Displaying all 11 publications

Abstract:
Sort:
  1. Law YH
    Science, 2019 03 01;363(6430):914-915.
    PMID: 30819943 DOI: 10.1126/science.363.6430.914
    Matched MeSH terms: Theft*
  2. Ahmad Mahir Razali, Nurulkamal Masseran, Noriszura Ismail, Malina Zulkifli
    Sains Malaysiana, 2015;44:1363-1370.
    The aim of this paper was to identify the determinants that influence vehicle theft by applying a negative binomial regression model. The identification of these determinants is very important to policy-makers, car-makers and car owners, as they can be used to establish practical steps for preventing or at least limiting vehicle thefts. In addition, this paper also proposed a crime mapping application that allows us to identify the most risky areas for vehicle theft. The results from this study can be utilized by local authorities as well as management of internal resource planning of insurance companies in planning effective strategies to reduce vehicle theft. Indirectly, this paper has built ingenuity by combining information obtained from the database of Jabatan Perangkaan Malaysia and insurance companies to pioneer the development of location map of vehicle theft in Malaysia.
    Matched MeSH terms: Theft
  3. Iranmanesh V, Ahmad SM, Adnan WA, Yussof S, Arigbabu OA, Malallah FL
    ScientificWorldJournal, 2014;2014:381469.
    PMID: 25133227 DOI: 10.1155/2014/381469
    One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%.
    Matched MeSH terms: Identity Theft/prevention & control
  4. Esther Omolara A, Jantan A, Abiodun OI, Arshad H, Dada KV, Emmanuel E
    Health Informatics J, 2020 09;26(3):2083-2104.
    PMID: 31957538 DOI: 10.1177/1460458219894479
    Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient's account to steal the patient's personal, medical or genetic details. This threat is amplified given that an individual's genetic content is connected to their family, thus leading to security risks for their family members as well. Several cases of patient's data theft have been reported where cybercriminals authenticated into the patient's account, stole the patient's medical data and assumed the identity of the patients. In some cases, the stolen data were used to access the patient's accounts on other platforms and in other cases, to make fraudulent health insurance claims. Several measures have been suggested to address the security issues in electronic health record systems. Nevertheless, we emphasize that current measures proffer security in the short-term. This work studies the feasibility of using a decoy-based system named HoneyDetails in the security of the electronic health record system. HoneyDetails will serve fictitious medical data to the adversary during his hacking attempt to steal the patient's data. However, the adversary will remain oblivious to the deceit due to the realistic structure of the data. Our findings indicate that the proposed system may serve as a potential measure for safeguarding against patient's information theft.
    Matched MeSH terms: Theft
  5. Muhammad SA, Frew RD, Hayman AR
    Front Chem, 2015;3:12.
    PMID: 25774366 DOI: 10.3389/fchem.2015.00012
    Compound-specific isotope analysis (CSIA) offers great potential as a tool to provide chemical evidence in a forensic investigation. Many attempts to trace environmental oil spills were successful where isotopic values were particularly distinct. However, difficulties arise when a large data set is analyzed and the isotopic differences between samples are subtle. In the present study, discrimination of diesel oils involved in a diesel theft case was carried out to infer the relatedness of the samples to potential source samples. This discriminatory analysis used a suite of hydrocarbon diagnostic indices, alkanes, to generate carbon and hydrogen isotopic data of the compositions of the compounds which were then processed using multivariate statistical analyses to infer the relatedness of the data set. The results from this analysis were put into context by comparing the data with the δ(13)C and δ(2)H of alkanes in commercial diesel samples obtained from various locations in the South Island of New Zealand. Based on the isotopic character of the alkanes, it is suggested that diesel fuels involved in the diesel theft case were distinguishable. This manuscript shows that CSIA when used in tandem with multivariate statistical analysis provide a defensible means to differentiate and source-apportion qualitatively similar oils at the molecular level. This approach was able to overcome confounding challenges posed by the near single-point source of origin, i.e., the very subtle differences in isotopic values between the samples.
    Matched MeSH terms: Theft
  6. Efferth T, Banerjee M, Abu-Darwish MS, Abdelfatah S, Böckers M, Bhakta-Guha D, et al.
    Phytomedicine, 2019 Feb;53:319-331.
    PMID: 30190231 DOI: 10.1016/j.phymed.2018.06.007
    BACKGROUND: Practices of biopiracy to use genetic resources and indigenous knowledge by Western companies without benefit-sharing of those, who generated the traditional knowledge, can be understood as form of neocolonialism.

    HYPOTHESIS: The One-World Medicine concept attempts to merge the best of traditional medicine from developing countries and conventional Western medicine for the sake of patients around the globe.

    STUDY DESIGN: Based on literature searches in several databases, a concept paper has been written. Legislative initiatives of the United Nations culminated in the Nagoya protocol aim to protect traditional knowledge and regulate benefit-sharing with indigenous communities. The European community adopted the Nagoya protocol, and the corresponding regulations will be implemented into national legislation among the member states. Despite pleasing progress, infrastructural problems of the health care systems in developing countries still remain. Current approaches to secure primary health care offer only fragmentary solutions at best. Conventional medicine from industrialized countries cannot be afforded by the impoverished population in the Third World. Confronted with exploding costs, even health systems in Western countries are endangered to burst. Complementary and alternative medicine (CAM) is popular among the general public in industrialized countries, although the efficacy is not sufficiently proven according to the standards of evidence-based medicine. CAM is often available without prescription as over-the-counter products with non-calculated risks concerning erroneous self-medication and safety/toxicity issues. The concept of integrative medicine attempts to combine holistic CAM approaches with evidence-based principles of conventional medicine.

    CONCLUSION: To realize the concept of One-World Medicine, a number of standards have to be set to assure safety, efficacy and applicability of traditional medicine, e.g. sustainable production and quality control of herbal products, performance of placebo-controlled, double-blind, randomized clinical trials, phytovigilance, as well as education of health professionals and patients.

    Matched MeSH terms: Theft*
  7. Nambiar P, Carson G, Taylor JA, Brown KA
    J Forensic Odontostomatol, 2001 Jun;19(1):5-8.
    PMID: 11494677
    A wad of used chewing gum recovered from the scene of a burglary contained impressions of human teeth. Casts of these impressions displayed unique morphological characteristics which were found to show concordance with corresponding features present on casts of the posterior teeth of a suspect.
    Matched MeSH terms: Theft
  8. Tharshini NK, Ibrahim F, Zakaria E
    Data Brief, 2020 Aug;31:105958.
    PMID: 32676530 DOI: 10.1016/j.dib.2020.105958
    The datasets in this article provides supplementary information related to: (1) demographic profile of young offenders and (2) perpetrator experience in committing a crime. A quantitative approach based on a cross-sectional survey design was employed to collect data among 306 young offenders undergoing Community Service Order initiated by the Malaysian Social Welfare Department. The resultant data were analysed descriptively using Statistical Package for the Social Sciences (SPSS). The result stipulates that the majority of respondents are consist of male young offenders aged 20 years old, Malays, single in marital status, and unemployed. Based on the crime involvement aspect, the result indicates that young offenders involved in stealing (26.1%), does not carry any weapons while committing a crime (50.0%), and entangled in criminal activity due to peer influence (40.0%). Moreover, unfavorable luck contributes to the failure in executing crime (52.6%) which subsequently leads them to be arrested by the police (52.0%).
    Matched MeSH terms: Theft
  9. Loo, Jiann Lin, Eu, Choon Leng, Johari Khamis, Raba'iah Mohd Salleh, Suarn Singh Jasmit Singh
    MyJurnal
    Objective: Pritchard Criteria are adopted in a Malaysian criminal-justice system while assessing fitness to plead. There is limited data on the reason of unfitness to plead for female offenders in Malaysia.

    Methods: A case series of five patients hospitalized to Hospital Bahagia Ulu Kinta, Malaysia due to unfitness to plead was presented and discussed.

    Result: The offences include three homicides, one assault, and one stealing. All of them were diagnosed to have schizophrenia with prominent looseness of association. Four of them subsequently treated as Treatment-Resistant Schizophrenia (TRS) with a minimal response toward clozapine.

    Conclusion: Looseness of association may be a contributing factor for unfitness to plead among Malaysian female offenders, which can result in indeterminate hospitalization. This should be confirmed in a larger prospective study.
    Matched MeSH terms: Theft
  10. Manveen, K.S., Pillai, S.K., Muhsin, M., Salwina, W., Aili, H.H.
    MyJurnal
    The population of incarcerated sex offenders in Malaysia is steadily growing. Objective: This is a descriptive study to look at what clinical and developmental characteristic are present amongst the sex offenders in Malaysia, which could be possible mitigating factors. Methods: Data was collected from offenders located in 3 prisons where the offenders are held. Results: a total of 147 prisoners participated in the study. Slightly more than half of the victims were below the age of 18, of which 10% were below the age of 12. Three quarters of offenders were thirty years and older, while 12% were below 18 years. However their problems begun much earlier in their life with 50% of the offenders reporting that they had difficulties in their
    primary support group, resulting in them feeling their families were less expressive, their parents were distant and unsupportive.29% of the offenders had not lived with their parents from the age of 16. More than half of the offenders reported academic, behavior and developmental difficulties; they reported losing interest in their studies and were struggling during their schooling days. 43% had history of aggressive behaviour during their adolescent years and 76% had peers who often indulged in risky behaviors. 85% of the offenders were Muslim. 40% made the criteria of Attention Deficit Hyperactive Disorder and conduct disorder while a quarter were diagnosed with having personality disorder. Slightly more than half of the offenders had alcohol and drug-related problems, 36% had history of previous crimes, mainly drug and theft offence. Conclusion: The findings show that the sex offenders are indeed a heterogeneous group with pervasive familial, behaviour, academic and social problems which are possible risk that can be identified early in the lives of offenders.
    Matched MeSH terms: Theft
  11. Phua KL
    New Solut, 2008;18(2):221-31.
    PMID: 18511398 DOI: 10.2190/NS.18.2.k
    When public health researchers study the health effects of disasters (whether "naturally-occurring," disasters due to failure of technology, or disasters due to terrorism), some aspects of the post-disaster situation of victims are often overlooked. Social science research has shown that the vast majority of people tend to behave altruistically during and after a disaster. Nevertheless, cases of victimization of survivors do occur. They can include post-disaster victimization of survivors by other individuals (including fellow survivors, opportunistic outsiders, and even unethical aid workers and rogue members of the police, armed forces or international organizations such as the United Nations), groups (such as organized criminal gangs) and institutions (through neglect, incompetence, bureaucratic inefficiency or through institutionalized discriminatory practices). In this article, various kinds of post-disaster victimization that can occur are discussed.
    Matched MeSH terms: Theft
Related Terms
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links