نتایج جستجو برای: theft
تعداد نتایج: 4431 فیلتر نتایج به سال:
Protecting the identity of an individual is a shared responsibility between the individual, the organizations with whom the individual will be transacting during her life time, and the state of which the individual is a legal resident. Identity theft occurs when someone uses an individual’s personal information without the knowledge of the individual to commit a crime, such as fraud or theft. O...
Code theft has been a serious threat to the survival of the software industry. A dynamic software birthmark can help detect code theft by comparing the intrinsic characteristics of two programs extracted during their execution. We propose a dynamic birthmark system for Java based on the object reference graph. To the best of our knowledge, it is the first dynamic software birthmark making use o...
Existing models of the evolution of social behavior typically involve innate strategies such as tit-for-tat. Yet, both behavioral and neural evidence indicates a substantial role for learned social behavior. We explore the evolutionary dynamics of two simple social behaviors among learning agents: Theft and punishment. In our simulation, agents employ Q-learning, a common reinforcement learning...
theft is considered to be one of the most ancient crimes against properties and ownership to which human societies have engaged for a very long time. this crime has been intensively punished every time and everywhere and the people who committed such a crime have been treated with many kinds of heavy punishments. in any case, in many law systems theft from relatives is treated in a friendly way...
Employee Theft: Determinants of Motive and Proactive Solutions
The present study investigated how alibi witnesses react in the face of an innocent suspect's confession. Under the pretext of a problem-solving study, a participant and confederate completed a series of tasks in the same testing room. The confederate was subsequently accused of stealing money from an adjacent office during the study session. After initially corroborating the innocent confedera...
This study measures the effect of CCTV in Newark, NJ across three separate crime categories: auto theft, theft from auto, and violent crime. CCTV viewsheds, denoting camera line-of-sight, were units of analysis. Viewsheds for treatment units were created by digitizing live CCTV footage within a geographic information system (GIS). Control viewsheds were created with GIS tools and aerial imagery...
D ue to the computational power of underlying platforms, digital kill switches have a much broader capability and use than earlier industrial panic switches. In the case of mobile computing devices and smartphones, the purpose of the kill switch is to make theft unattractive. Protections include " wiping " the data off the device and/or " bricking " the device so that it is unusable. Consumer R...
It is commonplace to note that in surveys people claim to place a high value on privacy while they paradoxically throw away their privacy in exchange for a free hamburger or a two dollar discount on groceries. The usual conclusion is that people do not really value their privacy as they claim to or that they are irrational about the risks they are taking. Similarly it is generally claimed that ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید