Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Frauds

There is a fundamental difference between such scientific controversies and what simply can be called scientific fraud, i.e., deliberate falsification or fudging of data. Sloppy experimental work or data keeping can also lead to questionable or incorrect conclusions, and, although these violate established scientific standards and must be corrected (as they will), they do not necessarily represent deliberate fraud. In all this, the professor has a strict personal responsibility. As he/she is getting most of the recognition for the accomplishment of the research, it is only natural that he/she must also shoulder the responsibility for any mistakes, errors, or even falsifications. It is not accepta-... [Pg.249]

R. H. Marijnissen, Paintings, Genuine, Fraud, Fake Modem Methods of Examining Paintings, Elsevier, Bmssels, 1985. [Pg.431]

Quebracho bark was first examined by Fraude, who isolated aspidospermine, and later by Hesse, who obtained quebrachine (yohimbine) and four other bases, aspidosamine, aspidospermatine, m.p. 162°, [a]n — 72-3°, hypoquebrachine and quebrachamine, of which the last has been confirmed by other workers the first and third, according to Ewins, are possibly decomposition products of aspidospermine. In the course of an investigation of this alkaloid Ewins isolated two unnamed bases. One of these, m.p. 149-150°, is probably quebrachamine the other crystallises from ethjd acetate in octahedra, m.p. 176-7°. [Pg.511]

K. Grob, M. Biedermann and M. Bronz, Results of a contr ol of edible oils frauds by admixtures, contaminations , Mitt. Gebiete Lebensm. Hyg. 85 351-365 (1994). [Pg.247]

Betm, vu fraud, deception, betriigen, v.t. cheat, defraud, dupe. [Pg.69]

Trug, m. deception, fraud, -bild, n. phantom, illusion. [Pg.454]

Criminal action This may include robbery, vandalism, fraud and industrial espionage. [Pg.47]

The type of alarm system used is dependent on the expected type of security breach and the method employed in responding to one. In unguarded premises, requiring only a low level of security, an alarm that operates immediately a device detects a security breach may be sufficient to ward off vandals, burglars and crimes of opportunity. On the other hand, where breaches of security may involve more determined criminals, such as fraud or industrial espionage, delayed alarms on the premises may give time for security personnel and/or police to apprehend the criminal in the process of committing the crime. [Pg.49]

There is a formula for business failures based on Dun Bradstreet, Inc. annually published data. The vast majority of the firms involved are small. Why do failures occur D B has offered the following tabular explanation (apparent cause/percent) inadequate sales/49.9, competitive weakness/25.3, heavy operating expenses/13.0, receivables difficul-ties/8.3, inventory difficulties/7.7, excessive fixed assets/3.2, poor location/2.7, neglect/0.8, disaster/0.8, fraud/0.5, and others/1.1. Numbers do not add up to 100% because some failures are attributed to a combination of apparent causes. One can include that product design directly influences competitive weakness and heavy operating expenses. [Pg.295]

We can expect drastic changes in the food packaging industry. Some will arise from new consumer needs, new or expanded food supplies and products, and new food preservation systems such as aseptic packaging. Others will result from societally based constraints such as safety in health and hazardous use (as in the child safety closure legislation) and consumer protection against fraud, misinformation, or wrongful use where the burden for awareness is no longer on the buyer but on the supplier. Other such constraints will arise from environmental concerns or material scarcities. [Pg.106]

Fear of Fraud It is illuminating that there are companies that lock the input to a computer system (specifically a so-called LIMS, a Laboratory Information Management System) in such a manner that it takes the supervisor s password and signature to correct a missed keystroke, even if this is noticed before the (Enter) key is pressed. If the unwitnessed use of the (Backspace) key betrays malicious intent to falsify raw data, then every scientist should be in jail. [Pg.276]

The EU laws follow three principles related to consumer health (1) protection, (2) fraud prevention, and (3) trade barriers. The union tried to harmonize the laws of different countries, particularly in recent years when the enlargement of the European Community became dynamic. Color Directive 94/36/EC contains horizontal provisions that refer to common laws in different countries and vertical directives that apply to specific foods. The EU directives take into account the recommendations of the Scientific Committee for Food (SCF), the Codex AUmen-tarius Commission, and the Joint Food and Agriculture OrganizationAVorld Health Organization (FAOAVHO) Expert Committee on Food Additives (JECFA). [Pg.585]

Clymer, Reuben Swinburne. The Rosicrucians - their teachings, misunderstood, misquoted, their writings grossly misrepresented and they themselves defamed imitated by pretenders, frauds and pseudo-initiates, they, the true Rosicrucians remain as ever masters of the ages. Quakertown (PA) Philosophical Publ Co, 1923. 238p. [Pg.418]

Muscarella 2000). The tradition of simulating and forging antiquities has became continuous only the type of objects that attract the attention of collectors, and therefore also of fakers and frauds, varies from time to time and from place to place. [Pg.459]

Clermont-Ganneau, C. (1885), Les Grandes Fraudes Archeologiques a Palestine, Paris. [Pg.566]

Research is also strongly influenced by the admittedly legitimate interests of the pharmaceutical industry examples of this include contract clauses reserving copyright, the initial selection of researchers and topics, and the recent consolidation of the position of companies specializing in clinical trials (to the detriment of academic centres). Frequently there is a conflict of interests between social welfare and private welfare that does not necessarily amount to fraud or malpractice, but which should be made public - through... [Pg.173]

To declare conflicting interests. It is not unusual to find oneself amid a conflict of interests between individual welfare and social welfare, which do not necessarily amount to fraud or malpractice, but which it is desirable to make public - for example by making explicit reference to sources of funding - thus enabling the users of research to judge for themselves how important it is. [Pg.183]


See other pages where Frauds is mentioned: [Pg.233]    [Pg.250]    [Pg.257]    [Pg.18]    [Pg.83]    [Pg.85]    [Pg.390]    [Pg.268]    [Pg.291]    [Pg.392]    [Pg.134]    [Pg.204]    [Pg.144]    [Pg.166]    [Pg.220]    [Pg.148]    [Pg.263]    [Pg.276]    [Pg.11]    [Pg.193]    [Pg.40]    [Pg.40]    [Pg.222]    [Pg.681]    [Pg.40]    [Pg.104]    [Pg.153]    [Pg.142]    [Pg.171]    [Pg.181]    [Pg.41]    [Pg.42]   
See also in sourсe #XX -- [ Pg.142 , Pg.171 , Pg.173 , Pg.183 ]

See also in sourсe #XX -- [ Pg.34 ]

See also in sourсe #XX -- [ Pg.5 , Pg.75 , Pg.80 , Pg.106 ]

See also in sourсe #XX -- [ Pg.280 ]

See also in sourсe #XX -- [ Pg.22 , Pg.23 , Pg.28 , Pg.29 , Pg.36 , Pg.76 , Pg.89 ]

See also in sourсe #XX -- [ Pg.129 ]

See also in sourсe #XX -- [ Pg.8 , Pg.10 , Pg.40 ]

See also in sourсe #XX -- [ Pg.2 , Pg.68 ]

See also in sourсe #XX -- [ Pg.2 , Pg.68 ]

See also in sourсe #XX -- [ Pg.6 , Pg.69 ]

See also in sourсe #XX -- [ Pg.102 ]

See also in sourсe #XX -- [ Pg.88 , Pg.265 ]

See also in sourсe #XX -- [ Pg.61 ]

See also in sourсe #XX -- [ Pg.335 , Pg.339 , Pg.346 , Pg.355 , Pg.360 ]




SEARCH



Clinical research fraud

Computer fraud

Consumer fraud

Error, fraud and corruption

External fraud

Food Fraud Then and Now

Fraud clinical trials

Fraud definition

Fraud detection

Fraud examples

Fraud in clinical trials

Fraud investigation

Fraud prevention

Fraud prosecution

Fraud, commercial

Fraud, health care

Fraud, health care Compliance programs

Fraud, medical

Fraud, scientific

Frauds Great Work

Internal fraud

Internet fraud

Research fraud

Sense fraud

Tracking Error, Fraud, and Corruption

Workers compensation fraud

© 2024 chempedia.info