نتایج جستجو برای: nonviolent crimes the most important manifestations of white collar crimes are fraud

تعداد نتایج: 22896119  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده ادبیات و علوم انسانی 1389

abstract compound is a word-formation process that are made two free morpheme (independent) and forms a new word with a new meaning that consists of meaning of both two component of compound. avestan language is one of the ancient iranian languages that is one of the indo-iranian languages. indo-iranian languages is one branch of indo-european languages. structure of compound noun and adjectiv...

Journal: :JNW 2008
Osama Dandash Yiling Wang Phu Dung Le Bala Srinivasan

As the Internet becoming popular, many sectors such as banking and other financial institutions are adopting e-services and improving their Internet services. However, the e-service requirements are also opening up new opportunity to commit financial fraud. Internet banking fraud is one of the most serious electronic crimes (e-crimes) and mostly committed by unauthorised users. This paper prese...

2002
Natalie Taylor

For a complete list and the full text of the papers in the Trends and Issues in Crime and Criminal Justice series, visit the AIC web site at: Under-reporting of crime to police means not only that police crime records may underestimate the extent of particular crimes but that valuable resources and crime prevention strategies may be aimed at certain crimes because they are reported more frequen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

2012
David Dittrich

Computer criminals regularly construct large distributed attack networks comprised of many thousands of compromised computers around the globe. Once constituted, these attack networks are used to perform computer crimes, creating yet other sets of victims of secondary computer crimes, such as denial of service attacks, spam delivery, theft of personal and financial information for performing fr...

2012
Yada Zhu Jingrui He

Email spam: unsolicited emails for the purpose of advertisement or committing fraud. Phishing: electronic fraud based on social engineering. Phisher: fraudsters who commit phishing crimes. Phishing site: web sites created by phishers to steal sensitive information from users. Anti-phishing: efforts taken from multiple perspectives to combat phishing crimes. Machine learning: the design and deve...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زبانهای خارجی 1393

the purpose of this study was to examine the english language needs of medical students at tehran university of medical sciences . analysis of the needs took place for three groups: 320 undergraduate students, 30 postgraduate students and 20 university instructors. a triangulation approach to collect data was used in which a combination of the quantitative (using the questionnaires) and qualita...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - پژوهشکده ادبیات 1393

testing plays a vital role in any language teaching program. it allows teachers and stakeholders, including program administrators, parents, admissions officers and prospective employers to be assured that the learners are progressing according to an accepted standard (douglas, 2010). the problems currently facing language testers have both practical and theoretical implications but the first i...

2013
Michele Tumminello Christofer Edling Fredrik Liljeros Rosario N. Mantegna Jerzy Sarnecki

A criminal career can be either general, with the criminal committing different types of crimes, or specialized, with the criminal committing a specific type of crime. A central problem in the study of crime specialization is to determine, from the perspective of the criminal, which crimes should be considered similar and which crimes should be considered distinct. We study a large set of Swedi...

Journal: :Rivista di Criminologia, Vittimologia e Sicurezza 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید