113,570 research outputs found
Can the general fraud offence 'get the law right'? Some perspectives on the 'problem' of financial crime
The Fraud Bill, which received Royal Assent on 8 November 2006, created an offence of fraud in English criminal law which marks a departure of utmost significance from the approach adopted hitherto, whereby a number of related offences cover behaviour deemed to amount to fraud. To mark the passage of the Fraud Act 2006 into law, this article examines the references which were made during its consideration in Parliament to fraud as activity which is serious and which is often erroneously portrayed as 'victimless' crime. In joining these key criminal policy-making debates with academic study of white-collar crime, it will be suggested that as yet too little attention is being paid to 'ambiguous' popular perceptions of financial crimes for there to be confidence that the fraud offence will, in the words of the current Solicitor-General, 'get the law right'
Fingolimod modulates microglial activation to augment markers of remyelination
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
The sustainable delivery of sexual violence prevention education in schools
Sexual violence is a crime that cannot be ignored: it causes our communities significant
consequences including heavy economic costs, and evidence of its effects can be seen in our
criminal justice system, public health system, Accident Compensation Corporation (ACC),
and education system, particularly in our schools. Many agencies throughout New Zealand
work to end sexual violence. Auckland-based Rape Prevention Education: Whakatu Mauri
(RPE) is one such agency, and is committed to preventing sexual violence by providing a
range of programmes and initiatives, information, education, and advocacy to a broad range
of audiences.
Up until early 2014 RPE employed one or two full-time positions dedicated to co-ordinating
and training a large pool (up to 15) of educators on casual contracts to deliver their main
school-based programmes, BodySafe â approximately 450 modules per year, delivered to
some 20 high schools. Each year several of the contract educators, many of whom were
tertiary students, found secure full time employment elsewhere. To retain sufficient
contract educators to deliver its BodySafe contract meant that RPE had to recruit, induct
and train new educators two to three times every year. This model was expensive, resource
intense, and ultimately untenable. The Executive Director and core staff at RPE wanted to
develop a more efficient and stable model of delivery that fitted its scarce resources.
To enable RPE to know what the most efficient model was nationally and internationally,
with Ministry of Justice funding, RPE commissioned Massey University to undertake this
report reviewing national and international research on sexual violence prevention
education (SVPE). [Background from Executive Summary.]Rape Prevention Education: Whakatu Maur
Recommended from our members
A lymphoma plasma membrane-associated protein with ankyrin-like properties.
In this study we have used several complementary techniques to isolate and characterize a 72-kD polypeptide that is tightly associated with a major mouse T-lymphoma membrane glycoprotein, gp 85 (a wheat germ agglutinin-binding protein), in a 16 S complex. These two proteins do not separate in the presence of high salt but can be dissociated by treatment with 2 M urea. Further analysis indicates that the 72-kD protein has ankyrin-like properties based on the following criteria: (a) it cross-reacts with specific antibodies raised against erythrocyte and brain ankyrin; (b) it displays a peptide mapping pattern and a pI (between 6.5 and 6.8) similar to that of the 72-kD proteolytic fragment of erythrocyte ankyrin; (c) it competes with erythrocyte ghost membranes (spectrin-depleted preparations) for spectrin binding; and (d) it binds to purified spectrin and fodrin molecules. Most importantly, in intact lymphoma cells this ankyrin-like protein is localized directly underneath the plasma membrane and is found to be preferentially accumulated beneath receptor cap structures as well as associated with a membrane-cytoskeleton complex preparation. It is proposed that the ankyrin-like 72-kD protein may play an important role in linking certain surface glycoprotein(s) to fodrin which, in turn, binds to actin filaments required for lymphocyte cap formation
Light-Cone Quantization and Hadron Structure
In this talk, I review the use of the light-cone Fock expansion as a
tractable and consistent description of relativistic many-body systems and
bound states in quantum field theory and as a frame-independent representation
of the physics of the QCD parton model. Nonperturbative methods for computing
the spectrum and LC wavefunctions are briefly discussed. The light-cone Fock
state representation of hadrons also describes quantum fluctuations containing
intrinsic gluons, strangeness, and charm, and, in the case of nuclei, "hidden
color". Fock state components of hadrons with small transverse size, such as
those which dominate hard exclusive reactions, have small color dipole moments
and thus diminished hadronic interactions; i.e., "color transparency". The use
of light-cone Fock methods to compute loop amplitudes is illustrated by the
example of the electron anomalous moment in QED. In other applications, such as
the computation of the axial, magnetic, and quadrupole moments of light nuclei,
the QCD relativistic Fock state description provides new insights which go well
beyond the usual assumptions of traditional hadronic and nuclear physics.Comment: LaTex 36 pages, 3 figures. To obtain a copy, send e-mail to
[email protected]
Lorenz System Parameter Determination and Application to Break the Security of Two-channel Chaotic Cryptosystems
This paper describes how to determine the parameter values of the chaotic
Lorenz system used in a two-channel cryptosystem. The geometrical properties of
the Lorenz system are used firstly to reduce the parameter search space, then
the parameters are exactly determined, directly from the ciphertext, through
the minimization of the average jamming noise power created by the encryption
process.Comment: 5 pages, 5 figures Preprint submitted to IEEE T. Cas II, revision of
authors name spellin
Local Operations and Completely Positive Maps in Algebraic Quantum Field Theory
Einstein introduced the locality principle which states that all physical
effect in some finite space-time region does not influence its space-like
separated finite region. Recently, in algebraic quantum field theory, R\'{e}dei
captured the idea of the locality principle by the notion of operational
separability. The operation in operational separability is performed in some
finite space-time region, and leaves unchanged the state in its space-like
separated finite space-time region. This operation is defined with a completely
positive map. In the present paper, we justify using a completely positive map
as a local operation in algebraic quantum field theory, and show that this
local operation can be approximately written with Kraus operators under the
funnel property
Online and offline heuristics for inferring hierarchies of repetitions in sequences
Hierarchical dictionary-based compression schemes form a grammar for a text by replacing each repeated string with a production rule. While such schemes usually operate online, making a replacement as soon as repetition is detected, offline operation permits greater freedom in choosing the order of replacement. In this paper, we compare the online method with three offline heuristics for selecting the next substring to replace: longest string first, most common string first, and the string that minimized the size of the grammar locally. Surprisingly, two of the offline techniques, like the online method, run in time linear in the size of the input. We evaluate each technique on artificial and natural sequences. In general, the locally-most-compressive heuristic performs best, followed by most frequent, the online technique, and, lagging by some distance, the longest-first technique
- âŠ