131 |
A case study of corporate crime control in Hong Kong toys and children's products safety control /Kwan, Yee-wan, Elsa. January 1994 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1994. / Includes bibliographical references (leaves 91-94) Also available in print.
|
132 |
Sexual violence against women in Hong Kong socio-structural & cultural perspective /Lee, Pik-kuen, Anne. January 1994 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1994. / Includes bibliographical references. Also available in print.
|
133 |
Elderly victimization paradox of fear /Chiu, Ka-cheung. January 1996 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1996. / Includes bibliographical references (leaves 65-66) Also available in print.
|
134 |
Using cultural perspective to study teenage computer crimeYoung, Lap-ping, John. January 2002 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 2002. / Includes bibliographical references. Also available in print.
|
135 |
Judging the hate crime victim law school student perceptions and the effects of individual and law school factors /Lee, Jenifer Ann. January 2005 (has links)
Thesis (Ph. D.)--Indiana University of Pennsylvania, 2005. / Title from PDF title page (viewed Oct. 10, 2006). Includes bibliographical references (p. 245-258).
|
136 |
Applicability of clustering to cyber intrusion detection /Hendry, Gilbert R. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 63-68).
|
137 |
VTAC : virtual terrain assisted impact assessment for cyber attacks /Argauer, Brian John. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 96-98).
|
138 |
Slachtoffers van delicten : een onderzoek naar verborgen criminaliteit /Fiselier, Johannes Paulus Stephanus. January 1978 (has links)
Proefschrift--Rechtsgeleerdheid--Nijmegen, 1978. / Résumé en anglais. Bibliogr. p. 237-249.
|
139 |
A comparison of open source and proprietary digital forensic softwareSonnekus, Michael Hendrik January 2015 (has links)
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether these tools could complement one another. The tools were tested with regards to their capabilities to make and analyse digital forensic images in a forensically sound manner. The tests were carried out on each media type after deleting data from the media, and then repeated after formatting the media. The results of the experiments performed demonstrate that both proprietary and open source computer forensic tools have superior capabilities in different scenarios, and that the toolsets can be used to validate and complement one another. The implication of these findings is that investigators have an affordable means of validating their findings and are able to more effectively investigate digital media.
|
140 |
Theft by corporate controllersSmukler, Elana 01 1900 (has links)
The pillaging of companies by those who control them is becoming a common
occurence in South Africa. The problem arises where those in control of a
company are its sole shareholders and the property they are charged with
stealing, though not legally belonging to them, is vested in an entity which itself
belongs to them. One defence is that there can be no theft where the
company consents to the appropriation of its funds. It is argued that a theft
is committed only where all the criminal elements of the crime of theft are
satisfied, notwithstanding the consent, or absence thereof, by the company.
Case law indicates that a conviction depends on the : solvency or insolvency
of the company; degree of control and victim of the appropriation. It is
submitted that it is inappropriate to base a conviction on these criteria. All
abuses of the corporate structure should be punished. / Mercantile Law / LL. M.
|
Page generated in 0.0402 seconds