-
81
In Bed with an Egyptian Princess: Herodotus on Theft, Pyramids and Conquest
Published 2022-01-01Get full text
Article -
82
Crime of Theft from the Judicial Practice Point of View
Published 2018-03-01Subjects: Get full text
Article -
83
On the effect of sampling frequency on the electricity theft detection performance
Published 2022-12-01“…Abstract Electricity theft is a common problem in many countries and affects the revenue of the electricity industry significantly. …”
Get full text
Article -
84
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
85
Crime Statistics: Modeling Theft in Favour of Victims’ Choices
Published 2018-04-01“…The number of reported property thefts has dropped steeply in many European countries over the last 15 years. …”
Get full text
Article -
86
An Empirical Analysis of the Relationship between Unemployment and Theft Crimes
Published 2012-12-01“… The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. …”
Get full text
Article -
87
Juridical Study on the Criminal Acts of theft by Minors at the Surakarta
Published 2022-12-01“…The results of the study of the Juridical Study of the Criminalization Conducted by Judges Against the Crime of Theft Perpetrated by Minors in the Surakarta District Court based on Law No. 3 of 1997 concerning Juvenile Court. …”
Get full text
Article -
88
Medical Identity Theft in the Emergency Department: Awareness is Crucial
Published 2014-11-01“…Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. …”
Get full text
Article -
89
Syphoning confidence : piracy and fuel theft in Southeast Asia
Published 2015Get full text
Get full text
Commentary -
90
New consumer load prototype for electricity theft monitoring
Published 2013“…The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. …”
Get full text
Article -
91
-
92
Theft prevention using wireless security system (WSS)
Published 2008“…This paper presents a developed RFID based theft prevention system such that luxurious belongings, such as laptops which are monitored from being stolen. …”
Get full text
Conference or Workshop Item -
93
Development of GSM-Based Vehicle Anti-Theft System
Published 2006“…Vehicle theft is a universal problem. The statistic of the vehicle gets stolen or vandalized increases at an alarming rate every year. …”
Get full text
Thesis -
94
Online identity theft, security issues, and reputational damage
Published 2021“…Online identity-based theft is known to be one of the most serious and growing threats to victims, such as individuals and organizations, over the last 10 years due to the enormous economic damage these crimes have caused. …”
Article -
95
Development of car theft crime index in Peninsular Malaysia
Published 2014“…Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia.The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures.Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft.This study aims to build an index crime which is specific to vehicle theft.The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average.The results show that the two methods used for determining weights of vehicle theft index are similar.Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.…”
Conference or Workshop Item -
96
Modeling the number of car theft using Poisson regression
Published 2016“…Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates.The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. …”
Conference or Workshop Item -
97
Stealing cars : technology & society from the Model T to the Gran Torino /
Published 2014Subjects: “…Automobile theft…”
-
98
-
99
Preventing and detecting employee theft and embezzlement : a practical guide /
Published c201Subjects: “…Employee theft…”
-
100