• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 116
  • 39
  • 36
  • 25
  • 9
  • 6
  • 5
  • 5
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 282
  • 60
  • 45
  • 42
  • 42
  • 38
  • 35
  • 33
  • 32
  • 31
  • 31
  • 29
  • 28
  • 28
  • 28
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Piracy of the new millennium an application of criminological theories to digital piracy /

Gunter, Whitney D. January 2009 (has links)
Thesis (Ph.D.)--University of Delaware, 2009. / Principal faculty advisor: Ronet D. Bachman, Dept. of Sociology & Criminal Justice. Includes bibliographical references.
32

Software Theft Detection Through Program Identification

Myles, Ginger January 2006 (has links)
Prior to the general availability of high speed Internet, the spread of piratedsoftware required the transfer of a physical copy like a disk, which limited therate at which illegal software could be distributed. The low transfer raterestricted software piracy to levels which producers found acceptable becausethe associated losses could be absorbed. Large scale cases of piracy were rareand when they did occur the legal system provided suitable retribution. However,recent advances in computer technology have made the need for a physical copyobsolete. Piracy is now a widespread, decentralized problem in which millions ofindividuals take part. Without technical means of identifying pirated software,the protection afforded by the legal system is no longer easy to enforce or costeffective.The research in this dissertation addresses the threat of software piracythrough the exploration of two techniques: software watermarking and softwarebirthmarking. Neither of these techniques can be used to prevent software theftentirely. Instead, they are used to detect occurrences of theft after the fact.One of the limiting factors of the protection provided by the legal system isthat it cannot be used to identify an incidence of piracy. Softwarewatermarking and birthmarking fill this gap, thus providing complimentaryprotection to the established legal protection. In this research, we analyze thestate of the art in both software watermarking and birthmarking and we propose anovel scheme in each of the areas which make significant improvements overexisting techniques.
33

Maritime Piracy in Southeast Asia and Bangladesh, 1992-2006: A Prismatic Interpretation of Security

c.liss@murdoch.edu.au, Carolin Liss January 2007 (has links)
Southeast Asia and Bangladesh are at present global hot-spots of pirate attacks on merchant vessels and fishing boats. This thesis explains why, and in what form, piracy still exists. It will argue that an examination of contemporary piracy is important because it can be understood as both a symptom and a reflection of a range of geo-political and socio-economic problems and security concerns. The thesis examines pirate attacks on small craft, including fishing boats, and merchant vessels in Southeast Asia and Bangladesh between 1992 and 2006. It describes the different types of contemporary pirate attacks, identifies piracy hot-spots, and looks at the various kinds of pirates active in Southeast Asia and Bangladesh. Furthermore, it discusses a number of factors which have contributed to the shaping of modern day piracy in Southeast Asia and Bangladesh. Issues examined in this regard include the impact of ecological degradation and over-fishing on the occurrence of piracy; loop-holes and shortcomings in maritime laws and regulations that are conducive to the operations of pirates; the involvement of transnational crime syndicates and radical politically motivated groups in piracy; and the problems with state and private responses to pirate attacks. It will be argued that the examination of these factors reveals not only how they shape piracy, but that they also have an impact upon security well beyond pirate attacks. Examining piracy in this way is akin to looking through a prism, allowing a critical gaze to be cast over a range of political, social, and ecological developments, as well as security risks, and their impact on the lives and circumstances of people in Southeast Asia, Bangladesh, and the wider international community. It will be suggested that piracy and the various responses to it both reflect political and social developments within countries, and co-operation, tension and friction between states. Additionally, it will be demonstrated that the occurrence of pirate attacks in a region or a country indicates the existence of a wide range of traditional and non-traditional security risks, which can have far reaching repercussions for individuals, nations, or the international community. Through the examination of piracy in Southeast Asia and Bangladesh, and the responses it triggers, important new trends and practices in the security sector are also identified, including the increasing privatisation of security and protection services around the globe.
34

Maritime Piracy in Southeast Asia and Bangladesh, 1992-2006: A Prismatic Interpretation of Security

c.liss@murdoch.edu.au, Carolin Liss January 2007 (has links)
Southeast Asia and Bangladesh are at present global hot-spots of pirate attacks on merchant vessels and fishing boats. This thesis explains why, and in what form, piracy still exists. It will argue that an examination of contemporary piracy is important because it can be understood as both a symptom and a reflection of a range of geo-political and socio-economic problems and security concerns. The thesis examines pirate attacks on small craft, including fishing boats, and merchant vessels in Southeast Asia and Bangladesh between 1992 and 2006. It describes the different types of contemporary pirate attacks, identifies piracy hot-spots, and looks at the various kinds of pirates active in Southeast Asia and Bangladesh. Furthermore, it discusses a number of factors which have contributed to the shaping of modern day piracy in Southeast Asia and Bangladesh. Issues examined in this regard include the impact of ecological degradation and over-fishing on the occurrence of piracy; loop-holes and shortcomings in maritime laws and regulations that are conducive to the operations of pirates; the involvement of transnational crime syndicates and radical politically motivated groups in piracy; and the problems with state and private responses to pirate attacks. It will be argued that the examination of these factors reveals not only how they shape piracy, but that they also have an impact upon security well beyond pirate attacks. Examining piracy in this way is akin to looking through a prism, allowing a critical gaze to be cast over a range of political, social, and ecological developments, as well as security risks, and their impact on the lives and circumstances of people in Southeast Asia, Bangladesh, and the wider international community. It will be suggested that piracy and the various responses to it both reflect political and social developments within countries, and co-operation, tension and friction between states. Additionally, it will be demonstrated that the occurrence of pirate attacks in a region or a country indicates the existence of a wide range of traditional and non-traditional security risks, which can have far reaching repercussions for individuals, nations, or the international community. Through the examination of piracy in Southeast Asia and Bangladesh, and the responses it triggers, important new trends and practices in the security sector are also identified, including the increasing privatisation of security and protection services around the globe.
35

The pirate bazaar the social life of copyright law /

Rimmer, Matthew Rhys. January 2001 (has links)
Thesis (Ph. D.)--University of New South Wales, 2001. / Available via the Australian National University Library Electronic Pre and Post Print Repository. Title from title screen (viewed Mar. 28, 2003). Includes bibliographical references.
36

Software piracy an empirical study of influencing factors /

Villazon, Cira H. January 2004 (has links) (PDF)
Thesis (Bus.Admin.D.)--Nova Southeastern University, 2004. / Includes bibliographical references (leaves 165-186).
37

Securing Sub-Saharan Africa's maritime environment lessons learned from the Caribbean and Southeast Asia /

Murphy, Brian T. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Middle East, South Asia, Sub-Saharan Africa))--Naval Postgraduate School, June 2009. / Thesis Advisor(s): Lawson, Letitia. "June 2009." Description based on title screen as viewed on July 13, 2009. DTIC Identifiers: Maritime strategy, drug war, piracy, Caribbean, national strategy. Author(s) subject terms: Africa; Drug War; Piracy; Maritime Strategy; Caribbean; Coast Guard; Southeast Asia; Indonesia; Singapore; Malaysia. Includes bibliographical references (p. 63-73). Also available in print.
38

Maritime interdiction in counterinsurgency the role of the Sri Lankan Navy in the defeat of the Tamil Tigers /

Smith, Justin O. January 2010 (has links) (PDF)
Thesis (M.A. in Security Studies (Far East, South East Asia, Pacific))--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Porch, Douglas; Second Reader: Kline, Jeffrey F. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: Sri Lanka, Insurgency, Counterinsurgency, Maritime Interdiction, Irregular Warfare, Piracy, Counter-piracy, Maritime Terrorism, Arms Smuggling, Counter-arms Smuggling, Maritime Security Operations, Small Boat Tactics. Includes bibliographical references (p. 71-76). Also available in print.
39

Analysis of the strategy to combat maritime piracy /

Davis, William M. January 1900 (has links)
Thesis (M.M.A.S.) -- U.S. Army Command and General Staff College, 2009. / "AD-A512 384." Includes bibliographical references.
40

Softwarové pirátství / Software Piracy

Zemančík, Adam January 2017 (has links)
Software piracy In this thesis I explore the current state of software piracy in the Czech Republic, which proves to be quite demanding due to its illegal nature and the lack of statistical data. I also take a look at the current legal protection which is awarded to the authors of computer software. Even with new trends in software piracy I conclude, that the current protection is satisfactory. I also explain how international treaties and european legislation influence czech laws.

Page generated in 0.037 seconds