• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 40
  • 28
  • 8
  • 6
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 102
  • 27
  • 26
  • 24
  • 23
  • 17
  • 15
  • 14
  • 13
  • 13
  • 13
  • 10
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Les capitaux migrateurs (hot money)

Blumenfeld, Henri. January 1941 (has links)
Thesis--Université de Neuchâtel. Faculté de Droit. / Bibliography: p. [187]-190.
2

Abschieben falschen Geldes /

Caspar, Julius. January 1896 (has links)
Thesis (doctoral)--Georg-August-Universität zu Göttingen.
3

Les capitaux migrateurs (hot money)

Blumenfeld, Henri. January 1941 (has links)
Thesis--Université de Neuchâtel. Faculté de Droit. / Bibliography: p. [187]-190.
4

Die Geldfälschung im geltenden Recht und in den Entwürfen /

Brunner, Eduard. January 1930 (has links)
Thesis (doctoral)--Friedrich-Alexander-Universität zu Erlangen.
5

The contribution of cultural studies to right of publicity laws : evocative identification, associative appropriation and political recoding /

Tan, David Tai Wui. January 2010 (has links)
Thesis (Ph.D.)--University of Melbourne, Melbourne Law School, 2010. / Typescript. Includes bibliographical references (p. 239-261)
6

Taiwanese Undergraduate Perspectives on Counterfeiting and Piracy: A Comparative Study

Abraham Pancoast, David 29 June 2010 (has links)
Counterfeiting and piracy are serious problems in Taiwan. Recent changes in local laws and enforcement policies have sought to curb the problem, but these actions have failed to account for the inherent differences in the perceptions among young Taiwanese persons of purchase and/or consumption of counterfeit or pirated goods. Previous research had indicated that the primary drivers in this market of purchase intention for these products are education, ethicality, legality, quality, face consciousness, perceived harm to society, and the utility derived from consumption. The primary aims of this research were to compare and contrast these perceptions among undergraduate students in Taiwan using two independent surveys and to attempt to explain the variance in purchase intention that can be attributed to six of the seven drivers (utility excluded). While purchase intention and perceptions regarding some kinds of societal harm were found to be statistically equal, significant differences were discovered between students¡¦ attitudes toward counterfeiting versus piracy with regard to ethicality, legality, and the impact of these activities on innovation and the Taiwan economy. Additionally, there were marked differences between the amounts of variance in purchase intention explained by the six drivers and between the specific correlations of these drivers. Counterfeit goods¡¦ purchase intention correlated significantly with only three of the drivers, while pirated goods¡¦ purchase intention correlated with five, and with only partial overlap between the two. The findings of this study are thus concluded to be significant for the further development of research into the two areas.
7

The control of pirated compact discs products in Hong Kong does penalization of consumers work? /

Wu, Wai-han, Heidi. January 2000 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 2000. / Includes bibliographical references (leaves 89-93) Also available in print.
8

Counterfeit Industry and the Link to Terrorism

Holt, Holly Barbara January 2016 (has links)
The purpose of this research study is to explore whether consumers would be complicit in the purchase of counterfeit goods once becoming aware of the counterfeit industry being linked to terrorism. Counterfeit goods are defined as identical copies of authentic products and they are produced without the permission of the registered owner (Carpenter & Lear, 2011). Almost any product can be counterfeited from clothing, shoes, jewelry, handbags and even medicines. Counterfeit products are sold at a fraction of the cost of the authentic product. This study identifies the ‘why’ to consumer complicity to purchase the counterfeit items. There are legalities involved with the selling of the copied products, and this research identified the underlying connections to terrorism along with the damaging effects on the U.S. economy. This study examined the variables of consumer knowledge of counterfeits and link to terrorism and willingness to purchase counterfeit products.
9

A hardware-enabled certificate of authenticity system with intrinsically high entropy

Lakafosis, Vasileios 09 April 2013 (has links)
The objective of the proposed research is the design and fabrication of a novel stand-alone wireless robust system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. The system consists of two major components; the near-field certificates of authenticity (CoA), which serve as authenticity vouchers of the products they are attached to, and a microcontroller-enabled, low-power and low-cost reader. Small-sized passive physical three-dimensional structures that are composed of extremely cheap conductive and dielectric materials are shown to yield a unique and repeatable RF signature in a small portion of the frequency spectrum when brought in the reactive and radiating near-field regions of an array of miniature antennas. The multidimensional features of these CoAs, or in other words their signature or fingerprint, are cryptographically signed and digitally stored. The contactless signature validation procedure, in which an attempt to associate the near-field signature response of the physical CoA with the digitized signature, is carried out by the reader designed and fabricated. This low-cost reader operates autonomously and in an offline fashion. The feasibility and performance robustness of the system, in terms of accuracy, consistency and speed of capturing of the signatures, is rigorously assessed with a wide array of tests. Moreover, the entropy, or uncertainty, of the signatures generated by the system are empirically quantified and verified to achieve a virtually impossible false alarm. The aforementioned characteristics of the realized authentication system make it applicable to a vast array of physical objects that needs protection against counterfeiters.
10

A model for the secure management of supply chains.

04 June 2008 (has links)
We live in a very demanding and increasingly computerised world. In almost any area, consumers have a wide variety of choices, yet they demand shorter lead-times, higher quality and lower costs and if a business is unable to provide for the consumer’s requirements, the consumer will look elsewhere. With little to distinguish in manufacturing quality, the efficient use and management of supply chains becomes paramount. For a long time, the counterfeiting trade has been a thorn in the side of legitimate business. Seeking only to generate maximum profit with minimum effort, they use the reputation of a legitimate business to maximize sales. The counterfeiter’s task is made easier by the lack of control mechanisms along the supply chain. This leads to a situation where materials and finished products are being misappropriated in volume and counterfeit goods are able to enter the chain, often with help from within the targeted organisation. There is no mechanism for forcing individuals and organisations to accept responsibility, allowing for the passing blame. This dissertation will examine the nature of a system aimed at defeating attempts at theft, validating an item’s authenticity and positively identifying the origin and rightful owner of an item. This dissertation will not be explicitly developing the above system and will concentrate more on the underlying factors and providing a generic model on which to base an actual system. First we examine the impact of supply chains on our day-to-day lives, the concept and the related management paradigms. Next comes the counterfeiting trade and what motivates the counterfeiter. The examination is extended to cover the workings of the so-called “Grey Market” and some steps to combat the trade. In order to facilitate an implementation, various technologies are examined for their suitability. This covers diverse technologies from biometric authentication through the Internet and cryptographic technologies to the use of Radio Frequency Identifiers. Some specific devices are discussed and user attitudes towards these technologies are gauged. Based on these technologies a model is proposed allow a supply chain to be secured. A variety of concepts, such as packaging, unpacking and sealing, are introduced and explained. These concepts are combined with the various technologies for tracking items within the chain and for enforcing nonrepudiation. Based on the model, the actors within the system are identified along with the types of information each might expect, allowing generic datasets to be developed. With the model and technologies in place a tiered theoretical implementation is formed showing how each hardware device interacts with the model to form a solution. / Prof. M.S. Olivier

Page generated in 0.1349 seconds