• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 878
  • 313
  • 139
  • 86
  • 49
  • 47
  • 22
  • 19
  • 19
  • 12
  • 11
  • 10
  • 10
  • 10
  • 10
  • Tagged with
  • 1838
  • 405
  • 379
  • 336
  • 336
  • 299
  • 291
  • 280
  • 239
  • 231
  • 201
  • 196
  • 168
  • 165
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

A case study of corporate crime control in Hong Kong toys and children's products safety control /

Kwan, Yee-wan, Elsa. January 1994 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1994. / Includes bibliographical references (leaves 91-94) Also available in print.
132

Sexual violence against women in Hong Kong socio-structural & cultural perspective /

Lee, Pik-kuen, Anne. January 1994 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1994. / Includes bibliographical references. Also available in print.
133

Elderly victimization paradox of fear /

Chiu, Ka-cheung. January 1996 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1996. / Includes bibliographical references (leaves 65-66) Also available in print.
134

Using cultural perspective to study teenage computer crime

Young, Lap-ping, John. January 2002 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 2002. / Includes bibliographical references. Also available in print.
135

Judging the hate crime victim law school student perceptions and the effects of individual and law school factors /

Lee, Jenifer Ann. January 2005 (has links)
Thesis (Ph. D.)--Indiana University of Pennsylvania, 2005. / Title from PDF title page (viewed Oct. 10, 2006). Includes bibliographical references (p. 245-258).
136

Applicability of clustering to cyber intrusion detection /

Hendry, Gilbert R. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 63-68).
137

VTAC : virtual terrain assisted impact assessment for cyber attacks /

Argauer, Brian John. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 96-98).
138

Slachtoffers van delicten : een onderzoek naar verborgen criminaliteit /

Fiselier, Johannes Paulus Stephanus. January 1978 (has links)
Proefschrift--Rechtsgeleerdheid--Nijmegen, 1978. / Résumé en anglais. Bibliogr. p. 237-249.
139

A comparison of open source and proprietary digital forensic software

Sonnekus, Michael Hendrik January 2015 (has links)
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether these tools could complement one another. The tools were tested with regards to their capabilities to make and analyse digital forensic images in a forensically sound manner. The tests were carried out on each media type after deleting data from the media, and then repeated after formatting the media. The results of the experiments performed demonstrate that both proprietary and open source computer forensic tools have superior capabilities in different scenarios, and that the toolsets can be used to validate and complement one another. The implication of these findings is that investigators have an affordable means of validating their findings and are able to more effectively investigate digital media.
140

Theft by corporate controllers

Smukler, Elana 01 1900 (has links)
The pillaging of companies by those who control them is becoming a common occurence in South Africa. The problem arises where those in control of a company are its sole shareholders and the property they are charged with stealing, though not legally belonging to them, is vested in an entity which itself belongs to them. One defence is that there can be no theft where the company consents to the appropriation of its funds. It is argued that a theft is committed only where all the criminal elements of the crime of theft are satisfied, notwithstanding the consent, or absence thereof, by the company. Case law indicates that a conviction depends on the : solvency or insolvency of the company; degree of control and victim of the appropriation. It is submitted that it is inappropriate to base a conviction on these criteria. All abuses of the corporate structure should be punished. / Mercantile Law / LL. M.

Page generated in 0.0402 seconds