Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 146
Filtrar
1.
Front Genet ; 15: 1380637, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39050256

RESUMO

Individuals harboring breast cancer gene 1/2 (BRCA1/2) pathogenic variants are at increased lifetime risk for developing cancer. Learning one's BRCA1/2 carrier status is a watershed moment that can result in psychological distress, anxiety, and depression, as well as feelings of vulnerability and stigma. However, emotional and coping responses to learning one's BRCA1/2 carrier status and after risk-reducing interventions (i.e., preventative bilateral mastectomy) are variable, and existing literature reveals mixed and sometimes contradictory results. Drawing on the concept of narrative identity from the field of psychology, we sought to examine if "identity theft" (the sudden overtaking of one's narrative agency by an external force) may help explain the heterogeneity of emotional and coping responses following the revelation of BRCA carrier status and the subsequent medical intervention one may receive. This Perspective explores BRCA related identity theft using two case studies. Narrative analysis of qualitative interviews uncover the ways that patients experience the disintegration (theft) of their identity as well as their efforts to build and reintegrate a new BRCA carrier identity. This initial qualitative exploration provides preliminary support for the relevance of narrative identity and identity theft to hereditary cancer. We posit that applying the lens of identity theft may hold promise as a unifying concept, integrating across the variable emotional and coping responses among BRCA carriers. Employing a lens of identity theft may help inform the development of tailored narrative interventions as part of precision healthcare to support active coping and psychosocial wellbeing.

2.
Australas Psychiatry ; : 10398562241261818, 2024 Jun 14.
Artigo em Inglês | MEDLINE | ID: mdl-38875170

RESUMO

Increasing numbers of healthcare data breaches highlight the need for structured organisational responses to protect patients, trainees and psychiatrists against identity theft and blackmail. Evidence-based guidance that is informed by the COVID-19 pandemic response includes: timely and reliable information tailored to users' safety, encouragement to take protective action, and access to practical and psychological support. For healthcare organisations which have suffered a data breach, insurance essentially improves access to funded cyber security responses, risk communication and public relations. Patients, trainees and psychiatrists need specific advice on protective measures. Healthcare data security legislative reform is urgently needed.

3.
MycoKeys ; 105: 253-266, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38855319

RESUMO

This paper, with Italy as a case-study, provides a general overview on the ecology of lichenicolous lichens, i.e. those which start their life-cycle on the thallus of other lichens. It aims at testing whether some ecological factors do exert a positive selective pressure on the lichenicolous lifestyle. The incidence of some biological traits (photobionts, growth-forms and reproductive strategies) in lichenicolous and non-lichenicolous lichens was compared, on a set of 3005 infrageneric taxa potentially occurring in Italy, 189 of which are lichenicolous. Lichenicolous lichens have a much higher incidence of coccoid (non-trentepohlioid) green algae, crustose growth-forms and sexual reproduction. A matrix of the 2762 species with phycobionts and some main ecological descriptors was subjected to ordination. Lichenicolous lichens occupy a well-defined portion of the ecological space, tending to grow on rocks in dry, well-lit habitats where a germinating spore is likely to have a short life-span, at all altitudes. This corroborates the hypothesis that at least some of them are not true "parasites", as they are often called, but gather the photobionts - which have already adapted to local ecological conditions - from their hosts, eventually developing an independent thallus.

4.
Sensors (Basel) ; 24(10)2024 May 20.
Artigo em Inglês | MEDLINE | ID: mdl-38794091

RESUMO

Smart power grids suffer from electricity theft cyber-attacks, where malicious consumers compromise their smart meters (SMs) to downscale the reported electricity consumption readings. This problem costs electric utility companies worldwide considerable financial burdens and threatens power grid stability. Therefore, several machine learning (ML)-based solutions have been proposed to detect electricity theft; however, they have limitations. First, most existing works employ supervised learning that requires the availability of labeled datasets of benign and malicious electricity usage samples. Unfortunately, this approach is not practical due to the scarcity of real malicious electricity usage samples. Moreover, training a supervised detector on specific cyberattack scenarios results in a robust detector against those attacks, but it might fail to detect new attack scenarios. Second, although a few works investigated anomaly detectors for electricity theft, none of the existing works addressed consumers' privacy. To address these limitations, in this paper, we propose a comprehensive federated learning (FL)-based deep anomaly detection framework tailored for practical, reliable, and privacy-preserving energy theft detection. In our proposed framework, consumers train local deep autoencoder-based detectors on their private electricity usage data and only share their trained detectors' parameters with an EUC aggregation server to iteratively build a global anomaly detector. Our extensive experimental results not only demonstrate the superior performance of our anomaly detector compared to the supervised detectors but also the capability of our proposed FL-based anomaly detector to accurately detect zero-day attacks of electricity theft while preserving consumers' privacy.

5.
Behav Sci (Basel) ; 14(4)2024 Mar 24.
Artigo em Inglês | MEDLINE | ID: mdl-38667065

RESUMO

Time theft, especially with the shift to remote work during the pandemic, is an increasing challenge for organizations. Existing studies demonstrate that both authoritarian leadership and laissez-faire leadership can exacerbate time theft, putting leaders in a behavioral dilemma of neither being strict nor lenient. Additionally, the pervasive and covert nature of time theft diminishes the effectiveness of subsequent corrective actions. Our study aims to investigate how to prevent time theft by mitigating employees' inclinations. Based on role theory, our study examines whether supervisor developmental feedback can encourage employees to perform work roles more appropriately. To uncover the complicated internalization process of role expectation, our study incorporates perceived insider status and work passion as serial mediators and considers the boundary effect of leaders' word-deed consistency. In Study 1, a survey of 402 employees revealed that supervisor developmental feedback can negatively predict employee time theft through employees' perceived insider status and work passion. Study 2 employs the same sample to further identify three topics of supervisor developmental feedback: skill learning, attitude learning, and social learning. Moreover, serial multiple mediating effects are affirmed across topics. The findings suggest that providing feedback on employees' learning and growth is an effective approach to prevent time theft.

6.
Behav Sci Law ; 42(4): 338-353, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38640106

RESUMO

Although most people have heard the terms 'souvenirs', 'trophies', and 'mementos', discussed in books and movies on the true crimes of sexual murderers, limited research has delved into the phenomenon of theft in sexual homicide (SH). Using a sample of 762 SH cases coming from the Sexual Homicide International Database, the current study examines the crime-commission process of the pre-crime, crime, and post-crime phases of sexual homicide offenders (SHOs) who engaged in theft during a SH. Additionally, this study seeks to determine if a specific type of SHO engages in this behaviour over others. Results from the sequential logistic regression indicate that victims who are 16 years or older, were strangers to the SHO, and were sex workers were more likely to be victims of theft. Additionally, results indicate that the presence of sadism made it more likely the SHO would engage in theft from the victim and/or crime scene. Findings suggest there is a group of SHOs who engage in theft not for monetary purposes but due to the paraphilia of the offender. These findings can inform the police investigation of these crimes.


Assuntos
Vítimas de Crime , Criminosos , Homicídio , Delitos Sexuais , Roubo , Humanos , Homicídio/psicologia , Vítimas de Crime/psicologia , Masculino , Feminino , Adulto , Delitos Sexuais/psicologia , Criminosos/psicologia , Adolescente , Roubo/psicologia , Adulto Jovem , Pessoa de Meia-Idade , Sadismo/psicologia , Profissionais do Sexo/psicologia
7.
PeerJ Comput Sci ; 10: e1872, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38435567

RESUMO

Electricity theft presents a substantial threat to distributed power networks, leading to non-technical losses (NTLs) that can significantly disrupt grid functionality. As power grids supply centralized electricity to connected consumers, any unauthorized consumption can harm the grids and jeopardize overall power supply quality. Detecting such fraudulent behavior becomes challenging when dealing with extensive data volumes. Smart grids provide a solution by enabling two-way electricity flow, thereby facilitating the detection, analysis, and implementation of new measures to address data flow issues. The key objective is to provide a deep learning-based amalgamated model to detect electricity theft and secure the smart grid. This research introduces an innovative approach to overcome the limitations of current electricity theft detection systems, which predominantly rely on analyzing one-dimensional (1-D) electric data. These approaches often exhibit insufficient accuracy when identifying instances of theft. To address this challenge, the article proposes an ensemble model known as the RNN-BiLSTM-CRF model. This model amalgamates the strengths of recurrent neural network (RNN) and bidirectional long short-term memory (BiLSTM) architectures. Notably, the proposed model harnesses both one-dimensional (1-D) and two-dimensional (2-D) electricity consumption data, thereby enhancing the effectiveness of the theft detection process. The experimental results showcase an impressive accuracy rate of 93.05% in detecting electricity theft, surpassing the performance of existing models in this domain.

8.
Rev Esp Salud Publica ; 982024 Mar 15.
Artigo em Espanhol | MEDLINE | ID: mdl-38516902

RESUMO

OBJECTIVE: About 15% of the world's population has some degree of disability. Violence and crime primarily affect the Latin American region, especially Peru. This study aimed to determine the association between disability status and robbery victimization in Peruvian villagers in 2017. METHODS: A cross-sectional study of secondary data analysis from the National Specialized Victimization Survey (ENEVIC) 2017 was conducted. The independent variable was disability status, and the dependent variable was robbery victimization; in addition, confounding variables were included. Poisson regression was performed to demonstrate the association, and prevalence ratios (PR) with their 95% confidence intervals (95%CI) were calculated. RESULTS: Records of 32,199 Peruvians aged 18 years or older were included. People with disabilities were 24% less likely to be robbery victims than people without disabilities (PR=0.76; 95%CI: 0.61-0.95), adjusted for confounding variables. However, this association was only statistically significant in women, older adults, and the high socioeconomic stratum. CONCLUSIONS: In Peru, people with disabilities are less likely to be robbery victims than people without disabilities. However, only if they are women, older adults, and come from a high socioeconomic level. In the other population groups, the probabilities of suffering this victimization would be similar between people with and without disabilities.


OBJECTIVE: Alrededor del 15% de la población mundial tiene algún grado de discapacidad. La violencia y el crimen afectan primordialmente a la región de América Latina, especialmente a Perú. El objetivo de este estudio fue determinar la asociación entre la condición de discapacidad y la victimización por robo en pobladores peruanos durante 2017. METHODS: Se realizó un estudio transversal de análisis secundario de datos de la Encuesta Nacional Especializada sobre Victimización (ENEVIC) 2017. La variable independiente fue la condición de discapacidad y la variable dependiente fue la victimización por robo; además, se incluyeron variables de confusión. Para demostrar la asociación se realizó una regresión de Poisson y se calcularon razones de prevalencia (RP) con sus intervalos de confianza al 95% (IC95%). RESULTS: Se incluyeron los registros de 32.199 peruanos de dieciocho o más años. Las personas con discapacidad tuvieron un 24% menos probabilidad de ser víctimas de robo que las personas sin discapacidad (RP=0,76; IC95%: 0,61-0,95), ajustado por las variables de confusión. Sin embargo, esta asociación solo fue estadísticamente significativa en las mujeres, adultos mayores y en el estrato socioeconómico alto. CONCLUSIONS: En Perú, las personas con discapacidad tienen menor probabilidad de ser víctimas de robo que las personas sin discapacidad, aunque solamente si son mujeres, adultos mayores y provienen de un nivel socioeconómico alto. En los demás grupos poblacionales, las probabilidades de sufrir de este hecho de victimización serían semejantes entre las personas con y sin discapacidad.


Assuntos
Vítimas de Crime , Pessoas com Deficiência , Humanos , Feminino , Idoso , Masculino , Peru/epidemiologia , Estudos Transversais , Espanha , Violência
9.
Sensors (Basel) ; 24(5)2024 Mar 04.
Artigo em Inglês | MEDLINE | ID: mdl-38475204

RESUMO

Electricity theft presents a significant financial burden to utility companies globally, amounting to trillions of dollars annually. This pressing issue underscores the need for transformative measures within the electrical grid. Accordingly, our study explores the integration of block chain technology into smart grids to combat electricity theft, improve grid efficiency, and facilitate renewable energy integration. Block chain's core principles of decentralization, transparency, and immutability align seamlessly with the objectives of modernizing power systems and securing transactions within the electricity grid. However, as smart grids advance, they also become more vulnerable to attacks, particularly from smart meters, compared to traditional mechanical meters. Our research aims to introduce an advanced approach to identifying energy theft while prioritizing user privacy, a critical aspect often neglected in existing methodologies that mandate the disclosure of sensitive user data. To achieve this goal, we introduce three distributed algorithms: lower-upper decomposition (LUD), lower-upper decomposition with partial pivoting (LUDP), and optimized LUD composition (OLUD), tailored specifically for peer-to-peer (P2P) computing in smart grids. These algorithms are meticulously crafted to solve linear systems of equations and calculate users' "honesty coefficients," providing a robust mechanism for detecting fraudulent activities. Through extensive simulations, we showcase the efficiency and accuracy of our algorithms in identifying deceitful users while safeguarding data confidentiality. This innovative approach not only bolsters the security of smart grids against energy theft, but also addresses privacy and security concerns inherent in conventional energy-theft detection methods.

10.
Sensors (Basel) ; 24(4)2024 Feb 09.
Artigo em Inglês | MEDLINE | ID: mdl-38400308

RESUMO

In Internet of Things-based smart grids, smart meters record and report a massive number of power consumption data at certain intervals to the data center of the utility for load monitoring and energy management. Energy theft is a big problem for smart meters and causes non-technical losses. Energy theft attacks can be launched by malicious consumers by compromising the smart meters to report manipulated consumption data for less billing. It is a global issue causing technical and financial damage to governments and operators. Deep learning-based techniques can effectively identify consumers involved in energy theft through power consumption data. In this study, a hybrid convolutional neural network (CNN)-based energy-theft-detection system is proposed to detect data-tampering cyber-attack vectors. CNN is a commonly employed method that automates the extraction of features and the classification process. We employed CNN for feature extraction and traditional machine learning algorithms for classification. In this work, honest data were obtained from a real dataset. Six attack vectors causing data tampering were utilized. Tampered data were synthetically generated through these attack vectors. Six separate datasets were created for each attack vector to design a specialized detector tailored for that specific attack. Additionally, a dataset containing all attack vectors was also generated for the purpose of designing a general detector. Furthermore, the imbalanced dataset problem was addressed through the application of the generative adversarial network (GAN) method. GAN was chosen due to its ability to generate new data closely resembling real data, and its application in this field has not been extensively explored. The data generated with GAN ensured better training for the hybrid CNN-based detector on honest and malicious consumption patterns. Finally, the results indicate that the proposed general detector could classify both honest and malicious users with satisfactory accuracy.

11.
Sensors (Basel) ; 24(4)2024 Feb 15.
Artigo em Inglês | MEDLINE | ID: mdl-38400385

RESUMO

This study provides a comprehensive analysis of the combination of Genetic Algorithms (GA) and XGBoost, a well-known machine-learning model. The primary emphasis lies in hyperparameter optimization for fraud detection in smart grid applications. The empirical findings demonstrate a noteworthy enhancement in the model's performance metrics following optimization, particularly emphasizing a substantial increase in accuracy from 0.82 to 0.978. The precision, recall, and AUROC metrics demonstrate a clear improvement, indicating the effectiveness of optimizing the XGBoost model for fraud detection. The findings from our study significantly contribute to the expanding field of smart grid fraud detection. These results emphasize the potential uses of advanced metaheuristic algorithms to optimize complex machine-learning models. This work showcases significant progress in enhancing the accuracy and efficiency of fraud detection systems in smart grids.

12.
Inj Epidemiol ; 11(1): 8, 2024 Feb 26.
Artigo em Inglês | MEDLINE | ID: mdl-38409066

RESUMO

BACKGROUND: Firearm violence is a major cause of death and injury in the United States. Tracking the movement of firearms from legal purchase to use in crimes can help inform prevention of firearm injuries and deaths. The last state-wide studies analyzing crime gun recoveries used data from over 20 years ago; thus, an update is needed. METHODS: We used data for 5,247,348 handgun and 2,868,713 long gun transactions and law enforcement recoveries from California crime gun recovery (2010-2021) and California's Dealer Records of Sales records. Covariates included characteristics of dealership sales, firearms and their transactions, and purchaser's demographic characteristics, purchasing history, criminal history (from firearm purchaser criminal history records), and neighborhood socioeconomic status. Analyses for handguns and long guns was conducted separately. In multivariable analysis, we included correlates into a Cox proportional hazard model accounting for left truncation and clustering between the same firearm, purchaser, dealerships, and geographic location. Covariates that remained significant (P < 0.05) were retained. For handguns, we evaluated associations of violent and weapons crimes separately. In supplementary analyses, we examined interactions by purchasers' race and ethnicity. RESULTS: In total, 38,441 handguns (0.80%) and 6,806 long guns (0.24%) were recovered in crimes. A firearm dealer's sales volume, percent of transactions that were denials, pawns, pawn redemptions, and firearms that became crime guns were each positively associated with firearm recovery in crime. Handguns that were inexpensive, larger caliber, and that had been reported lost or stolen were positively associated with recovery in crimes. Purchaser characteristics associated with crime gun recovery included: being younger, female, Black, Hispanic, Native American or Pacific Islander, or other race/ethnicity (vs white), having previous arrests, living in close proximity to the firearm dealership, and living in a more socially vulnerable census tract. Associations with race and ethnicity were modified by previous infraction-only arrests. CONCLUSIONS: This study confirms that many previously studied correlates of firearm recovery are still relevant today. We were able to expand on previous research by examining novel associations including purchasers' criminal history and previous firearm transaction history. These results provide evidence that can be used to disrupt firearm use in crimes.

13.
Hastings Cent Rep ; 54(1): 34-41, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-38390681

RESUMO

Patient narratives from two investigational deep brain stimulation trials for traumatic brain injury and obsessive-compulsive disorder reveal that injury and illness rob individuals of personal identity and that neuromodulation can restore it. The early success of these interventions makes a compelling case for continued post-trial access to these technologies. Given the centrality of personal identity to respect for persons, a failure to provide continued access can be understood to represent a metaphorical identity theft. Such a loss recapitulates the pain of an individual's initial injury or illness and becomes especially tragic because it could be prevented by robust policy. A failure to fulfill this normative obligation constitutes a breach of disability law, which would view post-trial access as a means to achieve social reintegration through this neurotechnological accommodation.


Assuntos
Estimulação Encefálica Profunda , Transtorno Obsessivo-Compulsivo , Humanos , Estimulação Encefálica Profunda/métodos , Transtorno Obsessivo-Compulsivo/terapia , Dever de Recontatar , Assistência ao Convalescente , Obrigações Morais
14.
Primates ; 65(1): 41-48, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37903999

RESUMO

Like humans, chimpanzees (Pan troglodytes) are well known for their vertebrate and invertebrate hunting, but they rarely scavenge. In contrast, while hunting and meat consumption became increasingly important during the evolution of the genus Homo, scavenging meat and marrow from carcasses of large mammals was also likely to be an important component of their subsistence strategies. Here, we describe a confrontational scavenging interaction between an adult male chimpanzee from the Issa Valley and a crowned eagle (Stephanoaetus coronatus), which resulted in the chimpanzee capturing and consuming the carcass of a juvenile bushbuck (Tragelaphus scriptus). We describe the interaction and contextualize this with previous scavenging observations from chimpanzees.


Assuntos
Águias , Hominidae , Humanos , Masculino , Animais , Pan troglodytes , Tanzânia , Vertebrados , Meio Ambiente , Mamíferos
15.
Violence Vict ; 38(6): 819-838, 2023 Dec 11.
Artigo em Inglês | MEDLINE | ID: mdl-37949459

RESUMO

While tougher domestic violence laws and protective orders are frequently credited with attenuating intimate partner violence (IPV), one unexplored explanation for this observed reduction is that intimate partner abusers are shifting their abusive behavior to intangible identity theft to thwart legal mechanisms traditionally used to deter IPV. Unlike the monetary motive associated with document identity theft, intangible identity theft is committed by someone with a preexisting grievance against the victim because the theft's primary purpose is to tarnish the victim's reputation. Results from a multilevel analysis show that a woman has a lower probability of being a victim of an intimate rather than nonintimate partner crime in cities with a higher intangible identity theft rate. Such a finding suggests that intangible identity theft may be a form of intimate partner abuse with few adverse consequences for offenders because identity thieves are rarely arrested and prosecuted. Nevertheless, the current study is only preliminary. Further research is needed before our findings and conclusions can be universally accepted.


Assuntos
Violência Doméstica , Violência por Parceiro Íntimo , Feminino , Humanos , Violência por Parceiro Íntimo/prevenção & controle , Parceiros Sexuais
16.
Sensors (Basel) ; 23(20)2023 Oct 12.
Artigo em Inglês | MEDLINE | ID: mdl-37896501

RESUMO

Illicitly obtaining electricity, commonly referred to as electricity theft, is a prominent contributor to power loss. In recent years, there has been growing recognition of the significance of neural network models in electrical theft detection (ETD). Nevertheless, the existing approaches have a restricted capacity to acquire profound characteristics, posing a persistent challenge in reliably and effectively detecting anomalies in power consumption data. Hence, the present study puts forth a hybrid model that amalgamates a convolutional neural network (CNN) and a transformer network as a means to tackle this concern. The CNN model with a dual-scale dual-branch (DSDB) structure incorporates inter- and intra-periodic convolutional blocks to conduct shallow feature extraction of sequences from varying dimensions. This enables the model to capture multi-scale features in a local-to-global fashion. The transformer module with Gaussian weighting (GWT) effectively captures the overall temporal dependencies present in the electricity consumption data, enabling the extraction of sequence features at a deep level. Numerous studies have demonstrated that the proposed method exhibits enhanced efficiency in feature extraction, yielding high F1 scores and AUC values, while also exhibiting notable robustness.

17.
Heliyon ; 9(9): e18928, 2023 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-37681137

RESUMO

Electricity theft is the largest type of non-technical losses faced by power utilities around the globe. It not only raises revenue losses to the utilities but also leads to lethal fires and electric shocks at distribution side. In the past, field operation groups were sent by the utilities to conduct inspections of suspicions electric equipments stated by the public. Advanced metering infrastructure based recent development in the smart grids makes it easy to detect electricity thefts. However, the conventional supervised learning techniques have low theft detection performance mainly due to imbalance datasets available for training. Therefore, in this paper, we develop a novel theft detection model with twofold contribution. A unique hybrid sampling technique named as hybrid oversampling and undersampling using both classes (HOUBC) is proposed to balance the dataset. HOUBC first performs undersampling and then oversampling using both the majority (normal) and minority (theft) classes. A new deep learning method, fractal network is applied with light gradient boosting method to extract and learn important characteristics from electricity consumption profiles for identifying electricity thieves. The proposed model relies on smart meter's data for theft detection and hence, a rapid and widespread adaption of this model is feasible, which shows its main advantage. The performance of the model is evaluated with real-world smart meter's data, i.e., state grid corporation of China. Comprehensive simulation results describe the effectiveness of the proposed model against conventional schemes in terms of electricity theft detection.

18.
J Urban Health ; 100(5): 879-891, 2023 10.
Artigo em Inglês | MEDLINE | ID: mdl-37695444

RESUMO

Firearm-related interpersonal violence is a leading cause of death and injury in cities across the United States, and understanding the movement of firearms from on-the-books sales to criminal end-user is critical to the formulation of gun violence prevention policy. In this study, we assemble a unique dataset that combines records for over 380,000 crime guns recovered by law enforcement in California (2010-2021), and more than 126,000 guns reported stolen, linked to in-state legal handgun transactions (1996-2021), to describe local and statewide crime gun trends and investigate several potentially important sources of guns to criminals, including privately manufactured firearms (PMFs), theft, and "dirty" dealers. We document a dramatic increase over the decade in firearms recovered shortly after purchase (7% were recovered within a year in 2010, up to 33% in 2021). This corresponds with a substantial rise in handgun purchasing over the decade, suggesting some fraction of newly and legally acquired firearms are likely diverted from the legal market for criminal use. We document the rapid growth of PMFs over the past 2-3 years and find theft plays some, though possibly diminishing, role as a crime gun source. Finally, we find evidence that some retailers contribute disproportionately to the supply of crime guns, though there appear to be fewer problematic dealers now than there were a decade ago. Overall, our study points to temporal shifts in the dynamics of criminal firearms commerce as well as significant city variation in the channels by which criminals acquire crime guns.


Assuntos
Armas de Fogo , Humanos , Estados Unidos , Crime , Roubo/prevenção & controle , Violência , California , Comércio
19.
J Alzheimers Dis ; 95(3): 855-868, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37661875

RESUMO

BACKGROUND: Alzheimer's disease (AD) is a progressive neurodegenerative disease that results in cognitive decline, dementia, and eventually death. Diagnosing early signs of AD can help clinicians to improve the quality of life. OBJECTIVE: We developed a non-invasive approach to help neurologists and clinicians to distinguish probable AD patients and healthy controls (HC). METHODS: The patients' gaze points were followed based on the words they used to describe the Cookie Theft (CT) picture description task. We hypothesized that the timing of words enunciation aligns with the participant's eye movements. The moments that each word was spoken were then aligned with specific regions of the image. We then applied machine learning algorithms to classify probable AD and HC. We randomly selected 60 participants (30 AD and 30 HC) from the Dementia Bank (Pitt Corpus). RESULTS: Five main classifiers were applied to different features extracted from the recorded audio and participants' transcripts (AD and HC). Support vector machine and logistic regression had the highest accuracy (up to 80% and 78.33%, respectively) in three different experiments. CONCLUSIONS: In conclusion, point-of-gaze can be applied as a non-invasive and less expensive approach compared to other available methods (e.g., eye tracker devices) for early-stage AD diagnosis.


Assuntos
Doença de Alzheimer , Disfunção Cognitiva , Doenças Neurodegenerativas , Humanos , Doença de Alzheimer/diagnóstico por imagem , Qualidade de Vida , Imageamento por Ressonância Magnética/métodos , Disfunção Cognitiva/psicologia
20.
Rev. crim ; 65(3): 11-30, 20230910. ilus, graf, tab
Artigo em Inglês | LILACS | ID: biblio-1537837

RESUMO

Theft from the person is one of the highest impact crimes in Bogotá, with a national share of approximately 38 %. This crime brought to the attention of the authorities is referred to by academics as recorded or reported crime and is used by the police for different purposes, particularly for criminal investigation, but with inefficient results in the identification of perpetrators. Therefore, the type of research is qualitative and has the objective of linking the citizen through a process of collaborative technological innovation, with the purpose of collecting, processing and analysing reported or non-reported information (hidden crime) in a timely, anonymous and efficient manner with disruptive technologies prioritized for the project.The methodology used begins with the discovery stage by identifying key actors and building user stories. Then, in the understanding stage, the value proposition is put forth by means of a hypothesis that is validated in a process of experimentation, and finally, in the build stage, a technology watch analysis is carried out and the proposal for the collaborative system between the citizen and the police with a technological approach is put forward. The results are based on the identification and prioritization of five technologies, two actors, three variables and application of six low and medium fidelity prototypes, as well as the acceptance of citizens in collecting and sharing timely information at 87 %; that information focuses on video, audio, photos and localization at 55 %.On the other hand, with the entry into operation of the collaborative system, the researchers indicate that it would optimise investigation by 50 % through the timely identification of the perpetrators. As for the conclusion, the information analyzed and obtained from the results allows to reach, in a first phase, validation of the established hypothesis, but at the same time recognising the importance of including methodologies such as System Dynamics that allow for the systemic analysis of the information established by other actors and its impact on the proposed collaborative system.The use of citizen information in criminal investigation through a collaborative technological innovation process to counteract theft from the person in Bogotá


El hurto a personas es uno de los delitos de mayor impacto en temas de seguridad para Bogotá con una participación a nivel nacional del 38 % aproximadamente. Este delito puesto en conocimiento de las autoridades es denominado por académicos como criminalidad registrada o denunciada y es utilizada por la institución policial para diferentes fines, en especial para la investigación criminal, pero con resultados poco eficientes en la identificación de victimarios. Por lo tanto, el tipo de investigación es cualitativa y tiene como objetivo vincular al ciudadano mediante un proceso de innovación tecnológico colaborativo, con el propósito de recolectar, tratar y analizar información denunciada y no denunciada (criminalidad oculta) de manera oportuna, anónima y eficiente con tecnologías disruptivas priorizadas para el proyecto. La metodología empleada inicia con la etapa de descubrir mediante la identificación de actores claves y la construcción de historias de usuario. Luego, en la etapa comprender se plantea la propuesta de valor mediante una hipótesis que se valida en un proceso de experimentación, y por último en la etapa construir, se realiza un análisis de vigilancia tecnológica y se plantea la propuesta del sistema colaborativo entre el ciudadano y la policía con enfoque tecnológico. Los resultados se basan en la identificación y priorización de cinco tecnologías, dos actores, tres variables y aplicación de seis prototipos de baja y mediana fidelidad, así como la aceptación de la ciudadanía en recolectar y compartir información oportuna en un87 %, esa información se centra en videos, audios, fotos y localización con un 55 %. Por otro lado, con la entrada en funcionamiento del sistema colaborativo, los investigadores indican que optimizaría la investigación en un 50 % mediante la identificación oportuna de los victimarios. En cuanto a la conclusión, la información analizada y obtenida de los resultados, permite llegar en una primera fase, a validar la hipótesis establecida, pero a la vez, la importancia de incluir metodologías como la Dinámica de Sistemas que permita el análisis sistémico de la información establecida por otros actores y su impacto en el sistema colaborativo propuesto.


O roubo de pessoas é um dos crimes de maior impacto nas questões de segurança de Bogotá, com uma participação nacional de aproximadamente 38 %. Este crime levado ao conhecimento das autoridades é denominado pelos acadêmicos como crime registrado ou denunciado e é utilizado pela instituição policial para diversos fins, principalmente para investigação criminal, mas com resultados ineficientes na identificação dos autores. Portanto, o tipo de pesquisa é qualitativo e visa vincular os cidadãos por meio de um processo colaborativo de inovação tecnológica, com o objetivo de coletar, tratar e analisar informações denunciadas e não denunciadas (crimes ocultos) de maneira oportuna, anônima e eficiente, priorizando tecnologias disruptivas. para o projeto. A metodologia utilizada começa com a fase de descoberta, identificando os principais atores e construindo histórias de usuários. Depois, na fase de compreensão, é proposta a proposta de valor através de uma hipótese que é validada num processo de experimentação e, finalmente, na fase de construção, é realizada uma análise de vigilância tecnológica e é proposta a proposta de um sistema colaborativo entre cidadãos. e a polícia com foco tecnológico. Os resultados baseiam-se na identificação e priorização de cinco tecnologias, dois atores, três variáveis e aplicação de seis protótipos de baixa e média fidelidade, bem como na aceitação dos cidadãos na recolha e partilha de informação atempada em 87 %, esta informação centra-se em vídeos, áudios, fotos e localização com 55 %. Por outro lado, com a entrada em funcionamento do sistema colaborativo, os investigadores indicam que otimizaria a investigação em 50 % através da identificação atempada dos autores. Quanto à conclusão, a informação analisada e obtida a partir dos resultados permite-nos chegar numa primeira fase à validação da hipótese estabelecida, mas ao mesmo tempo, a importância de incluir metodologias como a Dinâmica de Sistemas que permite a análise sistémica da informação estabelecida por outros atores e seu impacto no sistema colaborativo proposto.


Assuntos
Humanos , Tecnologia , Criatividade
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA