862 resultados para Menu fraud


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary purpose of these studies was to determine the effect of planning menus using the Institute of Medicine's (IOMs) Simple Nutrient Density Approach on nutrient intakes of long-term care (LTC) residents. In the first study, nutrient intakes of 72 subjects were assessed using Dietary Reference Intakes (DRIs) and IOM methodology. The intake distributions were used to set intake and menu planning goals. In the second study, the facility's regular menus were modified to meet the intake goals for vitamin E, magnesium, zinc, vitamin D and calcium. An experiment was used to test whether the modified menu resulted in intakes of micronutrients sufficient to achieve a low prevalence (<3%) of nutrient inadequacies. Three-day weighed food intakes for 35 females were adjusted for day-to-day variations in order to obtain an estimate of long-term average intake and to estimate the proportion of residents with inadequate nutrient intakes. ^ In the first study, the prevalence of inadequate intakes was determined to be between 65-99% for magnesium, vitamin E, and zinc. Mean usual intakes of Vitamin D and calcium were far below the Adequate Intakes (AIs). In the experimental study, the prevalence of inadequacies was reduced to <3% for zinc and vitamin E but not magnesium. The groups' mean usual intake from the modified menu met or exceeded the AI for calcium but fell short for vitamin D. Alternatively, it was determined that addition of a multivitamin and mineral (MVM) supplement to intakes of the regular menu could be used to achieve goals for vitamin E, zinc and vitamin D but not calcium and magnesium. ^ A combination of menu modification and MVM supplementation may be necessary to achieve a low prevalence of micronutrient inadequacies among LTC residents. Menus should be planned to optimize intakes of those nutrients that are low in an MVM, such as calcium, magnesium, and potassium. A MVM supplement should be provided to fill the gap for nutrients not provided in sufficient amounts by the diet, such as vitamin E and vitamin D. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research focuses on the design and verification of inter-organizational controls. Instead of looking at a documentary procedure, which is the flow of documents and data among the parties, the research examines the underlying deontic purpose of the procedure, the so-called deontic process, and identifies control requirements to secure this purpose. The vision of the research is a formal theory for streamlining bureaucracy in business and government procedures. ^ Underpinning most inter-organizational procedures are deontic relations, which are about rights and obligations of the parties. When all parties trust each other, they are willing to fulfill their obligations and honor the counter parties’ rights; thus controls may not be needed. The challenge is in cases where trust may not be assumed. In these cases, the parties need to rely on explicit controls to reduce their exposure to the risk of opportunism. However, at present there is no analytic approach or technique to determine which controls are needed for a given contracting or governance situation. ^ The research proposes a formal method for deriving inter-organizational control requirements based on static analysis of deontic relations and dynamic analysis of deontic changes. The formal method will take a deontic process model of an inter-organizational transaction and certain domain knowledge as inputs to automatically generate control requirements that a documentary procedure needs to satisfy in order to limit fraud potentials. The deliverables of the research include a formal representation namely Deontic Petri Nets that combine multiple modal logics and Petri nets for modeling deontic processes, a set of control principles that represent an initial formal theory on the relationships between deontic processes and documentary procedures, and a working prototype that uses model checking technique to identify fraud potentials in a deontic process and generate control requirements to limit them. Fourteen scenarios of two well-known international payment procedures—cash in advance and documentary credit—have been used to test the prototype. The results showed that all control requirements stipulated in these procedures could be derived automatically.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study evaluated three menu nutrition labeling formats: calorie only information, a healthy symbol, and a nutrient list. Daily sales data for a table-service restaurant located on a university campus were recorded during a four-week period from January to February 2013 to examine changes in average nutritional content of the entrees purchased by customers when different nutrition labels were provided. A survey was conducted to assess the customers’ use of nutrition labels, their preferences among the three labeling formats, their entree selections, their cognitive beliefs with regard to healthy eating, and their demographic characteristics. A total of 173 questionnaires were returned and included in data analysis. Analysis of Variance (ANOVA) and regression analyses were performed using SAS. The results showed that favorable attitudes toward healthy eating and the use of nutrition labels were both significantly associated with healthier entrée selections. Age and diet status had some effects on the respondent’s use of nutrition labels. The calorie only information format was the most effective in reducing calories contained in the entrees sold, and the nutrient list was most effective in reducing fat and saturated fat content of the entrees sold. The healthy symbol was the least effective format, but interestingly enough, was most preferred by respondents. The findings provide support for future research and offer implications for policy makers, public health professionals, and foodservice operations.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research focuses on the design and verification of inter-organizational controls. Instead of looking at a documentary procedure, which is the flow of documents and data among the parties, the research examines the underlying deontic purpose of the procedure, the so-called deontic process, and identifies control requirements to secure this purpose. The vision of the research is a formal theory for streamlining bureaucracy in business and government procedures. Underpinning most inter-organizational procedures are deontic relations, which are about rights and obligations of the parties. When all parties trust each other, they are willing to fulfill their obligations and honor the counter parties’ rights; thus controls may not be needed. The challenge is in cases where trust may not be assumed. In these cases, the parties need to rely on explicit controls to reduce their exposure to the risk of opportunism. However, at present there is no analytic approach or technique to determine which controls are needed for a given contracting or governance situation. The research proposes a formal method for deriving inter-organizational control requirements based on static analysis of deontic relations and dynamic analysis of deontic changes. The formal method will take a deontic process model of an inter-organizational transaction and certain domain knowledge as inputs to automatically generate control requirements that a documentary procedure needs to satisfy in order to limit fraud potentials. The deliverables of the research include a formal representation namely Deontic Petri Nets that combine multiple modal logics and Petri nets for modeling deontic processes, a set of control principles that represent an initial formal theory on the relationships between deontic processes and documentary procedures, and a working prototype that uses model checking technique to identify fraud potentials in a deontic process and generate control requirements to limit them. Fourteen scenarios of two well-known international payment procedures -- cash in advance and documentary credit -- have been used to test the prototype. The results showed that all control requirements stipulated in these procedures could be derived automatically.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although calorie information at the point-of-purchase at fast food restaurants is proposed as a method to decrease calorie choices and combat obesity, research results have been mixed. Much of the supportive research has weak methodology, and is limited. There is a demonstrated need to develop better techniques to assist consumers to make lower calorie food choices. Eating at fast food restaurants has been positively associated with weight gain. The current study explored the possibility of adding exercise equivalents (EE) (physical activity required to burn off the calories in the food), along with calorie information as a possible way to facilitate lower calorie choice at the point-of-choice in fast food restaurants. This three-group experimental study, in 18-34 year old, overweight and obese women, examines whether presenting caloric information in the form of EE at the point-of-choice at fast food restaurants, will lead to lower calorie food choices compared to presenting simple caloric information or no information at all. Methods: A randomized repeated measures experiment was conducted. Participants ordered a fast food meal from Burger King with menus that contained only the names of the food choices (Lunch 1). One week later (Lunch 2), study participants were given one of three menus that varied: no information, calorie information, or calorie information and EE. Study participants included 62 college aged students. Additionally, the study controlled for dietary restraint by blocking participants, before randomization, to the three groups. Results: A repeated measures analysis of variance was conducted. The study was not sufficiently powered, and while the study was designed to determine large effect sizes, a small effect size of .026, was determined. No significant differences were found in the foods ordered among the various menu conditions. Conclusion: Menu labeling alone might not be enough to reduce calories at the point-of-choice at restaurants. Additional research is necessary to determine if calorie information and EE at the point-of-choice would lead to fewer calories chosen at a meal. Studies should also look at long-term, repeated exposure to determine the effectiveness of calories and or EE at the point-of-choice at fast food restaurants.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of the current piece of research presents was draw up a list of recommendations for the site of the Instituto do Cérebro da Universidade Federal do Rio Grande do Norte, with an emphasis on fault identification in usability and information architecture, through the application of design techniques with users of the institution. From the use of the following techniques: Cardsorting, applied to a group of six people as target public, such as professor, administrative technicians and graduate student of the institution; Interviews, carried out with the director of the Instituto do Cérebro, secretaries of the undergraduate and graduate courses; Cooperative Evaluation applied in two ways: in group and individually. The evaluation in group was fulfilled in four sessions that occurred with a group composed of six people who are part of the technical staff of the Instituto do Cérebro. In the Individual Cooperative Evaluation, eight users (graduate students and administrative technicians of the Instituto do Cérebro da UFRN) performed tasks which are frequently fulfilled by users from the public target in the site of the Instituto do Cérebro. After each session of the Individual Cooperative Evaluation, a questionnaire of the user´s satisfaction was used about his or her perception in regard to the site usability and utility of the mentioned institute site. Therefore, it was concluded that, by means of the analysis of the results and the triangulation of the obtained data in each one of the techniques applied with the users, in the present piece of research, problems were verified, among others; all related to the unsuitable use of the interface elements, navigation, labeling of some menu terms, and still, the lack of search space and integration with the social networks – besides the lack, positioning and inappropriate formatting of information that would be of high relevance to the users. Finally, a list of recommendations is presented and this can be used in a future interface redesign with the goal to improve the information architecture and the usability of the site of the Instituto do Cérebro da Universidade Federal do Rio Grande do Norte.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I study the link between capital markets and sources of macroeconomic risk. In chapter 1 I show that expected inflation risk is priced in the cross section of stock returns even after controlling for cash flow growth and volatility risks. Motivated by this evidence I study a long run risk model with a built-in inflation non-neutrality channel that allows me to decompose the real stochastic discount factor into news about current and expected cash flow growth, news about expected inflation and news about volatility. The model can successfully price a broad menu of assets and provides a setting for analyzing cross sectional variation in expected inflation risk premium. For industries like retail and durable goods inflation risk can account for nearly a third of the overall risk premium while the energy industry and a broad commodity index act like inflation hedges. Nominal bonds are exposed to expected inflation risk and have inflation premiums that increase with bond maturity. The price of expected inflation risk was very high during the 70's and 80's, but has come down a lot since being very close to zero over the past decade. On average, the expected inflation price of risk is negative, consistent with the view that periods of high inflation represent a "bad" state of the world and are associated with low economic growth and poor stock market performance. In chapter 2 I look at the way capital markets react to predetermined macroeconomic announcements. I document significantly higher excess returns on the US stock market on macro release dates as compared to days when no macroeconomic news hit the market. Almost the entire equity premium since 1997 is being realized on days when macroeconomic news are released. At high frequency, there is a pattern of returns increasing in the hours prior to the pre-determined announcement time, peaking around the time of the announcement and dropping thereafter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces two new datasets on national level elections from 1975 to 2004. The data are grouped into two separate datasets, the Quality of Elections Data and the Data on International Election Monitoring. Together these data sets provide original information on elections, election observation and election quality, and will enable researchers to study a variety of research questions. The datasets will be publicly available and are maintained at a project website.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Online Romance Scam is a relatively new form of fraud that became apparent in about 2008. In this crime, criminals pretend to initiate a relationship through online dating sites then defraud their victims of large sums of money. This paper presents some descriptive statistics about knowledge and victimization of the online dating romance scam in Great Britain. Our study found that despite its newness, an estimated 230,000 British citizens may have fallen victim to this crime. We conclude that there needs to be some rethinking about providing avenues for victims to report the crime or at least making them more comfortable when doing so.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este artículo cuantifica la presencia de obra artística de mujeres artistas en 21 museos y centros de arte contemporáneo españoles. Los resultados constatan una nítida sub-representación de la obra exhibida, por debajo del 20 por ciento. ¿Por qué sucede esto?, ¿diferencial potencial artístico de mujeres y hombres?, ¿superioridad masculina?, ¿discriminación? o ¿un sistema de arte con sesgo androcéntrico? En estas páginas se discute sobre la presencia de varios factores para explicar la brecha de género y se reclama, de las administraciones públicas y las instituciones de gestión cultural, el cumplimiento de la Ley para la Igualdad para garantizar la paridad.