Scoping Review of Sabotage and/or Tampering in the NHS
暂无分享,去创建一个
Jennifer Wilby | Julie Glanville | Anne-Marie Bagnall | Amanda Sowden | A. Sowden | A. Bagnall | J. Wilby | Julie May Glanville
[1] G. B. Varnado,et al. Fault tree analysis for vital area identification , 1978 .
[2] D. Engi,et al. Simulation of personnel control systems with the Insider Safeguards Effectiveness Model (ISEM) , 1977 .
[3] M. Sanz,et al. Prick-prick with fresh foods in patients with latex allergy. , 2000, Journal of investigational allergology & clinical immunology.
[4] S. J. Motowidlo,et al. Behaviorally Anchored Scales for Measuring Morale in Military Units , 1977 .
[5] W. Thompson. Hanging tongues: A sociological encounter with the assembly line , 1983 .
[6] W. F. Huang,et al. Adulteration by Synthetic Therapeutic Substances of Traditional Chinese Medicines in Taiwan , 1997, Journal of clinical pharmacology.
[7] F. Hank Grant,et al. Safeguard systems at nuclear facilities: A SNAP application , 1979, WSC '79.
[8] D. Crockett,et al. Nitrite adulteration of workplace urine drug-testing specimens. I. Sources and associated concentrations of nitrite in urine and distinction between natural sources and adulteration. , 1998, Journal of analytical toxicology.
[9] D. A. Moul. Security during safety-related emergencies at nuclear power plants , 1984 .
[10] James H. R. Tucker. Everyday forms of employee resistance , 1993 .
[11] David P. H. Jones,et al. Outcome of psychiatric intervention in factitious illness by proxy (Munchausen's syndrome by proxy) , 1999, Archives of disease in childhood.
[12] J. Giesberg. The Role of Communication in Preventing Workplace Sabotage , 2001 .
[13] M S Simon. BEWARE OF IMPLIED MALICE: CONTRACTOR LIABLE FOR PUNITIVE DAMAGES TO INJURED MOTORIST , 1992 .
[14] C. Moore,et al. Comparison of point-of-collection screening of drugs of abuse in oral fluid with a laboratory-based urine screen. , 2001, Forensic science international.
[15] Edward W. Sieh. GARMENT WORKERS: PERCEPTIONS OF INEQUITY AND EMPLOYEE THEFT , 1987 .
[16] D. R. Harris,et al. Monte Carlo modeling of the neutronics of a lead slowing down time assay device , 1982 .
[17] C. Chapman,et al. Use of patient-controlled analgesia for pain control for children receiving bone marrow transplant. , 1995, Journal of pain and symptom management.
[18] B. A. Boughton. Prediction of radiological dispersal from sabotage incidents involving high explosive , 1986 .
[19] M. Das,et al. Estimation of menthol in Pan Masala samples by a spectrophotometric method. , 1997, Food Additives and Contaminants.
[20] V. Nagarajan,et al. A simple and specific method for detection of adulteration with Lathyrus sativus. , 1967, The Indian journal of medical research.
[21] Chun-Shien Lu,et al. Mean-quantization-based fragile watermarking for image authentication , 2001 .
[22] E. Ernst. Toxic heavy metals and undeclared drugs in Asian herbal medicines. , 2002, Trends in pharmacological sciences.
[23] D. Cohen,et al. Patient-controlled analgesia for sickle-cell-related pain. , 1993, Journal of pain and symptom management.
[24] F. Esposito,et al. An assay evaluation of the methylene blue method for the detection of anionic surfactants in urine. , 2000, Journal of analytical toxicology.
[25] B. Lindner,et al. Hypochlorite Adulteration of Urine Causing Decreased Concentration of Δ9-THC-COOH by GC/MS , 1994 .
[26] Maureen L. Ambrose,et al. Sabotage in the workplace: The role of organizational injustice , 2002 .
[27] Paul E. Spector. Relationships of organizational frustration with reported behavioral reactions of employees , 1975 .
[28] I. G. Waddoups,et al. Tamper-indicating devices and safeguards seals evaluation test report. Volume 1 , 1993 .
[29] S. Bailey,et al. One hundred girls in care referred to an adolescent forensic mental health service , 1998 .
[30] Steven Hornik,et al. Passive resistance misuse: overt support and covert recalcitrance in IS implementation , 1996 .
[31] G. Downey,et al. Detecting and quantifying sunflower oil adulteration in extra virgin olive oils from the eastern mediterranean by visible and near-infrared spectroscopy. , 2002, Journal of agricultural and food chemistry.
[32] D. L. Berry. Fires: what plant locations should we really protect , 1980 .
[33] E. Cone,et al. In vivo adulteration: excess fluid ingestion causes false-negative marijuana and cocaine urine test results. , 1998, Journal of analytical toxicology.
[34] Kenneth F Schulz,et al. Allocation concealment in randomised trials: defending against deciphering , 2002, The Lancet.
[35] A. L. Camp,et al. Level III probabilistic risk assessment for N Reactor , 1990 .
[36] G. Cherix,et al. Adulteration of soluble coffee with coffee husks and parchments. , 1995, Journal of AOAC International.
[37] R. Hoffman,et al. A Descriptive Study of an Epidemic of Poisoning Caused by Heroin Adulterated with Scopolamine , 2000, Journal of toxicology. Clinical toxicology.
[38] B. L. Hulme,et al. POST: a subroutine for Path Ordering of Sabotage Targets , 1980 .
[39] R. S. Strait,et al. Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat) , 1986 .
[40] D. R. Bronowski,et al. Radioactive material package closures with the use of shape memory alloys , 1997 .
[41] G. B. Varnado,et al. Status report on nuclear power plant design concepts for sabotage protection , 1982 .
[42] K. Robards,et al. Detection of adulteration in Australian orange juices by stable carbon isotope ratio analysis (SCIRA). , 2001, Journal of agricultural and food chemistry.
[43] D. Engi,et al. Use of ISEM in studying the impact of guard tactics on facility safeguards system effectiveness. [Insider Safeguards Effectiveness Model] , 1977 .
[44] C Anderson,et al. REVIEW AND INTEGRATION OF EXISTING LITERATURE CONCERNING POTENTIAL SOCIAL IMPACTS OF TRANSPORTATION OF RADIOACTIVE MATERIALS IN URBAN AREAS , 1980 .
[45] Victoria E. Look,et al. Assessment of foodservice managers' awareness of food tampering hazards and evaluation of a food tampering risk reduction program for managers of foodservice facilities , 1993 .
[46] W. Horton,et al. Measures of safeguards risk employing PRA (MOSREP): a methodology for estimating risk impacts of safeguards measures , 1985 .
[47] Ron A. Dibattista,et al. Forecasting Sabotage Events in the Workplace , 1996 .
[48] A. Sicherman,et al. Structured Assessment Approach: a microcomputer-based insider-vulnerability analysis tool , 1986 .
[49] D. L. Caskey. Sandia's experience in designing and implementing integrated high security physical protection systems , 1986 .
[50] N. P. Cassells,et al. The effects of commonly used adulterants on the detection of spiked LSD by an enzyme immunoassay. , 1998, Science & justice : journal of the Forensic Science Society.
[51] Paul E. Spector,et al. Relationships of organizational frustration with reported behavioural reactions: The moderating effect of locus of control , 1987 .
[52] J. J. Tawil,et al. Ranking of sabotage/tampering avoidance technology alternatives , 1986 .
[53] E. Ernst. Adulteration of Chinese herbal medicines with synthetic drugs: a systematic review , 2002, Journal of internal medicine.
[54] A. J. Sheppard,et al. Detection of vegetable oil adulteration in ice cream. , 1985, Journal of dairy science.
[55] Marvin Resnikoff. Analysis of RADTRAN Transportation Model , 1990 .
[56] R. Durant,et al. The association between health risk behaviors and sexual orientation among a school-based sample of adolescents. , 1998, Pediatrics.
[57] R. Uebel,et al. Toxicological screening for drugs of abuse in samples adulterated with household chemicals. , 2002, South African medical journal = Suid-Afrikaanse tydskrif vir geneeskunde.
[58] Ron A. Dibattista. Creating New Approaches to Recognize and Deter Sabotage , 1991 .
[59] R. E. Luna. Comparison Of Results From Two Spent Fuel Sabotage Source Term Experiments , 2000 .
[60] C. D’ercole,et al. Laparoscopic management of malignant ovarian cysts: a 78-case national survey. Part 2: Follow-up and final treatment. , 1995, European journal of obstetrics, gynecology, and reproductive biology.
[61] H. Koh,et al. HPLC and GC-MS screening of Chinese proprietary medicine for undeclared therapeutic substances. , 2001, Journal of pharmaceutical and biomedical analysis.
[62] Differentiation of Malicious and Non-Malicious Fire-Alarm Calls Using Multidimensional Scaling , 1983, Perceptual and motor skills.
[63] G. B. Varnado,et al. Vulnerability analysis of manufacturing systems: A systematic method for protecting industrial production from disruption , 1991 .
[64] Emmanuel Okechukwu Ogbonna,et al. Exploring Service Sabotage , 2002 .
[65] R. P. Sandoval,et al. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask , 1986 .
[66] S. Valtier,et al. Effects of Stealth adulterant on immunoassay testing for drugs of abuse. , 2001, Journal of analytical toxicology.
[67] W. L. Delvin,et al. Effectiveness evaluation of insider protection programs , 1990 .
[68] L. Graham. Inside a Japanese Transplant , 1993 .
[69] C. B. Stunkel,et al. Target assignment for security officers to K targets (TASK) , 1983 .
[70] F. L. Fricke,et al. Analysis of glass in product tampering investigations by inductively coupled plasma atomic emission spectrometry with a hydrofluoric acid resistant torch , 1989 .
[71] J. Cody,et al. The effects of adulterating agents on FPIA analysis of urine for drugs of abuse. , 1993, Journal of analytical toxicology.
[72] W. K. Paulus. Vulnerability assessment using two complementary analysis tools , 1993 .
[73] J. J. Lim,et al. Modeling adversary tampering of accounts and records in a material accounting system , 1979 .
[74] A. Wu,et al. Adulteration of urine by "Urine Luck". , 1999, Clinical chemistry.
[75] Use of fourier transform near-infrared reflectance spectroscopy for rapid quantification of castor bean meal in a selection of flour-based products. , 2000, Journal of agricultural and food chemistry.
[76] L. D. Chapman. Application of SAFE to an operating reactor , 1979 .
[77] T. J. Connolly,et al. Analyzing the reprocessing decision: plutonium recycle and nuclear proliferation. Final report , 1977 .
[78] N. Sbirrazzuoli,et al. Use of differential scanning calorimetry (DSC) as a new technique for detection of adulteration in honeys. 1. Study of adulteration effect on honey thermal behavior. , 2002, Journal of agricultural and food chemistry.
[79] U. Taitelman,et al. Postmortem digoxin-like immunoreactive substances (DLIS) in patients not treated with digoxin , 1999, Human & experimental toxicology.
[80] J. Maltby,et al. Use of refractometry to identify opioid-containing solutions , 1994, Canadian journal of anaesthesia = Journal canadien d'anesthesie.
[81] J. M. Boudreau,et al. Reactor sabotage vulnerability and vital-equipment identification , 1982 .
[82] H. Fung,et al. Use of refractometers to detect controlled-substance tampering. , 1991, American journal of hospital pharmacy.
[83] S. Salamone,et al. Determination of five abused drugs in nitrite-adulterated urine by immunoassays and gas chromatography-mass spectrometry. , 1998, Journal of analytical toxicology.
[84] M. Ashburn,et al. Respiratory-related critical events with intravenous patient-controlled analgesia. , 1994, The Clinical journal of pain.
[85] C. A. Russell,et al. Nuclear plant security in the 1980's and 1990's: threat reality and consequence , 1979 .
[86] C. Rieffe,et al. Handelen op basis van Theory of Mind-kennis bij kinderen uit het autisme-spectrum , 2001 .
[87] J. Foesch,et al. Insider protection technology developments , 1994 .
[88] S. Valtier,et al. Analysis of morphine and codeine in samples adulterated with Stealth. , 2001, Journal of analytical toxicology.
[89] D. Engi,et al. Safeguards Automated Facility Evaluation (SAFE) methodology , 1978 .
[90] Judy L. Walker,et al. SNAP operating system reference manual , 1982 .
[91] R. P. Sandoval. Improved safety assessment of spent fuel transportation in extreme environments , 1981 .
[92] Narang Ap,et al. Arsenic adulteration in Indian tobacco , 1995 .
[93] G. B. Varnado,et al. A systematic method for protecting industrial production from sabotage , 1988 .
[94] R. P. Sandoval. An assessment of the response of spent fuel transports to malevolent acts , 1984 .
[95] C. Barbas,et al. Development and validation of a capillary electrophoresis method for direct measurement of isocitric, citric, tartaric and malic acids as adulteration markers in orange juice. , 2000, Journal of chromatography. A.
[96] K. Ash,et al. Adulterants causing false negatives in illicit drug testing. , 1988, Clinical chemistry.
[97] Leon D. Chapman. Fixed-Site Physical Protection System Modeling , 1975 .
[98] L. Arnold,et al. Assessing Professional Behavior: Yesterday, Today, and Tomorrow , 2002, Academic medicine : journal of the Association of American Medical Colleges.
[99] Anthony G Heyes. PRA in the nuclear sector: Quantifying human error and human malice , 1995 .
[100] G. Williams,et al. Continuous Intravenous Insulin Infusion in the Management of Brittle Diabetes: Etiologic and Therapeutic Implications , 1985, Diabetes Care.
[101] Employee sabotage in the workplace: a biopsychosocial model. , 1996, Journal of forensic sciences.
[102] D. Jack. UNDERSTANDING WOMEN'S ANGER: A DESCRIPTION OF RELATIONAL PATTERNS , 2001, Health care for women international.
[103] S. H. Scott. Evaluation of physical protection elements for interior applications , 1983 .
[104] Lih-Jenn Shyr,et al. Projected Consequence for Potential Sabotage Events Related to Spent Fuel Shipments , 1999 .
[105] K. Anchor,et al. Psychotherapy sabotage revisited: the better half of individual psychotherapy. , 1976, Journal of clinical psychology.
[106] R. C. Hall. Path enumeration program (ENUMPTH) for physical protection effectiveness evaluation , 1978 .
[107] H. A. Bennett. A Security Force-Adversary Engangement Simulation , 1975 .
[108] W. Diven,et al. Adult respiratory distress syndrome associated with epidural fentanyl infusion , 1994, Critical Care Medicine.
[109] L. D. Chapman. Assessment of methods for evaluating adequacy of physical protection systems , 1980 .
[110] W. K. Paulus. Neutralization and system effectiveness , 1988 .
[111] N. Ogrinc,et al. Determination of authenticity, regional origin, and vintage of Slovenian wines using a combination of IRMS and SNIF-NMR analyses. , 2001, Journal of agricultural and food chemistry.
[112] M. Phillips,et al. Evaluation of the Alcopatch, a transdermal dosimeter for monitoring alcohol consumption. , 1995, Alcoholism, clinical and experimental research.
[113] A. E. Winblad. The SAVI vulnerability assessment model , 1987 .
[114] Paul E. Spector,et al. Relationships of Work Stressors with Aggression, Withdrawal, Theft and Substance Use: An Exploratory Study , 1992 .
[115] Robin J. Miner,et al. A network modeling and analysis technique for the evaluation of nuclear safeguards systems effectiveness , 1978, SIML.
[116] I. G. Waddoups,et al. Safeguards and security benefits of project straight-line , 1995 .
[117] Xin Yao,et al. Why more choices cause less cooperation in iterated prisoner's dilemma , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).
[118] S. D. Davidson Ward,et al. Frequency, causes, and outcome of home ventilator failure. , 1998, Chest.
[119] D. J. Huberty,et al. Sabotaging siblings: an overlooked aspect of family therapy with drug dependent adolescents. , 1986, Journal of psychoactive drugs.
[120] E. Domínguez,et al. Metal contamination in illicit samples of heroin. , 1999, Journal of forensic sciences.
[121] Roger G. Johnston,et al. Vulnerability assessment of passive tamper-indicating seals , 1995 .
[122] Barrett B. Parsons,et al. Tamper and Radiation Resistant Instrumentation for Safeguarding Special Nuclear Material , 1977, IEEE Transactions on Nuclear Science.
[123] G. Govindan,et al. A convenient method for the determination of the quality of goldenseal. , 2000, Fitoterapia.
[124] T. Murphy,et al. Investigation of nitrite adulteration on the immunoassay and GC-MS analysis of cannabinoids in urine specimens. , 2000, Journal of analytical toxicology.
[125] D. D. Wilkey. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities , 1995 .
[126] G. B. Varnado,et al. Safeguards system effectiveness modeling , 1976 .
[127] K. Ferslew,et al. Capillary ion electrophoresis of endogenous anions and anionic adulterants in human urine. , 2001, Journal of forensic sciences.
[128] I. J. Sacks,et al. Procedure for the assessment of material control and accounting systems , 1978 .