نتایج جستجو برای: theft
تعداد نتایج: 4431 فیلتر نتایج به سال:
Research Summary Data for this study were collected in semistructured interviews with 59 individuals serving time in federal prisons for identity theft. We explore how offenders’ experiences and life circumstances affected their subjective assessments of risks and rewards and thus facilitated the decision to engage in identity theft. Our findings suggest that offenders perceive identity theft a...
UNLABELLED Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. OBJECTIVE Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. METHODS Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery p...
This paper intends to establish theft Trojans detection system capable of adaptive dynamic feedback learning. To achieve this goal, this paper first studies the characteristics of the network data stream and theft Trojans communication data stream, then introduces support vector machine algorithm based on incremental learning, proposes the construction method of incremental learning samples, de...
Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation...
Oil theft always results in huge economic loss, human casualties, and extremely environmental pollution especially when the leaks from crude oil pipeline are not detected and repaired timely. In this paper, we focus on how to detect and monitor abnormal noise and vibration beforehand or in real time by the Internet of Things (IoT). Firstly, the diversities of crude oil theft and the difficultie...
handling stolen goods has been recognized as an independent offence in both iranian and english law. committing this offence, tacitly support those actions that are called theft. however, penal policy of iran’s legislator does not provide effective fighting against the handlers of stolen goods. in others words, comparing the two iranian and english legal system, make this issue clear that crimi...
Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.
The constant access to information and computing resources brought by mobile devices had changed the nature of computing and communication experience. With more and more cell phones and laptops sold every year, stolen and lost devices have become a rising concern. Several theft recovery applications have been developed target specifically for mobile devices, but none, for what we came across, h...
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identity-corroborating information. It is exacerbated by the availability of personal information on the Internet. Published research proposing technical solutions is sparse. In this paper, we identify some underlying problems facilitating identity theft. To address the proble...
The total cost of auto theft to the U.S. in 1985 is estimated at $6 billion at current prices, or about $45 per automobile per year. On the basis of this estimate, it is calculated that it would be cost-effective for society to invest a few hundred dollars per car in built-in security to prevent auto theft. In practice, there is very little incentive for individual owners to prevent auto theft,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید