dumpster diving
Recently Published Documents


TOTAL DOCUMENTS

42
(FIVE YEARS 10)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 16 (3) ◽  
pp. 49-82
Author(s):  
Benedikt Jahnke ◽  
Ulf Liebe

Food waste is a major challenge in affluent societies around the globe. Based on theories of protest and a mixed methods design combining qualitative, experimental, and survey research, we study the motives for, frequency of, and public support for dumpster diving in Germany. We find that dumpster diving as an unconventional daily protest action is related to more general protest against capitalist societies. It is motivated by both altruistic and egoistic concerns. The perceived legitimacy of violence and self-identity explain the frequency of dumpster diving. A factorial survey experiment with activists and the general public reveals strong similarities between the views of activists and those of other citizens in strong support of dumpster diving. This study demonstrates the usefulness of combining different empirical methods to study food activism.


2021 ◽  
Vol 156 (Supplement_1) ◽  
pp. S130-S130
Author(s):  
A S Maris ◽  
L Tao ◽  
C W Stratton ◽  
R M Humphries ◽  
J E Schmitz

Abstract Introduction/Objective The COVID-19 pandemic exacerbated deficiencies of testing personnel, reagents, supplies and disposables, instruments, and automation in many clinical laboratories. Upon entering respiratory season, a strategy was warranted to optimize laboratory resources when supplies were already limited and expected respiratory season test volume was unknown. An algorithm was devised to prioritize test ordering and TAT based on patient clinical scenario. Methods/Case Report The institutional respiratory season SARS-CoV-2 algorithm was constructed by a multidisciplinary team including infectious disease, infection prevention, laboratory, and IT/LIS leadership. CDC guidance on influenza testing was incorporated. Antigen-based testing was discontinued; only molecular amplification- based platforms with FDA EUA were utilized. Platforms had a range of TAT (20 minutes to 8 hours) and included fully- automated high throughput, rapid random access, point-of-care, and CDC SARS-CoV-2 assays. Test bundles included SARS-CoV-2 (monoplex), or SARS-CoV-2 + fluA&B (triplex), or SARS-CoV-2 + respiratory pathogen panel (multiplex RPP; includes 22 targets, including flu A&B). Results (if a Case Study enter NA) Key factors in the algorithm included whether the patient was outpatient or inpatient, hospital employee or not, symptomatic or not, immunocompetent or immunocompromised, and whether a concurrent order for other respiratory pathogens was included or not. Clinician responses for these factors determined the type of swab collected (wet swab in VTM or dry swab) and how quickly the TAT was indicated for a given patient using a colored-dot sticker system. Priority TAT in decreasing order was symptomatic inpatients, asymptomatic pre- procedure patients, asymptomatic admissions, symptomatic employees, and symptomatic outpatients. Conclusion An algorithm for respiratory pathogen testing during an unprecedented respiratory season prioritizes result TAT to an individual patient’s clinical situation while maximizing laboratory stewardship by eliminating redundant influenza testing and requiring ‘all upfront’ orders to avoid add-on orders that require ‘dumpster diving’ for samples. Limitations include inherent differences in sensitivity, LOD, and specificity when multiple different platforms are utilized to detect the same analytes.


Gut ◽  
2021 ◽  
pp. gutjnl-2021-325663
Author(s):  
Anna Heintz-Buschart

2021 ◽  
Author(s):  
Clemens Wirbel

For the first time there is a legal investigation into food waste. Here, the measures of food sharing, food banks, Dumpster Diving and leftover restaurants are classified in the system of food and waste law and e.g the characteristics of a food business and the legal consequences are examined. In addition, based on a French regulation, a legislative proposal to combat food waste is presented and the national and european legal limits of the proposal are discussed.


Author(s):  
Nabie Y. Conteh ◽  
DeAngela “Dee” Sword

Social engineering attacks have emerged to become one of the most problematic tactics used against businesses today. Social engineers employ both human-based and computer-based tactics to successfully compromise their targeted networks. This chapter will discuss the basics of social engineering and what it means today. It will explain some common attack methods like baiting, phishing, pretexting, quid pro quo, tailgating, and dumpster diving. It will then highlight the impact social engineering has had on the rise in cybercrime and why threat actors have grown more innovative. Finally, this chapter will discuss what multi-layer defense or defense in depth is and offer countermeasures that can be enforced to defend against social engineering attacks.


Organization ◽  
2020 ◽  
pp. 135050842097334
Author(s):  
Andreas Plank

Augmenting Antonio Gramsci’s concept of hegemony with Johan Galtung’s concept of structural violence and using multiple data sources this study examines the structural phenomenon food waste and the agentic phenomenon dumpster diving. I derive my interpretations from an analysis of reports on food waste by international organizations, US media coverage of food waste, and interviews with dumpster divers. At the structural level, the analysis shows how international organizations and media frame food waste as an economic and environmental—rather than a social justice issue and how they reproduce hegemonic neoliberal conceptualizations and discourses of food and food waste. At the agentic level, the analysis shows how these hegemonic conceptualizations and discourses affect dumpster divers and how an environmental ideological motivation contains an anticapitalistic ideological motivation. Building on my neo-Gramscian analysis, I highlight the potential threat that environmental discourses might stabilize neoliberal hegemony by offering appealing consent-structures and contain more fundamental, social justice-based, critique of the neoliberal social order. To preserve its inherently critical and counter-hegemonic potential, I develop a conceptual model of food waste and discuss its relevance for critical management and organization studies.


2020 ◽  
Vol 7 (2) ◽  
pp. 197-220
Author(s):  
Turo-Kimmo Lehtonen ◽  
Olli Pyyhtinen

The paper, based on an ongoing research project conducted in Finland, examines voluntary dumpster diving as a practice of valuation. Its main questions are: How is voluntary dumpster diving intertwined with the question of value? And, conversely, what can dumpster diving teach us about practices of valuation more generally? The article proceeds via three steps. First, in order to emphasize the creative side of dumpster diving as a practice of valuation, we draw on Georg Simmel’s theory of value, supplementing it with the concepts of actuality and virtuality, as elaborated by Gilles Deleuze. Second, we look more closely into the practicalities of valuation evident in dumpster diving. It involves a particular orientation to the urban environment that we call the scavenger gaze. Third, the informants also value the practice itself in relation to its societal relevance. They think about dumpster diving as a way of doing good and as part of an ecologically sound form of life. All in all, as value does not reside inherently in waste or would simply be merely the product of subjective judgment, the analyst must attend to multiple modes of valuation evident in the practice, among which there is no self-evident hierarchy. 


In warfare, “reconnaissance” is the process of collecting information about enemy forces using different detection methods. In ethical hacking, reconnaissance is the first phase targeted to gather and learn as much as information available about the target using tools like internet sources, social engineering techniques, dumpster diving, email harvesting, Whois database, etc. This chapter introduces different tools and techniques used during the active and passive reconnaissance phases in detail. Reconnaissance consists of footprinting, scanning, and enumeration techniques used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible. It can use active (by directly interacting with the target which have risk of getting caught like social engineering methods) or passive (like visiting target website) information-gathering methods in order to identify the target and discover its IP address range, network, domain name, mail server, DNS records, employee names, organization charts, and company details. The chapter also provides the details of possible countermeasures to be implemented on website to avoid revealing more information to the attackers.


Sign in / Sign up

Export Citation Format

Share Document