410 research outputs found

    Home Mortgage Lender Settles Predatory Lending Charges

    Get PDF

    Citi Settles FTC Charges for Subprime Lending

    Get PDF

    Privacy mediators:helping IoT cross the chasm

    Get PDF
    Unease over data privacy will retard consumer acceptance of IoT deployments. The primary source of discomfort is a lack of user control over raw data that is streamed directly from sensors to the cloud. This is a direct consequence of the over-centralization of today’s cloud-based IoT hub designs. We propose a solution that interposes a locally-controlled software component called a privacy mediator on every raw sensor stream. Each mediator is in the same administrative domain as the sensors whose data is being collected, and dynamically enforces the current privacy policies of the owners of the sensors or mobile users within the domain. This solution necessitates a logical point of presence for mediators within the administrative boundaries of each organization. Such points of presence are provided by cloudlets, which are small locally-administered data centers at the edge of the Internet that can support code mobility. The use of cloudlet-based mediators aligns well with natural personal and organizational boundaries of trust and responsibility

    Price effects of a hospital merger: Heterogeneity across health insurers, hospital products, and hospital locations

    Get PDF
    In most studies on hospital merger effects, the unit of observation is the merged hospital, whereas the observed price is the weighted average across hospital products and across payers. However, little is known about whether price effects vary between hospital locations, products, and payers. We expand existing bargaining models to allow for heterogeneous price effects and use a difference-in-differences model in which price changes at the merging hospitals are compared with price changes at comparison hospitals. We find evidence of heterogeneous price effects across health insurers, hospital products and hospital locations. These findings have implications for ex ante merger scrutiny

    Agencies Issue Proposed Rules on Risk-Based Pricing Notices

    Get PDF

    Young children’s food brand knowledge. Early development and associations with television viewing and parent’s diet

    Get PDF
    Brand knowledge is a prerequisite of children’s requests and choices for branded foods. We explored the development of young children’s brand knowledge of foods highly advertised on television – both healthy and less healthy. Participants were 172 children aged 3–5 years in diverse socio-economic settings, from two jurisdictions on the island of Ireland with different regulatory environments. Results indicated that food brand knowledge (i) did not differ across jurisdictions; (ii) increased significantly between 3 and 4 years; and (iii) children had significantly greater knowledge of unhealthy food brands, compared with similarly advertised healthy brands. In addition, (iv) children’s healthy food brand knowledge was not related to their television viewing, their mother’s education, or parent or child eating. However, (v) unhealthy brand knowledge was significantly related to all these factors, although only parent eating and children’s age were independent predictors. Findings indicate that effects of food marketing for un- healthy foods take place through routes other than television advertising alone, and are present before pre-schoolers develop the concept of healthy eating. Implications are that marketing restrictions of un- healthy foods should extend beyond television advertising; and that family-focused obesity prevention programmes should begin before children are 3 years of age

    Assessment of impediments to competition in the pharmaceutical sector in Jamaica : supplementary volume; comparative in vitro dissolution and biopharmaceutical properties of some multi-source antihypertensive drug products marketed in Jamaica

    Get PDF
    A study has been done on the biopharmaceutical properties of antihypertensive drug products marketed in Jamaica. Four pharmacological classes of antihypertensive drugs were selected: Beta blocker (Atenolol), Angiotensine Converting Enzyme inhibitors (ACEI), Diuretics and Central Alpha Blocker (Methyldopa). Products were tested for uniformity of weight, content of active ingredients (assay) and dissolution rates, following the British Pharmacopoeia/USP procedures. It was observed that products contained the required level of active ingredients. However, some products make the active ingredient available for absorption faster and to a greater extend than others. Results generally suggest that more than company reputation and cost is required for making rational decisions on drug product selection

    The Problem of Patent Thickets in Convergent Technologies

    Full text link
    Patent thickets are unintentionally dense webs of overlapping intellectual property rights owned by different companies that can retard progress. This article begins with a review of existing research on patent thickets, focusing in particular on the problem of patent thickets in nanotechnology, or nanothickets. After presenting visual evidence of the presence of nanothickets using a network analytic technique, it discusses potential organizational responses to patent thickets. It then reviews the existing research on patent pools and discusses pool formation in the shadow of antitrust enforcement. Based on recent research on patent pool formation, it examines the divergent fate of two recent pools and discusses the prospects for the future formation of nanotechnology patent pools, or nanopools.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/72678/1/annals.1382.014.pd

    Cosmology from HI galaxy surveys with the SKA

    Get PDF
    The Square Kilometer Array (SKA) has the potential to produce galaxy redshift surveys which will be competitive with other state of the art cosmological experiments in the next decade. In this chapter we summarise what capabilities the first and the second phases of the SKA will be able to achieve in its current state of design. We summarise the different cosmological experiments which are outlined in further detail in other chapters of this Science Book. The SKA will be able to produce competitive Baryonic Oscillation (BAOs) measurements in both its phases. The first phase of the SKA will provide similar measurements as optical and IR experiments with completely different systematic effects whereas the second phase being transformational in terms of its statistical power. The SKA will produce very accurate Redshift Space Distortions (RSD) measurements, being superior to other experiments at lower redshifts, due to the large number of galaxies. Cross correlations of the galaxy redshift data from the SKA with radio continuum surveys and optical surveys will provide extremely good calibration of photometric redshifts as well as extremely good bounds on modifications of gravity. Basing on a Principle Component Analysis (PCA) approach, we find that the SKA will be able to provide competitive constraints on dark energy and modified gravity models. Due to the large area covered the SKA it will be a transformational experiment in measuring physics from the largest scales such as non-Gaussian signals from fnl\textrm{f}_{\textrm{nl}}. Finally, the SKA might produce the first real time measurement of the redshift drift. The SKA will be a transformational machine for cosmology as it grows from an early Phase 1 to its full power

    Web Vulnerability Study of Online Pharmacy Sites

    Get PDF
    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems
    • 

    corecore