• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 872
  • 313
  • 141
  • 86
  • 49
  • 47
  • 22
  • 19
  • 19
  • 12
  • 10
  • 10
  • 10
  • 10
  • 10
  • Tagged with
  • 1830
  • 403
  • 377
  • 335
  • 332
  • 298
  • 288
  • 280
  • 238
  • 229
  • 197
  • 193
  • 167
  • 164
  • 160
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Sexual violence against women in Hong Kong socio-structural & cultural perspective /

Lee, Pik-kuen, Anne. January 1994 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1994. / Includes bibliographical references. Also available in print.
132

Elderly victimization paradox of fear /

Chiu, Ka-cheung. January 1996 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1996. / Includes bibliographical references (leaves 65-66) Also available in print.
133

Using cultural perspective to study teenage computer crime

Young, Lap-ping, John. January 2002 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 2002. / Includes bibliographical references. Also available in print.
134

Judging the hate crime victim law school student perceptions and the effects of individual and law school factors /

Lee, Jenifer Ann. January 2005 (has links)
Thesis (Ph. D.)--Indiana University of Pennsylvania, 2005. / Title from PDF title page (viewed Oct. 10, 2006). Includes bibliographical references (p. 245-258).
135

Applicability of clustering to cyber intrusion detection /

Hendry, Gilbert R. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 63-68).
136

VTAC : virtual terrain assisted impact assessment for cyber attacks /

Argauer, Brian John. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 96-98).
137

Slachtoffers van delicten : een onderzoek naar verborgen criminaliteit /

Fiselier, Johannes Paulus Stephanus. January 1978 (has links)
Proefschrift--Rechtsgeleerdheid--Nijmegen, 1978. / Résumé en anglais. Bibliogr. p. 237-249.
138

A comparison of open source and proprietary digital forensic software

Sonnekus, Michael Hendrik January 2015 (has links)
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether these tools could complement one another. The tools were tested with regards to their capabilities to make and analyse digital forensic images in a forensically sound manner. The tests were carried out on each media type after deleting data from the media, and then repeated after formatting the media. The results of the experiments performed demonstrate that both proprietary and open source computer forensic tools have superior capabilities in different scenarios, and that the toolsets can be used to validate and complement one another. The implication of these findings is that investigators have an affordable means of validating their findings and are able to more effectively investigate digital media.
139

Theft by corporate controllers

Smukler, Elana 01 1900 (has links)
The pillaging of companies by those who control them is becoming a common occurence in South Africa. The problem arises where those in control of a company are its sole shareholders and the property they are charged with stealing, though not legally belonging to them, is vested in an entity which itself belongs to them. One defence is that there can be no theft where the company consents to the appropriation of its funds. It is argued that a theft is committed only where all the criminal elements of the crime of theft are satisfied, notwithstanding the consent, or absence thereof, by the company. Case law indicates that a conviction depends on the : solvency or insolvency of the company; degree of control and victim of the appropriation. It is submitted that it is inappropriate to base a conviction on these criteria. All abuses of the corporate structure should be punished. / Mercantile Law / LL. M.
140

The war criminals investigate

Schuhmacher, Jacques January 2017 (has links)
This thesis uses the war crimes investigations carried out by the Wehrmacht between 1939-1945 to explore the creation and development of the narrative which the Nazi regime constructed to justify its war of aggression, conquest, and extermination. This source has been sorely underused and provides deep insight into the regime's official narrative - a narrative which seems fundamentally at odds with its true aims and its murderous actions. It claimed that the Reich was waging a war in self-defence and for humanitarian reasons. These justifications were designed to convince both the German population and international audiences. The regime did not simply lie, however, but gathered empirical evidence which it then used selectively to legitimise the war. By reconstructing this process, the thesis aims to understand the degree to which the regime was able to make its arguments convincing. This allows us to better understand how it was possible to mobilise so many ordinary Germans to support and fight the war and, indeed, to perpetrate horrendous crimes. In particular, this thesis seeks to explore the tension between the official narrative and the Reich's own crimes, arguing that these two were not diametrically opposed, but that there was a direct justificatory link between them. Crucial in this context was the degree to which the regime could portray its criminal actions as a response to those of the enemy. In doing so, this thesis develops on a historiography which has acknowledged the importance of the regime's justificatory framework, but which has yet to study the foundations on which this was based and how it developed over the course of the war. In short, this is a study of the German narrative of victimhood which underpinned the brutal war of extermination.

Page generated in 0.0598 seconds