نتایج جستجو برای: existence of hidden crime

تعداد نتایج: 21177912  

2012
Wilpen L. Gorr YongJei Lee

Objectives: Design and estimate the impacts of a prevention program for part 1 violent crimes in micro-place crime hot spots. Methods: A longitudinal study of crime hot spots using 21 years of crime offense report data on part 1 violent crimes from Pittsburgh, Pennsylvania. Based on kernel density smoothing for a definition of micro-place crime hot spots, we replicate past work on the existence...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...

Journal: :J. Cybersecurity 2015
Nektarios Leontiadis Alice Hutchings

This article considers the processes in the illicit online prescription drug trade, namely search-redirection attacks and the operation of unlicensed pharmacies using crime script analysis. Empirical data have been used to describe the salient elements of the online criminal infrastructures and associated monetization paths enabling criminal profitability. This analysis reveals the existence of...

1991
Patrick Suppes Mario Zanotti

Great attention has been given to the exact formulation of locality conditions in the existence of hidden variables for quantum mechanical configurations that do not satisfy Bell's inequalities. In contrast, almost no attention has been given to examining what happens if the requirements for a probability measure are relaxed. The purpose of this paper is to show that local hidden variables do...

2016
Varsha Karbhari Sanap Ramrao Adik Vanita Mane

The cyber crimes such as online banking fraud, credit card theft, child pornography, intellectual property theft, identity theft, unauthorized intrusion, money laundering, digital piracy etc. are growing rapidly with technology. Desktops, smartphones, laptops, digital cameras, GPS devices and even watches all can be used to aid a fraud. All this devices leave behind a digital footprint. Gatheri...

2015
Nektarios Leontiadis

This thesis considers the structural characteristics of online criminal networks from a technical and an economic perspective. Through large-scale measurements, we empirically describe some salient elements of the online criminal infrastructures, and we derive economic models characterizing the associated monetization paths enabling criminal profitability. This analysis reveals the existence of...

Journal: :Nordisk tidsskrift for kriminalvidenskab 2022

English abstractInternet-mediated research methods are increasingly used to access hidden crime-involved populations such as drug users and dealers. Based on an online survey study of over 800 individuals engaged in illegal small-scale cannabis cultivation Denmark, this article focuses the recruitment allegedly »hidden« population. In article, we critically reflect about concepts »hidden-« »har...

2006
Vasco Furtado Adriano Melo Ronaldo Menezes Mairon Belchior

The organizational structure of the police is characterized by the existence of a centralized command with the task of distributing and redistributing the police force in a region according to an analysis of crime and the factors that lead to it. On the other hand, criminals are characterized as a decentralized system in which individual agents have autonomy and act primarily based on accumulat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید