TRANSMISSION OF POLIOVIRUSES

PEDIATRICS ◽  
1961 ◽  
Vol 27 (5) ◽  
pp. 755-761
Author(s):  
Paul F. Wehrle ◽  
Felicitas Hagen ◽  
Ory Carbonaro

An attenuated poliovirus Type III strain (Leon 12a1b) was fed to six members of a summer recreational school program in a small community in the central part of New York. Transmission of this virus occurred to only 3 of 25 family contacts of these six children and to only 1 of 13 close school associates. In addition, five more casual school and neighborhood contacts became infected during the study period. Thus, only 9 of 100 family and school contacts of these school children became infected during a 5-week study period. The results have been interpreted to suggest that the attenuated poliovirus Type III strain (Leon 12a1b) is less invasive in open populations than the natural polioviruses previously observed. It is likely that the increased prevalence of Coxsackie B2 and B3 infections and perhaps other enteroviruses may have had some effect on the spread of the attenuated polioviruses. However, it seems unlikely that these latter two factors could have explained the striking differences observed.

Author(s):  
Nguyen Tien Hung ◽  
Huynh Van Sau

The study was conducted to identify fraudulent financial statements at listed companies (DNNY) on the Ho Chi Minh City Stock Exchange (HOSE) through the Triangular Fraud Platform This is a test of VSA 240. At the same time, the conformity assessment of this model in the Vietnamese market. The results show that the model is based on two factors: the ratio of sales to total assets and return on assets; an Opportunity Factor (Education Level); and two factors Attitude (change of independent auditors and opinion of independent auditors). This model is capable of accurately forecasting more than 78% of surveyed sample businesses and nearly 72% forecasts for non-research firms.  Keywords Triangle fraud, financial fraud report, VSA 240 References Nguyễn Tiến Hùng & Võ Hồng Đức (2017), “Nhận diện gian lận báo cáo tài chính: Bằng chứng thực nghiệm tại các doanh nghiệp niêm yết ở Việt Nam”, Tạp chí Công Nghệ Ngân Hàng, số 132 (5), tr. 58-72.[2]. Hà Thị Thúy Vân (2016), “Thủ thuật gian lận trong lập báo cáo tài chính của các công ty niêm yết”, Tạp chí tài chính, kỳ 1, tháng 4/2016 (630). [3]. Cressey, D. R. (1953). Other people's money; a study of the social psychology of embezzlement. New York, NY, US: Free Press.[4]. Bộ Tài Chính Việt Nam, (2012). Chuẩn mực kiểm toán Việt Nam số 240 – Trách nhiệm của kiểm toán viên đối với gian lận trong kiểm toán báo cáo tài chính. [5]. Jensen, M. C., & Meckling, W. H. (1976). Theory of the firm: Managerial behavior, agency costs and ownership structure. Journal of financial economics, 3(4), 305-360.[6]. Võ Hồng Đức & Phan Bùi Gia Thủy (2014), Quản trị công ty: Lý thuyết và cơ chế kiểm soát, Ấn bản lần 1, Tp.HCM, Nxb Thanh Niên.[7]. Freeman, R. E. (1984). Strategic management: A stakeholder approach. Boston: Pitman independence on corporate fraud. Managerial Finance 26 (11): 55-67.[9]. Skousen, C. J., Smith, K. R., & Wright, C. J. (2009). Detecting and predicting financial statement fraud: The effectiveness of the fraud triangle and SAS No. 99. Available at SSRN 1295494.[10]. Lou, Y. I., & Wang, M. L. (2011). Fraud risk factor of the fraud triangle assessing the likelihood of fraudulent financial reporting. Journal of Business and Economics Research (JBER), 7(2).[11]. Perols, J. L., & Lougee, B. A. (2011). The relation between earnings management and financial statement fraud. Advances in Accounting, 27(1), 39-53.[12]. Trần Thị Giang Tân, Nguyễn Trí Tri, Đinh Ngọc Tú, Hoàng Trọng Hiệp và Nguyễn Đinh Hoàng Uyên (2014), “Đánh giá rủi ro gian lận báo cáo tài chính của các công ty niêm yết tại Việt Nam”, Tạp chí Phát triển kinh tế, số 26 (1) tr.74-94.[13]. Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32(4), 995-1003.[14]. Amara, I., Amar, A. B., & Jarboui, A. (2013). Detection of Fraud in Financial Statements: French Companies as a Case Study. International Journal of Academic Research in Accounting, Finance and Management Sciences, 3(3), 40-51.[15]. Beasley, M. S. (1996). An empirical analysis of the relation between the board of director composition and financial statement fraud. Accounting Review, 443-465.[16]. Beneish, M. D. (1999). The detection of earnings manipulation. Financial Analysts Journal, 55(5), 24-36.[17]. Persons, O. S. (1995). Using financial statement data to identify factors associated with fraudulent financial reporting. Journal of Applied Business Research (JABR), 11(3), 38-46.[18]. Summers, S. L., & Sweeney, J. T. (1998). Fraudulently misstated financial statements and insider trading: An empirical analysis. Accounting Review, 131-146.[19]. Dechow, P. M., Sloan, R. G., & Sweeney, A. P. (1996). Causes and consequences of earnings manipulation: An analysis of firms subject to enforcement actions by the SEC. Contemporary accounting research, 13(1), 1-36.[20]. Loebbecke, J. K., Eining, M. M., & Willingham, J. J. (1989). Auditors experience with material irregularities – Frequency, nature, and detectability. Auditing – A journal of practice and Theory, 9(1), 1-28. [21]. Abbott, L. J., Park, Y., & Parker, S. (2000). The effects of audit committee activity and independence on corporate fraud. Managerial Finance, 26(11), 55-68.[22]. Farber, D. B. (2005). Restoring trust after fraud: Does corporate governance matter?. The Accounting Review, 80(2), 539-561.[23]. Stice, J. D. (1991). Using financial and market information to identify pre-engagement factors associated with lawsuits against auditors. Accounting Review, 516-533.[24]. Beasley, M. S., Carcello, J. V., & Hermanson, D. R. (1999). COSO's new fraud study: What it means for CPAs. Journal of Accountancy, 187(5), 12.[25]. Neter, J., Wasserman, W., & Kutner, M. H. (1990). Applied statistical models.Richard D. Irwin, Inc., Burr Ridge, IL.[26]. Gujarati, D. N. (2009). Basic econometrics. Tata McGraw-Hill Education.[27]. McFadden, D. (1974). Conditional Logit Analysis of Qualita-tive Choice Behavior," in Frontiers in Econometrics, P. Zarenm-bka, ed. New York: Academic Press, 105-42.(1989). A Method of Simulated Moments for Estimation of Discrete Response Models Without Numerical Integration," Econometrica, 54(3), 1027-1058.[28]. DA Cohen, ADey, TZ Lys. (2008), “Accrual-Based Earnings Management in the Pre-and Post-Sarbanes-Oxley Periods”. The accounting review.


Author(s):  
Charles Brockden Brown

One of the earliest American novels, Wieland (1798) is a thrilling tale of suspense and intrigue set in rural Pennyslvania in the 1760s. Based on an actual case of a New York farmer who murdered his family, the novel employs Gothic devices and sensational elements such as spontaneous combustion, ventriloquism, and religious fanaticism. The plot turns on the charming but diabolical intruder Carwin, who exercises his power over the narrator, Clara Wieland, and her family, destroying the order and authority of the small community in which they live. Underlying the mystery and horror, however, is a profound examination of the human mind's capacity for rational judgement. The text also explores some of the most important issues vital to the survival of democracy in the new American republic. Brown further considers power and manipulation in his unfinished sequel, Memoirs of Carwin the Biloquist, which traces Carwin's career as a disciple of the utopist Ludloe.


1968 ◽  
Vol 23 (3) ◽  
pp. 783-791 ◽  
Author(s):  
Leigh Minturn ◽  
Merrilee Lewis

Walder's peer nomination inventory was given to elementary school children and college students and the data analyzed for age differences. The first two factors are essentially the same as Walder's factors and are unaffected by Ss age. The third child factor is similar to Walder's third factor of socially undesirable non-aggressive traits but is better differentiated and more general, including several items measuring rebelliousness. Two additional factors appear in the adult sample, one defined by rebellion and rejection items and one by dominance items.


1951 ◽  
Vol 27 (4) ◽  
pp. 289-292 ◽  
Author(s):  
CHARLOTTE M. YOUNG ◽  
VIVIAN LIGHTBODY SMUDSKI ◽  
BETTY F. STEELE
Keyword(s):  
New York ◽  

Author(s):  
Lawrence L. Master ◽  
Lynn S. Kutner

“The air was literally filled with pigeons; the light of noonday was obscured as by an eclipse.” So observed John James Audubon, the eminent naturalist and bird artist, of a mass migration of passenger pigeons (Ectopistes migratorius) passing through Kentucky in 1813. For three days the pigeons poured out of the Northeast in search of forests bearing nuts and acorns. By Audubon’s estimate, the flock that passed overhead contained more than I billion birds, a number consistent with calculations made by other ornithologists. As the pigeons approached their roost, Audubon noted that the noise they made “reminded me of a hard gale at sea passing through the rigging of a close-reefed vessel.” Indeed, they were so numerous that by some accounts every other bird on the North American continent was probably a passenger pigeon at the time of European colonization (Schorger 1955). Yet despite this extraordinary abundance, barely 100 years later the last passenger pigeon, a female bird named Martha, died in the Cincinnati Zoo. The vast flocks of passenger pigeons moved around eastern North America, feeding mostly on the fruits of forest trees such as beechnuts and acorns. Two factors conspired to seal their fate. Because of their huge numbers, the birds were easy to hunt, especially at their roosting sites. Hunters were ingenious in developing increasingly efficient ways to slaughter the birds. Armed with sticks, guns, nets, or sulfur fires, hunters swept through the enormous roosting colonies, carting away what they could carry and feeding the remaining carcasses to their pigs. One of these methods, in which a decoy pigeon with its eyes sewn shut was attached to a perch, or stool, gave rise to the term stool pigeon. As the railroads expanded west, enormous numbers could be sent to major urban markets like New York, where pigeons became the cheapest meat available. They were so cheap and abundant that live birds were used as targets in shooting galleries. At the same time that this frontal assault on the pigeons was under way, human settlers were expanding into the interior of the country, clearing large areas of the forests on which the flocks depended for food.


Plant Disease ◽  
2015 ◽  
Vol 99 (4) ◽  
pp. 527-534 ◽  
Author(s):  
Lisa A. Jones ◽  
Surya Saha ◽  
Alan Collmer ◽  
Christine D. Smart ◽  
Magdalen Lindeberg

A severe outbreak of bacterial speck of tomato, caused by Pseudomonas syringae pv. tomato, occurred in central New York in 2009. Isolate 09150, collected from this outbreak and subsequently named NYS-T1, was found to be highly virulent on tomato. To better understand the relationship of 09150 to other P. syringae strains and develop a diagnostic assay for aggressive strains of this pathogen, the 09150 genome was sequenced. Genome comparison revealed it to be highly similar to a previously sequenced isolate, T1. Genetic factors linked to host interaction including type III effectors, toxin biosynthetic genes, and elicitors of host innate immunity were identified. Type III effector repertoires were compared with other strains in the high virulence T1-like subgroup and lower virulence DC3000/P. syringae pv. maculicola subgroup within P. syringae phylogenetic Group I. Primers for conventional PCR were developed using sequences for avrA, hopW, conserved in the former subgroup and hopN, present in the latter. These were tested on isolates in the two subgroups, other pseudomonads, and other bacterial pathogens of tomato. Primers developed for avaA and hopW were diagnostic for more virulent strains of P. syringae pv. tomato while primers for hopN were diagnostic for P. syringae pv. tomato DC3000 and related P. syringe pv. maculicola strains. Primers designed against hopR distinguished both of these P. syringae subgroups from other P. syringae strains.


Sign in / Sign up

Export Citation Format

Share Document