that has been recently perceived or remembered can bias current processing. This has been viewed as both a corrupting (e.g., proactive interference in short-term memory) and stabilizing (e.g., serial dependence in perception) phenomenon. We hypothesize that this bias is a generally adaptive aspect of brain function that leads to occasionally maladaptive outcomes. Copyright © 2017 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wojahn, Christopher K.
2015-10-20
This HDL code (hereafter referred to as "software") implements circuitry in Xilinx Virtex-5QV Field Programmable Gate Array (FPGA) hardware. This software allows the device to self-check the consistency of its own configuration memory for radiation-induced errors. The software then provides the capability to correct any single-bit errors detected in the memory using the device's inherent circuitry, or reload corrupted memory frames when larger errors occur that cannot be corrected with the device's built-in error correction and detection scheme.
Evans, J; Wilson, B; Wraight, E P; Hodges, J R
1993-11-01
A patient had neuropsychological testing during, and at two days and seven weeks after a transient global amnesia (TGA) attack. During the attack she exhibited a characteristically profound anterograde amnesia but a limited remote memory loss; the most striking impairment was a deficit in personal episodic memory revealed by her performance on the Autobiographical Memory Interview. Personal and general semantic information was less impaired although there were indications of a temporal gradient in the impairment. When tested after the attack, she demonstrated normal anterograde and retrograde memory. A SPECT scan performed during TGA showed a focal reduction in cerebral perfusion in the postero-medial temporal lobes bilaterally which had resolved after seven weeks.
Ferré Romeu, Pilar
2006-05-01
In this study, I investigated students' memories of the terrorist attacks of September 11, 2001, carried out by Al Qaeda terrorists against the World Trade Center in New York and the Pentagon in Washington. Participants completed on two occasions (2 weeks and 8 months after the events took place) a memory questionnaire that included an assessment of the phenomenal richness of their memories. The results showed that the participants remembered very well the circumstances in which they first heard about the terrorist attacks, that they were very confident about this information, and that these memories were characterized by a high phenomenal richness. Over time, there was a decrease in all of these variables, but people's ratings of phenomenology and confidence were still very high.
Pfaltz, Monique C; Michael, Tanja; Meyer, Andrea H; Wilhelm, Frank H
2013-08-01
Panic attacks are frequently perceived as life threatening. Panic disorder (PD) patients may therefore experience symptoms of posttraumatic stress disorder (PTSD). The authors explored this in 28 healthy controls, 17 PTSD patients, and 24 PD patients with agoraphobia who completed electronic diaries 36 times during 1 week. Patient groups frequently reported dissociation as well as thoughts, memories, and reliving of their trauma or panic attacks. PTSD patients reported more trauma/panic attack thoughts (incidence rate ratio [IRR] = 2.9) and memories (IRR = 2.8) than PD patients. Patient groups relived their trauma or panic attacks equally frequently, and reported comparable bodily reactions and distress associated with trauma or panic attack memories. Clinical groups avoided trauma or panic attack reminders more often than healthy controls (avoidance of trauma- or panic attack-related thoughts (IRR = 8.0); avoidance of things associated with the trauma or panic attack (IRR = 40.7). PD patients avoided trauma or panic attack reminders less often than PTSD patients (avoidance of trauma- or panic attack-related thoughts [IRR = 2.5]; avoidance of things associated with the trauma or panic attack [IRR = 4.1]), yet these differences were nonsignificant when controlling for functional impairment. In conclusion, trauma-like symptoms are common in PD with agoraphobia and panic attacks may be processed similarly as trauma in PTSD. Copyright © 2013 International Society for Traumatic Stress Studies.
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin
2014-01-01
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058
Budson, Andrew E; Simons, Jon S; Waring, Jill D; Sullivan, Alison L; Hussoin, Trisha; Schacter, Daniel L
2007-10-01
Although there are many opportunities to study memory in patients with Alzheimer's disease (AD) in the laboratory, there are few opportunities to study memory for real world events in these patients. The September 11, 2001 terrorist attacks provided one such opportunity. Patients with AD, patients with mild cognitive impairment (MCI), and healthy older adults were given a telephone questionnaire in the initial weeks after the event, again three to four months later, and finally one year afterwards to evaluate their memory for the September 11, 2001 terrorist attacks. We were particularly interested in using the attacks as an opportunity to examine the decline of episodic memory in patients with AD, patients with MCI, and older adult controls over a period of months. We found that compared to healthy older adults, patients with AD and MCI showed impaired memory at the initial time point, more rapid forgetting from the initial to the three-month time point, and very similar changes in memory from the three-month to the one-year time point. We speculated that these findings were consistent with patients with AD and MCI showing initial impaired encoding and a more rapid rate of forgetting compared with healthy older adults, but that once the memories had been consolidated, their decay rate became similar to that of healthy older adults. Lastly, although memory distortions were common among all groups, they were greatest in the patients with AD.
NASA Astrophysics Data System (ADS)
Ortiz, Jorge L.; Parsiani, Hamed; Tolstoy, Leonid
2004-02-01
This paper presents a method for recognition of Noisy Subsurface Images using Morphological Associative Memories (MAM). MAM are type of associative memories that use a new kind of neural networks based in the algebra system known as semi-ring. The operations performed in this algebraic system are highly nonlinear providing additional strength when compared to other transformations. Morphological associative memories are a new kind of neural networks that provide a robust performance with noisy inputs. Two representations of morphological associative memories are used called M and W matrices. M associative memory provides a robust association with input patterns corrupted by dilative random noise, while the W associative matrix performs a robust recognition in patterns corrupted with erosive random noise. The robust performance of MAM is used in combination of the Fourier descriptors for the recognition of underground objects in Ground Penetrating Radar (GPR) images. Multiple 2-D GPR images of a site are made available by NASA-SSC center. The buried objects in these images appear in the form of hyperbolas which are the results of radar backscatter from the artifacts or objects. The Fourier descriptors of the prototype hyperbola-like and shapes from non-hyperbola shapes in the sub-surface images are used to make these shapes scale-, shift-, and rotation-invariant. Typical hyperbola-like and non-hyperbola shapes are used to calculate the morphological associative memories. The trained MAMs are used to process other noisy images to detect the presence of these underground objects. The outputs from the MAM using the noisy patterns may be equal to the training prototypes, providing a positive identification of the artifacts. The results are images with recognized hyperbolas which indicate the presence of buried artifacts. A model using MATLAB has been developed and results are presented.
Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ozel, Omur; Weekrakkody, Sean; Sinopoli, Bruno
Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. Withmore » the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.« less
Side Channel Attacks on STTRAM and Low Overhead Countermeasures
2017-03-20
introduce security vulnerabilities and expose the cache memory to side channel attacks. In this paper, we propose a side channel attack (SCA) model...where the adversary can monitor the supply current of the memory array to partially identify the sensi- tive cache data that is being read or written. We...propose solutions such as short retention STTRAM, obfuscation of SCA using 1-bit parity, multi-bit random write, and, neutral- izing the SCA using
High storage capacity in the Hopfield model with auto-interactions—stability analysis
NASA Astrophysics Data System (ADS)
Rocchi, Jacopo; Saad, David; Tantari, Daniele
2017-11-01
Recent studies point to the potential storage of a large number of patterns in the celebrated Hopfield associative memory model, well beyond the limits obtained previously. We investigate the properties of new fixed points to discover that they exhibit instabilities for small perturbations and are therefore of limited value as associative memories. Moreover, a large deviations approach also shows that errors introduced to the original patterns induce additional errors and increased corruption with respect to the stored patterns.
Ghosh, Sarbari; Sarkar, Madhurima; Ghosh, Tithi; Guha, Ipsita; Bhuniya, Avishek; Saha, Akata; Dasgupta, Shayani; Barik, Subhasis; Bose, Anamika; Baral, Rathindranath
2017-08-03
The success of cancer vaccines is limited as most of them induce corrupted CD8 + T cell memory populations. We reported earlier that a natural immunomodulator, neem leaf glycoprotein (NLGP), therapeutically restricts tumor growth in a CD8 + T cell-dependent manner. Here, our objective is to study whether memory CD8 + T cell population is generated in sarcoma hosts after therapeutic NLGP treatment and their role in prevention of post-surgery tumor recurrence, in comparison to the immunostimulatory metronomic cyclophosphamide (CTX) treatment. We found that therapeutic NLGP and CTX treatment generates central memory CD8 + T (TCM) cells with characteristic CD44 + CD62L high CCR7 high IL-2 high phenotypes. But these TCM cells are functionally impaired to prevent re-appearance of tumors along with compromised proliferative, IL-2 secretive and cytotoxic status. This might be due to the presence of tumor load, even a small one in the host, which serves as a persistent source of tumor antigens thereby corrupting the TCM cells so generated. Surgical removal of the persisting tumors from the host restored the functional characteristics of memory CD8 + T cells, preventing tumor recurrence after surgery till end of the experiment. Moreover, we observed that generation of superior TCM cells in NLGP treated surgically removed tumor hosts is related to the activation of Wnt signalling in memory CD8 + T cells with concomitant inhibition of GSK-3β and stabilisation of β-catenin, which ultimately activates transcription of Wnt target genes, like, eomesodermin, a signature molecule of CD8 + TCM cells. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo
More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.
Commemorating 9/11 in the Classroom
ERIC Educational Resources Information Center
Social Education, 2011
2011-01-01
The National September 11 Memorial & Museum will be officially dedicated this September on the 10th anniversary of the attacks of 2001. It provides educational resources that explore the ongoing impact of the September 11th attacks and the ways that volunteerism and art aid in healing, recovery, and rebuilding. The 9/11 Memorial Museum, to be…
A method to compute SEU fault probabilities in memory arrays with error correction
NASA Technical Reports Server (NTRS)
Gercek, Gokhan
1994-01-01
With the increasing packing densities in VLSI technology, Single Event Upsets (SEU) due to cosmic radiations are becoming more of a critical issue in the design of space avionics systems. In this paper, a method is introduced to compute the fault (mishap) probability for a computer memory of size M words. It is assumed that a Hamming code is used for each word to provide single error correction. It is also assumed that every time a memory location is read, single errors are corrected. Memory is read randomly whose distribution is assumed to be known. In such a scenario, a mishap is defined as two SEU's corrupting the same memory location prior to a read. The paper introduces a method to compute the overall mishap probability for the entire memory for a mission duration of T hours.
ERIC Educational Resources Information Center
Fox, Sarah Cleveland
Although the attacks of September 11, 2001, present new challenges and priorities for U.S. policy, it is uncertain what direction international relations will take. China's growth and power, Russia's political and economic problems, resentment and corruption in Russia, and global warming effect policymaking. While the war on terrorism may be a…
Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fiala, David J; Mueller, Frank; Engelmann, Christian
Faults have become the norm rather than the exception for high-end computing on clusters with 10s/100s of thousands of cores. Exacerbating this situation, some of these faults remain undetected, manifesting themselves as silent errors that corrupt memory while applications continue to operate and report incorrect results. This paper studies the potential for redundancy to both detect and correct soft errors in MPI message-passing applications. Our study investigates the challenges inherent to detecting soft errors within MPI application while providing transparent MPI redundancy. By assuming a model wherein corruption in application data manifests itself by producing differing MPI message data betweenmore » replicas, we study the best suited protocols for detecting and correcting MPI data that is the result of corruption. To experimentally validate our proposed detection and correction protocols, we introduce RedMPI, an MPI library which resides in the MPI profiling layer. RedMPI is capable of both online detection and correction of soft errors that occur in MPI applications without requiring any modifications to the application source by utilizing either double or triple redundancy. Our results indicate that our most efficient consistency protocol can successfully protect applications experiencing even high rates of silent data corruption with runtime overheads between 0% and 30% as compared to unprotected applications without redundancy. Using our fault injector within RedMPI, we observe that even a single soft error can have profound effects on running applications, causing a cascading pattern of corruption in most cases causes that spreads to all other processes. RedMPI's protection has been shown to successfully mitigate the effects of soft errors while allowing applications to complete with correct results even in the face of errors.« less
Improving the trust in results of numerical simulations and scientific data analytics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cappello, Franck; Constantinescu, Emil; Hovland, Paul
This white paper investigates several key aspects of the trust that a user can give to the results of numerical simulations and scientific data analytics. In this document, the notion of trust is related to the integrity of numerical simulations and data analytics applications. This white paper complements the DOE ASCR report on Cybersecurity for Scientific Computing Integrity by (1) exploring the sources of trust loss; (2) reviewing the definitions of trust in several areas; (3) providing numerous cases of result alteration, some of them leading to catastrophic failures; (4) examining the current notion of trust in numerical simulation andmore » scientific data analytics; (5) providing a gap analysis; and (6) suggesting two important research directions and their respective research topics. To simplify the presentation without loss of generality, we consider that trust in results can be lost (or the results’ integrity impaired) because of any form of corruption happening during the execution of the numerical simulation or the data analytics application. In general, the sources of such corruption are threefold: errors, bugs, and attacks. Current applications are already using techniques to deal with different types of corruption. However, not all potential corruptions are covered by these techniques. We firmly believe that the current level of trust that a user has in the results is at least partially founded on ignorance of this issue or the hope that no undetected corruptions will occur during the execution. This white paper explores the notion of trust and suggests recommendations for developing a more scientifically grounded notion of trust in numerical simulation and scientific data analytics. We first formulate the problem and show that it goes beyond previous questions regarding the quality of results such as V&V, uncertainly quantification, and data assimilation. We then explore the complexity of this difficult problem, and we sketch complementary general approaches to address it. This paper does not focus on the trust that the execution will actually complete. The product of simulation or of data analytic executions is the final element of a potentially long chain of transformations, where each stage has the potential to introduce harmful corruptions. These corruptions may produce results that deviate from the user-expected accuracy without notifying the user of this deviation. There are many potential sources of corruption before and during the execution; consequently, in this white paper we do not focus on the protection of the end result after the execution.« less
Sjödén, Björn; Granhag, Pär Anders; Ost, James; Roos Af Hjelmsäter, Emma
2009-06-01
The present study examined the effects of fantasy proneness on false "reports" and false "memories", of existent and non-existent footage of a public event. We predicted that highly fantasy prone individuals would be more likely to stand by their initial claim of having seen a film of the event than low fantasy prone participants when prompted for more details about their experiences. Eighty creative arts students and 80 other students were asked whether they had seen CCTV footage preceding the attack on Swedish foreign minister Anna Lindh up to, and including, non-existent footage of the actual moment of the attack. If affirmative, they were probed for extended narratives of what they claimed to have seen. Overall, 64% of participants provided a false "report" by answering yes to the initial question. Of these, 30% provided no explicit details of the attack, and a further 15% retracted their initial answer in their narratives. This left 19% of the sample who appeared to have false "memories" because they provided explicit details of the actual moment of the attack. Women scored higher than men and art students scored higher than other students on fantasy proneness, but there was no effect on levels of false reporting or false "memory". Memories were rated more vivid and clear for existent compared to non-existent aspects of the event. In sum, these data suggest a more complex relationship between memory distortions and fantasy proneness than previously observed.
A Weakest Precondition Approach to Robustness
NASA Astrophysics Data System (ADS)
Balliu, Musard; Mastroeni, Isabella
With the increasing complexity of information management computer systems, security becomes a real concern. E-government, web-based financial transactions or military and health care information systems are only a few examples where large amount of information can reside on different hosts distributed worldwide. It is clear that any disclosure or corruption of confidential information in these contexts can result fatal. Information flow controls constitute an appealing and promising technology to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in the area of language-based security. Robustness asserts that an active attacker, who can modify program code in some fixed points (holes), is unable to disclose more private information than a passive attacker, who merely observes unclassified data. In this paper, we extend a method recently proposed for checking declassified non-interference in presence of passive attackers only, in order to check robustness by means of weakest precondition semantics. In particular, this semantics simulates the kind of analysis that can be performed by an attacker, i.e., from public output towards private input. The choice of semantics allows us to distinguish between different attacks models and to characterize the security of applications in different scenarios.
ERIC Educational Resources Information Center
Levine, Linda J.; Whalen, Carol K.; Henker, Barbara; Jamner, Larry D.
2005-01-01
This study investigated changes over time in adolescents' and parents' memories for how they felt when they learned of the terrorist attacks on September 11, 2001. Adolescents recalled having felt less negative emotion than parents did both 3 months and 8 months after the attacks. Moreover, the intensity of negative emotion recalled decreased over…
Optimal space-time attacks on system state estimation under a sparsity constraint
NASA Astrophysics Data System (ADS)
Lu, Jingyang; Niu, Ruixin; Han, Puxiao
2016-05-01
System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.
... amnesia) Most people with amnesia have problems with short-term memory — they can't retain new information. Recent memories ... heart attack, respiratory distress or carbon monoxide poisoning Long-term ... memory Degenerative brain diseases, such as Alzheimer's disease and ...
Erika S. Svendsen; Lindsay K. Campbell
2010-01-01
Living memorials are landscaped spaces created by people to memorialize individuals, places, and events. Hundreds of stewardship groups across the United States of America created living memorials in response to the September 11, 2001 terrorist attacks. This study sought to understand how stewards value, use, and talk about their living, community-based memorials....
Sensor data security level estimation scheme for wireless sensor networks.
Ramos, Alex; Filho, Raimir Holanda
2015-01-19
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.
Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks
Ramos, Alex; Filho, Raimir Holanda
2015-01-01
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates. PMID:25608215
Makalu: fast recoverable allocation of non-volatile memory
Bhandari, Kumud; Chakrabarti, Dhruva R.; Boehm, Hans-J.
2016-10-19
Byte addressable non-volatile memory (NVRAM) is likely to supplement, and perhaps eventually replace, DRAM. Applications can then persist data structures directly in memory instead of serializing them and storing them onto a durable block device. However, failures during execution can leave data structures in NVRAM unreachable or corrupt. In this paper, we present Makalu, a system that addresses non-volatile memory management. Makalu offers an integrated allocator and recovery-time garbage collector that maintains internal consistency, avoids NVRAM memory leaks, and is efficient, all in the face of failures. We show that a careful allocator design can support a less restrictive andmore » a much more familiar programming model than existing persistent memory allocators. Our allocator significantly reduces the per allocation persistence overhead by lazily persisting non-essential metadata and by employing a post-failure recovery-time garbage collector. Experimental results show that the resulting online speed and scalability of our allocator are comparable to well-known transient allocators, and significantly better than state-of-the-art persistent allocators.« less
Makalu: fast recoverable allocation of non-volatile memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bhandari, Kumud; Chakrabarti, Dhruva R.; Boehm, Hans-J.
Byte addressable non-volatile memory (NVRAM) is likely to supplement, and perhaps eventually replace, DRAM. Applications can then persist data structures directly in memory instead of serializing them and storing them onto a durable block device. However, failures during execution can leave data structures in NVRAM unreachable or corrupt. In this paper, we present Makalu, a system that addresses non-volatile memory management. Makalu offers an integrated allocator and recovery-time garbage collector that maintains internal consistency, avoids NVRAM memory leaks, and is efficient, all in the face of failures. We show that a careful allocator design can support a less restrictive andmore » a much more familiar programming model than existing persistent memory allocators. Our allocator significantly reduces the per allocation persistence overhead by lazily persisting non-essential metadata and by employing a post-failure recovery-time garbage collector. Experimental results show that the resulting online speed and scalability of our allocator are comparable to well-known transient allocators, and significantly better than state-of-the-art persistent allocators.« less
Application of computational mechanics to the analysis of natural data: an example in geomagnetism.
Clarke, Richard W; Freeman, Mervyn P; Watkins, Nicholas W
2003-01-01
We discuss how the ideal formalism of computational mechanics can be adapted to apply to a noninfinite series of corrupted and correlated data, that is typical of most observed natural time series. Specifically, a simple filter that removes the corruption that creates rare unphysical causal states is demonstrated, and the concept of effective soficity is introduced. We believe that computational mechanics cannot be applied to a noisy and finite data series without invoking an argument based upon effective soficity. A related distinction between noise and unresolved structure is also defined: Noise can only be eliminated by increasing the length of the time series, whereas the resolution of previously unresolved structure only requires the finite memory of the analysis to be increased. The benefits of these concepts are demonstrated in a simulated times series by (a) the effective elimination of white noise corruption from a periodic signal using the expletive filter and (b) the appearance of an effectively sofic region in the statistical complexity of a biased Poisson switch time series that is insensitive to changes in the word length (memory) used in the analysis. The new algorithm is then applied to an analysis of a real geomagnetic time series measured at Halley, Antarctica. Two principal components in the structure are detected that are interpreted as the diurnal variation due to the rotation of the Earth-based station under an electrical current pattern that is fixed with respect to the Sun-Earth axis and the random occurrence of a signature likely to be that of the magnetic substorm. In conclusion, some useful terminology for the discussion of model construction in general is introduced.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Di, Sheng; Berrocal, Eduardo; Cappello, Franck
The silent data corruption (SDC) problem is attracting more and more attentions because it is expected to have a great impact on exascale HPC applications. SDC faults are hazardous in that they pass unnoticed by hardware and can lead to wrong computation results. In this work, we formulate SDC detection as a runtime one-step-ahead prediction method, leveraging multiple linear prediction methods in order to improve the detection results. The contributions are twofold: (1) we propose an error feedback control model that can reduce the prediction errors for different linear prediction methods, and (2) we propose a spatial-data-based even-sampling method tomore » minimize the detection overheads (including memory and computation cost). We implement our algorithms in the fault tolerance interface, a fault tolerance library with multiple checkpoint levels, such that users can conveniently protect their HPC applications against both SDC errors and fail-stop errors. We evaluate our approach by using large-scale traces from well-known, large-scale HPC applications, as well as by running those HPC applications on a real cluster environment. Experiments show that our error feedback control model can improve detection sensitivity by 34-189% for bit-flip memory errors injected with the bit positions in the range [20,30], without any degradation on detection accuracy. Furthermore, memory size can be reduced by 33% with our spatial-data even-sampling method, with only a slight and graceful degradation in the detection sensitivity.« less
Defense.gov Special Report: Pearl Harbor Anniversary
Department of Defense Submit Search 71th Anniversary of the Attack on Pearl Harbor - World War II News Joint Chiefs of Staff, saluted veterans at the National World War II Memorial in Washington, D.C Attack Video Return To Pearl Harbor Return To Pearl Harbor World War II Timeline The attack on Pearl
Fault latency in the memory - An experimental study on VAX 11/780
NASA Technical Reports Server (NTRS)
Chillarege, Ram; Iyer, Ravishankar K.
1986-01-01
Fault latency is the time between the physical occurrence of a fault and its corruption of data, causing an error. The measure of this time is difficult to obtain because the time of occurrence of a fault and the exact moment of generation of an error are not known. This paper describes an experiment to accurately study the fault latency in the memory subsystem. The experiment employs real memory data from a VAX 11/780 at the University of Illinois. Fault latency distributions are generated for s-a-0 and s-a-1 permanent fault models. Results show that the mean fault latency of a s-a-0 fault is nearly 5 times that of the s-a-1 fault. Large variations in fault latency are found for different regions in memory. An analysis of a variance model to quantify the relative influence of various workload measures on the evaluated latency is also given.
Taming the Viper: Software Upgrade for VFAUser and Viper
DOE Office of Scientific and Technical Information (OSTI.GOV)
DORIN,RANDALL T.; MOSER III,JOHN C.
2000-08-08
This report describes the procedure and properties of the software upgrade for the Vibration Performance Recorder. The upgrade will check the 20 memory cards for proper read/write operation. The upgrade was successfully installed and uploaded into the Viper and the field laptop. The memory checking routine must run overnight to complete the test, although the laptop need only be connected to the Viper unit until the downloading routine is finished. The routine has limited ability to recognize incomplete or corrupt header and footer files. The routine requires 400 Megabytes of free hard disk space. There is one minor technical flawmore » detailed in the conclusion.« less
Practical quantum private query with better performance in resisting joint-measurement attack
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei
2016-04-01
As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.
Triantafyllou, Dinara; North, Carol S; Zartman, Andrea; Roediger, Henry L
2015-08-01
Posttraumatic stress disorder (PTSD) has been found to be associated with abnormalities in memory function. This relationship has not previously been studied using the Deese-Roediger-McDermott (DRM) false memory paradigm in disaster-exposed populations. Three years after the September 11, 2001 (9/11) attacks, 281 participants from a volunteer sample of 379, recruited from 8 companies directly affected by the attacks, completed an interview about their disaster experience, a structured diagnostic interview, and the DRM paradigm. It was hypothesized that participants with PTSD would demonstrate more associative errors, termed false alarms to critical lures, compared to those without PTSD. This hypothesis was not supported; the only predictor of false alarms to critical lures was direct 9/11 trauma exposure. The finding that 9/11 trauma-exposure was associated with false alarms to critical lures suggests that neural processing of trauma-exposure memory may involve associative elements of overgeneralization coupled with insufficient inhibition of responses to related but harmless stimuli. Future research will be needed to differentiate psychopathology, such as PTSD, from physiological fight-or-flight responses to trauma.
Precision of working memory for visual motion sequences and transparent motion surfaces
Zokaei, Nahid; Gorgoraptis, Nikos; Bahrami, Bahador; Bays, Paul M; Husain, Masud
2012-01-01
Recent studies investigating working memory for location, colour and orientation support a dynamic resource model. We examined whether this might also apply to motion, using random dot kinematograms (RDKs) presented sequentially or simultaneously. Mean precision for motion direction declined as sequence length increased, with precision being lower for earlier RDKs. Two alternative models of working memory were compared specifically to distinguish between the contributions of different sources of error that corrupt memory (Zhang & Luck (2008) vs. Bays et al (2009)). The latter provided a significantly better fit for the data, revealing that decrease in memory precision for earlier items is explained by an increase in interference from other items in a sequence, rather than random guessing or a temporal decay of information. Misbinding feature attributes is an important source of error in working memory. Precision of memory for motion direction decreased when two RDKs were presented simultaneously as transparent surfaces, compared to sequential RDKs. However, precision was enhanced when one motion surface was prioritized, demonstrating that selective attention can improve recall precision. These results are consistent with a resource model that can be used as a general conceptual framework for understanding working memory across a range of visual features. PMID:22135378
Gorman, Adam D; Abernethy, Bruce; Farrow, Damian
2013-07-01
We examined how differences in attention influence how expert and novice basketball players encode into memory the specific structural information contained within patterns of play from their sport. Our participants were primed during a typical recall task to focus attention on either attacking or defending player formations before being asked to recall the attended or unattended portion of the pattern. Adherence to the instructional set was confirmed through an analysis of gaze distributions. Recall performance was superior for the experts relative to the novices across both the attended and unattended attacking and defensive pattern structures. Expert recall of attacker positions was unchanged with and without attention, whereas recall accuracy for the positions of defenders diminished without attention, as did the novices' recall of both attack and defense formations. The findings suggest that experienced performers are better than novices at encoding the elements from a complex and dynamic pattern in the absence of focused attention, with this advantage being especially evident in relation to the recall of attacking structure. Some revision of long-term memory theories of expertise will be necessary to accommodate these findings.
When You Visit Your Doctor After a Heart Attack
... products will be searched. Shopping Cart Description Qty Price The Harvard Medical School 6-Week Plan for ... Memory: Understanding Age-Related Memory Loss (PDF - Lowest Price!) $18.00 Harvard Health Letter (Print & Online Access ( ...
Boals, Adriel; Rubin, David C.; Klein, Kitty
2011-01-01
Cognitive-emotional distinctiveness (CED), the extent to which an individual separates emotions from an event in the cognitive representation of the event, was explored in four studies. CED was measured using a modified multidimensional scaling procedure. The first study found that lower levels of CED in memories of the September 11 terrorist attacks predicted greater frequency of intrusive thoughts about the attacks. The second study revealed CED levels are higher in negative events, in comparison to positive events and that low CED levels in emotionally intense negative events are associated with a pattern of greater event-related distress. The third study replicated the findings from the previous study when examining CED levels in participants’ memories of the 2004 Presidential election. The fourth study revealed that low CED in emotionally intense negative events is associated with worse mental health. We argue that CED is an adaptive and healthy coping feature of stressful memories. PMID:18569690
Statistical Deviations From the Theoretical Only-SBU Model to Estimate MCU Rates in SRAMs
NASA Astrophysics Data System (ADS)
Franco, Francisco J.; Clemente, Juan Antonio; Baylac, Maud; Rey, Solenne; Villa, Francesca; Mecha, Hortensia; Agapito, Juan A.; Puchner, Helmut; Hubert, Guillaume; Velazco, Raoul
2017-08-01
This paper addresses a well-known problem that occurs when memories are exposed to radiation: the determination if a bit flip is isolated or if it belongs to a multiple event. As it is unusual to know the physical layout of the memory, this paper proposes to evaluate the statistical properties of the sets of corrupted addresses and to compare the results with a mathematical prediction model where all of the events are single bit upsets. A set of rules easy to implement in common programming languages can be iteratively applied if anomalies are observed, thus yielding a classification of errors quite closer to reality (more than 80% accuracy in our experiments).
Memory Corruption Mitigations and Their Implementation Progress in Third-Party Windows Applications
2012-09-01
coverage in the news, which helped the public recognize the importance of computers in everyday life and, more importantly, the challenges in securing...Media Players Winamp, VLC Media Player, Quicktime Player, iTunes, Real Player Instant Messaging Applications mIRC, Yahoo Messenger, AIM, Nimbuzz...as cell phones and tablets, may boost this ratio in the upcoming years. In such a highly connected world, it is becoming more and more challenging
Results from the First Two Flights of the Static Computer Memory Integrity Testing Experiment
NASA Technical Reports Server (NTRS)
Hancock, Thomas M., III
1999-01-01
This paper details the scientific objectives, experiment design, data collection method, and post flight analysis following the first two flights of the Static Computer Memory Integrity Testing (SCMIT) experiment. SCMIT is designed to detect soft-event upsets in passive magnetic memory. A soft-event upset is a change in the logic state of active or passive forms of magnetic memory, commonly referred to as a "Bitflip". In its mildest form a soft-event upset can cause software exceptions, unexpected events, start spacecraft safeing (ending data collection) or corrupted fault protection and error recovery capabilities. In it's most severe form loss of mission or spacecraft can occur. Analysis after the first flight (in 1991 during STS-40) identified possible soft-event upsets to 25% of the experiment detectors. Post flight analysis after the second flight (in 1997 on STS-87) failed to find any evidence of soft-event upsets. The SCMIT experiment is currently scheduled for a third flight in December 1999 on STS-101.
Single-Event Effect Performance of a Conductive-Bridge Memory EEPROM
NASA Technical Reports Server (NTRS)
Chen, Dakai; Wilcox, Edward; Berg, Melanie; Kim, Hak; Phan, Anthony; Figueiredo, Marco; Seidleck, Christina; LaBel, Kenneth
2015-01-01
We investigated the heavy ion single-event effect (SEE) susceptibility of the industry’s first stand-alone memory based on conductive-bridge memory (CBRAM) technology. The device is available as an electrically erasable programmable read-only memory (EEPROM). We found that single-event functional interrupt (SEFI) is the dominant SEE type for each operational mode (standby, dynamic read, and dynamic write/read). SEFIs occurred even while the device is statically biased in standby mode. Worst case SEFIs resulted in errors that filled the entire memory space. Power cycle did not always clear the errors. Thus the corrupted cells had to be reprogrammed in some cases. The device is also vulnerable to bit upsets during dynamic write/read tests, although the frequency of the upsets are relatively low. The linear energy transfer threshold for cell upset is between 10 and 20 megaelectron volts per square centimeter per milligram, with an upper limit cross section of 1.6 times 10(sup -11) square centimeters per bit (95 percent confidence level) at 10 megaelectronvolts per square centimeter per milligram. In standby mode, the CBRAM array appears invulnerable to bit upsets.
The cost of misremembering: Inferring the loss function in visual working memory.
Sims, Chris R
2015-03-04
Visual working memory (VWM) is a highly limited storage system. A basic consequence of this fact is that visual memories cannot perfectly encode or represent the veridical structure of the world. However, in natural tasks, some memory errors might be more costly than others. This raises the intriguing possibility that the nature of memory error reflects the costs of committing different kinds of errors. Many existing theories assume that visual memories are noise-corrupted versions of afferent perceptual signals. However, this additive noise assumption oversimplifies the problem. Implicit in the behavioral phenomena of visual working memory is the concept of a loss function: a mathematical entity that describes the relative cost to the organism of making different types of memory errors. An optimally efficient memory system is one that minimizes the expected loss according to a particular loss function, while subject to a constraint on memory capacity. This paper describes a novel theoretical framework for characterizing visual working memory in terms of its implicit loss function. Using inverse decision theory, the empirical loss function is estimated from the results of a standard delayed recall visual memory experiment. These results are compared to the predicted behavior of a visual working memory system that is optimally efficient for a previously identified natural task, gaze correction following saccadic error. Finally, the approach is compared to alternative models of visual working memory, and shown to offer a superior account of the empirical data across a range of experimental datasets. © 2015 ARVO.
Precision of working memory for visual motion sequences and transparent motion surfaces.
Zokaei, Nahid; Gorgoraptis, Nikos; Bahrami, Bahador; Bays, Paul M; Husain, Masud
2011-12-01
Recent studies investigating working memory for location, color, and orientation support a dynamic resource model. We examined whether this might also apply to motion, using random dot kinematograms (RDKs) presented sequentially or simultaneously. Mean precision for motion direction declined as sequence length increased, with precision being lower for earlier RDKs. Two alternative models of working memory were compared specifically to distinguish between the contributions of different sources of error that corrupt memory (W. Zhang & S. J. Luck, 2008 vs. P. M. Bays, R. F. G. Catalao, & M. Husain, 2009). The latter provided a significantly better fit for the data, revealing that decrease in memory precision for earlier items is explained by an increase in interference from other items in a sequence rather than random guessing or a temporal decay of information. Misbinding feature attributes is an important source of error in working memory. Precision of memory for motion direction decreased when two RDKs were presented simultaneously as transparent surfaces, compared to sequential RDKs. However, precision was enhanced when one motion surface was prioritized, demonstrating that selective attention can improve recall precision. These results are consistent with a resource model that can be used as a general conceptual framework for understanding working memory across a range of visual features.
Novel Method For Low-Rate Ddos Attack Detection
NASA Astrophysics Data System (ADS)
Chistokhodova, A. A.; Sidorov, I. D.
2018-05-01
The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.
Spatial Support Vector Regression to Detect Silent Errors in the Exascale Era
DOE Office of Scientific and Technical Information (OSTI.GOV)
Subasi, Omer; Di, Sheng; Bautista-Gomez, Leonardo
As the exascale era approaches, the increasing capacity of high-performance computing (HPC) systems with targeted power and energy budget goals introduces significant challenges in reliability. Silent data corruptions (SDCs) or silent errors are one of the major sources that corrupt the executionresults of HPC applications without being detected. In this work, we explore a low-memory-overhead SDC detector, by leveraging epsilon-insensitive support vector machine regression, to detect SDCs that occur in HPC applications that can be characterized by an impact error bound. The key contributions are three fold. (1) Our design takes spatialfeatures (i.e., neighbouring data values for each data pointmore » in a snapshot) into training data, such that little memory overhead (less than 1%) is introduced. (2) We provide an in-depth study on the detection ability and performance with different parameters, and we optimize the detection range carefully. (3) Experiments with eight real-world HPC applications show thatour detector can achieve the detection sensitivity (i.e., recall) up to 99% yet suffer a less than 1% of false positive rate for most cases. Our detector incurs low performance overhead, 5% on average, for all benchmarks studied in the paper. Compared with other state-of-the-art techniques, our detector exhibits the best tradeoff considering the detection ability and overheads.« less
Unipolar Terminal-Attractor Based Neural Associative Memory with Adaptive Threshold
NASA Technical Reports Server (NTRS)
Liu, Hua-Kuang (Inventor); Barhen, Jacob (Inventor); Farhat, Nabil H. (Inventor); Wu, Chwan-Hwa (Inventor)
1996-01-01
A unipolar terminal-attractor based neural associative memory (TABAM) system with adaptive threshold for perfect convergence is presented. By adaptively setting the threshold values for the dynamic iteration for the unipolar binary neuron states with terminal-attractors for the purpose of reducing the spurious states in a Hopfield neural network for associative memory and using the inner-product approach, perfect convergence and correct retrieval is achieved. Simulation is completed with a small number of stored states (M) and a small number of neurons (N) but a large M/N ratio. An experiment with optical exclusive-OR logic operation using LCTV SLMs shows the feasibility of optoelectronic implementation of the models. A complete inner-product TABAM is implemented using a PC for calculation of adaptive threshold values to achieve a unipolar TABAM (UIT) in the case where there is no crosstalk, and a crosstalk model (CRIT) in the case where crosstalk corrupts the desired state.
Unipolar terminal-attractor based neural associative memory with adaptive threshold
NASA Technical Reports Server (NTRS)
Liu, Hua-Kuang (Inventor); Barhen, Jacob (Inventor); Farhat, Nabil H. (Inventor); Wu, Chwan-Hwa (Inventor)
1993-01-01
A unipolar terminal-attractor based neural associative memory (TABAM) system with adaptive threshold for perfect convergence is presented. By adaptively setting the threshold values for the dynamic iteration for the unipolar binary neuron states with terminal-attractors for the purpose of reducing the spurious states in a Hopfield neural network for associative memory and using the inner product approach, perfect convergence and correct retrieval is achieved. Simulation is completed with a small number of stored states (M) and a small number of neurons (N) but a large M/N ratio. An experiment with optical exclusive-OR logic operation using LCTV SLMs shows the feasibility of optoelectronic implementation of the models. A complete inner-product TABAM is implemented using a PC for calculation of adaptive threshold values to achieve a unipolar TABAM (UIT) in the case where there is no crosstalk, and a crosstalk model (CRIT) in the case where crosstalk corrupts the desired state.
NASA Astrophysics Data System (ADS)
Mandal, Swagata; Saini, Jogender; Zabołotny, Wojciech M.; Sau, Suman; Chakrabarti, Amlan; Chattopadhyay, Subhasis
2017-03-01
Due to the dramatic increase of data volume in modern high energy physics (HEP) experiments, a robust high-speed data acquisition (DAQ) system is very much needed to gather the data generated during different nuclear interactions. As the DAQ works under harsh radiation environment, there is a fair chance of data corruption due to various energetic particles like alpha, beta, or neutron. Hence, a major challenge in the development of DAQ in the HEP experiment is to establish an error resilient communication system between front-end sensors or detectors and back-end data processing computing nodes. Here, we have implemented the DAQ using field-programmable gate array (FPGA) due to some of its inherent advantages over the application-specific integrated circuit. A novel orthogonal concatenated code and cyclic redundancy check (CRC) have been used to mitigate the effects of data corruption in the user data. Scrubbing with a 32-b CRC has been used against error in the configuration memory of FPGA. Data from front-end sensors will reach to the back-end processing nodes through multiple stages that may add an uncertain amount of delay to the different data packets. We have also proposed a novel memory management algorithm that helps to process the data at the back-end computing nodes removing the added path delays. To the best of our knowledge, the proposed FPGA-based DAQ utilizing optical link with channel coding and efficient memory management modules can be considered as first of its kind. Performance estimation of the implemented DAQ system is done based on resource utilization, bit error rate, efficiency, and robustness to radiation.
NASA Astrophysics Data System (ADS)
Peng, Chaorong; Chen, Chang Wen
2008-04-01
Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.
"Who Doesn't?"--The Impact of Descriptive Norms on Corruption.
Köbis, Nils C; van Prooijen, Jan-Willem; Righetti, Francesca; Van Lange, Paul A M
2015-01-01
Corruption poses one of the major societal challenges of our time. Considerable advances have been made in understanding corruption on a macro level, yet the psychological antecedents of corrupt behavior remain largely unknown. In order to explain why some people engage in corruption while others do not, we explored the impact of descriptive social norms on corrupt behavior by using a novel behavioral measure of corruption. We conducted three studies to test whether perceived descriptive norms of corruption (i.e. the belief about the prevalence of corruption in a specific context) influence corrupt behavior. The results indicated that descriptive norms highly correlate with corrupt behavior--both when measured before (Study 1) or after (Study 2) the behavioral measure of corruption. Finally, we adopted an experimental design to investigate the causal effect of descriptive norms on corruption (Study 3). Corrupt behavior in the corruption game significantly drops when participants receive short anti-corruption descriptive norm primes prior to the game. These findings indicate that perceived descriptive norms can impact corrupt behavior and, possibly, could offer an explanation for inter-personal and inter-cultural variation in corrupt behavior in the real world. We discuss implications of these findings and draw avenues for future research.
A New Random Walk for Replica Detection in WSNs.
Aalsalem, Mohammed Y; Khan, Wazir Zada; Saad, N M; Hossain, Md Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram
2016-01-01
Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical.
A New Random Walk for Replica Detection in WSNs
Aalsalem, Mohammed Y.; Saad, N. M.; Hossain, Md. Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram
2016-01-01
Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical. PMID:27409082
A Brief Psychology of Corruption.
ERIC Educational Resources Information Center
Roldan, Antonio C., Jr.
1989-01-01
Examines types of corruption (white-collar crime) in Philippine society, including political, bureaucratic, and corporate corruption. Identifies three major causes of corruption, individuals most prone to corruption, organizations most vulnerable to corruption, and societies most supportive of corruption. (Author/NB)
“Who Doesn’t?”—The Impact of Descriptive Norms on Corruption
Köbis, Nils C.; van Prooijen, Jan-Willem; Righetti, Francesca; Van Lange, Paul A. M.
2015-01-01
Corruption poses one of the major societal challenges of our time. Considerable advances have been made in understanding corruption on a macro level, yet the psychological antecedents of corrupt behavior remain largely unknown. In order to explain why some people engage in corruption while others do not, we explored the impact of descriptive social norms on corrupt behavior by using a novel behavioral measure of corruption. We conducted three studies to test whether perceived descriptive norms of corruption (i.e. the belief about the prevalence of corruption in a specific context) influence corrupt behavior. The results indicated that descriptive norms highly correlate with corrupt behavior—both when measured before (Study 1) or after (Study 2) the behavioral measure of corruption. Finally, we adopted an experimental design to investigate the causal effect of descriptive norms on corruption (Study 3). Corrupt behavior in the corruption game significantly drops when participants receive short anti-corruption descriptive norm primes prior to the game. These findings indicate that perceived descriptive norms can impact corrupt behavior and, possibly, could offer an explanation for inter-personal and inter-cultural variation in corrupt behavior in the real world. We discuss implications of these findings and draw avenues for future research. PMID:26121127
NASA Astrophysics Data System (ADS)
Watkins, Nicholas; Clarke, Richard; Freeman, Mervyn
2002-11-01
We discuss how the ideal formalism of Computational Mechanics can be adapted to apply to a non-infinite series of corrupted and correlated data, that is typical of most observed natural time series. Specifically, a simple filter that removes the corruption that creates rare unphysical causal states is demonstrated, and the new concept of effective soficity is introduced. The benefits of these new concepts are demonstrated on simulated time series by (a) the effective elimination of white noise corruption from a periodic signal using the expletive filter and (b) the appearance of an effectively sofic region in the statistical complexity of a biased Poisson switch time series that is insensitive to changes in the word length (memory) used in the analysis. The new algorithm is then applied to analysis of a real geomagnetic time series measured at Halley, Antarctica. Two principal components in the structure are detected that are interpreted as the diurnal variation due to the rotation of the earth-based station under an electrical current pattern that is fixed with respect to the sun-earth axis and the random occurrence of a signature likely to be that of the magnetic substorm. In conclusion, a hypothesis is advanced about model construction in general (see also Clarke et al; arXiv::cond-mat/0110228).
A Bitslice Implementation of Anderson's Attack on A5/1
NASA Astrophysics Data System (ADS)
Bulavintsev, Vadim; Semenov, Alexander; Zaikin, Oleg; Kochemazov, Stepan
2018-03-01
The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.
2007-06-05
whether or not the module is capable of changing from a not - good to a good state. If this is true, the module is associated with a portion of main memory...the module is ca- pable of changing from a good to a not - good state. A false value reflects the ability of good software to protect itself from...qualities of the module. One exception to this rule is that the kernel is corruptible if and only if the hypervisor is not good , since a bad
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.
DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain
2015-01-01
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717
Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia
ERIC Educational Resources Information Center
Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna
2009-01-01
Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…
Defense.gov Special Report: Remembering Sept. 11, 2001
Recruiters Recall Patriotism of Post-9/11 America WASHINGTON, Sept. 8, 2011 - Like so many Americans, Army Lessons Alive Show More» Former Air Force Surgeon Recalls Post-attack Response Responders Remember 9/11 Recalls Pentagon Post-attack Response Army Races to Honor 9/11 Casualties Chaplain Carries Tragic Memories
DefenseLink Special: September 11, 2006
, when terrorists attacked the World Trade Center in New York and the Pentagon. | Story | Edmund G , Sept. 11, 2001, when he first heard of a plane hitting the World Trade Center. The first reports called , servicemembers share their memories of the Sept. 11, 2001, terror attacks when airliners hit New York's World
Code of Federal Regulations, 2013 CFR
2013-01-01
... the Victims of the Attack in Benghazi, Libya 8861 Proclamation 8861 Presidential Documents..., LibyaBy the President of the United States of America A Proclamation As a mark of respect for the memory of John Christopher Stevens, United States Ambassador to Libya, and American personnel killed in the...
Corruption in law enforcement: a paradigm of occupational stress and deviancy.
McCafferty, F L; McCafferty, M A
1998-01-01
In the closed society of a law enforcement agency, factors such as the conspiracy of silence, authoritarian supervision, and police discretion contribute to corruption. This article describes various types of corrupt behavior by police officers, reports the incidence of corruption in law enforcement agencies, discusses psychiatric conditions that may arise from corruption and also contribute to further corruption, and reviews proposed remedies for corruption. It also suggests that an understanding of corruption in law enforcement might be helpful in understanding, correcting, and preventing corruption in other professions, including medicine.
Robust image retrieval from noisy inputs using lattice associative memories
NASA Astrophysics Data System (ADS)
Urcid, Gonzalo; Nieves-V., José Angel; García-A., Anmi; Valdiviezo-N., Juan Carlos
2009-02-01
Lattice associative memories also known as morphological associative memories are fully connected feedforward neural networks with no hidden layers, whose computation at each node is carried out with lattice algebra operations. These networks are a relatively recent development in the field of associative memories that has proven to be an alternative way to work with sets of pattern pairs for which the storage and retrieval stages use minimax algebra. Different associative memory models have been proposed to cope with the problem of pattern recall under input degradations, such as occlusions or random noise, where input patterns can be composed of binary or real valued entries. In comparison to these and other artificial neural network memories, lattice algebra based memories display better performance for storage and recall capability; however, the computational techniques devised to achieve that purpose require additional processing or provide partial success when inputs are presented with undetermined noise levels. Robust retrieval capability of an associative memory model is usually expressed by a high percentage of perfect recalls from non-perfect input. The procedure described here uses noise masking defined by simple lattice operations together with appropriate metrics, such as the normalized mean squared error or signal to noise ratio, to boost the recall performance of either the min or max lattice auto-associative memories. Using a single lattice associative memory, illustrative examples are given that demonstrate the enhanced retrieval of correct gray-scale image associations from inputs corrupted with random noise.
Magellan spacecraft and memory state tracking: Lessons learned, future thoughts
NASA Technical Reports Server (NTRS)
Bucher, Allen W.
1993-01-01
Numerous studies have been dedicated to improving the two main elements of Spacecraft Mission Operations: Command and Telemetry. As a result, not much attention has been given to other tasks that can become tedious, repetitive, and error prone. One such task is Spacecraft and Memory State Tracking, the process by which the status of critical spacecraft components, parameters, and the contents of on-board memory are managed on the ground to maintain knowledge of spacecraft and memory states for future testing, anomaly investigation, and on-board memory reconstruction. The task of Spacecraft and Memory State Tracking has traditionally been a manual task allocated to Mission Operations Procedures. During nominal Mission Operations this job is tedious and error prone. Because the task is not complex and can be accomplished manually, the worth of a sophisticated software tool is often questioned. However, in the event of an anomaly which alters spacecraft components autonomously or a memory anomaly such as a corrupt memory or flight software error, an accurate ground image that can be reconstructed quickly is a priceless commodity. This study explores the process of Spacecraft and Memory State Tracking used by the Magellan Spacecraft Team highlighting its strengths as well as identifying lessons learned during the primary and extended missions, two memory anomalies, and other hardships encountered due to incomplete knowledge of spacecraft states. Ideas for future state tracking tools that require minimal user interaction and are integrated into the Ground Data System will also be discussed.
Magellan spacecraft and memory state tracking: Lessons learned, future thoughts
NASA Astrophysics Data System (ADS)
Bucher, Allen W.
1993-03-01
Numerous studies have been dedicated to improving the two main elements of Spacecraft Mission Operations: Command and Telemetry. As a result, not much attention has been given to other tasks that can become tedious, repetitive, and error prone. One such task is Spacecraft and Memory State Tracking, the process by which the status of critical spacecraft components, parameters, and the contents of on-board memory are managed on the ground to maintain knowledge of spacecraft and memory states for future testing, anomaly investigation, and on-board memory reconstruction. The task of Spacecraft and Memory State Tracking has traditionally been a manual task allocated to Mission Operations Procedures. During nominal Mission Operations this job is tedious and error prone. Because the task is not complex and can be accomplished manually, the worth of a sophisticated software tool is often questioned. However, in the event of an anomaly which alters spacecraft components autonomously or a memory anomaly such as a corrupt memory or flight software error, an accurate ground image that can be reconstructed quickly is a priceless commodity. This study explores the process of Spacecraft and Memory State Tracking used by the Magellan Spacecraft Team highlighting its strengths as well as identifying lessons learned during the primary and extended missions, two memory anomalies, and other hardships encountered due to incomplete knowledge of spacecraft states. Ideas for future state tracking tools that require minimal user interaction and are integrated into the Ground Data System will also be discussed.
False Memory in Adults With ADHD: A Comparison Between Subtypes and Normal Controls.
Soliman, Abdrabo Moghazy; Elfar, Rania Mohamed
2017-10-01
To examine the performance on the Deese-Roediger-McDermott task of adults divided into ADHD subtypes and compares their performance to that of healthy controls to examine whether adults with ADHD are more susceptible to the production of false memories under experimental conditions. A total of 128 adults with ADHD (50% females), classified into three Diagnostic and Statistical Manual of Mental Disorders (4th ed.; DSM-IV-TR) subtypes, were compared with 48 controls. The results indicated that the ADHD participants recalled and recognized fewer studied words than the controls, the ADHD groups produced more false memories than the control group, no differences in either the false positives or the false negatives. The ADHD-combined (ADHD-CT) group recognized significantly more critical words than the control, ADHD-predominantly inattentive (ADHD-IA), and ADHD-predominantly hyperactive-impulsive (ADHD-HI) groups. The ADHD groups recalled and recognized more false positives, were more confident in their false responses, and displayed more knowledge corruption than the controls. The ADHD-CT group recalled and recognized more false positives than the other ADHD groups. The adults with ADHD have more false memories than the controls and that false memory formation varied with the ADHD subtypes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Seyong; Vetter, Jeffrey S
Computer architecture experts expect that non-volatile memory (NVM) hierarchies will play a more significant role in future systems including mobile, enterprise, and HPC architectures. With this expectation in mind, we present NVL-C: a novel programming system that facilitates the efficient and correct programming of NVM main memory systems. The NVL-C programming abstraction extends C with a small set of intuitive language features that target NVM main memory, and can be combined directly with traditional C memory model features for DRAM. We have designed these new features to enable compiler analyses and run-time checks that can improve performance and guard againstmore » a number of subtle programming errors, which, when left uncorrected, can corrupt NVM-stored data. Moreover, to enable recovery of data across application or system failures, these NVL-C features include a flexible directive for specifying NVM transactions. So that our implementation might be extended to other compiler front ends and languages, the majority of our compiler analyses are implemented in an extended version of LLVM's intermediate representation (LLVM IR). We evaluate NVL-C on a number of applications to show its flexibility, performance, and correctness.« less
Wade, Kimberley A; Nash, Robert A; Lindsay, D Stephen
2018-05-01
Wixted, Mickes, and Fisher (this issue) take issue with the common trope that eyewitness memory is inherently unreliable. They draw on a large body of mock-crime research and a small number of field studies, which indicate that high-confidence eyewitness reports are usually accurate, at least when memory is uncontaminated and suitable interviewing procedures are used. We agree with the thrust of Wixted et al.'s argument and welcome their invitation to confront the mass underselling of eyewitnesses' potential reliability. Nevertheless, we argue that there is a comparable risk of overselling eyewitnesses' reliability. Wixted et al.'s reasoning implies that near-pristine conditions or uncontaminated memories are normative, but there are at least two good reasons to doubt this. First, psychological science does not yet offer a good understanding of how often and when eyewitness interviews might deviate from best practice in ways that compromise the accuracy of witnesses' reports. Second, witnesses may frequently be exposed to preinterview influences that could corrupt reports obtained in best-practice interviews.
ATIP Report: Cyber Security Research in China
2015-06-05
vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a
Specialised use of working memory by Portia africana, a spider-eating salticid.
Cross, Fiona R; Jackson, Robert R
2014-03-01
Using expectancy-violation methods, we investigated the role of working memory in the predatory strategy of Portia africana, a salticid spider from Kenya that preys by preference on other spiders. One of this predator's tactics is to launch opportunistic leaping attacks on to other spiders in their webs. Focussing on this particular tactic, our experiments began with a test spider on a ramp facing a lure (dead prey spider mounted on a cork disc) that could be reached by leaping. After the test spider faced the lure for 30 s, we blocked the test spider's view of the lure by lowering an opaque shutter before the spider leapt. When the shutter was raised 90 s later, either the same lure came into view again (control) or a different lure came into view (experimental: different prey type in same orientation or same prey type in different orientation). We recorded attack frequency (number of test spiders that leapt at the lure) and attack latency (time elapsing between shutter being raised and spiders initiating a leap). Attack latencies in control trials were not significantly different from attack latencies in experimental trials, regardless of whether it was prey type or prey orientation that changed in the experimental trials. However, compared with test spiders in the no-change control trials, significantly fewer test spiders leapt when prey type changed. There was no significant effect on attack frequency when prey orientation changed. These findings suggest that this predator represents prey type independently of prey orientation.
Radiation-hardened optically reconfigurable gate array exploiting holographic memory characteristics
NASA Astrophysics Data System (ADS)
Seto, Daisaku; Watanabe, Minoru
2015-09-01
In this paper, we present a proposal for a radiation-hardened optically reconfigurable gate array (ORGA). The ORGA is a type of field programmable gate array (FPGA). The ORGA configuration can be executed by the exploitation of holographic memory characteristics even if 20% of the configuration data are damaged. Moreover, the optoelectronic technology enables the high-speed reconfiguration of the programmable gate array. Such a high-speed reconfiguration can increase the radiation tolerance of its programmable gate array to 9.3 × 104 times higher than that of current FPGAs. Through experimentation, this study clarified the configuration dependability using the impulse-noise emulation and high-speed configuration capabilities of the ORGA with corrupt configuration contexts. Moreover, the radiation tolerance of the programmable gate array was confirmed theoretically through probabilistic calculation.
Resilient and Robust High Performance Computing Platforms for Scientific Computing Integrity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jin, Yier
As technology advances, computer systems are subject to increasingly sophisticated cyber-attacks that compromise both their security and integrity. High performance computing platforms used in commercial and scientific applications involving sensitive, or even classified data, are frequently targeted by powerful adversaries. This situation is made worse by a lack of fundamental security solutions that both perform efficiently and are effective at preventing threats. Current security solutions fail to address the threat landscape and ensure the integrity of sensitive data. As challenges rise, both private and public sectors will require robust technologies to protect its computing infrastructure. The research outcomes from thismore » project try to address all these challenges. For example, we present LAZARUS, a novel technique to harden kernel Address Space Layout Randomization (KASLR) against paging-based side-channel attacks. In particular, our scheme allows for fine-grained protection of the virtual memory mappings that implement the randomization. We demonstrate the effectiveness of our approach by hardening a recent Linux kernel with LAZARUS, mitigating all of the previously presented side-channel attacks on KASLR. Our extensive evaluation shows that LAZARUS incurs only 0.943% overhead for standard benchmarks, and is therefore highly practical. We also introduced HA2lloc, a hardware-assisted allocator that is capable of leveraging an extended memory management unit to detect memory errors in the heap. We also perform testing using HA2lloc in a simulation environment and find that the approach is capable of preventing common memory vulnerabilities.« less
Kostic, Bogdan; McFarlan, Chastity C; Cleary, Anne M
2012-07-01
Recent work (e.g., Nairne & Pandeirada, 2010) has shown that words are remembered better when they have been processed for their survival value in a grasslands context than when processed in other contexts. It has been suggested that this is because human memory systems were shaped by evolution specifically to help humans survive. Thus far, the survival processing advantage has mainly been shown with grasslands contexts, which are thought to be particularly relevant to human evolution. The present study demonstrated the survival processing advantage with other contexts (e.g., lost in a jungle), including with contexts that should not, in and of themselves, be relevant to human evolution (e.g., lost in outer space). We further examined whether implied social isolation plays a critical role in the survival advantage to memory by comparing scenarios in which the person is alone versus with other people present (e.g., lost at sea alone or with others), and whether the perceived source of danger is social isolation or other human attackers. A survival advantage was shown in both the isolation and the group settings, and whether the primary source of danger was isolation or other human attackers did not matter. These findings suggest that the survival advantage in memory is not dependent on evolutionarily relevant physical contexts (e.g., grasslands) or particular sources of perceived danger (social isolation vs. perceived attackers), showing the advantage to be robust and applicable to a variety of scenarios. 2012 APA, all rights reserved
Sommersguter-Reichmann, Margit; Wild, Claudia; Stepan, Adolf; Reichmann, Gerhard; Fried, Andrea
2018-06-01
In recent years, the fight against healthcare corruption has intensified. Estimates from the European Healthcare Fraud and Corruption Network calculate an approximate €56 billion annual loss to Europe as a result of corruption. To promote understanding of the complexity and interconnection of corrupt activities, we aim to present healthcare-related corruption typologies of the European Union and European Healthcare Fraud and Corruption Network. We subsequently link them to the typology of individual and institutional corruption introduced by Dennis Thompson in the context of investigating misconduct of US Congressional members. According to Thompson, individual corruption is the personal gain of individuals performing duties within an institution in exchange for nurturing private interests, while institutional corruption pertains to the failure of the institution in directing the individual's behaviour towards the achievement of the institution's primary purpose because the institutional design promotes the pursuit of individual goals. Effective anti-corruption activities not only require the enactment of anti-corruption laws but also the monitoring and, where appropriate, revision of institutional frameworks to prevent the undermining of the primary purposes of health systems or institutions. To gain further understanding of the similarities and differences of the three typologies, prime examples of corrupt activities in the health sector in the European Union and USA (along with their potential remedies) are provided. Linking corruption cases to Thompson's typology revealed that many corrupt activities may show elements of both individual and institutional corruption because they are intertwined, partly overlap and may occur jointly. Hence, sanctioning individual actors only does not target the problem.
Corruption in Afghanistan - Somebody Else’s Problem?
2011-03-18
of corruption, the Afghan population as a whole paid twice as much in bribes in 2009 as it had paid in 2006.‖11 IWA‘s 2010 Corruption Report shows...chances. Corruption thrives on inefficiency and increased trade for the corrupt politician means more opportunities for bribes .‖ 39 ―If...Corruption: Nature and Ethical Suggestions.‖43 These economic professors suggest that although corruption is widely studied, significant
Transient global amnesia—a hippocampal phenomenon?
Ponsford, J L; Donnan, G A
1980-01-01
A case of transient global amnesia of clear vascular aetiology is described. Results of neuropsychological testing carried out during the attack clarify the nature of the memory disorder and suggest that the critical region of ischaemia is the medial temporal area around the hippocampus. Follow-up testing suggests that no lasting memory impairment resulted. PMID:7373328
Pain-Relief Learning in Flies, Rats, and Man: Basic Research and Applied Perspectives
ERIC Educational Resources Information Center
Gerber, Bertram; Yarali, Ayse; Diegelmann, Sören; Wotjak, Carsten T.; Pauli, Paul; Fendt, Marcus
2014-01-01
Memories relating to a painful, negative event are adaptive and can be stored for a lifetime to support preemptive avoidance, escape, or attack behavior. However, under unfavorable circumstances such memories can become overwhelmingly powerful. They may trigger excessively negative psychological states and uncontrollable avoidance of locations,…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jared Stimson
FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contentsmore » of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.« less
Corruption in Higher Education: Conceptual Approaches and Measurement Techniques
ERIC Educational Resources Information Center
Osipian, Ararat L.
2007-01-01
Corruption is a complex and multifaceted phenomenon. Forms of corruption are multiple. Measuring corruption is necessary not only for getting ideas about the scale and scope of the problem, but for making simple comparisons between the countries and conducting comparative analysis of corruption. While the total impact of corruption is indeed…
Health Monitor for Multitasking, Safety-Critical, Real-Time Software
NASA Technical Reports Server (NTRS)
Zoerner, Roger
2011-01-01
Health Manager can detect Bad Health prior to a failure occurring by periodically monitoring the application software by looking for code corruption errors, and sanity-checking each critical data value prior to use. A processor s memory can fail and corrupt the software, or the software can accidentally write to the wrong address and overwrite the executing software. This innovation will continuously calculate a checksum of the software load to detect corrupted code. This will allow a system to detect a failure before it happens. This innovation monitors each software task (thread) so that if any task reports "bad health," or does not report to the Health Manager, the system is declared bad. The Health Manager reports overall system health to the outside world by outputting a square wave signal. If the square wave stops, this indicates that system health is bad or hung and cannot report. Either way, "bad health" can be detected, whether caused by an error, corrupted data, or a hung processor. A separate Health Monitor Task is started and run periodically in a loop that starts and stops pending on a semaphore. Each monitored task registers with the Health Manager, which maintains a count for the task. The registering task must indicate if it will run more or less often than the Health Manager. If the task runs more often than the Health Manager, the monitored task calls a health function that increments the count and verifies it did not go over max-count. When the periodic Health Manager runs, it verifies that the count did not go over the max-count and zeroes it. If the task runs less often than the Health Manager, the periodic Health Manager will increment the count. The monitored task zeroes the count, and both the Health Manager and monitored task verify that the count did not go over the max-count.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Adaptive Impact-Driven Detection of Silent Data Corruption for HPC Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Di, Sheng; Cappello, Franck
For exascale HPC applications, silent data corruption (SDC) is one of the most dangerous problems because there is no indication that there are errors during the execution. We propose an adaptive impact-driven method that can detect SDCs dynamically. The key contributions are threefold. (1) We carefully characterize 18 real-world HPC applications and discuss the runtime data features, as well as the impact of the SDCs on their execution results. (2) We propose an impact-driven detection model that does not blindly improve the prediction accuracy, but instead detects only influential SDCs to guarantee user-acceptable execution results. (3) Our solution can adaptmore » to dynamic prediction errors based on local runtime data and can automatically tune detection ranges for guaranteeing low false alarms. Experiments show that our detector can detect 80-99.99% of SDCs with a false alarm rate less that 1% of iterations for most cases. The memory cost and detection overhead are reduced to 15% and 6.3%, respectively, for a large majority of applications.« less
Achieving network level privacy in Wireless Sensor Networks.
Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2010-01-01
Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.
Achieving Network Level Privacy in Wireless Sensor Networks†
Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2010-01-01
Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. PMID:22294881
Evolution of cooperation in a hierarchical society with corruption control.
Huang, Feng; Chen, Xiaojie; Wang, Long
2018-07-14
Punishment is widely recognized as a potential promoter in sustaining or even enhancing public cooperation, but it meanwhile induces the problem of second-order free-riders. Particularly, recent evidence shows that costly punishment can be maintained if punishers may engage in corruption. However, how to reduce or eliminate incidents of corruption has been the enduring conundrum in human society. As power asymmetries are associated with hierarchies, we investigate how costly punishment affects the evolution of cooperation in the cases without and with corruption control. In the absence of corruption control, altruistic punishers are incapable of punishing corrupt punishers. Corrupt punishment maintains civilian cooperation but undermines the evolution of altruistic punishment. Otherwise, altruistic punishers can enforce symmetrical or asymmetrical punishment on both corrupt punishers and civilian defectors. In this case, both civilian cooperation and altruistic punishment can be promoted. And as an instrument of corruption control, the policy of asymmetrical punishment is more effective in fostering public cooperation and improving social welfare than symmetrical punishment. Moreover, no matter whether corruption control is considered or not, spiteful corruption that non-cooperative punishers penalize defectors is a more effective form for enhancing cooperation compared with bribery. Our work may thus offer an insight into the effects of corruption on public cooperation and the policy of anti-corruption. Copyright © 2018 Elsevier Ltd. All rights reserved.
Exploring corruption in the South African health sector.
Rispel, Laetitia C; de Jager, Pieter; Fonn, Sharon
2016-03-01
Recent scholarly attention has focused on weak governance and the negative effects of corruption on the provision of health services. Employing agency theory, this article discusses corruption in the South African health sector. We used a combination of research methods and triangulated data from three sources: Auditor-General of South Africa reports for each province covering a 9-year period; 13 semi-structured interviews with health sector key informants and a content analysis of print media reports covering a 3-year period. Findings from the Auditor-General reports showed a worsening trend in audit outcomes with marked variation across the nine provinces. Key-informants indicated that corruption has a negative effect on patient care and the morale of healthcare workers. The majority of the print media reports on corruption concerned the public health sector (63%) and involved provincial health departments (45%). Characteristics and complexity of the public health sector may increase its vulnerability to corruption, but the private-public binary constitutes a false dichotomy as corruption often involves agents from both sectors. Notwithstanding the lack of global validated indicators to measure corruption, our findings suggest that corruption is a problem in the South African healthcare sector. Corruption is influenced by adverse agent selection, lack of mechanisms to detect corruption and a failure to sanction those involved in corrupt activities. We conclude that appropriate legislation is a necessary, but not sufficient intervention to reduce corruption. We propose that mechanisms to reduce corruption must include the political will to run corruption-free health services, effective government to enforce laws, appropriate systems, and citizen involvement and advocacy to hold public officials accountable. Importantly, the institutionalization of a functional bureaucracy and public servants with the right skills, competencies, ethics and value systems and whose interests are aligned with health system goals are critical interventions in the fight against corruption. © The Author 2015. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.
ERIC Educational Resources Information Center
Heyneman, Stephen P.
2004-01-01
This paper will draw on standard international definitions of "corruption" and apply them to the education sector. It will define corruption in education, explain why it is important, and describe various types of corruption and their causes. Emphasis will be placed on the role of higher education institutions in educational corruption, but the…
2011-12-01
64 1. General Law on Bribery and Corruption...64 2. U.S. Federal Law on Bribery and Corruption (The U.S. Foreign Corrupt Practices Act...65 3. U.S. State Law on Bribery and Corruption .....................................65 4. United States Defense Industry Initiative (DII) on
Quantitative relations between corruption and economic factors
NASA Astrophysics Data System (ADS)
Shao, Jia; Ivanov, Plamen Ch.; Podobnik, Boris; Stanley, H. Eugene
2007-03-01
We report quantitative relations between corruption level and economic factors, such as country wealth and foreign investment per capita, which are characterized by a power law spanning multiple scales of wealth and investment per capita. These relations hold for diverse countries, and also remain stable over different time periods. We also observe a negative correlation between level of corruption and long-term economic growth. We find similar results for two independent indices of corruption, suggesting that the relation between corruption and wealth does not depend on the specific measure of corruption. The functional relations we report have implications when assessing the relative level of corruption for two countries with comparable wealth, and for quantifying the impact of corruption on economic growth and foreign investment.
Mackey, Tim K; Kohler, Jillian Clare; Savedoff, William D; Vogl, Frank; Lewis, Maureen; Sale, James; Michaud, Joshua; Vian, Taryn
2016-09-29
Corruption has been described as a disease. When corruption infiltrates global health, it can be particularly devastating, threatening hard gained improvements in human and economic development, international security, and population health. Yet, the multifaceted and complex nature of global health corruption makes it extremely difficult to tackle, despite its enormous costs, which have been estimated in the billions of dollars. In this forum article, we asked anti-corruption experts to identify key priority areas that urgently need global attention in order to advance the fight against global health corruption. The views shared by this multidisciplinary group of contributors reveal several fundamental challenges and allow us to explore potential solutions to address the unique risks posed by health-related corruption. Collectively, these perspectives also provide a roadmap that can be used in support of global health anti-corruption efforts in the post-2015 development agenda.
Holocaust memory reconstruction among bereaved parents.
Cohen-Louck, Keren; Saka, Yael
2017-02-01
Many studies have examined the trauma bereaved parents experience. The current study focuses on the role that the Holocaust's memory plays in the bereavement experience of parents who have lost a child in a terrorist attack in Israel. Forty bereaved parents were interviewed, using semistructured in-depth interviews. Bereaved parents related to the Holocaust memory as a meaningful experience in their private bereavement. The parents expressed dialectic feelings concerning their loss, personal victimization on the one hand and personal strength, and growth on the other hand. It seems that memory reconstruction of the Holocaust can be used as a coping resource.
Study of cases of anterograde amnesia in a disease of mental disintegration.
Janet, P; Nicolas, S; Penel, A
2001-12-01
Pierre Janet, in his famous paper (1892) on anterograde amnesia, is concerned with the theme of the disintegration of the human personality. He shows that the weakened personality may lose the power to assimilate memories of current events. After a severe shock, there may supervene not only a retrograde amnesia (a blotting out from memory from some period before the accident), but also a continued or anterograde amnesia, that is to say, an inability to remember events occurring after the accident. Janet details the circumstances of a very interesting case of amnesia resulting from an attack of hysteria, brought on by the shock of bad news. The patient, 'Mrs. D.', had wholly lost all memory of events that occurred during the month and a half before her attack, and since that time she had only been able to remember for a few moments what was going on around her. Janet shows that memories which appear not to be formed are in fact formed; that they exist somewhere in the patient's mind with the full vividness of ordinary recollections, and that they may spontaneously crop up in dreams, or may be called out by hypnotic suggestion, or by other methods.
The Effects of General System Justification on Corruption Perception and Intent
Tan, Xuyun; Liu, Li; Huang, Zhenwei; Zheng, Wenwen; Liang, Yuan
2016-01-01
Previous research stresses that system justifying belief can weaken corruption perception, by this possibly fostering unjust behaviors. However, general results of the effect of general system justification on corruption are ambiguous, indicating also a lessening impact. We conducted a line of studies trying to elucidate these circumstances by testing the effect of general system justification on corruption perception and intention. In addition, we explored institutional trust as a possible mediator in this process. For this purpose, we conducted three studies. The first two studies examined the association between general system justification and corruption. In Study 1, a correlational design was run using questionnaires to assess the relation between general system justification and corruption perception as well as corruption intention. In Study 2, an experimental design was conducted manipulating general system justification via exposure to high or low system threat condition, then measuring its effect on corruption perception and corrupt intention. In Study 3, two sub-studies using correlational and experimental designs were run to explore the mediating role of institutional trust, respectively. Results replicated former studies showing that general system justification is negatively associated with corruption perception. However, they also showed a negative correlation with corrupt intention. Furthermore, they showed that institutional trust mediated the relation between general system justification and corruption. We suggest to consider these findings to further elucidate the psychological basis underlying different effects of general system justification on human behaviors. PMID:27507954
The Effects of General System Justification on Corruption Perception and Intent.
Tan, Xuyun; Liu, Li; Huang, Zhenwei; Zheng, Wenwen; Liang, Yuan
2016-01-01
Previous research stresses that system justifying belief can weaken corruption perception, by this possibly fostering unjust behaviors. However, general results of the effect of general system justification on corruption are ambiguous, indicating also a lessening impact. We conducted a line of studies trying to elucidate these circumstances by testing the effect of general system justification on corruption perception and intention. In addition, we explored institutional trust as a possible mediator in this process. For this purpose, we conducted three studies. The first two studies examined the association between general system justification and corruption. In Study 1, a correlational design was run using questionnaires to assess the relation between general system justification and corruption perception as well as corruption intention. In Study 2, an experimental design was conducted manipulating general system justification via exposure to high or low system threat condition, then measuring its effect on corruption perception and corrupt intention. In Study 3, two sub-studies using correlational and experimental designs were run to explore the mediating role of institutional trust, respectively. Results replicated former studies showing that general system justification is negatively associated with corruption perception. However, they also showed a negative correlation with corrupt intention. Furthermore, they showed that institutional trust mediated the relation between general system justification and corruption. We suggest to consider these findings to further elucidate the psychological basis underlying different effects of general system justification on human behaviors.
Higher Education Corruption in the World Media: Prevalence, Patterns, and Forms
ERIC Educational Resources Information Center
Osipian, Ararat L.
2007-01-01
Corruption in higher education is a newly emerging topic in the field of education research. There is a phenomenal growth in the number of media reports on corruption in higher education over the last decade. However, the rigorous systematic research on education corruption is virtually nonexistent. This paper considers corruption in higher…
Causal Factors of Corruption in Construction Project Management: An Overview.
Owusu, Emmanuel Kingsford; Chan, Albert P C; Shan, Ming
2017-11-11
The development of efficient and strategic anti-corruption measures can be better achieved if a deeper understanding and identification of the causes of corruption are established. Over the past years, many studies have been devoted to the research of corruption in construction management (CM). This has resulted in a significant increase in the body of knowledge on the subject matter, including the causative factors triggering these corrupt practices. However, an apropos systematic assessment of both past and current studies on the subject matter which is needful for the future endeavor is lacking. Moreover, there is an absence of unified view of the causative factors of corruption identified in construction project management (CPM). This paper, therefore, presents a comprehensive review of the causes of corruption from selected articles in recognized construction management journals to address the mentioned gaps. A total number of 44 causes of corruption were identified from 37 publications and analyzed in terms of existing causal factors of corruption, annual trend of publications and the thematic categorization of the identified variables. The most identifiable causes were over close relationships, poor professional ethical standards, negative industrial and working conditions, negative role models and inadequate sanctions. A conceptual framework of causes of corruption was established, after categorizing the 44 variables into five unique categories. In descending order, the five constructs are Psychosocial-Specific Causes, Organizational-Specific Causes, Regulatory-Specific Causes, Project-Specific Causes and Statutory-Specific Causes. This study extends the current literature of corruption research in construction management and contributes to a deepened understanding of the causal instigators of corruption identified in CPM. The findings from this study provide valuable information and extended knowledge to industry practitioners and policymakers as well as anti-corruption agencies in the formulation and direction of anti-corruption measures. To corruption researchers in CM, this study is vital for further research.
The perils of payoff: corruption as a threat to global biodiversity.
Laurance, William F
2004-08-01
Corruption is a worldwide phenomenon, particularly in many developing countries, which contain a large proportion of global biodiversity. Most alarming, from a biodiversity-conservation perspective, is the frequent corruption of government officials who manage valuable natural resources, such as timber, oil and precious minerals. A recent study by Joyotee Smith and colleagues describes rampant corruption in the timber industry of Indonesia, and shifts in the prevalence of different types of corruption as the country has become destabilized politically. By placing corruption into a conceptual framework, Smith et al. provide important insights into how developing nations and their natural resources can be besieged by corruption.
[Corruption as individual and organizational sinking].
Cecchinato, Fabio
2015-04-01
The article qualifies the nature of psychosociological perspective in analysing corruption in organizations. Corruption is analysed as a mental event and social conditions of corruption are investigated. In particular six social and organizational factors are identified as relevant in determining the diffusion of corruption: meaning, work wellbeing, consistency, social recognition, reflexivity, social relations. The main hypothesis explored in the article is that to take managerial care of the organisational factors above mentioned is a strong and active prevention of the risk of corruption.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Dao, Duy; Salehizadeh, S M A; Noh, Yeonsik; Chong, Jo Woon; Cho, Chae Ho; McManus, Dave; Darling, Chad E; Mendelson, Yitzhak; Chon, Ki H
2017-09-01
Motion and noise artifacts (MNAs) impose limits on the usability of the photoplethysmogram (PPG), particularly in the context of ambulatory monitoring. MNAs can distort PPG, causing erroneous estimation of physiological parameters such as heart rate (HR) and arterial oxygen saturation (SpO2). In this study, we present a novel approach, "TifMA," based on using the time-frequency spectrum of PPG to first detect the MNA-corrupted data and next discard the nonusable part of the corrupted data. The term "nonusable" refers to segments of PPG data from which the HR signal cannot be recovered accurately. Two sequential classification procedures were included in the TifMA algorithm. The first classifier distinguishes between MNA-corrupted and MNA-free PPG data. Once a segment of data is deemed MNA-corrupted, the next classifier determines whether the HR can be recovered from the corrupted segment or not. A support vector machine (SVM) classifier was used to build a decision boundary for the first classification task using data segments from a training dataset. Features from time-frequency spectra of PPG were extracted to build the detection model. Five datasets were considered for evaluating TifMA performance: (1) and (2) were laboratory-controlled PPG recordings from forehead and finger pulse oximeter sensors with subjects making random movements, (3) and (4) were actual patient PPG recordings from UMass Memorial Medical Center with random free movements and (5) was a laboratory-controlled PPG recording dataset measured at the forehead while the subjects ran on a treadmill. The first dataset was used to analyze the noise sensitivity of the algorithm. Datasets 2-4 were used to evaluate the MNA detection phase of the algorithm. The results from the first phase of the algorithm (MNA detection) were compared to results from three existing MNA detection algorithms: the Hjorth, kurtosis-Shannon entropy, and time-domain variability-SVM approaches. This last is an approach recently developed in our laboratory. The proposed TifMA algorithm consistently provided higher detection rates than the other three methods, with accuracies greater than 95% for all data. Moreover, our algorithm was able to pinpoint the start and end times of the MNA with an error of less than 1 s in duration, whereas the next-best algorithm had a detection error of more than 2.2 s. The final, most challenging, dataset was collected to verify the performance of the algorithm in discriminating between corrupted data that were usable for accurate HR estimations and data that were nonusable. It was found that on average 48% of the data segments were found to have MNA, and of these, 38% could be used to provide reliable HR estimation.
Perception of Corruption in 36 Major Chinese Cities: Based on Survey of 1,642 Experts
ERIC Educational Resources Information Center
Song, Xuguang; Cheng, Wenhao
2012-01-01
Perception surveys remain an important tool to measure corruption. However, most existing perception surveys only analyze corruption at the national or international level, and do not provide information about corruption at local levels. But it is corruption in local areas that really influences the everyday life of ordinary people. In order to…
Bai, Bao-Yu; Liu, Xiao-Xiao; Kou, Yu
2014-01-01
Corruption can be unfair and detrimental to societies; however, little is known regarding how individuals perceive corruption. We aim to understand how psychological factors, such as lay belief of the world, influence perceived intention of corruptive behavior. As corruption undermines justice, we hypothesize that belief in a just world to others (BJW-others) reduces perceived intention of corruptive behaviors. We conducted two correlational studies and one experimental study in China. Using hypothetical scenarios, perception toward bribery taking and nepotistic practices were assessed. In Study 1 and Study 2, we consistently found that BJW-others negatively predicted perceived intention of corruption, and this pattern was mediated by perceived likelihood of punishment. We further replicate this result in Study 3 by priming BJW-others, demonstrating its causal effect. The results indicate that BJW as one lay belief can be important in influencing people's attitudes toward corruption. Implications for future research and anti-corruption policies are also discussed.
Bai, Bao-yu; Liu, Xiao-xiao; Kou, Yu
2014-01-01
Corruption can be unfair and detrimental to societies; however, little is known regarding how individuals perceive corruption. We aim to understand how psychological factors, such as lay belief of the world, influence perceived intention of corruptive behavior. As corruption undermines justice, we hypothesize that belief in a just world to others (BJW-others) reduces perceived intention of corruptive behaviors. We conducted two correlational studies and one experimental study in China. Using hypothetical scenarios, perception toward bribery taking and nepotistic practices were assessed. In Study 1 and Study 2, we consistently found that BJW-others negatively predicted perceived intention of corruption, and this pattern was mediated by perceived likelihood of punishment. We further replicate this result in Study 3 by priming BJW-others, demonstrating its causal effect. The results indicate that BJW as one lay belief can be important in influencing people’s attitudes toward corruption. Implications for future research and anti-corruption policies are also discussed. PMID:24835428
Corruption as a Propensity: Personality and Motivational Determinants Among Nigerians.
Agbo, Aaron Adibe; Iwundu, Emmanuel Ifeanyi
2016-01-01
Psychologically oriented studies on corruption are lacking despite the fact that psychology has contributed enormously to the understanding of criminal behaviors over the past decades. Part of this problem relates to the lack of psychological tone in the definition and measurement of corruption. Taking a clue from the extensive psychological discourse on crime, which provides strong evidence for the existence of criminal tendencies, we conceptualized corruption here in terms of propensity. Possible personality and motivation determinants of this propensity were then explored. Results revealed that extraversion and conscientiousness positively and inversely predicted corruption tendencies, respectively. Results further showed that extrinsic motivation positively potentiates corruption tendencies, whereas intrinsic motivation was inversely related to corruption tendencies. Analysis of demographic variables revealed that males were more likely to be corrupt than their female counterparts. In general, findings here are consistent with the criminal behavior literature, which strongly suggests that the study of corruption is indeed amenable to psychological theories and methods and that individual differences variables constitute important explanatory variables in this regard.
The Road to Bribery and Corruption.
Köbis, Nils C; van Prooijen, Jan-Willem; Righetti, Francesca; Van Lange, Paul A M
2017-03-01
Major forms of corruption constitute a strong threat to the functioning of societies. The most frequent explanation of how severe corruption emerges is the slippery-slope metaphor-the notion that corruption occurs gradually. While having widespread theoretical and intuitive appeal, this notion has barely been tested empirically. We used a recently developed paradigm to test whether severely corrupt acts happen gradually or abruptly. The results of four experimental studies revealed a higher likelihood of severe corruption when participants were directly given the opportunity to engage in it (abrupt) compared with when they had previously engaged in minor forms of corruption (gradual). Neither the size of the payoffs, which we kept constant, nor evaluations of the actions could account for these differences. Contrary to widely shared beliefs, sometimes the route to corruption leads over a steep cliff rather than a slippery slope.
Modelling of corruption repression by Komisi Pemberantasan Korupsi in Indonesia
NASA Astrophysics Data System (ADS)
Nugraha, Muhammad Ridwan Reza; Nuraini, Nuning
2017-03-01
Based on data from transparency.org, in 2015 Indonesia was ranked 88 out of 168 most corrupt countries in the world, with a score of 36 (high corruption levels 0 - 100 free of corruption). Scores of corruption in Indonesia increased from 32 to 36 since 2012 until 2015. Since 2002, the eradication of corruption in Indonesia conducted by Komisi Pemberantasan Korupsi. The number of legal actions undertaken by the Commission since 2002 to 2015 increased. In the mathematical model, we want to know the tendency of many legal actions carried out by the Commission for the foreseeable future. By knowing these trends, we can take a variety of strategies that can make Indonesia free from corruption.
Corruption and stock market development: A quantitative approach
NASA Astrophysics Data System (ADS)
Bolgorian, Meysam
2011-11-01
Studying the relation between corruption and economic factors and examining its consequences for economic development have attracted many economists and physicists in recent years. The purpose of this paper is to focus on the role of stock market development on corruption. Analyzing a data set of corruption and stock market development measures such as market capitalization and total value of share trading for 46 countries around the world for the period 2007-2009, we examine the dependence of the Corruption Perception Index (CPI) on stock market development. Our findings suggest that there exists a power-law dependence between corruption and stock market development. We also observe a negative relation between level of corruption and financial system improvement.
CASSIUS: The Cassini Uplink Scheduler
NASA Technical Reports Server (NTRS)
Bellinger, Earl
2012-01-01
The Cassini Uplink Scheduler (CASSIUS) is cross-platform software used to generate a radiation sequence plan for commands being sent to the Cassini spacecraft. Because signals must travel through varying amounts of Earth's atmosphere, several different modes of constant telemetry rates have been devised. These modes guarantee that the spacecraft and the Deep Space Network agree with respect to the data transmission rate. However, the memory readout of a command will be lost if it occurs on a telemetry mode boundary. Given a list of spacecraft message files as well as the available telemetry modes, CASSIUS can find an uplink sequence that ensures safe transmission of each file. In addition, it can predict when the two on-board solid state recorders will swap. CASSIUS prevents data corruption by making sure that commands are not planned for memory readout during telemetry rate changes or a solid state recorder swap.
Yu, Yao; Martek, Igor; Hosseini, M Reza; Chen, Chuan
2018-05-02
Corruption in the construction industry is a serious problem in China. As such, fighting this corruption has become a priority target of the Chinese government, with the main effort being to discover and prosecute its perpetrators. This study profiles the demographic characteristics of major incidences of corruption in construction. It draws on the database of the 83 complete recorded cases of construction related corruption held by the Chinese National Bureau of Corruption Prevention. Categorical variables were drawn from the database, and 'association rule mining analysis' was used to identify associations between variables as a means of profiling perpetrators. Such profiling may be used as predictors of future incidences of corruption, and consequently to inform policy makers in their fight against corruption. The results signal corruption within the Chinese construction industry to be correlated with age, with incidences rising as managers' approach retirement age. Moreover, a majority of perpetrators operate within government agencies, are department deputies in direct contact with projects, and extort the greatest amounts per case from second tier cities. The relatively lengthy average 6.4-year period before cases come to public attention corroborates the view that current efforts at fighting corruption remain inadequate.
Neural Network Model For Fast Learning And Retrieval
NASA Astrophysics Data System (ADS)
Arsenault, Henri H.; Macukow, Bohdan
1989-05-01
An approach to learning in a multilayer neural network is presented. The proposed network learns by creating interconnections between the input layer and the intermediate layer. In one of the new storage prescriptions proposed, interconnections are excitatory (positive) only and the weights depend on the stored patterns. In the intermediate layer each mother cell is responsible for one stored pattern. Mutually interconnected neurons in the intermediate layer perform a winner-take-all operation, taking into account correlations between stored vectors. The performance of networks using this interconnection prescription is compared with two previously proposed schemes, one using inhibitory connections at the output and one using all-or-nothing interconnections. The network can be used as a content-addressable memory or as a symbolic substitution system that yields an arbitrarily defined output for any input. The training of a model to perform Boolean logical operations is also described. Computer simulations using the network as an autoassociative content-addressable memory show the model to be efficient. Content-addressable associative memories and neural logic modules can be combined to perform logic operations on highly corrupted data.
A multi-state magnetic memory dependent on the permeability of Metglas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Petrie, J. R.; Wieland, K. A.; Timmerwilke, J. M.
A three-state magnetic memory was developed based on differences in the magnetic permeability of a soft ferromagnetic media, Metglas 2826MB (Fe{sub 40}Ni{sub 38}Mo{sub 4}B{sub 18}). By heating bits of a 250 nm thick Metglas film with 70–100 mW of laser power, we were able to tune the local microstructure, and hence, the permeability. Ternary memory states were created by using lower laser power to enhance the initial permeability through localized atomic rearrangement and higher power to reduce the permeability through crystallization. The permeability of the bits was read by detecting variations in an external 32 Oe probe field within 10 μm ofmore » the media via a magnetic tunnel junction read head. Compared to data based on remanent magnetization, these multi-permeability bits have enhanced insensitivity to unexpected field and temperature changes. We found that data was not corrupted after exposure to fields of 1 T or temperatures of 423 K, indicating the effectiveness of this multi-state approach for safely storing large amounts of data.« less
Auditing Nicaragua's anti-corruption struggle, 1998 to 2009.
Arosteguí, Jorge; Hernandez, Carlos; Suazo, Harold; Cárcamo, Alvaro; Reyes, Rosa Maria; Andersson, Neil; Ledogar, Robert J
2011-12-21
Four social audits in 1998, 2003, 2006 and 2009 identified actions that Nicaragua could take to reduce corruption and public perception in primary health care and other key services. In a 71-cluster sample, weighted according to the 1995 census and stratified by geographic region and settlement type, we audited the same five public services: health centres and health posts, public primary schools, municipal government, transit police and the courts. Some 6,000 households answered questions about perception and personal experience of unofficial and involuntary payments, payments without obtaining receipts or to the wrong person, and payments "to facilitate" services in municipal offices or courts. Additional questions covered complaints about corruption and confidence in the country's anti-corruption struggle. Logistic regression analyses helped clarify local variations and explanatory variables. Feedback to participants and the services at both national and local levels followed each social audit. Users' experience of corruption in health services, education and municipal government decreased. The wider population's perception of corruption in these sectors decreased also, but not as quickly. Progress among traffic police faltered between 2006 and 2009 and public perception of police corruption ticked upwards in parallel with drivers' experience. Users' experience of corruption in the courts worsened over the study period--with the possible exception of Managua between 2006 and 2009--but public perception of judicial corruption, after peaking in 2003, declined from then on. Confidence in the anti-corruption struggle grew from 50% to 60% between 2003 and 2009. Never more than 8% of respondents registered complaints about corruption.Factors associated with public perception of corruption were: personal experience of corruption, quality of the service itself, and the perception that municipal government takes community opinion into account and keeps people informed about how it uses public funds. Lowering citizens' perception of corruption in public services depends on reducing their experience of it, on improving service quality and access and--perhaps most importantly--on making citizens feel they are well-informed participants in the work of government.
Evolving Righteousness in a Corrupt World
Duéñez-Guzmán, Edgar A.; Sadedin, Suzanne
2012-01-01
Punishment offers a powerful mechanism for the maintenance of cooperation in human and animal societies, but the maintenance of costly punishment itself remains problematic. Game theory has shown that corruption, where punishers can defect without being punished themselves, may sustain cooperation. However, in many human societies and some insect ones, high levels of cooperation coexist with low levels of corruption, and such societies show greater wellbeing than societies with high corruption. Here we show that small payments from cooperators to punishers can destabilize corrupt societies and lead to the spread of punishment without corruption (righteousness). Righteousness can prevail even in the face of persistent power inequalities. The resultant righteous societies are highly stable and have higher wellbeing than corrupt ones. This result may help to explain the persistence of costly punishing behavior, and indicates that corruption is a sub-optimal tool for maintaining cooperation in human societies. PMID:22984510
Corruption: Engineers are Victims, Perpetrators or Both?
Pecujlija, M; Cosic, I; Nesic-Grubic, L; Drobnjak, S
2015-08-01
This study was conducted in Serbian companies on licensed engineers and in its first part included a total of 336 licensed engineers who voluntarily completed the questionnaires about their ethical orientation and attitudes toward corruption and in the second part 214 engineers who participated in the first survey, who voluntarily evaluated their company's business operations characteristics. This study has clearly shown that there is a direct significant influence of the engineer's ethical orientations and attitudes toward corruption on their evaluation of the characteristics of their respective companies regarding business operations. This research also clearly shows that only engineers with a strong deontological orientation, low ethical subjectivity, and strong readiness to fight corruption, low corruption acceptance and high awareness of corruption can successfully fight corruption, improve the business operations of their companies and make beneficial changes to society. Otherwise, they should be considered as corruption perpetrators, not just as its victims.
Corruption Cases Mapping Based on Indonesia’s Corruption Perception Index
NASA Astrophysics Data System (ADS)
Noerlina; Wulandhari, L. A.; Sasmoko; Muqsith, A. M.; Alamsyah, M.
2017-01-01
Government plays an important role in nation economic growth. Nevertheless, there are still many occurrences of government officers abusing their offices to do an act of corruption. In this order, the central government should pay attention to every area in the nation to avoid corruption case. Meanwhile, the news media always constantly preach about corruption case, this makes the news media relevant for being one of the sources of measurement of corruption perception index (CPI). It is required to map the corruption case in Indonesia so the central government can pay attention to every region in Indonesia. To develop the mapping system, researchers use Naïve Bayes Classifier to classify which news articles talk about corruption and which news articles are not, before implementing a Naïve Bayes Classifier there are some text processing such as tokenizing, stopping, and stemming.
[Corruption and health care system].
Marasović Šušnjara, Ivana
2014-06-01
Corruption is a global problem that takes special place in health care system. A large number of participants in the health care system and numerous interactions among them provide an opportunity for various forms of corruption, be it bribery, theft, bureaucratic corruption or incorrect information. Even though it is difficult to measure the amount of corruption in medicine, there are tools that allow forming of the frames for possible interventions.
The assessment of corruption impact on the inflow of foreign direct investment
NASA Astrophysics Data System (ADS)
Gasanova, Ayshan; Medvedev, Alexander N.; Komotskiy, Evgeny I.
2017-06-01
The aim of this paper is to investigate the impact of corruption on the inflow of foreign direct investment (FDI). The data, taken from official sources, Transparency International and the Heritage Foundation, have been treated in a special program "Deductor Studio Academic" by the method of Machine Learning (cluster analysis using Kohonen Self-Organizing Maps). There was composed a Kohonen map, in which the countries were divided into 4 clusters: countries with low levels of corruption and high level of FDI inflow, countries with low level of corruption and FDI above average, countries with average level of corruption and the average level of FDI, and countries with high level of corruption and low level of FDI. The research has shown that corruption influences the investment attractiveness of the host country. This means that in countries where the level of corruption is low and economic environment is attractive, the level of foreign direct investment is high, and in those countries where the level of corruption is high and and economic attractiveness is low - the level of investment is low. However, the study identified countries which have high level of corruption and high FDI inflow - China, India, Brazil and Russia (BRIC countries). These countries are the exception from the rule due to the wide domestic market, cheap labour, the wealth of natural resources - all these factors increase the investment attractiveness of these countries. It was found that corruption in BRIC countries has similarity being a controlled and predictable phenomenon. This allows calculating the cost of corruption for accounting it in business projects.
5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.
Code of Federal Regulations, 2010 CFR
2010-01-01
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
5 CFR 6701.107 - Reporting waste, fraud, abuse and corruption.
Code of Federal Regulations, 2011 CFR
2011-01-01
... corruption. 6701.107 Section 6701.107 Administrative Personnel GENERAL SERVICES ADMINISTRATION SUPPLEMENTAL..., fraud, abuse and corruption. GSA employees shall disclose immediately any waste, fraud, abuse, and corruption to appropriate authorities, such as the Office of Inspector General. ...
Factor, Roni; Kang, Minah
2015-09-01
The current study aims to develop a theoretical framework for understanding the antecedents of corruption and the effects of corruption on various health indicators. Using structural equation models, we analyzed a multinational dataset of 133 countries that included three main groups of variables--antecedents of corruption, corruption measures, and health indicators. Controlling for various factors, our results suggest that corruption rises as GDP per capita falls and as the regime becomes more autocratic. Higher corruption is associated with lower levels of health expenditure as a percentage of GDP per capita, and with poorer health outcomes. Countries with higher GDP per capita and better education for women have better health outcomes regardless of health expenditures and regime type. Our results suggest that there is no direct relationship between health expenditures and health outcomes after controlling for the other factors in the model. Our study enhances our understanding of the conceptual and theoretical links between corruption and health outcomes in a population, including factors that may mediate how corruption can affect health outcomes.
Return Migrants' Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example.
Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie
2016-09-19
Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants' access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.
Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example
Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie
2016-01-01
Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096
Distributed clone detection in static wireless sensor networks: random walk with network division.
Khan, Wazir Zada; Aalsalem, Mohammed Y; Saad, N M
2015-01-01
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.
Witvliet, Margot I; Kunst, Anton E; Arah, Onyebuchi A; Stronks, Karien
2013-10-01
There is a paucity of empirical work on the potential population health impact of living under a regime marred by corruption. African countries differ in the extent of national corruption, and we explore whether perceived national corruption is associated with population health across all rungs of society. World Health Survey data were analysed on 72 524 adults from 20 African countries. The main outcome was self-reported poor general health. Multilevel logistic regression was used to assess the association between poor health and perceived corruption, while jointly accounting for individual- and country-level human development factors. In this research, we use Transparency International's corruption perception index (CPI), which measures 'both administrative and political corruption' on a 0-10 scale. A higher score pertains to a higher rate of perceived corruption within society. We also examined effect modification by gender, age and socio-economic status. Higher national corruption perception was consistently associated with an increase in poor health prevalence, also after multivariable adjustments, with odds ratio (OR) of 1.62 (95% CI: 1.01-2.60). Stratified analyses by age and gender suggested this same pattern in all subgroups. Positive associations between poor health and perceived corruption were evident in all socio-economic groups, with the association being somewhat more positive among less educated people (OR = 1.61, 95% CI: 1.01-2.58) than among more educated people (OR = 1.40, 95% CI: 0.83-2.37). This study is a cautious first step in empirically testing the general health consequences of corruption. Our results suggest that higher perceived national corruption is associated with general health of both men and women within all socio-economic groups across the lifespan. Further research is needed using more countries to assess the magnitude of the health consequences of corruption. © 2013 John Wiley & Sons Ltd.
75 FR 6590 - Coordinated Communications
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-10
... corruption or the appearance of corruption,'' the Court explained that `` `[t]he absence of prearrangement... opportunity for, quid pro quo corruption? The Court further held that the governmental interest in ``[l]aws that burden political speech'' is ``limited to quid pro quo corruption,'' and that ``[i]ngratiation and...
The Topography of Corruption: Explorations in a Comparative Perspective.
ERIC Educational Resources Information Center
Heidenheimer, Arnold J.
1996-01-01
Analyzes how corruption is linked to scandalization in the traditions of European countries and how this has helped shape contemporary perceptions. Compares and contrasts levels of tolerance and manifestations of corruption. Includes a table of nations ranked on reputation for corrupt public services. (MJP)
Corruption in health-care systems and its effect on cancer care in Africa.
Mostert, Saskia; Njuguna, Festus; Olbara, Gilbert; Sindano, Solomon; Sitaresmi, Mei Neni; Supriyadi, Eddy; Kaspers, Gertjan
2015-08-01
At the government, hospital, and health-care provider level, corruption plays a major role in health-care systems in Africa. The returns on health investments of international financial institutions, health organisations, and donors might be very low when mismanagement and dysfunctional structures of health-care systems are not addressed. More funding might even aggravate corruption. We discuss corruption and its effects on cancer care within the African health-care system in a sociocultural context. The contribution of high-income countries in stimulating corruption is also described. Corrupt African governments cannot be expected to take the initiative to eradicate corruption. Therefore, international financial institutions, health organisations, and financial donors should use their power to demand policy reforms of health-care systems in Africa troubled by the issue of corruption. These modifications will ameliorate the access and quality of cancer care for patients across the continent, and ultimately improve the outcome of health care to all patients. Copyright © 2015 Elsevier Ltd. All rights reserved.
Corruption costs lives: a cross-country study using an IV approach.
Lio, Mon-Chi; Lee, Ming-Hsuan
2016-04-01
This study quantitatively estimates the effects of corruption on five major health indicators by using recent cross-country panel data covering 119 countries for the period of 2005-2011. The corruption indicators provided by the World Bank and Transparency International are used, and both the two-way fixed effect and the two-stage least squares approaches are employed for our estimation. The estimation results show that, in general, corruption is negatively associated with a country's health outcomes. A lower level of corruption or a better control of corruption in a country can lead to longer life expectancy, a lower infant mortality rate and a lower under-five mortality rate for citizens. However, our estimation finds no significant association between corruption and individual diseases including human immunodeficiency virus prevalence and tuberculosis incidence. The findings suggest that corruption reduction itself is an effective method to promote health. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.
Preventing corruption in humanitarian assistance: perceptions, gaps and challenges.
Maxwell, Daniel; Bailey, Sarah; Harvey, Paul; Walker, Peter; Sharbatke-Church, Cheyanne; Savage, Kevin
2012-01-01
Corruption is a threat to the purpose of humanitarian assistance. Until fairly recently, humanitarian assistance has not been considered an important arena in broader efforts aimed at curbing corruption, and corruption has not always been considered a particularly important concern for humanitarian assistance despite the obviously challenging nature of the context of humanitarian emergencies. Corruption, though, is a threat to humanitarian action because it can prevent assistance from getting to the people who most need it, and because it can potentially undermine public support for such assistance. This paper examines perceptions of corruption and its affects, documents best practices, and outlines gaps in understanding. It suggests recommendations for improving the capacity of humanitarian agencies to prevent and manage the risk of corruption. Agencies have taken steps to combat corruption and improve accountability--downwards and upwards--but scope remains for improvement and for greater sharing of learning and good practice. © 2012 The Author(s). Disasters © Overseas Development Institute, 2012.
DefenseLink.mil - Pentagon Memorial Dedication
Dept. photo by Army Staff Sgt. Michael J. Carden An entry stone at the Pentagon Memorial lists the their lives during the Sept. 11 terrorist attack on the Pentagon. Photo by Staff Sgt. Michael J. Carden Staff Sgt. Michael J. Carden A member of The United States Air Force Band practices before the start of
LAVA: Large scale Automated Vulnerability Addition
2016-05-23
memory copy, e.g., are reasonable attack points. If the goal is to inject divide- by-zero, then arithmetic operations involving division will be...ways. First, it introduces deterministic record and replay , which can be used for iterated and expensive analyses that cannot be performed online... memory . Since our approach records the correspondence between source lines and program basic block execution, it would be just as easy to figure out
Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Horoshko, D B
2007-12-31
The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)
Auditing Nicaragua’s anti-corruption struggle, 1998 to 2009
2011-01-01
Background Four social audits in 1998, 2003, 2006 and 2009 identified actions that Nicaragua could take to reduce corruption and public perception in primary health care and other key services. Methods In a 71-cluster sample, weighted according to the 1995 census and stratified by geographic region and settlement type, we audited the same five public services: health centres and health posts, public primary schools, municipal government, transit police and the courts. Some 6,000 households answered questions about perception and personal experience of unofficial and involuntary payments, payments without obtaining receipts or to the wrong person, and payments "to facilitate" services in municipal offices or courts. Additional questions covered complaints about corruption and confidence in the country's anti-corruption struggle. Logistic regression analyses helped clarify local variations and explanatory variables. Feedback to participants and the services at both national and local levels followed each social audit. Results Users' experience of corruption in health services, education and municipal government decreased. The wider population's perception of corruption in these sectors decreased also, but not as quickly. Progress among traffic police faltered between 2006 and 2009 and public perception of police corruption ticked upwards in parallel with drivers' experience. Users' experience of corruption in the courts worsened over the study period -- with the possible exception of Managua between 2006 and 2009 -- but public perception of judicial corruption, after peaking in 2003, declined from then on. Confidence in the anti-corruption struggle grew from 50% to 60% between 2003 and 2009. Never more than 8% of respondents registered complaints about corruption. Factors associated with public perception of corruption were: personal experience of corruption, quality of the service itself, and the perception that municipal government takes community opinion into account and keeps people informed about how it uses public funds. Conclusions Lowering citizens' perception of corruption in public services depends on reducing their experience of it, on improving service quality and access and -- perhaps most importantly -- on making citizens feel they are well-informed participants in the work of government. PMID:22375610
Taxonomy of Corruption in Higher Education
ERIC Educational Resources Information Center
Rumyantseva, Nataliya L.
2005-01-01
This article explores the phenomenon of corruption that has become common in higher education in developing countries around the world. Cases of educational corruption include, among others, paying bribes for grades, buying diplomas, and admissions to universities. An available body of literature on educational corruption does not provide…
Does Everyday Corruption Affect How Russians View their Political Leadership
2016-02-22
corruption are less, not more, happy with the regime. Street-level corruption is corrosive of the body politic. Our 1. REPORT DATE (DD-MM-YYYY) 4...most citizens’ lives: the country’s political leadership. In Russia, those who frequently encounter corruption are less, not more, happy with the...Russia, those who frequently encounter corruption are less, not more, happy with the regime. The effect on the regime’s public support is not, of course
The environmental Kuznets curve in the presence of corruption in developing countries.
Masron, Tajul Ariffin; Subramaniam, Yogeeswari
2018-05-01
Environmental degradation is at an alarming level in developing economies. The present paper examines the direct and indirect impacts of corruption on environmental deterioration using the panel data of 64 developing countries. Adopting the generalized method of moments (GMM) technique, the paper finds evidence that corruption exhibits a positive impact on pollution. Subsequently, there is also evidence indicating that the level of pollution tends to be higher in countries with a higher level of corruption, eliminating the effectiveness of income effect on environmental preservation. These results also suggest that environmental degradation is monotonically increasing with higher corruption and invalidate the presence of the EKC. Hence, a policy focuses that an anti-corruption particularly in the environmental and natural resources sector needs to be emphasized and enforced in order to reduce or possibly to totally eliminate the rent for corruption.
Youths' views on corruption control in China: politics and social censure.
Jiang, Guoping; Lo, T Wing; Li, Carrie
2013-12-01
It has been asserted that criminal law and common morality are not sufficient terms to describe specific behaviors as corruption because those in power have the capacity to include or exclude certain behavior as a category in the law. Thus, corruption should not be just treated as an objective behavioral category but as a form of social censure. This article reports on a quantitative and qualitative study that collected the views of Chinese youth on the control of corruption in China. It was found that they agreed with the moral-negative judgements behind the censure of corruption, and that bureaucratic forces can be mobilised to punish the corrupt and degrade their status. Mediation analysis discovered that political functions mediate the association between the moral-negative nature and bureaucratic form of the censure of corruption and status degradation of the censured.
Vian, Taryn; Mcintosh, Nathalie; Grabowski, Aria
2017-01-01
Health care sector corruption diverts resources that could otherwise be used to improve access to health services. Use of private-sector practices such as a public-private partnership (PPP) model for hospital governance and management may reduce corruption. In 2011, a government-run hospital in Lesotho was replaced by a PPP hospital, offering an opportunity to compare hospital systems and practices. To assess whether a PPP model in a hospital can help curb corruption. We conducted 36 semistructured interviews with key informants between February 2013 and April 2013. We asked about hospital operations and practices at the government-run and PPP hospitals. We performed content analysis of interview data using a priori codes derived from the Corruption in the Health Sector framework and compared themes related with corruption between the hospitals. Corrupt practices that were described at the government-run hospital (theft, absenteeism, and shirking) were absent in the PPP hospital. In the PPP hospital, anticorruption mechanisms (controls on discretion, transparency, accountability, and detection and enforcement) were described in four management subsystems: human resources, facility and equipment management, drug supply, and security. The PPP hospital appeared to reduce corruption by controlling discretion and increasing accountability, transparency, and detection and enforcement. Changes imposed new norms that supported personal responsibility and minimized opportunities, incentives, and pressures to engage in corrupt practices. By implementing private-sector management practices, a PPP model for hospital governance and management may curb corruption. To assess the feasibility of a PPP, administrators should account for cost savings resulting from reduced corruption.
The Search for Definitions: The Vitality of Politics and the Issue of Corruption.
ERIC Educational Resources Information Center
Johnston, Michael
1996-01-01
Attempts to reconcile classical and modern ways of thinking about corruption by emphasizing the connection between the idea of corruption and the vitality of the political process. Discusses the differences between behavior-specific conceptions of corruption and those emphasizing social and political processes. (MJP)
On Certain Aspects of Acts of Corruption Countermeasures
ERIC Educational Resources Information Center
Mamitova, Zhanat A.; Kumarbekkyzy, Zhaniya; Tapenova, Asem R.; Mahanov, Talgat G.
2016-01-01
One of the biggest problems of developing countries, including Kazakhstan, is corruption. Corruption significantly decelerates the development of economic and social institutions, which may cause distrust in the authorities and a social crisis. Therefore, fighting corruption is a top-priority task of the government of Kazakhstan; this task…
Corruption and Educational Outcomes: Two Steps Forward, One Step Back
ERIC Educational Resources Information Center
Huang, Francis Lim
2008-01-01
Corruption is a problem that continues to plague developed and developing countries worldwide. Previous studies have explored the negative implications of corruption on several aspects of human development, but, despite its serious and long-lasting consequences, the impact of corruption on educational outcomes has started to receive attention only…
32 CFR 516.67 - Overseas cases of fraud or corruption.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Overseas cases of fraud or corruption. 516.67... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas cases of fraud or corruption. (a) Commanders of overseas major commands will establish procedures...
The corruption process of a law enforcement officer: a paradigm of occupational stress and deviancy.
McCafferty, F L; Souryal, S; McCafferty, M A
1998-01-01
The public does not want all laws enforced. In the closed society of law enforcement institutions, police discretion, the conspiracy of silence, the lack of an administration with integrity, and susceptible law enforcement officers contribute to the development of corruption from occupational deviance. Corruption in law enforcement agencies may have similar roots in business, law, medicine, and other professions. Understanding the law enforcement corruption paradigm may therefore be helpful in correcting and curbing corruption in other professions.
Corruption costs lives: evidence from a cross-country study.
Li, Qiang; An, Lian; Xu, Jing; Baliamoune-Lutz, Mina
2018-01-01
This paper investigates the effect of corruption on health outcomes by using cross-country panel data covering about 150 countries for the period of 1995 to 2012. We employ ordinary least squares (OLS), fixed-effects and two-stage least squares (2SLS) estimation methods, and find that corruption significantly increases mortality rates, and reduces life expectancy and immunization rates. The results are consistent across different regions, gender, and measures of corruption. The findings suggest that reducing corruption can be an effective method to improve health outcomes.
A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs †
Shi, Yang; Wei, Wujing; He, Zongjian
2015-01-01
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform. Handling white-box attacks in a WSN scenario is a challenging task. Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios. As a countermeasure against the threat in this context, in this paper, we propose a class of lightweight secure implementations of the symmetric encryption algorithm SMS4. The basic idea of our approach is to merge several steps of the round function of SMS4 into table lookups, blended by randomly generated mixing bijections. Therefore, the size of the implementations are significantly reduced while keeping the same security efficiency. The security and efficiency of the proposed solutions are theoretically analyzed. Evaluation shows our solutions satisfy the requirement of sensor nodes in terms of limited memory size and low computational costs. PMID:26007737
Huang, Zhen-wei; Liu, Li; Zheng, Wen-wen; Tan, Xu-yun; Zhao, Xian
2015-01-01
Previous studies obtained mixed results regarding the association between collectivism and corruption. To make sense of the mixed results, the current research examined the moderating role of evaluation apprehension on the relationship between collectivism and corruption. Study 1, using a bribery scenario, indicated that collectivism facilitated corruption only when evaluation apprehension was low. Study 2, using a real money bribery game, confirmed the moderated model found in Study 1. Study 3 further demonstrated the different effects of vertical/horizontal collectivism on corruption. Our results suggest that a society may effectively combat corruption by increasing its social costs while, at the same time, retaining its collectivistic values. PMID:25815819
Huang, Zhen-wei; Liu, Li; Zheng, Wen-wen; Tan, Xu-yun; Zhao, Xian
2015-01-01
Previous studies obtained mixed results regarding the association between collectivism and corruption. To make sense of the mixed results, the current research examined the moderating role of evaluation apprehension on the relationship between collectivism and corruption. Study 1, using a bribery scenario, indicated that collectivism facilitated corruption only when evaluation apprehension was low. Study 2, using a real money bribery game, confirmed the moderated model found in Study 1. Study 3 further demonstrated the different effects of vertical/horizontal collectivism on corruption. Our results suggest that a society may effectively combat corruption by increasing its social costs while, at the same time, retaining its collectivistic values.
Corruption: Taking into account the psychological mimicry of officials
NASA Astrophysics Data System (ADS)
Kolesin, Igor; Malafeyev, Oleg; Andreeva, Mariia; Ivanukovich, Georgiy
2017-07-01
A mathematical model of corruption with regard to psychological mimicry in the administrative apparatus with three forms of corruption is constructed. It is assumed that the change of officials forms of corruption is due to situational factors, and anti-corruption laws imply the change of the dominant form. Form's changing is modeled by the system of four differential equations (including groups of corrupt officials), describing the number of groups. The speed of the transition from group to group is expressed through the frequency of meetings. The controlling influence is expressed through the force of anticorruption laws. Two cases are discussed: strictly constant and variable (depending on the scope of one or another form). The equilibrium states that allow to specify the dominant form and investigate its stability, depending on the parameters of the psychological mimicry and rigor of anti-corruption laws are found and discussed.
Corruption in Higher Education: Does It Differ across the Nations and Why?
ERIC Educational Resources Information Center
Osipian, Ararat L.
2008-01-01
Corruption in higher education is a newly emerging topic in the field of education research. Some aspects of corruption in education have been addressed in recent works by Eckstein, Hallak & Poisson, Heyneman, Noah & Eckstein, Segal, and Washburn. However, rigorous systematic research is lacking. This article considers corruption in higher…
Analysis of the Reasons and Countermeasures for Academic Corruption
ERIC Educational Resources Information Center
Jin, Xia; Bin, Feng
2007-01-01
This paper presents a perspective of the various types of academic corruption that is currently running rife in society, a theoretical analysis of the roots of academic corruption, and proposals for a number for countermeasures to put a stop to academic corruption. (Contains 3 notes.) [This article was translated by Ted Wang.
Corruptness in Education: A Tentative Discussion
ERIC Educational Resources Information Center
Dongping, Yang
2004-01-01
With more and more instances of corruptness coming to light in the field of education, corruptness in education has become an intense "hot point" of concern in society. This article is a tentative exploration into this matter. In this article, the author discusses the categories of the corruptness in education that has found widespread…
Foreign Experience of Formation of Anti-Corruption Strategies
ERIC Educational Resources Information Center
Almaganbetov, Pernebay; Kenzhibekova, Elmira; Khvedelidze, Teimuraz; Buranbayeva, Saliman; Sailibayeva, Zhanel
2016-01-01
Corruption is the main obstacle on the way toward state's economic and political growth. Corrupt practices are one of the oldest forms of crime that arose with an appearance of nationhood. Nowadays, corruption harms the economies of developing countries that are undergoing a process of an economic model transformation. Kazakhstan is among these…
Higher Education Corruption in Ukraine as Reflected in the Nation's Media
ERIC Educational Resources Information Center
Osipian, Ararat L.
2007-01-01
This paper considers corruption in higher education in Ukraine as reflected in the national media, including such aspects as corruption in admissions to higher education institutions and corruption in administering the newly introduced standardized test. The major focus is on the opinions of the leading figures of the education reform on…
The Cost of Corruption in Higher Education
ERIC Educational Resources Information Center
Heyneman, Stephen P.; Anderson, Kathryn H.; Nuraliyeva, Nazym
2008-01-01
Corruption was symptomatic of business and government interactions in Russia and other countries of the former Soviet Union before and during the economic transition of the 1990s. Corruption is difficult to quantify, but the perception of corruption is quantifiable. Nations can even be arranged along a hierarchy by the degree to which they are…
Corruption in Russian Higher Education as Reflected in the Media
ERIC Educational Resources Information Center
Osipian, Ararat L.
2008-01-01
This paper considers corruption in higher education in Russia as reflected in the national media, including such aspects as corruption in admissions to higher education institutions and corruption in administering the newly introduced standardized test. The major focus is on the opinions of the leading figures of the education reform as related to…
Corruption in Higher Education: Causes, Consequences, Reforms. The Case of Georgia
ERIC Educational Resources Information Center
Orkodashvili, Mariam
2009-01-01
Certain cases from any single country might provide examples for consideration of corruption issues for other countries or regions. Corruption cases and the strategies of fighting them in Georgian flagship universities might be noteworthy and useful for other countries facing similar problems. The paper discusses the features of corruption in…
An Archeology of Corruption in Medicine.
Little, Miles; Lipworth, Wendy; Kerridge, Ian
2018-07-01
Corruption is a word used loosely to describe many kinds of action that people find distasteful. We prefer to reserve it for the intentional misuse of the good offices of an established social entity for private benefit, posing as fair trading. The currency of corruption is not always material or financial. Moral corruption is all too familiar within churches and other ostensibly beneficent institutions, and it happens within medicine and the pharmaceutical industries. Corrupt behavior reduces trust, costs money, causes injustice, and arouses anger. Yet it persists, despite all efforts since the beginnings of societies. People who act corruptly may lack conscience and empathy in the same way as those with some personality disorders. Finding ways to prevent corruption from contaminating beneficent organizations is therefore likely to be frustratingly difficult. Transparency and accountability may go some way, but the determined corruptor is unlikely to feel constrained by moral and reporting requirements of this kind. Punishment and redress are complicated issues, unlikely to satisfy victims and society at large. Both perhaps should deal in the same currency-material or social-in which the corrupt dealing took place.
Vian, Taryn; McIntosh, Nathalie; Grabowski, Aria
2017-01-01
Introduction Health care sector corruption diverts resources that could otherwise be used to improve access to health services. Use of private-sector practices such as a public-private partnership (PPP) model for hospital governance and management may reduce corruption. In 2011, a government-run hospital in Lesotho was replaced by a PPP hospital, offering an opportunity to compare hospital systems and practices. Objective To assess whether a PPP model in a hospital can help curb corruption. Methods We conducted 36 semistructured interviews with key informants between February 2013 and April 2013. We asked about hospital operations and practices at the government-run and PPP hospitals. We performed content analysis of interview data using a priori codes derived from the Corruption in the Health Sector framework and compared themes related with corruption between the hospitals. Results Corrupt practices that were described at the government-run hospital (theft, absenteeism, and shirking) were absent in the PPP hospital. In the PPP hospital, anticorruption mechanisms (controls on discretion, transparency, accountability, and detection and enforcement) were described in four management subsystems: human resources, facility and equipment management, drug supply, and security. Conclusion The PPP hospital appeared to reduce corruption by controlling discretion and increasing accountability, transparency, and detection and enforcement. Changes imposed new norms that supported personal responsibility and minimized opportunities, incentives, and pressures to engage in corrupt practices. By implementing private-sector management practices, a PPP model for hospital governance and management may curb corruption. To assess the feasibility of a PPP, administrators should account for cost savings resulting from reduced corruption. PMID:28746025
Corruption in Higher Education: Some Findings from the States of the Former Soviet Union
ERIC Educational Resources Information Center
Temple, Paul; Petrov, Georgy
2004-01-01
Many observers have noted that corruption in higher education is widespread in the states of the former Soviet Union. Little empirical evidence is available, however. This article examines some theoretical approaches to the study of corruption, and presents empirical data on corruption in higher education from Russia and Azerbaijan, collected by…
Why Do People Engage in Corruption? The Case of Estonia
ERIC Educational Resources Information Center
Tavits, Margit
2010-01-01
This study uses survey data for 2004 on the general public (N = 788) and public officials (N = 791) in the young post-communist democracy of Estonia to examine individual-level determinants of corruption. The results indicate that both public officials and citizens are more likely to engage in corruption when they do not define corruption as…
18 CFR 3c.3 - Reporting fraud, waste, abuse, and corruption and cooperation with official inquiries.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., abuse, and corruption and cooperation with official inquiries. 3c.3 Section 3c.3 Conservation of Power... OF CONDUCT § 3c.3 Reporting fraud, waste, abuse, and corruption and cooperation with official..., abuse, and corruption in Commission programs, including on the part of Commission employees, contractors...
ERIC Educational Resources Information Center
Osipian, Ararat L.
2007-01-01
Education in Central Eurasia has become one of the industries, most affected by corruption. Corruption in academia, including bribery, extortions, embezzlement, nepotism, fraud, cheating, and plagiarism, is reflected in the region's media and addressed in few scholarly works. This paper considers corruption in higher education as a product of…
18 CFR 3c.3 - Reporting fraud, waste, abuse, and corruption and cooperation with official inquiries.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., abuse, and corruption and cooperation with official inquiries. 3c.3 Section 3c.3 Conservation of Power... OF CONDUCT § 3c.3 Reporting fraud, waste, abuse, and corruption and cooperation with official..., abuse, and corruption in Commission programs, including on the part of Commission employees, contractors...
"Feed from the Service": Corruption and Coercion in State-University Relations in Central Eurasia
ERIC Educational Resources Information Center
Osipian, Ararat L.
2009-01-01
Education in Central Eurasia has become one of the services most affected by corruption. Corruption in academia, including bribery, extortion, embezzlement, nepotism, fraud, cheating, and plagiarism, is reflected in the region's media and addressed in a few scholarly works. This article considers corruption in higher education as a product of…
Using Supply, Demand, and the Cournot Model to Understand Corruption
ERIC Educational Resources Information Center
Hayford, Marc D.
2007-01-01
The author combines the supply and demand model of taxes with a Cournot model of bribe takers to develop a simple and useful framework for understanding the effect of corruption on economic activity. There are many examples of corruption in both developed and developing countries. Because corruption decreases the level of economic activity and…
AIDS NGOS and corruption in Nigeria
Smith, Daniel Jordan
2011-01-01
Using two ethnographic case studies, the intersecting dynamics of inequality, morality, and corruption are examined as they play out in Nigerian AIDS NGOs. To the Nigerian public, local AIDS organizations are widely seen as conduits for corruption. But local opinions of particular NGOs and their leaders turn less on whether donor resources were misused and more on the ways that people who accumulate the benefits of corruption use them socially. Nevertheless, discontent swirls about corruption in general, a fact that suggests a gradual change in people's understandings of the processes that produce inequality in Nigeria. PMID:22469532
Inviting In the Private Sector
2002-10-01
private sector . After all, corruption does not just involve government. Business people and lawyers and citizens pay the bribes, even as they condemn bribery. They should be invited to become part of the solution. But how? The first point to note is that business people and citizens know where corruption exists and how corrupt systems work. Citizens understand how bribery shapes the services they receive or don’t receive. Accountants know the illicit games played with audits and taxes. Lawyers understand corrupt legal practices. Business people know all about corrupt
The Effect of Self-Esteem on Corrupt Intention: The Mediating Role of Materialism
Liang, Yuan; Liu, Li; Tan, Xuyun; Huang, Zhenwei; Dang, Jianning; Zheng, Wenwen
2016-01-01
The present set of studies aimed to explore the effect of self-esteem on corrupt intention and the mediating role of materialism in generating this effect. In Study 1, we used questionnaires to investigate the correlation among self-esteem, materialism, and corrupt intention. In Study 2, we manipulated self-esteem to explore the causal effect of self-esteem on materialism and corrupt intention. In Study 3, we manipulated materialism to examine whether inducing materialism can reduce the relationship between self-esteem and corrupt intention. The three studies converged to show that increased self-esteem caused a low level of materialism, which in turn decreased corrupt intention. The theoretical and practical implications of the results are discussed. PMID:27462297
Worldwide clustering of the corruption perception
NASA Astrophysics Data System (ADS)
Paulus, Michal; Kristoufek, Ladislav
2015-06-01
We inspect a possible clustering structure of the corruption perception among 134 countries. Using the average linkage clustering, we uncover a well-defined hierarchy in the relationships among countries. Four main clusters are identified and they suggest that countries worldwide can be quite well separated according to their perception of corruption. Moreover, we find a strong connection between corruption levels and a stage of development inside the clusters. The ranking of countries according to their corruption perfectly copies the ranking according to the economic performance measured by the gross domestic product per capita of the member states. To the best of our knowledge, this study is the first one to present an application of hierarchical and clustering methods to the specific case of corruption.
Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division
Khan, Wazir Zada; Aalsalem, Mohammed Y.; Saad, N. M.
2015-01-01
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads. PMID:25992913
Zhao, Huanhuan; Zhang, Heyun; Xu, Yan
2017-01-31
The present study attempts to examine the effect of perceived descriptive norms on corrupt intention (e.g., bribe-taking intention) and then further explore the psychological mechanism underlying this effect. Based on social cognitive theory, we established a mediation model in which moral disengagement partially mediated the link between perceived descriptive norms and corrupt intention. In Study 1, participants (N = 690) completed a series of questionnaires, and the results demonstrated that, while perceived descriptive norms were positively associated with corrupt intention, it was partially mediated by moral disengagement. In Study 2, we conducted a priming experiment (N = 161) to test the causal relationship and psychological mechanism between perceived descriptive norms and corrupt intention. The results revealed that perceived descriptive norms triggered the propensity of individuals to morally disengage, which in turn, partially increased their corrupt intention. This study not only extends previous research by providing evidence that moral disengagement may be one of the reasons why perceived descriptive norms facilitate corrupt intention, but also suggests that reshaping normative beliefs and preventing the moral disengagement of individuals may be the effective ways to curb corrupt behaviours. © 2017 International Union of Psychological Science.
Avramova, Zoya
2015-07-01
Drought, salinity, extreme temperature variations, pathogen and herbivory attacks are recurring environmental stresses experienced by plants throughout their life. To survive repeated stresses, plants provide responses that may be different from their response during the first encounter with the stress. A different response to a similar stress represents the concept of 'stress memory'. A coordinated reaction at the organismal, cellular and gene/genome levels is thought to increase survival chances by improving the plant's tolerance/avoidance abilities. Ultimately, stress memory may provide a mechanism for acclimation and adaptation. At the molecular level, the concept of stress memory indicates that the mechanisms responsible for memory-type transcription during repeated stresses are not based on repetitive activation of the same response pathways activated by the first stress. Some recent advances in the search for transcription 'memory factors' are discussed with an emphasis on super-induced dehydration stress memory response genes in Arabidopsis. © 2015 The Author The Plant Journal © 2015 John Wiley & Sons Ltd.
E-Government Attempts in Small Island Developing States: The Rate of Corruption with Virtualization.
Sari, Arif
2017-12-01
In recent years, many Small Island Developing State (SIDS) governments have worked to increase openness and transparency of their transactions as a means to enhance efficiency and reduce corruption in their economies. In order to achieve a cost-effective and efficient strategy to implement a transparent government, Information Communication Technologies offer an opportunity of virtualization by deploying e-government services to promote transparency, accountability and consistency in the public sector and to minimize corruption. This paper explores the potential impact of government virtualization by SIDS and against corruption by comparing the corruption perception index (CPI) rates of 15 SIDS countries. The CPI relates to the degree by which corruption is perceived to exist among public officials and politicians by business people and country analysts. In order to reveal the long-term impact of virtual deployment and its consequences on corruption, an in-depth case analysis based on the CPI index rates was conducted on the deployment of the e-government system in Cyprus.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fischler, M.
1992-04-01
The issues to be addressed here are those of balance'' in machine architecture. By this, we mean how much emphasis must be placed on various aspects of the system to maximize its usefulness for physics. There are three components that contribute to the utility of a system: How the machine can be used, how big a problem can be attacked, and what the effective capabilities (power) of the hardware are like. The effective power issue is a matter of evaluating the impact of design decisions trading off architectural features such as memory bandwidth and interprocessor communication capabilities. What is studiedmore » is the effect these machine parameters have on how quickly the system can solve desired problems. There is a reasonable method for studying this: One selects a few representative algorithms and computes the impact of changing memory bandwidths, and so forth. The only room for controversy here is in the selection of representative problems. The issue of how big a problem can be attacked boils down to a balance of memory size versus power. Although this is a balance issue it is very different than the effective power situation, because no firm answer can be given at this time. The power to memory ratio is highly problem dependent, and optimizing it requires several pieces of physics input, including: how big a lattice is needed for interesting results; what sort of algorithms are best to use; and how many sweeps are needed to get valid results. We seem to be at the threshold of learning things about these issues, but for now, the memory size issue will necessarily be addressed in terms of best guesses, rules of thumb, and researchers' opinions.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fischler, M.
1992-04-01
The issues to be addressed here are those of ``balance`` in machine architecture. By this, we mean how much emphasis must be placed on various aspects of the system to maximize its usefulness for physics. There are three components that contribute to the utility of a system: How the machine can be used, how big a problem can be attacked, and what the effective capabilities (power) of the hardware are like. The effective power issue is a matter of evaluating the impact of design decisions trading off architectural features such as memory bandwidth and interprocessor communication capabilities. What is studiedmore » is the effect these machine parameters have on how quickly the system can solve desired problems. There is a reasonable method for studying this: One selects a few representative algorithms and computes the impact of changing memory bandwidths, and so forth. The only room for controversy here is in the selection of representative problems. The issue of how big a problem can be attacked boils down to a balance of memory size versus power. Although this is a balance issue it is very different than the effective power situation, because no firm answer can be given at this time. The power to memory ratio is highly problem dependent, and optimizing it requires several pieces of physics input, including: how big a lattice is needed for interesting results; what sort of algorithms are best to use; and how many sweeps are needed to get valid results. We seem to be at the threshold of learning things about these issues, but for now, the memory size issue will necessarily be addressed in terms of best guesses, rules of thumb, and researchers` opinions.« less
Introduction: Institutional corruption and the pharmaceutical policy.
Rodwin, Marc A
2013-01-01
Today, the goals of pharmaceutical policy and medical practice are often undermined due to institutional corruption - that is, widespread or systemic practices, usually legal, that undermine an institution's objectives or integrity. In this symposium, 16 articles investigate the corruption of pharmaceutical policy, each taking a different look at the sources of corruption, how it occurs, and what is corrupted. We will see that the pharmaceutical industry's own purposes are often undermined. Furthermore, pharmaceutical industry funding of election campaigns and lobbying skews the legislative process that sets pharmaceutical policy. Moreover, certain practices have corrupted medical research, the production of medical knowledge, the practice of medicine, drug safety, the Food and Drug Administration's oversight of the pharmaceutical market, and the trustworthiness of patient advocacy organizations. © 2013 American Society of Law, Medicine & Ethics, Inc.
AIDS NGOS and corruption in Nigeria.
Smith, Daniel Jordan
2012-05-01
Using two ethnographic case studies, the intersecting dynamics of inequality, morality, and corruption are examined as they play out in Nigerian AIDS NGOs. To the Nigerian public, local AIDS organizations are widely seen as conduits for corruption. But local opinions of particular NGOs and their leaders turn less on whether donor resources were misused and more on the ways that people who accumulate the benefits of corruption use them socially. Nevertheless, discontent swirls about corruption in general, a fact that suggests a gradual change in people's understandings of the processes that produce inequality in Nigeria. Copyright © 2011 Elsevier Ltd. All rights reserved.
Joint Strategic Oversight Plan for Afghanistan Reconstruction FY13
2012-07-01
programs within its ministries and made progress in deterring corruption by investi gating, prosecuting, sanctioning or removing corrupt officials from...within its ministries and made progress in deterring corruption by investigat ing, prosecuting, sanctioning or removing corrupt officials from office...of oversight and Lodin’s credibility. • Department of Justice and the Justice Sector Support Program continued their suspension of training the
Semantic acquisition without memories: evidence from transient global amnesia.
Guillery, B; Desgranges, B; Katis, S; de la Sayette, V; Viader, F; Eustache, F
2001-12-04
Transient global amnesia (TGA), characterised by a profound anterograde amnesia, is a model of interest to study the acquisition of novel meanings independent of episodic functioning. Three patients were tested during a TGA attack, two in the early recovery phase and the third during the acute phase of TGA, with a semantic priming task involving a restructuring process of conceptual knowledge. During TGA, all patients demonstrated priming effects. Results obtained the day after the episode with the same task showed that these effects persisted at least one day. Episodic memory seems not to be critical for the formation of novel connections among unrelated semantic representations, in accordance with Tulving's model of memory, i.e. episodic memory is not necessary for the acquisition of semantic information.
Corruption kills: estimating the global impact of corruption on children deaths.
Hanf, Matthieu; Van-Melle, Astrid; Fraisse, Florence; Roger, Amaury; Carme, Bernard; Nacher, Mathieu
2011-01-01
Information on the global risk factors of children mortality is crucial to guide global efforts to improve survival. Corruption has been previously shown to significantly impact on child mortality. However no recent quantification of its current impact is available. The impact of corruption was assessed through crude Pearson's correlation, univariate and multivariate linear models coupling national under-five mortality rates in 2008 to the national "perceived level of corruption" (CPI) and a large set of adjustment variables measured during the same period. The final multivariable model (adjusted R(2)= 0.89) included the following significant variables: percentage of people with improved sanitation (p.value<0.001), logarithm of total health expenditure (p.value = 0.006), Corruption Perception Index (p.value<0.001), presence of an arid climate on the national territory (p = 0.006), and the dependency ratio (p.value<0.001). A decrease in CPI of one point (i.e. a more important perceived corruption) was associated with an increase in the log of national under-five mortality rate of 0.0644. According to this result, it could be roughly hypothesized that more than 140000 annual children deaths could be indirectly attributed to corruption. Global response to children mortality must involve a necessary increase in funds available to develop water and sanitation access and purchase new methods for prevention, management, and treatment of major diseases drawing the global pattern of children deaths. However without paying regard to the anti-corruption mechanisms needed to ensure their proper use, it will also provide further opportunity for corruption. Policies and interventions supported by governments and donors must integrate initiatives that recognise how they are inter-related.
Review of corruption in the health sector: theory, methods and interventions.
Vian, Taryn
2008-03-01
There is increasing interest among health policymakers, planners and donors in how corruption affects health care access and outcomes, and what can be done to combat corruption in the health sector. Efforts to explain the risk of abuse of entrusted power for private gain have examined the links between corruption and various aspects of management, financing and governance. Behavioural scientists and anthropologists also point to individual and social characteristics which influence the behaviour of government agents and clients. This article presents a comprehensive framework and a set of methodologies for describing and measuring how opportunities, pressures and rationalizations influence corruption in the health sector. The article discusses implications for intervention, and presents examples of how theory has been applied in research and practice. Challenges of tailoring anti-corruption strategies to particular contexts, and future directions for research, are addressed.
ERIC Educational Resources Information Center
Kuyuni, Stephen Muhala
2017-01-01
Corruption has been a worldwide issue in the contemporary world today. Many parts the world including Kenya is affected by corruption. Many writers and critics have shown that it's spreading at a very high rate just like HIV/AIDS and environmental degradation. They have noted that corruption is caused by the following factors: poor governance,…
The complex links between governance and biodiversity.
Barrett, Christopher B; Gibson, Clark C; Hoffman, Barak; McCubbins, Mathew D
2006-10-01
We argue that two problems weaken the claims of those who link corruption and the exploitation of natural resources. The first is conceptual and the second is methodological. Studies that use national-level indicators of corruption fail to note that corruption comes in many forms, at multiple levels, that may affect resource use quite differently: negatively, positively, or not at all. Without a clear causal model of the mechanism by which corruption affects resources, one should treat with caution any estimated relationship between corruption and the state of natural resources. Simple, atheoretical models linking corruption measures and natural resource use typically do not account for other important control variables pivotal to the relationship between humans and natural resources. By way of illustration of these two general concerns, we used statistical methods to demonstrate that the findings of a recent, well-known study that posits a link between corruption and decreases in forests and elephants are not robust to simple conceptual and methodological refinements. In particular, once we controlled for a few plausible anthropogenic and biophysical conditioning factors, estimated the effects in changes rather than levels so as not to confound cross-sectional and longitudinal variation, and incorporated additional observations from the same data sources, corruption levels no longer had any explanatory power.
National Memorial Institute for the Prevention of Terrorism
NASA Astrophysics Data System (ADS)
Reimer, Dennis J.; Houghton, Brian K.; Powell, Ellen L.
2004-09-01
The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City is a living memorial to the victims, survivors, family members and rescue workers affected by the April 19, 1995 bombing of the Murrah Federal Building. The Institute conducts research into the development of technologies to counter biological, nuclear and chemical weapons of mass destruction and cyberterrorism, as well as research into the social and political causes and effects of terrorism. This paper describes MIPT funded research in areas of detection, decontamination, personal protective equipment, attack simulations, treatments, awareness, improved public communication during and after an incident, as well as lessons learned from terrorist incidents.
National Memorial Institute for the Prevention of Terrorism
NASA Astrophysics Data System (ADS)
Reimer, Dennis J.; Houghton, Brian K.; Ellis, James O., III
2003-09-01
The National Memorial Institute for the Prevention of Terrorism in Oklahoma City is a living memorial to the victims, survivors, family members and rescue workers affected by the April 19, 1995 bombing of the Murrah Federal Building. The Institute conducts research into the development of technologies to counter biological, nuclear and chemical weapons of mass destruction and cyberterrorism, as well as research into the social and political causes and effects of terrorism. This paper describes MIPT funded research in areas of detection, decontamination, personal protective equipment, attack simulations, treatments, awareness, improved public communication during and after an incident, as well as lessons learned from terrorist incidents.
NASA Astrophysics Data System (ADS)
Sarmini; Suyanto, Totok; Nadiroh, Ulin
2018-01-01
In general, corruption is very harmful to society. One of the efforts in preventing corruption is by the culture of Anti-Corruption Education in the young generation through teaching materials in schools. The research method used is qualitative description. The sample in this research is 60 junior high school teachers of Citizenship Education in Surabaya. Data analysis technique used in this research is descriptive statistic with percentage technique. The result of this research is that it is very important that the value of the character of anti-corruption education in teaching materials to grow in the young generation.
Luna, Florencia
1999-07-01
Last year there was a heated debate regarding clinical trials with AZT carried out in developing countries. AIDS vaccine trials also posed various dilemmas and ethical problems. In this paper I will consider the possibility of corruption in bioethics, and international multi-centre research will be taken as an example. International clinical trials will be seen from another perspective. I will try to show that the possibility of systemic corruption should be considered when designing an international multi-centre research trial which may involve countries in very different situations regarding corruption. I will analyze three different approaches to this problem and suggest some strategies regarding their capacity to exclude the possibility of corruption.
NASA Astrophysics Data System (ADS)
Malafeyev, O. A.; Nemnyugin, S. A.; Rylow, D.; Kolpak, E. P.; Awasthi, Achal
2017-07-01
The corruption dynamics is analyzed by means of the lattice model which is similar to the three-dimensional Ising model. Agents placed at nodes of the corrupt network periodically choose to perfom or not to perform the act of corruption at gain or loss while making decisions based on the process history. The gain value and its dynamics are defined by means of the Markov stochastic process modelling with parameters established in accordance with the influence of external and individual factors on the agent's gain. The model is formulated algorithmically and is studied by means of the computer simulation. Numerical results are obtained which demonstrate asymptotic behaviour of the corruption network under various conditions.
Does the Wage Gap between Private and Public Sectors Encourage Political Corruption?
Podobnik, Boris; Vukovic, Vuk; Stanley, H. Eugene
2015-01-01
We present a dynamic network model of corrupt and noncorrupt employees representing two states in the public and private sector. Corrupt employees are more connected to one another and are less willing to change their attitudes regarding corruption than noncorrupt employees. This behavior enables them to prevail and become the majority in the workforce through a first-order phase transition even though they initially represented a minority. In the model, democracy—understood as the principle of majority rule—does not create corruption, but it serves as a mechanism that preserves corruption in the long run. The motivation for our network model is a paradox that exists on the labor market. Although economic theory indicates that higher risk investments should lead to larger rewards, in many developed and developing countries workers in lower-risk public sector jobs are paid more than workers in higher-risk private sector jobs. To determine the long-run sustainability of this economic paradox, we study data from 28 EU countries and find that the public sector wage premium increases with the level of corruption. PMID:26495847
A Decision-Based Modified Total Variation Diffusion Method for Impulse Noise Removal
Zhu, Qingxin; Song, Xiuli; Tao, Jinsong
2017-01-01
Impulsive noise removal usually employs median filtering, switching median filtering, the total variation L1 method, and variants. These approaches however often introduce excessive smoothing and can result in extensive visual feature blurring and thus are suitable only for images with low density noise. A new method to remove noise is proposed in this paper to overcome this limitation, which divides pixels into different categories based on different noise characteristics. If an image is corrupted by salt-and-pepper noise, the pixels are divided into corrupted and noise-free; if the image is corrupted by random valued impulses, the pixels are divided into corrupted, noise-free, and possibly corrupted. Pixels falling into different categories are processed differently. If a pixel is corrupted, modified total variation diffusion is applied; if the pixel is possibly corrupted, weighted total variation diffusion is applied; otherwise, the pixel is left unchanged. Experimental results show that the proposed method is robust to different noise strengths and suitable for different images, with strong noise removal capability as shown by PSNR/SSIM results as well as the visual quality of restored images. PMID:28536602
Does the Wage Gap between Private and Public Sectors Encourage Political Corruption?
Podobnik, Boris; Vukovic, Vuk; Stanley, H Eugene
2015-01-01
We present a dynamic network model of corrupt and noncorrupt employees representing two states in the public and private sector. Corrupt employees are more connected to one another and are less willing to change their attitudes regarding corruption than noncorrupt employees. This behavior enables them to prevail and become the majority in the workforce through a first-order phase transition even though they initially represented a minority. In the model, democracy-understood as the principle of majority rule-does not create corruption, but it serves as a mechanism that preserves corruption in the long run. The motivation for our network model is a paradox that exists on the labor market. Although economic theory indicates that higher risk investments should lead to larger rewards, in many developed and developing countries workers in lower-risk public sector jobs are paid more than workers in higher-risk private sector jobs. To determine the long-run sustainability of this economic paradox, we study data from 28 EU countries and find that the public sector wage premium increases with the level of corruption.
Detection of complex cyber attacks
NASA Astrophysics Data System (ADS)
Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug
2006-05-01
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.
Setting a disordered password on a photonic memory
NASA Astrophysics Data System (ADS)
Su, Shih-Wei; Gou, Shih-Chuan; Chew, Lock Yue; Chang, Yu-Yen; Yu, Ite A.; Kalachev, Alexey; Liao, Wen-Te
2017-06-01
An all-optical method of setting a disordered password on different schemes of photonic memory is theoretically studied. While photons are regarded as ideal information carriers, it is imperative to implement such data protection on all-optical storage. However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. We theoretically demonstrate a protocol using spatially disordered laser fields to encrypt data stored on an optical memory, namely, encrypted photonic memory. To address the broadband storage, we also investigate a scheme of disordered echo memory with a high fidelity approaching unity. The proposed method increases the difficulty for the eavesdropper to retrieve the stored photon without the preset password even when the randomized and stored photon state is nearly perfectly cloned. Our results pave ways to significantly reduce the exposure of memories, required for long-distance communication, to eavesdropping and therefore restrict the optimal attack on communication protocols. The present scheme also increases the sensitivity of detecting any eavesdropper and so raises the security level of photonic information technology.
Echterhoff, Gerald; Hirst, William
2006-06-01
Extant research shows that people use retrieval ease, a feeling-based cue, to judge how well they remember life periods. Extending this approach, we investigated the role of retrieval ease in memory judgments for single events. In Experiment 1, participants who were asked to recall many memories of an everyday event (New Year's Eve) rated retrieval as more difficult and judged their memory as worse than did participants asked to recall only a few memories. In Experiment 2, this ease-of-retrieval effect was found to interact with the shocking character of the remembered event: There was no effect when the event was highly shocking (i.e., learning about the attacks of September 11, 2001), whereas an effect was found when the event was experienced as less shocking (due either to increased distance to "9/11" or to the nonshocking nature of the event itself). Memory vividness accounted for additional variance in memory judgments, indicating an independent contribution of content-based cues in judgments of event memories.
Corruption and economic growth with non constant labor force growth
NASA Astrophysics Data System (ADS)
Brianzoni, Serena; Campisi, Giovanni; Russo, Alberto
2018-05-01
Based on Brianzoni et al. [1] in the present work we propose an economic model regarding the relationship between corruption in public procurement and economic growth. We extend the benchmark model by introducing endogenous labor force growth, described by the logistic equation. The results of previous studies, as Del Monte and Papagni [2] and Mauro [3], show that countries are stuck in one of the two equilibria (high corruption and low economic growth or low corruption and high economic growth). Brianzoni et al. [1] prove the existence of a further steady state characterized by intermediate levels of capital per capita and corruption. Our aim is to investigate the effects of the endogenous growth around such equilibrium. Moreover, due to the high number of parameters of the model, specific attention is given to the numerical simulations which highlight new policy measures that can be adopted by the government to fight corruption.
Corruption and Local Democratization in Indonesia: The Role of Islamic Parties1
Henderson, J. Vernon; Kuncoro, Ari
2013-01-01
Indonesia has a tradition of corruption among local officials who harass and collect bribes from firms. This paper examines whether corruption is affected by a change in institutions introducing local democratization and by party composition of local assemblies. Democratization occurred in 1999 and decentralization in 2001. We have firm-level data for 2001 and 2004. The 2001 data benchmark corruption at the time of decentralization, but for a limited sample of districts. We find that corruption declines between 2001 and 2004 overall, but much less [more] so in districts with more secular [Islamic] party representatives in district assemblies. For a larger sample of districts, correspondingly, we find that corruption in 2004 is more in districts which voted more in favor of secular party representatives in the first elections in 1999. We argue that the effects seem to be causal, over above any effects of changing religiosity and economic circumstances across districts. PMID:25083023
Control of corruption in healthcare.
Ahmed, Armin; Azim, Afzal
2015-01-01
A recently published article on corruption in Indian healthcare in the BMJ has triggered a hot debate and numerous responses (1, 2, 3, 4). We do agree that corruption in Indian healthcare is a colossal issue and needs to be tackled urgently (5). However, we want to highlight that corruption in healthcare is not a local phenomenon confined to the Indian subcontinent, though India does serve as a good case study and intervention area due to the magnitude of the problem and the country's large population (6). Good governance, strict rules, transparency and zero tolerance are some of the strategies prescribed everywhere to tackle corruption. However, those entrusted with implementing good governance and strict rules in India need to go through a process of introspection to carry out their duties in a responsible fashion. At present, it looks like a no-win situation. In this article, we recommend education in medical ethics as the major intervention for dealing with corruption in healthcare.
Corruption and Local Democratization in Indonesia: The Role of Islamic Parties.
Henderson, J Vernon; Kuncoro, Ari
2011-03-01
Indonesia has a tradition of corruption among local officials who harass and collect bribes from firms. This paper examines whether corruption is affected by a change in institutions introducing local democratization and by party composition of local assemblies. Democratization occurred in 1999 and decentralization in 2001. We have firm-level data for 2001 and 2004. The 2001 data benchmark corruption at the time of decentralization, but for a limited sample of districts. We find that corruption declines between 2001 and 2004 overall, but much less [more] so in districts with more secular [Islamic] party representatives in district assemblies. For a larger sample of districts, correspondingly, we find that corruption in 2004 is more in districts which voted more in favor of secular party representatives in the first elections in 1999. We argue that the effects seem to be causal, over above any effects of changing religiosity and economic circumstances across districts.
[Corruption risks in relations between doctor and patient ].
Kolwitz, Marcin; Gąsiorowski, Jakub
2014-01-01
The article describes the problem of corruption occurring in the relationship between doctor and patient. The doctor-patient relationship, including the provision of health services, is one of several potential areas of corruption in the health care system. Among the reasons for the existence of corruption in these relationships are the need to obtain better healthcare for the patient, and higher earnings in the case of a doctor. Indications of corruption are utilitarian (action for personal advantage without ethical aspects), but may also be (actually or in the patient's opinion) the only way to obtain services and save health and even life. Corruption between the doctor and the patient can be limited by better organization of the health care system, including the financing of benefits and education of medical personnel and patients, as well as traditional legal measures, such as prevention or the application of criminal sanctions.
The importance of anti corruption education teaching materials for the young generation
NASA Astrophysics Data System (ADS)
Sarmini; Made Swanda, I.; Nadiroh, Ulin
2018-01-01
Corruption is one of the most serious issues in many countries. The purpose of this paper is to identify the importance of anti-corruption education teaching materials for the younger generation. The research method used qualitative description with questionnaire as data collection tool. The sample in this research was 150 junior high school teachers in Surabaya. Data analysis technique used in this research was descriptive statistic with percentage technique. The result of this research was that Socisl Studies teachers in Surabaya realize that teaching materials on Anti-Corruption Education is very important in Social Studies learning activities. Recommendations for further research is to examine the antieducation teaching materials that contain the value of anti-corruption character. With anticorruption education is expected to give awareness and change to all the younger generation to understand and realize the importance of having the character of anti-corruption and can mengnglemlem in society.
Who is the boss? Individual recognition memory and social hierarchy formation in crayfish.
Jiménez-Morales, Nayeli; Mendoza-Ángeles, Karina; Porras-Villalobos, Mercedes; Ibarra-Coronado, Elizabeth; Roldán-Roldán, Gabriel; Hernández-Falcón, Jesús
2018-01-01
Under laboratory conditions, crayfish establish hierarchical orders through agonistic encounters whose outcome defines the dominant one and one, or more, submissive animals. These agonistic encounters are ritualistic, based on threats, pushes, attacks, grabs, and avoidance behaviors that include retreats and escape responses. Agonistic behavior in a triad of unfamiliar, size-matched animals is intense on the first day of social interaction and the intensity fades on daily repetitions. The dominant animal keeps its status for long periods, and the submissive ones seem to remember 'who the boss is'. It has been assumed that animals remember and recognize their hierarchical status by urine signals, but the putative substance mediating this recognition has not been reported. The aim of this work was to characterize this hierarchical recognition memory. Triads of unfamiliar crayfish (male animals, size and weight-matched) were faced during standardized agonistic protocols for five consecutive days to analyze memory acquisition dynamics (Experiment 1). In Experiment 2, dominant crayfish were shifted among triads to disclose whether hierarchy depended upon individual recognition memory or recognition of status. The maintenance of the hierarchical structure without behavioral reinforcement was assessed by immobilizing the dominant animal during eleven daily agonistic encounters, and considering any shift in the dominance order (Experiment 3). Standard amnesic treatments (anisomycin, scopolamine or cold-anesthesia) were given to all members of the triads immediately after the first interaction session to prevent individual recognition memory consolidation and evaluate its effect on the hierarchical order (Experiment 4). Acquisition of hierarchical recognition occurs at the first agonistic encounter and agonistic behavior gradually diminishes in the following days; animals keep their hierarchical order despite the inability of the dominant crayfish to attack the submissive ones. Finally, blocking of protein synthesis or muscarinic receptors and cold anesthesia impair memory consolidation. These findings suggest that agonistic encounters induces the acquisition of a robust and lasting social recognition memory in crayfish. Copyright © 2017 Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Berland, Jody
2009-01-01
Chronic fatigue syndrome/myalgic encephalomyelitis (CFE/ME) is an invisible disability that forces researchers to delineate new boundaries between illness and impairment, and between medical knowledge and patients' experience. As a neurological impairment, this condition attacks memory and cognition, which paradoxically become the focus of…
Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence
NASA Astrophysics Data System (ADS)
Muraleedharan, Rajani; Ye, Xiang; Osadciw, Lisa Ann
2008-04-01
Security in wireless sensor networks is typically sacrificed or kept minimal due to limited resources such as memory and battery power. Hence, the sensor nodes are prone to Denial-of-service attacks and detecting the threats is crucial in any application. In this paper, the Sybil attack is analyzed and a novel prediction method, combining Bayesian algorithm and Swarm Intelligence (SI) is proposed. Bayesian Networks (BN) is used in representing and reasoning problems, by modeling the elements of uncertainty. The decision from the BN is applied to SI forming an Hybrid Intelligence Scheme (HIS) to re-route the information and disconnecting the malicious nodes in future routes. A performance comparison based on the prediction using HIS vs. Ant System (AS) helps in prioritizing applications where decisions are time-critical.
Multiple-image hiding using super resolution reconstruction in high-frequency domains
NASA Astrophysics Data System (ADS)
Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua
2017-12-01
In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.
Corruption and the Other(s): Scope of Superordinate Identity Matters for Corruption Permissibility.
Pisor, Anne C; Gurven, Michael
2015-01-01
The decision to engage in corruption-public and private corruption, nepotism, and embezzlement-is often attributed to rational actors maximizing benefits to themselves. However, the importance of reciprocal relationships in humans suggests that an actor may weigh the costs of harms of her corrupt behavior to individuals who may generate future benefits for her. We hypothesize that actors who have a larger circle of actual and potential social partners will have more individuals to consider when generating harms and will thus be less likely to find corrupt acts permissible than actors with smaller circles of valued others. Using data from the World Values Survey and European Values Study (WVS), we explore whether participants with a larger geographic identity or a greater number of group memberships (i.e. a larger scope of actual and potential social partners) are less likely to find accepting bribes permissible. We find mixed support for our hypotheses, but consistently find that WVS participants with local, country, continent, or world geographic identities are less likely to find accepting a bribe permissible than those with regional identities-that is, actors whose primary identities that encompass more than their region find corruption less permissible. We discuss the importance of considering an actor's valuation of others when modeling corruption persistence, noting that establishing scopes of positive valuation is a precursor to predicting where actors will target benefits and shunt costs.
Does corruption undermine trust in health care? Results from public opinion polls in Croatia.
Radin, Dagmar
2013-12-01
Health and health care provision are one of the most important topics in public policy, and often a highly debated topic in the political arena. The importance of considering trust in the health care sector is highlighted by studies showing that trust is associated, among others, with poor self-related health, and poorer health outcomes. Similarly, corruption has shown to create economic costs and inefficiencies in the health care sector. This is particularly important for a newly democratized country such as Croatia, where a policy responsive government indicates a high level of quality of democracy (Roberts, 2009) and where a legacy of corruption in the health care sector has been carried over from the previous regime. In this study, I assess the relationship between health care corruption and trust in public health care and hypothesize that experience with health care corruption as well as perception of corruption has a negative effect on trust in public care facilities. Data were collected in two surveys, administered in 2007 and 2009 in Croatia. Experience with corruption and salience with corruption has a negative effect on trust in public health care in the 2007 survey, but not in the 2009 survey. While the results are mixed, they point to the importance of further studying this relationship. Copyright © 2013 Elsevier Ltd. All rights reserved.
Tackling corruption in the pharmaceutical systems worldwide with courage and conviction.
Cohen, J C; Mrazek, M; Hawkins, L
2007-03-01
Poor drug access continues to be one of the main global health problems. Global inequalities in access to pharmaceuticals are caused by a number of variables including poverty, high drug prices, poor health infrastructure, and fraud and corruption--the latter being the subject of this article. There is growing recognition among policy makers that corruption in the pharmaceutical system can waste valuable resources allocated to pharmaceutical products and services. This, in turn, denies those most in need from life-saving or life-enhancing medicines. As a result, international organizations, including the World Health Organization and the World Bank are beginning to address the issue of corruption in the health sector broadly and the pharmaceutical system specifically. This is encouraging news for improving drug access for the global poor who are most harmed by corruption as they tend to purchase less expensive drugs from unqualified or illegal drug sellers selling counterfeit or sub-standard drugs. In our paper, we illuminate what are the core issues that relate to corruption in the pharmaceutical sector. We argue that corruption in the pharmaceutical system can be detrimental to a country's ability to improve the health of its population. Moreover, unless policy makers deal with the issue of corruption, funding allocated to the pharmaceutical system to treat health conditions may simply be wasted and the inequality between rich and poor in access to health and pharmaceutical products will be aggravated.
Democracy and "Grand" Corruption.
ERIC Educational Resources Information Center
Rose-Ackerman, Susan
1996-01-01
Defines "grand" corruption as that occurring at the higher levels of a political system and involving large sums of money. Discusses the impact and incentives for this level of corruption as well as various government responses. Identifies multinational corporations as the major malefactors. (MJP)
Corruption and use of antibiotics in regions of Europe.
Rönnerstrand, Björn; Lapuente, Victor
2017-03-01
The aim of this article is to investigate the association between corruption and antibiotic use at sub-national level. We explore the correlation between, on the one hand, two measures of corruption (prevalence of corruption in the health sector and prevalence of bribes in the society) at regional level from the European Quality of Government Index; and, on the other, the consumption of antibiotics in those European regions from a 2009 Special Euro Barometer. In a multivariate regression model, we control for potential confounders: purchasing power of standardized regional gross domestic product, inhabitants per medical doctor and age-standardized all-cause mortality rates. We find that there is a strong positive association between both measures of corruption (i.e. in the health sector, and in the society at large) and antibiotics use; and that this association is robust to the introduction of the control variables. These results support previous findings in the literature linking corruption to higher antibiotic use at cross-national level. We show that corruption does seem to account for some of the remarkable between-region variation in antibiotic consumption in Europe. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.
Bioethics and corruption: a personal struggle.
Blasszauer, Bela
2013-01-01
The author attempts to give a general picture of corruption, especially in the area of healthcare. Corruption ranges from fraud, through deceit, bribery and dehumanisation, to immeasurable moral decay. As a bioethicist who has challenged corruption in various ways, the author approaches this worldwide plague mainly on the basis of his personal experience. He does not offer a recipe for successfully combating corruption, but tries to provide some ways and means to fight immorality without self-defeat. Bioethics is not a discipline whose task is to investigate, expose, or punish corrupt people. A number of agencies exist for this "noble" job. Nevertheless, an ethics teacher should not be completely indifferent to obvious and harmful immoral behaviour, regardless of his/her personal compulsions. It is not the "patient rights" that threaten the prestige of the medical profession; it is rather the bad apples that infiltrate the moral mission of this esteemed work. It seems that the hardest challenges in the struggle against corruption are bad laws-laws that provide loopholes and immunity to immoral dealings. In a stable, strong democracy, morally unfounded laws can, and will be changed. Where real democracy exists, they would not even have come into effect.
Social values and the corruption argument against financial incentives for healthy behaviour
Brown, Rebecca C H
2017-01-01
Financial incentives may provide a way of reducing the burden of chronic diseases by motivating people to adopt healthy behaviours. While it is still uncertain how effective such incentives could be for promoting health, some argue that, even if effective, there are ethical objections that preclude their use. One such argument is made by Michael Sandel, who suggests that monetary transactions can have a corrupting effect on the norms and values that ordinarily regulate exchange and behaviour in previously non-monetised contexts. In this paper, I outline Sandel's corruption argument and consider its validity in the context of health incentives. I distinguish between two forms of corruption that are implied by Sandel's argument: efficiency corruption and value corruption. While Sandel's thought-provoking discussion provides a valuable contribution to debates about health policies generally and health incentives specifically, I suggest the force of his criticism of health incentives is limited: further empirical evidence and theoretical reasoning are required to support the suggestion that health incentives are an inappropriate tool for promoting health. While I do not find Sandel's corruption argument compelling, this only constitutes a partial defence of health incentives, since other criticisms relating to their use may prove more successful. PMID:27738254
Memorial Image Taken on Mars on Sept. 11, 2011
2011-09-12
This view from NASA rover Opportunity, of an American flag on metal recovered from the site of the World Trade Center towers shortly after their destruction, was taken on Mars on Sept. 11, 2011, the 10th anniversary of the attacks on the towers.
Video multiple watermarking technique based on image interlacing using DWT.
Ibrahim, Mohamed M; Abdel Kader, Neamat S; Zorkany, M
2014-01-01
Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. In the nonblind watermarking systems, the need of the original host file in the watermark recovery operation makes an overhead over the system resources, doubles memory capacity, and doubles communications bandwidth. In this paper, a robust video multiple watermarking technique is proposed to solve this problem. This technique is based on image interlacing. In this technique, three-level discrete wavelet transform (DWT) is used as a watermark embedding/extracting domain, Arnold transform is used as a watermark encryption/decryption method, and different types of media (gray image, color image, and video) are used as watermarks. The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. The simulation results show the effectiveness and good performance of the proposed technique in saving system resources, memory capacity, and communications bandwidth.
Epigenetic Regulation of Learning and Memory by Drosophila EHMT/G9a
Kramer, Jamie M.; Kochinke, Korinna; Oortveld, Merel A. W.; Marks, Hendrik; Kramer, Daniela; de Jong, Eiko K.; Asztalos, Zoltan; Westwood, J. Timothy; Stunnenberg, Hendrik G.; Sokolowski, Marla B.; Keleman, Krystyna; Zhou, Huiqing; van Bokhoven, Hans; Schenck, Annette
2011-01-01
The epigenetic modification of chromatin structure and its effect on complex neuronal processes like learning and memory is an emerging field in neuroscience. However, little is known about the “writers” of the neuronal epigenome and how they lay down the basis for proper cognition. Here, we have dissected the neuronal function of the Drosophila euchromatin histone methyltransferase (EHMT), a member of a conserved protein family that methylates histone 3 at lysine 9 (H3K9). EHMT is widely expressed in the nervous system and other tissues, yet EHMT mutant flies are viable. Neurodevelopmental and behavioral analyses identified EHMT as a regulator of peripheral dendrite development, larval locomotor behavior, non-associative learning, and courtship memory. The requirement for EHMT in memory was mapped to 7B-Gal4 positive cells, which are, in adult brains, predominantly mushroom body neurons. Moreover, memory was restored by EHMT re-expression during adulthood, indicating that cognitive defects are reversible in EHMT mutants. To uncover the underlying molecular mechanisms, we generated genome-wide H3K9 dimethylation profiles by ChIP-seq. Loss of H3K9 dimethylation in EHMT mutants occurs at 5% of the euchromatic genome and is enriched at the 5′ and 3′ ends of distinct classes of genes that control neuronal and behavioral processes that are corrupted in EHMT mutants. Our study identifies Drosophila EHMT as a key regulator of cognition that orchestrates an epigenetic program featuring classic learning and memory genes. Our findings are relevant to the pathophysiological mechanisms underlying Kleefstra Syndrome, a severe form of intellectual disability caused by mutations in human EHMT1, and have potential therapeutic implications. Our work thus provides novel insights into the epigenetic control of cognition in health and disease. PMID:21245904
Measurement device-independent quantum dialogue
NASA Astrophysics Data System (ADS)
Maitra, Arpita
2017-12-01
Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).
Code of Federal Regulations, 2011 CFR
2011-07-01
... LITIGATION Remedies in Procurement Fraud and Corruption § 516.58 Policies. (a) Procurement fraud and... administrative remedies in significant cases of fraud or corruption relating to Army procurement. (d) The key... of fraud or corruption involving procurement. (g) Coordination on the status and disposition of cases...
A model of interaction between anticorruption authority and corruption groups
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neverova, Elena G.; Malafeyef, Oleg A.
The paper provides a model of interaction between anticorruption unit and corruption groups. The main policy functions of the anticorruption unit involve reducing corrupt practices in some entities through an optimal approach to resource allocation and effective anticorruption policy. We develop a model based on Markov decision-making process and use Howard’s policy-improvement algorithm for solving an optimal decision strategy. We examine the assumption that corruption groups retaliate against the anticorruption authority to protect themselves. This model was implemented through stochastic game.
Frewer, A
2002-01-01
Even in health care systems corruption is an increasing problem. Since the German Anti-Corruption-Law (1997) the areas of financial support, sponsoring and corruption in medicine are analyzed much more intensively. This article sketches the crucial points of the debate on medical funding and shows the consequences of the new jurisdiction. Most important is the balance between a transparent documentation and a too-far-reaching bureaucracy, which hinders medical research. Finally, this article presents core principles as helpful rules in practice.
2016-02-16
AIR WAR COLLEGE AIR UNIVERSITY U.S. AND DEPARTMENT OF DEFENSE BUILDING PARTNERSHIP CAPACITY AND COUNTER/ANTI-CORRUPTION: A SYMBIOTIC ...Extortion,” DoD BPC and counter/anti-corruption have resulted in both a symbiotic relationship and one at odds. This uncomfortable dichotomy has led to...extraversion as “Soft Extortion” have all led DoD BPC and counter/anti-corruption efforts into a relationship that is both symbiotic and one at odds
Games of corruption: how to suppress illegal logging.
Lee, Joung-Hun; Sigmund, Karl; Dieckmann, Ulf; Iwasa, Yoh
2015-02-21
Corruption is one of the most serious obstacles for ecosystem management and biodiversity conservation. In particular, more than half of the loss of forested area in many tropical countries is due to illegal logging, with corruption implicated in a lack of enforcement. Here we study an evolutionary game model to analyze the illegal harvesting of forest trees, coupled with the corruption of rule enforcers. We consider several types of harvesters, who may or may not be committed towards supporting an enforcer service, and who may cooperate (log legally) or defect (log illegally). We also consider two types of rule enforcers, honest and corrupt: while honest enforcers fulfill their function, corrupt enforcers accept bribes from defecting harvesters and refrain from fining them. We report three key findings. First, in the absence of strategy exploration, the harvester-enforcer dynamics are bistable: one continuum of equilibria consists of defecting harvesters and a low fraction of honest enforcers, while another consists of cooperating harvesters and a high fraction of honest enforcers. Both continua attract nearby strategy mixtures. Second, even a small rate of strategy exploration removes this bistability, rendering one of the outcomes globally stable. It is the relative rate of exploration among enforcers that then determines whether most harvesters cooperate or defect and most enforcers are honest or corrupt, respectively. This suggests that the education of enforcers, causing their more frequent trialing of honest conduct, can be a potent means of curbing corruption. Third, if information on corrupt enforcers is available, and players react opportunistically to it, the domain of attraction of cooperative outcomes widens considerably. We conclude by discussing policy implications of our results. Copyright © 2014 Elsevier Ltd. All rights reserved.
Corruption Kills: Estimating the Global Impact of Corruption on Children Deaths
Hanf, Matthieu; Van-Melle, Astrid; Fraisse, Florence; Roger, Amaury; Carme, Bernard; Nacher, Mathieu
2011-01-01
Background Information on the global risk factors of children mortality is crucial to guide global efforts to improve survival. Corruption has been previously shown to significantly impact on child mortality. However no recent quantification of its current impact is available. Methods The impact of corruption was assessed through crude Pearson's correlation, univariate and multivariate linear models coupling national under-five mortality rates in 2008 to the national “perceived level of corruption” (CPI) and a large set of adjustment variables measured during the same period. Findings The final multivariable model (adjusted R2 = 0.89) included the following significant variables: percentage of people with improved sanitation (p.value<0.001), logarithm of total health expenditure (p.value = 0.006), Corruption Perception Index (p.value<0.001), presence of an arid climate on the national territory (p = 0.006), and the dependency ratio (p.value<0.001). A decrease in CPI of one point (i.e. a more important perceived corruption) was associated with an increase in the log of national under-five mortality rate of 0.0644. According to this result, it could be roughly hypothesized that more than 140000 annual children deaths could be indirectly attributed to corruption. Interpretations Global response to children mortality must involve a necessary increase in funds available to develop water and sanitation access and purchase new methods for prevention, management, and treatment of major diseases drawing the global pattern of children deaths. However without paying regard to the anti-corruption mechanisms needed to ensure their proper use, it will also provide further opportunity for corruption. Policies and interventions supported by governments and donors must integrate initiatives that recognise how they are inter-related. PMID:22073233
Investing in threatened species conservation: does corruption outweigh purchasing power?
Garnett, Stephen T; Joseph, Liana N; Watson, James E M; Zander, Kerstin K
2011-01-01
In many sectors, freedom in capital flow has allowed optimization of investment returns through choosing sites that provide the best value for money. These returns, however, can be compromised in countries where corruption is prevalent. We assessed where the best value for money might be obtained for investment in threatened species that occur at a single site, when taking into account corruption. We found that the influence of corruption on potential investment decisions was outweighed by the likely value for money in terms of pricing parity. Nevertheless global conservation is likely to get best returns in terms of threatened species security by investing in "honest" countries than in corrupt ones, particularly those with a high cost of living.
Investing in Threatened Species Conservation: Does Corruption Outweigh Purchasing Power?
Garnett, Stephen T.; Joseph, Liana N.; Watson, James E. M.; Zander, Kerstin K.
2011-01-01
In many sectors, freedom in capital flow has allowed optimization of investment returns through choosing sites that provide the best value for money. These returns, however, can be compromised in countries where corruption is prevalent. We assessed where the best value for money might be obtained for investment in threatened species that occur at a single site, when taking into account corruption. We found that the influence of corruption on potential investment decisions was outweighed by the likely value for money in terms of pricing parity. Nevertheless global conservation is likely to get best returns in terms of threatened species security by investing in “honest” countries than in corrupt ones, particularly those with a high cost of living. PMID:21818383
Evolutionary Paths to Corrupt Societies of Artificial Agents
NASA Astrophysics Data System (ADS)
Nasrallah, Walid
Virtual corrupt societies can be defined as groups of interacting computer-generated agents who predominantly choose behavior that gives short term personal gain at the expense of a higher aggregate cost to others. This paper focuses on corrupt societies that, unlike published models in which cooperation must evolve in order for the society to continue to survive, do not naturally die out as the corrupt class siphons off the resources. For example, a very computationally simple strategy of avoiding confrontation can allow a majority of "unethical" individuals to survive off the efforts of an "ethical" but productive minority. Analogies are drawn to actual human societies in which similar conditions gave rise to behavior traditionally defined as economic or political corruption.
75 FR 5502 - Belarus Sanctions Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... to engage in public corruption, including by diverting or misusing Belarusian public assets or by... responsible for or has engaged in public corruption related to Belarus; (iv) to have materially assisted... responsible for or has engaged in public corruption related to Belarus; (iv) To have materially assisted...
Political Corruption in Japan.
ERIC Educational Resources Information Center
Reed, Steven R.; And Others
1996-01-01
Provides an overview of political corruption and its place in Japanese culture and society. Discusses recent scandals and efforts at political reform. These efforts are moving Japan from a "boss-patronage" system to a "civic-culture." Includes a table of post-war Japanese prime ministers and corruption scandals. (MJP)
78 FR 78463 - Summary of the Certification Related to the Khmer Rouge Tribunal
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... taking credible steps to address allegations of corruption and mismanagement within the Extraordinary... allegations of corruption and mismanagement within the tribunal. MEMORANDUM OF JUSTIFICATION FOR CERTIFICATION... allegations of corruption and mismanagement within the ECCC. Deputy Secretary Burns has signed the...
Li, Li; Lo, T Wing
2018-05-01
To date, few studies have focused on how the public has perceived the effectiveness of the Independent Commission Against Corruption (ICAC). Furthermore, little is known about how the public has assessed the functions of the ICAC during the political-economic convergence between Hong Kong and mainland China since 1997. This study attempts to explore local politicians' perceptions towards the ICAC in post-1997 Hong Kong. The quantitative data show that the important historical juncture of mainlandization has been politicized in Hong Kong and has deeply influenced the seriousness attached by local politicians to corruption. Moreover, a mediating path of the effect of "Conflict of Interest" on the "Perceived Seriousness of Corruption" has been found, that is, mainlandization is found to have brought about increased levels of conflict of interest among government officials, which has weakened the symbolic anti-corruption function of the ICAC and, in turn, has affected the perceived seriousness attached to corruption.
2015-09-11
A memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks stands at Fire Station 1 at NASA's Kennedy Space Center during its dedication on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
77 FR 27109 - Certification Related to the Khmer Rouge Tribunal; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-08
... Cambodia are taking credible steps to address allegations of corruption and mismanagement within the... Authority 245-1. Factors Justifying Determination and Certification Allegations of corruption were abundant... steps to protect the integrity of its proceedings against allegations of corruption. In August 2009 the...
32 CFR 516.62 - PFD and HQ USACIDC coordination.
Code of Federal Regulations, 2011 CFR
2011-07-01
... AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.62 PFD and HQ... procurement fraud or corruption investigations being conducted by USACIDC and possible remedies. These... affected by a significant investigation of fraud or corruption that relates to DOD procurement activities...
Saccades to remembered targets: the effects of smooth pursuit and illusory stimulus motion
NASA Technical Reports Server (NTRS)
Zivotofsky, A. Z.; Rottach, K. G.; Averbuch-Heller, L.; Kori, A. A.; Thomas, C. W.; Dell'Osso, L. F.; Leigh, R. J.
1996-01-01
1. Measurements were made in four normal human subjects of the accuracy of saccades to remembered locations of targets that were flashed on a 20 x 30 deg random dot display that was either stationary or moving horizontally and sinusoidally at +/-9 deg at 0.3 Hz. During the interval between the target flash and the memory-guided saccade, the "memory period" (1.4 s), subjects either fixated a stationary spot or pursued a spot moving vertically sinusoidally at +/-9 deg at 0.3 Hz. 2. When saccades were made toward the location of targets previously flashed on a stationary background as subjects fixated the stationary spot, median saccadic error was 0.93 deg horizontally and 1.1 deg vertically. These errors were greater than for saccades to visible targets, which had median values of 0.59 deg horizontally and 0.60 deg vertically. 3. When targets were flashed as subjects smoothly pursued a spot that moved vertically across the stationary background, median saccadic error was 1.1 deg horizontally and 1.2 deg vertically, thus being of similar accuracy to when targets were flashed during fixation. In addition, the vertical component of the memory-guided saccade was much more closely correlated with the "spatial error" than with the "retinal error"; this indicated that, when programming the saccade, the brain had taken into account eye movements that occurred during the memory period. 4. When saccades were made to targets flashed during attempted fixation of a stationary spot on a horizontally moving background, a condition that produces a weak Duncker-type illusion of horizontal movement of the primary target, median saccadic error increased horizontally to 3.2 deg but was 1.1 deg vertically. 5. When targets were flashed as subjects smoothly pursued a spot that moved vertically on the horizontally moving background, a condition that induces a strong illusion of diagonal target motion, median saccadic error was 4.0 deg horizontally and 1.5 deg vertically; thus the horizontal error was greater than under any other experimental condition. 6. In most trials, the initial saccade to the remembered target was followed by additional saccades while the subject was still in darkness. These secondary saccades, which were executed in the absence of visual feedback, brought the eye closer to the target location. During paradigms involving horizontal background movement, these corrections were more prominent horizontally than vertically. 7. Further measurements were made in two subjects to determine whether inaccuracy of memory-guided saccades, in the horizontal plane, was due to mislocalization at the time that the target flashed, misrepresentation of the trajectory of the pursuit eye movement during the memory period, or both. 8. The magnitude of the saccadic error, both with and without corrections made in darkness, was mislocalized by approximately 30% of the displacement of the background at the time that the target flashed. The magnitude of the saccadic error also was influenced by net movement of the background during the memory period, corresponding to approximately 25% of net background movement for the initial saccade and approximately 13% for the final eye position achieved in darkness. 9. We formulated simple linear models to test specific hypotheses about which combinations of signals best describe the observed saccadic amplitudes. We tested the possibilities that the brain made an accurate memory of target location and a reliable representation of the eye movement during the memory period, or that one or both of these was corrupted by the illusory visual stimulus. Our data were best accounted for by a model in which both the working memory of target location and the internal representation of the horizontal eye movements were corrupted by the illusory visual stimulus. We conclude that extraretinal signals played only a minor role, in comparison with visual estimates of the direction of gaze, in planning eye movements to remembered targ.
Corruption and Coercion: University Autonomy versus State Control
ERIC Educational Resources Information Center
Osipian, Ararat L.
2008-01-01
A substantial body of literature considers excessive corruption an indicator of a weak state. However, in nondemocratic societies, corruption--whether informally approved, imposed, or regulated by public authorities--is often an indicator of a vertical power rather than an indicator of a weak state. This article explores the interrelations between…
Atypical Corruption at Institutions of Higher Learning
ERIC Educational Resources Information Center
Yang, Li
2007-01-01
This article describes an incident involving twelve teachers at Anhui Haozhou Normal Junior College who used purchased dissertations to apply for professional titles over three consecutive years. Academic corruption is not merely today's problem, and the academic corruption at the institutions of higher learning that the author discloses in this…
"Fin de Siecle" Corruption: Change, Crisis, and Shifting Values.
ERIC Educational Resources Information Center
Meny, Yves
1996-01-01
Defines corruption as a violation of the duties of office and a negation of the values that should underlie the democratic political and administrative system founded on the rule of law. Examines the reasons for the increase in corruption over the last decade and its internationalization. (MJP)
Corruption in Education Sector Development: A Suggestion for Anticipatory Strategy.
ERIC Educational Resources Information Center
Tanaka, Shinichiro
2001-01-01
Proposes an anticipatory strategy that will help protect education sector development from corruption. The strategy, which may exist as a "hidden agenda" within a project, focuses on diagnosing rather than redressing a system thought to be corrupt, adopting prevention rather than punishment, informal rather than formal approaches, and…
Strengthening Integrity and Fighting Corruption in Education: Serbia
ERIC Educational Resources Information Center
OECD Publishing (NJ3), 2012
2012-01-01
Education matters. It is a gateway to prosperity of individuals and economies alike. Integrity in education matters too. Corruption hinders prosperity, causes long-term damage to societies, and diminishes the efficiency of investment in their human potential. Driven by the insight that corruption in education can undermine even the best of…
The Rhetoric of Political Corruption: Sociolinguistic, Dialectical, and Ceremonial Processes.
ERIC Educational Resources Information Center
Gronbeck, Bruce E.
1978-01-01
Examines the public discourse surrounding political corruption by arguing that the ritualistic deposition of corrupters is based in a sociolinguistic process of assigning meanings to acts, a dialectical process of contrapositioning competing voices, and a ceremonial process of acting out the drama of purgation before the affected institutions…
Caulkins, Jonathan P.; Feichtinger, Gustav; Grass, Dieter; Hartl, Richard F.; Kort, Peter M.; Novak, Andreas J.; Seidl, Andrea
2013-01-01
We present a novel model of corruption dynamics in the form of a nonlinear optimal dynamic control problem. It has a tipping point, but one whose origins and character are distinct from that in the classic Schelling (1978) model. The decision maker choosing a level of corruption is the chief or some other kind of authority figure who presides over a bureaucracy whose state of corruption is influenced by the authority figure’s actions, and whose state in turn influences the pay-off for the authority figure. The policy interpretation is somewhat more optimistic than in other tipping models, and there are some surprising implications, notably that reforming the bureaucracy may be of limited value if the bureaucracy takes its cues from a corrupt leader. PMID:23565027
Caulkins, Jonathan P; Feichtinger, Gustav; Grass, Dieter; Hartl, Richard F; Kort, Peter M; Novak, Andreas J; Seidl, Andrea
2013-03-16
We present a novel model of corruption dynamics in the form of a nonlinear optimal dynamic control problem. It has a tipping point, but one whose origins and character are distinct from that in the classic Schelling (1978) model. The decision maker choosing a level of corruption is the chief or some other kind of authority figure who presides over a bureaucracy whose state of corruption is influenced by the authority figure's actions, and whose state in turn influences the pay-off for the authority figure. The policy interpretation is somewhat more optimistic than in other tipping models, and there are some surprising implications, notably that reforming the bureaucracy may be of limited value if the bureaucracy takes its cues from a corrupt leader.
Shan, Ming; Le, Yun; Yiu, Kenneth T W; Chan, Albert P C; Hu, Yi
2017-12-01
Over recent years, the issue of corruption in the public construction sector has attracted increasing attention from both practitioners and researchers worldwide. However, limited efforts are available for investigating the underlying factors of corruption in this sector. Thus, this study attempted to bridge this knowledge gap by exploring the underlying factors of corruption in the public construction sector of China. To achieve this goal, a total of 14 structured interviews were first carried out, and a questionnaire survey was then administered to 188 professionals in China. Two iterations of multivariate analysis approaches, namely, stepwise multiple regression analysis and partial least squares structural equation modeling were successively utilized to analyze the collected data. In addition, a case study was also conducted to triangulate the findings obtained from the statistical analysis. The results generated from these three research methods achieve the same conclusion: the most influential underlying factor leading to corruption was immorality, followed by opacity, unfairness, procedural violation, and contractual violation. This study has contributed to the body of knowledge by exploring the properties of corruption in the public construction sector. The findings from this study are also valuable to the construction authorities as they can assist in developing more effective anti-corruption strategies.
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1988-01-01
The worm, Trojan horse, bacterium, and virus are destructive programs that attack information stored in a computer's memory. Virus programs, which propagate by incorporating copies of themselves into other programs, are a growing menace in the late-1980s world of unprotected, networked workstations and personal computers. Limited immunity is offered by memory protection hardware, digitally authenticated object programs,and antibody programs that kill specific viruses. Additional immunity can be gained from the practice of digital hygiene, primarily the refusal to use software from untrusted sources. Full immunity requires attention in a social dimension, the accountability of programmers.
IoT security with one-time pad secure algorithm based on the double memory technique
NASA Astrophysics Data System (ADS)
Wiśniewski, Remigiusz; Grobelny, Michał; Grobelna, Iwona; Bazydło, Grzegorz
2017-11-01
Secure encryption of data in Internet of Things is especially important as many information is exchanged every day and the number of attack vectors on IoT elements still increases. In the paper a novel symmetric encryption method is proposed. The idea bases on the one-time pad technique. The proposed solution applies double memory concept to secure transmitted data. The presented algorithm is considered as a part of communication protocol and it has been initially validated against known security issues.
2015-09-11
Firefighters stand at attention as a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks is dedicated at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
32 CFR 516.67 - Overseas cases of fraud or corruption.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Overseas cases of fraud or corruption. 516.67 Section 516.67 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.67 Overseas...
Educating Accountants in Corruption Pervasive Societies: A Focus on Nigeria
ERIC Educational Resources Information Center
Idialu, Jeremiah Uwaifo; Oghuma, Richard Iyere
2007-01-01
There has been widespread corruption in almost all societies and a general belief that without the involvement of Accountants, or if accountants carry out their duties effectively, there will be no corruption. Therefore this paper is designed to look at the current approach educating accountants in order to discover the educational arrangement put…
An Analysis of the Mechanisms of the Social Control of Corruption in the Higher Education System
ERIC Educational Resources Information Center
Borisova, E. A.
2014-01-01
Corruption in the system of higher education in Russia is a barrier to fair access to the labor market for educated specialists, and a survey of programs to combat this type of corruption shows that it needs to be taken more seriously as a problem.
In Russia, Corruption Plagues the Higher-Education System
ERIC Educational Resources Information Center
Nemtsova, Anna
2008-01-01
From the top down, says the writer, Russia's universities are impoverished by bribery and insider deals large and small. A new president's dorm at Nizhniy Novgorod is one example of what anti-corruption watchdogs say is widespread mismanagement, and in some cases outright corruption, throughout the country's higher-education system. Presidents use…
NASA Astrophysics Data System (ADS)
Duong, Deborah; Turner, Robert; Selke, Karl
Like intergroup violence (Chap. 7) and insurgency (Chap. 8), crime and corruption are nearly inevitable companions of an international intervention. Both contribute to the reasons why the intervention occurs, and both may even grow and fester as side-effects of an intervention. Moreover, crime and corruption frequently serve as obstacles to a successful termination of an intervention.
On the Causes for and Countermeasures against Academic Corruption
ERIC Educational Resources Information Center
Yongning, Yuan; Jian, Zhang; Haibo, Wang
2007-01-01
Combating corruption is an important condition for bringing about the flourishing of academic research. There are many reasons for the emergence and proliferation of academic corruption today. These are closely related to the long-term lack of training among our country's scholars in modern academic standards and the absence of an academic spirit…
The Hippo Generation and the Vampire State: The Impact of Corruption on Failing Nations
2011-04-13
state institutions and processes, and the growth of crime syndicates linked to ruling elites.൵ ’When corruption is prolific in a given country, the...kind of checks and balances required to eliminate widespread corruption and protect their people. As New York Times columnist Nicholas Christoff
The Corruption Bogey in South Africa: Is Public Education Safe?
ERIC Educational Resources Information Center
Serfontein, Erika; de Waal, Elda
2015-01-01
Corruption is a constant global phenomenon, which is becoming more complex and intense as competition for resources increases. It is even more so amongst those living in developing countries, particularly emerging economies such as South Africa. Acts of corruption directly contest the basic principles of South Africa's Constitution, which aims at…
ERIC Educational Resources Information Center
Jing, Xiao
2007-01-01
Academic corruption is a hot issue in today's society. "Academic corruption" means that certain individuals in academic circles, driven by the desire for personal gain, resort to various kinds of nonnormative and unethical behavior in academic research activities. These include: academic self-piracy, academic piracy, copying and…
Updating the Potential of Culture in the Prevention of Corruption
ERIC Educational Resources Information Center
Dorozhkin, Evgenij M.; Kislov, Alexander G.; Syuzeva, Natalya V.; Ozhegova, Anna P.; Kuznetsov, Andrey V.
2016-01-01
The urgency of the problem under investigation is due to the danger and at the same time the prevalence of corruption, so special attention is given to the need to supplement the repressive state and awareness-raising measures forming, especially in educational institutions of special subculture, raising a categorical rejection of corruption. The…
Corruption Hierarchies in Higher Education in the Former Soviet Bloc
ERIC Educational Resources Information Center
Osipian, Ararat L.
2009-01-01
Corruption in higher education is known but not described theoretically. Decentralization and privatization of higher education and the increasing scale and scope of corruption in higher education in the former Soviet Bloc, as well as numerous other countries, urges better understanding of the problem within the context of socio-economic…
Fighting against Academic Corruption: A Critique of Recent Policy Developments in China
ERIC Educational Resources Information Center
Ren, Kai
2012-01-01
Academic corruption in China's higher education institutions has become a serious issue in the last decade. This paper provides a critical discussion of the Chinese Ministry of Education's policy developments aimed to strengthen academic ethics and control academic corruption. It suggests that while the reactions of policy-makers to the apparent…
On the Development of Students' Attitudes towards Corruption and Cheating in Russian Universities
ERIC Educational Resources Information Center
Denisova-Schmidt, Elena; Huber, Martin; Leontyeva, Elvira
2016-01-01
Based on empirical data from selected public universities in Khabarovsk, Russia, this paper compares first- and fifth-year students regarding their attitudes towards corruption in general and university corruption in particular. Even after making both groups of students comparable with respect to a range of socio-economic characteristics by a…
Civil Society and Control of Corruption: Assessing Governance of Romanian Public Universities
ERIC Educational Resources Information Center
Mungiu-Pippidi, Alina; Dusu, Andra Elena
2011-01-01
Romania is perceived as the most corrupt EU member state according to Transparency International Corruption Perception Index. In 2008-2009, a grassroots coalition of civil society organizations and education stakeholders created the Coalition for Clean Universities which organized the first assessment of integrity of the Romanian higher education…
Image Size Variation Influence on Corrupted and Non-viewable BMP Image
NASA Astrophysics Data System (ADS)
Azmi, Tengku Norsuhaila T.; Azma Abdullah, Nurul; Rahman, Nurul Hidayah Ab; Hamid, Isredza Rahmi A.; Chai Wen, Chuah
2017-08-01
Image is one of the evidence component seek in digital forensics. Joint Photographic Experts Group (JPEG) format is most popular used in the Internet because JPEG files are very lossy and easy to compress that can speed up Internet transmitting processes. However, corrupted JPEG images are hard to recover due to the complexities of determining corruption point. Nowadays Bitmap (BMP) images are preferred in image processing compared to another formats because BMP image contain all the image information in a simple format. Therefore, in order to investigate the corruption point in JPEG, the file is required to be converted into BMP format. Nevertheless, there are many things that can influence the corrupting of BMP image such as the changes of image size that make the file non-viewable. In this paper, the experiment indicates that the size of BMP file influences the changes in the image itself through three conditions, deleting, replacing and insertion. From the experiment, we learnt by correcting the file size, it can able to produce a viewable file though partially. Then, it can be investigated further to identify the corruption point.
The impact of corruption on the sustainable development of human capital
NASA Astrophysics Data System (ADS)
Absalyamova, Svetlana; Absalyamov, Timur; Khusnullova, Asiya; Mukhametgalieva, Chulpan
2016-08-01
The article explains the use of the human capital sustainable development index (HCSDI) to assess the quality of the reproduction of human capital. The paper provides the algorithm for calculating HCSDI and its components. Authors estimated cross-country differences of HCSDI and developed econometric model of the impact of corruption on HCSDI. The use of this model has allowed to reveal the mechanism and assess the impact of corruption on HCSDI and its components. The results of econometric analysis revealed a negative multiplier effect: an increase in the corruption of the socio-economic system of the state by 1% caused HCSDI reduce by more than 1%. The results and conclusions may be proxy-assessments of the socio-economic consequences of violations of the stability of reproduction of human capital in the conditions of the growth of corruption in the country
Habibov, Nazim
2016-03-01
There is the lack of consensus about the effect of corruption on healthcare satisfaction in transitional countries. Interpreting the burgeoning literature on this topic has proven difficult due to reverse causality and omitted variable bias. In this study, the effect of corruption on healthcare satisfaction is investigated in a set of 12 Post-Socialist countries using instrumental variable regression on the sample of 2010 Life in Transition survey (N = 8655). The results indicate that experiencing corruption significantly reduces healthcare satisfaction. Copyright © 2016 The Author. Published by Elsevier Ltd.. All rights reserved.
Combating healthcare corruption and fraud with improved global health governance.
Mackey, Tim K; Liang, Bryan A
2012-10-22
Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of "global health corruption" and development of a treaty protocol to combat this crucial issue.
Social values and the corruption argument against financial incentives for healthy behaviour.
Brown, Rebecca C H
2017-03-01
Financial incentives may provide a way of reducing the burden of chronic diseases by motivating people to adopt healthy behaviours. While it is still uncertain how effective such incentives could be for promoting health, some argue that, even if effective, there are ethical objections that preclude their use. One such argument is made by Michael Sandel, who suggests that monetary transactions can have a corrupting effect on the norms and values that ordinarily regulate exchange and behaviour in previously non-monetised contexts. In this paper, I outline Sandel's corruption argument and consider its validity in the context of health incentives. I distinguish between two forms of corruption that are implied by Sandel's argument: efficiency corruption and value corruption While Sandel's thought-provoking discussion provides a valuable contribution to debates about health policies generally and health incentives specifically, I suggest the force of his criticism of health incentives is limited: further empirical evidence and theoretical reasoning are required to support the suggestion that health incentives are an inappropriate tool for promoting health. While I do not find Sandel's corruption argument compelling, this only constitutes a partial defence of health incentives, since other criticisms relating to their use may prove more successful. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Corruption and the Other(s): Scope of Superordinate Identity Matters for Corruption Permissibility
Pisor, Anne C.; Gurven, Michael
2015-01-01
The decision to engage in corruption—public and private corruption, nepotism, and embezzlement—is often attributed to rational actors maximizing benefits to themselves. However, the importance of reciprocal relationships in humans suggests that an actor may weigh the costs of harms of her corrupt behavior to individuals who may generate future benefits for her. We hypothesize that actors who have a larger circle of actual and potential social partners will have more individuals to consider when generating harms and will thus be less likely to find corrupt acts permissible than actors with smaller circles of valued others. Using data from the World Values Survey and European Values Study (WVS), we explore whether participants with a larger geographic identity or a greater number of group memberships (i.e. a larger scope of actual and potential social partners) are less likely to find accepting bribes permissible. We find mixed support for our hypotheses, but consistently find that WVS participants with local, country, continent, or world geographic identities are less likely to find accepting a bribe permissible than those with regional identities—that is, actors whose primary identities that encompass more than their region find corruption less permissible. We discuss the importance of considering an actor’s valuation of others when modeling corruption persistence, noting that establishing scopes of positive valuation is a precursor to predicting where actors will target benefits and shunt costs. PMID:26650395
Bisagno, Elisa; Morra, Sergio
2018-03-01
This study examines young volleyball players' learning of increasingly complex attack gestures. The main purpose of the study was to examine the predictive role of a cognitive variable, working memory capacity (or "M capacity"), in the acquisition and development of motor skills in a structured sport. Pascual-Leone's theory of constructive operators (TCO) was used as a framework; it defines working memory capacity as the maximum number of schemes that can be simultaneously activated by attentional resources. The role of expertise in motor learning was also considered. The expertise of each athlete was assessed in terms of years of practice and number of training sessions per week. The participants were 120 volleyball players, aged between 6 and 26 years, who performed both working memory tests and practical tests of volleyball involving the execution of the "third touch" by means of technical gestures of varying difficulty. We proposed a task analysis of these different gestures framed within the TCO. The results pointed to a very clear dissociation. On the one hand, M capacity was the best predictor of correct motor performance, and a specific capacity threshold was found for learning each attack gesture. On the other hand, experience was the key for the precision of the athletic gestures. This evidence could underline the existence of two different cognitive mechanisms in motor learning. The first one, relying on attentional resources, is required to learn a gesture. The second one, based on repeated experience, leads to its automatization. Copyright © 2017 Elsevier Inc. All rights reserved.
CRISPR-Cas adaptation: insights into the mechanism of action.
Amitai, Gil; Sorek, Rotem
2016-02-01
Since the first demonstration that CRISPR-Cas systems provide bacteria and archaea with adaptive immunity against phages and plasmids, numerous studies have yielded key insights into the molecular mechanisms governing how these systems attack and degrade foreign DNA. However, the molecular mechanisms underlying the adaptation stage, in which new immunological memory is formed, have until recently represented a major unresolved question. In this Progress article, we discuss recent discoveries that have shown both how foreign DNA is identified by the CRISPR-Cas adaptation machinery and the molecular basis for its integration into the chromosome to form an immunological memory. Furthermore, we describe the roles of each of the specific CRISPR-Cas components that are involved in memory formation, and consider current models for their evolutionary origin.
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
Libin, L Ia; Tagil'tseva, A V; Lifanova, D E; Ganzenko, M A; Gritsevskaia, T M; Ivanov, M B
2014-01-01
The study included 47 patients (23 men, 24 women) with ICD-10 diagnosis of attack-like paranoid schizophrenia. Patients were divided into two groups: with- (25 patients) or without (22 patients) a concomitant organic disease. Memory, attention and thinking were assessed with psychometric tests. Inter- and intra-group differences were identified that indicated a considerable impact of a concomitant CNS organic pathology on the development of cognitive impairment in the schizophrenic process and active antipsychotic therapy. The data obtained can be used in the development of a differentiated approach to the treatment of patients with concomitant organic pathology.
When Corruption Gets in the Way: Befriending Diaspora and EU-nionizing Bosnia's Higher Education
ERIC Educational Resources Information Center
Sabic-El-Rayess, Amra
2013-01-01
This article investigates the encounter of EU-unionization with a domesticated practice of corruption in Bosnian higher education. Relying on primary data collected in Bosnia's public higher education system, the study finds that the country's corrupt higher education is in conflict with the Bologna-themed reforms that would arguably help…
Corruption of the Politicized University: Lessons from the Orange Revolution in Ukraine
ERIC Educational Resources Information Center
Osipian, Ararat L.
2005-01-01
This paper argues that corruption is used on a systematic basis as a mechanism of direct and indirect administrative control from the state level down to local authorities and administrations of public and private institutions. Informal approval of corrupt activities in exchange for loyalty and compliance with the regime is commonplace in many…
The Development of Anti-Corruption Education Course for Primary School Teacher Education Students
ERIC Educational Resources Information Center
Indawati, Ninik
2015-01-01
The purpose of this research was to develop learning tools as well as test the effectiveness of the implementation of anti-corruption education course for Primary School Teacher Education students, who must be able to transfer anti-corruption values to learners. The research method refers to the development of procedural models, which is…
Whither the Ivory Tower? Corruption and Development of Higher Education in Nigeria
ERIC Educational Resources Information Center
Oarhe, Osumah
2014-01-01
In the struggle to combat corruption in Nigeria, popular and intellectual discourse has essentially been devoted to the behaviour of public officials such as politicians. However, only little intellectual attention seems to have been cast on corruption in the education sector. This article attempts to fill this knowledge gap. Based on desk…
The Inevitable Corruption of Indicators and Educators through High-Stakes Testing
ERIC Educational Resources Information Center
Nichols, Sharon L.; Berliner, David C.
2005-01-01
This research provides lengthy proof of a principle of social science known as Campbell's law: "The more any quantitative social indicator is used for social decision-making, the more subject it will be to corruption pressures and the more apt it will be to distort and corrupt the social processes it is intended to monitor." Applying…
The Changing Faces of Corruption in Georgian Higher Education: Access through Times and Tests
ERIC Educational Resources Information Center
Orkodashvili, Mariam
2012-01-01
This article presents a comparative-historical analysis of access to higher education in Georgia. It describes the workings of corrupt channels during the Soviet and early post-Soviet periods and the role of standardized tests in fighting corruption in higher education admission processes after introduction of the Unified National Entrance…
Social Problems of Modern Russian Higher Education: The Example of Corruption
ERIC Educational Resources Information Center
Fursova, Valentina; Simons, Greg
2014-01-01
Higher education is an essential element in developing a country's innovative potential, and this has been recognised as such by politicians and those who work in the industry. However, one of the blights of contemporary Russian society, corruption threatens the potential of the next generation. Corruption has permeated all levels of society,…
ERIC Educational Resources Information Center
Ferraz, Claudio; Finan, Frederico; Moreira, Diana B.
2012-01-01
This paper examines if money matters in education by looking at whether missing resources due to corruption affect student outcomes. We use data from the auditing of Brazil's local governments to construct objective measures of corruption involving educational block grants transferred from the central government to municipalities. Using variation…
Corruption in Higher Education in Russia-First Decade of the 21st Century
ERIC Educational Resources Information Center
Shirin, Sergey Sergeevich
2015-01-01
The study is based on a methodology proposed by European Association for Education Law and Policy for their research conducted in 2009 and devoted to commercialization, competition and corruption in European education. In the article, the attempt is made to apply their methods to analyze the problems of corruption in Russian higher education…
ERIC Educational Resources Information Center
Martin, Michaela
2016-01-01
Corruption and malpractices in higher education are today a major concern in nearly all higher education systems worldwide. It is a multifaceted phenomenon and has become particularly visible in the academic domain. This paper represents an exploration of the possible role that quality assurance can play in addressing corruption and malpractices.…
Bogdanovica, Ilze; McNeill, Ann; Murray, Rachael; Britton, John
2011-01-01
Smoking prevention should be a primary public health priority for all governments, and effective preventive policies have been identified for decades. The heterogeneity of smoking prevalence between European Union (EU) Member States therefore reflects, at least in part, a failure by governments to prioritise public health over tobacco industry or possibly other financial interests, and hence potentially government corruption. The aims of this study were to test the hypothesis that smoking prevalence is higher in countries with high levels of public sector corruption, and explore the ecological association between smoking prevalence and a range of other national characteristics in current EU Member States. Ecological data from 27 EU Member States were used to estimate univariate and multivariate correlations between smoking prevalence and the Transparency International Corruption Perceptions Index, and a range of other national characteristics including economic development, social inclusion, quality of life and importance of religion. We also explored the association between the Corruption Perceptions Index and measures of the extent to which smoke-free policies have been enacted and are enforced. In univariate analysis, smoking prevalence was significantly higher in countries with higher scores for corruption, material deprivation, and gender inequality; and lower in countries with higher per capita Gross Domestic Product, social spending, life satisfaction and human development scores. In multivariate analysis, only the corruption perception index was independently related to smoking prevalence. Exposure to tobacco smoke in the workplace was also correlated with corruption, independently from smoking prevalence, but not with the measures of national smoke-free policy implementation. Corruption appears to be an important risk factor for failure of national tobacco control activity in EU countries, and the extent to which key tobacco control policies have been implemented. Further research is needed to assess the causal relationships involved.
Collignon, Peter; Athukorala, Prema-Chandra; Senanayake, Sanjaya; Khan, Fahad
2015-01-01
To determine how important governmental, social, and economic factors are in driving antibiotic resistance compared to the factors usually considered the main driving factors-antibiotic usage and levels of economic development. A retrospective multivariate analysis of the variation of antibiotic resistance in Europe in terms of human antibiotic usage, private health care expenditure, tertiary education, the level of economic advancement (per capita GDP), and quality of governance (corruption). The model was estimated using a panel data set involving 7 common human bloodstream isolates and covering 28 European countries for the period 1998-2010. Only 28% of the total variation in antibiotic resistance among countries is attributable to variation in antibiotic usage. If time effects are included the explanatory power increases to 33%. However when the control of corruption indicator is included as an additional variable, 63% of the total variation in antibiotic resistance is now explained by the regression. The complete multivariate regression only accomplishes an additional 7% in terms of goodness of fit, indicating that corruption is the main socioeconomic factor that explains antibiotic resistance. The income level of a country appeared to have no effect on resistance rates in the multivariate analysis. The estimated impact of corruption was statistically significant (p< 0.01). The coefficient indicates that an improvement of one unit in the corruption indicator is associated with a reduction in antibiotic resistance by approximately 0.7 units. The estimated coefficient of private health expenditure showed that one unit reduction is associated with a 0.2 unit decrease in antibiotic resistance. These findings support the hypothesis that poor governance and corruption contributes to levels of antibiotic resistance and correlate better than antibiotic usage volumes with resistance rates. We conclude that addressing corruption and improving governance will lead to a reduction in antibiotic resistance.
The direct and indirect effects of corruption on motor vehicle crash deaths.
Hua, Law Teik; Noland, Robert B; Evans, Andrew W
2010-11-01
Recent empirical research has found that there is an inverted U-shaped or Kuznets relationship between income and motor vehicle crash (MVC) deaths, such that MVC deaths increase as national income increases and decrease after reaching a critical level. Corruption has been identified as one of the underlying factors that could affect this relationship, primarily by undermining institutional development and effective enforcement schemes. The total effect of corruption can be decomposed into two components, a direct and an indirect effect. The direct effect measures the immediate impact of corruption on MVC deaths by undermining effective enforcement and regulations, while the indirect effect captures the impact of corruption on hindering increases in per capita income and the consequent impact of reduced income on MVC deaths. By influencing economic growth, corruption can lead to an increase or decrease in MVC deaths depending on the income level. Using data from 60 countries between 1982 and 2003, these effects are estimated using linear panel and fixed effects negative binomial models. The estimation results suggest that corruption has different direct effects for less developed and highly developed countries. It has a negative (decreasing) effect on MVC deaths for less developed countries and a positive (increasing) effect on MVC deaths for highly developed countries. For highly developed countries, the total effect is positive at lower per capita income levels, but decreases with per capita income and becomes negative at per capita income levels of about US$ 38,248. For less developed countries, the total effect is negative within the sample range and decreases with increased per capita income. In summary, the results of this study suggest that reduction of corruption is likely a necessary condition to effectively tackle road safety problems. 2010 Elsevier Ltd. All rights reserved.
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
Notes on a Continuous-Variable Quantum Key Distribution Scheme
NASA Astrophysics Data System (ADS)
Ichikawa, Tsubasa; Hirano, Takuya; Matsubara, Takuto; Ono, Motoharu; Namiki, Ryo
2017-09-01
We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.
Shan, Ming; Chan, Albert P C; Le, Yun; Hu, Yi
2015-06-01
Response strategy is a key for preventing widespread corruption vulnerabilities in the public construction sector. Although several studies have been devoted to this area, the effectiveness of response strategies has seldom been evaluated in China. This study aims to fill this gap by investigating the effectiveness of response strategies for corruption vulnerabilities through a survey in the Chinese public construction sector. Survey data obtained from selected experts involved in the Chinese public construction sector were analyzed by factor analysis and partial least squares-structural equation modeling. Analysis results showed that four response strategies of leadership, rules and regulations, training, and sanctions, only achieved an acceptable level in preventing corruption vulnerabilities in the Chinese public construction sector. This study contributes to knowledge by improving the understanding of the effectiveness of response strategies for corruption vulnerabilities in the public construction sector of developing countries.
Yang, Yi-Ling; Huang, Jian-Peng; Jiang, Li; Liu, Jian-Hua
2017-12-25
Previous studies have shown that there are many common structures between the neural network of pain and memory, and the main structure in the pain network is also part of the memory network. Chronic pain is characterized by recurrent attacks and is associated with persistent ectopic impulse, which causes changes in synaptic structure and function based on nerve activity. These changes may induce long-term potentiation of synaptic transmission, and ultimately lead to changes in the central nervous system to produce "pain memory". Acupuncture is an effective method in treating chronic pain. It has been proven that acupuncture can affect the spinal cord dorsal horn, hippocampus, cingulate gyrus and other related areas. The possible mechanisms of action include opioid-induced analgesia, activation of glial cells, and the expression of brain derived neurotrophic factor (BDNF). In this study, we systematically review the brain structures, stage of "pain memory" and the mechanisms of acupuncture on synaptic plasticity in chronic pain.
2015-09-11
Officials and firefighters at NASA's Kennedy Space Center observe the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
A memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks stands at Fire Station 1 at NASA's Kennedy Space Center prior to its dedication on Sept. 11, 2015. Beneath the American flag is a section of steel I-beam from the World Trade Center in New York that forms the centerpiece of the monument.
Department of Defense Public Key Infrastructure Token Protection Profile. Version 2.0
2001-03-12
Profile Authors: Tamara Cleveland, Booz·Allen & Hamilton Inc. Michael Alexander, Booz·Allen & Hamilton Inc. Asok Ganguly, Booz·Allen & Hamilton Inc...testing, and electron beam testing. • Other attacks, such as UV or X- rays or high temperatures, could cause erasure of memory. However, erasure of selected
On the Relation Between Memory and Metamemory.
ERIC Educational Resources Information Center
Barclay, Craig R.
Twenty kindergarten children, 5 to 6 years of age, were presented a free recall task in which half of the subjects were asked to generate a "plan of attack" for remembering before experiencing a study-test sequence. The materials were three different sets of 12 pictures each. In each set, three different conceptual categories were represented…
2015-09-11
Firefighters place the American flag at half-staff during dedication services for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
Muncie Remembers That Day of Infamy.
ERIC Educational Resources Information Center
Brant, Heather; And Others
This document presents an oral history project in which 34 residents of Munice, Indiana were interviewed about their experiences and memories of the Japanese attack on Pearl Harbor, December 7, 1941. The project was conducted by the members of an Honors United States History class at Munice Southside High School. The students designed the…
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 8 2010-10-01 2010-10-01 false Discovery of imposition and deception and duty to report corrupt or dishonest conduct. 1103.32 Section 1103.32 Transportation Other Regulations Relating to... Litigants and the Public § 1103.32 Discovery of imposition and deception and duty to report corrupt or...
ERIC Educational Resources Information Center
Hallak, Jacques; Poisson, Muriel
This book summarizes the findings of a research workshop organized by the International Institute for Educational Planning on ethics and corruption in education. It makes a case for addressing the issue of corruption in education based on the experiences of the various participants of the workshop, representatives of various countries and…
The Inevitable Corruption of Indicators and Educators through High-Stakes Testing. Executive Summary
ERIC Educational Resources Information Center
Nichols, Sharon L.; Berliner, David C.
2005-01-01
This research provides lengthy proof of a principle of social science known as Campbell's law: "The more any quantitative social indicator is used for social decision-making, the more subject it will be to corruption pressures and the more apt it will be to distort and corrupt the social processes it is intended to monitor." Applying…
Li, Yongshuai; Tan, Xuyun; Huang, Zhenwei; Liu, Li
2017-07-13
Previous research on the relationship between collectivism and corruption has not investigated their co-variation over time. In this study, we use Google Ngram Viewer to track the frequency of words related to collectivism and corruption in American books (1800-2000) and in Chinese Books (1970-2008). The results demonstrate that a positive association between the usage of these terms during the periods in both Chinese and American books, with changes in words related to collectivism preceding changes in words related to corruption in American books. The theoretical and practical implications are also discussed. © 2017 International Union of Psychological Science.
Egharevba, Efe; Atkinson, Jacqueline
2016-08-15
Clinical trials still represent the gold standard in testing the safety and efficacy of new and existing treatments. However, developing regions including sub-Saharan Africa remain underrepresented in pharmaceutical industry sponsored trials for a number of reasons including fear of corruption and unethical behaviour. This fear exists both on the part of pharmaceutical companies, and investigators carrying out research in the region. The objective of this research was to understand the ethical considerations associated with the conduct of pharmaceutical industry sponsored clinical trials in sub-Saharan Africa. Corruption was identified as a significant issue by a number of stakeholders who participated in semi-structured interviews and completed questionnaires. Additionally, fear of being perceived as corrupt or unethical even when conducting ethically sound research was raised as a concern. Thus corruption, whether actual or perceived, is one of a number of issues which have precluded the placement of a greater number of pharmaceutical sponsored clinical trials in this region. More discussion around corruption with all relevant stakeholders is required in order for progress to be made and to enable greater involvement of sub-Saharan African countries in the conduct of industry sponsored clinical trials.
Úbeda, Francisco; Duéñez-Guzmán, Edgar A
2011-04-01
Cooperation is ubiquitous in the natural world. What seems nonsensical is why natural selection favors a behavior whereby individuals would lose out by benefiting their competitor. This conundrum, for almost half a century, has puzzled scientists and remains a fundamental problem in biology, psychology, and economics. In recent years, the explanation that punishment can maintain cooperation has received much attention. Individuals who punish noncooperators thrive when punishment does not entail a cost to the punisher. However when punishment is costly, cooperation cannot be preserved. Most literature on punishment fails to consider that punishers may act corruptly by not cooperating when punishing noncooperators. No research has considered that there might be power asymmetries between punishers and nonpunishers that turn one of these type of individuals more or less susceptible to experiencing punishment. Here, we formulate a general game allowing corruption and power asymmetries between punishers and nonpunishers. We show that cooperation can persist if punishers possess power and use it to act corruptly. This result provides a new interpretation of recent data on corrupt policing in social insects and the psychology of power and hypocrisy in humans. These results suggest that corruption may play an important role in maintaining cooperation in insects and human societies. In contrast with previous research, we contend that costly punishment can be beneficial for social groups. This work allows us to identify ways in which corruption can be used to the advantage of a society. © 2010 The Author(s). Evolution© 2010 The Society for the Study of Evolution.
2012-06-08
political stability and absence of violence, government effectiveness, and control of corruption (World Bank Institute 2010). These aggregates are...Accountability Political stability and absence of violence Government Effectiveness Control of Corruption Period in Years 2007-2010 in % Period in...of political stability and levels of violence, voice and accountability, government effectiveness, and control of corruption. The assessment goes
ERIC Educational Resources Information Center
Seidelin, Susanne, Ed.; Jensen, Thomas Skov, Ed.
2006-01-01
"Libraries and the fight against HIV/AIDS, poverty and corruption" takes up some of the big issues and major challenges facing the world: the HIV/AIDS pandemic, poverty and the reduction of it, and corruption and its counterpart transparency. The articles explore the role and responsibilities of libraries and information services, and…
ERIC Educational Resources Information Center
Kresse, William J.
2017-01-01
Corruption in higher education is an emerging topic in the field of education research. (Osipian 2008). Different aspects of such corruption have been addressed in numerous papers by various researchers. These papers indicate different aspects of the problem. Many of the papers evidence the global nature of this problem by highlighting corruption…
ERIC Educational Resources Information Center
Neal, Mark; Finlay, Jim; Karkoulian, Silva; Catana, Doina; Pellegrino, Robert
2015-01-01
When seeking to understand corruption in its ongoing temporal context, it is useful to consider business students. Because of their high numbers and the kinds of jobs they enter, they have a key role to play in challenging or sustaining corruption in their societies. This exploratory study focuses on these people in three countries in different…
Will Bribery and Fraud Converge? Comparative Corruption in Higher Education in Russia and the USA
ERIC Educational Resources Information Center
Osipian, Ararat L.
2014-01-01
This study analyses the issue of comparative corruption in the national higher education sectors in the United States of America (USA) and the Russian Federation (RF). Corruption in higher education, as well as the way it is addressed in legislation and court cases and reflected in the media, appears to be consistent with the trajectory and pace…
Corruption in Myanmar - Holding a Country and its People from Economic Prosperity
2014-10-30
censorship laws and freedom to information by banning independent newspapers thereby repressing efforts towards democracy even further. 6 The SPP... censorship laws, insisting state officials return embezzled funds, signing and ratifying the United Nations Convention against Corruption (UNCAC), and...instill a culture of change. For example, in Malaysia , the government formed the Malaysian Anti-Corruption Commission (MACC), an independent watch
Corruption in Brazil and the Incentives for Change
2017-03-01
money laundering schemes. The intent of this thesis is to identify the key changes that have recently empowered a judiciary that was previously...further implicated in a separate money - laundering scheme with ten members of congress. The 1980s and early 90s were very difficult economically for the...including “misappropriation of public funds, mismanagement, money laundering , inter-party corruption, bribery (active corruption), and tax evasion
Venezuela’s Corruption On the Rise: Fourteen Years of Chavismo
2016-09-01
the Pérez administration, including increases in food and oil prices and decline in social programs.19 According to Julia Buxton, the austerity...level, and systematic corruption at the “interaction of the state and private actors in a contaminated social system.”45...corruption penetrating several aspects of Venezuelan society from food programs, healthcare, and the bureaucracies that control those basic goods
Global physics: from percolation to terrorism, guerilla warfare and clandestine activities
NASA Astrophysics Data System (ADS)
Galam, Serge
2003-12-01
The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.
A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps
NASA Astrophysics Data System (ADS)
Hussain, Iqtadar; Anees, Amir; Aslam, Muhammad; Ahmed, Rehan; Siddiqui, Nasir
2018-04-01
In this manuscript, we have proposed an encryption algorithm to encrypt any digital data. The proposed algorithm is primarily based on the substitution-permutation in which the substitution process is performed by the S 8 Substitution boxes. The proposed algorithm incorporates three different chaotic maps. We have analysed the behaviour of chaos by secure communication in great length, and accordingly, we have applied those chaotic sequences in the proposed encryption algorithm. The simulation and statistical results revealed that the proposed encryption scheme is secure against different attacks. Moreover, the encryption scheme can tolerate the channel noise as well; if the encrypted data is corrupted by the unauthenticated user or by the channel noise, the decryption can still be successfully done with some distortion. The overall results confirmed that the presented work has good cryptographic features, low computational complexity and resistant to the channel noise which makes it suitable for low profile mobile applications.
Corruption and internal fraud in the Turkish construction industry.
Gunduz, Murat; Önder, Oytun
2013-06-01
The purpose of this paper is to develop an understanding about the internal fraud and corruption problem in the Turkish construction industry. The reasons behind the internal fraud and corruption problem as well as the types of prevention methods were investigated; and as a result various recommendations were made. To this end, a risk awareness questionnaire was used to understand the behavioral patterns of the construction industry, and to clarify possible proactive and reactive measures against internal fraud and corruption. The type of fraud experienced by Turkish construction companies was also surveyed in the questionnaire. The questionnaire was sent to 89 firms; and depending on the collected data, certain recommendations for construction industry professionals were provided.
Masked ball: ethics, laws and financial contradictions in Hungarian health care.
Szebik, Imre
2003-01-01
Corruption is a major problem in the societies of the post-communist Central European countries. Corruption in health care has some unique characteristics undermining the efficacy of and respect for Hungarian health care. One of the forms of corruption is tipping. This highly contested phenomenon is present in most of the patient/health professional's interactions in a sophisticated manner, raising serious ethical and legal dilemmas. The present paper analyzes tipping and other corruption-related factors, such as financial conflict of interest between industry and health care and argues that since ethical and legal considerations are often ignored in the country, patient care and clinical research are affected by these controversial issues to a great extent.
CORRUPTION IN MEDICAL PRACTICE: WHERE DO WE STAND?
Yousafzai, Abdul Wahab
2015-01-01
Corruption in health care sector affects all countries, including the United States, China and India. Pakistan is no exception. It is preventing people from having access to the quality medical care. Corruption in medical practice include ordering unnecessary investigations, and procedures for kickbacks and commissions; significant absenteeism, which adversely affects patient care; and the conflict of interest within the physician-pharmaceutical nexus, which exploits patients. To overcome corruption there is need to establish a framework for accountability, eliminating the physician-pharmaceutical nexus; and emphasizing medical ethics at the undergraduate and postgraduate levels. It is also important to open a dialogue amongst health care professionals and encourage the establishment of an ethical health care system in Pakistan.
And justice for all: Examining corruption as a contextual source of mental illness.
van Deurzen, Ioana
2017-01-01
In the present study, I focus on the relationship between corruption and mental health as measured by the level of depressive symptoms. I use data collected by the European Social Survey in 2006, 2012 and 2014 from 99,159 individuals that lived in 24 European countries. I employ two types of analyses: static analyses, i.e., multilevel models estimated in each wave, and dynamic analyses, i.e., fixed effects models for pseudo-panel data. Both static and dynamic analyses suggested that corruption had a detrimental effect on mental health. However, the results were not robust in models where the country's wealth was accounted for. Furthermore, this study presents evidence that the level of societal corruption is detrimental especially for the mental health of religious persons and individuals that experience material adversity. Regarding a potentially different effect of corruption on mental health between western and eastern European countries, no significant differences were found. Copyright © 2016 Elsevier Ltd. All rights reserved.
FinFET memory cell improvements for higher immunity against single event upsets
NASA Astrophysics Data System (ADS)
Sajit, Ahmed Sattar
The 21st century is witnessing a tremendous demand for transistors. Life amenities have incorporated the transistor in every aspect of daily life, ranging from toys to rocket science. Day by day, scaling down the transistor is becoming an imperious necessity. However, it is not a straightforward process; instead, it faces overwhelming challenges. Due to these scaling changes, new technologies, such as FinFETs for example, have emerged as alternatives to the conventional bulk-CMOS technology. FinFET has more control over the channel, therefore, leakage current is reduced. FinFET could bridge the gap between silicon devices and non-silicon devices. The semiconductor industry is now incorporating FinFETs in systems and subsystems. For example, Intel has been using them in their newest processors, delivering potential saving powers and increased speeds to memory circuits. Memory sub-systems are considered a vital component in the digital era. In memory, few rows are read or written at a time, while the most rows are static; hence, reducing leakage current increases the performance. However, as a transistor shrinks, it becomes more vulnerable to the effects from radioactive particle strikes. If a particle hits a node in a memory cell, the content might flip; consequently, leading to corrupting stored data. Critical fields, such as medical and aerospace, where there are no second chances and cannot even afford to operate at 99.99% accuracy, has induced me to find a rigid circuit in a radiated working environment. This research focuses on a wide spectrum of memories such as 6T SRAM, 8T SRAM, and DICE memory cells using FinFET technology and finding the best platform in terms of Read and Write delay, susceptibility level of SNM, RSNM, leakage current, energy consumption, and Single Event Upsets (SEUs). This research has shown that the SEU tolerance that 6T and 8T FinFET SRAMs provide may not be acceptable in medical and aerospace applications where there is a very high likelihood of SEUs. Consequently, FinFET DICE memory can be a good candidate due to its high ability to tolerate SEUs of different amplitudes and long periods for both read and hold operations.
General subspace learning with corrupted training data via graph embedding.
Bao, Bing-Kun; Liu, Guangcan; Hong, Richang; Yan, Shuicheng; Xu, Changsheng
2013-11-01
We address the following subspace learning problem: supposing we are given a set of labeled, corrupted training data points, how to learn the underlying subspace, which contains three components: an intrinsic subspace that captures certain desired properties of a data set, a penalty subspace that fits the undesired properties of the data, and an error container that models the gross corruptions possibly existing in the data. Given a set of data points, these three components can be learned by solving a nuclear norm regularized optimization problem, which is convex and can be efficiently solved in polynomial time. Using the method as a tool, we propose a new discriminant analysis (i.e., supervised subspace learning) algorithm called Corruptions Tolerant Discriminant Analysis (CTDA), in which the intrinsic subspace is used to capture the features with high within-class similarity, the penalty subspace takes the role of modeling the undesired features with high between-class similarity, and the error container takes charge of fitting the possible corruptions in the data. We show that CTDA can well handle the gross corruptions possibly existing in the training data, whereas previous linear discriminant analysis algorithms arguably fail in such a setting. Extensive experiments conducted on two benchmark human face data sets and one object recognition data set show that CTDA outperforms the related algorithms.
Corruption Early Prevention: Decision Support System for President of the Republic of Indonesia
NASA Astrophysics Data System (ADS)
Sasmoko; Widhoyoko, S. A.; Ariyanto, S.; Indrianti, Y.; Noerlina; Muqsith, A. M.; Alamsyah, M.
2017-01-01
Corruption is an extraordinary crime, and then the prevention must also be extraordinary, simultaneously (national) in the form of early warning that involves all elements; government, industry, and society. To realize it the system needs to be built which in this study is called the Corruption Early Prevention (CEP) as a Decision Support System for President of the Republic of Indonesia. This study aims to examine 1) how is the construct of the Corruption Early Prevention as a Decision Support System for President of the Republic of Indonesia?, and 2) how is the design form of the system of Corruption Early Prevention as a Decision Support System for President of Republic of Indonesia? The research method is using Neuro-Research which is the collaboration of qualitative and quantitative research methods and the model development of Information Technology (IT). The research found that: 1) the construct of CEP is theoretically feasible, valid and reliable by content to be developed in the context of the prevention of corruption in Indonesia as an early prevention system that diagnoses Indonesia simultaneously and in real time, and 2) the concept of system design and business process of CEP is predicted to be realized in the IT-based program.
NASA Astrophysics Data System (ADS)
Mohammed, M. A.; Eman, Y.; Hussein, A. H.; Hasson, A. R.
2015-12-01
Arab countries face the corruption issues in its several public organizations. The corruption in these countries is considered as the main challenge. The oil sector is one of the public sectors that have huge level of corruption. However, the Iraqi economy had become dependable on oil sector daring the last three decades, and on the contrary, of what other oil countries did. The capital is considered as one of the essential factor for economic development. The revenues of oil exports will stay the essential source for economic development in Iraq in the future in order to reduce being dependable on oil. Since the beginning of the 3rd thousands, the world witnessed great rise in the demand on oil, but the Iraqi exports of crude oil come to be less than its similarities in the seventeenths of last century. So our oil sector is still in need of deep study. This study focuses on technological technique that can make huge decrease for corruption in oil sector in Iraq. However, e-government is considered as the best techniques that can decrease the corruption. Thus, this study bases on challenges that effect on build successful e-government project in Iraqi oil industry.
[Income inequality, corruption, and life expectancy at birth in Mexico].
Idrovo, Alvaro Javier
2005-01-01
To ascertain if the effect of income inequality on life expectancy at birth in Mexico is mediated by corruption, used as a proxy of social capital. An ecological study was carried out with the 32 Mexican federative entities. Global and by sex correlations between life expectancy at birth were estimated by federative entity with the Gini coefficient, the Corruption and Good Government Index, the percentage of Catholics, and the percentage of the population speaking indigenous language. Robust linear regressions, with and without instrumental variables, were used to explore if corruption acts as intermediate variable in the studied relationship. Negative correlations with Spearman's rho near to -0.60 (p < 0.05) and greater than -0.66 (p < 0.05) between life expectancy at birth, the Gini coefficient and the population speaking indigenous language, respectively, were observed. Moreover, the Corruption and Good Government Index correlated with men's life expectancy at birth with Spearman's rho -0.3592 (p < 0.05). Regressions with instruments were more consistent than conventional ones and they show a strong negative effect (p < 0.05) of income inequality on life expectancy at birth. This effect was greater among men. The findings suggest a negative effect of income inequality on life expectancy at birth in Mexico, mediated by corruption levels and other related cultural factors.
Numerical simulation of three dimensional transonic flows
NASA Technical Reports Server (NTRS)
Sahu, Jubaraj; Steger, Joseph L.
1987-01-01
The three-dimensional flow over a projectile has been computed using an implicit, approximately factored, partially flux-split algorithm. A simple composite grid scheme has been developed in which a single grid is partitioned into a series of smaller grids for applications which require an external large memory device such as the SSD of the CRAY X-MP/48, or multitasking. The accuracy and stability of the composite grid scheme has been tested by numerically simulating the flow over an ellipsoid at angle of attack and comparing the solution with a single grid solution. The flowfield over a projectile at M = 0.96 and 4 deg angle-of-attack has been computed using a fine grid, and compared with experiment.
Governance in managing public health resources in Brazilian municipalities.
Avelino, George; Barberia, Lorena G; Biderman, Ciro
2014-09-01
This study contributes to the health governance discussion by presenting a new data set that allows for comparisons of the management of health resources among Brazilian municipalities. Research on Brazil is particularly important as the provision of health services was decentralized in 1988 and since then municipalities have been given greater responsibilities for the management of fiscal resources for public health service provision. Based on detailed information on corruption practices (such as over-invoicing, illegal procurement and fake receipts) from audit reports of health programmes in 980 randomly selected Brazilian municipalities, this study deepens understanding of the relationship between health governance institutions and the incidence of corruption at the local level by exploring the extent to which horizontal and vertical accountabilities contribute to reducing the propensity of municipal government officials to divert public health resources for private gain. The results of our multiple regression analysis suggest that the experience of health municipal councils is correlated with reductions in the incidence of corruption in public health programmes. This impact is significant over time, with each additional year of health council experience reducing corruption incidence levels by 2.1% from baseline values. The findings reported in this study do not rely on the subjectivity of corruption measures which usually conflate the actual incidence of corruption with its perception by informants. Based on our results, we provide recommendations that can assist policy makers to reduce corruption. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2013; all rights reserved.
Corrupt practices negatively influenced food security and live expectancy in developing countries
Uchendu, Florence Ngozi; Abolarin, Thaddeus Olatunbosun
2015-01-01
Malnutrition is a global public health problem more prevalent in developing countries than in developed countries. Indicators of malnutrition include household food security and life expectancy. Corruption might be one of socio-political problems fuelling malnutrition in developing countries. The aim of this paper is to compare influence of corruption on food security, live expectancy (LE) and population in developed and developing countries. Thirty two least corrupt countries (LCC) and most corrupt countries (MCC) representing developed and developing countries were systematically selected using Corruption Perceptions Index (CPI). Countries’ data on population, food security index (FSI) and LE scores were obtained from Global food security index (GFSI) and Population reference bureau. T-test, Multivariate (Wilks’ Lambda), Pearson product moment analysis were performed to determine relationship between CPI, FSI, LE, and population in LCC and MCC at p<.05. Data were presented in tables, means and percentages. Mean CPI, Population, FSI, and LE in LCC and MCC were 71.5% and 24.2%; 34.8 and 41.7million; 75.0% and 37.4%; and 78.4years and 62.4years. There was a significant difference between CPI, FSI and LE in LCC and MCC (p < 0.05). CPI had a significant positive relationship with FSI and LE in LCC not MCC. There was also a significant relationship between FSI and LE in MCC. Low CPI influenced high FSI and LE in LCC while Low LE was associated with low FSI in MCC. Policies discouraging corrupt practices and promoting good governance should be embraced to eradicate malnutrition in developing countries. PMID:26090058
Corrupt practices negatively influenced food security and live expectancy in developing countries.
Uchendu, Florence Ngozi; Abolarin, Thaddeus Olatunbosun
2015-01-01
Malnutrition is a global public health problem more prevalent in developing countries than in developed countries. Indicators of malnutrition include household food security and life expectancy. Corruption might be one of socio-political problems fuelling malnutrition in developing countries. The aim of this paper is to compare influence of corruption on food security, live expectancy (LE) and population in developed and developing countries. Thirty two least corrupt countries (LCC) and most corrupt countries (MCC) representing developed and developing countries were systematically selected using Corruption Perceptions Index (CPI). Countries' data on population, food security index (FSI) and LE scores were obtained from Global food security index (GFSI) and Population reference bureau. T-test, Multivariate (Wilks' Lambda), Pearson product moment analysis were performed to determine relationship between CPI, FSI, LE, and population in LCC and MCC at p < .05. Data were presented in tables, means and percentages. Mean CPI, Population, FSI, and LE in LCC and MCC were 71.5% and 24.2%; 34.8 and 41.7 million; 75.0% and 37.4%; and 78.4 years and 62.4 years. There was a significant difference between CPI, FSI and LE in LCC and MCC (p < 0.05). CPI had a significant positive relationship with FSI and LE in LCC not MCC. There was also a significant relationship between FSI and LE in MCC. Low CPI influenced high FSI and LE in LCC while Low LE was associated with low FSI in MCC. Policies discouraging corrupt practices and promoting good governance should be embraced to eradicate malnutrition in developing countries.
2015-09-11
An honor guard folds an American flag during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
Kelvin Manning, associate director of NASA's Kennedy Space Center, speaks during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
An honor guard prepares to fold an American flag during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The honor guard for the Fire Department at NASA's Kennedy Space Center conducts the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The Brevard Police and Fire Pipe and Drum corps open the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The Brevard Police and Fire Pipe and Drum corps perform during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Proclamation There is no greater evil than willful violence against innocents. On this National Day of Service... of the Oklahoma City bombing, the September 11 attacks, and other incidents of violence around the... with appropriate ceremonies, activities, and acts of community service in memory of the victims and...
Bogdanovica, Ilze; McNeill, Ann; Murray, Rachael; Britton, John
2011-01-01
Background Smoking prevention should be a primary public health priority for all governments, and effective preventive policies have been identified for decades. The heterogeneity of smoking prevalence between European Union (EU) Member States therefore reflects, at least in part, a failure by governments to prioritise public health over tobacco industry or possibly other financial interests, and hence potentially government corruption. The aims of this study were to test the hypothesis that smoking prevalence is higher in countries with high levels of public sector corruption, and explore the ecological association between smoking prevalence and a range of other national characteristics in current EU Member States. Methods Ecological data from 27 EU Member States were used to estimate univariate and multivariate correlations between smoking prevalence and the Transparency International Corruption Perceptions Index, and a range of other national characteristics including economic development, social inclusion, quality of life and importance of religion. We also explored the association between the Corruption Perceptions Index and measures of the extent to which smoke-free policies have been enacted and are enforced. Results In univariate analysis, smoking prevalence was significantly higher in countries with higher scores for corruption, material deprivation, and gender inequality; and lower in countries with higher per capita Gross Domestic Product, social spending, life satisfaction and human development scores. In multivariate analysis, only the corruption perception index was independently related to smoking prevalence. Exposure to tobacco smoke in the workplace was also correlated with corruption, independently from smoking prevalence, but not with the measures of national smoke-free policy implementation. Conclusions Corruption appears to be an important risk factor for failure of national tobacco control activity in EU countries, and the extent to which key tobacco control policies have been implemented. Further research is needed to assess the causal relationships involved. PMID:21909375
Shi, Jianwei; Liu, Rui; Jiang, Hua; Wang, Chunxu; Xiao, Yue; Liu, Nana; Wang, Zhaoxin; Shi, Leiyu
2018-01-01
Objectives Few studies have systematically examined the effects of the existing regulations for alleviating corruption in China. This study assesses the effectiveness of China’s reforms to curb medical corruption. Methods We used mixed methods for the evaluation of existing countermeasures. First, qualitative informant interviews based on the Donabedian model were conducted to obtain experts’ evaluation of various kinds of countermeasures. Second, using data from ‘China Judgements Online’, we analysed the trend of occurrence and the characteristics of the medical corruption cases in recent years to reflect the overall effects of these countermeasures in China. Results Since 1990s, China has implemented three main categories of countermeasures to oppose medical corruption: fines and criminal penalties, health policy regulations, and reporting scheme policy. Information from the interviews showed that first the level of fines and criminal penalties for medical corruption behaviours may not be sufficient. Second, health policy regulations are also insufficient. Although the National Reimbursement Drug List and Essential Drug List were implemented, they were incomplete and created additional opportunities for corruption. Moreover, the new programme that centralised the purchase of pharmaceuticals found that most purchasing committees were not independent, and the selection criteria for bidding lacked scientific evidence. Third, the reporting scheme for commercial bribery records by the health bureau was executed poorly. In addition, quantitative online data showed no obvious decrease of institutional medical corruption in recent years, and most criminals have been committing crimes for a long time before getting detected, which further demonstrated the low effectiveness of the above countermeasures. Conclusions Although existing countermeasures have exerted certain effects according to Chinese experts, more rigorous legislation and well-functioning administrative mechanisms are needed. Fundamentally, financial incentives for hospitals/physicians and the health insurance system should be improved. PMID:29439069
Collignon, Peter; Athukorala, Prema-chandra; Senanayake, Sanjaya; Khan, Fahad
2015-01-01
Objectives To determine how important governmental, social, and economic factors are in driving antibiotic resistance compared to the factors usually considered the main driving factors—antibiotic usage and levels of economic development. Design A retrospective multivariate analysis of the variation of antibiotic resistance in Europe in terms of human antibiotic usage, private health care expenditure, tertiary education, the level of economic advancement (per capita GDP), and quality of governance (corruption). The model was estimated using a panel data set involving 7 common human bloodstream isolates and covering 28 European countries for the period 1998–2010. Results Only 28% of the total variation in antibiotic resistance among countries is attributable to variation in antibiotic usage. If time effects are included the explanatory power increases to 33%. However when the control of corruption indicator is included as an additional variable, 63% of the total variation in antibiotic resistance is now explained by the regression. The complete multivariate regression only accomplishes an additional 7% in terms of goodness of fit, indicating that corruption is the main socioeconomic factor that explains antibiotic resistance. The income level of a country appeared to have no effect on resistance rates in the multivariate analysis. The estimated impact of corruption was statistically significant (p< 0.01). The coefficient indicates that an improvement of one unit in the corruption indicator is associated with a reduction in antibiotic resistance by approximately 0.7 units. The estimated coefficient of private health expenditure showed that one unit reduction is associated with a 0.2 unit decrease in antibiotic resistance. Conclusions These findings support the hypothesis that poor governance and corruption contributes to levels of antibiotic resistance and correlate better than antibiotic usage volumes with resistance rates. We conclude that addressing corruption and improving governance will lead to a reduction in antibiotic resistance. PMID:25786027
Paredes-Solís, Sergio; Villegas-Arrizón, Ascensio; Ledogar, Robert J; Delabra-Jardón, Verónica; Alvarez-Chávez, José; Legorreta-Soberanis, José; Nava-Aguilera, Elizabeth; Cockcroft, Anne; Andersson, Neil
2011-12-21
Corruption pervades educational and other institutions worldwide and medical schools are not exempt. Empirical evidence about levels and types of corruption in medical schools is sparse. We conducted surveys in 2000 and 2007 in the medical school of the Autonomous University of Guerrero in Mexico to document student perceptions and experience of corruption and to support the medical school to take actions to tackle corruption. In both 2000 and 2007 medical students completed a self-administered questionnaire in the classroom without the teacher present. The questionnaire asked about unofficial payments for admission to medical school, for passing an examination and for administrative procedures. We examined factors related to the experience of corruption in multivariate analysis. Focus groups of students discussed the quantitative findings. In 2000, 6% of 725 responding students had paid unofficially to obtain entry into the medical school; this proportion fell to 1.6% of the 436 respondents in 2007. In 2000, 15% of students reported having paid a bribe to pass an examination, not significantly different from the 18% who reported this in 2007. In 2007, students were significantly more likely to have bribed a teacher to pass an examination if they were in the fourth year, if they had been subjected to sexual harassment or political pressure, and if they had been in the university for five years or more. Students resented the need to make unofficial payments and suggested tackling the problem by disciplining corrupt teachers. The university administration made several changes to the system of admissions and examinations in the medical school, based on the findings of the 2000 survey. The fall in the rate of bribery to enter the medical school was probably the result of the new admissions system instituted after the first survey. Further actions will be necessary to tackle the continuing presence of bribery to pass examinations and for administrative procedures. The social audit helped to draw attention to corruption and to stimulate actions to tackle it.
Shi, Jianwei; Liu, Rui; Jiang, Hua; Wang, Chunxu; Xiao, Yue; Liu, Nana; Wang, Zhaoxin; Shi, Leiyu
2018-02-08
Few studies have systematically examined the effects of the existing regulations for alleviating corruption in China. This study assesses the effectiveness of China's reforms to curb medical corruption. We used mixed methods for the evaluation of existing countermeasures. First, qualitative informant interviews based on the Donabedian model were conducted to obtain experts' evaluation of various kinds of countermeasures. Second, using data from 'China Judgements Online', we analysed the trend of occurrence and the characteristics of the medical corruption cases in recent years to reflect the overall effects of these countermeasures in China. Since 1990s, China has implemented three main categories of countermeasures to oppose medical corruption: fines and criminal penalties, health policy regulations, and reporting scheme policy. Information from the interviews showed that first the level of fines and criminal penalties for medical corruption behaviours may not be sufficient. Second, health policy regulations are also insufficient. Although the National Reimbursement Drug List and Essential Drug List were implemented, they were incomplete and created additional opportunities for corruption. Moreover, the new programme that centralised the purchase of pharmaceuticals found that most purchasing committees were not independent, and the selection criteria for bidding lacked scientific evidence. Third, the reporting scheme for commercial bribery records by the health bureau was executed poorly. In addition, quantitative online data showed no obvious decrease of institutional medical corruption in recent years, and most criminals have been committing crimes for a long time before getting detected, which further demonstrated the low effectiveness of the above countermeasures. Although existing countermeasures have exerted certain effects according to Chinese experts, more rigorous legislation and well-functioning administrative mechanisms are needed. Fundamentally, financial incentives for hospitals/physicians and the health insurance system should be improved. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
SOLLIMS Sampler: Targeting Peace & Stability Operations Lessons & Best Practices. Volume 2, Issue 3
2011-07-01
could then maintain its neutral status. • Be gender inclusive. SFCG was careful to report equally on the involvement of both men and women in corrupt...statebuilding in post- conflict settings. The legitimacy and effectiveness of the state can be severely impeded by corrupt practices, thereby reducing...November 2008) Corruption – the abuse of entrusted authority for private gain – can be particularly nefarious in post- conflict reconstruction
How Corruption Blunts Counternarcotic Policies in Afghanistan: A Multiagent Investigation
NASA Astrophysics Data System (ADS)
Geller, Armando; Mussavi Rizi, Seyed M.; Łatek, Maciej M.
We report the results of multiagent modeling experiments on interactions between the drug industry and corruption in Afghanistan. The model formalizes assumptions on the motivations of players in the Afghan drug industry, quantifies the tradeoffs among various choices players face and enables inspection of the time, space and level of supply chain in which one can expect positive and negative impacts of counternarcotic policies. If reducing opium exports is one measure of effectiveness for NATO operations in Afghanistan, grasping the links between corruption and the drug industry should provide a better picture of the second-order interactions between corruption and investment in improving the governance quality, in deploying security forces tasked with eradication and interdiction and in programs to enhance rural livelihoods.
Palgi, Yuval; Shrira, Amit; Hamama-Raz, Yaira; Palgi, Sharon; Goodwin, Robin; Ben-Ezra, Menachem
2014-05-01
The present study examined whether recollections of the World Trade Center (WTC) terror attack and previous hurricanes moderated the relationship between exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1000 participants from affected areas completed self-report questionnaires a month after Hurricane Sandy hit the East Coast of the United States. Participants reported their exposure to Hurricane Sandy, their PTSD symptoms, and recollections of the WTC terror attack and previous hurricanes elicited due to Hurricane Sandy. Exposure to Hurricane Sandy was related to PTSD symptoms among those with high level of recollections of the WTC terror attack and past hurricanes, but not among those with low level of recollections. The aftermath of exposure to Hurricane Sandy is related not only to exposure, but also to its interaction with recollections of past traumas. These findings have theoretical and practical implications for practitioners and health policy makers in evaluating and interpreting the impact of past memories on future natural disasters. This may help in intervention plans of social and psychological services. Copyright © 2014 Elsevier Inc. All rights reserved.
32 CFR 516.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... other attorneys designated by the Chief will represent DA in all procurement fraud and corruption... procurement fraud and corruption. (o) Chief, Environmental Law Division, USALSA. The Chief, Environmental Law...
Corruption and inequality of wealth amongst the very rich.
Franses, Philip Hans; de Groot, Bert
Corruption may lead to tax evasion and unbalanced favors and this may lead to extraordinary wealth amongst a few. We study for 13 countries 6 years of Forbes rankings data and we examine whether corruption leads to more inequality amongst the wealthiest. When we correct in our panel model for current and one-year lagged competitiveness and GDP growth rates, we find no such effect. In fact, we find that more competitiveness decreases inequality amongst the wealthiest.
Fighting the Hobbesian Trinity in Columbia: A New Strategy for Peace
2001-04-01
that corruption can be avoided in an electoral system, nor do they address the issue that the electoral system can be used to maintain corrupt elites...Yet when corruption assists elites to manipulate the electoral system, then accountability, the very purpose of the electoral system, is nullified. In...Ibid., p. 375. 98. Paz y Derechos Humanos, “Mininterior dice que armar a civiles aumentaria violencia; No a milicias: Gobierno,” El Colombiano, November
China's Land Market Auctions: Evidence of Corruption?
Cai, Hongbin; Henderson, J Vernon; Zhang, Qinghua
2013-01-01
This paper studies the urban land market in China in 2003-2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a "two stage auction". The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are "cold", which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities.
China’s Land Market Auctions: Evidence of Corruption?
Cai, Hongbin; Henderson, J. Vernon; Zhang, Qinghua
2013-01-01
This paper studies the urban land market in China in 2003—2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a “two stage auction”. The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are “cold”, which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities. PMID:25506125
Designing a holistic end-to-end intelligent network analysis and security platform
NASA Astrophysics Data System (ADS)
Alzahrani, M.
2018-03-01
Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo’s system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user’s behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.
Nishiwaki, Y; Maekawa, K; Ogawa, Y; Asukai, N; Minami, M; Omae, K
2001-11-01
Although the clinical manifestations of acute sarin poisoning have been reported in detail, no comprehensive study of the chronic physical and psychiatric effects of acute sarin poisoning has been carried out. To clarify the chronic effects of sarin on the nervous system, a cross-sectional epidemiologic study was conducted 3 years after the Tokyo subway sarin attack. Subjects consisted of the rescue team staff members and police officers who had worked at the disaster site. Subjects consisted of 56 male exposed subjects and 52 referent subjects matched for age and occupation. A neurobehavioral test, stabilometry, and measurement of vibration perception thresholds were performed, as well as psychometric tests to assess traumatic stress symptoms. The exposed group performed less well in the backward digit span test than the referent group in a dose-effect manner. This result was the same after controlling for possible confounding factors and was independent of traumatic stress symptoms. In other tests of memory function, except for the Benton visual retention test (mean correct answers), effects related to exposure were also suggested, although they were not statistically significant. In contrast, the dose-effect relationships observed in the neurobehavioral tests (psychomotor function) were unclear. None of the stabilometry and vibration perception threshold parameters had any relation to exposure. Our findings suggest the chronic decline of memory function 2 years and 10 months to 3 years and 9 months after exposure to sarin in the Tokyo subway attack, and further study is needed.
Nishiwaki, Y; Maekawa, K; Ogawa, Y; Asukai, N; Minami, M; Omae, K
2001-01-01
Although the clinical manifestations of acute sarin poisoning have been reported in detail, no comprehensive study of the chronic physical and psychiatric effects of acute sarin poisoning has been carried out. To clarify the chronic effects of sarin on the nervous system, a cross-sectional epidemiologic study was conducted 3 years after the Tokyo subway sarin attack. Subjects consisted of the rescue team staff members and police officers who had worked at the disaster site. Subjects consisted of 56 male exposed subjects and 52 referent subjects matched for age and occupation. A neurobehavioral test, stabilometry, and measurement of vibration perception thresholds were performed, as well as psychometric tests to assess traumatic stress symptoms. The exposed group performed less well in the backward digit span test than the referent group in a dose-effect manner. This result was the same after controlling for possible confounding factors and was independent of traumatic stress symptoms. In other tests of memory function, except for the Benton visual retention test (mean correct answers), effects related to exposure were also suggested, although they were not statistically significant. In contrast, the dose-effect relationships observed in the neurobehavioral tests (psychomotor function) were unclear. None of the stabilometry and vibration perception threshold parameters had any relation to exposure. Our findings suggest the chronic decline of memory function 2 years and 10 months to 3 years and 9 months after exposure to sarin in the Tokyo subway attack, and further study is needed. PMID:11713003
Benzodiazepine sensitivity in panic disorder: effects of chronic alprazolam treatment.
Cowley, D S; Roy-Byrne, P P; Radant, A; Ritchie, J C; Greenblatt, D J; Nemeroff, C B; Hommer, D W
1995-04-01
The aim of the current study was to determine the degree to which patients with panic disorder develop tolerance to subjective and physiological effects of benzodiazepine after chronic treatment with alprazolam. Response to acute administration of diazepam was assessed in 19 panic disorder patients receiving chronic treatment with alprazolam and 23 untreated panic disorder patients. At baseline in the laboratory, the two groups did not differ in peak saccadic eye movement velocity, saccade latency, short-term memory, plasma cortisol and growth hormone concentrations, heart rate, and self-rated levels of sedation and anxiety. Compared with untreated patients, alprazolam-treated patients displayed significantly less diazepam-induced change in peak saccadic velocity, saccade latency, growth hormone secretion, memory, and self-rated levels of sedation. There was no difference between groups in diazepam effects on plasma cortisol concentrations or self-rated anxiety. Within alprazolam-treated patients, diazepam-induced slowing of peak saccade velocity was significantly inversely correlated with illness severity, as measured by reported panic attacks per week and severity of phobic avoidance, but not with alprazolam dose, blood level, or duration of treatment. Because the alprazolam-treated group reported more panic attacks per week than the untreated panic patients, treated patients were divided into those who were asymptomatic versus those with continuing panic attacks. The subgroup of nine alprazolam-treated subjects who were asymptomatic also showed significantly less diazepam effects than the group of untreated panic disorder patients, suggesting that overall group differences were at least partially attributable to the development of tolerance to selected benzodiazepine effects with chronic alprazolam treatment.
2015-05-01
LLC and DRAM banks. For each µB task and isolation configuration, we ran experiments with all 256 possible LLC area sizes (given by 1 to 16 ways and 1...isolation on multicoore platforms. In RTAS ’14. [29] H. Yun, G. Yao, R. Pellizzoni, M. Caccamo, and L. Sha . Memory access control in multiprocessor
Atomic Bomb: Memory and its Power on Japanese Pacifism
2008-05-01
her visit, Toshiko herself suffered from radiation sickness for the rest of her life and earned the title “ Hibakusha ,” the informal name given to...victims of the atomic attacks. “ Hibakusha ”, literally means, “bomb-affected people” in Japanese. Toshiko never forgot the images of charred, naked...city. 2 1Toshiko Saeki, “ Hibakusha Testimony” available from http
Operational Exercise Integration Recommendations for DoD Cyber Ranges
2015-08-05
be the precision and recall of a security information and event management (SIEM) system ’s notifications of unauthorized access to that directory...network traffic, port scanning Deplete Resources TCP flooding, memory leak exploitation Injection Cross-site scripting attacks, SQL injection Deceptive...requirements for personnel development; tactics, techniques, and procedures (TTPs) devel- opment; and mission rehearsals . While unique in their own
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Lt. James Dumont lead the dedication service for a memorial to the343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Do Gender and Type of Health Professional Influence Effectiveness? Preliminary Draft.
ERIC Educational Resources Information Center
Bush, David F.
To determine the influence of the health care provider's gender and profession on readers' memory for health information, 48 university students were asked to read a three page article on heart attacks that was attributed to either (1) a female nurse, (2) a male nurse, (3) a female physician, or (4) a male physician. After reading the article, the…
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Lt. James Dumont lead the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
ERIC Educational Resources Information Center
Testa, Nicole; McCarthy, James B.
2004-01-01
This article describes a small group of preadolescent, psychiatric inpatients and their collaborative painting of a memorial mural about the September 11, 2001, attack on the World Trade Center in New York City. Through an immersion in the group experience, the group members became increasingly introspective about their feelings of loss and their…
32 CFR 516.63 - Coordination with DOJ.
Code of Federal Regulations, 2011 CFR
2011-07-01
... PUBLIC RELATIONS LITIGATION Remedies in Procurement Fraud and Corruption § 516.63 Coordination with DOJ... significant fraud and corruption cases to accomplish the following: (1) Monitor criminal prosecutions. (2...
Threat of death and autobiographical memory: a study of passengers from Flight AT236.
McKinnon, Margaret C; Palombo, Daniela J; Nazarov, Anthony; Kumar, Namita; Khuu, Wayne; Levine, Brian
2015-06-01
We investigated autobiographical memory in a group of passengers onboard a trans-Atlantic flight that nearly ditched at sea. The consistency of traumatic exposure across passengers, some of whom developed post-traumatic stress disorder (PTSD), provided a unique opportunity to assess verified memory for life-threatening trauma. Using the Autobiographical Interview, which separates episodic from non-episodic details, passengers and healthy controls (HCs) recalled three events: the airline disaster (or a highly negative event for HCs), the September 11, 2001 attacks, and a non-emotional event. All passengers showed robust mnemonic enhancement for episodic details of the airline disaster. Although neither richness nor accuracy of traumatic recollection was related to PTSD, production of non-episodic details for traumatic and non-traumatic events was elevated in PTSD passengers. These findings indicate a robust mnemonic enhancement for trauma that is not specific to PTSD. Rather, PTSD is associated with altered cognitive control operations that affect autobiographical memory in general.
Poirier, Nicolas; Chevalier, Melanie; Mary, Caroline; Hervouet, Jeremy; Minault, David; Baker, Paul; Ville, Simon; Le Bas-Bernardet, Stephanie; Dilek, Nahzli; Belarif, Lyssia; Cassagnau, Elisabeth; Scobie, Linda; Blancho, Gilles; Vanhove, Bernard
2016-01-01
Novel therapies that specifically target activation and expansion of pathogenic immune cell subsets responsible for autoimmune attacks are needed to confer long-term remission. Pathogenic cells in autoimmunity include memory T lymphocytes that are long-lived and present rapid recall effector functions with reduced activation requirements. Whereas the CD28 costimulation pathway predominantly controls priming of naive T cells and hence generation of adaptive memory cells, the roles of CD28 costimulation on established memory T lymphocytes and the recall of memory responses remain controversial. In contrast to CD80/86 antagonists (CTLA4-Ig), selective CD28 antagonists blunt T cell costimulation while sparing CTLA-4 and PD-L1-dependent coinhibitory signals. Using a new selective CD28 antagonist, we showed that Ag-specific reactivation of human memory T lymphocytes was prevented. Selective CD28 blockade controlled both cellular and humoral memory recall in nonhuman primates and induced long-term Ag-specific unresponsiveness in a memory T cell-mediated inflammatory skin model. No modification of memory T lymphocytes subsets or numbers was observed in the periphery, and importantly no significant reactivation of quiescent viruses was noticed. These findings indicate that pathogenic memory T cell responses are controlled by both CD28 and CTLA-4/PD-L1 cosignals in vivo and that selectively targeting CD28 would help to promote remission of autoimmune diseases and control chronic inflammation. Copyright © 2015 by The American Association of Immunologists, Inc.
Why health care corruption needs a new approach.
Radin, Dagmar
2016-07-01
While corruption has been at the center of academic studies and on the agenda of international organizations for a couple of decades, in the health care sector corruption has not generated much interest or progress. At the centre of this issue is the lack of an interdisciplinary approach, which is warranted given the complexity of the issue and the lack of cooperation between STET scientifically rigorous academics and policy-makers, leaving room for more cooperation and progress. © The Author(s) 2015.
Parallel problems: Applying institutional corruption analysis of Congress to big pharma.
Fields, Gregg
2013-01-01
Dennis Thompson and Lawrence Lessig are leading thinkers in the realm of institutional corruption, the notion that inappropriate dependencies and conflicts of interest undercut the ethical foundations of institutions on which society relies. Both are particularly known for their work on institutional corruption as it affects government and politics. This essay examines the applicability of their writing to the private sector, particularly as it relates to vital and influential industries like pharmaceuticals. © 2013 American Society of Law, Medicine & Ethics, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Hsien-Hsin S
The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less
On securing wireless sensor network--novel authentication scheme against DOS attacks.
Raja, K Nirmal; Beno, M Marsaline
2014-10-01
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
14 CFR 35.23 - Propeller control system.
Code of Federal Regulations, 2011 CFR
2011-01-01
... propeller effect under the intended operating conditions. (4) The failure or corruption of data or signals... corruption of airplane-supplied data does not result in hazardous propeller effects. (e) The propeller...
14 CFR 35.23 - Propeller control system.
Code of Federal Regulations, 2010 CFR
2010-01-01
... propeller effect under the intended operating conditions. (4) The failure or corruption of data or signals... corruption of airplane-supplied data does not result in hazardous propeller effects. (e) The propeller...
2011-01-01
Background Corruption pervades educational and other institutions worldwide and medical schools are not exempt. Empirical evidence about levels and types of corruption in medical schools is sparse. We conducted surveys in 2000 and 2007 in the medical school of the Autonomous University of Guerrero in Mexico to document student perceptions and experience of corruption and to support the medical school to take actions to tackle corruption. Methods In both 2000 and 2007 medical students completed a self-administered questionnaire in the classroom without the teacher present. The questionnaire asked about unofficial payments for admission to medical school, for passing an examination and for administrative procedures. We examined factors related to the experience of corruption in multivariate analysis. Focus groups of students discussed the quantitative findings. Results In 2000, 6% of 725 responding students had paid unofficially to obtain entry into the medical school; this proportion fell to 1.6% of the 436 respondents in 2007. In 2000, 15% of students reported having paid a bribe to pass an examination, not significantly different from the 18% who reported this in 2007. In 2007, students were significantly more likely to have bribed a teacher to pass an examination if they were in the fourth year, if they had been subjected to sexual harassment or political pressure, and if they had been in the university for five years or more. Students resented the need to make unofficial payments and suggested tackling the problem by disciplining corrupt teachers. The university administration made several changes to the system of admissions and examinations in the medical school, based on the findings of the 2000 survey. Conclusion The fall in the rate of bribery to enter the medical school was probably the result of the new admissions system instituted after the first survey. Further actions will be necessary to tackle the continuing presence of bribery to pass examinations and for administrative procedures. The social audit helped to draw attention to corruption and to stimulate actions to tackle it. PMID:22376281
Transparency in Nigeria's public pharmaceutical sector: perceptions from policy makers
Garuba, Habibat A; Kohler, Jillian C; Huisman, Anna M
2009-01-01
Background Pharmaceuticals are an integral component of health care systems worldwide, thus, regulatory weaknesses in governance of the pharmaceutical system negatively impact health outcomes especially in developing countries [1]. Nigeria is one of a number of countries whose pharmaceutical system has been impacted by corruption and has struggled to curtail the production and trafficking of substandard drugs. In 2001, the National Agency for Food and Drug Administration and Control (NAFDAC) underwent an organizational restructuring resulting in reforms to reduce counterfeit drugs and better regulate pharmaceuticals [2]. Despite these changes, there is still room for improvement. This study assessed the perceived level of transparency and potential vulnerability to corruption that exists in four essential areas of Nigeria's pharmaceutical sector: registration, procurement, inspection (divided into inspection of ports and of establishments), and distribution. Methods Standardized questionnaires were adapted from the World Health Organization assessment tool and used in semi-structured interviews with key stakeholders in the public and private pharmaceutical system. The responses to the questions were tallied and converted to scores on a numerical scale where lower scores suggested greater vulnerability to corruption and higher scores suggested lower vulnerability. Results The overall score for Nigeria's pharmaceutical system was 7.4 out of 10, indicating a system that is marginally vulnerable to corruption. The weakest links were the areas of drug registration and inspection of ports. Analysis of the qualitative results revealed that the perceived level of corruption did not always match the qualitative evidence. Conclusion Despite the many reported reforms instituted by NAFDAC, the study findings suggest that facets of the pharmaceutical system in Nigeria remain fairly vulnerable to corruption. The most glaring deficiency seems to be the absence of conflict of interest guidelines which, if present and consistently administered, limit the promulgation of corrupt practices. Other major contributing factors are the inconsistency in documentation of procedures, lack of public availability of such documentation, and inadequacies in monitoring and evaluation. What is most critical from this study is the identification of areas that still remain permeable to corruption and, perhaps, where more appropriate checks and balances are needed from the Nigerian government and the international community. PMID:19874613
Transparency in Nigeria's public pharmaceutical sector: perceptions from policy makers.
Garuba, Habibat A; Kohler, Jillian C; Huisman, Anna M
2009-10-29
Pharmaceuticals are an integral component of health care systems worldwide, thus, regulatory weaknesses in governance of the pharmaceutical system negatively impact health outcomes especially in developing countries 1. Nigeria is one of a number of countries whose pharmaceutical system has been impacted by corruption and has struggled to curtail the production and trafficking of substandard drugs. In 2001, the National Agency for Food and Drug Administration and Control (NAFDAC) underwent an organizational restructuring resulting in reforms to reduce counterfeit drugs and better regulate pharmaceuticals 2. Despite these changes, there is still room for improvement. This study assessed the perceived level of transparency and potential vulnerability to corruption that exists in four essential areas of Nigeria's pharmaceutical sector: registration, procurement, inspection (divided into inspection of ports and of establishments), and distribution. Standardized questionnaires were adapted from the World Health Organization assessment tool and used in semi-structured interviews with key stakeholders in the public and private pharmaceutical system. The responses to the questions were tallied and converted to scores on a numerical scale where lower scores suggested greater vulnerability to corruption and higher scores suggested lower vulnerability. The overall score for Nigeria's pharmaceutical system was 7.4 out of 10, indicating a system that is marginally vulnerable to corruption. The weakest links were the areas of drug registration and inspection of ports. Analysis of the qualitative results revealed that the perceived level of corruption did not always match the qualitative evidence. Despite the many reported reforms instituted by NAFDAC, the study findings suggest that facets of the pharmaceutical system in Nigeria remain fairly vulnerable to corruption. The most glaring deficiency seems to be the absence of conflict of interest guidelines which, if present and consistently administered, limit the promulgation of corrupt practices. Other major contributing factors are the inconsistency in documentation of procedures, lack of public availability of such documentation, and inadequacies in monitoring and evaluation. What is most critical from this study is the identification of areas that still remain permeable to corruption and, perhaps, where more appropriate checks and balances are needed from the Nigerian government and the international community.
ERIC Educational Resources Information Center
Bush, Douglas
1972-01-01
While an aroused public applauds the exposure of civic corruption and environmental pollution, neither the public at large nor officialdom has any concern with the corruption and pollution of language except to contribute to it. (Author)
Fair and optimistic quantum contract signing
NASA Astrophysics Data System (ADS)
Paunković, N.; Bouda, J.; Mateus, P.
2011-12-01
We present a fair and optimistic quantum-contract-signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible and scales as N-1/2, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: Its fairness is based on the laws of quantum mechanics. Thus, it is abuse free, and the clients do not have to generate new keys for each message during the exchange phase. We discuss a real-life scenario when measurement errors and qubit-state corruption due to noisy channels and imperfect quantum memories occur and argue that for a real, good-enough measurement apparatus, transmission channels, and quantum memories, our protocol would still be fair. Apart from stable quantum memories, the other segments of our protocol could be implemented by today's technology, as they require in essence the same type of apparatus as the one needed for the Bennett-Brassard 1984 (BB84) cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states [based on the Bennett 1992 (B92) protocol] and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.
Toward blind removal of unwanted sound from orchestrated music
NASA Astrophysics Data System (ADS)
Chang, Soo-Young; Chun, Joohwan
2000-11-01
The problem addressed in this paper is to removing unwanted sounds from music sound. The sound to be removed could be disturbance such as cough. We shall present some preliminary results on this problem using statistical properties of signals. Our approach consists of three steps. We first estimate the fundamental frequencies and partials given noise-corrupted music sound. This gives us the autoregressive (AR) model of the music sound. Then we filter the noise-corrupted sound using the AR parameters. The filtered signal is then subtracted from the original noise-corrupted signal to get the disturbance. Finally, the obtained disturbance is used a reference signal to eliminate the disturbance from the noise- corrupted music signal. Above three steps are carried out in a recursive manner using a sliding window or an infinitely growing window with an appropriate forgetting factor.
Uniform Recovery Bounds for Structured Random Matrices in Corrupted Compressed Sensing
NASA Astrophysics Data System (ADS)
Zhang, Peng; Gan, Lu; Ling, Cong; Sun, Sumei
2018-04-01
We study the problem of recovering an $s$-sparse signal $\\mathbf{x}^{\\star}\\in\\mathbb{C}^n$ from corrupted measurements $\\mathbf{y} = \\mathbf{A}\\mathbf{x}^{\\star}+\\mathbf{z}^{\\star}+\\mathbf{w}$, where $\\mathbf{z}^{\\star}\\in\\mathbb{C}^m$ is a $k$-sparse corruption vector whose nonzero entries may be arbitrarily large and $\\mathbf{w}\\in\\mathbb{C}^m$ is a dense noise with bounded energy. The aim is to exactly and stably recover the sparse signal with tractable optimization programs. In this paper, we prove the uniform recovery guarantee of this problem for two classes of structured sensing matrices. The first class can be expressed as the product of a unit-norm tight frame (UTF), a random diagonal matrix and a bounded columnwise orthonormal matrix (e.g., partial random circulant matrix). When the UTF is bounded (i.e. $\\mu(\\mathbf{U})\\sim1/\\sqrt{m}$), we prove that with high probability, one can recover an $s$-sparse signal exactly and stably by $l_1$ minimization programs even if the measurements are corrupted by a sparse vector, provided $m = \\mathcal{O}(s \\log^2 s \\log^2 n)$ and the sparsity level $k$ of the corruption is a constant fraction of the total number of measurements. The second class considers randomly sub-sampled orthogonal matrix (e.g., random Fourier matrix). We prove the uniform recovery guarantee provided that the corruption is sparse on certain sparsifying domain. Numerous simulation results are also presented to verify and complement the theoretical results.
Opportunities for corruption across Flood Disaster Management (FDM)
NASA Astrophysics Data System (ADS)
Nordin, R. Mohd; Latip, E.; Zawawi, E. M. Ahmad; Ismail, Z.
2018-02-01
Flood is one of the major disasters in the world. Despite flood resulted in loss of life and damaged properties, it naturally imparts people to assist the victims that affected by the disaster. Malaysia has experienced many serious flooding events and proper flood disaster management need to be developed and adopted occasionally. Flood Disaster Management (FDM) seemed to be not working effectively especially during the Kelantan prodigious flood in December 2014. There were negative perceptions among victims and Malaysian citizens regarding the disaster management and government authorities in relation to corrupt practices. The FDM can be divided into four phases (i.e., prevention, preparedness, response and recovery) which undoubtedly corruption is perceived to exists in every phase. The aim of this study is to identify opportunities of corruption across FDM phases. The study presents a case study of Kelantan using the quantitative research approach which utilises questionnaire with government and private agencies. Further to that, this paper proved that opportunities for corruption may occur at every phase, undoubtedly response and recovery phase especially activities involving fund and donation are riskier. The findings are hoped to assist in developing an improved FDM in term of increased transparency.
Korean nuclear industry hit by corruption
NASA Astrophysics Data System (ADS)
Park, Soo Bin
2013-12-01
After a four-month investigation, a court in South Korea has indicted 100 officials and suppliers on corruption charges over bogus safety certifications for parts that were supplied to some of the country's 23 nuclear reactors.
31 CFR 1010.620 - Due diligence programs for private banking accounts.
Code of Federal Regulations, 2011 CFR
2011-07-01
... detect and report transactions that may involve the proceeds of foreign corruption. (2) For purposes of this paragraph (c), the term proceeds of foreign corruption means any asset or property that is...
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Brevard County Sheriff Wayne Ivey take part in the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Remembering Pearl Harbor: The USS Arizona Memorial. Teaching with Historic Places.
ERIC Educational Resources Information Center
Vierra, John, Jr.
This lesson describes and discusses the submerged remains of the battleship USS Arizona which rests on the silt of Pearl Harbor (Hawaii), just as it had settled on December 7, 1941, the day Japan attacked the U.S. fleet and began the Pacific battles of World War II. The lesson is based on the National Register of Historic Places registration file,…
Corruption in emergency procurement.
Schultz, Jessica; Søreide, Tina
2008-12-01
Corruption in emergency procurement reduces the resources available for life-saving operations, lowers the quality of products and services provided, and diverts aid from those who need it most.(1) It also negatively influences public support for humanitarian relief, both in the affected country and abroad. This paper aims to unpack and analyse the following question in order to mitigate risk: how and where does corruption typically occur, and what can be done? Suggested strategies reflect a multi-layered approach that stresses internal agency control mechanisms, conflict-sensitive management, and the need for common systems among operators.
Binary data corruption due to a Brownian agent
NASA Astrophysics Data System (ADS)
Newman, T. J.; Triampo, Wannapong
1999-05-01
We introduce a model of binary data corruption induced by a Brownian agent (active random walker) on a d-dimensional lattice. A continuum formulation allows the exact calculation of several quantities related to the density of corrupted bits ρ, for example, the mean of ρ and the density-density correlation function. Excellent agreement is found with the results from numerical simulations. We also calculate the probability distribution of ρ in d=1, which is found to be log normal, indicating that the system is governed by extreme fluctuations.
The impact of ongoing national terror on the community of hospital nurses in Israel.
Ron, Pnina; Shamai, Michal
2014-04-01
The main goal of this study was to explore the connections between the exposure of nurses in Israel to national terror and the levels of distress experienced due to ongoing terror attacks. The data were collected from 214 nurses from various parts of Israel who work in three types of heath services (mainly hospital departments) and provide help to victims of terror. The nurses reported very high levels of burnout, high levels of stress and medium-to high levels of intrusive memories. Levels of exposure were associated with burnout, intrusive memories and level of stress. More professional attention should be given to hospital nurses who provide care for trauma patients.
Bouchard, Maryse; Kohler, Jillian C; Orbinski, James; Howard, Andrew
2012-05-03
Globally, injuries cause approximately as many deaths per year as HIV/AIDS, tuberculosis and malaria combined, and 90% of injury deaths occur in low- and middle- income countries. Given not all injuries kill, the disability burden, particularly from orthopaedic injuries, is much higher but is poorly measured at present. The orthopaedic services and orthopaedic medical devices needed to manage the injury burden are frequently unavailable in these countries. Corruption is known to be a major barrier to access of health care, but its effects on access to orthopaedic services is still unknown. A qualitative case study of 45 open-ended interviews was conducted to investigate the access to orthopaedic health services and orthopaedic medical devices in Uganda. Participants included orthopaedic surgeons, related healthcare professionals, industry and government representatives, and patients. Participants' experiences in accessing orthopaedic medical devices were explored. Thematic analysis was used to analyze and code the transcripts. Analysis of the interview data identified poor leadership in government and corruption as major barriers to access of orthopaedic care and orthopaedic medical devices. Corruption was perceived to occur at the worker, hospital and government levels in the forms of misappropriation of funds, theft of equipment, resale of drugs and medical devices, fraud and absenteeism. Other barriers elicited included insufficient health infrastructure and human resources, and high costs of orthopaedic equipment and poverty. This study identified perceived corruption as a significant barrier to access of orthopaedic care and orthopaedic medical devices in Uganda. As the burden of injury continues to grow, the need to combat corruption and ensure access to orthopaedic services is imperative. Anti-corruption strategies such as transparency and accountability measures, codes of conduct, whistleblower protection, and higher wages and benefits for workers could be important and initial steps in improving access orthopaedic care and OMDs, and managing the global injury burden.
2012-01-01
Background Globally, injuries cause approximately as many deaths per year as HIV/AIDS, tuberculosis and malaria combined, and 90% of injury deaths occur in low- and middle- income countries. Given not all injuries kill, the disability burden, particularly from orthopaedic injuries, is much higher but is poorly measured at present. The orthopaedic services and orthopaedic medical devices needed to manage the injury burden are frequently unavailable in these countries. Corruption is known to be a major barrier to access of health care, but its effects on access to orthopaedic services is still unknown. Methods A qualitative case study of 45 open-ended interviews was conducted to investigate the access to orthopaedic health services and orthopaedic medical devices in Uganda. Participants included orthopaedic surgeons, related healthcare professionals, industry and government representatives, and patients. Participants’ experiences in accessing orthopaedic medical devices were explored. Thematic analysis was used to analyze and code the transcripts. Results Analysis of the interview data identified poor leadership in government and corruption as major barriers to access of orthopaedic care and orthopaedic medical devices. Corruption was perceived to occur at the worker, hospital and government levels in the forms of misappropriation of funds, theft of equipment, resale of drugs and medical devices, fraud and absenteeism. Other barriers elicited included insufficient health infrastructure and human resources, and high costs of orthopaedic equipment and poverty. Conclusions This study identified perceived corruption as a significant barrier to access of orthopaedic care and orthopaedic medical devices in Uganda. As the burden of injury continues to grow, the need to combat corruption and ensure access to orthopaedic services is imperative. Anti-corruption strategies such as transparency and accountability measures, codes of conduct, whistleblower protection, and higher wages and benefits for workers could be important and initial steps in improving access orthopaedic care and OMDs, and managing the global injury burden. PMID:22554349
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... International Corruption Perceptions Index, available at the following Web site: http://www.transparency.org... at posts with a score of least 5.0 on the Transparency International Corruption Perceptions Index...
Influence of corruption on economic growth rate and foreign investment
NASA Astrophysics Data System (ADS)
Podobnik, Boris; Shao, Jia; Njavro, Djuro; Ivanov, Plamen Ch.; Stanley, H. E.
2008-06-01
We analyze the dependence of the Gross Domestic Product ( GDP) per capita growth rates on changes in the Corruption Perceptions Index ( CPI). For the period 1999 2004 for all countries in the world, we find on average that an increase of CPI by one unit leads to an increase of the annual GDP per capita growth rate by 1.7%. By regressing only the European countries with transition economies, we find that an increase of CPI by one unit generates an increase of the annual GDP per capita growth rate by 2.4%. We also analyze the relation between foreign direct investments received by different countries and CPI, and we find a statistically significant power-law functional dependence between foreign direct investment per capita and the country corruption level measured by the CPI. We introduce a new measure to quantify the relative corruption between countries based on their respective wealth as measured by GDP per capita.
Reconstruction of ECG signals in presence of corruption.
Ganeshapillai, Gartheeban; Liu, Jessica F; Guttag, John
2011-01-01
We present an approach to identifying and reconstructing corrupted regions in a multi-parameter physiological signal. The method, which uses information in correlated signals, is specifically designed to preserve clinically significant aspects of the signals. We use template matching to jointly segment the multi-parameter signal, morphological dissimilarity to estimate the quality of the signal segment, similarity search using features on a database of templates to find the closest match, and time-warping to reconstruct the corrupted segment with the matching template. In experiments carried out on the MIT-BIH Arrhythmia Database, a two-parameter database with many clinically significant arrhythmias, our method improved the classification accuracy of the beat type by more than 7 times on a signal corrupted with white Gaussian noise, and increased the similarity to the original signal, as measured by the normalized residual distance, by more than 2.5 times.
Pop, Cristina A
2016-12-01
This article locates the symbolic construction of "corrupted purity"-as a key assertion in Romanian parents' HPV vaccination refusal narratives-within a multiplicity of entangled rumors concerning reproduction and the state. Romania's unsuccessful HPV vaccination campaign is not unique. However, the shifting discourses around purity and corruption-through which some parents conveyed anxieties about their daughters being targeted for the vaccine-place a particular twist on the Romanian case of resisting the HPV vaccination. Parental discourses took the form of clusters of rumors about state medicine's failure to provide adequate reproductive health care, additive-laden foods, and exposure to radioactive contamination. In these rumors, corruption becomes literally embodied, through ingestion, consumption, contact, or inoculation. Parental discourses about what is being injected into their daughters' pristine bodies express their uncertainty around navigating the unsettled post-socialist medical landscape. © 2016 by the American Anthropological Association.
Rivoiro, Chiara
2016-05-01
In the healthcare sector risk factors for illegal behavior and corruption are peculiar and greater than in other social areas, as it plays a crucial role in the community's economical, political and cultural life. The healthcare services is a complex network that require interaction between may people, constant contacts with the industry, safety and adequate facilities that require regular maintenance, upgrade and replacement of medical technology, connection with local and regional policy makers. This provides the opportunity of being exposed to improper influence. However, illegal behaviors can be prevented: first of all supporting all professionals that everyday work to protect our health with ethics and expertise; then with all instruments that anti-corruption action plans, such as the one introduced in Italy in 2012, aim to identify and target those areas most at risk of corruption phenomena.
Criteria for identifying the molecular basis of the engram (CaMKII, PKMzeta).
Lisman, John
2017-11-29
The engram refers to the molecular changes by which a memory is stored in the brain. Substantial evidence suggests that memory involves learning-dependent changes at synapses, a process termed long-term potentiation (LTP). Thus, understanding the storages process that underlies LTP may provide insight into how the engram is stored. LTP involves induction, maintenance (storage), and expression sub-processes; special tests are required to specifically reveal properties of the storage process. The strongest of these is the Erasure test in which a transiently applied agent that attacks a putative storage molecule may lead to persistent erasure of previously induced LTP/memory. Two major hypotheses have been proposed for LTP/memory storage: the CaMKII and PKM-zeta hypotheses. After discussing the tests that can be used to identify the engram (Necessity test, Saturation/Occlusion test, Erasure test), the status of these hypotheses is evaluated, based on the literature on LTP and memory-guided behavior. Review of the literature indicates that all three tests noted above support the CaMKII hypothesis when done at both the LTP level and at the behavioral level. Taken together, the results strongly suggest that the engram is stored by an LTP process in which CaMKII is a critical memory storage molecule.
NASA Astrophysics Data System (ADS)
Bentes, Sonia R.
2016-02-01
This paper examines the long memory behavior in the volatility of gold returns using daily data for the period 1985-2009. We divided the whole sample into eight sub-samples in order to analyze the robustness and consistency of our results during different crisis periods. This constitutes our main contribution. We cover four major world crises, namely, (i) the US stock market crash of 1987; (ii) the Asian financial crisis of 1997; (iii) the World Trade Center terrorist attack of 2001 and finally, (iv) the sub-prime crisis of 2007, in order to investigate how the fractional integrated parameter of the FIGARCH(1, d,1) model evolves over time. Our findings are twofold: (i) there is evidence of long memory in the conditional variance over the whole sample period; (ii) when we consider the sub-sample analysis, the results show mixed evidence. Thus, for the 1985-2003 period the long memory parameter is positive and statistically significant in the pre-crisis sub-samples, and there is no evidence of long memory in the crisis sub-sample periods; however the reverse pattern occurs for the 2005-2009 period. This highlights the unique characteristics of the 2007 sub-prime crisis.
Davaasambuu, Undarmaa; Saussure, Stéphanie; Christiansen, Inga C.
2018-01-01
Behavioural plasticity can be categorized into activational (also termed contextual) and developmental plasticity. Activational plasticity allows immediate contextual behavioural changes, whereas developmental plasticity is characterized by time-lagged changes based on memory of previous experiences (learning). Behavioural plasticity tends to decline with age but whether this holds true for both plasticity categories and the effects of first-in-life experiences is poorly understood. We tackled this issue by assessing the foraging plasticity of plant-inhabiting predatory mites, Amblyseius swirskii, on thrips and spider mites following age-dependent prey experience, i.e. after hatching or after reaching maturity. Juvenile and young adult predator females were alternately presented thrips and spider mites, for establishing 1st and 2nd prey-in-life experiences, and tested, as gravid females, for their foraging plasticity when offered both prey species. Prey experience by juvenile predators resulted in clear learning effects, which were evident in likelier and earlier attacks on familiar prey, and higher proportional inclusion of familiar prey in total diet. First prey-in-life experience by juvenile but not adult predators resulted in primacy effects regarding attack latency. Prey experience by adult predators resulted mainly in prey-unspecific physiological changes, with easy-to-grasp spider mites providing higher net energy gains than difficult-to-grasp thrips. Prey experience by juvenile, but not adult, predators was adaptive, which was evident in a negative correlation between attack latencies and egg production. Overall, our study provides key evidence that similar experiences by juvenile and adult predators, including first-in-life experiences, may be associated with different types of behavioural plasticity, i.e. developmental and activational plasticity. PMID:29765663
Schausberger, Peter; Davaasambuu, Undarmaa; Saussure, Stéphanie; Christiansen, Inga C
2018-04-01
Behavioural plasticity can be categorized into activational (also termed contextual) and developmental plasticity. Activational plasticity allows immediate contextual behavioural changes, whereas developmental plasticity is characterized by time-lagged changes based on memory of previous experiences (learning). Behavioural plasticity tends to decline with age but whether this holds true for both plasticity categories and the effects of first-in-life experiences is poorly understood. We tackled this issue by assessing the foraging plasticity of plant-inhabiting predatory mites, Amblyseius swirskii , on thrips and spider mites following age-dependent prey experience, i.e. after hatching or after reaching maturity. Juvenile and young adult predator females were alternately presented thrips and spider mites, for establishing 1st and 2nd prey-in-life experiences, and tested, as gravid females, for their foraging plasticity when offered both prey species. Prey experience by juvenile predators resulted in clear learning effects, which were evident in likelier and earlier attacks on familiar prey, and higher proportional inclusion of familiar prey in total diet. First prey-in-life experience by juvenile but not adult predators resulted in primacy effects regarding attack latency. Prey experience by adult predators resulted mainly in prey-unspecific physiological changes, with easy-to-grasp spider mites providing higher net energy gains than difficult-to-grasp thrips. Prey experience by juvenile, but not adult, predators was adaptive, which was evident in a negative correlation between attack latencies and egg production. Overall, our study provides key evidence that similar experiences by juvenile and adult predators, including first-in-life experiences, may be associated with different types of behavioural plasticity, i.e. developmental and activational plasticity.
Auricular Chromotherapy in the Treatment of Psychologic Trauma, Phobias, and Panic Disorder
Asis, Daniel Guillermo; Luz, Fabiola Andrade
2018-01-01
Abstract Auricular chromotherapy has shown promising results in the treatment of psychologic trauma and anxiety disorders, such as phobias and panic attacks. With its relatively easy and quick technical application, this procedure could be an indispensable tool for physicians. However, its mechanism of action is not yet understood completely. Objective: To treat patients suffering from trauma, phobia, and panic attack with auricular chromotherapy. Materials and Methods: The protocol was applied in 160 patients (135 who experienced traumas; 15 patients with specific phobias and 10 patients with panic disorder). They are 134 women, 26 men, ages 20–60. Results: The treatment showed 93% of positive response. Conclusion: This procedure shows the possibility of drawing a path from the external ear to traumatic memories, anxiety disorders and phobias.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Colombia and the extreme level of violence, corruption, and harm such actions cause in the United States... of violence, corruption, and harm in the United States and abroad, the national emergency declared on...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Colombia, and the extreme level of violence, corruption, and harm such actions cause in the United States... level of violence, corruption, and harm in the United States and abroad, the national emergency declared...
NASA Astrophysics Data System (ADS)
Nelson, Kevin; Corbin, George; Blowers, Misty
2014-05-01
Machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algorithm development, data processing, and optimization. Lately, a subset of research has emerged which explores issues related to security. This research is gaining traction as systems employing these methods are being applied to both secure and adversarial environments. One of machine learning's biggest benefits, its data-driven versus logic-driven approach, is also a weakness if the data on which the models rely are corrupted. Adversaries could maliciously influence systems which address drift and data distribution changes using re-training and online learning. Our work is focused on exploring the resilience of various machine learning algorithms to these data-driven attacks. In this paper, we present our initial findings using Monte Carlo simulations, and statistical analysis, to explore the maximal achievable shift to a classification model, as well as the required amount of control over the data.
Interventions to reduce corruption in the health sector
Gaitonde, Rakhal; Oxman, Andrew D; Okebukola, Peter O; Rada, Gabriel
2016-01-01
Background Corruption is the abuse or complicity in abuse, of public or private position, power or authority to benefit oneself, a group, an organisation or others close to oneself; where the benefits may be financial, material or non-material. It is wide-spread in the health sector and represents a major problem. Objectives Our primary objective was to systematically summarise empirical evidence of the effects of strategies to reduce corruption in the health sector. Our secondary objective was to describe the range of strategies that have been tried and to guide future evaluations of promising strategies for which there is insufficient evidence. Search methods We searched 14 electronic databases up to January 2014, including: CENTRAL; MEDLINE; EMBASE; sociological, economic, political and other health databases; Human Resources Abstracts up to November 2010; Euroethics up to August 2015; and PubMed alerts from January 2014 to June 2016. We searched another 23 websites and online databases for grey literature up to August 2015, including the World Bank, the International Monetary Fund, the U4 Anti-Corruption Resource Centre, Transparency International, healthcare anti-fraud association websites and trial registries. We conducted citation searches in Science Citation Index and Google Scholar, and searched PubMed for related articles up to August 2015. We contacted corruption researchers in December 2015, and screened reference lists of articles up to May 2016. Selection criteria For the primary analysis, we included randomised trials, non-randomised trials, interrupted time series studies and controlled before-after studies that evaluated the effects of an intervention to reduce corruption in the health sector. For the secondary analysis, we included case studies that clearly described an intervention to reduce corruption in the health sector, addressed either our primary or secondary objective, and stated the methods that the study authors used to collect and analyse data. Data collection and analysis One review author extracted data from the included studies and a second review author checked the extracted data against the reports of the included studies. We undertook a structured synthesis of the findings. We constructed a results table and 'Summaries of findings' tables. We used the Grading of Recommendations Assessment, Development and Evaluation (GRADE) approach to assess the certainty of the evidence. Main results No studies met the inclusion criteria of the primary analysis. We included nine studies that met the inclusion criteria for the secondary analysis. One study found that a package of interventions coordinated by the US Department of Health and Human Services and Department of Justice recovered a large amount of money and resulted in hundreds of new cases and convictions each year (high certainty of the evidence). Another study from the USA found that establishment of an independent agency to investigate and enforce efforts against overbilling might lead to a small reduction in overbilling, but the certainty of this evidence was very low. A third study from India suggested that the impacts of coordinated efforts to reduce corruption through increased detection and enforcement are dependent on continued political support and that they can be limited by a dysfunctional judicial system (very low certainty of the evidence). One study in South Korea and two in the USA evaluated increased efforts to investigate and punish corruption in clinics and hospitals without establishing an independent agency to coordinate these efforts. It is unclear whether these were effective because the evidence is of very low certainty. One study from Kyrgyzstan suggested that increased transparency and accountability for co-payments together with reduction of incentives for demanding informal payments may reduce informal payments (low certainty of the evidence). One study from Germany suggested that guidelines that prohibit hospital doctors from accepting any form of benefits from the pharmaceutical industry may improve doctors' attitudes about the influence of pharmaceutical companies on their choice of medicines (low certainty of the evidence). A study in the USA, evaluated the effects of introducing a law that required pharmaceutical companies to report the gifts they gave to healthcare workers. Another study in the USA evaluated the effects of a variety of internal control mechanisms used by community health centres to stop corruption. The effects of these strategies is unclear because the evidence was of very low certainty. Authors' conclusions There is a paucity of evidence regarding how best to reduce corruption. Promising interventions include improvements in the detection and punishment of corruption, especially efforts that are coordinated by an independent agency. Other promising interventions include guidelines that prohibit doctors from accepting benefits from the pharmaceutical industry, internal control practices in community health centres, and increased transparency and accountability for co-payments combined with reduced incentives for informal payments. The extent to which increased transparency alone reduces corruption is uncertain. There is a need to monitor and evaluate the impacts of all interventions to reduce corruption, including their potential adverse effects. Interventions to reduce corruption in the health sector What is the aim of this review? The aim of this Cochrane review is to assess the effectiveness of strategies to reduce corruption in the health sector. Cochrane researchers searched for all potentially relevant studies, and found nine studies that met their criteria. Key messages The review suggests that some strategies to fight corruption in the health sector can have an effect on corruption. These strategies include the use of independent agencies to investigate and punish corruption, telling healthcare workers that they are not allowed to accept payments from pharmaceutical companies, ensuring that information about healthcare prices is clear and accessible to the public together with increasing healthcare worker salaries. However, the certainty of this evidence varies. We need more high-quality studies that assess the effects of these and other strategies. What was studied in the review? Corruption can occur in any area of the health sector, and happens when people abuse their own position to benefit themselves, their organisation, or other people close to them. It can take many forms, including bribes, theft, or giving incorrect or inaccurate information deliberately. Healthcare officials, for instance, may steal healthcare funds, hospital administrators may change patient records to increase hospital payments, doctors may accept bribes from pharmaceutical companies in exchange for using their products, and patients may try to bribe hospital staff to avoid treatment queues. Corruption affects the health sector in many ways. It can take money away from healthcare, lead to poorer quality care and make access to healthcare unfair, and often affects poor people the hardest. What are the main results of the review? The review authors included nine relevant studies that used different strategies to stop corruption. • In a study from the USA, efforts to investigate and punish corruption in the health sector were also increased. An independent agency at the national level coordinated these efforts, which led to convictions and the recovery of large amounts of money (high certainty evidence). These efforts may also have led to substantial savings to the government (low certainty evidence). In another study from the USA establishment of an independent agency to investigate and enforce efforts against overbilling was established, but the effects of these efforts are unclear because the evidence was of very low certainty. In India, there were efforts to stop corruption through the appointment of an ombudsman in one state. However, the effect of this strategy is unclear because the evidence was of very low certainty. • In one study in South Korea and two in the USA, efforts to investigate and punish corruption in clinics and hospitals were increased, without establishing an independent agency. However, it is unclear whether these were effective because the evidence is of very low certainty. • In a study in Kyrgyzstan, the government carried out a number of strategies, including giving patients and the public information about how much they should be paying, and increasing healthcare workers' salaries. This study shows that these strategies may have led to fewer patients giving their doctors informal payments (low certainty evidence). • In a study in Germany, hospital doctors were given guidelines telling them that they were not allowed to accept money or gifts from pharmaceutical companies. The study suggests that this may have changed doctors' attitudes about the influence of pharmaceutical companies on their choice of medicines (low certainty evidence). • In one study in the USA, the authorities introduced a law that required pharmaceutical companies to report the gifts they gave to healthcare workers. In another USA-based study, community health centres attempted to stop corruption using a variety of internal control mechanisms. However, the effect of these strategies is unclear because the evidence was of very low certainty. We don't know what the effects of these strategies have on healthcare or people's health, or if these strategies had any harmful effects. This is because the studies only assessed the effects of the strategies on corruption and the use of resources, or because the evidence was of very low certainty. How up to date is this review? The review authors searched for studies that had been published up to 06 June 2016. PMID:27528494
Coward, L Andrew
2010-01-01
A model is described in which the hippocampal system functions as resource manager for the neocortex. This model is developed from an architectural concept for the brain as a whole within which the receptive fields of neocortical columns can gradually expand but with some limited exceptions tend not to contract. The definition process for receptive fields is constrained so that they overlap as little as possible, and change as little as possible, but at least a minimum number of columns detect their fields within every sensory input state. Below this minimum, the receptive fields of some columns are expanded slightly until the minimum level is reached. The columns in which this expansion occurs are selected by a competitive process in the hippocampal system that identifies those in which only a relatively small expansion is required, and sends signals to those columns that trigger the expansion. These expansions in receptive fields are the information record that forms the declarative memory of the input state. Episodic memory activates a set of columns in which receptive fields expanded simultaneously at some point in the past, and the hippocampal system is therefore the appropriate source for information guiding access to such memories. Semantic memory associates columns that are often active (with or without expansions in receptive fields) simultaneously. Initially, the hippocampus can guide access to such memories on the basis of initial information recording, but to avoid corruption of the information needed for ongoing resource management, access control shifts to other parts of the neocortex. The roles of the mammillary bodies, amygdala and anterior thalamic nucleus can be understood as modulating information recording in accordance with various behavioral priorities. During sleep, provisional physical connectivity is created that supports receptive field expansions in the subsequent wake period, but previously created memories are not affected. This model matches a wide range of neuropsychological observation better than alternative hippocampal models. The information mechanisms required by the model are consistent with known brain anatomy and neuron physiology.
Screaming Trees: The Nigerian Deforestation Crisis
2012-11-02
William Ehwarieme, Corruption and Enviromental Degradation in Nigeria and its Niger Delta, Journal of Sustainable Development in Africa, Vol 13, No...Ehwarieme, William. Corruption and Enviromental Degradation in Nigeria and its Niger Delta. Journal of Sustainable Development in Africa (Vol 13, No. 5
Combating corruption in global health.
Mackey, Tim K; Kohler, Jillian; Lewis, Maureen; Vian, Taryn
2017-08-09
Corruption is a critical challenge to global health efforts, and combating it requires international action, advocacy, and research. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-18
... traffickers centered in Colombia and the extreme level of violence, corruption, and harm such actions cause in... an extreme level of violence, corruption, and harm in the United States and abroad. For these reasons...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-19
... extreme level of violence, corruption, and harm such actions cause in the United States and abroad..., corruption, and harm in the United States and abroad, the national emergency declared on October 21, 1995...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... extreme level of violence, corruption, and harm such actions cause in the United States and abroad..., corruption, and harm in the United States and abroad, the national emergency declared on October 21, 1995...
Mutual Predators: An Examination of Russia's Oil, Gas, and Nuclear Sectors in the Post-Soviet Era
NASA Astrophysics Data System (ADS)
Rousselle, Adam
Russia's energy sector has changed dramatically over the past three decades and this study examines this change within the oil, gas, and nuclear sectors. Having inherited a state capitalist system after the fall of the Soviet Union, Russia's bureaucracy now presides over an incredibly rich and deeply problematic energy economy. At its core, this is a study on institutionalized corruption and the behavior of corrupt elites. More specifically, it examines whether Russia can succeed within this context and what this may teach us on the nature of corrupt states and institutions.
Image Corruption Detection in Diffusion Tensor Imaging for Post-Processing and Real-Time Monitoring
Li, Yue; Shea, Steven M.; Lorenz, Christine H.; Jiang, Hangyi; Chou, Ming-Chung; Mori, Susumu
2013-01-01
Due to the high sensitivity of diffusion tensor imaging (DTI) to physiological motion, clinical DTI scans often suffer a significant amount of artifacts. Tensor-fitting-based, post-processing outlier rejection is often used to reduce the influence of motion artifacts. Although it is an effective approach, when there are multiple corrupted data, this method may no longer correctly identify and reject the corrupted data. In this paper, we introduce a new criterion called “corrected Inter-Slice Intensity Discontinuity” (cISID) to detect motion-induced artifacts. We compared the performance of algorithms using cISID and other existing methods with regard to artifact detection. The experimental results show that the integration of cISID into fitting-based methods significantly improves the retrospective detection performance at post-processing analysis. The performance of the cISID criterion, if used alone, was inferior to the fitting-based methods, but cISID could effectively identify severely corrupted images with a rapid calculation time. In the second part of this paper, an outlier rejection scheme was implemented on a scanner for real-time monitoring of image quality and reacquisition of the corrupted data. The real-time monitoring, based on cISID and followed by post-processing, fitting-based outlier rejection, could provide a robust environment for routine DTI studies. PMID:24204551
Cavalieri, Marina; Guccio, Calogero; Rizzo, Ilde
2017-05-01
This paper investigates empirically whether the institutional features of the contracting authority as well as the level of 'environmental' corruption in the area where the work is localised affect the efficient execution of public contracts for healthcare infrastructures. A two-stage Data Envelopment Analysis (DEA) is carried out based on a sample of Italian public contracts for healthcare infrastructures during the period 2000-2005. First, a smoothed bootstrapped DEA estimator is used to assess the relative efficiency in the implementation of each single infrastructure contract. Second, the determinants of the efficiency scores variability are considered, paying special attention to the effect exerted by 'environmental' corruption on different types of contracting authorities. Our results show that the performance of the contracts for healthcare infrastructures is significantly affected by 'environmental' corruption. Furthermore, healthcare contracting authorities are, on average, less efficient and the negative effect of corruption on efficiency is greater for this type of public procurers. The policy recommendation coming out of the study is to rely on 'qualified' contracting authorities since not all the public bodies have the necessary expertise to carry on public contracts for healthcare infrastructures efficiently. Copyright © 2017. Published by Elsevier B.V.
NASA Astrophysics Data System (ADS)
Tinambunan, HSR.; Widodo, H.; Ahmad, GA.
2018-01-01
Revocation of the right to vote and elected in public office for corruption convicted by the court is absolutely necessary, but in view of the limitations amongst them, the judge shall state how long the right is revoked, and provide a detailed reason why the relevant person shall be subject to an additional penalty of revocation, the non-regulation of the criteria of corruption convicts as to which additional crimes of impunity may be imposed and elected in public office in law. The removal of the right to vote and to be elected in public post is coherent with the progressive law conception that promotes the integration of law and the values of justice in society. The progressive step by the judge in the revocation of the right to vote and elected to the corruption convicts is absolutely necessary, with the legal pluralism approach to encourage pro justice and progressive law enforcement. Revision to the Criminal Code and Law no. 31 of 1999, especially regarding the criteria of what corruption convicts who can be sentenced to additional revocation of the right to vote and be elected is a necessity.
The successively temporal error concealment algorithm using error-adaptive block matching principle
NASA Astrophysics Data System (ADS)
Lee, Yu-Hsuan; Wu, Tsai-Hsing; Chen, Chao-Chyun
2014-09-01
Generally, the temporal error concealment (TEC) adopts the blocks around the corrupted block (CB) as the search pattern to find the best-match block in previous frame. Once the CB is recovered, it is referred to as the recovered block (RB). Although RB can be the search pattern to find the best-match block of another CB, RB is not the same as its original block (OB). The error between the RB and its OB limits the performance of TEC. The successively temporal error concealment (STEC) algorithm is proposed to alleviate this error. The STEC procedure consists of tier-1 and tier-2. The tier-1 divides a corrupted macroblock into four corrupted 8 × 8 blocks and generates a recovering order for them. The corrupted 8 × 8 block with the first place of recovering order is recovered in tier-1, and remaining 8 × 8 CBs are recovered in tier-2 along the recovering order. In tier-2, the error-adaptive block matching principle (EA-BMP) is proposed for the RB as the search pattern to recover remaining corrupted 8 × 8 blocks. The proposed STEC outperforms sophisticated TEC algorithms on average PSNR by 0.3 dB on the packet error rate of 20% at least.
Detecting Silent Data Corruption for Extreme-Scale Applications through Data Mining
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bautista-Gomez, Leonardo; Cappello, Franck
Supercomputers allow scientists to study natural phenomena by means of computer simulations. Next-generation machines are expected to have more components and, at the same time, consume several times less energy per operation. These trends are pushing supercomputer construction to the limits of miniaturization and energy-saving strategies. Consequently, the number of soft errors is expected to increase dramatically in the coming years. While mechanisms are in place to correct or at least detect some soft errors, a significant percentage of those errors pass unnoticed by the hardware. Such silent errors are extremely damaging because they can make applications silently produce wrongmore » results. In this work we propose a technique that leverages certain properties of high-performance computing applications in order to detect silent errors at the application level. Our technique detects corruption solely based on the behavior of the application datasets and is completely application-agnostic. We propose multiple corruption detectors, and we couple them to work together in a fashion transparent to the user. We demonstrate that this strategy can detect the majority of the corruptions, while incurring negligible overhead. We show that with the help of these detectors, applications can have up to 80% of coverage against data corruption.« less
Chattopadhyay, Subrata
2013-01-01
Corruption, an undeniable reality in the health sector, is arguably the most serious ethical crisis in medicine today. However, it remains poorly addressed in scholarly journals and by professional associations of physicians and bioethicists. This article provides an overview of the forms and dynamics of corruption in healthcare as well as its implications in health and medicine. Corruption traps millions of people in poverty, perpetuates the existing inequalities in income and health, drains the available resources undermines people's access to healthcare, increases the costs of patient care and, by setting up a vicious cycle, contributes to ill health and suffering. No public health programme can succeed in a setting in which scarce resources are siphoned off, depriving the disadvantaged and poor of essential healthcare. Quality care cannot be provided by a healthcare delivery system in which kickbacks and bribery are a part of life. The medical profession, historically considered a noble one, and the bioethics community cannot evade their moral responsibility in the face of this sordid reality. There is a need to engage in public discussions and take a stand - against unethical and corrupt practices in healthcare and medicine - for the sake of the individual's well-being as well as for social good.
Enabling Secure High-Performance Wireless Ad Hoc Networking
2003-05-29
destinations, consuming energy and available bandwidth. An attacker may similarly create a routing black hole, in which all packets are dropped: by sending...of the vertex cut, for example by forwarding only routing packets and not data packets, such that the nodes waste energy forwarding packets to the...with limited resources, including network bandwidth and the CPU processing capacity, memory, and battery power ( energy ) of each individual node in the
[The Testimony. Contributions to the Construction of Historical Memory].
Roldán, Ismael
2013-06-01
Testimony is a complex act that contributes significantly to the elaboration of mourning, both individually and on a collective level. This is the central idea that is discussed in the text, using as a basis, the results of research conducted as a pilot intervention in the year 2010 for Visible Victims Foundation, and was then replicated in four other regions. In 1998 the National Liberation Army attacked the pipeline OCENSA causing severe damage to the people of Machuca (Segovia, Antioquia). In 2010 the psychologist Ligia Rascovsky implemented an intervention strategy to support the construction of individual and collective memory among survivors of the attack, who, in addition to serious injuries, suffered physical and psychosocial after effects such as post-traumatic stress disorder (PTSD). The results of this work are used to understand the relevance of the testimony in the psychosocial recovery processes, which is a major challenge for Colombian society today. The type of study was psychosocial intervention in 43 adults of both sexes, Machuca residents who were affected by the bombing, and agreed to voluntarily participate in designed workshops. The workshops followed experiential type techniques (psychodrama, psycho-fantasies, etc.), in which the purpose was to identify the damage by developing testimonial memory of what happened. The workshops express the emotions of grief, recognize the injustice of suffering, fight memory defense that justifies violence and raising awareness of human rights. It also facilitated the process of dignity, empowerment and security in personal and collective reconstruction. In expressing their memoirs thus, they could be free from fear and gain more confidence in themselves as individuals and as a social group, as seen in the formation of individual leadership. These results are the basis of the discussion presented. In this context it has been found that the testimonial narrative is an instrument of personal and social healing, as demonstrated in the workshops held with the inhabitants of Machuca, and made with a thousand other people in other locations. The testimony is essential to recognize the dignity and thus reconstruct individual memory from the collective memory. This work provides sufficient testimonial evidence to propose lines of work in the interests of psychosocial policy in order to combine the search for truth and reconstruction of collective memory, along with to the care of victims, and reparation and social reconciliation in Colombia. Copyright © 2013 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.
Ffuzz: Towards full system high coverage fuzz testing on binary executables.
Zhang, Bin; Ye, Jiaxi; Bi, Xing; Feng, Chao; Tang, Chaojing
2018-01-01
Bugs and vulnerabilities in binary executables threaten cyber security. Current discovery methods, like fuzz testing, symbolic execution and manual analysis, both have advantages and disadvantages when exercising the deeper code area in binary executables to find more bugs. In this paper, we designed and implemented a hybrid automatic bug finding tool-Ffuzz-on top of fuzz testing and selective symbolic execution. It targets full system software stack testing including both the user space and kernel space. Combining these two mainstream techniques enables us to achieve higher coverage and avoid getting stuck both in fuzz testing and symbolic execution. We also proposed two key optimizations to improve the efficiency of full system testing. We evaluated the efficiency and effectiveness of our method on real-world binary software and 844 memory corruption vulnerable programs in the Juliet test suite. The results show that Ffuzz can discover software bugs in the full system software stack effectively and efficiently.
Analysis of GPS Data Collected on the Greenland Ice Sheet
NASA Technical Reports Server (NTRS)
Larson, K.; Plumb, J.; Zwally, J.; Abdalati, W.; Koblinsky, Chester J. (Technical Monitor)
2001-01-01
For several years, GPS observations have been made year round at the Swiss Camp, Greenland. The GPS data are recorded for 12 hours every 10-15 days; data are stored in memory and downloaded during the annual field season. Traditional GPS analysis techniques, where the receiver is assumed not to move within a 24 hour period, is not appropriate at the Swiss Camp, where horizontal velocities are on the order of 30 cm/day. Comparison of analysis strategies for these GPS data indicate that a random walk parameterization, with a constraint of 1-2 x 10(exp -7) km/sqrt(sec) minimizes noise due to satellite outages without corrupting the estimated ice velocity. Low elevation angle observations should be included in the analysis in order to increase the number of satellites viewed at each data epoch. Carrier phase ambiguity resolution is important for improving the accuracy of receiver coordinates.
Estimation of color filter array data from JPEG images for improved demosaicking
NASA Astrophysics Data System (ADS)
Feng, Wei; Reeves, Stanley J.
2006-02-01
On-camera demosaicking algorithms are necessarily simple and therefore do not yield the best possible images. However, off-camera demosaicking algorithms face the additional challenge that the data has been compressed and therefore corrupted by quantization noise. We propose a method to estimate the original color filter array (CFA) data from JPEG-compressed images so that more sophisticated (and better) demosaicking schemes can be applied to get higher-quality images. The JPEG image formation process, including simple demosaicking, color space transformation, chrominance channel decimation and DCT, is modeled as a series of matrix operations followed by quantization on the CFA data, which is estimated by least squares. An iterative method is used to conserve memory and speed computation. Our experiments show that the mean square error (MSE) with respect to the original CFA data is reduced significantly using our algorithm, compared to that of unprocessed JPEG and deblocked JPEG data.
Handling target obscuration through Markov chain observations
NASA Astrophysics Data System (ADS)
Kouritzin, Michael A.; Wu, Biao
2008-04-01
Target Obscuration, including foliage or building obscuration of ground targets and landscape or horizon obscuration of airborne targets, plagues many real world filtering problems. In particular, ground moving target identification Doppler radar, mounted on a surveillance aircraft or unattended airborne vehicle, is used to detect motion consistent with targets of interest. However, these targets try to obscure themselves (at least partially) by, for example, traveling along the edge of a forest or around buildings. This has the effect of creating random blockages in the Doppler radar image that move dynamically and somewhat randomly through this image. Herein, we address tracking problems with target obscuration by building memory into the observations, eschewing the usual corrupted, distorted partial measurement assumptions of filtering in favor of dynamic Markov chain assumptions. In particular, we assume the observations are a Markov chain whose transition probabilities depend upon the signal. The state of the observation Markov chain attempts to depict the current obscuration and the Markov chain dynamics are used to handle the evolution of the partially obscured radar image. Modifications of the classical filtering equations that allow observation memory (in the form of a Markov chain) are given. We use particle filters to estimate the position of the moving targets. Moreover, positive proof-of-concept simulations are included.
Robust Working Memory in an Asynchronously Spiking Neural Network Realized with Neuromorphic VLSI.
Giulioni, Massimiliano; Camilleri, Patrick; Mattia, Maurizio; Dante, Vittorio; Braun, Jochen; Del Giudice, Paolo
2011-01-01
We demonstrate bistable attractor dynamics in a spiking neural network implemented with neuromorphic VLSI hardware. The on-chip network consists of three interacting populations (two excitatory, one inhibitory) of leaky integrate-and-fire (LIF) neurons. One excitatory population is distinguished by strong synaptic self-excitation, which sustains meta-stable states of "high" and "low"-firing activity. Depending on the overall excitability, transitions to the "high" state may be evoked by external stimulation, or may occur spontaneously due to random activity fluctuations. In the former case, the "high" state retains a "working memory" of a stimulus until well after its release. In the latter case, "high" states remain stable for seconds, three orders of magnitude longer than the largest time-scale implemented in the circuitry. Evoked and spontaneous transitions form a continuum and may exhibit a wide range of latencies, depending on the strength of external stimulation and of recurrent synaptic excitation. In addition, we investigated "corrupted" "high" states comprising neurons of both excitatory populations. Within a "basin of attraction," the network dynamics "corrects" such states and re-establishes the prototypical "high" state. We conclude that, with effective theoretical guidance, full-fledged attractor dynamics can be realized with comparatively small populations of neuromorphic hardware neurons.
NORMATIVE SCIENCE: A CORRUPTING INFLUENCE IN ECOLOGICAL POLICY?
Is normative science corrupting the proper use of science in evaluating ecological policy options? Science is "normative" when it contains tacit policy values and thus, by extension, supports particular policy preferences. He will use the case study of "ecosystem health" as an ...
Economic Dimensions of Security in Central Asia
2006-01-01
are minimal prospects for gainful employment and entrepreneurship in the formal economy. Corruption Corruption is the use of public office for private...perception among southern elites that former President Akayev’s patronage networks were resulting in their economic disen- franchisement and a widening
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
..., corruption, and harm such actions cause in the United States and abroad. Because the actions of significant... economy of the United States and cause an extreme level of violence, corruption, and harm in the United...
Zafar, Waleed; Siddiqui, Emaduddin; Ejaz, Kiran; Shehzad, Muhammad Umer; Khan, Uzma Rahim; Jamali, Seemin; Razzak, Junaid A.
2015-01-01
Background Workplace violence (WPV) is an important challenge faced by health care personnel in the emergency department (ED). Study Objectives To determine the prevalence and nature of WPV reported by physicians and nurses working in the EDs of four of the largest tertiary care hospitals in Karachi, Pakistan and to understand the mental health impact of experiencing WPV. Methods This cross-sectional survey was conducted between September and November 2008 using a widely used questionnaire developed by the World Health Organization. Overall, 266 (86% response rate) questionnaires were included in this study. Results A total of 44 (16.5%) physicians and nurses said they had been physically attacked, and 193 (72.5%) said that they had experienced verbal abuse in the last 12 months. Among those who reported physical attack, 29.6% reported that the last incident involved a weapon, and in 64% of cases the attacker was a patient’s relative. Eighty-six percent thought that the last attack could have been prevented, and 64% said that no action was taken against the attacker. After adjusting for covariates, physicians were less likely than nurses to report physical attack (odds ratio [OR] 0.46; 95% confidence interval [CI] 0.2–1.0), and personnel with greater work experience (OR 4.8; 95% CI 2.0–11.7) and those who said that there were procedures to report WPV in their workplace (OR 3.2; 95% CI 1.6–6.5) were more likely to report verbal abuse. WPV was associated with mental health effects in the form of bothersome memories, super-alertness, and feelings of avoidance and futility. Conclusion WPV is an important challenge in the EDs of large hospitals in Karachi. A majority of respondents feel that WPV is preventable, but only a minority of attackers face consequences. PMID:24011477
Good governance and corruption in the health sector: lessons from the Karnataka experience.
Huss, R; Green, A; Sudarshan, H; Karpagam, Ss; Ramani, Kv; Tomson, G; Gerein, N
2011-11-01
Strengthening good governance and preventing corruption in health care are universal challenges. The Karnataka Lokayukta (KLA), a public complaints agency in Karnataka state (India), was created in 1986 but played a prominent role controlling systemic corruption only after a change of leadership in 2001 with a new Lokayukta (ombudsman) and Vigilance Director for Health (VDH). This case study of the KLA (2001-06) analysed the:Scope and level of poor governance in the health sector; KLA objectives and its strategy; Factors which affected public health sector governance and the operation of the KLA. We used a participatory and opportunistic evaluation design, examined documents about KLA activities, conducted three site visits, two key informant and 44 semi-structured interviews and used a force field model to analyse the governance findings. The Lokayukta and his VDH were both proactive and economically independent with an extended social network, technical expertise in both jurisdiction and health care, and were widely perceived to be acting for the common good. They mobilized media and the public about governance issues which were affected by factors at the individual, organizational and societal levels. Their investigations revealed systemic corruption within the public health sector at all levels as well as in public/private collaborations and the political and justice systems. However, wider contextual issues limited their effectiveness in intervening. The departure of the Lokayukta, upon completing his term, was due to a lack of continued political support for controlling corruption. Governance in the health sector is affected by positive and negative forces. A key positive factor was the combined social, cultural and symbolic capital of the two leaders which empowered them to challenge corrupt behaviour and promote good governance. Although change was possible, it was precarious and requires continuous political support to be sustained.
An Improved Recovery Algorithm for Decayed AES Key Schedule Images
NASA Astrophysics Data System (ADS)
Tsow, Alex
A practical algorithm that recovers AES key schedules from decayed memory images is presented. Halderman et al. [1] established this recovery capability, dubbed the cold-boot attack, as a serious vulnerability for several widespread software-based encryption packages. Our algorithm recovers AES-128 key schedules tens of millions of times faster than the original proof-of-concept release. In practice, it enables reliable recovery of key schedules at 70% decay, well over twice the decay capacity of previous methods. The algorithm is generalized to AES-256 and is empirically shown to recover 256-bit key schedules that have suffered 65% decay. When solutions are unique, the algorithm efficiently validates this property and outputs the solution for memory images decayed up to 60%.
Glossary of Higher Education Corruption with Explanations
ERIC Educational Resources Information Center
Osipian, Ararat L.
2009-01-01
Higher education corruption is an emerging sub-field of research that has yet to develop its terminological apparatus and own specific research methodologies. The interdisciplinary nature of this sub-field predetermines its dependency on other well-established fields, such as microeconomics, organizational theory, political economy, education…
Bribe and Punishment: An Evolutionary Game-Theoretic Analysis of Bribery.
Verma, Prateek; Sengupta, Supratim
2015-01-01
Harassment bribes, paid by citizens to corrupt officers for services the former are legally entitled to, constitute one of the most widespread forms of corruption in many countries. Nation states have adopted different policies to address this form of corruption. While some countries make both the bribe giver and the bribe taker equally liable for the crime, others impose a larger penalty on corrupt officers. We examine the consequences of asymmetric and symmetric penalties by developing deterministic and stochastic evolutionary game-theoretic models of bribery. We find that the asymmetric penalty scheme can lead to a reduction in incidents of bribery. However, the extent of reduction depends on how the players update their strategies over time. If the interacting members change their strategies with a probability proportional to the payoff of the alternative strategy option, the reduction in incidents of bribery is less pronounced. Our results indicate that changing from a symmetric to an asymmetric penalty scheme may not suffice in achieving significant reductions in incidents of harassment bribery.
Bribe and Punishment: An Evolutionary Game-Theoretic Analysis of Bribery
Verma, Prateek; Sengupta, Supratim
2015-01-01
Harassment bribes, paid by citizens to corrupt officers for services the former are legally entitled to, constitute one of the most widespread forms of corruption in many countries. Nation states have adopted different policies to address this form of corruption. While some countries make both the bribe giver and the bribe taker equally liable for the crime, others impose a larger penalty on corrupt officers. We examine the consequences of asymmetric and symmetric penalties by developing deterministic and stochastic evolutionary game-theoretic models of bribery. We find that the asymmetric penalty scheme can lead to a reduction in incidents of bribery. However, the extent of reduction depends on how the players update their strategies over time. If the interacting members change their strategies with a probability proportional to the payoff of the alternative strategy option, the reduction in incidents of bribery is less pronounced. Our results indicate that changing from a symmetric to an asymmetric penalty scheme may not suffice in achieving significant reductions in incidents of harassment bribery. PMID:26204110
Communication system with adaptive noise suppression
NASA Technical Reports Server (NTRS)
Kozel, David (Inventor); Devault, James A. (Inventor); Birr, Richard B. (Inventor)
2007-01-01
A signal-to-noise ratio dependent adaptive spectral subtraction process eliminates noise from noise-corrupted speech signals. The process first pre-emphasizes the frequency components of the input sound signal which contain the consonant information in human speech. Next, a signal-to-noise ratio is determined and a spectral subtraction proportion adjusted appropriately. After spectral subtraction, low amplitude signals can be squelched. A single microphone is used to obtain both the noise-corrupted speech and the average noise estimate. This is done by determining if the frame of data being sampled is a voiced or unvoiced frame. During unvoiced frames an estimate of the noise is obtained. A running average of the noise is used to approximate the expected value of the noise. Spectral subtraction may be performed on a composite noise-corrupted signal, or upon individual sub-bands of the noise-corrupted signal. Pre-averaging of the input signal's magnitude spectrum over multiple time frames may be performed to reduce musical noise.
Essays on environmental policies, corruption, and energy
NASA Astrophysics Data System (ADS)
Baksi, Soham
This thesis consists of four essays. The first essay looks at pollution taxation under capital mobility, and analyzes the role of pre-commitment by countries to their pollution tax rate. A polluting firm sells its product in two countries, and can locate and produce in a single country or in both countries. Due to the discrete-choice nature of the firm's location problem, the countries' welfare functions are discontinuous in their pollution tax rate. We show that when the countries cannot pre-commit to their pollution tax, the firm can still engender tax competition between them by strategically locating in both the countries. Moreover, pre-commitment pollution taxation may not be welfare improving for the countries, although it always makes the firm better off. The second essay studies the effect of liberalization on corruption. Corruptible inspectors enforce an environmental regulation on firms, and are monitored by an honest regulator. Liberalization not only increases the variety of goods and the marginal utility of accepting a bribe, but also puts pressure on the regulator to curb corruption. The interaction of these two effects can cause corruption to initially increase with liberalization, and then decrease beyond a threshold. Moreover, equilibrium corruption is lower when the regulator is able to pre-commit to her monitoring frequency. The third essay analyzes optimal labeling (information revelation) procedures for hidden attributes of credence goods. Consumers are heterogeneous in their preference for the hidden attribute, and producers can either self-label their products, or have them certified by a third party. The government can impose self or third-party labeling requirements on either the "green" or the "brown" producers. When corrupt producers can affix spurious labels, the government needs to monitor them. A mandatory self-labeling policy is shown to generally dominate mandatory third-party labeling. The fourth essay develops formulas for computing the economy-wide energy intensity decline rate by aggregating sectoral energy efficiency improvements, and sectoral shifts in economic activities. The formulas are used to (i) construct plausible scenarios for the global rate of energy intensity decline, and (ii) show the restraining role of the "electricity generation" sector on the energy intensity decline rate.
Combating healthcare corruption and fraud with improved global health governance
2012-01-01
Corruption is a serious threat to global health outcomes, leading to financial waste and adverse health consequences. Yet, forms of corruption impacting global health are endemic worldwide in public and private sectors, and in developed and resource-poor settings alike. Allegations of misuse of funds and fraud in global health initiatives also threaten future investment. Current domestic and sectorial-level responses are fragmented and have been criticized as ineffective. In order to address this issue, we propose a global health governance framework calling for international recognition of “global health corruption” and development of a treaty protocol to combat this crucial issue. PMID:23088820
Register file soft error recovery
Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.
2013-10-15
Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.
Actors in Corruption: Business Politicians in Italy.
ERIC Educational Resources Information Center
della Porta, Donatella
1996-01-01
Argues that the development of political corruption brings about important changes in the political system and in the characteristics of the political class. Describes the emergence and activities of a group of "business politicians" in Italy who have transformed political parties into socializing agencies for illicit activities. (MJP)
Moreno, M Perla; Moreno, Alberto; García-González, Luis; Ureña, Aurelio; Hernández, César; Del Villar, Fernando
2016-06-01
This study applied an intervention program, based on video feedback and questioning, to expert female volleyball players to improve their tactical knowledge. The sample consisted of eight female attackers (26 ± 2.6 years old) from the Spanish National Volleyball Team, who were divided into an experimental group (n = 4) and a control group (n = 4). The video feedback and questioning program applied in the study was developed over eight reflective sessions and consisted of three phases: viewing of the selected actions, self-analysis and reflection by the attacker, and joint player-coach analysis. The attackers were videotaped in an actual game and four clips (situations) of each of the attackers were chosen for each reflective session. Two of the clips showed a correct action by the attacker, and two showed an incorrect decision. Tactical knowledge was measured by problem representation with a verbal protocol. The members of the experimental group showed adaptations in long-term memory, significantly improving their tactical knowledge. With respect to conceptual content, there was an increase in the total number of conditions verbalized by the players; with respect to conceptual sophistication, there was an increase in the indication of appropriate conditions with two or more details; and finally, with respect to conceptual structure, there was an increase in the use of double or triple conceptual structures. The intervention program, based on video feedback and questioning, in addition to on-court training sessions of expert volleyball players, appears to improve the athletes' tactical knowledge. © The Author(s) 2016.
ERIC Educational Resources Information Center
Liles, Samuel P.
2012-01-01
In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…
Conflict and Conscience: Ideological War and the Albigensian Crusade
2007-06-15
had fallen to the Egyptians twelve years earlier, and the Crusader Kingdom was still unable to regain the Holy City. The newly elected Pope Innocent...for a favorable settlement with the Egyptians . However, instead of proceeding to Egypt, the Venetian fleet coerced the crusaders into attacking the...assassin of Count Raymond murdered the papal legate Peter de Castelnau. With the vivid memory of his visit to Thomas Becket’s tomb firmly in his mind
Stem-Like Memory T Cells Are Discovered | Center for Cancer Research
T cells are the white blood cells that are the body’s first line of attack against foreign invaders. When designing immunotherapies to treat cancer the goal is to prolong the immune response of T cells a bit beyond what the body normally does when a bacterium or a virus is encountered. Nicholas P. Restifo, M.D., working with Luca Gattinoni, M.D., and other colleagues in
Games of corruption in preventing the overuse of common-pool resources.
Lee, Joung-Hun; Jusup, Marko; Iwasa, Yoh
2017-09-07
Maintaining human cooperation in the context of common-pool resource management is extremely important because otherwise we risk overuse and corruption. To analyse the interplay between economic and ecological factors leading to corruption, we couple the resource dynamics and the evolutionary dynamics of strategic decision making into a powerful analytical framework. The traits of this framework are: (i) an arbitrary number of harvesters share the responsibility to sustainably exploit a specific part of an ecosystem, (ii) harvesters face three strategic choices for exploiting the resource, (iii) a delegated enforcement system is available if called upon, (iv) enforcers are either honest or corrupt, and (v) the resource abundance reflects the choice of harvesting strategies. The resulting dynamical system is bistable; depending on the initial conditions, it evolves either to cooperative (sustainable exploitation) or defecting (overexploitation) equilibria. Using the domain of attraction to cooperative equilibria as an indicator of successful management, we find that the more resilient the resource (as implied by a high growth rate), the more likely the dominance of corruption which, in turn, suppresses the cooperative outcome. A qualitatively similar result arises when slow resource dynamics relative to the dynamics of decision making mask the benefit of cooperation. We discuss the implications of these results in the context of managing common-pool resources. Copyright © 2017 Elsevier Ltd. All rights reserved.
Corrupt Language, Corrupt Thought: The White Paper "The Importance of Teaching"
ERIC Educational Resources Information Center
Lumby, Jacky; Muijs, Daniel
2014-01-01
This article deconstructs the language of the 2010 UK Coalition Government's White Paper, "The Importance of Teaching". It uses analytical frameworks related to rhetoric established by Aristotle and Cicero. It explores the mechanisms of language using both critical discourse analysis and content analysis, offering quantitative data on…
The Prince of AALAE. Corruption and Mismanagement in an African NGO.
ERIC Educational Resources Information Center
Thompson, Ekundayo J. D.
In this book, the former coordinator of the Technical Assistance Project of the African Association for Literacy and Adult Education (AALAE) provides an insider's account of the corruption, political management, and organizational mismanagement of the AALAE in 1991-1996. Chapter 1 introduces six myths regarding nongovernmental organizations…
ERIC Educational Resources Information Center
Orr, David W.
2001-01-01
A professor of conservation biology, and champion of the spoken and written word, discusses who is corrupting the English language and why, describing the culprits and suggesting how to remedy the situation (e.g., restore the habit of talking directly to one another; use proper language; hold those who are corrupting the language accountable; and…
Pathology Sections: The Four Chronic Diseases of Academic Corruption
ERIC Educational Resources Information Center
Chinese Education and Society, 2007
2007-01-01
One might say that people bitterly detest "academic corruption" and call it immoral and dishonest academic conduct, and that the deliberate falsification, covert plagiarism, and empty rhetoric employed by certain scholars when expounding their theories and the various means they use when attempting to get their works published and…
Degrees of Integrity: The Threat of Corruption in Higher Education
ERIC Educational Resources Information Center
Chapman, David W.; Lindner, Samira
2016-01-01
Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…
Economics of Corruption in Doctoral Education: The Dissertations Market
ERIC Educational Resources Information Center
Osipian, Ararat L.
2012-01-01
This paper addresses the issue of "dissertations for sale" in Russia. The tasks of this anthropological study include establishing the problem of corruption in doctoral education, identification of the dissertations suppliers, study of the specific services they offer, analysis of their prices on different services, and generalizations…
The Philippine Department of Education: Challenges of Policy Implementation amidst Corruption
ERIC Educational Resources Information Center
Reyes, Vicente Chua
2010-01-01
This inquiry interrogates the experiences of local implementation actors of the Philippine Department of Education as they navigate through reform efforts within systemic corruption. Departing from dominant analytical paradigms centred on patron-client frameworks, the article introduces the typology of complex linkages where local actors play…
Misdeeds in the US Higher Education: Illegality versus Corruption
ERIC Educational Resources Information Center
Osipian, Ararat L.
2008-01-01
Corruption in higher education has long been neglected as an area of research in the US. The processes of decentralization, commoditization, and privatization in higher education rise questions of accountability, transparency, quality, and access. Every nation solves problems of access, quality, and equity differently. Thus, although prosecuting…
Memory for time and place contributes to enhanced confidence in memories for emotional events
Rimmele, Ulrike; Davachi, Lila; Phelps, Elizabeth A.
2012-01-01
Emotion strengthens the subjective sense of remembering. However, these confidently remembered emotional memories have not been found be more accurate for some types of contextual details. We investigated whether the subjective sense of recollecting negative stimuli is coupled with enhanced memory accuracy for three specific types of central contextual details using the remember/know paradigm and confidence ratings. Our results indicate that the subjective sense of remembering is indeed coupled with better recollection of spatial location and temporal context. In contrast, we found a double-dissociation between the subjective sense of remembering and memory accuracy for colored dots placed in the conceptual center of negative and neutral scenes. These findings show that the enhanced subjective recollective experience for negative stimuli reliably indicates objective recollection for spatial location and temporal context, but not for other types of details, whereas for neutral stimuli, the subjective sense of remembering is coupled with all the types of details assessed. Translating this finding to flashbulb memories, we found that, over time, more participants correctly remembered the location where they learned about the terrorist attacks on 9/11 than any other canonical feature. Likewise participants’ confidence was higher in their memory for location vs. other canonical features. These findings indicate that the strong recollective experience of a negative event corresponds to an accurate memory for some kinds of contextual details, but not other kinds. This discrepancy provides further evidence that the subjective sense of remembering negative events is driven by a different mechanism than the subjective sense of remembering neutral events. PMID:22642353
Working memory deficit in patients with restless legs syndrome: an event-related potential study.
Kim, Sung Min; Choi, Jeong Woo; Lee, Chany; Lee, Byeong Uk; Koo, Yong Seo; Kim, Kyung Hwan; Jung, Ki-Young
2014-07-01
The aim of this study was to investigate whether there is a working memory (WM) deficit in restless legs syndrome (RLS) patients, by studying the Sternberg WM task of event-related potential (ERP). Thirteen drug-naive RLS patients and 13 healthy age-matched controls with no sleep disturbances participated in the present study. P300 ERP was recorded during Sternberg WM task using digits as mnemonic items. P300 amplitudes and reaction times were compared between groups (RLS vs. control) considering brain regions (frontal, central, and parietal) and memory load sizes (two, three, and four) as within-subject factors. Clinical and sleep-related variables were correlated with P300 amplitude. The reaction time in RLS patients was significantly longer than controls over all memory load sizes. The P300 amplitude at parietal regions in RLS patients was significantly lower than in controls regardless of memory load sizes, which was significantly negatively correlated with duration of RLS history in RLS patients. Our study suggests that patients with severe RLS have WM deficits. Furthermore, negative correlation of P300 amplitudes with the duration of RLS illness suggests that cerebral cortical dysfunction in RLS patients results from repeated RLS symptom attacks. Copyright © 2014 Elsevier B.V. All rights reserved.
Gronau, Quentin Frederik; Duizer, Monique; Bakker, Marjan; Wagenmakers, Eric-Jan
2017-09-01
Publication bias and questionable research practices have long been known to corrupt the published record. One method to assess the extent of this corruption is to examine the meta-analytic collection of significant p values, the so-called p -curve (Simonsohn, Nelson, & Simmons, 2014a). Inspired by statistical research on false-discovery rates, we propose a Bayesian mixture model analysis of the p -curve. Our mixture model assumes that significant p values arise either from the null-hypothesis H ₀ (when their distribution is uniform) or from the alternative hypothesis H1 (when their distribution is accounted for by a simple parametric model). The mixture model estimates the proportion of significant results that originate from H ₀, but it also estimates the probability that each specific p value originates from H ₀. We apply our model to 2 examples. The first concerns the set of 587 significant p values for all t tests published in the 2007 volumes of Psychonomic Bulletin & Review and the Journal of Experimental Psychology: Learning, Memory, and Cognition; the mixture model reveals that p values higher than about .005 are more likely to stem from H ₀ than from H ₁. The second example concerns 159 significant p values from studies on social priming and 130 from yoked control studies. The results from the yoked controls confirm the findings from the first example, whereas the results from the social priming studies are difficult to interpret because they are sensitive to the prior specification. To maximize accessibility, we provide a web application that allows researchers to apply the mixture model to any set of significant p values. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Interventions to reduce corruption in the health sector.
Gaitonde, Rakhal; Oxman, Andrew D; Okebukola, Peter O; Rada, Gabriel
2016-08-16
Corruption is the abuse or complicity in abuse, of public or private position, power or authority to benefit oneself, a group, an organisation or others close to oneself; where the benefits may be financial, material or non-material. It is wide-spread in the health sector and represents a major problem. Our primary objective was to systematically summarise empirical evidence of the effects of strategies to reduce corruption in the health sector. Our secondary objective was to describe the range of strategies that have been tried and to guide future evaluations of promising strategies for which there is insufficient evidence. We searched 14 electronic databases up to January 2014, including: CENTRAL; MEDLINE; EMBASE; sociological, economic, political and other health databases; Human Resources Abstracts up to November 2010; Euroethics up to August 2015; and PubMed alerts from January 2014 to June 2016. We searched another 23 websites and online databases for grey literature up to August 2015, including the World Bank, the International Monetary Fund, the U4 Anti-Corruption Resource Centre, Transparency International, healthcare anti-fraud association websites and trial registries. We conducted citation searches in Science Citation Index and Google Scholar, and searched PubMed for related articles up to August 2015. We contacted corruption researchers in December 2015, and screened reference lists of articles up to May 2016. For the primary analysis, we included randomised trials, non-randomised trials, interrupted time series studies and controlled before-after studies that evaluated the effects of an intervention to reduce corruption in the health sector. For the secondary analysis, we included case studies that clearly described an intervention to reduce corruption in the health sector, addressed either our primary or secondary objective, and stated the methods that the study authors used to collect and analyse data. One review author extracted data from the included studies and a second review author checked the extracted data against the reports of the included studies. We undertook a structured synthesis of the findings. We constructed a results table and 'Summaries of findings' tables. We used the Grading of Recommendations Assessment, Development and Evaluation (GRADE) approach to assess the certainty of the evidence. No studies met the inclusion criteria of the primary analysis. We included nine studies that met the inclusion criteria for the secondary analysis.One study found that a package of interventions coordinated by the US Department of Health and Human Services and Department of Justice recovered a large amount of money and resulted in hundreds of new cases and convictions each year (high certainty of the evidence). Another study from the USA found that establishment of an independent agency to investigate and enforce efforts against overbilling might lead to a small reduction in overbilling, but the certainty of this evidence was very low. A third study from India suggested that the impacts of coordinated efforts to reduce corruption through increased detection and enforcement are dependent on continued political support and that they can be limited by a dysfunctional judicial system (very low certainty of the evidence).One study in South Korea and two in the USA evaluated increased efforts to investigate and punish corruption in clinics and hospitals without establishing an independent agency to coordinate these efforts. It is unclear whether these were effective because the evidence is of very low certainty.One study from Kyrgyzstan suggested that increased transparency and accountability for co-payments together with reduction of incentives for demanding informal payments may reduce informal payments (low certainty of the evidence).One study from Germany suggested that guidelines that prohibit hospital doctors from accepting any form of benefits from the pharmaceutical industry may improve doctors' attitudes about the influence of pharmaceutical companies on their choice of medicines (low certainty of the evidence).A study in the USA, evaluated the effects of introducing a law that required pharmaceutical companies to report the gifts they gave to healthcare workers. Another study in the USA evaluated the effects of a variety of internal control mechanisms used by community health centres to stop corruption. The effects of these strategies is unclear because the evidence was of very low certainty. There is a paucity of evidence regarding how best to reduce corruption. Promising interventions include improvements in the detection and punishment of corruption, especially efforts that are coordinated by an independent agency. Other promising interventions include guidelines that prohibit doctors from accepting benefits from the pharmaceutical industry, internal control practices in community health centres, and increased transparency and accountability for co-payments combined with reduced incentives for informal payments. The extent to which increased transparency alone reduces corruption is uncertain. There is a need to monitor and evaluate the impacts of all interventions to reduce corruption, including their potential adverse effects.
Working memory and executive functions in transient global amnesia.
Quinette, Peggy; Guillery, Bérengère; Desgranges, Béatrice; de la Sayette, Vincent; Viader, Fausto; Eustache, Francis
2003-09-01
Transient global amnesia (TGA) is usually considered to produce a profound impairment of long-term episodic memory, while at the same time sparing working memory. However, this neuropsychological dissociation has rarely been examined in detail. While a few studies have assessed some components of working memory in TGA, the results that have been obtained are far from conclusive. To clarify this issue, we carried out a comprehensive investigation of working memory in 10 patients during a TGA attack. In the first study, we report the results from three patients examined with a battery of neuropsychological tests designed to assess each of the three subcomponents of Baddeley's model of working memory. In a second study, seven different patients underwent neuropsychological investigations that focused specifically on the central executive system, using a protocol derived from a study by Miyake and colleagues. Our findings showed that subcomponents of working memory, such as the phonological loop and visuo-spatial sketch pad, were spared in TGA patients. Specific executive functions that entailed inhibitory control, dual task performance, updating and shifting mechanisms were also found to be normal. However, we found significantly impaired performance for the Brown-Peterson test, and that TGA patients were significantly impaired in the recollection of their episodic memories. They also made reduced numbers of 'remember' compared with 'know' judgments in the episodic memory test several days after TGA. On the basis of our findings, it would appear that the episodic memory deficit during TGA is not related to elementary aspects of executive functioning. Our data also highlight the nature of the cognitive mechanisms involved in the Brown-Peterson task, which may well depend on long-term memory (such as the process of semantic encoding). Lastly, the selective deficit in recollective episodic memories observed in TGA may be principally related to medial temporal lobe abnormalities that have been reported in this syndrome.
Formula Funding of Schools, Decentralization and Corruption: A Comparative Analysis
ERIC Educational Resources Information Center
Levacic, Rosalind; Downes, Peter
2004-01-01
This study sets out to examine the relationship, if any, between the decentralization of funding for schools and the prevalence of corruption and fraud. It is based upon work carried out in four countries: Australia (the State of Victoria), the United Kingdom (specifically England), Poland (with particular reference to two cities) and Brazil…
Campbell's Law and the Ethics of Immensurability
ERIC Educational Resources Information Center
Sidorkin, Alexander M.
2016-01-01
The paper examines "Campbell's Law": "The more any quantitative social indicator is used for social decision-making, the more subject it will be to corruption pressures and the more apt it will be to distort and corrupt the social processes it is intended to monitor." The examination of measurability leads to explaining the…
2011-12-16
appropriation from other players. These capital games involve the elusive actions of corruption amongst the social and governmental elites . These...actions are either legal or not identified as illegal. They help country elites maintain a financial advantage over foreign competitors. This capital
Balancing Campaign Finance Reform Against the First Amendment. Looking at the Law.
ERIC Educational Resources Information Center
Yang, Elizabeth M.
2000-01-01
Focuses on the rationale for campaign finance reform, preventing corruption or the appearance of corruption in the electoral process, and the need for balancing the constitutional rights protected by the First Amendment. Discusses the issues of disclosure, contribution limits, issue advocacy, and soft money. Includes teaching activities and…
Corruption, Collusion, and Nepotism in Higher Education and the Labor Market in Georgia
ERIC Educational Resources Information Center
Orkodashvili, Mariam
2011-01-01
This article offers a new approach to conceptualizing the limited affordability and access to higher education for socioeconomically disadvantaged students in Georgia. Unlike most traditional views, it associates the issue with corruption, collusion, and nepotism existent in the country's higher education, job market, and banking system. It argues…
Conflicts of interest, institutional corruption, and pharma: an agenda for reform.
Rodwin, Marc A
2012-01-01
When physicians' conflicts of interest arise from ties with drug firms, we should shift our focus to the pharmaceutical industry and improper dependencies that cause institutional corruption. This article analyzes eight forms of improper dependencies on pharma and proposes reforms. © 2012 American Society of Law, Medicine & Ethics, Inc.
The Intrusion of Corruption into Athletics: An Age-Old Problem.
ERIC Educational Resources Information Center
Thompson, James G.
1986-01-01
Offers examples of corruption in athletics in ancient Greece and in the early years of intercollegiate athletics in the U.S. Criticizes the current win-at-all-costs philosophy in intercollegiate programs. Argues that self-sustaining athletics departments are forced into devious practices to win. Recommends increased involvement by university…
Corruption in the System of Higher Education: Problems and Ways to Prevent Them
ERIC Educational Resources Information Center
Gostev, A. N.; Demchenko, T. S.; Borisova, E. A.
2015-01-01
On the basis of an analysis of the literature, social practice, and the results of a concrete sociological survey, the article examines the main problems of education in Russia today, the ways they are conditioned by corruption, and possible solutions. [This article was translated by Kim Braithwaite.
Universities Have the Responsibility to Tackle the World's Toughest Problems
ERIC Educational Resources Information Center
Klitgaard, Robert
2008-01-01
Issues that seem intractable not only dominate our news but paralyze our governments. Corruption. Immigration. Religious and cultural conflict. When such issues are raised, too often we roll our eyes and give up before we begin. Using the example of corruption, the author presents ideas for how colleges and universities can help resolve…
Vouchers, Tests, Loans, Privatization: Will They Help Tackle Corruption in Russian Higher Education?
ERIC Educational Resources Information Center
Osipian, Ararat L.
2009-01-01
Higher education in Russia is currently being reformed. A standardized computer-graded test and educational vouchers were introduced to make higher education more accessible, fund it more effectively, and reduce corruption in admissions to public colleges. The voucher project failed and the test faces furious opposition. This paper considers…
Strict Slaves of Slogans: Response to ''The Social Work Cartel''
ERIC Educational Resources Information Center
Epstein, William M.
2016-01-01
The corruption of the social work enterprise is not simply episodic but systemic and long-standing including education, research, governance, and practice. Reform is unlikely since the constituency within the field and outside of it that wishes to change the situation is small and ineffective. The corruption of social work reflects the unfortunate…
Reactive entitlement in elective public office: a possible precursor to political corruption.
Messner, E
1981-07-01
Observations, by a psychoanalyst who has served as an elected public official, reveal that exposure to conflicting demands from constituents may arouse a sense of depletion. Common reactions are feelings of entitlement and self-indulgent behavior which might include political corruption. Further research and preventive and therapeutic interventions are suggested.
A somatic marker perspective of immoral and corrupt behavior.
Sobhani, Mona; Bechara, Antoine
2011-01-01
Individuals who engage in corrupt and immoral behavior are in some ways similar to individuals with psychopathy. Normal people refrain from engaging in such behaviors because they tie together the moral value of society and the risk of punishment when they violate social rules. What is it, then, that allows these immoral individuals to behave in this manner, and in some situations even to prosper? When there is a dysfunction of somatic markers, specific disadvantageous impairments in decision-making arise, as in moral judgment, but, paradoxically, under some circumstances, the damage can cause the patient to make optimal financial investment decisions. Interestingly, individuals with psychopathy, a personality disorder, share many of the same behavioral characteristics seen in VMPFC and amygdala lesion patients, suggesting that defective somatic markers may serve as a neural framework for explaining immoral and corrupt behaviors. While these sociopathic behaviors of sometimes famous and powerful individuals have long been discussed, primarily within the realm of social science and psychology, here we offer a neurocognitive perspective on the possible neural roots of immoral and corrupt behaviors.
[Pursuing the ethics of integrity in a business context].
Manicardi, Luciano
2015-04-01
Having placed the phenomenon of corruption in the wider context of the current cultural and anthropological crisis and after recalling the ancient roots of the phenomenon, the author proposes an itinerary in six stages that is a sort of a minimal ethics in view of affirming and rooting ethical behaviors and prevent corruption in a business context. The six stages are: professionalism, respect, loyalty, honesty, responsibility, integrity. If corruption is a phenomenon of personal (cor-ruptum) and collective (cum-rumpere) breaking and disruption, which gives birth to duplicity, hidden and not transparent behaviors, integrity, on the contrary, is the attitude of fullness and consistency that manifests and produces the healthy character of the individual and the group. The author discerns in the corruption of the word a basic destructuring element of relational networks and also of relations internal to a business organization. He emphasizes the urgency of the recovery of an ethics of the word that alone enables the creation or reconstitution of trust, which is the necessary foundation for the good performance and livability of interpersonal, social, and corporate relations.
A Somatic Marker Perspective of Immoral and Corrupt Behavior
Sobhani, Mona; Bechara, Antoine
2012-01-01
Individuals who engage in corrupt and immoral behavior are in some ways similar to psychopaths. Normal people refrain from engaging in such behaviors because they tie together the moral value of society and the risk for punishment when they violate social rules. What is it, then, that allows these immoral individuals to behave in this manner, and in some situations to even prosper? When there is a dysfunction of somatic markers, specific disadvantageous impairments in decision-making arise, for example in moral judgment, but paradoxically, under some circumstances, the damage can cause the patient to make optimal financial investment decisions. Interestingly, individuals with psychopathy, a personality disorder, share many of these same behavioral characteristics as those seen in VMPFC and amygdala lesion patients, suggesting that defective somatic markers may serve as a neural framework for explaining immoral and corrupt behaviors. While these sociopathic behaviors of sometimes famous and powerful individuals have long been discussed primarily within the realm of social science and psychology, here we offer a neurocognitive perspective on possible neural roots for immoral and corrupt behaviors. PMID:21919563
Bribery games on inter-dependent regular networks.
Verma, Prateek; Nandi, Anjan K; Sengupta, Supratim
2017-02-16
We examine a scenario of social conflict that is manifest during an interaction between government servants providing a service and citizens who are legally entitled to the service, using evolutionary game-theory in structured populations characterized by an inter-dependent network. Bribe-demands by government servants during such transactions, called harassment bribes, constitute a widespread form of corruption in many countries. We investigate the effect of varying bribe demand made by corrupt officials and the cost of complaining incurred by harassed citizens, on the proliferation of corrupt strategies in the population. We also examine how the connectivity of the various constituent networks affects the spread of corrupt officials in the population. We find that incidents of bribery can be considerably reduced in a network-structured populations compared to mixed populations. Interestingly, we also find that an optimal range for the connectivity of nodes in the citizen's network (signifying the degree of influence a citizen has in affecting the strategy of other citizens in the network) as well as the interaction network aids in the fixation of honest officers. Our results reveal the important role of network structure and connectivity in asymmetric games.
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
NASA Astrophysics Data System (ADS)
Tong, Xiaojun; Wang, Zhu; Yu, Haining
2009-10-01
A hybrid RBF/Elman neural network model that can be employed for both anomaly detection and misuse detection is presented in this paper. The IDSs using the hybrid neural network can detect temporally dispersed and collaborative attacks effectively because of its memory of past events. The RBF network is employed as a real-time pattern classification and the Elman network is employed to restore the memory of past events. The IDSs using the hybrid neural network are evaluated against the intrusion detection evaluation data sponsored by U.S. Defense Advanced Research Projects Agency (DARPA). Experimental results are presented in ROC curves. Experiments show that the IDSs using this hybrid neural network improve the detection rate and decrease the false positive rate effectively.
MELOC - Memory and Location Optimized Caching for Mobile Ad Hoc Networks
2011-01-01
required for such environments. Moreover, nodes located at centre have to be chosen as cache location, since it reduces the chance of being attacked...Figure 1.1. MANET Formed by Armed Forces 47 Example 3: Sharing of music and videos are famous among mobile users. Instead of downloading...The two tier caching scheme discussed in this paper is acoustic . The characteristics of two-tier caching are as follows, the content of data to be
Automated Virtual Machine Introspection for Host-Based Intrusion Detection
2009-03-01
boxes represent the code and data sections of each process in memory with arrows representing hooks planted by malware to jump to the malware code...a useful indication of intrusion, it is also susceptible to mimicry and concurrency attacks [Pro03,Wat07]. Additionally, most research abstracts away...sequence of system calls that accomplishes his or her intent [WS02]. This “ mimicry attack” takes advantage of the fact that many HIDS discard the pa
Detecting Cyber Attacks On Nuclear Power Plants
NASA Astrophysics Data System (ADS)
Rrushi, Julian; Campbell, Roy
This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.
"Consuming Children." Reading the Impacts of Tourism in the City of Banaras
ERIC Educational Resources Information Center
Huberman, Jenny
2005-01-01
What makes corrupt children such efficacious or nodal symbols? How and why is it that certain groups of children take on this signifying function? How do narratives about corrupt children provide people with a way of mediating and articulating more general anxieties about social change or rupture? This article begins to explore these questions by…
24 CFR 982.453 - Owner breach of contract.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) If the owner has committed fraud, bribery or any other corrupt or criminal act in connection with any..., bribery or any other corrupt or criminal act in connection with the mortgage or loan. (5) If the owner has... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Owner breach of contract. 982.453...
School Administrators Strategies for Combating Corruption in Universities in Nigeria
ERIC Educational Resources Information Center
Asiyai, Romina Ifeoma
2015-01-01
The purpose of this study was to examine corruption in universities with the aim of finding out the types/forms, causes, effects and measures for combating the menace. Four research questions guided the investigation. The study is a survey research, ex-post facto in nature. A sample of 780 comprising of students, academic staff and administrative…
Indicators and Implications of Zero Tolerance of Corruption: The Case of Hong Kong
ERIC Educational Resources Information Center
Gong, Ting; Wang, Shiru
2013-01-01
Notwithstanding the voluminous studies of Hong Kong's anticorruption experience and the admiration the ICAC has earned from other governments as a model for "institutional engineering," little is known about how the public in Hong Kong has perceived and responded to corruption. Less clear is what factors beyond a powerful and independent…
The Good, the Bad, and the Ugly: A Bibliographic Essay on the Corrupted Cone
ERIC Educational Resources Information Center
Subramony, Deepak Prem; Molenda, Michael; Betrus, Anthony K.; Thalheimer, Will
2014-01-01
The authors are attempting to set the record straight regarding the sources frequently cited in the literature of the mythical retention chart and the corrupted Dale's Cone. They point out citations that do not actually connect with relevant works; provide correct citations of sources that are often cited erroneously; add references for overlooked…
Higher Education in Transition: From Corruption to Freedom of Information in Post-Soviet Georgia
ERIC Educational Resources Information Center
Rostiashvili, Ketevan
2012-01-01
This article examines higher education reforms in the Republic of Georgia, tracing changes before and after the Rose Revolution. The transformation of this higher education system is one of gradual evolution, moving from a centrally controlled and corrupt system into a more transparent and organized system through a series of reforms, including…