Showing 14,181 - 14,200 results of 14,519 for search '"crime"', query time: 0.17s Refine Results
  1. 14181

    WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10 by Rayman, Dafiqah Mior, Asmawi, Aziah, Mohd Ariffin, Noor Afiza

    Published 2022
    “…Criminals can utilize the web browser to perform both traditional and cybercrime by looking for information to plan and execute their crimes. As a result, while performing a digital forensic investigation, collecting more forms of digital evidence from a web browser is critical. …”
    Article
  2. 14182

    Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN) by Shaukat, Haafizah Rameeza, Hashim, Fazirulhisyam, Shaukat, Muhammad Arslan, Alezabi, Kamal Ali

    Published 2020
    “…The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. …”
    Get full text
    Article
  3. 14183

    Sexual politics in Ian McEwan's The Innocent by Abbasiyannejad, Mina, Talif, Rosli, Lalbakhsh, Pedram

    Published 2013
    “…Such understanding and demonstration of the bitter condition of women at wartime foregrounds the dire need for certain effective law to prevent sexual crimes and violence that target women during wartime.…”
    Get full text
    Article
  4. 14184

    Sexual Harassment In Academia: Economic And Legal Implications by Rahim, Rohani Abdul, Awal, Noor Aziah Mohd, Hamid, Bahiyah Abdul, Mohamed, Mohamad Hidir

    Published 2016
    “…The types of sexual harassment commonly identified are; (a) sexist remarks or behavior: (b) inappropriate and offensive, but sanction-free sexual advances: (c) solicitation of sexual activity by promise of rewards: (d) coercion of sexual activity by threat of punishment; and (e) sexual crimes. Sexual harassment may contribute to an undetermined extent to many aspects of women's employment experience, including absenteeism, turnover, productivity rates and work motivation, job dissatisfaction, and unemployment. …”
    Get full text
    Book Section
  5. 14185

    Comparative analysis of data wiping technique for android using EXT4 file system by Mat Noh, Nurhanisah, Mohamad, Kamaruddin Malik

    Published 2017
    “…They are exposed to facilitating criminal activity or otherwise being involved when crimes occur [3]. Although, these mobile devices can contain personal information including call history, text messages, e-mails, images memos, contacts, and many more. …”
    Get full text
    Book Section
  6. 14186

    The comparative study of model-based and appearance based gait recognition for leave bag behind by Zainol, Norfazilah

    Published 2018
    “…Nowadays, the increasing number of crimes and violence in the world has become a concern of modern society. …”
    Get full text
    Get full text
    Thesis
  7. 14187

    Corrupted MP4 carving using MP4-karver by Abdi, Ahmed Nur Elmi

    Published 2016
    “…The criminals use these digital devices; particularly smartphones to record crimes such as child pornography and other violent activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 14188

    Exploring challenges in cybercrime investigation and plausible solution by Baharudin, Akmal Hamdy

    Published 2020
    “…In a typical scenario, online criminals manipulate loopholes within internet applications to commit crimes. There is also an ever-changing tactic employed by online criminals to avoid being detected or captured. …”
    Get full text
    Thesis
  9. 14189

    Spatial and non-spatial factors influencing willingness to pay (WTP) for urban green spaces (UGS): a review by Nordin, Aimi Norhanani, Ling, Gabriel Hoh Teck, Tan, Mou Leong, Ho, Chin Siong, Mohd. Ali, Hishamuddin

    Published 2020
    “…As such, maintenance and management effectiveness of UGS is detrimentally affected, resulting in disused, overused spaces and thus hot spots for crimes. Therefore, public monetary contribution via taxation is suggested as an alternative to ensuring the continuity and sustainability of UGS services. …”
    Article
  10. 14190

    Forensic accountant and auditor knowledge and skills requirements for task performance fraud risk assessment in the Nigerian public sector by Popoola, Oluwatoyin Muse Johnson, Che Ahmad, Ayoib, Samsudin, Rose Shamsiah

    Published 2015
    “…Despite the Nigerian government efforts at reducing the incidence of fraud and corruption through measures, such as establishing and strengthening organs of accountability and promoting the global best corporate practices, fraud and financial crimes in the public sector continue to be on the increase. …”
    Get full text
    Article
  11. 14191

    Significant impacts on Egyptian legal system caused by Egyptian investment legislation by Elfakharani, Ashraf M. A., Abdul Rahman, Rohana

    Published 2016
    “…These amendments include providing avenues of escape of corruption and financial crimes through the reconciliations with the foreign investors who have been damaging the Egyptian economy and its citizens’ livelihoods.As the role, size, and impact of foreign investment grow worldwide. …”
    Get full text
    Article
  12. 14192

    The impacts of ethics education on future managers’ ethical decisions by Zainal Abidin, Nor Azizah, Zahrin, Zuriana

    Published 2018
    “…The rise of unethical behaviour like commercial crimes has become an issue and started gaining attention from the government, society and business. …”
    Get full text
    Article
  13. 14193

    An Analysis of the Forfeiture Regime under the Anti-Money Laundering Law by A. Rahman, Aspalella

    Published 2022
    “…Any limitations of the previous statutory legislations have been addressed and more importantly, the AMLATFPUAA introduces more powerful and innovative measures that can facilitate the recovery of illegal proceeds from money laundering and any other serious crimes. The AMLATFPUAA also provides avenue for the bona fide third parties to contest the forfeiture order. …”
    Get full text
    Get full text
    Article
  14. 14194

    Factors influencing the multinational banks’ decisions to curtail operations in russia: Does ESG matter? by Heorhiy Rohov, Oleh Kolodiziev, Svitlana Yehorycheva, Ihor Krupka, Markiian Zaplatynskyi

    Published 2024-03-01
    “…The results suggest the feasibility of improving the methodologies of ESG rating providers for accurately measuring business reactions to aggression and war crimes.…”
    Get full text
    Article
  15. 14195

    A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application by Thanikodi Manoj Kumar, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari, Kavitha Arunachalam

    Published 2021-08-01
    “…Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes. This research article details the low power high-speed hardware architectures for the efficient field programmable gate array (FPGA) implementation of the advanced encryption standard (AES) algorithm to provide data security. …”
    Get full text
    Article
  16. 14196

    Subjective and objective assessments of executive functions are independently predictive of aggressive tendencies in patients with substance use disorder by Sebastian Pichlmeier, Judith Streb, Franziska Anna Rösel, Hannah Dobler, Manuela Dudeck, Michael Fritz

    Published 2024-07-01
    “…Methods: The study included 64 patients with a diagnosed substance use disorder who were convicted according to the German Criminal Code for crimes they committed in the context of their disorder and were therefore in treatment in forensic psychiatric departments in Germany. …”
    Get full text
    Article
  17. 14197

    Functioning of a higher educational institution under force majeure circumstances: A case study of Ivan Franko National University of Lviv by Halyna Kaplenko, Inna Kulish, Olha Hrabovetska, Andrii Stasyshyn, Viktoriia Dubyk

    Published 2023-04-01
    “…The spread of the COVID-19 pandemic required the immediate organization of distance learning and, therefore, the improvement of information and technical support. russian crimes against humanity in 2022 caused an enormous wave of internal displacement of citizens. …”
    Get full text
    Article
  18. 14198

    Blood Levels of Neuropeptide 26RFa in Relation to Anxiety and Aggressive Behavior in Humans—An Exploratory Study by Henning Værøy, Saloua Takhlidjt, Yamina Cherifi, Emilie Lahaye, Nicolas Chartrel, Serguei O. Fetissov

    Published 2023-01-01
    “…For this purpose, the study included 13 prison inmates who have committed violent crimes and 19 age-matched healthy men from the general population as controls. …”
    Get full text
    Article
  19. 14199

    Um jogo educacional como ferramenta de apoio à prevenção da violência sexual infantil by Alexandre Mendonça Fava, Júlia Llorente, Adilson Vahldick, Carla Diacui Medeiros Berkenbrock

    Published 2023-12-01
    “…A razão para isso é que os agressores tendem a escolher vítimas menos propensas a resistir, tornando a educação e a capacitação das crianças uma maneira eficaz de prevenir a ocorrência de tais crimes. O artigo discute a implementação de um jogo educacional como ferramenta de pesquisa. …”
    Get full text
    Article
  20. 14200

    Educational applications of metaverse: possibilities and limitations by Bokyung Kye, Nara Han, Eunji Kim, Yeonjeong Park, Soyoung Jo

    Published 2021-12-01
    “…Some of its limitations may be weaker social connections and the possibility of privacy impingement; the commission of various crimes due to the virtual space and anonymity of the metaverse; and maladaptation to the real world for students whose identity has not been established. …”
    Get full text
    Article