نتایج جستجو برای: theft

تعداد نتایج: 4431  

Journal: :Psychophysiology 2011
Galit Nahari Gershon Ben-Shakhar

This study examined the role of memory for crime details in detecting concealed information using the electrodermal measure, Symptom Validity Test, and Number Guessing Test. Participants were randomly assigned to three groups: guilty, who committed a mock theft; informed-innocents, who were exposed to crime-relevant items; and uninformed-innocents, who had no crime-relevant information. Partici...

2009
Nicolas Schutz

Using an economic geography model, we analyze the impact of an increase in trade unions’ bargaining strength on firms’ location decision. We show that an increase in workers’ bargaining power entails two effects. On the one hand, the standard labor cost effect induces firms to relocate their production abroad. On the other hand, trade unions, by stealing profits from foreign capitalists, create...

2010
Heith Copes Kent R. Kerley Rodney Huff John Kane

Despite the widespread attention given to identity theft, there is much confusion on how best to define and measure it. Recent attempts to measure its extent through victimization surveys or law enforcement files have varied considerably in the types of crimes included as identity theft. Some studies include credit card fraud, while others exclude it. This inconsistency in data collection has m...

2012
Saurabh Amin Galina Schwartz Hamidou Tembine

We study incentive problems in electricity distribution when customer energy usage is imperfectly observable by the utility. Thus, we assume that each customer has private information about the amount of his consumed energy. Imperfect observability of individual user demand results is non-technical energy losses. In developing countries, these losses amount to 20− 30% per year, and are largely ...

2013
S. Kami Makki Md. Sadekur Rahman

Information theft or data leakage is a growing concern for companies as well as individual users. Intruders can easily copy huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for corpo...

2009
Alessandro Acquisti Ralph Gross

Designed as identifiers of accounts tracking US residents' earnings, Social Security numbers (SSNs) have become over time sensitive authenticators for private sector services. Since their abuse is a major vector of identity theft, numerous initiatives have attempted to reduce their public availability. However, recent research has shown that unavailable SSNs may still be accurately predicted fr...

2008
Carolyn A. Strand Kathryn A. S. Lancaster

This paper reports the results of a study that was conducted to investigate the performance of senior-level business students as it pertains to recog­ nizing certain clues or risk factors that are frequently associated with the misappropriation of entity assets. Based on three of the risk factors iden­ tified in SAS No. 82, an experiment was used to examine differences in performance based on a...

2004
Marcel Fafchamps Bart Minten

This paper investigates the relationship between poverty and crime. Following a disputed presidential election, fuel supply to the highlands of Madagascar was severely curtailed in early 2002, resulting in a massive increase in poverty and transport costs. Using original survey data collected in June 2002 at the height of the crisis, we Þnd that crop theft increases with transitory poverty. We ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید