نتایج جستجو برای: theft

تعداد نتایج: 4431  

2016
Bishwarup Paul Manabi Paul Sumana Annagiri

Brood is a very valuable part of an ant colony and behaviours increasing its number with minimum investment is expected to be favoured by natural selection. Brood theft has been well documented in ants belonging to the subfamilies Myrmicinae and Formicinae. In this study we report opportunistic brood theft in the context of nest relocation in Diacamma indicum, belonging to the primitively eusoc...

Journal: :IEEE Security & Privacy 2003
Bill McCarty

89 otherwise shed light on their underground activities. In one recent case, honeynet intruders exposed the existence of automated tools that support and facilitate identity theft and credit-card fraud. Members of a community who call themselves carders use these tools to defraud Internet merchants and consumers of potentially large financial sums. The preceding installment of this department 1...

2003
Mihir A. Desai

This paper analyzes the interaction between corporate taxes and corporate governance. We show that the characteristics of a taxation system affect the extraction of private benefits by company insiders. A higher tax rate increases the amount of income insiders divert and thus worsens governance outcomes. In contrast, stronger tax enforcement reduces diversion and, in so doing, can raise the sto...

2005
William Roberds Charles M. Kahn

The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a des...

Journal: :Perspectives in health information management 2009
Desla Mancilla Jackie Moczygemba

The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acu...

2012
Tie Qiao Wan-Chao Huang Xiao-Bing Luo Pei-Ming Zheng

This paper introduces a new type of anti-theft system that combines color Doppler ultrasonography and infrared thermal scanning technology. It can identify the superficial vascular network distribution of a user’s palm and dynamic information on blood flow that includes blood flow velocity and pressure, and compares this information with the user's default information to achieve anti-theft capa...

2009
Somnath Mitra Zizhan Zheng Santanu Guha Animikh Ghosh Prabal Dutta Bhagavathy Krishna Kurt Plarre Santosh Kumar Prasun Sinha

The AutoWitness project aims to deter, detect, and track theft of everyday objects using a combination of ultra lowpower mobile tags and a wide-area network of static anchors. Key research challenges include dramatically driving down the cost and size of tags and increasing their lifetime, discriminating between normal activities and theft using motion detection and classification algorithms, r...

2005
P. C. van Oorschot Stuart G. Stubblebine

We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen o...

2010
Thomas M. Chen

In the physical world, an individual’s identity is verified by legal documents including passports, driver’s licenses, birth certificates, and identification cards. Identity can also be authenticated by biological features (such as fingerprints or DNA) or demonstration of secret knowledge (passwords). Naturally, online identities can not rely on physical evidence. Instead, online identities are...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید