4 resultados para Darfur (2003 to 2008)
em Digital Commons at Florida International University
Resumo:
In this thesis I sought to explain the origins of national security concerns over foreign investments in the United States from 1919 to 2008. I identified and examined 29 cases of national security concerns over foreign investments in the United States during that period, and argued that in order to understand the circumstances under which foreign investments in the United States are perceived to be threats to the U.S. security we must rely on a combination of democratic peace theory and the version of political realism known as power transition theory. Thus, I tested the argument that national security concerns over foreign investments in the United States from 1919 to 2008 resulted from: (1) perceptions of international power transition, (2) perceptions of ideological and institutional differences between the United States and the home country of the investor, (3) perceptions of the strategic importance of the sector where the investment is made, and (4) perceptions of participation or control of the foreign investor by the government of the country of origin. I found that all these hypotheses have some explanatory power.
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
Deep well injection into non-potable saline aquifers of treated domestic wastewater has been used in Florida for decades as a safe and effective alternative to ocean outfall disposal. The objectives of this study were to determine the fate and transport of injected wastewater at two deep well injection sites in Miami Dade County, Florida, USA. Detection of ammonium in the Middle Confining units of the Floridan aquifer above the injection zone at both sites has been interpreted as evidence of upward migration of injected wastewater, posing a risk to underground sources of drinking water. Historical water quality data, including ammonia, chloride, temperature, and pH from existing monitoring wells at both sites from 1983 to 2008, major ions collected monthly from 2006 and 2008, and a synoptic sampling event for stable isotopes, tritium, and dissolved gases in 2008, were used to determine the source of ammonium in groundwater and possible migration pathways. Geochemical modeling was used to determine possible effects of injected wastewater on native water and aquifer matrix geochemistry. Injected wastewater was determined to be the source of elevated ammonium concentrations above ambient water levels, based on the results of major ion concentrations, tritium, dissolved noble gases and 15N isotopes analyses. Various possible fluid migration pathways were identified at the sites. Data for the south site suggest buoyancy-driven vertical pathways to overlying aquifers bypassing the confining units, with little mixing of injected wastewater with native water as it migrated upward. Once it is introduced into an aquifer, the injectate appeared to migrate advectively with the regional groundwater flow. Geochemical modeling indicated that CO 2-enriched injected wastewater allowed for carbonate dissolution along the vertical pathways, enhancing permeability along these flowpaths. At the north site, diffusive upward flow through the confining units or offsite vertical pathways were determined to be possible, however no evidence was detected for any on-site confining unit bypass pathway. No evidence was observed at either site of injected wastewater migration to the Upper Floridan aquifer, which is used as a municipal water supply and for aquifer storage and recovery.
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.