نتایج جستجو برای: theft
تعداد نتایج: 4431 فیلتر نتایج به سال:
Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusoc...
89 otherwise shed light on their underground activities. In one recent case, honeynet intruders exposed the existence of automated tools that support and facilitate identity theft and credit-card fraud. Members of a community who call themselves carders use these tools to defraud Internet merchants and consumers of potentially large financial sums. The preceding installment of this department 1...
This paper analyzes the interaction between corporate taxes and corporate governance. We show that the characteristics of a taxation system affect the extraction of private benefits by company insiders. A higher tax rate increases the amount of income insiders divert and thus worsens governance outcomes. In contrast, stronger tax enforcement reduces diversion and, in so doing, can raise the sto...
The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a des...
The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acu...
This paper introduces a new type of anti-theft system that combines color Doppler ultrasonography and infrared thermal scanning technology. It can identify the superficial vascular network distribution of a user’s palm and dynamic information on blood flow that includes blood flow velocity and pressure, and compares this information with the user's default information to achieve anti-theft capa...
The AutoWitness project aims to deter, detect, and track theft of everyday objects using a combination of ultra lowpower mobile tags and a wide-area network of static anchors. Key research challenges include dramatically driving down the cost and size of tags and increasing their lifetime, discriminating between normal activities and theft using motion detection and classification algorithms, r...
We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen o...
In the physical world, an individual’s identity is verified by legal documents including passports, driver’s licenses, birth certificates, and identification cards. Identity can also be authenticated by biological features (such as fingerprints or DNA) or demonstration of secret knowledge (passwords). Naturally, online identities can not rely on physical evidence. Instead, online identities are...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید