205 resultados para theft


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pounamu (NZ jade), or nephrite, is a protected mineral in its natural form following the transfer of ownership back to Ngai Tahu under the Ngai Tahu (Pounamu Vesting) Act 1997. Any theft of nephrite is prosecutable under the Crimes Act 1961. Scientific evidence is essential in cases where origin is disputed. A robust method for discrimination of this material through the use of elemental analysis and compositional data analysis is required. Initial studies have characterised the variability within a given nephrite source. This has included investigation of both in situ outcrops and alluvial material. Methods for the discrimination of two geographically close nephrite sources are being developed. Key Words: forensic, jade, nephrite, laser ablation, inductively coupled plasma mass spectrometry, multivariate analysis, elemental analysis, compositional data analysis

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper estimates the impact of a massive negative income shock led by the simultaneous crash down of several Ponzi schemes (also known as financial ``pyramids"") in Colombia on crime rates at the municipal level. Using novel data on the spatial incidence of the latest wave of Colombian pyramids and their crash down date, I estimate difference-in-differences models with both monthly and yearly frequency. I find that the negative income shock of the pyramids" crash down differentially exacerbates crime in affected municipalities compared to those with no presence of Ponzi schemes. This is true for minor offenses like commercial theft or residential burglary, but not for major crimes as murder or terrorism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An E-Learning Gateway for the latest news and information relating to Computer Crime for INFO2009

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este trabajo busca identificar y definir porque la tecnología RFID puede ser un buen negocio de oportunidad en el mercado Colombiano, cada vez esté, está más enfocado en generar procesos de mejora continua que produzcan eficiencia al interior de las organizaciones, actualmente el uso de la tecnología es una herramienta clave para que las organizaciones se mantengan a la vanguardia. Con base en el estudio vemos que la tecnología RFID, genera eficiencia en el flujo de la información, mejora el control de inventarios y genera seguridad en estos, además de la disminución en los procesos y operaciones, e incrementa la velocidad en la toma de decisiones, por otro lado existe un mercado a explotar que es el de los hoteles, en la medida en que estos pueden controlar sus inventarios de objetos como sabanas, cobijas, etc. Evitando perder estos productos por robos. Un problema de esta tecnología son los altos costos, que impiden que empresas medianas y pequeñas puedan invertir en estos procesos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Government initiatives in several developed and developing countries to roll-out smart meters call for research on the sustainability impacts of these devices. In principle smart meters bring about higher control over energy theft and lower consumption, but require a high level of engagement by end-users. An alternative consists of load controllers, which control the load according to pre-set parameters. To date, research has focused on the impacts of these two alternatives separately. This study compares the sustainability impacts of smart meters and load controllers in an occupied office building in Italy. The assessment is carried out on three different floors of the same building. Findings show that demand reductions associated with a smart meter device are 5.2% higher than demand reductions associated with the load controller.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The threats range from explicit, e.g. a person attacking the truck driver, to implicit, e.g. somebody loitering and then fiddling with the exterior of the truck in order to open it. Our goal is a system that is able to recognize a threat instantaneously as they develop. Typical observables of the threats are a person’s activity, presence in a particular zone and the trajectory. The novelty of this paper is an encoding of these threat observables in a semantic, intermediate-level representation, based on low-level visual features that have no intrinsic semantic meaning themselves. The aim of this representation was to bridge the semantic gap between the low-level tracks and motion and the higher-level notion of threats. In our experiments, we demonstrate that our semantic representation is more descriptive for threat detection than directly using low-level features. We find that a person’s activities are the most important elements of this semantic representation, followed by the person’s trajectory. The proposed threat detection system is very accurate: 96.6 % of the tracks are correctly interpreted, when considering the temporal context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although social networking sites (SNSs) present a great deal of opportunities to support learning, the privacy risk is perceived by learners as a friction point that affects their full use for learning. Privacy risks in SNSs can be divided into risks that are posed by the SNS provider itself and risks that result from user’s social interactions. Using an online survey questionnaire, this study explored the students’ perception of the benefits in using social networking sites for learning purposes and their perceived privacy risks. A sample of 214 students from Uganda Christian University in Africa was studied. The results show that although 88 % of participants indicated the usefulness of SNSs for learning, they are also aware of the risks associated with these sites. Most of the participants are concerned with privacy risks such as identity theft, cyber bullying, and impersonation that might influence their online learning participation in SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this essay is to examine and explain how the Swedish mining court of Stora Kopparberget (the Great Copper Mountain) implemented its judicial legislation between 1641-1682. Questions are asked about which counts of indictments the court tried, which sentences they handed out, in what quantities and how these results looks in comparison with other contemporary courts. The index cards of the court judicial protocols are the primary source of information. The methods are those of quantity- and comparative analysis.The results show that theft of copper ore was the most common crime ransacked by the court. Other common crimes were (in order): sin of omission, transgression of work directions, fights, slander and disdain, trade of stolen ore, failing appearance in court etc.Fines were by far the most common sentence followed by shorter imprisonments, gauntlets, loss of right to mine possession, twig beating, loss of work, penal servitude, banishment, “wooden horse riding” and finally military transcription. Even though previous re-search, in the field of Swedish specialized courts, is almost non existent evidence confirms great similarities between the Stora Kopparberget mining court and Sala mining court. This essay will, hopefully, enrich our knowledge of specialized courts, of 17th century mining industry and society and let us reach a broader understanding of the working conditions of the mountain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As traditional organizations using their websites for eCommerce transactions are increasing at an exponential rate, privacy concerns of users are also on the rise. To gain an insight into these concerns, existing policies and legislation, we conducted the research reported in this paper, in 2003. To augment the literature synthesis, a multiple case study analysis was conducted, based on six large organisations in Australia. Our research findings suggested that in the Australian context, an online privacy policy (OPP) on the website which complies with the Privacy Act, supported by few best practices are reasonably able to address online privacy concerns. However, these findings are restricted in time frame, indicative and relevant in the Australian context. Nevertheless, we hope to stimulate academic research enquiry and discussion forums through this research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reasons for the adoption of smart cards and biometric authentication mechanisms have been discussed in the past, yet many organisations are still resorting to traditional methods of authentication. Passwords possess several encumbrances not the least of which includes the difficulty some users have in remembering them. Often users inadvertently write difficult passwords down near the workstation, which negates any security password authentication, may provide and opens the floodgates to identity theft. In the current mainstream authentication paradigm, system administrators must ensure all users are educated on the need for a password policy, and implement it strictly. This paper discusses a conceptual framework for an alternative authentication paradigm. The framework attempts to reduce complexity for the user as well as increase security at the network and application levels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed. An area of advancement has been in the development of virtual worlds, where people can interact together via virtual characters. Virtual World systems have been so complex that virtual lives can be lived, including all aspect of life such as education, commerce, social activities etc. Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism and terrorism, also exist in the virtual worlds. The more developed these virtual worlds become the greater the breaches of security will be in the virtual as well as the real world.This paper explores and categorises several security issues within the Virtual World of Second Life. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in Virtual Worlds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study shows that cyber crime is a recent addition to the list of crimes that can adversely affec tbusinesses directly or indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003. The motivation to do this study was
that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked
or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms.
The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them.
The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies and higher education institutions. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks and higher education institutions felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advancement in Internet and bandwidth has resulted in a number of new applications to be developed; many of these newer applications are described as being Web 2. A web 2 application such as Facebook has allowed people around the world to interact together. One of the interesting aspects of Facebook is the use of third parties applications and the interactions that this allows.

Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism also exist in online environment, and Web 2 applications are not exception to these issues. This paper explores and categorises several security issues within the Facebook environment. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in the use of Web 2 applications such as Facebook.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article applies Granger causality tests to examine the relationship between seven different categories of property crime and violent crime against the person, male youth unemployment and real male average weekly earnings in Australia from 1964 to 2001 within a cointegration and vector error correction framework. It is found that fraud, homicide and motor vehicle theft are cointegrated with male youth unemployment and real male average weekly earnings. However, there is no evidence of a long-run relationship between either break and enter, robbery, serious assault or stealing with male youth unemployment and real male average weekly earnings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What types of goods should be considered digital goods? This paper discusses the question of whether virtual property, such as items available in virtual world environments like Linden Lab’s Second Life and Blizzard’s World of Warcraft, should be considered a valid digital good. The makeup of a virtual property items are explored in this paper and their key features compared and contrasted with that of digital goods. Common examples of digital goods include: electronic books, software, digital music and digital movies. These goods are considered a tangible commodity, that is they have an unlimited supply and secondly they are in a digital/binary form (a sequence of 1’s and 0s’). When looking at why a virtual property items should be included in the category of ‘digital goods’, it is important to consider how items in a virtual world come to exist and how the availability of these items are often controlled by publishers and developers. The aim of this paper is show that digital goods should not be limited to the traditional views such as electronic books, software, music and movies; but in fact the term ‘digital good’ should also include the active market of virtual property
items.