HSTCQE*Cfbida+

Total Page:16

File Type:pdf, Size:1020Kb

HSTCQE*Cfbida+ OECD Reviews of Risk Management Policies OECD REVIEWS OF RISK MANAGEMENT POLICIES Illicit Trade CONVERGING CRIMINAL NETWORKS OECD Reviews of Risk Management Policies Contents Chapter 1. Illicit trade: Convergence of criminal networks Chapter 2. Traf cking in persons: Trends and patterns Illicit Trade Chapter 3. Wildlife traf cking trends in sub-Saharan Africa CONVERGING CRIMINAL NETWORKS Chapter 4. Illicit trade in counterfeit medicines Chapter 5. A brief overview of illicit trade in tobacco products Chapter 6. The global illicit trade in illegal narcotics Chapter 7. The size, impacts and drivers of illicit trade in alcohol Chapter 8. Sport manipulation as economic crime Illicit Trade Trade Illicit CONVERGING CRIMINAL NETWORKS CRIMINAL CONVERGING Consult this publication on line at http://dx.doi.org/10.1787/9789264251847-en. This work is published on the OECD iLibrary, which gathers all OECD books, periodicals and statistical databases. Visit www.oecd-ilibrary.org for more information. ISBN 978-92-64-25183-0 42 2016 04 1 P 9HSTCQE*cfbida+ OECD Reviews of Risk Management Policies Illicit Trade CONVERGING CRIMINAL NETWORKS This work is published under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of OECD member countries. This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Please cite this publication as: OECD (2016), Illicit Trade: Converging Criminal Networks, OECD Reviews of Risk Management Policies, OECD Publishing, Paris. http://dx.doi.org/10.1787/9789264251847-en ISBN 978-92-64-25183-0 (print) ISBN 978-92-64-25184-7 (PDF) Series: OECD Reviews of Risk Management Policies ISSN 1993-4092 (print) ISSN 1993-4106 (online) The statistical data for Israel are supplied by and under the responsibility of the relevant Israeli authorities. The use of such data by the OECD is without prejudice to the status of the Golan Heights, East Jerusalem and Israeli settlements in the West Bank under the terms of international law. Photo credits: Cover © timbossch - Fotolia.com; ©Volodymyr Krasyuk/Shutterstock.com. Corrigenda to OECD publications may be found on line at: www.oecd.org/about/publishing/corrigenda.htm. © OECD 2016 You can copy, download or print OECD content for your own use, and you can include excerpts from OECD publications, databases and multimedia products in your own documents, presentations, blogs, websites and teaching materials, provided that suitable acknowledgement of OECD as source and copyright owner is given. All requests for public or commercial use and translation rights should be submitted to [email protected]. Requests for permission to photocopy portions of this material for public or commercial use shall be addressed directly to the Copyright Clearance Center (CCC) at [email protected] or the Centre français d’exploitation du droit de copie (CFC) at [email protected]. FOREWORD – 3 Foreword The global economy is increasingly interconnected. This presents greater opportunities for many citizens and businesses, but also for a range of illicit networks that foster criminal activities. Illicit trade creates an enormous capital flow from outside of the formal economy, not only resulting in loss of revenue for governments and industries, but also jeopardizing public health and security, and enriching criminals who have a vested interest in undermining the rule of law. This report provides an overview of 7 sectors of illicit trade, including trafficking in persons, wildlife and narcotics, as well as counterfeit medicines, tobacco and alcohol. It describes their negative impacts on the economy, society and the environment and maps trade routes that move illicit goods around the world, which reveals how the same routes are used to smuggle very different types of illegal goods and maximize illegal profits. This overview can provide governments with insight about the policies that work to reduce or deter illicit trade, and importantly, where work remains to address governance gaps. Governments are less flexible and agile than the networks that traffic contraband around the globe. Enforcement actions might stem one flow, but criminal entrepreneurs can quickly change their trade routes. Governments need to strengthen the capacities of law enforcement to share information across borders to keep pace with these changes, and they also need to take stock of the policies that inadvertently create business opportunities for criminals. A comprehensive approach to stemming illicit trade explores how to reduce consumer demand for prohibited and illicit goods. It is premised on the willingness of leaders to exercise their full power to levy sanctions with deterrent effect both on traffickers and their cohorts. The last point is crucial, because the current scale of illicit trade could be decimated through the vigorous implementation of anti-corruption laws, anti-money laundering regulations and asset recovery procedures. This report brings together knowledge from governments, international organisations, non-governmental organisations and industries whose bottom lines are affected by illicit trade through a unique stocktaking exercise. This multi-stakeholder approach has enabled a fuller understanding of the connections between different forms of illicit activities. In particular, this report draws from the collective expertise of a network of specialists from across countries and economies, the OECD Task Force on Countering Illicit Trade (TF-CIT). The TF-CIT is part of the OECD High Level Risk Forum (HLRF), which works with governments to better understand the full range of complex risks and threats posed to our global economies. ILLICIT TRADE: CONVERGING CRIMINAL NETWORKS © OECD 2016 4 – FOREWORD This multi-stakeholder initiative creates a foundation for future work as well as a shared understanding of the challenges presented by illicit trade. Going forward, the OECD will continue to address the “dark side” of globalisation, working with countries to design and implement policies needed to ensure clean trade and helping them to strengthen their enforcement practices. Rolf Alter Director, OECD Public Governance and Territorial Development Directorate ILLICIT TRADE: CONVERGING CRIMINAL NETWORKS © OECD 2016 PREFACE – 5 Preface The OECD Task Force on Countering Illicit Trade (TF-CIT) was established to advance the resilience of our economies and societies to the odious global threat: illicit trade perpetrated by criminal entrepreneurs and transnational illicit networks that enables the global illegal economy to thrive in the dark side of globalization. In too many places around the world, criminals have built their illicit empires on dirty money and laundered funds to infiltrate and corrupt government institutions. In this shadowy, illegal economy traffickers and narcotics kingpins act as CEOs and venture capitalists while they build their empires of destruction, jeopardizing public health, emaciating communities’ human capital, eroding our collective security, and destabilizing fragile governments. The breadth and scale of these illicit markets are vast; various international organizations estimate the scale of illicit trade is thriving with hundreds of billions of dollars in illicit commerce that includes trafficking in narcotics, persons, endangered wildlife, illegally- logged timber, counterfeit consumer goods and medications, hazardous and toxic waste, stolen antiquities and art, illicitly-traded cigarettes, and other illicitly-traded goods and commodities. The OECD TF-CIT focuses on evidence-based research and advanced analytics to assist policy-makers map and understand the market vulnerabilities exploited and created by illicit trade. Mapping the harms and impacts of illicit trade and the licit-illicit complex system will help us pinpoint large-scale disruptions to illicit markets and identify tools to reinforce the most vulnerable points of entry to the illegal economy. Quantitative metrics better inform policy makers, allowing them to drive criminal entrepreneurs out of business, reduce the incentives for communities to resort to illegal commercial activity, mitigate opportunities for organized crime to taint our financial system with their ill- gotten gains, and help governments sustain legitimate markets so that businesses that respect regulations can thrive. Pragmatic mapping tools will also be useful for policy- makers and law enforcement to not only engage in upstream and downstream coordinated mitigation and disruptions of the illicit trade, but also address gaps in surveillance and monitoring systems to develop more effective early detection and warning systems of the new harms and risks of illicit trade to the formal economy. The importance and timeliness of this OECD initiative reflects the growing threat posed by transnational organized crime and illicit networks, which has expanded in size, scope, and menace, destabilizing globalized economies and markets alike and created insecurity in communities around the world. As criminal entrepreneurs and transnational illicit networks hijack the technological, financial, and communications advances of globalization for illicit gains, they continue to present new harms to the governance and security of all nations. The proliferation of these threatening networks and the convergence of their
Recommended publications
  • TYPO3 Security Guide
    TYPO3 Security Guide Extension Key: doc_guide_security Language: en Version: 1.0.0 Keywords: security forEditors forAdmins forDevelopers forBeginners forIntermediates forAdvanced Copyright 2011, Documentation Team <[email protected]> This document is published under the Open Content License available from http://www.opencontent.org/opl.shtml The content of this document is related to TYPO3 - a GNU/GPL CMS/Framework available from www.typo3.org Official Documentation This document is included as part of the official TYPO3 documentation. It has been approved by the TYPO3 Documentation Team following a peer-review process. The reader should expect the information in this document to be accurate - please report discrepancies to the Documentation Team ([email protected]). Official documents are kept up-to-date to the best of the Documentation Team's abilities. Guide This document is a Guide. Guides are designed to familiarize a reader with a specific topic in order to provide a working knowledge of that particular process. Readers should peruse the guide from cover to cover in order to gain a practical overview of the process. Once completed, the Guide becomes a practical reference tool that a reader will refer to as needed. Guides offer advice on how best to achieve a given task. TYPO3 Security Guide - doc_guide_security TYPO3 Security Guide Table of Contents TYPO3 Security Guide............................1 Directory indexing........................................................12 Introduction...................................................................3
    [Show full text]
  • TYPO3 / Wordpress / Drupal
    civi listen GmbH Schwedenstr. 15a 13357 Berlin jobs@civi listen.de www. civi listen.de Freelance Entwickler*in Frontend / Backend (m/w/d) TYPO3 / Wordpress / Drupal Was wir machen Wir sind die civi listen. Wir digitalisieren die Zivilgesellschaft. Unsere Kunden verbessern die Welt und wir sorgen dafür, dass sie dabei nichts aufhält. Dafür unterstützen wir seit 2018 gemeinnützige Organisationen mit praktischen Hilfestellungen digitaler und damit effizienter zu werden. CiviCRM ist dabei eine Lösung, die wir anbieten, um Beziehungen zwischen NGOs, Stiftungen und Vereinen zu ihren Stakeholdern und Zielgruppen verbessern – vom personalisierten Mailing bis zur Organisation von Events, Kampagnen und Fundraising. Wir entwickeln Auftritte, die gut aussehen und den richtigen Ton treffen. Wir helfen Herausforderungen und Prozesse smart und zuverlässig zu bewältigen. Wen wir suchen Wir wollen unsere Kunden jederzeit flexibel mit der besten Expertise unterstützen und glauben daran, dass Akteure der Zivilgesellschaft die besten Lösungen brauchen. Zur Unterstützung unseres Teams suchen wir zum nächstmöglichen Zeitpunkt eine*n erfahrene*n Entwickler*in TYPO3 / Wordpress / Drupal (m/w/d) civi listen GmbH Sitz der Gesellschaft: Berlin 030 692 090 200 Kopf frei für Hands on. Schwedenstr. 15 a Registergericht: Berlin-Charlottenburg, HRB 218551 B jobs@civi listen.de 13357 Berlin Geschäftsführer: Patrick Förg www. civi listen.de 1/4 Deine Aufgaben Wir erstellen für unsere CiviCRM-Kunden anspruchsvolle Internetauftritte und Spezialfunktionen mit TYPO3, Wordpress,
    [Show full text]
  • Pharmacy/Prescription Drug Fraud Tips for Protecting Yourself and Medicare
    Pharmacy/Prescription Drug Fraud Tips for Protecting Yourself and Medicare Pharmacy and prescription drug fraud is a consistent trend in Medicare. Due to the lucrative nature of prescription drug diversion and pharmacy scams, criminals continue to exploit Medicare Part D. What is Medicare Pharmacy/Prescription Drug Fraud? Although there are many types of prescription drug schemes, pharmacy fraud primarily occurs when Medicare is billed for a medication that was not received or a beneficiary is intentionally given a different prescription drug than prescribed. What are Examples of Pharmacy/Prescription Drug Fraud? • Billing Medicare for prescription drugs (including refills) that were never picked up, delivered, or even prescribed. • Billing Medicare for prescription drugs (occasionally controlled substances such as opioids) that were prescribed by a health care provider you have never seen. • Billing Medicare for medication amounts beyond the quantity you were prescribed. • Billing Medicare for a different prescription drug (often more expensive) than the one you were originally prescribed or issuing you a drug that is not approved by the U.S. Food and Drug Administration (FDA). • A pharmacy that intentionally provides less medication than prescribed. • A pharmacy that issues expired drugs. • A pharmacy that provides and bills for an expensive compounded medication, including topical pain creams, when a traditional or less expensive prescription was ordered by your provider. • A company offering you “free” or “discount” prescription drugs without a treating physician’s order and then billing Medicare. • A pharmacy offering gift cards or other compensation so you switch your prescriptions over to a specific pharmacy. • A pharmacy automatically refilling a prescription you no longer need.
    [Show full text]
  • Keralda/India) Ecology and Landscape in an Isolated Indian National Park Photos: Ian Lockwood
    IAN LOCKWOOD Eravikolam and the High Range (Keralda/India) Ecology and Landscape in an Isolated Indian National Park Photos: Ian Lockwood The southern Indian state of Kerala has long been recognized for its remarkable human development indicators. It has the country’s highest literary rates, lowest infant mortality rates and highest life expectancy. With 819 people per km2 Kerala is also one of the densest populated states in India. It is thus surprising to find one of the India’s loneliest and least disturbed natural landscapes in the mountainous region of Kerala known as the High Range. Here a small 97 km2 National Park called Eraviku- lam gives a timeless sense of the Western Ghats before the widespread encroachment of plantation agriculture, hydro- electric schemes, mining and human settlements. he High Range is a part of the Western Ghats, a heterogeneous chain of mountains and hills that separate the moist Malabar and Konkan Coasts from the semi-arid interiors of the TDekhan plateau. They play a key role in direct- ing the South Western monsoon and providing water to the plateau and the coastal plains. Starting at the southern tip of India at Kanyakumari (Cape Comorin), the mountains rise abruptly from the sea and plains. The Western Ghats continue in a nearly unbroken 1,600 km mountainous spine and end at the Tapi River on the border between Maharashtra and Gujarat. Bio- logically rich, the Western Ghats are blessed with high rates of endemism. In recent years as a global alarm has sounded on declining biodiversity, the Western Ghats and Sri Lanka have been designated as one of 25 “Global Biodiversity Hotspots” by Conservation Inter- national.
    [Show full text]
  • The Four Iron Steamships of William Alexander Lewis Stephen Douglas – Hamilton
    The Four Iron Steamships of William Alexander Lewis Stephen Douglas – Hamilton. KT 12th Duke of Hamilton, 9th Duke of Brandon, 2nd Duke of Châtellerault Second Edition. 1863 Easton Park, Suffolk, England (Demolished 1925) Hamilton Palace, Scotland (Demolished 1927) Brian Boon & Michel Waller Introduction The families residing in the village of Easton, Suffolk experienced many changing influences over their lives during the 92 year tenure of four generations of the Hamilton family over the 4,883 acre Easton Park Estate. The Dukes of Hamilton were the Premier Dukedom of Scotland, owning many mansions and estates in Scotland together with other mining interests. These generated considerable income. Hamilton Palace alone, in Scotland, had more rooms than Buckingham Palace. Their fortunes varied from the extremely wealthy 10th Duke Alexander, H.M. Ambassador to the Court of the Czar of Russia, through to the financial difficulties of the 12th Duke who was renowned for his idleness, gambling and luxurious lifestyle. Add to this the agricultural depression commencing in 1870. On his death in 1895, he left debts of £1 million even though he had previously sold the fabulous art and silver collections of his grandparents. His daughter, Mary, then aged 10 inherited Easton and the Arran estates and remained in Easton, with the Dowager Duchess until 1913 when she married Lord Graham. The estates were subsequently sold and the family returned to Arran. This is an account of the lives of the two passenger paddle steamers and two large luxury yachts that the 12th Duke had built by Blackwood & Gordon of Port Glasgow and how their purchase and sales fitted in with his varying fortunes and lifestyle.
    [Show full text]
  • Health Care Fraud and Abuse Control Program Annual Report for Fiscal Year 2019
    The Department of Health and Human Services And The Department of Justice Health Care Fraud and Abuse Control Program Annual Report for Fiscal Year 2019 June 2020 TABLE OF CONTENTS I. Executive Summary 1 II. Statutory Background 3 III. Program Results and Accomplishments 5 Monetary Results 5 Expenditures 7 Overall Recoveries 8 Health Care Fraud Prevention and Enforcement Action Team 8 Health Care Fraud Prevention Partnership 10 Strike Forces 10 Opioid Fraud and Abuse Detection Unit 13 Highlights of Successful Criminal and Civil Investigations 14 IV. Department of Health and Human Services 39 Office of Inspector General 39 Centers for Medicare & Medicaid Services 61 Administration on Community Living 85 Office of the General Counsel 88 Food and Drug Administration Pharmaceutical Fraud Program 91 V. Department of Justice 95 United States Attorneys 95 Civil Division 96 Criminal Division 102 Civil Rights Division 107 Department of Justice Office of Inspector General 110 VI. Appendix 112 Federal Bureau of Investigation 112 Return on Investment Calculation 116 Total HCFAC Resources 117 VII. Glossary of Terms 118 GENERAL NOTE All years are fiscal years unless otherwise stated in the text. EXECUTIVE SUMMARY The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established a national Health Care Fraud and Abuse Control Program (HCFAC or the Program) under the joint direction of the Attorney General and the Secretary of the Department of Health and Human Services (HHS),1 acting through the Inspector General, designed to coordinate federal, state and local law enforcement activities with respect to health care fraud and abuse. In its twenty-third year of operation, the Program’s continued success confirms the soundness of a collaborative approach to identify and prosecute the most egregious instances of health care fraud, to prevent future fraud and abuse, and to protect program beneficiaries.
    [Show full text]
  • Mail Fraud: Opening Letters
    South Carolina Law Review Volume 43 Issue 2 Article 3 Winter 1992 Mail Fraud: Opening Letters Ellen S. Podgor Georgia State University College of Law Follow this and additional works at: https://scholarcommons.sc.edu/sclr Part of the Law Commons Recommended Citation Podgor, Ellen S. (1992) "Mail Fraud: Opening Letters," South Carolina Law Review: Vol. 43 : Iss. 2 , Article 3. Available at: https://scholarcommons.sc.edu/sclr/vol43/iss2/3 This Article is brought to you by the Law Reviews and Journals at Scholar Commons. It has been accepted for inclusion in South Carolina Law Review by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Podgor: Mail Fraud: Opening Letters SOUTH CAROLINA LAW REVIEW VOLUME 43 WINTER 1992 NUMBER 2 MAIL FRAUD: OPENING LETTERS ELLEN S. PODGOR* I. INTRODUCTION ....................................... 224 II. ELEMENTS ........................................... 225 A. First Element-Scheme to Defraud ............... 226 B. Second Element-Mailing in Furtherance of Schem e ........................................ 229 C. Mail Fraud As It Relates to Wire Fraud and RICO 231 III. SCHEME TO DEFRAUD ................................. 232 A. Intangible Rights Doctrine ....................... 232 B. 1346 Ramifications .............................. 236 IV. IN FURTHERANCE ..................................... 239 A . Conduct ........................................ 240 B. Lim itations ..................................... 242 1. Conflicts with Scheme to Defraud............. 243 2. Imperative Duty Imposed by State ........... 245 3. Mailing Prior to Commencement of Scheme ... 247 * Associate Professor of Law, Georgia State University College of Law. B.S. 1973, Syracuse University; J.D. 1976, Indiana University School of Law at Indianapolis; M.B.A. 1987, University of Chicago; L.L.M. 1989, Temple University School of Law. The author wishes to thank Professors Alfredo Garcia, Eli Lederman, and Laura Webster for their helpful comments throughout the drafting of this article.
    [Show full text]
  • Strategies to Combat Man-Animal Conflicts
    Horticulture International Journal Research Article Open Access Strategies to combat man-animal conflicts Abstract Volume 2 Issue 3 - 2018 Over a period of time, Human Population pressure has resulted in conversion of forest Sekhar C,1 Vidhyavathi A,1 Baranidharan K2 wildlife habitat into tea estates, tea factories and change in the land use is visualized. 1 This is evident in reduction of dense forest area where more number of wild lives has Department of Agricultural Economics, Tamil Nadu Agricultural University, India their food, shelter, breeding and water requirements. There were so many streams, 2Department of Forestry, Forest College and Research Institute, pools, source of river and tributaries. Currently they were extinct from the scene and India animals for want of food, water and other requirements started migrating to the farm environment or near to the water hole. During these journeys, human and the animal Correspondence: Sekhar C, Professor, Department of conflicts become visualized resulted in more number of deaths and injuries. On an Agricultural Economics, Tamil Nadu Agricultural University, average, every year two human deaths and many injuries are occurring. For that the Coimbatore, 641 003, India, Email [email protected] forest department has paid 123 lakhs of Rupees as compensation for affected victims. The affected individuals are migrated personnel to the forest floor for employment and Received: March 08, 2018 | Published: May 02, 2018 other purposes. Whereas, the tribes were not affected. The main reason is the people migrate to forest floor are not aware on the animal behavior, movement and hence awareness creation exercise found to be the principal strategy to the human to avoid the conflicts.
    [Show full text]
  • General Theory Considered As Cultural Capital
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) JITTA JOURNAL OF INFORMATION TECHNOLOGY THEORY AND APPLICATION THE SOCIAL AND ACADEMIC STANDING OF THE INFORMATION SYSTEMS DISCIPLINE: GENERAL THEORY CONSIDERED AS CULTURAL CAPITAL DOUGLAS HAMILTON, Monash University P.O. Box 197, Caulfield East, Victoria 3145, Australia, Tel: 61 3 9903 1081, Fax: 61 3 9903 2205 E-mail: [email protected] ABSTRACT Bourdieu’s concepts of social fields and social power provide a theoretical basis for arguing that the information systems (IS) field is engaged in an ongoing struggle with other disciplines for prestige and support. While IS has produced a considerable amount of high quality theory and research, it is by no means clear that this is understood by either the academy or the general public. It is argued that the discipline’s profile could be raised by the development and promulgation of a general theory of IS, similar in scope to the general theories found in other disciplines such as sociology. The political and cultural value of developing such a theory is discussed, as are a range of issues it is recommended that it should address. INTRODUCTION item of “cultural capital” (Bourdieu and Wacquant 1992) contributing to its public It is proposed in this paper that the image. An influential theory is implicitly a development of a prestigious general theory in statement that the field from which it the information systems (IS) field is possible, originates is a source of marketable ideas, and opportune, and would be of considerable worthy therefore of interest and respect benefit to the field.
    [Show full text]
  • Prescription Drug Fraud and Misuse, 2Nd Edition
    Problem-Specific Guides Series Problem-Oriented Guides for Police No. 24 Prescription Drug Fraud and Misuse 2nd Edition Julie Wartell and Nancy G. La Vigne Problem-Oriented Guides for Police Series Problem-Specific Guide No. 24 Prescription Drug Fraud and Misuse 2nd Edition Julie Wartell Nancy G. La Vigne This project was supported by cooperative agreement #2010-CK-WX-K005 awarded by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position or policies of the U.S. Department of Justice. References to specific agencies, companies, products, or services should not be considered an endorsement of the product by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. The Internet references cited in this publication were valid as of the date of this publication. Given that URLs and websites are in constant flux, neither the author(s) nor the COPS Office can vouch for their current validity. © 2013 Center for Problem-Oriented Policing, Inc. The U.S. Department of Justice reserves a royalty-free, nonexclusive, and irrevocable license to reproduce, publish, or otherwise use, and authorize others to use, this publication for Federal Government purposes. This publication may be freely distributed and used for noncommercial and educational purposes. www.cops.usdoj.gov ISBN: 978-1-932582-37-6 April 2013 Originally published May 2004 Updated
    [Show full text]
  • OSS Watch National Software Survey 2008
    OSS Watch National Software Survey 2008 Ramón Casero Cañas Acknowledgements Publication information The survey was prepared and the report written by Ramón This survey report is licensed under the Creative Commons Casero Cañas (OSS Watch), and edited by Ross Gardler and Attribution-ShareAlike 2.0 England & Wales licence. Elena Blanco (OSS Watch), and Pete Cooper. OSS Watch National Software Survey 2008 However, there are many people who helped to make it pos- Ramón Casero Cañas sible. We would like to thank the ICT directors of the FE and HE institutions, who took the time to respond to the survey First edition, published February 2009. and send feedback to us; Dr Ellen Helsper (Oxford Internet Institute) for her advice, academic input and support; Randy Metcalfe, former OSS Watch Service Manager, who set us with this task and was always a source of encouragement and support; Michael Fraser, former OSS Watch Director, for his comments; Gabriel Hanganu, Stuart Yeates and Rowan Wilson (OSS Watch) for their comments, envelope stuffing, corrections and so much more; Laura Marriott and Beverley McNichols for their data collection; Jean Davis and Sally Hard- ing for envelope stuffing; Barry Cornelius, Dominic Hargreaves, Charles Hutchings, Liz Masterman, Denise McDonough, Stuart Lee, Janet McKnight, Howard Noble, Mark Norman, Catrin Radcliffe and Peter Robinson for their comments about the online questionnaire; Judy McAuliffe, Tina Dick, Leslie Ferguson, Fran Jackson, Bruce Shakespeare, Jane Truby and Wendy Simmonds for their help with administration
    [Show full text]
  • A Method for a Small Web Site to Add Some Video Sharing Features
    LiU-ITN-TEK-A--08/013--SE A method for a small web site to add some video sharing features Juan Lucas Madurga Martín-Serrano 2008-01-31 Department of Science and Technology Institutionen för teknik och naturvetenskap Linköping University Linköpings Universitet SE-601 74 Norrköping, Sweden 601 74 Norrköping LiU-ITN-TEK-A--08/013--SE A method for a small web site to add some video sharing features Examensarbete utfört i datavetenskap vid Tekniska Högskolan vid Linköpings unversitet Juan Lucas Madurga Martín-Serrano Examinator Bengt Lennartsson Norrköping 2008-01-31 Upphovsrätt Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra- ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ Copyright The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]