Employee satisfaction and theft: testing climate perceptions as a mediator.
Kulas, John T; McInnerney, Joanne E; DeMuth, Rachel Frautschy; Jadwinski, Victoria
2007-07-01
Employee theft of both property and time is an expensive and pervasive problem for American organizations. One antecedent of theft behaviors is employee dissatisfaction, but not all dissatisfied employees engage in withdrawal or theft behaviors. The authors tested a model of theft behavior by using an organization's climate for theft as an explanatory mechanism. They found that dissatisfaction influenced employee theft behaviors through the intermediary influence of employees' individual perceptions of the organization's climate for theft. The authors encourage organizations to pay attention to such climate elements and take action to alter employee perceptions if they reflect permissive attitudes toward theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B Appendix B to Part 541—Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject...
Medical identity theft: an emerging problem for informatics.
Gillette, William; Patrick, Timothy B
2007-10-11
This poster reports a preliminary review of medical identity theft. Financial identity theft has received a great deal of media attention. Medical identity theft is a particular kind of identity theft that has received little attention. There are two main subtypes of medical identity theft. In the first type the stolen medical identity is used to receive medical services, and in the second type the stolen medical identity is used to commit healthcare fraud.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...
The Relationship between Cell Phone Use and Identity Theft
ERIC Educational Resources Information Center
Saunders, Lewis O.
2014-01-01
The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…
19 CFR 19.3 - Bonded warehouses; alterations; relocation; suspensions; discontinuance.
Code of Federal Regulations, 2010 CFR
2010-04-01
... acts which would constitute a felony, or a misdemeanor involving theft, smuggling, or a theft-connected... theft, smuggling, or a theft-connected crime, resulting from acts committed while a corporate officer...
19 CFR 158.26 - Loss or theft in public stores.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...
27 CFR 555.165 - Failure to report theft or loss.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...
Development of car theft crime index in peninsular Malaysia
NASA Astrophysics Data System (ADS)
Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat
2014-06-01
Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...
19 CFR 19.48 - Suspension or revocation of the privilege of operating a container station; hearings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... committed acts which would constitute a felony, or a misdemeanor involving theft, smuggling, or a theft... theft, smuggling, or a theft-connected crime, resulting from acts committed while a corporate officer...
16 CFR 602.1 - Effective dates.
Code of Federal Regulations, 2011 CFR
2011-01-01
... identification of possible instances of identity theft; (iii) Section 115, concerning truncation of the social... theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of identity theft complaint investigations; (vii) Section 154...
Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.
Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D
2009-05-01
Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...
NASA Astrophysics Data System (ADS)
Steadman, Keva Ullanda
Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.
Identity theft prevention in the healthcare setting.
Warren, Bryan
2005-01-01
How a healthcare security department has undertaken a program to prevent employees, patients, and visitors from becoming victims of Identity Theft as well as providing help for victims of this crime in mitigating their losses. An Identity Theft affidavit for ID theft victims is illustrated.
A Developmental Study of School Theft.
ERIC Educational Resources Information Center
Dodson, Peter K.; Evans, Ellis D.
1985-01-01
Students (N=200) in grades 4 through 8 and 10 completed questionnaire measuring perceptions of school theft incidence and seriousness, personal responsibility for correcting theft, causal attributions of theft, and perceived consequences of thievery. Main grade effect was observed for personal responsibility and consequences, but represented…
19 CFR 146.53 - Shortages and overages.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., as such, of any: (1) Theft or suspected theft of merchandise; (2) Merchandise not properly admitted.... Except in a case of theft or suspected theft, the operator need not file a report with the port director... otherwise secure damaged merchandise to preserve its identity as damaged merchandise. ...
19 CFR 146.53 - Shortages and overages.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., as such, of any: (1) Theft or suspected theft of merchandise; (2) Merchandise not properly admitted.... Except in a case of theft or suspected theft, the operator need not file a report with the port director... otherwise secure damaged merchandise to preserve its identity as damaged merchandise. ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... coverage means the indemnification of motor vehicle owners by an insurer against losses due to fire, theft... that issue motor vehicle insurance policies, vehicle theft means an actual physical removal of a motor... lease and not covered by theft insurance policies issued by insurers of motor vehicles, “vehicle theft...
75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This petition is... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has...
75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-27
... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of... assemblies in motor vehicles related to performance. Volkswagen stated that it believes the immobilizer... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED...) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity... soundness of the financial institution or creditor from identity theft, including financial, operational...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and...
12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...
12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...
12 CFR 391.22 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 391.22 Section 391.22 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... Reporting § 391.22 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope... identity theft, including financial, operational, compliance, reputation, or litigation risks. (4) Credit...
76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-02
... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... of motor vehicles. E-mail is now included as a means to submit the target area designations. Under the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...
Seduction and Betrayal: An Insider's View of Insider Theft of Rare Materials.
ERIC Educational Resources Information Center
Traister, Daniel
1994-01-01
Discusses alternatives for dealing with insider theft of rare library materials, including publicizing losses and prosecuting. An example of insider theft is detailed. Ideas for preventing theft, including hiring practices and restricting access to materials, are considered. Suggestions for thinking through procedures to deal with the…
14 CFR 1214.609 - Loss or theft.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...
76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-13
... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...
26 CFR 1.165-8 - Theft losses.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...
Identity theft and your practice.
Asbell, Lisa
2010-01-01
Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.
27 CFR 24.265 - Losses by theft.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...
The Use of Electronic Book Theft Detection Systems in Libraries.
ERIC Educational Resources Information Center
Witt, Thomas B.
1996-01-01
Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…
78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 171.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 171.90 Section 171.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 171.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 334.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 334.90 Section 334.90 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
17 CFR 248.201 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., prevention, and mitigation of identity theft. 248.201 Section 248.201 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S-ID Regulation S-ID: Identity Theft Red Flags § 248.201 Duties regarding the detection, prevention, and mitigation of identity theft...
12 CFR 222.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 222.90 Section 222.90 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Identity Theft Red Flags § 222.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope...
17 CFR 162.30 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., prevention, and mitigation of identity theft. 162.30 Section 162.30 Commodity and Securities Exchanges... REPORTING ACT Identity Theft Red Flags § 162.30 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope of this subpart. This section applies to financial institutions or...
12 CFR 571.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 571.90 Section 571.90 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 571.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
12 CFR 717.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 717.90 Section 717.90 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a...
16 CFR 681.1 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., and mitigation of identity theft. 681.1 Section 681.1 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES § 681.1 Duties regarding the detection, prevention, and mitigation of identity theft. Link to an amendment published at 77 FR 72715, Dec. 6, 2012. (a...
Motor Vehicle Theft. Special Report.
ERIC Educational Resources Information Center
Harlow, Caroline Wolf
Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…
Barker, Edward D.; Tremblay, Richard E.; van Lier, Pol A.C.; Vitaro, Frank; Nagin, Daniel S.; Assaad, Jean-Marc; Séguin, Jean R.
2012-01-01
There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. PMID:21046606
Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R
2011-01-01
There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.
Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik
2017-09-01
We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.
7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...
19 CFR 112.46 - Report of loss or theft.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...
77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...
27 CFR 478.39a - Reporting theft or loss of firearms.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... Administrative and Miscellaneous Provisions § 478.39a Reporting theft or loss of firearms. Each licensee shall report the theft or loss of a firearm from the licensee's inventory (including any firearm which has been...
27 CFR 555.30 - Reporting theft or loss of explosive materials.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...
7 CFR 3015.170 - Damage, loss, or theft of equipment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
12 CFR 41.90 - Duties regarding the detection, prevention, and mitigation of identity theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... mitigation of identity theft. 41.90 Section 41.90 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FAIR CREDIT REPORTING Identity Theft Red Flags § 41.90 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to a financial institution or...
Theft of information in the take-grant protection model
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
Using the information transfer extensions to the Take-Grant Protection Model, the concept of theft of information is defined and necessary and sufficient conditions for such theft to occur are presented, as well as bounds on the number of actors involved in such theft. Finally, the application of these results to reference monitors are explored.
Code of Federal Regulations, 2010 CFR
2010-10-01
... insurers to report to the National Highway Traffic Safety Administration information about motor vehicle thefts and recoveries, the effects of the Federal motor vehicle theft prevention standard on those thefts...
Code of Federal Regulations, 2010 CFR
2010-10-01
... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...
19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...
19 CFR 122.185 - Report of loss or theft of Customs access seal.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...
19 CFR 122.185 - Report of loss or theft of Customs access seal.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft of Customs access seal... Report of loss or theft of Customs access seal. The loss or theft of an approved Customs access seal must be promptly reported in writing by the employee to the port director. The Customs access seal may be...
Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft
ERIC Educational Resources Information Center
Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry
2011-01-01
The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2010 CFR
2010-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2011 CFR
2011-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2012 CFR
2012-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2013 CFR
2013-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
7 CFR 331.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2014 CFR
2014-01-01
... notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must... report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must notify APHIS or CDC immediately upon discovery of a release of a select...
Unlocking the condoms: The effect on sales and theft.
Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary
2011-01-01
Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.4 Definitions. (a... same make. (4) 1990/91 median theft rate means 3.5826 thefts per thousand vehicles produced. (5...
Carter, Ned; Holmström, Anne; Simpanen, Monica; Melin, Lennart
1988-01-01
Shoplifting and employee theft constitute a major problem for retailers. Previous research has described techniques for effectively reducing either type of theft but has not addressed the problem of thefts of unspecified origin. In a grocery store we evaluated the effect of identifying for employees frequently stolen products from three groups of items and graphing, twice weekly in the lunchroom, losses for the separate groups. After the products were identified and losses graphed, thefts from the three groups dropped from eight per day to two per day. PMID:16795718
Sweet sins: frequency and psychiatric motivation for theft among adolescents with type 1 diabetes.
Butwicka, Agnieszka; Fendler, Wojciech M; Zalepa, Adam; Szadkowska, Agnieszka; Gmitrowicz, Agnieszka; Młynarski, Wojciech M
2011-06-01
Behavioral problems are an issue among adolescents with type 1 diabetes (T1D). The authors hypothesize that theft, possibly because of an underlying psychiatric morbidity, may be a way of procuring sweets leading to worse glycemic control. To evaluate psychiatric morbidity and the association of theft and metabolic control among children and adolescents with T1D, using data from an interim analysis of an ongoing quality-of-life and psychiatric comorbidity study. One hundred and nine consecutively hospitalized individuals aged 8-18 years with T1D were asked about incidents of theft. The data on psychiatric morbidity were taken from an ongoing longitudinal study using semi-structured diagnostic interview (KSADS-PL). Overall, 10 children (9%) reported that they had committed theft. Primary motivation for theft was reported as either direct or indirect gain of sweets. Patients who admitted to theft were more likely to have worse metabolic control expressed by glycated hemoglobin (HbA1c) [10.4% (interquartile range 9.8-11.8) vs. 7.7% (6.9-8.8); p < 0.0001] and higher odds of having psychiatric morbidity (odds ratio 8.2; 95% confidence interval 1.9-34.2) than their peers. In the subgroup analysis of patients with psychiatric morbidity, HbA1c was significantly higher if having committed a theft was reported [10.2% (9.4-11.9) vs. 8.1% (7.2-9.2); p < 0.001]. No significant differences in socioeconomic status, clinical factors, or rates of complications were found. Theft may be a factor negatively affecting metabolic control in children with T1D and underlying psychiatric co-morbidity. Psychiatric morbidity is more frequent among patients with T1D and a history of theft. © 2011 John Wiley & Sons A/S.
Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study
Setti, Ilaria; van der Velden, Peter G.; Sommovigo, Valentina; Ferretti, Maria S.; Giorgi, Gabriele; O'Shea, Deirdre; Argentero, Piergiorgio
2018-01-01
Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV), psycho-somatic well-being (General Health Questionnaire, GHQ-12), job satisfaction (a single item). Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6) and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7), based on the last event (N = 319). Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being. PMID:29515488
Dog Theft: A Case for Tougher Sentencing Legislation.
Harris, Lauren K
2018-05-22
Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.
The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.
Alavi, Hamid Reza
2011-01-01
Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.
The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution
Alavi, Hamid Reza
2011-01-01
Background Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals’ tendency to addiction, theft and prostitution in Kerman city, Iran. Methods The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents’ self-esteem was Eysenck Self-esteem Inventory. Findings Self-esteem had a meaningful role in the individual’s tendency to addiction, theft and prostitution. Conclusion On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual’s self-esteem in order to decrease their tendency to addiction, theft and prostitution. PMID:24494126
Tricks of the trade: Mechanism of brood theft in an ant.
Paul, Bishwarup; Annagiri, Sumana
2018-01-01
Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.
Unlocking the condoms: The effect on sales and theft
Ashwood, Daniel; Farris, Karen B.; Campo, Shelly; Aquilino, Mary L.; Losch, Mary
2010-01-01
Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Objective Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies Methods Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Results Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. Conclusion After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies. PMID:25132889
Exploring the psychological and somatic impact of identity theft.
Sharp, Tracy; Shreve-Neiger, Andrea; Fremouw, William; Kane, John; Hutton, Shawn
2004-01-01
Identity theft is a new and growing form of white-collar crime. This exploratory study examined the psychological and somatic impact of identity theft and coping methods utilized by victims. Thirty-seven victims of identity theft participated in regional victim focus groups. Participants completed a victim impact questionnaire designed by the authors and the Brief Symptom Inventory-18 (BSI-18). The majority of participants expressed an increase in maladaptive psychological and somatic symptoms post victimization. Results on the BSI indicated that identity theft victims with unresolved cases, in contrast to those with resolved cases, were more likely to have clinically elevated scores when compared with a normative sample. Relatively similar coping mechanisms were utilized across victims. The results from this study suggest that victims of identity theft do have increased psychological and physical distress, and for those whose cases remain unresolved, distress is maintained over time.
Is your practice at risk for medical identity theft?
Weinstock, Donna
2014-01-01
Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.
Design of power cable grounding wire anti-theft monitoring system
NASA Astrophysics Data System (ADS)
An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang
2018-01-01
In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.
Identity Theft in Community Mental Health Patients
Klopp, Jonathon; Konrad, Shane; Yanofski, Jason
2007-01-01
Identity theft is a serious problem in the United States, and persons with enduring mental illnesses may be particularly vulnerable to becoming victims of this crime. Victims of identity theft experience a variety of consequences that include financial loss and serious emotional distress. Little is known about the impact of identity theft on individuals with mental illnesses. The two cases from a community mental health center presented in this article demonstrate many of the facets that may be associated with an increased risk for becoming the victim of identity theft. A summary of preventive steps as well as steps involved in resolving the crime once one has become a victim are presented. PMID:20806029
Getting ready for identity theft rules: creating a prevention program for your medical practice.
Cascardo, Debra
2009-01-01
Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.
Tricks of the trade: Mechanism of brood theft in an ant
Paul, Bishwarup
2018-01-01
Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies’ vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the ‘tricks’ adopted by thieves. PMID:29489858
Shigenobu, Kazue; Ikeda, Manabu; Fukuhara, Ryuji; Maki, Naruhiko; Hokoishi, Kazuhiko; Nebu, Akihiko; Komori, Kenjiro; Tanabe, Hirotaka
2002-03-01
Delusions of theft (delusions involving the theft of possessions) are one of the most frequent neuropsychiatric manifestations of Alzheimer's disease (AD). The current study investigated the presence and extent of such delusions before and after drug treatment in a group of AD patients, and the consequent effects on the burden of care on caregivers. The study was an open-label cohort design. The delusions studied consisted only of those involving theft of possessions. Sixteen AD patients served as subjects in order to assess the efficacy of Risperidone administration, in the reduction or elimination of these delusions. The caregiver burden was evaluated using the Zarit Caregiver Burden Interview (ZBI) before the administration of Risperidone and 12 weeks after administration, for cases where delusions of theft were eliminated or reduced. The burden of care on caregivers was significantly reduced (p < 0.001) through the elimination or reduction of delusions of theft. Delusions of theft are considered to be a major factor in increasing the burden of care, and the treatment of these, through appropriate drug therapy, is therefore of great importance in the continuation of satisfactory care in the home. Copyright 2002 John Wiley & Sons, Ltd.
Media coverage of controlled substance diversion through theft or loss.
Brushwood, David B; Kimberlin, Carole A
2004-01-01
To determine the frequency of media reports of controlled substance diversion. Quantitative search of news articles from LexisNexis Academic, using search strings related to four different types of controlled substance diversion. Not applicable. Not applicable. Number of media reports about diversion of controlled substances at the prescriber or dispenser levels, through pharmacy robberies or thefts, and through hijackings or robberies of shipments. Media reports of controlled substance diversion indicate that theft and loss are important problems and that inappropriate prescribing and dispensing are substantial problems as well. Leaks of controlled substances from the closed system of distribution seem to be increasing as rapidly through theft and loss as through inappropriate prescribing and dispensing. During the five biennia between 1993 and 2002, these percentage increases in media reports were observed for the different types of diversion: 200% for prescribers; 350% for dispensers; 133% for pharmacy robberies and thefts; and 1,800% for thefts from shipping channels. A balanced approach to the prevention of controlled substance diversion, aimed at reducing illicit acquisition of drugs from theft and loss as well as from prescribing and dispensing, may produce the greatest success without adversely affecting the quality of patient care.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.2 Purpose. The purpose of... passenger motor vehicles to obtain an exemption from the parts-marking requirements of the vehicle theft... motor vehicle theft as compliance with the parts-marking requirements. This part also provides the...
12 CFR 222.1 - Purpose, scope, and effective dates.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Section 114, concerning procedures for the identification of possible instances of identity theft; (iii...)(1), concerning the summary of rights of identity theft victims; (v) Section 152, concerning blocking of information resulting from identity theft; (vi) Section 153, concerning the coordination of...
SMR forum: Too many hands in the corporate cookie jar.
Bullard, P D; Resnik, A J
1983-01-01
Theft by employees costs American businesses and their customers many billions of dollars each year. Despite concerted efforts to reduce the problem, it appears to continue to grow. Most of these efforts concentrate on limiting the opportunity to steal. However, because the motivations for theft are varied, preventing it often requires more than tighter security. In this paper, the authors explore the extent of the problem, its causes, motivations behind employee theft, and some cost-effective ways of reducing the incidence of theft.
Reyns, Bradford W; Henson, Billy
2016-08-01
Available evidence suggests that identity theft is a growing problem that has significant consequences for victims, not the least of which is billions of dollars in financial losses. However, very little is known about the correlates or causes of identity theft victimization. Utilizing a nationally representative sample of individuals from the Canadian General Social Survey, the current study attempts to address this deficiency by examining the link between victims' online routine activities and their online identity theft victimization. It was found that certain routine activities directly influence the likelihood of experiencing identity theft. Potential research and policy implications also are discussed. © The Author(s) 2015.
7 CFR 3015.170 - Damage, loss, or theft of equipment.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., and (ii) The damage, loss, or theft is not due to an act of God. (2) Equipment replaced. If the... § 3015.169(c) or (ii) The damage, loss, or theft is due to an act of God. (2) Recipient not compensated...
49 CFR 543.9 - Terminating or modifying an exemption.
Code of Federal Regulations, 2010 CFR
2010-10-01
... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION... compliance with the parts-marking requirements of part 541 in reducing and deterring motor vehicle theft... exemption has not been as effective as parts-marking in reducing and deterring motor vehicle theft. (2...
On the Statistical Dependency of Identity Theft on Demographics
NASA Astrophysics Data System (ADS)
di Crescenzo, Giovanni
An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.2 Definitions. For the purposes of this part: (a) The Act or the MVTPA means the Motor Vehicle Theft Prevention Act. (b) Owner... used automobile dealerships. (c) The Program refers to the National Voluntary Motor Vehicle Theft...
75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety... accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...
Code of Federal Regulations, 2010 CFR
2010-10-01
... theft prevention standard. Criteria 1. Retail price of the vehicle line. 2. Vehicle image or marketing strategy. 3. Vehicle lines with which the new line is intended to compete, and the theft rates of such...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention...
Children's Stealing: A Review of Theft-Control Procedures for Parents and Teachers.
ERIC Educational Resources Information Center
Williams, Ruth Lyn Meese
1985-01-01
Guidelines are offered to parents and teachers for dealing with "normal" and aberrant theft while maintaining respect for the child's right to privacy. It is noted that theft is resistant to traditional intervention; however, successful behavioral interventions have been devised. (Author/CL)
75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... and unlock all doors or to unlock only the driver's door, preventing forced entry into the vehicle... From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
...] Agency Information Collection Activities: Proposed Collection; Comments Requested: Report of Theft or... currently approved collection. (2) Title of the Form/Collection: Report of Theft or Loss of Explosives. (3... for-profit. Other: None. Need for Collection Losses or theft of explosives must, by statute be...
75 FR 18885 - Agency Information Collection Activities: Proposed Collection; Comments Requested
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
... of information collection under review: Interstate firearms shipment report of theft/loss. The...: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and the applicable... is part of a voluntary program in which the common carrier and/or shipper report losses or thefts of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-26
... Licensee Firearms Inventory Theft/ Loss Report ACTION: 60-Day Notice of Information Collection Under Review... the Form/Collection: Federal Firearms Licensee Firearms Inventory Theft/Loss Report. (3) Agency form..., Tobacco, Firearms and Explosives and to the appropriate local authorities any theft or loss of a firearm...
75 FR 6706 - Agency Information Collection Activities: Proposed Collection; Comments Requested
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-10
... of Information Collection Under Review: Interstate Firearms Shipment Report of Theft/Loss. The...: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and the applicable... a voluntary program in which the common carrier and/or shipper report losses or thefts of firearms...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... Licensee Firearms Inventory Theft/ Loss Report ACTION: 30-Day Notice of Information Collection Under Review... approved collection. (2) Title of the Form/Collection: Federal Firearms Licensee Firearms Inventory Theft... authorities any theft or loss of a firearm from the licensee's inventory or collection within a specific time...
43 CFR 423.25 - Vandalism, tampering, and theft.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-23
...] Agency Information Collection Activities: Proposed Collection; Comments Requested; Report of Theft or... of Theft or Loss of Explosives. (3) Agency form number, if any, and the applicable component of the... abstract: Primary: Business or other for-profit. Other: None. Need for Collection Losses or theft of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Administration DEPARTMENT OF JUSTICE MOTOR VEHICLE THEFT PREVENTION ACT REGULATIONS § 29.1 Purpose. (a) The purpose of this part is to implement the Motor Vehicle Theft Prevention Act, 42 U.S.C. 14171, which... vehicle theft prevention program. The program will be implemented by states and localities, at their sole...
31 CFR 306.113 - Cases not requiring bonds of indemnity.
Code of Federal Regulations, 2011 CFR
2011-07-01
... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306... relief for the loss, theft, destruction, mutilation, or defacement of registered securities in any of the...: (a) If the loss, theft, destruction, mutilation, or defacement, as the case may be, occurred while...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Approved Collection for Which Approval Has Expired, Identity Theft Supplement (ITS) to the National Crime... Form/Collection: Identity Theft Supplement (ITS) to the National Crime Victimization Survey. (3) Agency... administered to persons 16 years or older in NCVS sampled households in the United States. The Identity Theft...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... Approved Collection for Which Approval Has Expired, Identity Theft Supplement (ITS) to the National Crime... approved collection for which approval has expired. (2) Title of the Form/Collection: Identity Theft... United States. The Identity Theft Supplement (ITS) to the National Crime Victimization Survey collects...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... Subject to the Federal Motor Vehicle Safety, Bumper, and Theft Prevention Standards. OMB Number: 2127-0002... Federal motor vehicle safety, bumper, and theft prevention standards administered by NHTSA. The... vehicles and motor vehicle equipment subject to the Federal motor vehicle safety, bumper, and theft...
49 CFR 567.4 - Requirements for manufacturers of motor vehicles.
Code of Federal Regulations, 2010 CFR
2010-10-01
... applicable Federal motor vehicle safety, bumper, and theft prevention standards in effect on the date of... statement: “This vehicle conforms to all applicable Federal motor vehicle safety and theft prevention... conforms to the applicable Federal motor vehicle theft prevention standard in effect on the date of...
78 FR 12623 - Insurer Reporting Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-25
... NHTSA's regulation requiring motor vehicle insurers to submit information on the number of thefts and recoveries of insured vehicles and actions taken by the insurer to deter or reduce motor vehicle theft. NHTSA..., which requires insurers to submit information about the make, model, and year of all vehicle thefts, the...
78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... immobilizer device occurs automatically when the vehicle is started without any further action by the driver... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention...
Identity Theft: Trends and Issues
2010-01-05
mitigate the effects of identity theft, one option Congress may consider is whether to strengthen data breach notification requirements. Such requirements...identity theft complaints to the FTC as well as in the number of reported data breaches placing personally identifiable information at risk. This report...23 Effects of Data Breaches ..................................................................................................... 24
Worst theft losses are for Mercedes model; 2 of 3 worst are for acura
DOT National Transportation Integrated Search
2000-05-13
The Highway Loss Data Institute's annual list of vehicles with worst theft losses has Mercedes S class heading the list of passenger vehicles with the highest insurance losses for theft. Overall losses for this car are 10 times higher than the averag...
The Technical Problems of Anti-theft Diagnostics in a Traction Network
NASA Astrophysics Data System (ADS)
Mikulski, Jerzy; Młynczak, Jakub
2012-02-01
The paper presents an analysis of traction lines theft in the Katowice division of the Railroad Development Company (Zakład Linii Kolejowych - ZLK) as well as the principles for the anti-theft protection system, currently in development. The problem of theft is a very important issue concerning the safety of rail transportation. It is also a significant economic problem, as the cost of recreating a stolen network is very high. Moreover, the Administrator of the infrastructure bears the cost of compensation for any delays in train schedules.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
...This document grants in full the Hyundai-Kia Motors Corporation (HATCI) petition for exemption of the Hyundai VI vehicle line in accordance with 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that the antitheft device to be placed on the line as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard.
Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas
2014-06-01
Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.
Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti
2013-06-01
In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-18
... Shipment Report of Theft/Loss ACTION: 30-Day Notice. The Department of Justice (DOJ), Bureau of Alcohol... Form/Collection: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and... report losses or thefts of firearms from interstate shipments. ATF uses this information to ensure that...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-24
... Collection Activities: Proposed Collection; Comments Requested: Report of Theft or Loss of Controlled...: Extension of a currently approved collection. (2) Title of the Form/Collection: Report of Theft or Loss of... complete and submit DEA-106 upon discovery of a theft or significant loss of controlled substances. This...
31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-23
... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of...) Title of the Form/Collection: Reports of Suspicious Orders or Theft/Loss of Listed Chemicals/Machines... collection: Form number: Notification of suspicious orders and thefts is provided in writing on an as needed...
College Students, Internet Use, and Protection from Online Identity Theft
ERIC Educational Resources Information Center
Norum, Pamela S.; Weagley, Robert O.
2007-01-01
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
27 CFR 478.33a - Theft of firearms.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-29
... Collection; Comments Requested: Report of Theft or Loss of Controlled Substances; DEA Form 106 AGENCY...) Title of the Form/Collection: Report of Theft or Loss of Controlled Substances (DEA Form 106). (3... DEA-106 upon discovery of a theft or significant loss of controlled substances. This provides accurate...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of...: Reports of Suspicious Orders or Theft/Loss of Listed Chemicals/Machines. (3) Agency form number, if any...: Notification of suspicious orders and thefts is provided in writing on an as needed basis and does not occur...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... Shipment Report of Theft/Loss ACTION: 60-Day notice. The Department of Justice (DOJ), Bureau of Alcohol... Form/Collection: Interstate Firearms Shipment Report of Theft/Loss. (3) Agency form number, if any, and... report losses or thefts of firearms from interstate shipments. ATF uses this information to ensure that...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...
27 CFR 28.302 - Notice to exporter.
Code of Federal Regulations, 2011 CFR
2011-04-01
... been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft; (d) That allowance... transportation, as described in § 28.301, whether by theft or otherwise, the appropriate TTB officer may require...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 12 2011-01-01 2011-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... different from the present address; the capacity of person certifying, if other than owner; the identity of...
27 CFR 28.316 - Notice to exporter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... unlawfully diverted, or had been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft... described in § 28.315, whether by theft or otherwise, the appropriate TTB officer may require the exporter...
27 CFR 28.302 - Notice to exporter.
Code of Federal Regulations, 2010 CFR
2010-04-01
... been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft; (d) That allowance... transportation, as described in § 28.301, whether by theft or otherwise, the appropriate TTB officer may require...
27 CFR 28.316 - Notice to exporter.
Code of Federal Regulations, 2011 CFR
2011-04-01
... unlawfully diverted, or had been lost by theft, he will advise the exporter by letter: (a) Of the identity of the containers; (b) Of the amount of the loss; (c) Of the circumstances indicating diversion or theft... described in § 28.315, whether by theft or otherwise, the appropriate TTB officer may require the exporter...
76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... document grants in full the Mazda Motor Corporation (Mazda) petition for an exemption of the CX-5 vehicle... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the...
Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas
2014-01-01
Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200
Cook, Philip J
2018-06-01
Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of... Suspicious Orders or Theft/Loss of Listed Chemicals/Machines. (3) Agency form number, if any, and the... suspicious orders and thefts is provided in writing on an as needed basis and does not occur using a form...
75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
... agency comparing its proposed device to antitheft devices already installed in the Aston Martin Vantage... effective in contributing to a 63.5% reduction in the theft rate for the Aston Martin Vantage Line... Martin Vantage vehicle line and 0.6784 for the MY 2007. MBUSA also referenced theft data published by the...
34 CFR 682.208 - Due diligence in servicing a loan.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 90 days of its acquisition of the loan. (3) Upon receipt of a valid identity theft report as defined... bureau that information furnished by the lender is a result of an alleged identity theft as defined in... identity theft report, the lender receives from the borrower evidence specified in § 682.402(e)(3)(v), the...
34 CFR 685.215 - Discharge for false certification of student eligibility or unauthorized payment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the individual's eligibility for a Direct Loan as a result of the crime of identity theft committed... applied to charges owed by the student to the school. (4) Identity theft. In the case of an individual... identity theft and is requesting a discharge, the individual shall— (i) Certify that the individual did not...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
What Price Privacy? (and why identity theft is about neither identity nor theft)
2004-01-01
justify. It might be pos- sible to collect data on occurrence of identity theft correlated with consumer behavior so that probabilities of at least...needs to learn from experience, so consumer behavior is likely to lag behind any current reality. So one answer is that the expected cost 6 of privacy
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2011 CFR
2011-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2012 CFR
2012-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2010 CFR
2010-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2011 CFR
2011-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2013 CFR
2013-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2013 CFR
2013-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2014 CFR
2014-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2012 CFR
2012-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
42 CFR 73.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CDC or APHIS and appropriate Federal, State, or local law enforcement agencies. Thefts or losses must..., or intends to report the theft or loss. (2) A completed APHIS/CDC Form 3 must submitted within seven... individual or entity must immediately notify CDC or APHIS. (1) The release of a select agent or toxin must be...
9 CFR 121.19 - Notification of theft, loss, or release.
Code of Federal Regulations, 2014 CFR
2014-01-01
... individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select... entity reported, or intends to report, the theft or loss. (2) A completed APHIS/CDC Form 3 must be submitted within 7 calendar days. (b) An individual or entity must immediately notify APHIS or CDC upon...
12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...
12 CFR Appendix I to Part 1022 - Summary of Consumer Identity Theft Rights
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Summary of Consumer Identity Theft Rights I Appendix I to Part 1022 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION FAIR CREDIT REPORTING (REGULATION V) Pt. 1022, App. I Appendix I to Part 1022—Summary of Consumer Identity Theft Rights The...
Exploring the Identity-Theft Prevention Efforts of Consumers in the United States
ERIC Educational Resources Information Center
Lewis, Jacquelyne L.
2011-01-01
Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-22
... reports on their motor vehicle theft loss experiences. An insurer included in any of the appendices that...: Congress enacted the Motor Vehicle Theft Law Enforcement Act of 1984 (Pub. L. 98-547). This legislation... report includes information about thefts and recoveries of motor vehicles, the rating rules used by the...
20 CFR 429.204 - Are there any restrictions on what is allowable?
Code of Federal Regulations, 2010 CFR
2010-04-01
... disaster, theft from quarters (as limited by § 429.203(c)(1)), or under other reasonable circumstances in which it would be in the Government's best interest to make payment. In cases involving theft from quarters, the evidence must conclusively show that your quarters were locked at the time of the theft...
Do Data Breach Disclosure Laws Reduce Identity Theft?
ERIC Educational Resources Information Center
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro
2011-01-01
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.
Judson, Timothy; Haas, Mark; Lagu, Tara
2014-07-01
Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.
Modeling the number of car theft using Poisson regression
NASA Astrophysics Data System (ADS)
Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura
2016-10-01
Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.
Doubly illegal: Qualitative accounts of underage alcohol access through theft
Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.
2012-01-01
This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285
Opportunistic brood theft in the context of colony relocation in an Indian queenless ant
Paul, Bishwarup; Paul, Manabi; Annagiri, Sumana
2016-01-01
Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusocial subfamily Ponerinae. Pupae was the preferred stolen item both in laboratory conditions and in natural habitat and a small percentage of the members of a colony acting as thieves stole about 12% of the brood of the victim colony. Stolen brood were not consumed but became slaves. We propose a new dimension to the risks of relocation in the form of brood theft by conspecific neighbours and speculate that examination of this phenomenon in other primitively eusocial species will help understand the origin of brood theft in ants. PMID:27796350
Opportunistic brood theft in the context of colony relocation in an Indian queenless ant.
Paul, Bishwarup; Paul, Manabi; Annagiri, Sumana
2016-10-31
Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusocial subfamily Ponerinae. Pupae was the preferred stolen item both in laboratory conditions and in natural habitat and a small percentage of the members of a colony acting as thieves stole about 12% of the brood of the victim colony. Stolen brood were not consumed but became slaves. We propose a new dimension to the risks of relocation in the form of brood theft by conspecific neighbours and speculate that examination of this phenomenon in other primitively eusocial species will help understand the origin of brood theft in ants.
Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.
Mburu, Lucy Waruguru; Helbich, Marco
2016-01-01
Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.
The Step Method - Battling Identity Theft Using E-Retailers' Websites
NASA Astrophysics Data System (ADS)
Schulze, Marion; Shah, Mahmood H.
Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.
49 CFR Appendix B to Part 591 - Section 591.5(f) Bond for the Entry of More Than a Single Vehicle
Code of Federal Regulations, 2010 CFR
2010-10-01
...) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591... Federal motor vehicle safety, or bumper, or theft prevention standards; and WHEREAS, pursuant to 49 CFR... to conform to the Federal motor vehicle safety, bumper, and theft prevention standards; and WHEREAS...
75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-10
..., Inc. (Nissan). In its comments, VW informed the agency that the entries for the Audi RS4, Audi A8, Audi A4/A4 Quattro/S4/S4 Avant and Audi RS4 were listed with incorrect manufacturer designations. The final theft data has been revised to reflect that Audi is the manufacturer for [[Page 11007
27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-28
... risks to FCU members or to an FCU's safety and soundness. Each FCU also must develop an Identity Theft... forms of activity that indicate the possible existence of identity theft. In addition, 12 CFR 717.90 requires each FCU to establish reasonable policies and procedures to address the risk of identity theft...
Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making
ERIC Educational Resources Information Center
Jefson, Cristy A.
2007-01-01
Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…
A Report on the Moffitt Undergraduate Library Book Theft Study.
ERIC Educational Resources Information Center
Kaske, Neal K.; Thompson, Donald D.
A study was conducted at the Moffitt Undergraduate Library of the University of California at Berkeley to determine the extent and the cost of book losses due to theft and to determine the cost-effectiveness of book security systems. A sample inventory was taken and the theft rate (13.7%) was statistically derived. The rate of loss was translated…
Basic bookkeeping and avoiding theft.
Nelson, Ian M
2008-07-01
Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.
27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...
The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan
2007-04-11
27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect
Barker, Edward D; Séguin, Jean R; White, Helene Raskin; Bates, Marsha E; Lacourse, Eric; Carbonneau, René; Tremblay, Richard E
2007-05-01
Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Accelerated cohort-sequential, longitudinal design. Rutgers Health and Human Development Project. Six hundred ninety-eight men. Self-reports of physical violence (ages 12-24 years) and theft (ages 12-31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but were unrelated to theft [corrected]. Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms.
ERIC Educational Resources Information Center
Sanga, Sushma
2016-01-01
Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…
ERIC Educational Resources Information Center
van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.
2009-01-01
Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…
75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
..., Inc. (Nissan). In its comments, VW informed the agency that the entries for the Audi RS4, Audi A8, Audi A4/A4 Quattro/S4/S4 Avant and Audi RS4 were listed with incorrect manufacturer designations. The final theft data has been revised to reflect that Audi is the manufacturer for the Audi RS4, Audi A8...
ERIC Educational Resources Information Center
Patford, Janet; Tranent, Peter
2013-01-01
Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 6 2014-10-01 2014-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 6 2012-10-01 2012-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 6 2011-10-01 2011-10-01 false Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting...
Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK
Helbich, Marco
2016-01-01
Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use. PMID:27643788
NASA Astrophysics Data System (ADS)
Khair, Ummul; Jabbar Lubis, Abdul; Agustha, Indra; Dharmawati; Zulfin, M.
2017-12-01
The current electricity needs is very primary, all objects including electronics require power, it encourages people not to be able to save electricity so the theft of electric power would be done. The use of ACS712 current sensor as the sensor with arduino uno would find out the power consumption continuously and prevent the theft of electricity because of the use of electricity which has been determined by PLN and the people fetl that it is not enough for every house, so the author made a tool for prevention of theft of electric power by using the arduino uno, buzzer, ACS712 current sensor, lcd, and relay then the power usage can be controlled according to the use to prevent the occurrence of theft of electricity so the use can be seen directly on the lcd 16x2and GSM modem to give information to employees of PLN so that it can reduceelectrical theft by the public.
IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud
2017-03-01
representative said that they felt they needed to provide their customers with some benefit and offered the services to give their customers peace of...satisfaction or reassurance. Some companies told us that they offered free identity theft services to give their customers peace of mind or provide...IDENTITY THEFT SERVICES Services Offer Some Benefits but Are Limited in Preventing Fraud Report to Congressional
Carter, N; Kindstedt, A; Melin, L
1995-01-01
We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.
Developmental Trajectories of Male Physical Violence and Theft
Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.
2012-01-01
Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611
Dog Theft: A Case for Tougher Sentencing Legislation
Harris, Lauren K.
2018-01-01
Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637
Combating employee theft in the healthcare industry.
Marquet, Christopher T
2011-01-01
The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.
Carter, Ned; Kindstedt, Angeli; Melin, Lennart
1995-01-01
We used an A-B-A design to evaluate the effects of two commonly used promotional activities—price reduction and increased exposure, in combination and separately—on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts. PMID:16795853
Medical identity theft in the emergency department: awareness is crucial.
Mancini, Michelino
2014-11-01
Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.
Impact of identity theft on methods of identification.
McLemore, Jerri; Hodges, Walker; Wyman, Amy
2011-06-01
Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.
Medical Identity Theft in the Emergency Department: Awareness is Crucial
Mancini, Michelino
2014-01-01
Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.2 Purpose. The purpose of this standard is to reduce the incidence of motor vehicle thefts by facilitating the tracing and...
Exploring Medical Identity Theft
Mancilla, Desla; Moczygemba, Jackie
2009-01-01
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification. PMID:20169017
Exploring medical identity theft.
Mancilla, Desla; Moczygemba, Jackie
2009-09-16
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.
Code of Federal Regulations, 2010 CFR
2010-10-01
... AND THEFT PREVENTION STANDARDS § 591.2 Purpose. The purpose of this part is to ensure that motor vehicles and motor vehicle equipment permanently imported into the United States conform with theft...
Identity Theft in the Academic World Leads to Junk Science.
Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn
2018-02-01
In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.
When accepting a gift can be professional misconduct and theft.
Griffith, Richard
2016-07-01
Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.3 Application. (a) Except... high theft in accordance with 49 CFR 542.1; and (iv) Light duty trucks with a gross vehicle weight...
Devices That May Interfere with Pacemakers
... Devices with risk Anti-theft systems (also called electronic article surveillance or EAS): Interactions with EAS systems ... the pulse generator Anti-theft systems (also called electronic article surveillance or EAS): Interactions with EAS systems ...
47 CFR 76.1209 - Theft of service.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service... equipment that would violate 47 U.S.C. 553 or any other provision of law intended to preclude the...
47 CFR 76.1209 - Theft of service.
Code of Federal Regulations, 2011 CFR
2011-10-01
... CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service... equipment that would violate 47 U.S.C. 553 or any other provision of law intended to preclude the...
14 CFR § 1214.609 - Loss or theft.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Space Shuttle Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space... missing shall immediately report the loss to the Johnson Space Center Security Office and the NASA...
Death during theft from electric utilities.
Taylor, Allison J; McGwin, Gerald; Brissie, Robert M; Rue, Loring W; Davis, Gregory G
2003-06-01
Utilities that supply power are subject to theft of service and theft of hardware used to provide service. Individuals who try to steal from a power utility risk electrocution. We conducted a retrospective study of all individuals examined by the Jefferson County Coroner Medical Examiner Office from January 1981 through December 2001 and found that 8 individuals died trying to steal from a power utility. All decedents were men, with an average age of 33 years. Seven decedents were stealing copper, and 1 was stealing electricity. Only 1 decedent survived long enough to be admitted to a hospital. Five decedents were intoxicated, 3 with ethanol, 1 with cocaine, and 1 with both cocaine and ethanol. Seven decedents sustained electrical burns in keeping with the high voltage to which they were subjected. The unburned decedent died of laceration of the aorta at its origin from the heart, an injury sustained when the decedent fell from the power pole. All 8 decedents attempted their theft during daylight. Items found in the decedent's pockets, the presence of a ladder nearby, or the presence of electrical tools around the body may help to establish the attempted act of theft.
System Control Applications of Low-Power Radio Frequency Devices
NASA Astrophysics Data System (ADS)
van Rensburg, Roger
2017-09-01
This paper conceptualizes a low-power wireless sensor network design for application employment to reduce theft of portable computer devices used in educational institutions today. The aim of this study is to design and develop a reliable and robust wireless network that can eradicate accessibility of a device’s human interface. An embedded system supplied by an energy harvesting source, installed on the portable computer device, may represent one of multiple slave nodes which request regular updates from a standalone master station. A portable computer device which is operated in an undesignated area or in a field perimeter where master to slave communication is restricted, indicating a possible theft scenario, will initiate a shutdown of its operating system and render the device unusable. Consequently, an algorithm in the device firmware may ensure the necessary steps are executed to track the device, irrespective whether the device is enabled. Design outcomes thus far indicate that a wireless network using low-power embedded hardware, is feasible for anti-theft applications. By incorporating one of the latest Bluetooth low-energy, ANT+, ZigBee or Thread wireless technologies, an anti-theft system may be implemented that has the potential to reduce major portable computer device theft in institutions of digitized learning.
Options for reducing copper theft : final report 657.
DOT National Transportation Integrated Search
2009-10-01
This research investigated the theft of copper, including scope, impacts, and countermeasures. The researchers : completed a literature review to demonstrate a global perspective of the problem. They took a survey of other : state departments of tran...
Crash test and evaluation of locking architectural mailboxes.
DOT National Transportation Integrated Search
2014-09-01
Some homeowners and businesses are becoming increasingly concerned about mail-identity theft. : Consequently, there is a growing demand for the use of locking mailboxes for theft deterrence and vandal : resistance. There are a number of mailbox produ...
DOT National Transportation Integrated Search
1996-04-01
The first article in this report deals with the rising theft and in-transit hijacking of entire containers and trailers in port cities and adjacent areas in the United States. Cargo thefts are occurring most frequently in Florida, California, New Yor...
Raymond, Colette
2010-01-01
Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.
Sim-based detection tools to minimize motorcycle theft
NASA Astrophysics Data System (ADS)
Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.
2018-05-01
The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.
2013 Vehicle Theft Prevention Quick Reference Guide for the Law Enforcement Community
DOT National Transportation Integrated Search
2013-08-01
"This and future versions of the Vehicle TheftPrevention Quick Reference Guide for the Law Enforcement Community will provide comprehensive information for vehicle lines. The parts-marking requirements have been : extended to include: : all passe...
7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... name and address of lender of record; (iii) Capacity of person certifying; (iv) Full identification of... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or...
34 CFR 682.411 - Lender due diligence in collecting guaranty agency loans.
Code of Federal Regulations, 2011 CFR
2011-07-01
... receives a valid identity theft report or notification from a credit bureau that information furnished is a result of an alleged identity theft as defined in § 682.402(e)(14). (Approved by the Office of Management...
Bandara, K R
1991-11-20
I am a student nurse looking into research on nurses and theft. I would like to hear (in confidence) from any nurses or students who have been convicted in court of theft and, after their employer's intervention, been allowed to continue their career. I require only brief details.
DOT National Transportation Integrated Search
2017-02-01
Some homeowners and businesses are becoming increasingly concerned about mail-identity theft. Consequently, there is a growing demand for the use of locking mailboxes for theft deterrence and vandal resistance. There are a number of mailbox products ...
A novel anti-theft security system for photovoltaic modules
NASA Astrophysics Data System (ADS)
Khan, Wasif Ali; Lim, Boon-Han; Lai, An-Chow; Chong, Kok-Keong
2017-04-01
Solar farms are considered as easy target for thieves because of insufficient protection measures. Existing anti-theft approaches are based on system level and are not very preventive and efficient because these can be bypassed with some technical knowledge. Additionally, it is difficult for security guards to tackle them as robbers come in a form of a gang equipped with heavy weapons. In this paper, a low power auto shut-off and non-destructive system is proposed for photovoltaic (PV) modules to achieve better level of security at module level. In proposed method, the power generation function of the PV module will be shut-off internally and cannot be re-activated by unauthorized personnel, in the case of theft. Hence, the PV module will not be functional even sold to new customers. The system comprises of a microcontroller, a low power position sensor, a controllable semiconductor switch and a wireless reactive-able system. The anti-theft system is developed to be laminated inside PV module and will be interconnected with solar cells so it becomes difficult for thieves to temper. The position of PV module is retrieved by position sensor and stored in a microcontroller as an initial reference value. Microcontroller uses this stored reference value to control power supply of PV module via power switch. The stored reference value can be altered using wireless circuitry by following authentication protocol. It makes the system non-destructive as anti-theft function can be reset again by authorized personnel, if it is recovered after theft or moved for maintenance purposes. The research component includes the design of a position sensing circuit, an auto shut-off circuit, a reactive-able wireless security protection algorithm and finally the integration of the multiple circuits.
Whose guns are stolen? The epidemiology of Gun theft victims.
Hemenway, David; Azrael, Deborah; Miller, Matthew
2017-12-01
Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.
Using aerial infrared thermography to detect utility theft of service
NASA Astrophysics Data System (ADS)
Stockton, Gregory R.; Lucas, R. Gillem
2012-06-01
Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
..._strategy_on_mitigating_the_theft_of_u.s._trade_secrets.pdf http:/www.whitehouse.gov/sites/default/files/omb/ IPEC/admin_strategy_on_mitigating_the_theft_of_u.s._trade_ secrets.pdf. A related OMB blog post is...
ERIC Educational Resources Information Center
Reed, Christopher
1997-01-01
The Harvard University (Massachusetts) open-stack libraries have experienced substantial losses of rare books and important manuscripts due to theft and vandalism. Some of the thieves have been found and prosecuted, among them several notorious or even respected individuals with long histories of book theft. Until recently, Harvard did not admit…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-08
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY: National Highway Traffic Safety Administration, Department of Transportation (DOT). ACTION: Grant of...
van Lier, Pol A C; Vitaro, Frank; Barker, Edward D; Koot, Hans M; Tremblay, Richard E
2009-05-01
Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of physical violence decreased. Children who engaged in the high trajectories of vandalism, theft, and alcohol-drug use had a high probability of also being high in physical violence. Compared to males, females were less likely to be on the high trajectory of physical violence, and their trajectories of other antisocial behaviors were less strongly associated with high levels of physical violence. The results suggest that physical violence during pre-adolescence and adolescence has a different developmental pattern than other forms of antisocial behavior, and that its relation to these other forms of antisocial behavior differs by sex.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
...This document grants in full the petition of Hyundai-Kia Motors Corporation (HATCI) in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention Standard, for the Kia Amanti vehicle line beginning with model year (MY) 2009. This petition is granted because the agency has determined that the antitheft device to be placed on the line as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard. HATCI requested confidential treatment for its information and attachments submitted in support of its petition. In a letter dated January 30, 2008, the agency denied HATCI's request for confidential treatment. Subsequently, HATCI requested reconsideration of the determination. In a letter dated September 25, 2008, the agency granted the petitioner's request for reconsideration of confidential treatment of the indicated areas of its petition.
RFID identity theft and countermeasures
NASA Astrophysics Data System (ADS)
Herrigel, Alexander; Zhao, Jian
2006-02-01
This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
...This final rule announces NHTSA's determination that there are no new model year (MY) 2011 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
...This final rule announces NHTSA's determination that there are no new model year (MY) 2012 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-23
...This final rule announces NHTSA's determination that there are no new model year (MY) 2014 light duty truck lines subject to the parts-marking requirements of the Federal motor vehicle theft prevention standard because they have been determined by the agency to be high-theft or because they have a majority of interchangeable parts with those of a passenger motor vehicle line. This final rule also identifies those vehicle lines that have been granted an exemption from the parts-marking requirements because the vehicles are equipped with antitheft devices determined to meet certain statutory criteria.
Kerr, Joseph
2015-01-01
Dentists have much invested in their practices. They need to protect their practices from fraud and noncompliance. The author provides practical suggestions for how to significantly reduce the risk of fraud and theft in the practice without disrupting day-to-day operations. By adhering to nonintrusive policy and procedure changes, dental practice owners can reduce inherent risks of fraud and theft, while increasing financial and human resource knowledge regarding their practice. Practice owners with the appropriate policies and procedures benefit from significantly lower risk of loss from fraud and theft. Furthermore, they have a better understanding of their practice's finances and human resources. Copyright © 2015 American Dental Association. Published by Elsevier Inc. All rights reserved.
27 CFR 555.165 - Failure to report theft or loss.
Code of Federal Regulations, 2014 CFR
2014-04-01
... report a theft of explosive materials in accordance with § 555.30 will be fined under title 18 U.S.C., imprisoned not more than 5 years, or both. [T.D. ATF-87, 46 FR 40384, Aug. 7, 1981, as amended by ATF No. 1...
27 CFR 555.165 - Failure to report theft or loss.
Code of Federal Regulations, 2013 CFR
2013-04-01
... report a theft of explosive materials in accordance with § 555.30 will be fined under title 18 U.S.C., imprisoned not more than 5 years, or both. [T.D. ATF-87, 46 FR 40384, Aug. 7, 1981, as amended by ATF No. 1...
27 CFR 555.165 - Failure to report theft or loss.
Code of Federal Regulations, 2011 CFR
2011-04-01
... report a theft of explosive materials in accordance with § 555.30 will be fined under title 18 U.S.C., imprisoned not more than 5 years, or both. [T.D. ATF-87, 46 FR 40384, Aug. 7, 1981, as amended by ATF No. 1...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Theft Prevention to prevent or discourage the theft of motor vehicles, to prevent or discourage the sale or distribution in interstate commerce of used parts removed from stolen motor vehicles, and to help reduce the cost to consumers of comprehensive insurance coverage for motor vehicles. [62 FR 33756, June...
49 CFR 567.7 - Requirements for persons who alter certified vehicles.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Federal motor vehicle safety, Bumper, and Theft Prevention standards, and (2) Assumes legal responsibility... Vehicle Safety, Bumper and Theft Prevention Standards affected by the alteration and in effect in (month... vehicles. 567.7 Section 567.7 Transportation Other Regulations Relating to Transportation (Continued...
An approach to meeting the spent fuel standard
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makhijani, A.
1996-05-01
The idea of the spent fuel standard is that there should be a high surface gamma radiation to prevent theft. For purposes of preventing theft, containers should be massive, and the plutonium should be difficult to extract. This report discusses issues associated with the spent fuel standard.
New consumer load prototype for electricity theft monitoring
NASA Astrophysics Data System (ADS)
Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.
2013-12-01
Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.
Electrical injuries due to theft of copper.
Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni
2010-01-01
This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.
Severity of Organized Item Theft in Computerized Adaptive Testing: A Simulation Study
ERIC Educational Resources Information Center
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua
2008-01-01
Criteria had been proposed for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria resulted from theoretical derivations that assumed uniformly randomized item selection. This study investigated potential damage caused by organized item theft in computerized adaptive…
27 CFR 478.33a - Theft of firearms.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...
27 CFR 478.33a - Theft of firearms.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...
27 CFR 478.33a - Theft of firearms.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...
27 CFR 478.33a - Theft of firearms.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION Administrative...
Investigating the Identity Theft Prevention Strategies in M-Commerce
ERIC Educational Resources Information Center
Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed
2016-01-01
Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…
Code of Federal Regulations, 2010 CFR
2010-10-01
... select agent or toxin against unauthorized access, theft, loss, or release. (b) The security plan must be... activities, loss or theft of select agents or toxins, release of select agents or toxins, or alteration of... of select agents or toxins, (iv) Any release of a select agent or toxin, and (v) Any sign that...
Code of Federal Regulations, 2010 CFR
2010-01-01
... the select agent or toxin against unauthorized access, theft, loss, or release. (b) The security plan... activities, loss or theft of select agents or toxins, release of select agents or toxins, or alteration of... of select agents or toxins; (iv) Any release of a select agent or toxin; and (v) Any sign that...
14 CFR 1214.609 - Loss or theft.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Loss or theft. 1214.609 Section 1214.609 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT Mementos Aboard Space Shuttle... immediately report the loss to the Johnson Space Center Security Office and the NASA Inspector General. ...
14 CFR 1214.609 - Loss or theft.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Loss or theft. 1214.609 Section 1214.609 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT Mementos Aboard Space Shuttle... immediately report the loss to the Johnson Space Center Security Office and the NASA Inspector General. ...
14 CFR 1214.609 - Loss or theft.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Loss or theft. 1214.609 Section 1214.609 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT Mementos Aboard Space Shuttle... immediately report the loss to the Johnson Space Center Security Office and the NASA Inspector General. ...
31 CFR 306.111 - Procedure for applying for relief.
Code of Federal Regulations, 2010 CFR
2010-07-01
... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or... some other person, the capacity in which he represents the owner. (b) The identity of the security by...
31 CFR 306.111 - Procedure for applying for relief.
Code of Federal Regulations, 2011 CFR
2011-07-01
.... SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306.111 Procedure for applying for relief. Prompt report of the loss, theft, destruction, mutilation or defacement of a... person, the capacity in which he represents the owner. (b) The identity of the security by title of loan...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-30
... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... site security? You must: (1) Protect Federal production against production loss or theft; (2) Post a... Regional Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft...) All valves on lines leaving a royalty or inventory storage tank, including load-out line valves, drain...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
Identity Theft - The National Guard
Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front name. Social Security Numbers - If after doing everything in your power to clear up the effects of identity theft you discover someone is still fraudulently using your Social Security Number, you can
31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of... bills, immediate advice, with a full description of the bill or bills involved, should be sent to the... be given, instructions and necessary blank forms will be furnished. ...
31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of... bills, immediate advice, with a full description of the bill or bills involved, should be sent to the... be given, instructions and necessary blank forms will be furnished. ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... information that raises significant identity theft, personal safety, or privacy concerns that are not... raises personal safety or privacy concerns is released to the public when considering whether to release... customer information or information that raises identity theft, personal safety or privacy concerns that do...
19 CFR 19.12 - Inventory control and recordkeeping system.
Code of Federal Regulations, 2010 CFR
2010-04-01
... invoice with any discrepancy reported to the port director as provided in § 19.6(a). (3) Recordation... discovery. The responsible party must pay the applicable duties, taxes and interest on thefts and shortages... discovery. The responsible party must pay the applicable duties, taxes and interest on thefts and shortages...
Under Lock and Key: Preventing Campus Theft of Electronic Equipment.
ERIC Educational Resources Information Center
Harrison, J. Phil
1996-01-01
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
School Security Gap (with Related Video)
ERIC Educational Resources Information Center
Skurnac, Steve
2012-01-01
Data security breaches in the educational sector can be devastating to institutions and the students and employees they serve. They carry the potential for identity theft, violations of federal and state laws, and loss of trust of students, alumni and employees. The Identity Theft Resource Center says that as of October 2011, education…
Cook, Carrie L; Fox, Kathleen A
2011-01-01
Fear of crime research has primarily focused on fear of crime in general or on fear of specific types of violent crimes. This study builds from this line of research by focusing exclusively on the night fear of six types of property crimes, including fear of burglary while away from home, vehicle theft, bicycle theft, property theft, vandalism, and vehicle burglary. This study examines the effects of victimization, vicarious victimization, and perceived risk on fear of property crime. Survey data from college students reveal that victimization and vicarious victimization were not significant predictors of fear of property crime, whereas perceived risk was a consistent and significant predictor of fear of all property crimes.
31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...
31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...
31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...
31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... securities.) Except for bearer securities submitted for redemption at par in payment of Federal estate taxes...
Reducing theft and embezzlement by encouraging ethical behavior.
Weinstock, Donna
2010-01-01
Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.
27 CFR 478.39a - Reporting theft or loss of firearms.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...
27 CFR 478.39a - Reporting theft or loss of firearms.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...
27 CFR 478.39a - Reporting theft or loss of firearms.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...
27 CFR 478.39a - Reporting theft or loss of firearms.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false Reporting theft or loss of firearms. 478.39a Section 478.39a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION COMMERCE IN FIREARMS AND AMMUNITION...
31 CFR 306.113 - Cases not requiring bonds of indemnity.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the security was in the custody or control of the United States, or a duly authorized agent thereof... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306... relief for the loss, theft, destruction, mutilation, or defacement of registered securities in any of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-08
... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... of petition for exemption. SUMMARY: This document grants in full the Porsche Cars North America, Inc... the occupant compartment of the car. The ignition key contains a radio signal transponder, which...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors R&D of America, Inc. AGENCY: National... petition for exemption. SUMMARY: This document grants in full the Mitsubishi Motors R&D of America, Inc.'s...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year...: Notice of availability. SUMMARY: This notice announces publication by NHTSA of the annual insurer report... helpful to the public, the law enforcement community, and Congress. As required by section 33112(c), this...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-15
... Federal Motor Vehicle Theft Prevention Standard was extended to include all passenger cars and... Vehicle Theft Prevention Standard (Part 541), all passenger cars, and multipurpose passenger vehicles with..., 565 and 567. Part 541 The Motor Vehicle Information and Cost Savings Act was amended by the Anti-Car...
Code of Federal Regulations, 2012 CFR
2012-07-01
... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...
Code of Federal Regulations, 2013 CFR
2013-07-01
... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...
Code of Federal Regulations, 2011 CFR
2011-07-01
... valid identity theft report as defined in section 603(q)(4) of the Fair Credit Reporting Act (15 U.S.C... alleged identity theft as defined in § 682.402(e)(14), for a period not to exceed 120 days necessary for... qualify the borrower for loan forgiveness and associated forbearance under the requirements of the teacher...
Reducing Shrinkage in Convenience Stores by the Use of the PSI.
ERIC Educational Resources Information Center
Terris, William; Jones, John W.
This bibliography contains over 1,200 behavioral and property is a rapidly growing problem. Successful strategies are needed to reduce employee theft; new loss prevention techniques need to be developed and evaluated. Two loss prevention programs aimed at reducing employees' theft were compared by the measures of shrinkage rates. Initially, a…
75 FR 19673 - Petition for Exemption From the Vehicle Theft Prevention Standard; Saab
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
... module (BCM), passive entry passive start module (PEPS), intrusion/inclination sensor, an immobilizer... must be performed by communication between the PEPS and the BCM jointly with the UID (key fob... Saab 9-3, has been designed to enhance the functionality and theft protection provided by Saab's first...
Code of Federal Regulations, 2014 CFR
2014-04-01
... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation B Appendix B to Part 162 Commodity and Securities... Detection, Prevention, and Mitigation Section 162.30 requires each financial institution or creditor that...
ERIC Educational Resources Information Center
Kpaduwa, Fidelis Iheanyi
2010-01-01
This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…
Kleptomania or common theft - diagnostic and judicial difficulties.
Sipowicz, Justyna; Kujawski, Ryszard
2018-02-28
First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.
CargoTIPS: an innovative approach to combating cargo theft
NASA Astrophysics Data System (ADS)
Toth, Gail E.
1998-12-01
Cargo theft has been estimated by the Federal Bureau o Investigations to be 6 billion annually, while others believe it to be more than 10 billion annually. Opportunistic thieves, street gangs, traditional organized crime groups, and new organized crime groups have been targeting cargo. They steal from warehouses, terminals, equipment, truck stops, or any place where freight comes to a rest. With zero inventory levels, our trailers have become virtual warehouses on wheels and easy targets for thieves. Without information and communication cargo thieves can thrive. The industry and law enforcement are forced into being reactive instead of developing proactive policies and procedures. Cargo thieves cross town lines, county lines, state lines and country borders. This makes communication within the law enforcement community imperative. CargoTIPS (cargo theft information processing system) was developed in response to the need for cargo theft information. The system allows us to collect cargo theft statistics to analyze the problem, assess the threat and develop a response on a national level. CargoTIPS includes a bulletin board, which allows users to communicate with each other, pass on alerts or seek information. The system is also used as an investigative tool. CargoTIPS can identify the mode of transportation (truck, small parcel, air, rail or ocean). It was designed to take in international data. Currently the system has identified that food products are the number one targeted commodity, followed by electronic products and third, computers and computer parts.
'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.
Nettle, Daniel; Nott, Kenneth; Bateson, Melissa
2012-01-01
Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.
76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-04
...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... requirements of the Theft Prevention Standard(49 CFR part 541) for the Audi A4 allroad vehicle line beginning... new Audi A4 allroad vehicle line. VW will install its passive, transponder-based electronic engine...
Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections
ERIC Educational Resources Information Center
Samuelson, Todd; Sare, Laura; Coker, Catherine
2012-01-01
The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…
Code of Federal Regulations, 2010 CFR
2010-01-01
... foreseeable risks to customers or to the safety and soundness of the financial institution or creditor from...) Notice from customers, victims of identity theft, law enforcement authorities, or other persons regarding... the Customer Identification Program rules implementing 31 U.S.C. 5318(l) (31 CFR 103.121); and (b...
Code of Federal Regulations, 2010 CFR
2010-01-01
... control reasonably foreseeable risks to customers or to the safety and soundness of the financial...; and (5) Notice from customers, victims of identity theft, law enforcement authorities, or other... verification set forth in the Customer Identification Program rules implementing 31 U.S.C. 5318(l)(31 CFR 103...
ERIC Educational Resources Information Center
Sikes, Pat
2009-01-01
This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…
ERIC Educational Resources Information Center
Stark, Heidi Kiiwetinepinesiik
2012-01-01
The story, known as "The Theft of Fire," illustrates numerous meanings and teachings crucial to understanding Anishinaabe nationhood. This story contains two discernible points. First, it reveals how the Anishinaabe obtained fire. The second discernible feature within this story is the marking of the hare by his theft of fire. Stories…
Code of Federal Regulations, 2014 CFR
2014-07-01
... disability; (6) Upon receipt of a valid identity theft report as defined in section 603(q)(4) of the Fair... furnished by the lender is a result of an alleged identity theft as defined in § 682.402(e)(14), for a... requirements of the teacher loan forgiveness program in § 682.216; and (iii) In yearly increments (or a lesser...
Empirical Investigation of Job Applicants' Reactions to Taking a Pre-Employment Honesty Test.
ERIC Educational Resources Information Center
Jones, John W.; Joy, Dennis
Employee theft is widespread and difficult to detect. Many companies have attempted to control the employee theft problem through pre-employment screening. The use of paper-and-pencil honesty tests in this process has become increasingly common. These two studies empirically investigated job applicants' (N=450) reactions to taking a pre-employment…
The Cultural Phenomenon of Identity Theft and the Domestication of the World Wide Web
ERIC Educational Resources Information Center
Caeton, Daniel A.
2007-01-01
Through a critique of the rhetorical configurations of identity theft, this article contributes to the emerging body of theory contending with the social effects of digital information technologies (DIT). It demonstrates how the politics of fear manipulate technosocial matrices in order to derive consent for radical changes such as the…
A Model for Deterring the Determined Thief of Patron Property
ERIC Educational Resources Information Center
McKay, Richard
2008-01-01
Ongoing theft from library patrons may be the work of a determined thief, one who will not be deterred by the crimeproofing techniques that often stop less committed criminals. This type of theft can be deterred when the library staff makes their patrons aware that successful deterrence depends on them not abandoning their valuables. Other staff…
Code of Federal Regulations, 2012 CFR
2012-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2011 CFR
2011-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2014 CFR
2014-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2010 CFR
2010-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2013 CFR
2013-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Code of Federal Regulations, 2012 CFR
2012-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Code of Federal Regulations, 2014 CFR
2014-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
Code of Federal Regulations, 2014 CFR
2014-04-01
... covered accounts the financial institution or creditor should take steps to ensure that the activity of... detects a fraud or active duty alert; (c) Implementing any requirements for furnishers of information to... Identity Theft Detection, Prevention, and Mitigation A Appendix A to Subpart C of Part 248 Commodity and...
Code of Federal Regulations, 2011 CFR
2011-01-01
.... Detecting Red Flags The Program's policies and procedures should address the detection of Red Flags in... Detection, Prevention, and Mitigation J Appendix J to Part 717 Banks and Banking NATIONAL CREDIT UNION...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 717.90 of this part...
ERIC Educational Resources Information Center
BavaHarji, Madhubala; Chetty, Thiba Naraina; Ismail, Zalina Bt; Letchumanan, Krishnaveni
2016-01-01
Concerned with intellectual theft, we decided to examine intellectual theft among undergraduates at a private higher education institution. The aim of this study was to compare the act and frequency of plagiarism, particularly between programmes, gender, year of study and academic performance. This study adopted the quantitative approach, using a…
Code of Federal Regulations, 2011 CFR
2011-04-01
... controlled substances within one business day of discovery of the theft or loss. The supplier is responsible... selected pursuant to paragraph (e) of this section, within one business day of discovery of such theft or... of business; (2) The specific controlled substances lost; (3) Whether the loss of the controlled...
Code of Federal Regulations, 2010 CFR
2010-04-01
... controlled substances within one business day of discovery of the theft or loss. The supplier is responsible... selected pursuant to paragraph (e) of this section, within one business day of discovery of such theft or... of business; (2) The specific controlled substances lost; (3) Whether the loss of the controlled...
Perceived Penal Sanction and Self-Reported Criminality: A Neglected Approach to Deterrence Research.
ERIC Educational Resources Information Center
Waldo, Gordon P.; Chiricos, Theodore G.
Interviews with 321 university students were used to determine relationships between admitted marijuana use and theft and perceptions of the severity and certainty of punishment. Use of marijuana and theft activity were expected to be least frequent among those who: (1) perceive the harshest penalties for marijuana possession and petty larceny;…
Religiosity and Music Copyright Theft among Canadian Baptist Youth
ERIC Educational Resources Information Center
Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody
2013-01-01
This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…
Deterring and remedying employee theft.
Buzogany, Bill; Mueller, Michael J
2010-01-01
Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.
Controlling hospital library theft
Cuddy, Theresa M.; Marchok, Catherine
2003-01-01
At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal. PMID:12883573
Controlling hospital library theft.
Cuddy, Theresa M; Marchok, Catherine
2003-04-01
At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.
The relationship between family functioning and the crime types in incarcerated children.
Teker, Kamil; Topçu, Seda; Başkan, Sevgi; Orhon, Filiz Ş; Ulukol, Betül
2017-06-01
We investigated the relationship between the family functioning and crime types in incarcerated children. One hundred eighty two incarcerated children aged between 13-18 years who were confined in child-youth prisons and child correctional facilities were enrolled into this descriptive study. Participants completed demographic questions and the McMaster Family Assessment Device (Epstein, Baldwin, & Bishop, 1983) (FAD) with face to face interviews. The crime types were theft, assault (bodily injury), robbery, sexual assault, drug trafficker and murder. The socio-demographic characteristics were compared by using FAD scale, and growing up in a nuclear family had statistically significant better scores for problem solving and communication subscales and the children whose parents had their own house had significantly better problem solving scores When we compared the crime types of children by using problem solving, communication and general functioning subscales of FAD, we found statistical lower scores in assault (bodily injury) group than in theft, sexual assault, murder groups and in drug trafficker group than in murder group, also we found lower scores in drug trafficker group than in theft group for problem solving and general functioning sub-scales, also there were lower scores in bodily injury assault group than in robbery, theft groups and in drug trafficker than in theft group for problem solving subscale. The communication and problem solving sub-scales of FAD are firstly impaired scales for the incarcerated children. We mention these sub-scales are found with unplanned and less serious crimes and commented those as cry for help of the children.
A study for prevent theft of the bike design and analysis
NASA Astrophysics Data System (ADS)
Huang, Yu-Che; Huang, Tai-Shen
2017-10-01
This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.
‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft
Nettle, Daniel; Nott, Kenneth; Bateson, Melissa
2012-01-01
Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615
Growing trend of identity theft poses safety and billing loss threats.
2010-08-01
Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.
76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
... ``Quattro'' and ``Avant'' should be deleted from the Volkswagen and Audi vehicle line nomenclature. The..., Quattro and Avant have been deleted from the vehicle line nomenclature for the Volkswagen and Audi vehicle lines. Therefore, the entry for the Audi A6/A6 Quattro/S6/ S6 Avant has been changed to the Audi A6 and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... spirits, articles, or wines in bond must include the following information: (1) Identity of containers... of claim. The total amount of tax for which the claim is filed; (4) Identity of distilled spirits... research, development, or testing; (8) Theft. If lost by theft, the facts establishing that the loss did...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-13
... the Security Controller as long as the PET is in close proximity to the car and the driver either... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an exemption of the Model S vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft...
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee. Office of Postsecondary Education Coordination.
This state-mandated report presents crime statistics at higher education institutions in Florida and an assessment of physical plant security. The crime data list numbers of homicides, forcible sex offenses, robberies, aggravated assaults, burglaries/breaking and entering, larcenies and thefts, and motor vehicle thefts for each state university,…
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 6 2013-10-01 2013-10-01 false Procedures for selecting low theft light duty truck lines with a majority of major parts interchangeable with those of a passenger motor vehicle line. 542.2 Section 542.2 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION,...
12 CFR Appendix A to Part 1005 - Model Disclosure Clauses and Forms
Code of Federal Regulations, 2013 CFR
2013-01-01
... you learn of the loss or theft of your [card] [code], you can lose no more than $50 if someone used... learn of the loss or theft of your [card] [code], and we can prove we could have stopped someone from... each transfer you make using our [automated teller machines] [telephone bill-payment service] [point-of...
12 CFR Appendix A to Part 1005 - Model Disclosure Clauses and Forms
Code of Federal Regulations, 2014 CFR
2014-01-01
... line of credit). If you tell us within 2 business days after you learn of the loss or theft of your....) If you do NOT tell us within 2 business days after you learn of the loss or theft of your [card... our [automated teller machines] [telephone bill-payment service] [point-of-sale transfer service]. (2...
12 CFR Appendix A to Part 1005 - Model Disclosure Clauses and Forms
Code of Federal Regulations, 2012 CFR
2012-01-01
... you learn of the loss or theft of your [card] [code], you can lose no more than $50 if someone used... learn of the loss or theft of your [card] [code], and we can prove we could have stopped someone from... each transfer you make using our [automated teller machines] [telephone bill-payment service] [point-of...
Anti Theft Mechanism Through Face recognition Using FPGA
NASA Astrophysics Data System (ADS)
Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya
2012-11-01
The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.
Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W
2014-01-01
Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.
LLNL Contribution to Sandia Used Fuel Disposition - Security March 2011 Deliverable
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blink, J A
2011-03-23
Cleary [2007] divides the proliferation pathway into stages: diversion, facility misuse, transportation, transformation, and weapons fabrication. King [2010], using Cleary's methodology, compares a deepburn fusion-driven blanket containing weapons-grade plutonium with a PWR burning MOX fuel enrichments of 5-9%. King considers the stages of theft, transportation, transformation, and nuclear explosive fabrication. In the current study of used fuel storage security, a similar approach is appropriate. First, one must consider the adversary's objective, which can be categorized as on-site radionuclide dispersion, theft of material for later radionuclide dispersion, and theft of material for later processing and fabrication into a nuclear explosive. Formore » on-site radionuclide dispersion, only a single proliferation pathway stage is appropriate: dispersion. That situation will be addressed in future reports. For later radionuclide dispersion, the stages are theft, transportation, and transformation (from oxide spent fuel containing both fission products and actinides to a material size and shape suitable for dispersion). For later processing and fabrication into a nuclear explosive, the stages are theft (by an outsider or by facility misuse by an insider), transportation, transformation (from oxide spent fuel containing both fission products and actinides to a metal alloy), and fabrication (of the alloy into a weapon). It should be noted that the theft and transportation stages are similar, and possibly identical, for later radionuclide dispersion and later processing and fabrication into a nuclear explosive. Each stage can be evaluated separately, and the methodology can vary for each stage. For example, King starts with the methodology of Cleary for the theft, transportation, transformation, and fabrication stages. Then, for each stage, King assembles and modifies the attributes and inputs suggested by Cleary. In the theft (also known as diversion) stage, Cleary has five high-level categories (material handling during diversion, difficulty of evading detection by the accounting system, difficulty of evading detection by the material control system, difficulty of conducting undeclared facility modifications for the purpose of diverting nuclear material, and difficulty of evading detection of the facility modifications for the purposes of diverting nuclear material). Each category has one or more subcategories. For example, the first category includes mass per significant quantity (SQ) of nuclear material, volume/SQ of nuclear material, number of items/SQ, material form (solid, liquid, powder, gas), radiation level in terms of dose, chemical reactivity, heat load, and process temperature. King adds the following two subcategories to that list: SQs available for theft, and interruptions/changes (normal and unexpected) in material stocks and flows. For the situation of an orphaned surface storage facility, this approach is applicable, with some of the categories and subcategories being modified to reflect the static situation (no additions or removals of fuel or containers). In addition, theft would require opening a large overpack and either removing a full container or opening that sealed container and then removing one or more spent nuclear fuel assemblies. These activities would require time without observation (detection), heavy-duty equipment, and some degree of protection of the thieves from radiological dose. In the transportation stage, Cleary has two high-level categories (difficulty of handling material during transportation, and difficulty of evading detection during transport). Each category has a number of subcategories. For the situation of an orphaned surface storage facility, these categories are applicable. The transformation stage of Cleary has three high-level categories (facilities and equipment needed to process diverted materials; knowledge, skills, and workforce needed to process diverted materials; and difficulty of evading detection of transformation activities). Again, there are subcategories. King [2007] adds a fourth high-level category: time required to transform the materials. For the situation of an orphaned surface storage facility, the categories are applicable, but the evaluations of each category and subcategory will be significantly different for later radionuclide dispersion than for later processing and fabrication into a nuclear explosive. The fabrication stage of Cleary has three high-level categories (difficulty associated with design, handling difficulties, and knowledge and skills needed to design and fabricate). King replaces the first two high-level categories with the Figure of Merit for Nuclear Explosives Utility (FOM), with subcategories of bare critical mass, heat content of transformed material, dose rate of transformed material, and SQs available for theft. The next section of this report describes the FOM in more detail.« less
Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.
2014-01-01
Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999
Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P
2014-06-01
Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-13
... letter to ``your conviction'' refers to the jury's verdict finding you guilty on one count of theft of..., Jury Trial, No. 11 CR 548 GBD (S.D.N.Y. 2012) (Trial Tr.); United States v. Willard Lanham, No. 11 CR..., 2012, a jury rendered a guilty verdict convicting you on one count of theft of federal funds and three...
ERIC Educational Resources Information Center
Nunn, Samuel
1993-01-01
Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)
Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K
2009-07-01
The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p < 0.05). About 13.6% of patients who were cohabiting with family members and 66.7% of patients who were living alone were included in the D-group (p < 0.05). About 35.1% of patients who had a neurotic personality and 5.3% of patients who did not were included in the D-group (p < 0.05). There were no significant differences in scores on HDS-R, MMSE and COGNISTAT sub-scales, except for 'speech sample', between the two groups. In the 'speech sample', 38.7% of patients who understood a relationship between two boys and 12.0% of patients who did not were included in the D-group (p < 0.05). These results indicated that delusion of theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.
Employee theft and fraud: bigger than ever and getting worse.
2001-02-01
Fraud examiners and investigators say that employee theft is out of control, citing recent U.S. Chamber of Commerce figures that employees steal approximately $400 billion from businesses each year and an Ernst & Young survey showing that nearly 90% of organizations countrywide experienced some type of fraud in the 12 months prior to the survey. An additional undetermined amount is being reported lost because of external fraud committed by customers, vendors, and others having contact with a company or institution. Fraud experts interviewed for this report note that all sectors are targets--including retailers, hospitals and healthcare, the hotel industry, schools, and college campuses. In this report, we'll present the how's and whys of this development and also describe what one medical center is doing to stop thefts of medical equipment and computers.
77 FR 38024 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-26
... AUDI AUDI S4/S5...... 11 7,068 1.5563 38 NISSAN PATHFINDER...... 16 10,308 1.5522 39 GENERAL MOTORS............ DODGE NITRO..... 17 19,432 0.8748 88 AUDI AUDI A3......... 4 4,587 0.8720 89 HYUNDAI GENESIS......... 25... CROSSTOUR 29 34,114 0.8501 93 HONDA CIVIC 217 259,907 0.8349 94 AUDI AUDI TT......... 1 1,201 0.8326 95...
Advanced insider threat mitigation workshop instructional materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibbs, Philip; Larsen, Robert; O Brien, Mike
Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.
Performance Analysis of Effective Range and Orientation of UHF Passive RFID
2008-03-01
they can be found in the retail world as anti - theft devices . On the opposite end of the capacity realm, tags can include microprocessors and... theft or explosive devices set to detonate when in the presence of an American passport. Along with privacy risks, unsecure RFID tags in retail business...Thoughput for Unmodified Bluetooth Communication Devices ,” AFIT Thesis AFIT/GCS/ENG/03-08. 54 REPORT DOCUMENTATION
77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-21
......... CHEVROLET CAMARO.... 190 117,961 1.6107 36 FORD MOTOR CO....... FOCUS 279 176,089 1.5844 37 AUDI AUDI S4/S5....8783 87 CHRYSLER DODGE NITRO......... 17 19,432 0.8748 88 AUDI AUDI A3 4 4,587 0.8720 89 HYUNDAI... ACCORD CROSSTOUR.... 29 34,114 0.8501 93 HONDA CIVIC 217 259,907 0.8349 94 AUDI AUDI TT 1 1,201 0.8326 95...
School-based administration of ADHD drugs decline, along with diversion, theft, and misuse.
Dupont, Robert L; Bucher, Richard H; Wilford, Bonnie B; Coleman, John J
2007-12-01
Since 2000 researchers have reported a decline in the administration of attention-deficit/hyperactivity disorder (ADHD) medications given by school nurses, although no decline has been noted in the incidence of ADHD in school-age populations. Government data for the same period show reduced levels of methylphenidate abuse as measured by its involvement in hospital emergency department (ED) admissions. Offsetting this, however, is an increase in the involvement of amphetamine-dextroamphetamine in hospital ED admissions for the same period. Because ADHD medications are often administered in the school setting, a survey of school nurses was undertaken to identify factors related to the administration as well as to the diversion, theft, and misuse of ADHD medications. Of 311 school nurses responding, 295 (95%) reported a significant or moderate decline between 2002 and 2004 in the need for school-based administration of ADHD medications. Respondents also reported reductions in diversion, theft, and misuse of ADHD drugs.
Data Hemorrhages in the Health-Care Sector
NASA Astrophysics Data System (ADS)
Johnson, M. Eric
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.
Advanced Insider Threat Mitigation Workshop Instructional Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gibbs, Philip; Larsen, Robert; O'Brien, Mike
Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing theirmore » effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.« less
High-voltage electrical burns due to copper theft - Case series.
Braga, M J; Oliveira, I; Egipto, P; Silva, A
2016-03-31
Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.
Beating the Red Gold Rush: Copper Theft and Homeland Security
2015-12-01
with the bulk 52 of the copper wiring rendering each of the turbines inoperable.116 Electrical infrastructure is, of course, not the only kind of...resulted in significant speed restrictions and stop orders for the country’s premier TGV high- speed service.119 Aside from rail lines and wind turbines ... Wind Turbines ,” France 24, May 28, 2014, http://www.france24.com/en/20140528-france-metal-organised-thefts- wind - turbines -copper, accessed August 22
High-voltage electrical burns due to copper theft – Case series
Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.
2016-01-01
Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650
Fighting the scourge of metal theft.
Baillie, Jonathan
2012-03-01
Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.
Copper wire theft and high voltage electrical burns
Francis, Eamon C; Shelley, Odhran P
2014-01-01
High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371
75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-17
... 38 GENERAL MOTORS CHEVROLET MALIBU 423 155,433 2.7214 39 KIA RIO 92 35,014 2.6275 40 AUDI AUDI S8/S8.../SOLARA 390 257,638 1.5138 81 FORD MOTOR CO MERCURY GRAND MARQUIS 66 44,071 1.4976 82 AUDI AUDI A3/A3... HYUNDAI ELANTRA 160 109,498 1.4612 86 AUDI AUDI A6/A6 QUATTRO/S6/S6 AVANT 24 16,651 1.4414 87 KIA SPORTAGE...
78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-09
... NISSAN ALTIMA 387 179,269 2.1588 18 AUDI AUDI A8 10 4,751 2.1048 19 MAZDA 6 52 25,456 2.0427 20 GENERAL...,821 1.5360 34 TOYOTA YARIS 38 24,850 1.5292 35 AUDI AUDI A3 10 6,734 1.4850 36 CHRYSLER 300 42 28,373....1383 59 FORD MOTOR CO...... FUSION 239 211,964 1.1276 60 AUDI AUDI A6 8 7,108 1.1255 61 CHRYSLER 200 72...
76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
...) 2009 vehicles produced) 1 AUDI AUDI S8 2 227 8.8106 2 FORD MOTOR CO...... SHELBY GT 5 581 8.6059 3 BMW... 31,667 3.3789 13 CHRYSLER SEBRING 65 19,588 3.3184 14 AUDI AUDI A8 6 1,810 3.3149 15 VOLVO V70 3 996...,346 1.3532 73 NISSAN FRONTIER PICKUP.... 31 23,030 1.3461 74 VOLVO S40 9 6,743 1.3347 75 AUDI AUDI A3...
Copper wire theft and high voltage electrical burns.
Francis, Eamon C; Shelley, Odhran P
2014-01-01
High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.
InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices
NASA Astrophysics Data System (ADS)
Gupta, Anand; Gupta, Deepank; Gupta, Nidhi
People steal mobile devices with the intention of making money either by selling the mobile or by taking the sensitive information stored inside it. Mobile thefts are rising even with existing deterrents in place. This is because; they are ineffective, as they generate unnecessary alerts and might require expensive hardware equipments. In this paper a novel framework termed as InfoSec-MobCop is proposed which secures a mobile user’s data and discovers theft by detecting any anomaly in the user behavior. The anomaly of the user is computed by extracting and monitoring user specific details (typing pattern and usage history). The result of any intrusion attempt by a masquerader is intimated to the service provider through an SMS. Effectiveness of the used approach is discussed using FAR and FRR graphs. The experimental system uses both real users and simulated studies to quantify the effectiveness of the InfoSec-MobCop (Information Security Mobile Cop).
Built environment and Property Crime in Seattle, 1998-2000: A Bayesian Analysis.
Matthews, Stephen A; Yang, Tse-Chuan; Hayslett-McCall, Karen L; Ruback, R Barry
2010-06-01
The past decade has seen a rapid growth in the use of a spatial perspective in studies of crime. In part this growth has been driven by the availability of georeferenced data, and the tools to analyze and visualize them: geographic information systems (GIS), spatial analysis, and spatial statistics. In this paper we use exploratory spatial data analysis (ESDA) tools and Bayesian models to help better understand the spatial patterning and predictors of property crime in Seattle, Washington for 1998-2000, including a focus on built environment variables. We present results for aggregate property crime data as well as models for specific property crime types: residential burglary, nonresidential burglary, theft, auto theft, and arson. ESDA confirms the presence of spatial clustering of property crime and we seek to explain these patterns using spatial Poisson models implemented in WinBUGS. Our results indicate that built environment variables were significant predictors of property crime, especially the presence of a highway on auto theft and burglary.
Advising caution in studying seasonal oscillations in crime rates.
Dong, Kun; Cao, Yunbai; Siercke, Beatrice; Wilber, Matthew; McCalla, Scott G
2017-01-01
Most types of crime are known to exhibit seasonal oscillations, yet the annual variations in the amplitude of this seasonality and their causes are still uncertain. Using a large collection of data from the Houston and Los Angeles Metropolitan areas, we extract and study the seasonal variations in aggravated assault, break in and theft from vehicles, burglary, grand theft auto, rape, robbery, theft, and vandalism for many years from the raw daily data. Our approach allows us to see various long term and seasonal trends and aberrations in crime rates that have not been reported before. We then apply an ecologically motivated stochastic differential equation to reproduce the data. Our model relies only on social interaction terms, and not on any exigent factors, to reproduce both the seasonality, and the seasonal aberrations observed in our data set. Furthermore, the stochasticity in the system is sufficient to reproduce the variations seen in the seasonal oscillations from year to year. Researchers should be very careful about trying to correlate these oscillations with external factors.
Advising caution in studying seasonal oscillations in crime rates
Dong, Kun; Cao, Yunbai; Siercke, Beatrice; Wilber, Matthew
2017-01-01
Most types of crime are known to exhibit seasonal oscillations, yet the annual variations in the amplitude of this seasonality and their causes are still uncertain. Using a large collection of data from the Houston and Los Angeles Metropolitan areas, we extract and study the seasonal variations in aggravated assault, break in and theft from vehicles, burglary, grand theft auto, rape, robbery, theft, and vandalism for many years from the raw daily data. Our approach allows us to see various long term and seasonal trends and aberrations in crime rates that have not been reported before. We then apply an ecologically motivated stochastic differential equation to reproduce the data. Our model relies only on social interaction terms, and not on any exigent factors, to reproduce both the seasonality, and the seasonal aberrations observed in our data set. Furthermore, the stochasticity in the system is sufficient to reproduce the variations seen in the seasonal oscillations from year to year. Researchers should be very careful about trying to correlate these oscillations with external factors. PMID:28938022
Built environment and Property Crime in Seattle, 1998–2000: A Bayesian Analysis
Matthews, Stephen A.; Yang, Tse-chuan; Hayslett-McCall, Karen L.; Ruback, R. Barry
2014-01-01
The past decade has seen a rapid growth in the use of a spatial perspective in studies of crime. In part this growth has been driven by the availability of georeferenced data, and the tools to analyze and visualize them: geographic information systems (GIS), spatial analysis, and spatial statistics. In this paper we use exploratory spatial data analysis (ESDA) tools and Bayesian models to help better understand the spatial patterning and predictors of property crime in Seattle, Washington for 1998–2000, including a focus on built environment variables. We present results for aggregate property crime data as well as models for specific property crime types: residential burglary, nonresidential burglary, theft, auto theft, and arson. ESDA confirms the presence of spatial clustering of property crime and we seek to explain these patterns using spatial Poisson models implemented in WinBUGS. Our results indicate that built environment variables were significant predictors of property crime, especially the presence of a highway on auto theft and burglary. PMID:24737924
Digital Photograph Security: What Plastic Surgeons Need to Know.
Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H
2015-11-01
Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.
76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-22
... produced) 1 AUDI AUDI S8 2 227 8.8106 2 FORD MOTOR CO SHELBY GT 5 581 8.6059 3 BMW M5 2 264 7.5758 4... 107 31,667 3.3789 12 CHRYSLER SEBRING 65 19,588 3.3184 13 AUDI AUDI A8 6 1,810 3.3149 14 VOLVO V70 3... FRONTIER PICKUP........ 31 23,030 1.3461 74 VOLVO S40 9 6,743 1.3347 75 AUDI AUDI A3 5 3,761 1.3294 76 FORD...
NASA Astrophysics Data System (ADS)
Avedon, Roger Edmond
This dissertation addresses the value of developing diversion- and theft-resistant nuclear power technology, given uncertain future demand for nuclear power, and uncertain risks of nuclear terrorism and of proliferation from the reprocessing of civilian plutonium. The methodology comprises four elements: Economics. An economic growth model coupled with market penetration effects for plutonium and for the hypothetical new technology provides a range of estimates for future nuclear demand. A flow model accounts for the longevity of capital assets (nuclear plants) over time. Terrorism. The commercial nuclear fuel cycle may provide a source of fissile material for terrorists seeking to construct a crude nuclear device. An option value model is used to estimate the effects of the hypothetical new technology on reducing the probability of theft. A game theoretic model is used to explore the deterrence value of physical security and then to draw conclusions about how learning on the part of terrorists or security forces might affect the theft estimate. The principal uncertainties in the theft model can be updated using Bayesian techniques as new data emerge. Proliferation. Access to fissile material is the principal technical impediment to a state's acquisition of nuclear weapons. A game theoretic model is used to determine the circumstances under which a state may proliferate via diversion. The model shows that the hypothetical new technology will have little value for counter-proliferation if diversion is not a preferred proliferation method. A technology policy analysis of the choice of proliferation method establishes that diversion is unlikely to be used because it has no constituency among the important parties to the decision, namely the political leadership, the scientific establishment, and the military. Value. The decision whether to develop a diversion- and theft-resistant fuel cycle depends on the perceived value of avoiding nuclear terrorism and proliferation. The opportunity cost of such events is prohibitively difficult to assess. Instead, recent nonproliferation efforts and long term funding of organizations with nonproliferation objectives suggest a willingness-to-pay to avoid breaches in nuclear security. The cancellation of the Integral Fast Reactor in 1994 is analyzed using the methodology developed in the dissertation.
RxPATROL: a Web-based tool for combating pharmacy theft.
Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy
2009-01-01
To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.
Personal messages reduce vandalism and theft of unattended scientific equipment
Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R
2014-01-01
Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40–60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure. PMID:25866614
Vehicle Theft Identification and Intimation Using GSM & IOT
NASA Astrophysics Data System (ADS)
Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva
2017-11-01
Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.
Theft of information in the take-grant protection model
NASA Technical Reports Server (NTRS)
Bishop, Matt
1989-01-01
Questions of information flow are in many ways more important than questions of access control, because the goal of many security policies is to thwart the unauthorized release of information, not merely the illicit obtaining of access rights to that information. The Take-Grant Protection Model is a theoretical tool for examining such issues because conditions necessary and sufficient for information to flow between two objects, and for rights to objects to be obtained or stolen, are known. These results are extended by examining the question of information flow from an object the owner of which is unwilling to release that information. Necessary and sufficient conditions for such theft of information to occur are derived, and bounds on the number of subjects that must take action for the theft to occur are presented. To emphasize the usefulness of these results, the security policies of complete isolation, transfer of rights with the cooperation of an owner, and transfer of information (but not rights) with the cooperation of the owner are presented; the last is used to model a simple reference monitor guarding a resource.
Personal messages reduce vandalism and theft of unattended scientific equipment.
Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R
2014-02-01
Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.
Scientific misconduct and theft: case report from 17th century.
Fatović-Ferencić, Stella
2008-02-01
Gjuro Armen Baglivi was one of the most famous medical authorities of the 17th century. Apart from his numerous books and publications, several extensive collections of his correspondence have been preserved and are available in libraries around the world. They provide new information about the 17th century scientific culture and place of Baglivi's work in the scientific European context. Also, they shed light on his personality more than other writings intended for the public eye. In this paper I will present the case of a theft of intellectual property, which Baglivi described in one of his letters to Jean Jacques Manget.
Scientific Misconduct and Theft: Case Report from 17th Century
Fatović-Ferenčić, Stella
2008-01-01
Gjuro Armen Baglivi was one of the most famous medical authorities of the 17th century. Apart from his numerous books and publications, several extensive collections of his correspondence have been preserved and are available in libraries around the world. They provide new information about the 17th century scientific culture and place of Baglivi’s work in the scientific European context. Also, they shed light on his personality more than other writings intended for the public eye. In this paper I will present the case of a theft of intellectual property, which Baglivi described in one of his letters to Jean Jacques Manget. PMID:18293461
Computer Ethics and Cyber Laws to Mental Health Professionals
Raveesh, B N; Pande, Sanjay
2004-01-01
The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or as theft? Should ordinary communications be encrypted using codes that make it impossible for law-enforcement agencies to perform wiretaps? As we develop shared understandings and norms of behaviour, we are setting standards that will govern the information society for decades to come. PMID:21408035
Computer ethics and cyber laws to mental health professionals.
Raveesh, B N; Pande, Sanjay
2004-04-01
The explosive growth of computer and communications technology raises new legal and ethical challenges that reflect tensions between individual rights and societal needs. For instance, should cracking into a computer system be viewed as a petty prank, as trespassing, as theft, or as espionage? Should placing copyrighted material onto a public file server be treated as freedom of expression or as theft? Should ordinary communications be encrypted using codes that make it impossible for law-enforcement agencies to perform wiretaps? As we develop shared understandings and norms of behaviour, we are setting standards that will govern the information society for decades to come.
Schmidt, Eduardo Morgado; Franco, Marcos Fernando; Cuelbas, Claudio José; Zacca, Jorge Jardim; de Carvalho Rocha, Werickson Fortunato; Borges, Rodrigo; de Souza, Wanderley; Sawaya, Alexandra Christine Helena Frankland; Eberlin, Marcos Nogueira; Correa, Deleon Nascimento
2015-09-01
Using Brazilian banknotes as a test case, forensic examination and identification of Rhodamine B dye anti-theft device (ATD) staining on banknotes were performed. Easy ambient sonic spray ionization mass spectrometry (EASI-MS) was used since it allows fast and simple analysis with no sample preparation providing molecular screening of the surface with direct desorption and ionization of the security dye. For a more accurate molecular characterization of the ATD dye, Q Exactive Orbitrap™ Fourier transform (tandem) mass spectrometry using eletrospray ionization (ESI-HRMS/MS) was also applied. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.
Farrington, David P.; Hipwell, Alison E.; Stepp, Stephanie D.; Pardini, Dustin; Ahonen, Lia
2015-01-01
Introduction The study examines age-crime prevalence and age-crime frequency curves based on longitudinal data from boys in the Pittsburgh Youth Study and girls in the Pittsburgh Girls Study. Results Results show that the prevalence of the age-crime curve for theft and violence (based on self-reports or police charges) followed the typical age-crime curve for males and slightly less distinctly for females, with the peak of offending occurring earlier for self-reports than for police charges. The decrease in police charges for violence and theft took place at an earlier age for females than males, but this was not distinct when self-reported delinquency was the criterion. The mean frequency of self-reported theft and violence followed the age-crime curve for males but not for females, who showed a mean frequency of offending which was more constant. In contrast, the mean frequency of police charges increased with age for males and females. Comparing African-American and Caucasian males and females shows a higher prevalence but not a higher mean frequency of self-reported offending. Conclusions The results are reviewed in the light of other studies, and the policy implications of the findings are discussed. PMID:27610337
Be-safe travel, a web-based geographic application to explore safe-route in an area
NASA Astrophysics Data System (ADS)
Utamima, Amalia; Djunaidy, Arif
2017-08-01
In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.
Energy Theft in the Advanced Metering Infrastructure
NASA Astrophysics Data System (ADS)
McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD PHASE-IN AND SMALL-VOLUME LINE REPORTING REQUIREMENTS § 545.3 Applicability. This subpart applies to manufacturers of motor vehicles. ...
Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?
Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri
2014-09-01
Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.
A Healthy Approach to Fitness Center Security.
ERIC Educational Resources Information Center
Sturgeon, Julie
2000-01-01
Examines techniques for keeping college fitness centers secure while maintaining an inviting atmosphere. Building access control, preventing locker room theft, and suppressing causes for physical violence are discussed. (GR)
... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... the U.S. Centers for Medicare & Medicaid Services. 7500 Security Boulevard, Baltimore, MD 21244 Sign Up / Change Plans ...
NASA Astrophysics Data System (ADS)
Lim, E. K.; Norizan, M. N.; Mohamad, I. S.; Yasin, M. N. M.; Murad, S. A. Z.; Baharum, N. A.; Jamalullail, N.
2017-09-01
This paper presents the design of anti-theft/cable cut real time alert system using microcontroller and GSM technology. The detection part is using the electrical circuit wire connection in detecting the voltage drop of the cable inside the microcontroller digital input port. The GSM wireless modem is used to send the location of cable cut directly to the authority mobile phone. Microcontroller SK40C with Microchip PIC16F887 is used as a controller to control the wireless modem and also the detection device. The device is able to detect and display the location of the cable cut on the LCD display besides of and sending out the location of the cable break to the authority mobile phone wirelessly via SMS.
The Code of the Street and Violent Versus Property Crime Victimization.
McNeeley, Susan; Wilcox, Pamela
2015-01-01
Previous research has shown that individuals who adopt values in line with the code of the street are more likely to experience violent victimization (e.g., Stewart, Schreck, & Simons, 2006). This study extends this literature by examining the relationship between the street code and multiple types of violent and property victimization. This research investigates the relationship between street code-related values and 4 types of victimization (assault, breaking and entering, theft, and vandalism) using Poisson-based multilevel regression models. Belief in the street code was associated with higher risk of experiencing assault, breaking and entering, and vandalism, whereas theft victimization was not related to the street code. The results suggest that the code of the street influences victimization broadly--beyond violence--by increasing behavior that provokes retaliation from others in various forms.
Emotional intelligence and criminal behavior.
Megreya, Ahmed M
2015-01-01
A large body of research links criminality to cognitive intelligence and personality traits. This study examined the link between emotional intelligence (EI) and criminal behavior. One hundred Egyptian adult male offenders who have been sentenced for theft, drug dealing or murder and 100 nonoffenders were administered the Bar-On Emotional Quotient Inventory (EQ-i). The offenders had lower levels of EI than the nonoffenders. In addition, EI varied as a function of the types of offenses. Namely, it decreased in magnitude with crime severity (lowest for murder, higher for drug dealing, and highest for theft). These results converged with the direct/ indirect aggression theory suggesting that indirect aggression requires more social intelligence than physical aggression. Forensic intervention programs should therefore include EI training, especially when violence is involved. © 2014 American Academy of Forensic Sciences.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-01
...The National Highway Traffic Safety Administration (NHTSA) published a document in the Federal Register of June 21, 2010, announcing NHTSA's determination that there were no new model year (MY) 2011 light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention standard. The final rule also identified those vehicle lines that had been granted an exemption from the parts- marking requirements for the 2011 model year and those vehicle lines the agency removed because certain vehicle lines had been discontinued more than 5 years ago. This document corrects certain information published in the SUPPLEMENTARY INFORMATION section and Appendix A-I listing of the final rule. All previous information associated with the published notice remains the same.
Xu, Jianhua
2012-04-01
Using the example of motorcycle ban policy in Guangzhou, the capital of Guangdong province, this article examines how situational crime prevention strategies are used in contemporary urban China. The article argues that although a motorcycle ban policy may reduce motorcycle snatch theft (feiche qiangduo) in Guangzhou, it inevitably caused a problem of displacement. However, some types of displacement are desirable for local government. An argument about drive-away policing is proposed in this article to understand policing styles in contemporary China. In addition, the article argues that motorcycle ban, as a strategy to prevent snatch theft and robbery, is also a strategy to deal with the crisis in police legitimacy. Therefore, crime prevention in China has more social and political significance than just reducing crime.
78 FR 23637 - Identity Theft Red Flags Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... Address Control Issues with Implementing Cloud Computing (May 2010), available at http://www.gao.gov/new.items/d10513.pdf (discussing information security implications of cloud computing); Department of...
77 FR 13449 - Identity Theft Red Flags Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-06
... Address Control Issues with Implementing Cloud Computing (May 2010) (available at http://www.gao.gov/new.items/d10513.pdf ) (discussing information security implications of cloud computing); Department of...
27 CFR 19.561 - Losses in general.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate TTB officer finds that the theft occurred without connivance, collusion, fraud or negligence on..., collusion, fraud, or negligence on the part of the proprietor, owner, consignor, consignee, bailee, or...
Smartphone Theft Prevention Act
Sen. Klobuchar, Amy [D-MN
2014-02-12
Senate - 02/12/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Code of Federal Regulations, 2010 CFR
2010-01-01
... consumer report information. In addition, the purpose of this part is to specify the extent to which... national banks must take to combat consumer fraud and related crimes, including identity theft. (b...
46 CFR 12.805 - Employer requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... material disciplinary actions related to the applicant, such as, but not limited to, violence or assault, theft, drug and alcohol policy violations, and sexual harassment, along with an explanation of the...
Performance improvement in the JCAHO environment of care.
Hill, Scott A
2002-01-01
Using security management to demonstrate performance improvement for JCAHO can be a viable option. The article illustrates how a program for reducing theft became the basis for demonstrating performance improvement.
Avoiding Medical Identity Theft
... was not received, even when there is no money owed Maintain copies of your healthcare records Beware ... learned that a PHR saves time, energy, and money. And it saved my life! A woman's Facebook ...
STOP Identity Theft Act of 2013
Sen. Klobuchar, Amy [D-MN
2013-01-24
Senate - 03/06/2014 Placed on Senate Legislative Calendar under General Orders. Calendar No. 316. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Metal Theft Prevention Act of 2013
Sen. Klobuchar, Amy [D-MN
2013-02-27
Senate - 06/17/2013 Placed on Senate Legislative Calendar under General Orders. Calendar No. 88. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Metal Theft Prevention Act of 2013
Rep. Paulsen, Erik [R-MN-3
2013-02-27
House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
78 FR 63571 - Advisory Council to the Internal Revenue Service; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-24
... Hotel, 2430 Pennsylvania Ave. NW., Potomac Ballroom, Washington, DC 20036. Issues to be discussed... Clients that are Victims of Identity Theft, Guidance to Practitioners Regarding Professional Obligations...
Identity Theft Prevention Act of 2011
Rep. Paul, Ron [R-TX-14
2011-01-07
House - 02/08/2011 Referred to the Subcommittee on Government Organization, Efficiency, and Financial Management . (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Nuclear Security: Target Analysis-rev
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surinder Paul; Gibbs, Philip W.; Bultz, Garl A.
2014-03-01
The objectives of this presentation are to understand target identification, including roll-up and protracted theft; evaluate target identification in the SNRI; recognize the target characteristics and consequence levels; and understand graded safeguards.
Code of Federal Regulations, 2010 CFR
2010-10-01
...-0039 Part 566 2127-0043 Consolidated owners' manual requirements for vehicles and equipment (§§ 571.126... Theft Prevention Standard and Labeling Requirements (parts 541, 565, 567 and § 571.115) 2127-0510...
Teacher Dismissal: Indictment or Conviction for Nonsexual-Related Behavior.
ERIC Educational Resources Information Center
Beezer, Bruce
1990-01-01
Focuses on teacher dismissal for either indictment or conviction under state criminal statutes for crimes such as possession of a controlled substance, theft, embezzlement, public intoxication, and bribery. (MLF)
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
7 CFR 247.28 - Storage and inventory of commodities.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS COMMODITY SUPPLEMENTAL FOOD PROGRAM § 247.28 Storage and... must provide for storage of commodities that protects them from theft, spoilage, damage or destruction...
27 CFR 19.623 - Records of inventories.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of the inventory; (2) The identity of the container(s); (3) The kind and quantity of spirits, denatured spirits, and wines; (4) Any losses (whether by theft, voluntary destruction or otherwise), gains...
Tax Crimes and Identity Theft Prevention Act
Rep. Castor, Kathy [D-FL-14
2013-02-06
House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
... a Consumer Complaint Report Identity Theft Get Your Free Credit Report Register for Do Not Call Get Scam Alerts ... File a claim if you were scammed via money transfer Ed tech, Privacy Workshop FTC, Department of ...
12 CFR 222.83 - Disposal of consumer information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... RESERVE SYSTEM FAIR CREDIT REPORTING (REGULATION V) Duties of Users of Consumer Reports Regarding Identity Theft § 222.83 Disposal of consumer information. (a) Definitions as used in this section. (1) You means...
78 FR 50313 - Physical Protection of Irradiated Reactor Fuel in Transit
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... 100 Grams,'' dated October 10, 2002, and subsequent similar security orders issued to licensees... than 100 grams from theft, diversion, or radiological sabotage. The requirements in the final rule...
Taxpayer Identity Theft Prevention and Enforcement Act of 2014
Rep. Marchant, Kenny [R-TX-24
2014-07-29
House - 09/26/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
No Identity Theft in Health Care Act of 2013
Rep. Holding, George [R-NC-13
2013-12-04
House - 01/27/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
49 CFR Appendix C to Part 591 - Power of Attorney and Agreement
Code of Federal Regulations, 2010 CFR
2010-10-01
... TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) IMPORTATION OF VEHICLES AND EQUIPMENT SUBJECT TO FEDERAL SAFETY, BUMPER AND THEFT PREVENTION STANDARDS Pt. 591, App. C Appendix C to...
76 FR 61147 - Advisory Committee to the Internal Revenue Service; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-03
...-resident alien taxation and tax reporting, withholding tax issues, identity theft, tax credit bonds... changes may preclude advance notice. Due to limited seating and security requirements, please call or e...
Secondary Metal Theft Prevention Act of 2009
Sen. Klobuchar, Amy [D-MN
2009-02-11
Senate - 02/11/2009 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Levin, Carl [D-MI
2014-05-22
Senate - 05/22/2014 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Children and End-State Renal Disease (ERSD)
... get about Medicare Lost/incorrect Medicare card Report fraud & abuse File a complaint Identity theft: protect yourself ... last 3 years by working and paying Social Security taxes. You (or your spouse) are getting, or ...
Self-Powered Human-Interactive Transparent Nanopaper Systems.
Zhong, Junwen; Zhu, Hongli; Zhong, Qize; Dai, Jiaqi; Li, Wenbo; Jang, Soo-Hwan; Yao, Yonggang; Henderson, Doug; Hu, Qiyi; Hu, Liangbing; Zhou, Jun
2015-07-28
Self-powered human-interactive but invisible electronics have many applications in anti-theft and anti-fake systems for human society. In this work, for the first time, we demonstrate a transparent paper-based, self-powered, and human-interactive flexible system. The system is based on an electrostatic induction mechanism with no extra power system appended. The self-powered, transparent paper device can be used for a transparent paper-based art anti-theft system in museums or for a smart mapping anti-fake system in precious packaging and documents, by virtue of the advantages of adding/removing freely, having no impairment on the appearance of the protected objects, and being easily mass manufactured. This initial study bridges the transparent nanopaper with a self-powered and human-interactive electronic system, paving the way for the development of smart transparent paper electronics.
Assessing Mental Models of Emergencies Through Two Knowledge Elicitation Tasks.
Whitmer, Daphne E; Sims, Valerie K; Torres, Michael E
2017-05-01
The goals of this study were to assess the risk identification aspect of mental models using standard elicitation methods and how university campus alerts were related to these mental models. People fail to follow protective action recommendations in emergency warnings. Past research has yet to examine cognitive processes that influence emergency decision-making. Study 1 examined 2 years of emergency alerts distributed by a large southeastern university. In Study 2, participants listed emergencies in a thought-listing task. Study 3 measured participants' time to decide if a situation was an emergency. The university distributed the most alerts about an armed person, theft, and fire. In Study 2, participants most frequently listed fire, car accident, heart attack, and theft. In Study 3, participants quickly decided a bomb, murder, fire, tornado, and rape were emergencies. They most slowly decided that a suspicious package and identify theft were emergencies. Recent interaction with warnings was only somewhat related to participants' mental models of emergencies. Risk identification precedes decision-making and applying protective actions. Examining these characteristics of people's mental representations of emergencies is fundamental to further understand why some emergency warnings go ignored. Someone must believe a situation is serious to categorize it as an emergency before taking the protective action recommendations in an emergency warning. Present-day research must continue to examine the problem of people ignoring warning communication, as there are important cognitive factors that have not yet been explored until the present research.
van der Zanden, Bart P; Dijkgraaf, Marcel G W; Blanken, Peter; van Ree, Jan M; van den Brink, Wim
2007-01-05
To determine the patterns of acquisitive crime during methadone maintenance treatment among chronic, treatment-resistant heroin users eligible for heroin assisted treatment in the Netherlands. We retrospectively assessed the type and number of illegal activities during 1 month of standard methadone maintenance treatment in 51 patients prior to the start of heroin assisted treatment. Data were collected using a semi-structured interview focussed on crime with special emphasis on property crime. Volume analyses consisted of frequencies and descriptives of mean numbers of offences per day and per type. In a Dutch population of problematic drug users eligible for and prior to commencing heroin assisted treatment, 70% reported criminal activities and 50% reported acquisitive crimes. Offending took place on 20.5 days per month with on average 3.1 offences a day. Acquisitive crime consisted mainly of shoplifting (mean 12.8 days, 2.2 times/day) and theft of bicycles (mean 5.8 days, 2.4 times/day); theft from a vehicle and burglaries were committed less frequently. The majority of these patients (63%) reported to have started offending in order to acquire illicit drugs and alcohol. During methadone maintenance treatment, 50% of criminally active, problematic heroin users eligible for heroin assisted treatment reported acquisitive crime. Shoplifting, thefts and/or other property crimes were committed on average two to three times on a crime day. This study discusses that the detail provided by self-reported crime data can improve cost estimates in economic evaluations of heroin assisted treatment.
Effects of media violence on health-related outcomes among young men.
Brady, Sonya S; Matthews, Karen A
2006-04-01
To test the effects of media violence exposure on blood pressure, negative affect, hostile social information processing, uncooperative behavior, and attitudes toward health risk behaviors among young men varying in lifetime violence exposure within the home and community. Experimental laboratory study. University campus situated within an urban environment. One hundred male undergraduates aged 18 to 21 years. Men who had previously reported differing amounts of lifetime home and community violence were randomly assigned to play The Simpsons: Hit and Run (low-violence condition) or Grand Theft Auto III (high-violence condition). Systolic and diastolic blood pressure; negative affect; hostile social information processing; uncooperative behavior; and permissive attitudes toward violence, alcohol use, marijuana use, and sexual activity without condom use. Men randomly assigned to play Grand Theft Auto III exhibited greater increases in diastolic blood pressure from a baseline rest period to game play, greater negative affect, more permissive attitudes toward using alcohol and marijuana, and more uncooperative behavior in comparison with men randomly assigned to play The Simpsons. Only among participants with greater exposure to home and community violence, play of Grand Theft Auto III led to elevated systolic blood pressure in comparison with play of The Simpsons (mean, 13 vs 5 mm Hg). Media violence exposure may play a role in the development of negative attitudes and behaviors related to health. Although youth growing up in violent homes and communities may become more physiologically aroused by media violence exposure, all youth appear to be at risk for potentially negative outcomes.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Application. 567.2 Section 567.2 Transportation..., DEPARTMENT OF TRANSPORTATION CERTIFICATION § 567.2 Application. (a) This part applies to manufacturers... Safety, Bumper and Theft Prevention Standards. ...
Medicare Identity Theft Prevention Act of 2012
Rep. Johnson, Sam [R-TX-3
2011-04-13
Senate - 12/21/2012 Received in the Senate and Read twice and referred to the Committee on Finance. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
32 CFR 842.129 - Settlement of claims against NAFIs.
Code of Federal Regulations, 2012 CFR
2012-07-01
... personal items stolen from onbase gym lockers (discussed below). (1) If a NAF fee has been charged in... lockers will be paid out of appropriated funds providing there is affirmative evidence of theft...
32 CFR 842.129 - Settlement of claims against NAFIs.
Code of Federal Regulations, 2011 CFR
2011-07-01
... personal items stolen from onbase gym lockers (discussed below). (1) If a NAF fee has been charged in... lockers will be paid out of appropriated funds providing there is affirmative evidence of theft...
32 CFR 842.129 - Settlement of claims against NAFIs.
Code of Federal Regulations, 2013 CFR
2013-07-01
... personal items stolen from onbase gym lockers (discussed below). (1) If a NAF fee has been charged in... lockers will be paid out of appropriated funds providing there is affirmative evidence of theft...
32 CFR 842.129 - Settlement of claims against NAFIs.
Code of Federal Regulations, 2010 CFR
2010-07-01
... personal items stolen from onbase gym lockers (discussed below). (1) If a NAF fee has been charged in... lockers will be paid out of appropriated funds providing there is affirmative evidence of theft...
27 CFR 28.303 - Filing of claims.
Code of Federal Regulations, 2010 CFR
2010-04-01
... connivance, collusion, fraud, or negligence on the part of the exporter, owner, consignor, consignee, bailee, or carrier, or the employees or agents of any of them; (j) In the case of a loss by theft, whether...
Social Security Number Fraud and Identity Theft Prevention Act
Rep. Coffman, Mike [R-CO-6
2009-05-19
House - 06/12/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
5 CFR 1690.15 - Freezing an account-administrative holds.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the death of a participant; (4) Upon suspicion or knowledge of fraudulent account activity or identity theft; (5) In response to litigation pertaining to an account; (6) For operational reasons (e.g., to...
5 CFR 1690.15 - Freezing an account-administrative holds.
Code of Federal Regulations, 2011 CFR
2011-01-01
... the death of a participant; (4) Upon suspicion or knowledge of fraudulent account activity or identity theft; (5) In response to litigation pertaining to an account; (6) For operational reasons (e.g., to...
77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... of Automobile Manufacturers requesting an extension of the comment period. The petitioner argued that.... On February 29, 2012, the Alliance of Automobile Manufacturers (Alliance) sent a letter to NHTSA...
49 CFR 591.5 - Declarations required for importation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... such as mirrors, wipers, or tire and rim assemblies, or minor finishing operations such as painting...
49 CFR 591.5 - Declarations required for importation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... such as mirrors, wipers, or tire and rim assemblies, or minor finishing operations such as painting...
49 CFR 591.5 - Declarations required for importation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... such as mirrors, wipers, or tire and rim assemblies, or minor finishing operations such as painting...
49 CFR 591.5 - Declarations required for importation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... such as mirrors, wipers, or tire and rim assemblies, or minor finishing operations such as painting...
49 CFR 591.5 - Declarations required for importation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... roads and thus is not a motor vehicle subject to the Federal motor vehicle safety, bumper, and theft... such as mirrors, wipers, or tire and rim assemblies, or minor finishing operations such as painting...
75 FR 61853 - Advisory Committee to the Internal Revenue Service; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... taxation and tax reporting, withholding tax issues, Identity Theft, Form 1099-DIV, Box 10, foreign tax paid... basis allocation for direct rollovers. Last minute agenda changes may preclude advance notice. Due to...
75 FR 15621 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-30
... Transportation (DOT). ACTION: Final rule. SUMMARY: Pursuant to a statutory mandate in the Cameron Gulbransen Kids.... Statutory Mandate and Background On February 28, 2008, the ``Cameron Gulbransen Kids Transportation Safety...
Code of Federal Regulations, 2010 CFR
2010-07-01
... OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING U.S. SAVINGS BONDS, SERIES A, B, C, D, E, F, G, H, J, AND K, AND U.S. SAVINGS NOTES Relief for Loss, Theft, Destruction, Mutilation...
32 CFR 310.14 - Notification when information is lost, stolen, or compromised.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., social security numbers, and dates of birth are involved, it is critical that the individual be advised... the Federal Trade Commission's public Web site on identity theft at http://www.consumer.gov/idtheft...
Private Right of Action Against Theft of Trade Secrets Act of 2013
Rep. Lofgren, Zoe [D-CA-19
2013-06-20
House - 07/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Antitheft container for instruments
NASA Technical Reports Server (NTRS)
Kerley, J. J., Jr.
1979-01-01
Antitheft container is used to prevent theft of calculators, portable computers, and other small instruments. Container design is simple and flexible enough to allow easy access to display or input systems of instruments, while not interfering with power input to device.
STOP Identity Theft Act of 2014
Rep. Wasserman Schultz, Debbie [D-FL-23
2013-02-15
Senate - 09/09/2014 Received in the Senate. Read twice. Placed on Senate Legislative Calendar under General Orders. Calendar No. 555. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
..., transmitter key, electronic ignition starter switch control unit (EIS), the engine control module (ECM) and... immobilizer function. The interlinked system includes the engine, EIS, transmitter key, TCM and ECM (including...
26 CFR 20.2054-1 - Deduction for losses from casualties or theft.
Code of Federal Regulations, 2010 CFR
2010-04-01
... (CONTINUED) ESTATE AND GIFT TAXES ESTATE TAX; ESTATES OF DECEDENTS DYING AFTER AUGUST 16, 1954 Taxable Estate... during the settlement of the estate arising from fires, storms, shipwrecks, or other casualties, or from...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
...) transceiver and a microprocessor and it initiates the ignition process by communicating with the BCM through SKIS. The microprocessor-based SKIS hardware and software also use electronic messages to communicate...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-30
... (RFHM), Ignition Node Module (IGNM), Engine Control Module, Body Controller Module, Sentry Key... disable engine operation and immobilize the vehicle after two seconds of running. This process is also...
78 FR 47009 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... action to submit an information collection request to the Office of Management and Budget (OMB) and... accounting programs and to confirm the absence of (or detect the occurrence of) SNM theft or diversion. NUREG...
ERIC Educational Resources Information Center
Vail, Kathleen
1995-01-01
Biometrics (hand geometry, iris and retina scanners, voice and facial recognition, signature dynamics, facial thermography, and fingerprint readers) identifies people based on physical characteristics. Administrators worried about kidnapping, vandalism, theft, and violent intruders might welcome these security measures when they become more…
Chemical Safety Alert: Anhydrous Ammonia Theft
This extremely hazardous substance is largely used as an agricultural fertilizer, but is also a key ingredient in the illegal production of methamphetamines. It is stored as a liquid under pressure, but becomes a toxic gas when released.
31 CFR 315.29 - Adjudication of claims.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING U.S. SAVINGS BONDS, SERIES A, B, C, D, E, F, G, H, J, AND K, AND U.S. SAVINGS NOTES Relief for Loss, Theft, Destruction...
Scantlebury, David M; Mills, Michael G L; Wilson, Rory P; Wilson, John W; Mills, Margaret E J; Durant, Sarah M; Bennett, Nigel C; Bradford, Peter; Marks, Nikki J; Speakman, John R
2014-10-03
Population viability is driven by individual survival, which in turn depends on individuals balancing energy budgets. As carnivores may function close to maximum sustained power outputs, decreased food availability or increased activity may render some populations energetically vulnerable. Prey theft may compromise energetic budgets of mesopredators, such as cheetahs and wild dogs, which are susceptible to competition from larger carnivores. We show that daily energy expenditure (DEE) of cheetahs was similar to size-based predictions and positively related to distance traveled. Theft at 25% only requires cheetahs to hunt for an extra 1.1 hour per day, increasing DEE by just 12%. Therefore, not all mesopredators are energetically constrained by direct competition. Other factors that increase DEE, such as those that increase travel, may be more important for population viability. Copyright © 2014, American Association for the Advancement of Science.
Andrijcic, Eva; Horowitz, Barry
2006-08-01
The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.
Investigation of natural gas theft by magnetic remanence mapping.
Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B
2014-12-01
Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Obstruction of critical information on over-the-counter medication packages by external tags.
Sansgiry, Sujit S; Pawaskar, Manjiri D
2005-02-01
Over-the-counter (OTC) medication packages are important sources of information for consumers during product selection and use. Consumers may not be able to access information from OTC packages if external tags, namely price or anti-theft tags, are improperly placed. To determine the amount and type of information concealed by anti-theft tags and price tags affixed on OTC drug packages. A field study was performed by evaluating packages containing acetaminophen and combinations of acetaminophen in stores located in Houston. Five packages for 4 products selected from each store after an initial survey for presence of an external tag were examined. A data collection sheet was prepared that extracted the type and amount of information concealed by these tags. Data were analyzed by performing descriptive analyses to provide an understanding of the information obscured. A total of 24 stores were considered in the study, and 67 products and 285 packages were evaluated. External tags, both anti-theft and price tags, obscured significant amounts of information on the principal display panel (53.4%) and the Drug Facts panel (47.7%) of OTC packages. These tags concealed crucial information on various aspects of labels such as brand names (42.3%), product description (36.3%), warnings (51.5%), uses (10.4%), and purposes (7.2%). Results suggest that improper use of external tags clearly obscured important information on OTC medication packages necessary for consumers to make informed decisions regarding product selection and use. Tagging practices should be altered to allow consumers full access to drug information on the product.
Risk management and security services interaction--a must in today's health care environment.
Stultz, M S
1990-01-01
The author shows why risk managers and security directors are natural partners in the effort of a hospital to reduce risks from such occurrences as baby kidnappings, serial killers, thefts, and rapes/sexual assaults.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Definitions. 543.4 Section 543.4 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.4 Definitions. (a...
Organized Retail Theft Investigation and Prosecution Act of 2010
Rep. Scott, Robert C. "Bobby" [D-VA-3
2010-07-29
Senate - 09/29/2010 Received in the Senate and Read twice and referred to the Committee on the Judiciary. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Smile, Vandals--You're on Candid Camera.
ERIC Educational Resources Information Center
Lebowitz, Michelle
1997-01-01
Describes the Huntsville, Alabama, school district's use of surveillance cameras and other high-tech equipment to ward off arson, theft, and vandalism. Discusses how these efforts reduced repair and replacement costs and helped the district retain its insurance coverage. (GR)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-03
...), Ignition Node Module (IGNM), Engine Control Module (ECM), Body Controller Module (BCM), Sentry Key..., Chrysler stated that the RFHM sends an invalid key message to the ECM, which will disable engine operation...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
...), assembly, transponder key amplifier, security indicator, ignition key and Electronic control module (ECM... been verified, the immobilizer allows the ECM to start the engine. Toyota also stated that there will...
76 FR 8400 - National Highway Traffic Safety Administration
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-14
... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety Administration (NHTSA) Department of Transportation (DOT). ACTION: Grant of petition for exemption. SUMMARY: This...
16 CFR 682.2 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT DISPOSAL OF CONSUMER REPORT... consumer fraud and related harms, including identity theft, created by improper disposal of consumer... jurisdiction, that, for a business purpose, maintains or otherwise possesses consumer information. ...
Guilty by his fibers: suspect confession versus textile fibers reconstructed simulation.
Suzuki, Shinichi; Higashikawa, Yoshiyasu; Sugita, Ritsuko; Suzuki, Yasuhiro
2009-08-10
In one particular criminal case involving murder and theft, the arrested suspect admitted to the theft, but denied responsibility for the murder of the inhabitant of the crime scene. In his confession, the suspect stated that he found the victim's body when he broke into the crime scene to commit theft. For this report, the actual crime scene was reconstructed in accordance with the confession obtained during the interrogation of the suspect, and suspect behavior was simulated in accord to the suspect confession. The number of characteristic fibers retrieved from the simulated crime scene was compared with those of retrieved from the actual crime scene. By comparing the distribution and number of characteristic fibers collected in the simulation experiments and the actual investigation, the reliability of the suspect's confession was evaluated. The characteristic dark yellowish-green woolen fibers of the garment that the suspect wore when he entered the crime scene were selected as the target fiber in the reconstruction. The experimental simulations were conducted four times. The distributed target fibers were retrieved using the same type of adhesive tape and the same protocol by the same police officers who conducted the retrieval of the fibers at the actual crime scene. The fibers were identified both through morphological observation and by color comparisons of their ultaviolet-visible transmittance spectra measured with a microspectrophotometer. The fibers collected with the adhesive tape were counted for each area to compare with those collected in the actual crime scene investigation. The numbers of fibers found at each area of the body, mattress and blankets were compared between the simulated experiments and the actual investigation, and a significant difference was found. In particular, the numbers of fibers found near the victim's head were significantly different. As a result, the suspect's confession was not considered to be reliable, as a stronger contact with the victim was demonstrated by our simulations. During the control trial, traditional forensic traces like DNA or fingerprints were mute regarding the suspect's says. At the opposite, the fiber intelligence was highly significant to explain the suspect's behavior at the crime scene. The fiber results and simulations were presented at the court and the man was subsequently found guilty not only of theft and trespassing but also murder.
32 CFR Appendix D to Part 154 - Reporting of Nonderogatory Cases
Code of Federal Regulations, 2010 CFR
2010-07-01
... abuse of drugs or alcohol, theft or dishonesty, unreliability, irresponsibility, immaturity, instability... promiscuity, aberrant, deviant, or bizarre sexual conduct or behavior, transvestitism, transsexualism, indecent exposure, rape, contributing to the delinquency of a minor, child molestation, wife-swapping...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Application. 543.3 Section 543.3 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION EXEMPTION FROM VEHICLE THEFT PREVENTION STANDARD § 543.3 Application. This part...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 6 2010-10-01 2010-10-01 false Scope. 541.1 Section 541.1 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD § 541.1 Scope. This standard...