205 resultados para theft


Relevância:

20.00% 20.00%

Publicador:

Resumo:

"June 1984."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"December 1972."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"March 1993"--Cover.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At head of title: The greatest criminal of the past century; stole millions--imprisoned but once.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Male Satin Bowerbirds (Ptilonorhynchus violaceus) build stick structures known as bowers that serve as the focus for courtships and matings. Males decorate their bowers with numerous coloured decorations and are known to steal these decorations from one another. We investigated the stealing of bower decorations among males at the Bunya Mountains in Queensland, Australia. We aimed to (1) determine which classes of decorations were targets for theft in the studied population, and (2) examine whether the frequency at which individual decorations were stolen related to their intrinsic properties. To address our first aim, all decorations on the bowers of 21 adult males were labelled and their movements tracked throughout one mating season. To address our second aim, decorations stolen at least three times during the season were collected and their morphological and reflectance properties compared to those of decorations that were not stolen. In terms of the classes of decorations, tail feathers of Crimson Rosella (Platycercus elegans) were stolen more than any other class of decoration, but blue plastic bottletops were the most popular decorations relative to their availability on bowers. Frequently stolen individual decorations were similar to non-stolen items in their weights and surface areas, but were darker blue in colour than the decorations never stolen. Both bottletops and feathers reflected higher levels of ultraviolet (UV) light than did all other classes of bower decorations tested, thus suggesting that males may be using UV reflectance in sexual signalling. The darker blue, stolen decorations may increase contrast between the decoration collection and the platform, while the UV-reflecting subset of most frequently stolen decorations (bottletops and feathers) may increase contrast within the decoration collection. This in turn may increase the attractiveness of the display to females.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the present study is to test the case linkage principles of behavioural consistency and behavioural distinctiveness using serial vehicle theft data. Data from 386 solved vehicle thefts committed by 193 offenders were analysed using Jaccard's, regression and Receiver Operating Characteristic analyses to determine whether objectively observable aspects of crime scene behaviour could be used to distinguish crimes committed by the same offender from those committed by different offenders. The findings indicate that spatial behaviour, specifically the distance between theft locations and between dump locations, is a highly consistent and distinctive aspect of vehicle theft behaviour; thus, intercrime and interdump distance represent the most useful aspects of vehicle theft for the purpose of case linkage analysis. The findings have theoretical and practical implications for understanding of criminal behaviour and for the development of decision-support tools to assist police investigation and apprehension of serial vehicle theft offenders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research paper presents an examination of the journey to and from crime for autotheft offenders in the UK. For 852 offences, ‘wheel’ distances are calculated for triangles formed by offenders’ home location, theft location, and vehicle disposal location. The study demonstrates typical isosceles mobility triangles; distances travelled to and from home locations are roughly equal, whereas distances between theft and disposal points were shorter. Distances travelled by offenders under 17 years old and offences involving drug and drink were shown to be shorter than comparison groups. Prolifi c offenders tend to travel further, although there is signifi cant variation in this subgroup. Explanations and implications are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unacceptable employee behavior ultimately results in higher prices for consumers. Members of the Indiana Hospitality and Restaurant Association were surveyed about the practices being used to safeguard their assets and control employee deviance in food service. They were also asked to estimate the losses that result from employee theft. This information was used to investigate whether certain policies and procedures were more effective than others in limiting their losses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motor vehicle theft costs dearly to the Australian economy. Conservative estimates have put the annual cost of this form of illegal activity at 654 million during 1996. A number of initiatives aimed at reducing the incidence and cost of car theft have been implemented in recent years, yet statistics indicate that car theft is on the increase. Several authors have proposed an integrated approach to the regulation of markets for stolen property. Understanding property crime as a market is central to identifying approaches to its control. This paper discusses an industry model of crime and develops it on Australian data. Our model is an adaptation of one originally proposed by Vandeale (1978). It considers a production sector that uses inputs from a market of illegal labour to generate a supply of illegal goods that are traded in a product market. These sectors interact with each other and with a criminal justice sector. The model is applied to the analysis of car theft in Queensland.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing popularity of smartphone devices has led to development of increasing numbers of applications which have subsequently become targets for malicious authors. Analysing applications in order to identify malicious ones is a current major concern in information security; an additional problem connected with smart-phone applications is that their many advertising libraries can lead to loss of personal information. In this paper, we relate the current methods of detecting malware on smartphone devices and discuss the problems caused by malware as well as advertising.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.