scholarly journals White List: An Administrative Tool to Contrast Crime

Games ◽  
2021 ◽  
Vol 13 (1) ◽  
pp. 8
Author(s):  
Amelia Barletta ◽  
Carlo Capuano ◽  
Alessandro De Iudicibus

White Lists are lists of firms set up at each Italian prefecture. It is a relatively young instrument born as an experimental project designed to solve problems for particular conditions of crime and corruption in the Italian territory. This work aims to understand if the “White List” tool can represent a reliable legality tool for the contracting station and representation for firms registered in these lists, an incentive to obtain awards for faster times of public procurement. Through a descriptive survey, we will try to photograph the “White List” phenomenon by comparing firms belonging to these lists with companies not belonging to them but which are similar in terms of size and economic sector. The comparison takes off some differences in the financial structure of the two groups of companies. in particular, the White List’s firms show a better profitability and a lower recourse to third-party capital.

2013 ◽  
Vol 13 (1) ◽  
pp. 147-161
Author(s):  
Jana Tepperová ◽  
Lucie Rytířová

Abstract Employment related income paid by a third party (non-employer) has its specific tax treatment. In the Czech Republic, a different approach applies for calculation of personal income tax and obligatory insurance contributions from this income. With the preparation of the Single Collection Point (unifying the collection of personal income tax and obligatory insurance contributions), the question arises whether it is possible to set up unified treatment of this income for all obligatory payments. We provide detailed analyses of this topic from the point of view of the Czech legislation and comparison with selected countries. Further we follow with the discussion of problematic issues in unified treatment for all obligatory payments from this income; such as discrimination and complicated administration. We conclude that even if the national legislation for all obligatory payments from this income would not diff er, there will still be different treatment due to specific international regulations.


Author(s):  
Kai Krüger

The chapter explores the Nordic statutory EU-based remedy regimes. Due to the European Economic Area (EEA) agreement, the EU commitments do not vary between EU member states, Denmark, Finland, and Sweden and (non-members) Norway and Iceland. The legislation on procurement remedies is assumed to be EU/EEA compliant. There are however material differences in the set up for handling disputes and complaints—also subsequent to the 2010-2012 Nordic adaptation of EU Directive 2007/66/EC on enhanced procurement remedies. The pending issue is whether the EU “sufficiently serious breach” principle on treaty infringements applies on liability for procurement flaws. Loss of contract damage has been awarded in all Nordic countries, whereas cases on negative interest (costs in preparing futile tender bids) seem more favorable to plaintiffs. Per mid-2012, there are no Nordic rulings on the effect of the recent somewhat ambiguous EU Court of Justice Strabag and Spijkers 2010 rulings.


Author(s):  
Szilvia Varadi

Cloud Computing is a diverse research area that encompasses many aspects of sharing software and hardware solutions, including computing and storage resources, application runtimes or complex application functionalities. In the supply of any goods and services, the law gives certain rights that protect the consumer and provider, which also applies for Cloud Computing. This new technology also moves functions and responsibilities away from local ownership and management to a third-party provided service, and raises several legal issues, such as data protection, which require this service to comply with necessary regulation. In this chapter the author investigates the revised legislation of the European Union resulting in the General Data Protection Regulation, which will be used to set up the new European Data Protection Framework. The author gathers and summarizes the most relevant changes this regulation brings to the field of Clouds, and draws relations to the previous legislation called the Data Protection Directive currently in force.


Author(s):  
Eduardo Lopes de Paula ◽  
Markus Moratti ◽  
Eduardo Henrique da Silva Rodrigues ◽  
Elivelton Pinheiro Scherrer

The transportation system for hydrocarbons consists of an important and complex network of pipelines used by oil and gas logistics companies, designed to quickly and efficiently transport oil and gas from its origin, to areas of some demand along territory where operates. Currently Brazil has 15,000 km of transportation pipelines within about 7,500 km of right-of-way pipelines. Along its territorial extension it faces several influences along its route, being the main ones influenced by the external hazards from nature and by third party actions. TRANSPETRO has about 450 water crossings in cataloged water bodies currently. These crossings are currently characterized only according to their geometric characteristics, not considering several aspects inherent to them. The inspections at these crossings are laborious and have a high cost due to necessity of divers and bathymetry in some cases. To monitor the condition of all pipeline water crossings it is important to ensure the pipeline integrity. Depending on hydraulic phenomena, it is possible result in an exposure of the pipelines, free spans, changes in the original pipeline or excessive vibration. These changes can generate high mechanical stresses with both static and dynamic loads. The present study was characterized by the development of a methodology for assessing the susceptibility to the exposure of pipelines as a result of the hydrological hazards present at the crossings in which they are found. Moreover, this evaluation methodology offers a tool to define inspection extent and frequency, as well as the corresponding risk control actions. For this purpose, a pipeline management program has been set up, which consists in the definition of water crossings that constitute a potential hydrological hazard and where they can interact with the pipeline considering the probability of a specific hydrotechnical hazard leading the pipeline the exposure. As a result of this research it was defined a methodology to characterize pipeline crossing areas as well as field survey, evaluation of the susceptibility of pipeline exposure at crossings and the programming of control actions were defined according to the susceptibility found. Finally, the study has also presented a cost analysis of crossings inspections comparing the traditional method to the new premises adopted in this project.


2020 ◽  
Vol 123 (1) ◽  
pp. 159-175
Author(s):  
Alberto Mazzoleni ◽  
Enrica Pollonini

PurposeWe developed a model to demonstrate how multiple interrelated aspects of a firm influence its recourse to third-party financing, which frequently depends on the characteristics of each food production chain.Design/methodology/approachWe conducted an empirical research on a relevant sample of small- and medium-sized Italian dairy firms. Our research methodology is inspired by the grounded theory (Glaser and Strauss, 1967).FindingsOur findings illustrated that firm indebtedness is the result of intertwined variables, linked to different firm dimensions, including growth, financial structure and economic dynamics.Research limitations/implicationsA portion of the analysed phenomenon is not explained using the sample and econometric tools.Practical implicationsThere are practical implications for the decision-makers in a firm (in particular, the managers and the shareholders) as the model allows to evaluate the influence of a set of mutually interdependent firm variables for the indebtedness level.Originality/valueFirst, we considered the recourse to third-party financing within the context of the systems theory (Millová and Blatný, 2015) and from the perspective of linked causes and mutually connected variables. Second, our research focussed on a well-defined food chain and on features of firms operating in this context. Last, our model considered the impact of the recent economic crisis, which motivated us to review the existing models.


2015 ◽  
Vol 23 (3) ◽  
pp. 333-346 ◽  
Author(s):  
Swapan Purkait

Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.


Author(s):  
Adrien Houel ◽  
Christophe Aubagnac ◽  
Didier Germain ◽  
Jean-Philippe Maherault

The Central and Eastern Territorial Directorate (DterCE) of Cerema in France has set up an experimental project about a prestressed concrete bridge beam recovered during the demolition of a bridge. Before testing, an accurate diagnosis of the beam has been achieved. Three series of tests were carried out in 2014: bending tests before reinforcement, after a first phase of reinforcement bonded composite materials, and finally after a second and final phase of reinforcement bonded composite materials. This final test was gradually led to a complete break of the beam. This experience on a PPCBB reinforced with FRP allows us to deliver some first lessons. The real break of the beam was held to a force of about 61 tons, corresponding to a bending at mid-span to about 20 cm. Thereafter, the effort has been decreasing. The complete shearing by delamination of the bonded composite reinforcements (which have thus accompanied the beam to maximum effort of loading), was held to a force of about 59 tons, corresponding to a bending to about 27 cm. The complete break in bending in a controlled section (cracking up in the upper table) was obtained for an imposed displacement of more than 40 cm.


2014 ◽  
Vol 32 (30_suppl) ◽  
pp. 163-163
Author(s):  
Henry Chou ◽  
Ajay Kapur ◽  
Gina M. Goode ◽  
Catherine Riehl ◽  
Jason Meier ◽  
...  

163 Background: In industries with well-established processes for failure analyses, incident reporting systems facilitate analyzing root causes of adverse or near-miss events, and the dissemination of lessons learned. Such a system is now being promoted in radiation medicine as patient safety and care quality come into focus in clinical practice. Methods: An incident reporting system has been in place in our department since 2010 for staff to report actual or near-miss events. A quality management committee was concurrently established to review reported incidents on a weekly basis. A taxonomy of root causes was set up to analyze and categorize root causes of incidents. This taxonomy is compared to that of the 2012 consensus recommendations for incident learning database (Ford et al.) which was the basis of ASTRO RO-ILS currently in prototype phase. Results: To date, over 2,000 incidents have been analyzed in our in-house system. The majority of the reported incidents pertain to procedural mis-steps or miss-cues in the process leading up to patient treatment, resulting in delays. Identifying the root causes has helped re-engineer or fine-tune department processes and has resulted in smoother clinical operations (e.g., obtaining third-party imaging prior to making treatment appointments) as well as more safety checks (e.g., pace-maker alerts.) Our taxonomy of root causes is multi-dimensional and quite specific to clinical radiation oncology, e.g., drilling down to specific morbidities. In comparison, the taxonomy of causes in the RO-ILS is more generic and at a higher level (e.g., procedural or technical issues). The RO-ILS has at most second-degree branches compared with our taxonomy of 6-8 degrees in depth. Conclusions: Incident reporting is vital in analyzing and learning from reported events. Process changes in our clinic has been aided by the incident database and a hierarchical taxonomy between 6 to 8 degrees in root causes. The RO-ILS system in prototype is only 2 degrees deep. While the RO-ILS system appears capable of cataloging data from multiple centers, it is not clear that it will be able to understand or affect meaningful process changes given its lack of depth.


2000 ◽  
Vol 04 (04) ◽  
pp. 391-416 ◽  
Author(s):  
SALLY WYATT

This article examines two attempts to develop information networks by central government administrations in the UK and the US during the 1980s. These are examples of service innovations within public services, and can be viewed in the light of analyses of services innovation. They also mark a shift in public procurement, from acquiring a technology to purchasing services. The British attempted to develop a data communication network; the Americans attempted to develop an integrated voice, data and image communication network. Both networks were to be shared by different government departments and both were to be provided by a third-party supplier. The rhetoric and policy concerns behind these networks are similar to those expressed more recently in Britain by the new Labour Government. It is argued that these earlier attempts were unsuccessful because insufficient attention was paid to users, and because the systems were attempting to do too much. Not only were they expected to reduce costs and improve services, they were also intended to implement important elements of telecommunications and competition policies. Paradoxically, over-simplification of the systems, to make them comprehensible to a wide range of actors, may have contributed to their failure.


Author(s):  
S Crisp

The introduction of a legal framework for the supply of medical implants is discussed with reference to the Active Implantable Medical Device Directive and the Medical Device Directive. The definitions of medical device and manufacturer are discussed. The application of the Directives to device/drug combinations is considered. All implants must meet certain essential requirements to ensure that they do not harm the patient, clinician or any third party. For most implants this will be indicated on the product or its packaging by CE marking involving an independent organization called a Notified Body; the latter are appointed by the Competent Authority of the Member State. Devices are classified in proportion to the risk associated with them. The steps needed to be taken by manufacturers are outlined and the verification options discussed. The role of standards and the new approach to writing them in Europe is presented. After placing a product on the market, the manufacturer must set up a system of post-market surveillance, including a vigilance procedure, in order to monitor product performance. Individual Member States can exercise the safeguard clause when a product appears to have had the CE marking incorrectly applied.


Sign in / Sign up

Export Citation Format

Share Document