To see the other types of publications on this topic, follow the link: Commercial criminals.

Journal articles on the topic 'Commercial criminals'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Commercial criminals.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ofori, Nyarko Daniel, and Ayettey Benjamin Obido. "Prostitution; An Avenue for Criminal Activities, the Case of Pokuase in Accra-Ghana." International Journal of Research and Innovation in Social Science VIII, IIIS (2024): 2723–31. http://dx.doi.org/10.47772/ijriss.2024.803200s.

Full text
Abstract:
Commercial sex work and commercial sex workers face high level of discrimination and stigmatisation where ever they find themselves. The discrimination and stigmatization against commercial sex workers has made certain criminals and criminal acts to feed on commercial sex work and commercial sex joints to thrive. This research was conducted in Pokuase a suburb of the Ga North Municipality in Accra, Ghana. The objective of the researchers was to identify certain criminal activities that thrive or feed on commercial sex work or commercial sex joints. The researchers used qualitative research met
APA, Harvard, Vancouver, ISO, and other styles
2

Kpae, Dr Gbenemene. "UNEMPLOYMENT, COMMERCIAL MOTORCYCLE AND CRIME IN NIGERIA." Journal of Advance Research in Social Science and Humanities (ISSN:2208-2387) 9, no. 8 (2023): 20–24. http://dx.doi.org/10.53555/nnssh.v9i8.1730.

Full text
Abstract:
Employment in Nigerian is pervasive and is further compound by the present economic recession in which many companies have downsized and increasing the number of unemployed. r millions of jobless and unskilled Nigerians. Driven by the hash economic climate many unemployed and unskilled Nigerians particularly youths have seen riding commercial motorcycle as a source of survival. Despite providing daily means for earning a living for many unemployed people, motorbikes have also become an instrument for committing crimes by many youths with high propensity for criminal behaviour. In many urban an
APA, Harvard, Vancouver, ISO, and other styles
3

Dr., Gbenemene Kpae, and Eric Adishi Dr. "Unemployment, Commercial Motorcycle and Crime in Nigeria." International Journal of Trend in Scientific Research and Development 1, no. 6 (2017): 182–86. https://doi.org/10.31142/ijtsrd2510.

Full text
Abstract:
Employment in Nigerian is pervasive and is further compound by the present economic recession in which many companies have downsized and increasing the number of unemployed. r millions of jobless and unskilled Nigerians. Driven by the hash economic climate many unemployed and unskilled Nigerians particularly youths have seen riding commercial motorcycle as a source of survival. Despite providing daily means for earning a living for many unemployed people, motorbikes have also become an instrument for committing crimes by many youths with high propensity for criminal behaviour. In many urban an
APA, Harvard, Vancouver, ISO, and other styles
4

Mastrobuoni, Giovanni, and Emily Owens. "Strategic Cops and Robbers?" Journal of Institutional and Theoretical Economics 181, no. 1 (2025): 163–86. https://doi.org/10.1628/jite-2025-0017.

Full text
Abstract:
We propose a new framework to investigate whether criminals exhibit strategic behavior in response to the criminal law and their enforcement. Unique data on commercial robberies in Milan allow us to examine the decisions robbers make regarding weapon choice, number of accomplices, and the type of business targeted. Our analysis explores the relationship between these decisions, the expected return from the robbery, and the probability of arrest, considering the constraints imposed by Italian law, which prescribes differential punishments based on certain criminal choices. We find some evidence
APA, Harvard, Vancouver, ISO, and other styles
5

Trost, Jennifer. "The Impostor Rule and Identity Theft in America." Law and History Review 35, no. 2 (2017): 433–59. http://dx.doi.org/10.1017/s0738248017000074.

Full text
Abstract:
Impersonation and then identity theft in America emerged in the legal space between a civil system with a high tolerance for market risk and losses incurred by impostors, and a later-developing criminal system preoccupied with fraud or forgery against the government. Negotiable instruments, generally paper checks, borrowed from seventeenth-century England, enabled a geographically far-flung commercial system of paper-based but impersonal exchanges at a time before widespread availability of centrally-issued currency or regulated banks. By assigning loss rather than catching criminals, the “imp
APA, Harvard, Vancouver, ISO, and other styles
6

Dale, Youngbee. "Visa fraud in the commercial sex market in the United States: an overview." Dignity: a journal of analysis of exploitation and violence 6, no. 1 (2021): A1. https://doi.org/10.23860/dignity.2021.06.01.01.

Full text
Abstract:
This paper describes various fraudulent visas used by criminals operating in the U.S. sex market. Studies show that many foreign women exploited through commercial sex rely on visa brokers to enter the U.S. However, scholars have not investigated various visa brokers and the techniques they use to bring foreign women into U.S. prostitution as a whole. Therefore, this paper aims to provide an overview of the different types of fraudulent visas and criminal techniques used in the U.S. sex market. In doing so, this paper relies on both primary and secondary sources, such as interviews with both s
APA, Harvard, Vancouver, ISO, and other styles
7

Ari Sudewo, Fajar. "Formulasi Kebijakan Kriminal Dalam Menjerat Pelaku Pengguna Jasa Prostitusi Online." Diktum: Jurnal Ilmu Hukum 10, no. 2 (2023): 248–62. http://dx.doi.org/10.24905/diktum.v10i2.117.

Full text
Abstract:
The phenomenon of online prostitution has become news viaral lately as the arrest of both artists, and ordinary people, but the law has not regulated how to ensnare users of online prostitution, for that it takes a criminal policy oriented in ensnaring all individuals involved in online prostitution. The problem in writing this Journal is (a) Ideal law enforcement as a criminal policy step in ensnaring online prostitution service users in Bandar Lampung City, (b) efforts to sanction criminals to perpetrators of online prostitution service users in criminal law policy? The research uses an empi
APA, Harvard, Vancouver, ISO, and other styles
8

Magobotiti, CD. "An assessment of sentencing approaches to persons convicted of white-collar crime in South Africa." Journal for Juridical Science 46, no. 2 (2021): 101–18. http://dx.doi.org/10.18820/24150517/jjs46.i2.5.

Full text
Abstract:
Assessing court sentencing approaches to persons convicted of white-collar crime is a complex task. For the purposes of this article, this research task involved assessing the appropriateness of sentences imposed within the proportionality principle during the period 2016 to 2021 in South Africa. This further involved the empirical use of both qualitative and quantitative methodologies, in order to determine how commercial courts – in this case, the Bellville Commercial (Regional) Court – impose a sentence on white-collar criminals. The article establishes that, in South Africa, categories of
APA, Harvard, Vancouver, ISO, and other styles
9

Ashish Sharma. "IMPACTS OF CYBER CRIME ON INTERNET BANKING: A STUDY." Journal of Advanced Zoology 44, no. 2 (2023): 325–34. http://dx.doi.org/10.17762/jaz.v44i2.1280.

Full text
Abstract:
Internet banking, often called e-banking, is a service that make use of information and communication technology. Due to flexibility and convenience internet banking is growing more and more popular. Computer criminals attempts to obtain unauthorized access to the data of various sectors including financial and commercial sectors in order to engage in criminal activity. As a consequence, while using Internet banking and related services, users are always concerned for their security. Here security doesn’t mean physical security of the person rather it means security of financial information.&#
APA, Harvard, Vancouver, ISO, and other styles
10

Ancrum, Craig, and James Treadwell. "Beyond ghosts, gangs and good sorts: Commercial cannabis cultivation and illicit enterprise in England’s disadvantaged inner cities." Crime, Media, Culture: An International Journal 13, no. 1 (2016): 69–84. http://dx.doi.org/10.1177/1741659016646414.

Full text
Abstract:
This article focuses on the commercial cultivation of cannabis in England. Based on extensive ethnographic fieldwork with organised crime groups in disadvantaged locales, we argue that the rapid growth of cannabis cultivation is not the preserve of ‘ghosts, gangs and good sorts’. Rather, these new markets reflect significant socio-cultural and technological transformations and the involvement of independent entrepreneurial criminals who, for the most part, come from impoverished neighbourhoods that have experienced, in recent years, a significant decline in legitimate job opportunities. This a
APA, Harvard, Vancouver, ISO, and other styles
11

Karandashev, Gleb V. "“NIGHT THUGS MAKE YOU TALK ABOUT YOURSELF AGAINˮ: SOCIO-CULTURAL FEATURES OF PROFESSIONAL CRIME IN YAROSLAVL IN THE LATE XIX - EARLY XX CENTURIES (BASED ON THE MATERIALS OF THE PERIODICAL PRESS)". Vestnik of Kostroma State University 28, № 4 (2023): 27–33. http://dx.doi.org/10.34216/1998-0817-2022-28-4-27-33.

Full text
Abstract:
The paper highlights the socio–cultural aspects of professional crime reflected in the regional press of the late XIX - early XX centuries. The author examines various forms of criminal activity and offenses on the territory of Yaroslavl. The main type of crimes of that time were crimes against property. There were four categories of professional criminals in Yaroslavl: robbers, professional thieves, swindlers, and vagrants - professional beggars. The most common were thefts from households and commercial establishments. Despite the sacrilege, churches became a regular place of embezzlement. F
APA, Harvard, Vancouver, ISO, and other styles
12

Kleymenov, Mikhail Petrovich, Ivan Mikhailovich Kleymenov, and Roman Vadimovich Pustovit. "PRACTICE OF PUNISHMENT FOR CORRUPTION CRIMES." Law Enforcement Review 2, no. 2 (2018): 70–79. http://dx.doi.org/10.24147/2542-1514.2018.2(2).70-79.

Full text
Abstract:
The subject. The central element in combating corruption is punitive practice. The whole history of mankind testifies that corruption can be restrained only by effective application of criminal punishment.The purpose of the article is to show the practice of assigning criminal punishment for cor-ruption crimes of various kinds.The description of methodology. The authors use the conception criminally-legal response. The following characteristics of the criminal-legal response are distinguished: lack of response; very weak response – the number of convicts does not exceed 10; weak response – the
APA, Harvard, Vancouver, ISO, and other styles
13

Ladoja, Oreoluwa, CIarb, Tracey Heywood, et al. "EXAMINING THE LINK BETWEEN JUVENILE IDENTITY THEFT AND THE RISING DEMAND FOR PRIVATE SECURITY SERVICES." International Journal of Education and Social Science Research 08, no. 03 (2025): 481–86. https://doi.org/10.37500/ijessr.2025.8333.

Full text
Abstract:
This study examines the expanding relationship between the need for private protection services and juvenile identity theft. The investigation uses regular activity theory to explore how motivated criminals take advantage of technological weaknesses without effective guardianship. The study emphasizes how common juvenile cybercrime is, how it affects victims, and how it affects commercial security companies, identity theft committed by juveniles, and private security services. In addition to discussing trends in juvenile cybercrime, variables that influence their participation, and how these c
APA, Harvard, Vancouver, ISO, and other styles
14

Dr Aftab Ahmed Malik, Dr. Mujtaba Asad, and Dr. Waqar Azeem. "The Detection and Control over the offences of White Collar Crimes, Frauds and Hacking of information, by using effectively the relevant Software and Electronic Devices." International Journal for Electronic Crime Investigation 7, no. 1 (2023): 5–12. http://dx.doi.org/10.54692/ijeci.2023.0701124.

Full text
Abstract:
In both developed and emerging nations, fraud, white-collar crime, and malpractices in small and medium-sized businesses, banking, and other sectors are on the rise. The criminals are carrying out their fraud-related offenses by using the most up-to-date information technology structures and similar electronic media to create unjust loss and harm in the fields of white-collar crimes, banking, business, and to persons. The goal of this research paper is to make these businesses understand the need of utilizing the most up-to-date, trustworthy, and legitimate software and the necessity of making
APA, Harvard, Vancouver, ISO, and other styles
15

Gallagher, John James. "The Application of Strict Criminal Liabilities to the Spillage of Oil; The Practical Impact on Effective Spill Response." International Oil Spill Conference Proceedings 2003, no. 1 (2003): 615–20. http://dx.doi.org/10.7901/2169-3358-2003-1-615.

Full text
Abstract:
ABSTRACT In spite of the marked success of the Federal Water Pollution Control Act (FWPCA – 33 USC 1251 et seq) and subsequent amendments in restoring and protecting our waterways, the Department of Justice (DOJ) has of late increasingly resorted to unrelated law to inject the concept of strict criminal liability for accidental spillage of oil. The application of strict liability for the spillage of oil can engender criminal penalties for accidental, unintentional spills in the same manner as if the spill was a result of an intentional, purposeful breach of the law. This paper describes the im
APA, Harvard, Vancouver, ISO, and other styles
16

Zvegintseva, Irina A. "The story of one crime: in life, in literature and in cinema." Journal of Flm Arts and Film Studies 11, no. 3 (2019): 128–37. http://dx.doi.org/10.17816/vgik113128-137.

Full text
Abstract:
Today, the name of the New Zealand filmmaker Peter Jackson is known throughout the world. His films The Lord of the Rings and The Hobbit received many awards, were a major commercial success and conquered millions of viewers' hearts, including the admirers of J. R. R. Tolkien, who followed the screen adventures of their favorite literary characters with bated breath. However, connoisseurs of cinema had closely followed the work of Jackson for many years before the films' release, for his early films above all, Heavenly Creatures, based on a monstrous real crime impressed by the complexity of c
APA, Harvard, Vancouver, ISO, and other styles
17

Chukwu, Kenechukwu Origin, and Samuel Rapuluchukwu Molokwu. "Effects of Digital Banking on The Performance of Commercial Banks in Nigeria 2010 -2019." INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY RESEARCH AND ANALYSIS 05, no. 01 (2022): 133–48. https://doi.org/10.47191/ijmra/v5-i1-18.

Full text
Abstract:
In this study, the effect of digital banking on the performance of Commercial Banks was examined from 2010 to 2019. The study applied the Autoregressive Distributive Lag (ARDL) framework to examine the relationship between point of sales machine (POSG), Banking Transactions made through unstructured supplementary service data (USSDG), Web banking (WEBG) and Return on Assets (ROA) of commercial banks in Nigeria. The data were obtained from the statistical bulletins of the Central Bank of Nigeria (CBN) and annual reports of Nigeria Deposit Insurance Corporation (NDIC). The result of the analysis
APA, Harvard, Vancouver, ISO, and other styles
18

Minampati, Venkat Ram Reddy, and Jyoti Singh. "Cyber Crime-Diffusion, Effects, and Framework towards More Secure Cyber Security Network Governance in India 'What is illegal offline is illegal online'." Liberal Studies 8 (1) (April 15, 2023): 19–26. https://doi.org/10.5281/zenodo.8168045.

Full text
Abstract:
The use of computers and other information communications technology (ICT) has changed the "traditional" types of crimes and its reach, with risks extending to many aspects of social life, including financial transactions, sexual offences, harassment and threat of attack, commercial property damage, and disorder. The terms "cybercrime" and "cyber-enabled crime" are used to refer to two different but connected criminal actions. Cyber-criminals have access to opportunities online. Cyber-dependent crimes are those that require the use of a computer, computer systems,
APA, Harvard, Vancouver, ISO, and other styles
19

Parent, Georges-André. "Presse et corps policiers : complicité et conflit." Criminologie 20, no. 1 (2005): 99–120. http://dx.doi.org/10.7202/017248ar.

Full text
Abstract:
The literature abounds with studies showing the cultural gap and the hostility that exists between journalists and the police. During the 19th century in the United States, however, a complicity eminently profitable for both was rapidly established between constables and reporters for the first penny newspapers. The confrontations and mass rallies of the 60' s saw the role of journalists change to become no longer the servile and docile distributors of a particular image of crime, the criminal and police work. Journalists suddenly found themselves on the side of the “criminals”, facing the tru
APA, Harvard, Vancouver, ISO, and other styles
20

Sarumi, J. A. "Cyber-Crime and Cyber Security Perception in Nigeria." Advances in Multidisciplinary and scientific Research Journal Publication 8, no. 1 (2022): 13–22. http://dx.doi.org/10.22624/aims/bhi/v8n1p2.

Full text
Abstract:
As the Internet came into widespread commercial use, the nature of computer crimes began to shift. ‘While in some crimes, one component of the crime may have been committed using an electronic instrument, in other crimes, the crime as a whole is committed in the online or electronic environment. These crimes, known as cybercrimes, generally occur in the virtual community of the Internet or in cyberspace. As a result of this, all innocent internet users should inculcate the habit of continuously updating their knowledge about the ever changing nature of information technologies. We explore the
APA, Harvard, Vancouver, ISO, and other styles
21

Харченко, Олег Витальевич. "Countering Industrial Espionage as a Threat to Economic Security: Criminological Study." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 2 (June 15, 2022): 18–24. http://dx.doi.org/10.26163/gief.2022.51.76.003.

Full text
Abstract:
Рассмотрены отдельные проблемы, связанные с промышленным шпионажем как угрозой экономической безопасности. На основе сравнительного анализа основных статистических данных о состоянии преступлений в сфере предпринимательской деятельности за 2020-2021 гг. и судебной практики 2017-2020 гг. в России сформулированы основные проблемы, возникающие при предупреждении преступлений, предусмотренных ст. 183 УК РФ («Незаконные получение и разглашение сведений, составляющих коммерческую, налоговую или банковскую тайну»). К числу данных проблем относятся: высокий уровень латентности данного вида преступлени
APA, Harvard, Vancouver, ISO, and other styles
22

Smith, Robert. "Documenting the UK “Black Fish Scandal” as a case study of criminal entrepreneurship." International Journal of Sociology and Social Policy 35, no. 3/4 (2015): 199–221. http://dx.doi.org/10.1108/ijssp-02-2014-0018.

Full text
Abstract:
Purpose – The purpose of this paper is to consider the industrial exploitation of fishing quotas as a case of organized criminal entrepreneurship. Seldom is consideration given to the existence of informal and criminal entrepreneurship within the fishing industry. Consequentially, this case charts the “Black Fish Scandal” in the UK which saw the flouting of regulations and quotas on a commercial scale netting the protagonists £63 million through the illegal landing of undeclared fish. Design/methodology/approach – The case study underpinning this paper is constructed using documentary research
APA, Harvard, Vancouver, ISO, and other styles
23

Colbran, Marianne. "Thief-Takers and Rule-Breakers: Why Television Cop Shows Can Never Tell the “Truth” about Policing." Journal of Aesthetic Education 57, no. 3 (2023): 87–106. http://dx.doi.org/10.5406/15437809.57.3.06.

Full text
Abstract:
Abstract For many people, the media is the main source of their knowledge and understanding about policing and crime. As a result, a common thread running through content analysis of television police shows is the gap between the “reality” of police work, crime, criminals, and the justice system and the picture painted by media representations. I argue, however, that all representations of social reality are partial and that commercial imperatives, working processes, ideological frames of the makers, and format of individual shows shape and constrain the stories told. Given that police shows c
APA, Harvard, Vancouver, ISO, and other styles
24

Nedilko, Y. V. "DOCTRINE OF ELECTRONIC EVIDENCE IN CRIMINAL PROCEEDINGS: NATIONAL FEATURES AND WORLD TRENDS." Constitutional State, no. 57 (April 15, 2025): 254–62. https://doi.org/10.18524/2411-2054.2025.57.325402.

Full text
Abstract:
The article is devoted to the study of the place and photographs of electronic evidence in criminal proceedings. It is noted that with the advent of information and computer technology (smartphones, tablets, laptops, etc.), which criminals began to use for their illegal purposes, a new type of evidence began to appear – electronic evidence. Among domestic scientists there is no unity of opinion on the definition of the concept, place and electronic evidence in criminal proceedings. This is due not only to the lack of regulatory consolidation of electronic evidence in the Criminal Procedure Cod
APA, Harvard, Vancouver, ISO, and other styles
25

Zavydniak, I. O. "ESTABLISHMENT AND DEVELOPMENT OF LEGAL REGULATION OF INTERNATIONAL COOPERATION IN THE SPHERE OF CRIMINAL PROCEDURE." Actual problems of native jurisprudence 5, no. 5 (2021): 81–86. http://dx.doi.org/10.15421/392203.

Full text
Abstract:
The article examines the problems of the formation and development of the main institutions of international cooperation in the field of criminal procedure. The doctrinal approaches and norms of the first international treaties in this area are analyzed. The first institutions and directions of international cooperation in the field of criminal procedure are outlined, their specificity and features are revealed. It is noted that the first legal institution in the field of international cooperation, which later became directly related to the sphere of criminal procedure, was the institution of
APA, Harvard, Vancouver, ISO, and other styles
26

Shi, Jianwei, Rui Liu, Hua Jiang, et al. "Moving towards a better path? A mixed-method examination of China’s reforms to remedy medical corruption from pharmaceutical firms." BMJ Open 8, no. 2 (2018): e018513. http://dx.doi.org/10.1136/bmjopen-2017-018513.

Full text
Abstract:
ObjectivesFew studies have systematically examined the effects of the existing regulations for alleviating corruption in China. This study assesses the effectiveness of China’s reforms to curb medical corruption.MethodsWe used mixed methods for the evaluation of existing countermeasures. First, qualitative informant interviews based on the Donabedian model were conducted to obtain experts’ evaluation of various kinds of countermeasures. Second, using data from ‘China Judgements Online’, we analysed the trend of occurrence and the characteristics of the medical corruption cases in recent years
APA, Harvard, Vancouver, ISO, and other styles
27

Moss, Eloise. "“How I Had Liked This Villain! How I Had Admired Him!”: A. J. Raffles and the Burglar as British Icon, 1898–1939." Journal of British Studies 53, no. 1 (2014): 136–61. http://dx.doi.org/10.1017/jbr.2013.209.

Full text
Abstract:
AbstractThis article analyzes the literary, theatrical, and film versions of E. W. Hornung's fictional “gentleman” burglar Raffles produced between 1898 and 1939. It argues that the character functioned as a nexus for the articulation of a pleasure culture surrounding burglary, highlighting how approbatory and sexualized versions of burglars pervaded popular and official discourse in Britain and, through the character's commercial success, throughout Europe and America. Depictions of Raffles's triumphs over law and order invited successive audiences to vicariously test, and transgress, the leg
APA, Harvard, Vancouver, ISO, and other styles
28

Rugo, Alessio, Claudio A. Ardagna, and Nabil El Ioini. "A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis." ACM Computing Surveys 55, no. 1 (2023): 1–35. http://dx.doi.org/10.1145/3485272.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial delivery. This rise in popularity, however, is causing an increasing interest from criminals, making UAVs the target of new attacks. To fully characterize the current UAV cybersecurity landscape, we perform a complete literature review, digging into drone security historic facts and scientific studies on the matter, reviewing specialized arti
APA, Harvard, Vancouver, ISO, and other styles
29

Erlihson, Irina M. "THE NEWGATE CALENDAR: PCHYCOLOGICAL RECONSTRUCTION OF ENGLISH CRIMINAL BIOGRAPHY OT THE 18TH CENTURY." Vestnik Tomskogo gosudarstvennogo universiteta. Kul'turologiya i iskusstvovedenie, no. 43 (2021): 166–78. http://dx.doi.org/10.17223/22220836/43/13.

Full text
Abstract:
The author of the article refers to one of the intellectual aspects of the genesis of English penitentiary reforms of the 18th century. The progressive increase in crime rate, which English society faced in the 18th century, became a popular trend in social discourse, being left off “board” of historical penology that developed till the middle of the 20th century in the line of the normativism approach. Historiographic schools traditionally treated the evolution of English criminal justice system of the 18th century as the history of sanctions and led complicated social processes to forming se
APA, Harvard, Vancouver, ISO, and other styles
30

Chernova, E. V., P. N. Polezhaev, A. E. Shukhman, Yu A. Ushakov, I. P. Bolodurina, and N. F. Bakhareva. "Security event data collection and analysis in large corporate networks." Information Technology and Nanotechnology, no. 2416 (2019): 233–41. http://dx.doi.org/10.18287/1613-0073-2019-2416-233-241.

Full text
Abstract:
Every year computer networks become more complex, which directly affects the provision of a high level of information security. Different commercial services, critical systems, and information resources prevailing in such networks are profitable targets for terrorists, cyber-spies, and criminals. The consequences range from the theft of strategic, highly valued intellectual property and direct financial losses to significant damages to a brand and customer trust. Attackers have the advantage in complex computer networks – it is easier to hide their tracks. The detection and identification of s
APA, Harvard, Vancouver, ISO, and other styles
31

Woods, Jason, Jeffrey Carter, Kathe Conlon, Carl Flores, and Randy Kearns. "721 The Rising Use of Fire as a Weapon." Journal of Burn Care & Research 44, Supplement_2 (2023): S138. http://dx.doi.org/10.1093/jbcr/irad045.195.

Full text
Abstract:
Abstract Introduction Disaster planning and preparedness for a Burn Mass Causality Incident (BMCI) must consider both worst-case scenarios as well as most likely events that could strain a burn center (BC) resources. This study evaluates the growing threat of utilizing fire as a weapon for terrorist attacks and criminal acts in the United States. Methods Statistics regarding the use of fire as a weapon over a 2-year period were reviewed and summarized along with a review of significant events over 30 years. In addition, data regarding the type of weapon used in these attacks, intended target,
APA, Harvard, Vancouver, ISO, and other styles
32

Sarumi, J. A., F. O. Adelodun, and O. B. Longe. "A Theoretical Perspective on the Effect of Communication on Cybercrimes in Nigeria." Advances in Multidisciplinary and scientific Research Journal Publication 7, no. 2 (2021): 69–78. http://dx.doi.org/10.22624/aims/sij/v7n1p5.

Full text
Abstract:
As the Internet came into widespread commercial use, the nature of computer crimes began to shift. ‘While in some crimes, one component of the crime may have been committed using an electronic instrument, in other crimes, the crime as a whole is committed in the online or electronic environment. These crimes, known as cybercrimes, generally occur in the virtual community of the Internet or in cyberspace. As a result of this, all innocent internet users should inculcate the habit of continuously updating their knowledge about the ever changing nature of information technologies. This will enabl
APA, Harvard, Vancouver, ISO, and other styles
33

Ghizlane, FERRASSI. "La responsabilité pénale des sociétés commerciales." Revue Droit & Société 1, no. 2 (2021): 38–50. https://doi.org/10.5281/zenodo.4702953.

Full text
Abstract:
<strong><em>R&eacute;sum&eacute; </em></strong> A l&rsquo;exception de l&rsquo;Etat, les personnes morales sont reconnues comme des auteurs, ou complices des infractions commises, pour leur compte, par leurs organes ou repr&eacute;sentants. Si le code p&eacute;nal a pr&eacute;vu le principe de la responsabilit&eacute; p&eacute;nale des personnes morales par les dispositions de l&rsquo;article 127, la l&eacute;gislation commerciale reste domin&eacute;e par une conception individuelle de cette responsabilit&eacute;. De surplus, certaines l&eacute;gislations sp&eacute;ciales applicables aux soci&
APA, Harvard, Vancouver, ISO, and other styles
34

Антонов, Алексей Евгеньевич, and Сергей Николаевич Котарев. "Specifics of the disclosure and investigation of crimes related to illegal attacks on goods transported by rail." Расследование преступлений: проблемы и пути их решения, no. 1(35) (April 25, 2022): 120–27. http://dx.doi.org/10.54217/2411-1627.2022.35.1.015.

Full text
Abstract:
Статья посвящена процессу грузовых перевозок, осуществляемых железнодорожным транспортом, и таким характерным для рассматриваемой отрасли негативным проявлениям, как незаконные посягательства на грузы. В работе сформулировано понятие ситуационного подхода при расследовании преступлений, связанных с незаконными посягательствами на грузы, с учетом особенностей и специфики функционирования железнодорожной транспортной инфраструктуры. Предлагается классификация основных групп преступников, совершающих хищения грузов, перевозимых железнодорожным транспортом, в зависимости от их рода деятельности и
APA, Harvard, Vancouver, ISO, and other styles
35

David, Donny, and Mety Rahmawati. "PERTANGGUNGJAWABAN PIDANA PEKERJA SEKS KOMERSIAL BERDASARKAN UNDANG-UNDANG NOMOR 19 TAHUN 2016 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK (STUDI KASUS: 516/PID.SUS/2017/PN.SMN." Jurnal Hukum Adigama 1, no. 1 (2018): 1478. http://dx.doi.org/10.24912/adigama.v1i1.2219.

Full text
Abstract:
The criminal liability issue of commercial sex workers is a hot issue among lawyers in Indonesia. Responsibility for criminal pimps has been positively regulated in legislation, but for commercial sex workers it certainly has not been explicit. That is the reason why this research is raised. The problem of this research is how criminal responsibility of commercial sex worker in prostitution crime through online media pursuant to Law Number 19 Year 2016 about amendment of Law Number 11 Year 2008 About Information and Electronic Transaction (Case Study: 516 / Pid. Sus / 2017 / PN Smn This resear
APA, Harvard, Vancouver, ISO, and other styles
36

CACIUR-ANDREESCU, DANA. "The Morlachs of Dalmatia: A Glimpse on Damages Caused by Morlach Shepherds in Rural Dalmatia during the 15th and 16th Centuries." Revue des Études Sud-Est Européennes 2024, no. 62 (2024): 99–122. http://dx.doi.org/10.59277/resee.2024.05.

Full text
Abstract:
The Morlachs of Dalmatia, as referred to in Venetian documents from the 15th-century onwards, were a heterogeneous and extremely mobile population of Vlach origin. Even if they were to be found also as merchants, soldiers, thieves, criminals, immigrants, etc., the principal occupation of the late medieval Dalmatian Morlachs remained the traditional sheep breeding. When analysing this latter aspect of Morlach life, we have to keep in mind that the lifestyle of the Morlach shepherds from Dalmatia was strongly connected with that of other Vlachs communities from the Balkans. Together with this, t
APA, Harvard, Vancouver, ISO, and other styles
37

Pidnebennyi, Roman. "Comparative Analysis of Smart Lock Breaching Methods and Their Forensic Examination in Ukraine and the USA." Theory and Practice of Forensic Science and Criminalistics 38, no. 1 (2025): 182–99. https://doi.org/10.32353/khrife.1.2025.12.

Full text
Abstract:
The development of technology has contributed to changes in methods of securing residential and commercial premises. Smart locks have become an integral part of the modern security market and have attracted the attention not only of property owners and security companies but also of criminals. The key methods of smart lock hacking used in Ukraine and the USA are examined, as well as the differences in forensic examination approaches to such crimes in these countries. A comparative analysis of physical, mechanical, and digital attacks has been conducted, outlining new challenges in the forensic
APA, Harvard, Vancouver, ISO, and other styles
38

El- Murdi SAEED, Ahmed, and Mohammed Elnazer ELZAIN. "“CODIFICATION OF ELECTRONIC CONTRACTS AND IT’S EFFECTS ON THE DEVELOPMENT OF E: COMMERCE THROUGH INTERNET” ACCORDING TO PROVITIONS OF SHARIAH AND CIVIL LAW A COMPARATIVE STUDY WITH (UAE)THE ELECTRONIC FINANCIAL, COMMERCIAL TRASCATION ACT, 2002 AS A CASE STUDY." International Journal of Humanities and Educational Research 4, no. 6 (2022): 477–10. http://dx.doi.org/10.47832/2757-5403.17.26.

Full text
Abstract:
By the presentation of the proposed ongoing conference paper that bearing the title: “Codification of Electronic contracts and it’s Effects on the Development of e: Commerce through Internet” According to provisions of Shariah and Civil Law, A Comparative Study with the (UAE) Electronic Financial Commercial Transaction Act, 2002 As A Case Study: (i) The research paper intents to explore the significance of the study which in a simplee sense: (1) It is an attempt to codify the Islamic Jurisprudence of Mua’malat in the practical aspect to explanation the provitions (UAE) electronic financial com
APA, Harvard, Vancouver, ISO, and other styles
39

Александр Вячеславович, Федоров,. "Criminal liability of legal entities under the law of Vietnam." Расследование преступлений: проблемы и пути их решения, no. 3(37) (October 10, 2022): 9–27. http://dx.doi.org/10.54217/2411-1627.2022.37.3.001.

Full text
Abstract:
Статья посвящена вопросам уголовной ответственности юридических лиц в Социалистической Республике Вьетнам (СРВ), установленной Уголовным кодексом СРВ 2015 г., вступившим в силу 1 января 2018 г. Рассматривается история формирования вьетнамского законодательства об уголовной ответственности юридических лиц. Отмечается, что в настоящее время к уголовной ответственности во Вьетнаме могут быть привлечены не любые юридические лица, а только те из них, которые признаются коммерческими (корпоративными) юридическими лицами. Уголовный кодекс Вьетнама определяет преступление коммерческого юридического ли
APA, Harvard, Vancouver, ISO, and other styles
40

Ezeji, Chiji Longinus. "Emerging technologies and cyber-crime: strategies for mitigating cyber-crime and misinformation on social media and cyber systems." International Journal of Business Ecosystem & Strategy (2687-2293) 6, no. 4 (2024): 271–84. https://doi.org/10.36096/ijbes.v6i4.635.

Full text
Abstract:
Currently, numerous institutions, organisations, and governments globally have issues associated with rising technological crimes and misinformation within cyber systems, which jeopardise societal faith in these entities. A cyber-system is a framework that employs cyberspace and encompasses information infrastructures, along with individuals and other entities engaged in the system's business operations and activities. Social media platforms facilitate communication, commercial transactions, and various lucrative endeavours. Nonetheless, these sites have been utilised by cybercriminals and fra
APA, Harvard, Vancouver, ISO, and other styles
41

Androshchuk, Gennadi. "Analysis of the condition and organization of brand protection in the digital economy (based on global research materials)." Theory and Practice of Intellectual Property, no. 1 (March 29, 2024): 35–44. https://doi.org/10.33731/12024.300899.

Full text
Abstract:
Counterfeit and pirated products pose a threat to the economic security of the state, consumers, and the environment, this requires a comprehensive approach to strengthening the protection of IP rights. Counterfeiting is a massive, growing global threat. The most common problems are counterfeits, analogues/copies and gray market/parallel imports. One of the keyreasons for the growing challenge is the economic downturn, the pandemic, the growth of online marketplaces and direct-to-consumer sales. The importance of brand protection is also evidenced by the fact that trademarks (EU, national and/
APA, Harvard, Vancouver, ISO, and other styles
42

Dwipraditya, Anak Agung Bagus Indra, Anak Agung Sagung Laksmi Dewi, and Luh Putu Suryani. "Tanggung Jawab Notaris terhadap Keabsahan Tanda Tangan Para Pihak pada Perjanjian dibawah Tangan yang di Waarmerking." Jurnal Konstruksi Hukum 1, no. 2 (2020): 232–36. http://dx.doi.org/10.22225/jkh.2.1.2599.232-236.

Full text
Abstract:
Prostitution cases have emerged as a phenomenon having continuously loaded with law enforcement actions in Indonesia; the modus operandi is getting developed over time. The case that is currently trending is the case of online prostitution. Although prostitution cases have been set forth in the Criminal Code and online transaction-related legal provisions can be found in the Electronic Information and Transaction Law (ITE Law), however, online prostitution cases are in fact difficult to eradicate. This is due to the condition that only the procurers or procuresses can be held liable for the ac
APA, Harvard, Vancouver, ISO, and other styles
43

Ezeji, Chiji Longinus. "Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa." International Journal of Business Ecosystem & Strategy (2687-2293) 6, no. 5 (2024): 96–109. https://doi.org/10.36096/ijbes.v6i5.670.

Full text
Abstract:
Advancements in science and technology has resulted in substantial transformations inside society. The telecommunications sector has established cyberspace, a virtual domain for online communication, data exchange, and digital interactions. This platform enables individuals to interact and cultivate relationships worldwide, fostering a sense of proximity despite geographical separation. Nonetheless, these improvements provide concerns, since there has been an increase in cyber victimisation via cyberspace, the internet, computer networks, and online systems. Criminals are progressively utilisi
APA, Harvard, Vancouver, ISO, and other styles
44

Konan Arsène, KOUADIO. "Le parler jeune de Côte d’Ivoire ( nouchi) : bilan et perspectives d’environ quarante années d’existence." Langues & Cultures 4, no. 01 (2023): 305–17. http://dx.doi.org/10.62339/jlc.v4i01.184.

Full text
Abstract:
Cet article retrace l’évolution du nouchi. Perçu à sa naissance, au début des années 80, comme un moyen d’expression propre aux voyous, au petits délinquants, le nouchi est peu à peu sorti de son cadre argotique pour connaitre une généralisation. On le retrouve aujourd’hui dans les discours publicitaires, les discours politiques, dans la musique, en situation de classe. Le nouchi est également employé sur les marchés, dans le secteur du transport. Il faut ajouter à cela des émissions radio -télévisées, des sites internet consacrés à la promotion du nouchi, sans oublier l’intérêt croissant de l
APA, Harvard, Vancouver, ISO, and other styles
45

Morozov, Viktor I., Sergey G. Losev, and ANDREY A. CHUKREEV. "EVOLUTION OF THE CONCEPT OF AN “OFFICIAL” IN THE DOMESTIC LAW: PROBLEMS AND PROSPECTS." Tyumen State University Herald. Social, Economic, and Law Research 8, no. 1 (2022): 233–48. http://dx.doi.org/10.21684/2411-7897-2022-8-1-233-248.

Full text
Abstract:
Defining the concept and features of a “public official” and of a “person performing managerial functions in a commercial or other organization” in the Criminal Code of the Russian Federation, first of all, is important to distinguishing those offenders who will be held criminally responsible in accordance with the provisions of Chapter 23 or Chapter 30 of the Criminal Code. It is obvious that by expanding or limiting the features of a public official or a person performing managerial functions in a commercial or other organization, it is possible to influence criminal statistics. There is an
APA, Harvard, Vancouver, ISO, and other styles
46

Uchhana, Nayan, Ravi Ranjan, Shashank Sharma, Deepak Agrawal, and Anurag Punde. "Literature Review of Different Machine Learning Algorithms for Credit Card Fraud Detection." International Journal of Innovative Technology and Exploring Engineering 10, no. 6 (2021): 101–8. http://dx.doi.org/10.35940/ijitee.c8400.0410621.

Full text
Abstract:
Every year fraud cost generated in the economy is more than $4 trillion internationally. This is unsurprising, as the return on investment for fraud can be massive. Cybercrime specialists estimate that an investment of 1 million dollars into fraud or attack can net up to $100 million. Financial institutions such as commercial and investment banking operations are increasingly being targeted. And we know that the only way to fight fraud effectively is through the use of advanced technology. The answer lies in relying on advanced analytics and enterprisewide data storage capabilities that suppor
APA, Harvard, Vancouver, ISO, and other styles
47

Vadlapati, Praneeth. "AutoWatcher: a Real-Time Context-Aware Security Alert System using LLMs." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem33034.

Full text
Abstract:
Ensuring the safety of every person is a necessity. Burglaries are frequent across residential and commercial spaces. Criminals frequently use weapons and are a serious threat to the common people who are innocent. The best solution to safety is alertness. Computer Vision (CV) is frequently implemented through neural networks that use a process of training to gain abilities to detect humans. Multimodal Large Language Models (LLMs) capable of vision-based tasks are common and are capable of processing images similar to humans who use their analytical abilities. With the ongoing research, LLMs a
APA, Harvard, Vancouver, ISO, and other styles
48

Nayan, Uchhana, Ranjan Ravi, Sharma Shashank, Agrawal Deepak, and Punde Anurag. "Literature Review of Different Machine Learning Algorithms for Credit Card Fraud Detection." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 6 (2021): 101–8. https://doi.org/10.35940/ijitee.C8400.0410621.

Full text
Abstract:
Every year fraud cost generated in the economy is more than $4 trillion internationally. This is unsurprising, as the return on investment for fraud can be massive. Cybercrime specialists estimate that an investment of 1 million dollars into fraud or attack can net up to $100 million. Financial institutions such as commercial and investment banking operations are increasingly being targeted. And we know that the only way to fight fraud effectively is through the use of advanced technology. The answer lies in relying on advanced analytics and enterprisewide data storage capabilities that suppor
APA, Harvard, Vancouver, ISO, and other styles
49

Rahimi, Haroun. "Hawala as credit: recognizing how hawala supports the business climate in Afghanistan." Journal of Money Laundering Control 23, no. 1 (2020): 224–44. http://dx.doi.org/10.1108/jmlc-07-2019-0053.

Full text
Abstract:
Purpose The purpose of this study is to explore the role of hawala in supporting Afghanistan’s business climate. It illustrates the use of hawala as credit and its importance for the local merchant community. Design/methodology/approach The empirical data presented in this article draws from more than 83 semi-structured interviews with Afghan merchants, business leaders, hawaladars and judicial officials, conducted between March and August 2017 in five major provinces of Afghanistan, namely, Kabul, Herat, Balkh, Nangarhar and Kandahar. These five provinces collectively represent half of Afghan
APA, Harvard, Vancouver, ISO, and other styles
50

ATTAR SHAGUSTHA BANU and N VINOD KUMAR. "IMPLEMENTATION OF ACCURATE PERSONAL IDENTIFICATION BY USING PALM PRINT IMAGE PROCESSING." international journal of engineering technology and management sciences 7, no. 1 (2023): 120–30. http://dx.doi.org/10.46647/ijetms.2023.v07i01.020.

Full text
Abstract:
Online palmprint recognition and latent palmprint identification are two branches of palmprint studies. The former uses middle-resolution images collected by a digital camera in a well-controlled or contact-based environment with user cooperation for commercial applications and the latter uses highresolution latent palmprints collected in crime scenes for forensic investigation. However, these two branches do not cover some palmprint images which have the potential for forensic investigation. Due to the prevalence of smartphone and consumer camera, more evidence is in the form of digital image
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!