941 resultados para Illegal marijuana


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: THC-COOH has been proposed as a criterion to help to distinguish between occasional from regular cannabis users. However, to date this indicator has not been adequately assessed under experimental and real-life conditions. Methods: We carried out a controlled administration study of smoked cannabis with a placebo. Twenty-three heavy smokers and 25 occasional smokers, between 18 and 30 years of age, participated in this study [Battistella G et al., PloS one. 2013;8(1):e52545]. We collected data from a second real case study performed with 146 traffic offenders' cases in which the whole blood cannabinoid concentrations and the frequency of cannabis use were known. Cannabinoid levels were determined in whole blood using tandem mass spectrometry methods. Results: Significantly high differences in THC-COOH concentrations were found between the two groups when measured during the screening visit, prior to the smoking session, and throughout the day of the experiment. Receiver operating characteristic (ROC) curves were determined and two threshold criteria were proposed in order to distinguish between these groups: a free THC-COOH concentration below 3 μg/L suggested an occasional consumption (≤ 1 joint/week) while a concentration higher than 40 μg/L corresponded to a heavy use (≥ 10 joints/month). These thresholds were successfully tested with the second real case study. The two thresholds were not challenged by the presence of ethanol (40% of cases) and of other therapeutic and illegal drugs (24%). These thresholds were also found to be consistent with previously published experimental data. Conclusion: We propose the following procedure that can be very useful in the Swiss context but also in other countries with similar traffic policies: If the whole blood THC-COOH concentration is higher than 40 μg/L, traffic offenders must be directed first and foremost toward medical assessment of their fitness to drive. This evaluation is not recommended if the THC-COOH concentration is lower than 3 μg/L. A THC-COOH level between these two thresholds can't be reliably interpreted. In such a case, further medical assessment and follow up of the fitness to drive are also suggested, but with lower priority.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The unsustainable politically speaking institutional bipolarisation and recent events in the world arena (11 September 2001, unilateralism and the illegal war brought against Iraq by the USA, failures and blockage of WTO negotiating rounds at Seattle and Cancun, merely rhetorical results from the latest UN summits in Monterrey and Johannesburg) only serves to show just how completely outdated the system of international institutions, born after the Second World War, has become.It is vital, then, for us to establish a new system of global democratic governance, and this entails, amongst other things, In-depth reform of the system of international institutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INTRODUCTION AND AIMS: The positive relationship between alcohol use, gender and violence-related injury is well established. However, less is known about injuries when alcohol is used in combination with other drugs. DESIGN AND METHODS: Self-report information was collected on alcohol and illicit drug use in the 6 h before a violence-related injury in probability samples of patients presenting to emergency departments (n = 9686). RESULTS: Patients with violence-related injuries reported the highest rates of alcohol use (49% of men; 23% of women) and alcohol use combined with illicit drugs (8% of men; 4% of women) whereas non-violent injury patients reported lower rates of alcohol use (17% of men; 8% of women) and alcohol use combined with drugs (2% for men; 1% for women). Marijuana/hashish was the most commonly reported drug. The odds of a violent injury were increased when alcohol was used [men: odds ratio (OR) = 5.4, 95% confidence interval (CI) 4.6-6.3; women: OR = 4.0, 95% CI 3.0-5.5] or when alcohol was combined with illicit drug use before the injury (men: OR = 6.6, 95% CI 4.7-9.3; women: OR = 5.7, 95% CI = 2.7-12.2) compared with non-users. No significant change in the odds of a violent injury was observed for men or women when alcohol users were compared with alcohol and drug users. DISCUSSION AND CONCLUSIONS: The positive association between alcohol and violent injury does not appear to be altered by the added use of drugs. Additional work is needed to understand the interpersonal, contextual and cultural factors related to substance use to identify best prevention practices and develop appropriate policies. [Korcha RA, Cherpitel CJ, Witbrodt J, Borges G, Hejazi-Bazargan S, Bond JC, Ye Y, Gmel G. Violence-related injury and gender: The role of alcohol and alcohol combined with illicit drugs. Drug Alcohol Rev 2014;33:43-50].

Relevância:

10.00% 10.00%

Publicador:

Resumo:

3,537 men enrolling in 2007 for mandatory army recruitment procedures were assessed for the co-occurrence of risky licit substance use among risky cannabis users. Risky cannabis use was defined as at least twice weekly; risky alcohol use as 6+ drinks more than once/monthly, or more than 20 drinks per week; and risky tobacco use as daily smoking. Ninety-five percent of all risky cannabis users reported other risky use. They began using cannabis earlier than did non-risky users, but age of onset was unrelated to other risky substance use. A pressing public health issue among cannabis users stems from risky licit substance use warranting preventive efforts within this age group.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Suomen uusi osakeyhtiölaki tuli voimaan 1.9.2006. Tutkielmassa on selvitetty uuden osakeyhtiölain keskeisimpiä vaikutuksia osakeyhtiöiden ja niiden osakkaiden verotukseen. Tutkielmassa on tarkasteltu uuden osakeyhtiölain nimellisarvotonta pääomajärjestelmää, varojenjakotapoja sekä yritysjärjestelytilanteita yhtiö- ja vero-oikeudelliselta kannalta. Valtiovarainministeriön asettama yritysverotuksen kehittämistyöryhmä on muistiossaan ehdottanut muutoksia verolakeihin uuden osakeyhtiölain vuoksi. Työryhmä on ehdottanut mm. osinkoverotuksen alaa ja peitellyn osingonjaonverottamista laajennettavaksi ja laittoman varojenjaon verotusta kiristettäväksi. Tutkielmassa on tarkasteltu työryhmän ehdotuksia ja pohdittu ehdotusten vaikutusta käytännön yritystoimintaan elinkeinoverolain näkökulmasta. Työryhmän ehdotukset eivät kuitenkaan kata kaikkia tilanteita. OYL:ssa mahdollistetut uudet yritysmuodonmuutos- ja yritysjärjestelytilanteet eivät toistaiseksi ole toteutettavissa veroneutraalisti. Verolainsäädännön joustamattomuuden vuoksi useat uuden lain mahdollistamattoimintavaihtoehdot eivät ole yhtiöiden käytettävissä. Muutoksia verolakeihin on odotettavissa aikaisintaan vuoden 2007 eduskuntavaalien jälkeen. Ennen verolakien uudistamista verotuskäytäntö on epävarmaa, mikä tehokkaasti estää uusien toimintamahdollisuuksien toteuttamisen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use by police services and inquiring agencies of forensic data in an intelligence perspective is still fragmentary and to some extent ignored. In order to increase the efficiency of criminal investigation to target illegal drug trafficking organisations and to provide valuable information about their methods, it is necessary to include and interpret objective drug analysis results already during the investigation phase. The value of visual, physical and chemical data of seized ecstasy tablets, as a support for criminal investigation on a strategic and tactical level has been investigated. In a first phase different characteristics of ecstasy tablets have been studied in order to define their relevance, variation, correlation and discriminating power in an intelligence perspective. During 5 years, over 1200 cases of ecstasy seizures (concerning about 150000 seized tablets) coming from different regions of Switzerland (City and Canton of Zurich, Cantons Ticino, Neuchâtel and Geneva) have been systematically recorded. This turned out to be a statistically representative database including large and small cases. During the second phase various comparison and clustering methods have been tested and evaluated, on the type and relevance of tablet characteristics, thus increasing knowledge about synthetic drugs, their manufacturing and trafficking. Finally analytical methodologies have been investigated and formalised, applying traditional intelligence methods. In this context classical tools, which are used in criminal analysis (like the I2 Analyst Notebook, I2 Ibase, ?) have been tested and adapted to address the specific need of forensic drug intelligence. The interpretation of these links provides valuable information about criminal organisations and their trafficking methods. In the final part of this thesis practical examples illustrate the use and value of such information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El artículo se propone mostrar que el diverso tratamiento social otorgado a la presencia de «reyes» y «reinas» latinos en diferentes lugares de España ha justificado distintos planteamientos de intervención defendidos fundamentalmente por los poderes públicos. Para ello, presentamos los primeros resultados de un proyecto de I+D+i en el que se ha realizado trabajo de campo en Barcelona y Madrid. Dichos contextos locales ejemplifican distintas modalidades de actuación. Para su comparación, nos centramos en dos acontecimientos que tuvieron gran repercusión en la opinión pública: la constitución de la Organización Cultural de Reyes y Reinas Latinos de Catalunya (julio de 2006) y el proceso por asociación ilícita contra el grupo de reyes y reinas latinos vinculados a la Sagrada Tribu América Spain en Madrid (abril de 2007). Dicha comparación revela que, más que a los rasgos socioculturales de los jóvenes migrantes, las diferencias responden a discrepancias en las políticas de acogida.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present article contributes to the ongoing academic debate on migrants' appropriation of artistic and political spaces in Germany. Cologne, one of the largest cities in Germany, is an interesting example of the tension between political discourse centred around multiculturalism and cultural segregation processes. The 'no fool is illegal' carnival organised by asylum seekers shows their capacity to act, as they reinvent an old local tradition by reinterpreting medieval rituals. Today, different groups and associations appropriate this festive art space: migrants, gays and lesbians, feminists and far-left groups either organise their own parties or take part in the official parties and parades as separate groups. As a result, the celebration of diversity figures on the local political agenda and becomes part of the official carnival festivities. This leads to a blurring of boundaries, whereby mainstream popular culture becomes more and more influenced by multicultural elements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La aprobación en junio de 2008 por el Parlamento Europeo de la Directiva de retorno —denominada también Directiva de la infamia o Directiva de expulsión— consolida el proceso de involución que sobre los derechos humanos se viene produciendo en la Unión Europea desde que el miedo a la inmigración irregular se incardinó en sus instituciones. Si bien las legislaciones de extranjería de los años ochenta contenían normas que regulaban el internamiento y la expulsión no es hasta la Directiva 2001/40/CE que comienza a tomar forma una política comunitaria centrada en la inmigración irregular y las expulsiones de migrantes. Las medidas de retorno son, dice la Comisión europea, “una piedra angular de la política de migración de la UE”. Desde entonces, la barbarie de los centros de retención e internamiento, el socavamiento de los derechos y la exclusión y criminalización de los migrantes extranjeros se han convertido en el caballo de batalla de las asociaciones defensoras de los derechos humanos. La erosión que las legislaciones y medidas de expulsión están provocado en los derechos y libertades y en las instituciones del Estado de derecho es inmensa. El retroceso y la erosión en los derechos y libertades es tan grande que ya no es posible continuar hablando sin más de Estados de derecho en la UE, sino más bien de máquinas administrativas para el internamiento y la expulsión, de “Estados expulsores”(1), donde las personas extranjeras son tratadas como semipersonas (2) e incluso como“no-personas” (3).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La biopolítica sobre los migrantes se fundamenta en el binomio dejar entrar-residir o expulsar. Las leyes de extranjería están elaboradas sobre dos ejes: por un lado, en la regulación de los flujos migratorios en función del mercado de trabajo y las demandas de la economía y, por otro, en el control policial y la persecución de la inmigración irregular. Para la realización del primer eje del binomio, dejar entrar y residir, los Estados se dotan de mecanismos de regulación e intervención sobre el inmigrante concebido como fuerza de trabajo productiva. Asimismo los Estados crean mecanismos de control-sanción para las personas migrantes que incumplen los requisitos establecidos para entrar y residir en el territorio. En este punto la biopolítica sobre la población migrante se solapa o toma forma en el ejercicio de la soberanía por el Leviatán. Las medidas de control y sanción que los gobiernos ponen en marcha sobre los sin papeles han creado una imponente maquinaria de coacción en el interior de las instituciones del Estado de derecho hasta el punto de convertirlo en un Estado expulsor.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Doxorubicin (DOX) is a widely used, potent chemotherapeutic agent; however, its clinical application is limited because of its dose-dependent cardiotoxicity. DOX's cardiotoxicity involves increased oxidative/nitrative stress, impaired mitochondrial function in cardiomyocytes/endothelial cells and cell death. Cannabidiol (CBD) is a nonpsychotropic constituent of marijuana, which is well tolerated in humans, with antioxidant, antiinflammatory and recently discovered antitumor properties. We aimed to explore the effects of CBD in a well-established mouse model of DOX-induced cardiomyopathy. DOX-induced cardiomyopathy was characterized by increased myocardial injury (elevated serum creatine kinase and lactate dehydrogenase levels), myocardial oxidative and nitrative stress (decreased total glutathione content and glutathione peroxidase 1 activity, increased lipid peroxidation, 3-nitrotyrosine formation and expression of inducible nitric oxide synthase mRNA), myocardial cell death (apoptotic and poly[ADP]-ribose polymerase 1 [PARP]-dependent) and cardiac dysfunction (decline in ejection fraction and left ventricular fractional shortening). DOX also impaired myocardial mitochondrial biogenesis (decreased mitochondrial copy number, mRNA expression of peroxisome proliferator-activated receptor γ coactivator 1-alpha, peroxisome proliferator-activated receptor alpha, estrogen-related receptor alpha), reduced mitochondrial function (attenuated complex I and II activities) and decreased myocardial expression of uncoupling protein 2 and 3 and medium-chain acyl-CoA dehydrogenase mRNA. Treatment with CBD markedly improved DOX-induced cardiac dysfunction, oxidative/nitrative stress and cell death. CBD also enhanced the DOX-induced impaired cardiac mitochondrial function and biogenesis. These data suggest that CBD may represent a novel cardioprotective strategy against DOX-induced cardiotoxicity, and the above-described effects on mitochondrial function and biogenesis may contribute to its beneficial properties described in numerous other models of tissue injury.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ohjelmistojen tietoturva on noussut viime aikoina entistä tärkeämpään rooliin. Ohjelmistojen suunnittelu pitää alusta alkaen hoitaa siten, että tietoturva tulee huomioitua. Ohjelman helppokäyttöisyys ei saisi ajaa tietoturvan edelle, eikä myöskään ohjeiden lukematta jättäminen saa tarkoittaa tietoturvan menetystä. Tärkeä osa ohjelmistojen tietoturvaa on myös ohjelmiston laillinen käyttö. Se miten laiton käyttö estetään sen sijaan on erittäin vaikeaa toteuttaa nykyjärjestelmissä. Työn tarkoituksena oli tutkia Intellitel Communications Oy:n sanomayhdyskäytävää, Intellitel Messaging Gateway, tuotetietoturvan näkökulmasta, löytää sieltä mahdolliset virheet ja myös korjata ne.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Java™ 2 Platform, Micro Edition on eräs johtava sovellusalusta, joka mahdollistaa kolmannen osapuolen sovellusten luomisen matkapuhelimiin, kommunikaattoreihin ja taskutietokoneisiin. Java-alusta keskeinen etu on sovellusten dynaaminen asentaminen. Käyttäjä ei ole rajoitettu esiasennettuihin sovelluksiin vaan voi asentaa niitä itse tarpeen mukaan. Tämän diplomityö käsittelee erilaisia Java sovellusten (MIDlettien) lataus ja asennusmenetelmiä. Diplomityö antaa yhteenvedon merkittävimmistä asennus teknologioista. Pääpaino on MIDP-standardin mukaisella langattomalle asennuksella (Over-The-Air provisioning) sillä se on kaikkein laajimmin käytetty menetelmä. Muita käsiteltäviä menetelmiä ovat WAP Push ja paikallinen asennus Bluetoothin ja Infrapunalinkin avulla. MIDletit, kuten mitkä tahansa ohjelmat, ovat alttiita laittomalle kopioinnille. Tämä diplomityö kuvaa menetelmiä, joilla laiton kopiointi voidaan estää. Yksi esimerkki on OMA™ DRM standardi. Diplomityö kuvaa myös kuinka kopiointisuojaus voidaan yhdistää olemassa oleviin asennusmenetelmiin. Java sovelluksia, MIDlettejä, käytetään yhä erilaisimpiin tarkoituksiin jolloin tarvitaan myös uusia asennusmenetelmiä. Yksi tällainen menetelmä on asentaminen erillisistä laitteista. Diplomityö kuvaa useita menetelmiä asentamiseen erillisistä laitteista. Käsitellyr menetelmät pohjautuvat Bluetooth teknologiaan ja yhtä lukuun ottamatta perustuvat standardin määrittelemiin Bluetooth profiileihin File Transfer Profile, Personal Area Networking Profile ja Object Push Profile. Toinen asennustapa on sovellusten edelleen lähettäminen toiseen puhelimeen. Diplomityö kuvaa kuinka OMA DRM standardi voidaan yhdistää tällaisen asennuksen ja ehdottaa kahta vaihtoehtoista menetelmää. Yksi perustuu Bluetoothin Object Push Profiiliin ja toinen Infrapunalinkin käyttöön. Toinen perustuu multimediaviestiin ja sähköpostiin.