نتایج جستجو برای: theft

تعداد نتایج: 4431  

2007
Vangalur S. Alagar Kaiyu Wan

Protecting the identity of an individual is a shared responsibility between the individual, the organizations with whom the individual will be transacting during her life time, and the state of which the individual is a legal resident. Identity theft occurs when someone uses an individual’s personal information without the knowledge of the individual to commit a crime, such as fraud or theft. O...

2011
Patrick P. F. Chan Lucas Chi Kwong Hui Siu-Ming Yiu

Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use o...

2014
James MacGlashan Michael L. Littman Fiery Cushman

Existing models of the evolution of social behavior typically involve innate strategies such as tit-for-tat. Yet, both behavioral and neural evidence indicates a substantial role for learned social behavior. We explore the evolutionary dynamics of two simple social behaviors among learning agents: Theft and punishment. In our simulation, agents employ Q-learning, a common reinforcement learning...

Journal: :فقه و مبانی حقوق اسلامی 0
محمد اسحاقی دانشیار، عضو هیئت علمی دانشکده الهیات دانشگاه تهران

theft is considered to be one of the most ancient crimes against properties and ownership to which human societies have engaged for a very long time. this crime has been intensively punished every time and everywhere and the people who committed such a crime have been treated with many kinds of heavy punishments. in any case, in many law systems theft from relatives is treated in a friendly way...

2017
David Langner William Werner

Employee Theft: Determinants of Motive and Proactive Solutions

Journal: :Law and human behavior 2016
Stéphanie B Marion Jeff Kukucka Carisa Collins Saul M Kassin Tara M Burke

The present study investigated how alibi witnesses react in the face of an innocent suspect's confession. Under the pretext of a problem-solving study, a participant and confederate completed a series of tasks in the same testing room. The confederate was subsequently accused of stealing money from an adjacent office during the study session. After initially corroborating the innocent confedera...

2018
Eric L. Piza John Jay

This study measures the effect of CCTV in Newark, NJ across three separate crime categories: auto theft, theft from auto, and violent crime. CCTV viewsheds, denoting camera line-of-sight, were units of analysis. Viewsheds for treatment units were created by digitizing live CCTV footage within a geographic information system (GIS). Control viewsheds were created with GIS tools and aerial imagery...

Journal: :IEEE Computer 2015
Hal Berghel

D ue to the computational power of underlying platforms, digital kill switches have a much broader capability and use than earlier industrial panic switches. In the case of mobile computing devices and smartphones, the purpose of the kill switch is to make theft unattractive. Protections include " wiping " the data off the device and/or " bricking " the device so that it is unusable. Consumer R...

2004
Adam Shostack Paul F. Syverson

It is commonplace to note that in surveys people claim to place a high value on privacy while they paradoxically throw away their privacy in exchange for a free hamburger or a two dollar discount on groceries. The usual conclusion is that people do not really value their privacy as they claim to or that they are irrational about the risks they are taking. Similarly it is generally claimed that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید