1,637 research outputs found

    Global Cyber Intermediary Liability: A Legal & Cultural Strategy

    Get PDF
    This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some level of injunctive relief, intermediaries operate in a largely unregulated environment. Part III looks at what we can learn from other countries. The cleanest intermediary country, Finland, and the worst country, Lithuania, were selected in order to explore the causes for the differences between country performances. The section examines the remarkable distinctions between national cultures to explain differences in national cybercrime rates. Part III.A of this Article argues that the criminal code laws do not account for the difference in host and ISP performances between Finland and Lithuania. There are few differences in the codified laws pertaining to cybercrime between these countries. Instead, it is Finland’s cultural and business environments that appear to drive its cybercrime ranking. Part IV suggests reforms to shift a country’s culture to make it less prone to corruption. However, changing a culture takes time so Part IV also proposes a private law scheme in which intermediaries are unable to wave the “flag of immunity,” as they do now. The guiding philosophy for this proposal is that harmed parties should be permitted to recover damages directly from “bad” intermediaries

    EMASS (trademark): An expandable solution for NASA space data storage needs

    Get PDF
    The data acquisition, distribution, processing, and archiving requirements of NASA and other U.S. Government data centers present significant data management challenges that must be met in the 1990's. The Earth Observing System (EOS) project alone is expected to generate daily data volumes greater than 2 Terabytes (2 x 10(exp 12) Bytes). As the scientific community makes use of this data, their work will result in larger, increasingly complex data sets to be further exploited and managed. The challenge for data storage systems is to satisfy the initial data management requirements with cost effective solutions that provide for planned growth. The expendable architecture of the E-Systems Modular Automated Storage System (EMASS(TM)), a mass storage system which is designed to support NASA's data capture, storage, distribution, and management requirements into the 21st century is described

    EMASS (tm): An expandable solution for NASA space data storage needs

    Get PDF
    The data acquisition, distribution, processing, and archiving requirements of NASA and other U.S. Government data centers present significant data management challenges that must be met in the 1990's. The Earth Observing System (EOS) project alone is expected to generate daily data volumes greater than 2 Terabytes (2(10)(exp 12) Bytes). As the scientific community makes use of this data their work product will result in larger, increasingly complex data sets to be further exploited and managed. The challenge for data storage systems is to satisfy the initial data management requirements with cost effective solutions that provide for planned growth. This paper describes the expandable architecture of the E-Systems Modular Automated Storage System (EMASS (TM)), a mass storage system which is designed to support NASA's data capture, storage, distribution, and management requirements into the 21st century

    Toward the advancement of tetraphosphine ligand synthesis for homogeneous bimetallic catalysis

    Get PDF
    A tetraphosphine ligand rac-et,ph-P4 (Et2PCH2CH2(Ph)PCH2P(Ph)CH2CH2PEt2) is used for the formation of a highly active and regioselective bimetallic hydroformylation catalyst. The proposed active catalytic species in acetone, [Rh2H2(µ-CO)2(rac-et,ph- P4)]2+, is formed in situ under H2/CO pressure. This is one of the most impressive examples of cooperativity in homogeneous catalysis. The fragmentation of this catalyst by CO has been investigated and confirmed by in situ NMR spectroscopic studies. A new tetraphosphine ligand rac-et,ph-P4-Ph (et,ph-P4-Ph = Et2P(o-C6H4)P(Ph)CH2(Ph)P(o-C6H4)PEt2) has been synthesized to combat this fragmentation problem. However, the inability to successfully separate the meso and racemic diastereomers led to the attempted alteration of the et,ph-P4 tetraphosphine ligand. Where the et,ph-P4-Ph ligand attempts to change the traditional ligand via altering the carbon system between internal and external phosphines, these systems attempt to replace the methylene linker between the internal phosphines with an amine linker. Experimentation has been conducted on the basis of a retrosynthetic analysis with the possibility of two pathways for formation of these aza-bridged ligands. The first synthetic route involves a simple Grignard-mediated phosphorus-carbon coupling reaction between an amine bridge of the type RN(PhPCl)2 with the “small arm” phosphine moiety Et2P(o-C6H4)I. Impurities in the starting material and decreased reactivity of the amine bridge led to results that were undesirable. The second synthetic route relies upon coupling of the “large arm” phosphine moiety Et2P(o-C6H4)PPhCl with a primary amine to afford the desired ligand. This route was also unsuccessful due to the inability to obtain the pure phosphorus compound due to the “large arm” reaction not consistently going to completion

    Vendor Engagement Kaizen Framework Incorporating Risk And Reward Sharing In Lean Manufacturing Practice

    Get PDF
    Lean manufacturing seeks Kaizen in terms of quality, cost and cycle time. A robust problem-solving often extends to external parties such as vendors, to draw in their unique technology resources and knowledge. The perusal of contemporary peer-reviewed literature reveals limited academic investigation onto such form of partnership; particularly vendor engagement having elements of properly defined risk and reward sharing. In this premise, Vendor Risk and Reward Sharing – Kaizen (VRRS-Kaizen) framework was proposed as a generic and holistic prescriptive system to guide personnel to duly deal with vendors. The objective of the framework is to ensure systematic and effective practice. Plan-Do-Check-Act underpins the framework and dichotomises the relevant stages of Kaizen. VRRS-Kaizen commences with the identification by Kaizen Team for the need of calling in vendors for countermeasure development. Lean tools, proof of concept and multi-criteria scoring methods were used for assessments in the framework. Framework verification was performed through three case studies at an electronic measurement system company in Penang. Their scopes involve 100% elimination of device under test high internal temperature failures (Case Study One), reduction of high workstation electricity by 60.9% and maintenance charges by 55.6% (Case Study Two) and mitigation of high freight charges of Packaging Assembly 64A by 24% (Case Study Three). Evidently different in nature, these three cases have been successfully deployed following the framework. In total, these were translated into RM 204,105.86 in return (between 2017 to 2018), of which 45.52% was shared with vendors as financial reward sharing. The research objectives have been achieved

    Examining the Role of Agitation and Aggression in Perceived Caregiver Burden

    Get PDF
    Recent research efforts in the area of dementia have revealed that the affected patients are not the only people that are impacted by this disorder. There are hidden victims that, more often than not, go unnoticed. These people are the caregivers, often family members, of a dementia patient. More and more attention is being focused on caregiver burden because it has been found that caring for a dementia patient can lead to medical and psychological problems in the caregiver. The purpose of this study was to determine if a positive correlation exists between the caregivers perceived burden and the patient\u27s degree of agitation and aggression. Preliminary results do indicate a positive correlation between agitation and perceived caregiver burden. The results of this study will be important in helping the neuropsychologist develop appropriate intervention for the dementia patient and his/her caregiver

    Solar-Powered Hot Tub

    Get PDF
    This paper discusses the design and implementation of a solar-powered hot tub. The concept of this project was to design an independently-operated hot tub powered by a 12V rechargeable battery, charged during the day by a single 400W solar panel. For this purpose, a twenty-year-old name-brand hot tub was purchased, in used condition. The plumbing, AC electrical wiring, and mechanical pumps were all removed and replaced with new components to meet our design specifications. Additionally, a solar water-heater was designed and integrated into the system to directly apply the sun’s heat to water pumped in and out of the tub, which significantly reduced the power budget for the system. Furthermore, the tub structure was fitted with energy efficient LED lighting for night-time use. Lastly, a user-friendly control and display unit was designed and embedded into the tub’s mechanical structure to allow owners to adjust and set modes of operation, jet and heat cycle times, and lighting options. Our design allows an owner to continually power their hot tub at no additional cost every month. This project served as a channel through which much of our studies in microelectronic, embedded system, and power system design got put into practice

    1597 Polymorphism and Preterm Birth in African American Mothers

    Get PDF

    The Health Benefits of Nature: Introduction to the Special Section

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/88004/1/j.1758-0854.2011.01056.x.pd
    corecore