218 resultados para Identity (Philosophical concept)
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.
Resumo:
Introduction: Trastuzumab (T) is a cornerstone in the treatment of patients with HER2-overexpressing advanced breast cancer and development of resistance to T is a major therapeutic problem. HER-2 is part of a highly interactive signaling network that may impair efficacy of endocrine therapy. A sequential treatment design was chosen in this trial to ensure complete resistance to single agent therapy before receiving both a non-steroidal aromatase inhibitor (AI) and T. Any kind of clinical activity with combined treatment of AI and T after progression of single agent treatments could indicate restoration of sensitivity as a consequence of cross-talking and networking between both pathways. Methods: Key eligibility criteria included postmenopausal patients (pts.) with advanced, measurable, HER-2 positive (assessed by FISH, ratio (≥2)), HR positive disease and progression on prior treatment with a non-steroidal AI, e.g. letrozole or anastrozole, either in an adjuvant or advanced setting. Pts. received standard dose T monotherapy either weekly or three-weekly in step 1 and upon disease progression, continued T in combination with letrozole in step 2. The primary endpoint was clinical benefit response (CBR: CR, PR or SD for at least 24 weeks (+/- 1 week) according to RECIST) in step 2. Results: Thirteen pts. were enrolled in five centers in Switzerland. In step 1, six pts. (46%) achieved CBR. Median time to progression (TTP) was 161 days (Range: 50 - 627). Based on data collected until the end of May 2010, CBR was observed in seven out of the eleven evaluable pts. (64%) in step 2, including one pt. with partial response. Four of the seven pts. within step 2 that achieved CBR also had CBR in step 1. Seven out of eleven pts. have documented tumor progression during step 2 treatment. Median TTP for all eleven pts. was 184 days (range 61 - 471). Mean time on study treatment (TTP in step 1 plus TTP in step 2) for pts. reaching step 2 was 380 days (range 174 - 864). Adverse events were generally mild. Conclusion: Results of this proof-of-principle trial suggest that complete resistance to both AI and T can be overcome in a proportion of pts. by combined treatment of AI and T, as all pts. served as their own control. Our results appear promising for a new treatment strategy which offers a chemotherapy-free and well-tolerated option for at least a subset of the pts. with HR positive, HER-2 positive breast cancer. Further trials will need to corroborate this finding.
Resumo:
The production and use of false identity and travel documents in organized crime represent a serious and evolving threat. However, a case-by-case perspective, thus suffering from linkage blindness and a limited analysis capacity, essentially drives the present-day fight against this criminal problem. To assist in overcoming these limitations, a process model was developed using a forensic perspective. It guides the systematic analysis and management of seized false documents to generate forensic intelligence that supports strategic and tactical decision-making in an intelligence-led policing approach. The model is articulated on a three-level architecture that aims to assist in detecting and following-up on general trends, production methods and links between cases or series. Using analyses of a large dataset of counterfeit and forged identity and travel documents, it is possible to illustrate the model, its three levels and their contribution. Examples will point out how the proposed approach assists in detecting emerging trends, in evaluating the black market's degree of structure, in uncovering criminal networks, in monitoring the quality of false documents, and in identifying their weaknesses to orient the conception of more secured travel and identity documents. The process model proposed is thought to have a general application in forensic science and can readily be transposed to other fields of study.
Resumo:
Gender identity disorder is defined as a permanent desire to relieve one's own sexual features to acquire the sexual features and line to life of the opposite sex. The diagnosis is based on the psychiatric evaluation and treatment on an interdisciplinary approach by endocrinologists, surgeons and psychiatrists, and can be conceptualized into distinct phases: diagnostic evaluation, real life experience, hormonal treatment and surgery. Multiples challenges have to be faced, especially by the psychiatrist who follows the patient during the whole process.
Resumo:
Forensic intelligence is a distinct dimension of forensic science. Forensic intelligence processes have mostly been developed to address either a specific type of trace or a specific problem. Even though these empirical developments have led to successes, they are trace-specific in nature and contribute to the generation of silos which hamper the establishment of a more general and transversal model. Forensic intelligence has shown some important perspectives but more general developments are required to address persistent challenges. This will ensure the progress of the discipline as well as its widespread implementation in the future. This paper demonstrates that the description of forensic intelligence processes, their architectures, and the methods for building them can, at a certain level, be abstracted from the type of traces considered. A comparative analysis is made between two forensic intelligence approaches developed independently in Australia and in Europe regarding the monitoring of apparently very different kind of problems: illicit drugs and false identity documents. An inductive effort is pursued to identify similarities and to outline a general model. Besides breaking barriers between apparently separate fields of study in forensic science and intelligence, this transversal model would assist in defining forensic intelligence, its role and place in policing, and in identifying its contributions and limitations. The model will facilitate the paradigm shift from the current case-by-case reactive attitude towards a proactive approach by serving as a guideline for the use of forensic case data in an intelligence-led perspective. A follow-up article will specifically address issues related to comparison processes, decision points and organisational issues regarding forensic intelligence (part II).
Resumo:
Purpose The purpose of our multidisciplinary study was to define a pragmatic and secure alternative to the creation of a national centralised medical record which could gather together the different parts of the medical record of a patient scattered in the different hospitals where he was hospitalised without any risk of breaching confidentiality. Methods We first analyse the reasons for the failure and the dangers of centralisation (i.e. difficulty to define a European patients' identifier, to reach a common standard for the contents of the medical record, for data protection) and then propose an alternative that uses the existing available data on the basis that setting up a safe though imperfect system could be better than continuing a quest for a mythical perfect information system that we have still not found after a search that has lasted two decades. Results We describe the functioning of Medical Record Search Engines (MRSEs), using pseudonymisation of patients' identity. The MRSE will be able to retrieve and to provide upon an MD's request all the available information concerning a patient who has been hospitalised in different hospitals without ever having access to the patient's identity. The drawback of this system is that the medical practitioner then has to read all of the information and to create his own synthesis and eventually to reject extra data. Conclusions Faced with the difficulties and the risks of setting up a centralised medical record system, a system that gathers all of the available information concerning a patient could be of great interest. This low-cost pragmatic alternative which could be developed quickly should be taken into consideration by health authorities.