نتایج جستجو برای: theft

تعداد نتایج: 4431  

2001

Client computer security is a broad subject that includes securing access to network resources, securing data transfers over private and public networks, and protecting client computers and local data from theft. Security is increasingly important as portable computers, vulnerable to theft, proliferate and the Internet revolutionizes communications and commerce. Applications such as e-commerce,...

2015
Nidhi Sharma Alok Sharma

Password plays an important role in online authentication. But it suffer from two interactable problems ,one is password cracking and second is password theft. Password agent mechanism contains strong hashing scheme which provides stronger protection against password theft and password cracking. Password Agent generates strong passwords by enhancing the hash function with a large random salt. T...

Journal: :Business Ethics, the Environment and Responsibility 2022

Abstract Rewards are reinforcement mechanisms that organizations use to shape desirable employee behaviors. However, rewards may also have unintended consequences, such as building expectations for receiving extra benefits and weakening barriers unethical acts. This article investigates the dark side of reward–behavior association, exploring what is referred reward–theft parity effect (RTPE). T...

2007
Ronald Leenes

Identity theft is often perceived as one of the major upcoming threats in crime. However, there is no commonly accepted definition of ‘identity theft’ or ‘identity fraud’, and it is impossible to study the real threat of this phenomenon without conceptual clarity. In this article, we attempt to provide a starting point for policy and research by proposing some definitions. We indicate that what...

Journal: :journal of herbal drugs (an international journal on medicinal herbs) 2011
maryam ahmadi abotaleb kosha

over the past two decades, the role of intellectual property rights in all areas of science and technology has exploded globally– primarily due to the rules prescribed by the world trade organization’s trips and by bilateral/regional trade agreements. the trips agreement obligates all wto member countries to adopt and enforce minimum standards of intellectual property rights. the trips agreemen...

Journal: :IJITN 2013
George P. Corser Suzan Arslanturk Jared Oluoch Huirong Fu George E. Corser

Traditional cost-benefit analysis (CBA) quantifies the value of information security safeguards in terms of their expenses compared to their savings before and after their implementation. This paper considers CBA from the attacker's viewpoint, adding another type of measurement, the willingness to endure consequences. We propose a new set of equations and examine their implications vis-à-vis tw...

2013
Barry Sinervo

Animals forage for resources in the face of ecological constraints (Mangel and Clark 1986). Foraging often occurs under the watchful eye of a predator. The risk of predation is an ever-present danger and an animal’s foraging behavior reflects this risk even in the physical absence of an actual predator. Vigilance is the state of arousal required for an alert animal to detect predators (Lima and...

2004
Ginger Myles Christian S. Collberg

A software birthmark is a unique characteristic of a program that can be used as a software theft detection technique. In this paper we present and empirically evaluate a novel birthmarking technique — Whole Program Path Birthmarking — which uniquely identifies a program based on a complete control flow trace of its execution. To evaluate the strength of the proposed technique we examine two im...

2006
Damith C. Ranasinghe Peter H. Cole

In the proliferation of RFID technology anti-theft labels are continuing to evolve. In the functional hierarchy of RFID labels the battery-powered labels are a set of higher class labels referred to as active labels. Often these labels are employed for the tagging of expensive goods, with aim of both tracking and preventing the theft of the item. The battery powering such active labels must hav...

2017
Claire Tyler Claire G. Tyler

Eyewitness misidentification is the leading cause of wrongful convictions in the United States. Inattentional blindness, the failure to become fully aware of an object or event despite its presence in the center of one’s visual field, may render some eyewitnesses unable to accurately describe the culprit of a crime that had occurred right in front of them. The members of Ira Hyman’s research la...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید