Spelling suggestions: "subject:"theft"" "subject:"heft""
11 |
One step ahead, not two steps behind: the fight to protect our identitiesBrenner, Jennifer Tatiana 18 September 2014 (has links)
This thesis reviews different types of identity theft and conducts and in-depth review of the threats to our personally identifiable information (PII). There has been an alarming increase in the availability of industry applications that aggregate our PII with the promise of convenience. This paper deeply explores three data aggregators: Google Mobile Wallet, COIN and PayPal Beacon, to understand what they are, potential security implications and how widespread data aggregation may alter the identity landscape as a whole. Discussion of common technologies leveraged by these data aggregators help illustrate the vulnerability of the data consumers are willingly sharing. In an attempt to better understand the crimes that steal and fraudulently use PII, this thesis introduces the ITAP, the Identity Theft Assessment and Prediction tool to illustrate why it is important to study theft and fraud as a business process. The paper presents a small, independent study conducted to emphasize the validly of both the business process ideology and usefulness of the results. Closing thoughts are presented to speculate what the future of identity could look like and how consumers may need to use the information gathered from tools such as the ITAP to shape best practices. The goal is to be two steps ahead instead of one step behind. / text
|
12 |
Essays on money, credit, and monetary policyChoi, Hyung Sun. January 2008 (has links)
Thesis (Ph. D.)--University of Iowa, 2008. / Thesis supervisor: Stephen D. Williamson. Includes bibliographical references (leaves 98-99).
|
13 |
Feeding phishers a thesis /Lynch, Nicholas James. Nico, Phillip Lovis. January 1900 (has links)
Thesis (M.S.)--California Polytechnic State University, 2009. / Title from PDF title page; viewed on August 27, 2009. "July 2009." "In partial fulfillment of the requirements for the degree [of] Master of Science in Computer Science." "Presented to the faculty of California Polytechnic State University, San Luis Obispo." Major professor: Philip Nico, Ph.D. Includes bibliographical references (p. 53-57).
|
14 |
Die Verband tussen werknemerdiefstal en etiese werksklimaat in 'n versorgingsoordDe Villiers, Dawid Willem. January 2004 (has links)
Thesis (M.Comm. (Personnel Management))--University of Pretoria, 2004. / Includes bibliographical references. Available on the Internet via the World Wide Web.
|
15 |
Progress towards the development and implementation of an unambiguous copper wire fingerprinting systemPoole, Martin January 2003 (has links)
The Telecommunications industry in Southern Africa is faced with the problem of theft of the signal carrying copper wire, both from the ground and from telephone poles. In many cases, if the offenders are caught, the prosecuting party has no way of proving that the wire is the property of any one Telecommunication company, as any inked markings on the insulating sheaths have been burned off along with the insulation and protective coatings themselves. Through this work we * describe the problem, * specify the necessary and preferred technical properties of a viable solution, * report the preliminary investigations into the devising of an unambiguous "fingerprinting" of the 0.5 mm wires, including some of those solutions that, upon investigation, appear non-viable, * describe the development and implementation of an electrochemical marker with detection mechanism which has shown in proof-of-principle to work, * outline the road-map of necessary future work.
|
16 |
Internal theft in a retail organization : a case study /Franklin, Alice Pickett January 1975 (has links)
No description available.
|
17 |
Baudžiamoji atsakomybė už kvalifikuotą vagystę / Criminal liability for aggravated theftVosyliūtė, Andželika 07 July 2009 (has links)
Disertacijoje analizuojamas baudžiamosios atsakomybės už kvalifikuotą vagystę reglamentavimas Lietuvos BK 178 straipsnio 2 ir 3 dalyse, atskleidžiami šio reglamentavimo trūkumai, pateikiama pasiūlymų šiems trūkumams pašalinti. Kadangi vagystės kvalifikuotos sudėtys apima ir pagrindinės vagystės sudėties požymius, disertacijoje nagrinėjama vagystės samprata, atskleidžiami rūšiniai vagystės požymiai, aptariami kai kurie diskutuotini šių požymių aspektai, skiriamos vagystės rūšys ir sudėtys. Pagrindinis dėmesys disertacijoje skirtas vagystės kvalifikuotoms sudėtims, jų konstravimo ypatumams atskleisti: analizuojama vagystės kvalifikuotų sudėčių reglamentavimo Lietuvoje galiojusiuose įstatymuose istorinė raida, aptariami vagystės kvalifikuotų sudėčių ypatumai kitų šalių baudžiamuosiuose įstatymuose, pabrėžiami šių sudėčių konstravimo privalumai ir trūkumai galiojančiame Lietuvos BK, siūloma jų konstravimo tobulinimo variantų. Šiame moksliniame darbe nagrinėjami visi BK 178 straipsnio 2 ir 3 dalyse numatyti vagystę kvalifikuojantys požymiai, atskleidžiamas jų turinys, iškeliamos šių požymių inkriminavimo problemos teisės taikymo praktikoje, siūlomi šių problemų sprendimo variantai. Nagrinėjant kiekvieną vagystę kvalifikuojantį požymį, lyginamuoju aspektu apžvelgiami analogiški ar panašūs kitų šalių baudžiamuosiuose įstatymuose įtvirtinti vagystę kvalifikuojantys požymiai, baudžiamosios teisės moksle egzistuojanti jų samprata, teoriniai teiginiai grindžiami teismų praktikos... [toliau žr. visą tekstą] / The thesis provides the analysis of regulation of criminal liability for aggravated theft in paragraphs 2 and 3 of Article 178 of the Lithuanian Criminal Code, reveals and makes proposals for eliminating the shortcomings in the regulation. Whereas corpus delicti of the aggravated theft also comprise elements constituting corpus delicti of principle theft, the thesis examines the concept of theft, reveals general elements of theft, covers certain debatable aspects of such elements and points out the types and corpus delictis of theft. The thesis focuses on revealing the corpus delictis of aggravated theft and the peculiarities of their construction: it provides the analysis of the historical development of norms regulating criminal liability for the aggravated theft during different periods of time in Lithuania, covers the peculiarities of corpus delictis of aggravated theft under the foreign criminal laws, emphasizes the advantages and disadvantages of constructions of corpus delictis of the aggravated theft in the valid Lithuanian Criminal Code and proposes options for improving such constructions. This scientific study explores all the elements aggravating theft provided for in paragraphs 2 and 3 of Article 178 of the Criminal Code, reveals the content of each aggravating element, highlights the problems relating to enforcement of the elements in judicial practice and proposes options for addressing the problems. Each element aggravating theft is examined by drawing a... [to full text]
|
18 |
Towards a framework for securing a business against electronic identity theftBechan, Upasna 30 November 2008 (has links)
The continuing financial losses incurred by individuals and companies due to identity information being phished are necessitating more innovative approaches to solving the problem of phishing attacks at the company level. Security standards are developed by respected experts in the profession and are widely accepted in the industry. The purpose of this study was to investigate whether a standard can be adapted to develop a framework that may guide companies in determining how to protect themselves against phishing attacks. A qualitative approach using design research as the methodology was used during the research. The data collection took place by means of a literature survey and semi-structured interviews. The artefact developed was a phishing-prevention framework based on the ISO/IEC 17799 standard, and the evaluation thereof took place through test cases. The findings communicated to the managerial audience was a set of recommendations as a further investment in their security protection against phishing attacks; the findings communicated to the technical audience was the successful adaptation of an existing security standard to produce a usable framework. Further research initiatives should extend the types of test cases that the phishing-prevention framework was evaluated against, and explore the use of tools for determining compliance with the framework. / Theoretical Computing / M. Sc. (Information Systems)
|
19 |
Sentencing convicted thieves : principles, policy and practiceBetts, G. January 2011 (has links)
The thesis examines court sentencing decisions in theft cases within the context of a proportionality-based sentencing framework. Whilst relatively little is known of the magistrates’ court and Crown Court interpretations of proportionality, such as the impact that various aggravating and mitigating factors may have on the sentencing decision, the thesis examines those factors (relating to both the offence and the offender) that appear to have the greatest impact on the sentencing decision. Additionally, it was accepted here that the courts may rely (to some extent) on a number of other sentencing justifications, particularly crime prevention through rehabilitation, deterrence and incapacitation. The thesis finds that only a small number of factors individually appear to affect the sentencing decision. In other cases, a number of factors work together to increase the seriousness of the offence and consequently inform the sentencing decision. The thesis also finds that whilst proportionality considerations may dominate the sentencing decisions in some cases, in others the courts appear to have high regard to the need to prevent crime, particularly where an offender has a demonstrated pattern of offending due to a drug addiction. Whilst in some cases these crime reduction aims may be used within the confines of proportionality, the courts’ desire to prevent crime may eclipse proportionality constraints, ultimately leading to an apparently disproportionate sentence.
|
20 |
Identity Theft: Simple Guide to Protecting YourselfWhitmer, Evelyn, Block, Linda 01 1900 (has links)
3 pp. / The publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
|
Page generated in 0.038 seconds