نتایج جستجو برای: organization crime

تعداد نتایج: 271922  

2015
Michelle Rogerson

Crime statistics are most frequently concerned with the incidence of crime (usually quoted as a rate per population), occasional statistics are concerned with prevalence (number or proportion of victims within the population) but the concentration of crime (number of crimes per victim) is rarely quoted. This paper aims to demonstrate the importance of all three indicators of crime, prevalence, ...

In the light of Discontinuing Strategy, new crime prevention approaches has directed by the democratic model of criminal policy to limit the requirements of security – oriented paradigm. The fact that has preferred situational crime prevention on social crime prevention referring to the confrontation of democratic countries with terrorist crimes, crime rhizomatic, domination of new powers and b...

Journal: :Preventive medicine 2016
Alyssa I Robinson Fei Carnes Nicolas M Oreskovic

OBJECTIVES Adolescents do not achieve recommended levels of physical activity. Crime is believed to be a barrier to physical activity among youth, but findings are inconsistent. This study compares the spatial distribution of crime incidences and moderate-to-vigorous physical activity (MVPA) among adolescents in Massachusetts between 2011 and 2012, and examines the correlation between crime and...

Journal: :Intraders international trade academic journal 2022

There are many reasons for crime, including biological, psychological, economic, and social. The the crime may vary according to types of crime. While some crimes mostly committed economic reasons, factors other than can be predominantly influential in committing crimes. However, it thought that practically based on most problems arising from social psychological factors. For this reason, is es...

2015
Minakshi Das

As crimes are becoming more sophisticated and unrestricted in nature, there is a growing demand for better technology to fight crime. Technology to detect crime can be classified into „hard‟ and „soft‟ technology. This paper further explores the methods used in USA to prevent crime and whether if such methods will be adaptable in a developing country like India. India has a notorious reputation...

ژورنال: حقوق پزشکی 2015

One of the crime that to be discus in special criminal law as crime against persons is abstain of help to dangered persons. Despite this crime is old in criminal statute of Iran but has not enough research. Essens for criminality in this omission is ethical principles and social co-operative . This article will research elements of this crime after analyze origin of its criminality. In first se...

Journal: :Journal of the American Academy of Child and Adolescent Psychiatry 2014
Kendell L Coker Philip H Smith Alexander Westphal Howard V Zonana Sherry A McKee

OBJECTIVE Current knowledge regarding psychiatric disorders and crime in youth is limited to juvenile justice and community samples. This study examined relationships between psychiatric disorders and self-reported crime involvement in a sample of youth representative of the US population. METHOD The National Comorbidity Survey-Adolescent Supplement (N = 10,123; ages 13-17 years; 2001-2004) w...

2014
Szde Yu

A literature review on fear of crime suggests perceived crime seriousness, perceived risk of victimization, and victimization experience as the three major predictors for fear of crime. In the present study I test these factors on cyber crimes as their relationships with fear of cyber crime are generally unexplored in the literature. Precisely, four cyber crimes are chosen, including online sca...

2010

Jamaica is a small state in the northern Caribbean with a population of approximately 2.69 million people. The state faces significant social and economic challenges with chronic unemployment and underemployment. While the formal economy remains in a stagnant state, the trade in illegal drugs, arms and ammunition has remained dynamic and achieved high levels of organization. The political envir...

2015
Milind G. Meshram Deepak Kapgate

Cyber attack comes in various approach and forms, either internally or externally. Access from remote machines and spyware are forms of cyber attack leaving an organization to be susceptible to vulnerability. This paper investigates of illegal activities and potential evidence of cyber attack through studying the registry on the Windows 7 and Event Log Files. The aim is to trace the registry an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید