Journal articles on the topic 'Crime management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Crime management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Johannessen, Jon-Arild. "Management by obedience: the patterns that lead to evil acts." Kybernetes 44, no. 1 (January 12, 2015): 159–70. http://dx.doi.org/10.1108/k-02-2014-0034.
Full textEck, John E. "Regulation for High-Crime Places: Theory, Evidence, and Principles." ANNALS of the American Academy of Political and Social Science 679, no. 1 (August 20, 2018): 106–20. http://dx.doi.org/10.1177/0002716218778764.
Full textPandian, Asha, Ravuru Sai Harsha, Porachenu Ravi Theja, and Tadavarthi Sai Krishna. "Crime Records Management System." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3653–56. http://dx.doi.org/10.1166/jctn.2020.9248.
Full textC, Narmada, Sangeetha K, Mr Apiekshav, Deepak K, and Gokul Krishnanu. "Crime Records Management System." International Research Journal on Advanced Science Hub 3, Special Issue ICARD 3S (March 20, 2021): 72–74. http://dx.doi.org/10.47392/irjash.2021.067.
Full textMataković, Hrvoje. "Seasonality of crime in Croatia." Tourism 68, no. 2 (June 8, 2020): 195–206. http://dx.doi.org/10.37741/t.68.2.7.
Full textShiyab, Tayil Mahmoud, Mohammad Amin Alkrisheh, and Alaa Y. Darawsheh. "Corporate governance and organized crimes: Comparative analytical study of the legislative role." Journal of Governance and Regulation 10, no. 3 (2021): 18–29. http://dx.doi.org/10.22495/jgrv10i3art2.
Full textKhrustaleva, S. P., K. S. Krivyakin, M. S. Lutsenko, and O. O. Shendrikova. "Algorithms for countering economic crimes and assessing the level of threats to economic security in the context of strategic management." Proceedings of the Voronezh State University of Engineering Technologies 81, no. 4 (February 11, 2020): 280–90. http://dx.doi.org/10.20914/2310-1202-2019-4-280-290.
Full textKhudhur, Aoumid Saeed, and Saman Abdulla Aziz. "Political Science and International Relations Department, Faculty of Law, Political Science and Management, SoranUniversity." Twejer 4, no. 1 (May 2021): 851–86. http://dx.doi.org/10.31918/twejer.2141.19.
Full textSATO, Kei. "Identity Management by Crime Victims." Annual review of sociology 2001, no. 14 (2001): 63–75. http://dx.doi.org/10.5690/kantoh.2001.63.
Full textSharma, Siddharth, Prachi Chauhan, and Deepti Singh. "CRIME MANAGEMENT SYSTEM - A REVIEW." International Journal of Engineering Applied Sciences and Technology 04, no. 12 (May 10, 2020): 554–57. http://dx.doi.org/10.33564/ijeast.2020.v04i12.100.
Full textRobinson, Neil, Crispin Dale, and Michael Evans. "Risk management and organised crime." International Journal of Business and Globalisation 13, no. 3 (2014): 287. http://dx.doi.org/10.1504/ijbg.2014.064676.
Full textJacobs, Bruce A., and Michael Cherbonneau. "Nerve Management and Crime Accomplishment." Journal of Research in Crime and Delinquency 54, no. 5 (February 17, 2017): 617–38. http://dx.doi.org/10.1177/0022427817693037.
Full textAliyu, Umar. "Computer Crime." Intellectual Archive 7, no. 6 (December 20, 2018): 28–32. http://dx.doi.org/10.32370/2018_11_4.
Full textSetiyono, Joko. "INTEGRATED POLICY MANAGEMENT OF NARCOTICS TRAFFICKING AS TRANSNATIONAL ORGANIZED CRIME IN INDONESIA." Diponegoro Law Review 5, no. 2 (October 30, 2020): 260–76. http://dx.doi.org/10.14710/dilrev.5.2.2020.260-276.
Full textRege, Aunshul, and Anita Lavorgna. "Organization, operations, and success of environmental organized crime in Italy and India: A comparative analysis." European Journal of Criminology 14, no. 2 (July 24, 2016): 160–82. http://dx.doi.org/10.1177/1477370816649627.
Full textM. Casiw, Gaypelyn. "REVISITING THE ECOLOGICAL SOLID WASTE MANAGEMENT PROGRAM IN THE SLUM AREAS OFMANILA." International Journal of Advanced Research 8, no. 10 (October 31, 2020): 694–701. http://dx.doi.org/10.21474/ijar01/11892.
Full textNovichkov, V. E. "FORECASTING IN COMBATING CRIME AND IMPROVING THE MANAGEMENT PRACTICES OF LAW ENFORCEMENT AGENCIES ON THE APPLICATION OF MEASURES OF CRIMINAL AND LEGAL IMPACT ON CRIME WITH THE CRITERIA OF THEIR EFFECTIVENESS." Proceedings of the Southwest State University 21, no. 5 (October 28, 2017): 204–11. http://dx.doi.org/10.21869/2223-1560-2017-21-5-204-211.
Full textEric, Adishi,, and Oluka, Nduka Lucas. "The Role of Extradition Treaties in Crime Management and Combating Terrorism." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 590–98. http://dx.doi.org/10.31142/ijtsrd9475.
Full textWard, Pat. "Car Crime (Crime and Society Series)." Security Journal 17, no. 1 (January 2004): 73–74. http://dx.doi.org/10.1057/palgrave.sj.8340164.
Full textURDA, Margarita N. "CONCEPT OF MIGRATION CRIME RISK MANAGEMENT." HERALD OF THE RUSSIAN LAW ACADEMY, no. 3 (2020): 57–64. http://dx.doi.org/10.33874/2072-9936-2020-0-3-57-64.
Full textGill, Martin, Chris Moon, Polly Seaman, and Vicky Turbin. "Security management and crime in hotels." International Journal of Contemporary Hospitality Management 14, no. 2 (April 2002): 58–64. http://dx.doi.org/10.1108/09596110210419237.
Full textBequai, August. "Management considerations in data crime investigations." Computer Audit Update 1996, no. 9 (September 1996): 21–24. http://dx.doi.org/10.1016/0960-2593(96)84016-x.
Full textSuryani, Dewi Ervina. "Penerapan Undang-Undang No 8 Tahun 2010 Tentang Pencegahan Dan Pemberantasan Tindak Pidana Pencucian Uang (TPPU) Terhadap Penegakan Hukum Pidana Pencucian Uang (Money Laundering) Terhadap Tindak Pidana Kehutanan (Illegal Logging)." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 19, no. 3 (August 3, 2020): 499–508. http://dx.doi.org/10.30743/jhk.v19i3.2827.
Full textEdwards, Randy R., C. Kenneth Meyer, and Stephen E. Clapham. "Violence Against Authority: Management, Policy, And Research Implications." International Journal of Management & Information Systems (IJMIS) 19, no. 2 (March 17, 2015): 69. http://dx.doi.org/10.19030/ijmis.v19i2.9195.
Full textSmuts, K. "SAHRIS: using the South African Heritage Register to report, track and monitor heritage crime." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-5/W7 (August 13, 2015): 395–402. http://dx.doi.org/10.5194/isprsarchives-xl-5-w7-395-2015.
Full textGottschalk, Petter, and Hans Solli Saether. "Management involvement in financial crime: an empirical study of white-collar crime." International Journal of Management and Enterprise Development 9, no. 1 (2010): 76. http://dx.doi.org/10.1504/ijmed.2010.035309.
Full textJamieson, Rodger, Lesley Pek Wee Land, Donald Winchester, Greg Stephens, Alex Steel, Alana Maurushat, and Rick Sarre. "Addressing identity crime in crime management information systems: Definitions, classification, and empirics." Computer Law & Security Review 28, no. 4 (August 2012): 381–95. http://dx.doi.org/10.1016/j.clsr.2012.03.013.
Full textBae Noh, Chang, and Miyang Cha. "Pattern analysis of risk situations using multi-sensor." International Journal of Engineering & Technology 7, no. 2.12 (April 3, 2018): 50. http://dx.doi.org/10.14419/ijet.v7i2.12.11034.
Full textElliott, Dominic. "Corporate Crime." Risk Management 4, no. 1 (January 2002): 72–73. http://dx.doi.org/10.1057/palgrave.rm.8240111.
Full textMoyo, Busani. "Crime, security and firm performance in South Africa." Corporate Ownership and Control 9, no. 4-2 (2012): 241–52. http://dx.doi.org/10.22495/cocv9i4c2art5.
Full textHopkins, Matt, and Dave Ingram. "Crimes Against Business: The First Scottish Business Crime Survey." Security Journal 14, no. 3 (July 2001): 43–59. http://dx.doi.org/10.1057/palgrave.sj.8340089.
Full textNowakowska-Krystman, Aneta. "Maritime Piracy as a Form of Organized Crime: A Strategic Management Approach." Connections: The Quarterly Journal 15, no. 3 (2016): 41–53. http://dx.doi.org/10.11610/connections.15.3.04.
Full textKouhbaei, Kamran. "Analysis of the Crime of Unlawful Seizure of State and Public Property." Journal of Politics and Law 9, no. 10 (November 30, 2016): 113. http://dx.doi.org/10.5539/jpl.v9n10p113.
Full textJani, Hamid Reza Mirza, and Fatemeh Mirdad. "Ominous Phenomena such as Fraud and Forgery." Asian Social Science 13, no. 7 (June 23, 2017): 10. http://dx.doi.org/10.5539/ass.v13n7p10.
Full textD'Ovidio, Rob. "Electronic Crime." Security Journal 21, no. 1-2 (January 29, 2008): 137–38. http://dx.doi.org/10.1057/palgrave.sj.8350080.
Full textGoldman, Barry, Dylan Cooper, and Tamar Kugler. "Crime and punishment." International Journal of Conflict Management 30, no. 1 (February 11, 2019): 2–23. http://dx.doi.org/10.1108/ijcma-04-2018-0055.
Full textIsmail, Chairuddin. "Strengthening Policies for Economic and Ecological Sustainability through the Enforcement of Environmental Crimes in Third World." Webology 17, no. 2 (December 21, 2020): 328–35. http://dx.doi.org/10.14704/web/v17i2/web17035.
Full textCLARKE, MICHAEL J. "CITIZENSHIP, COMMUNITY, AND THE MANAGEMENT OF CRIME." British Journal of Criminology 27, no. 4 (1987): 384–400. http://dx.doi.org/10.1093/oxfordjournals.bjc.a047689.
Full textWong, Ken. "Computer crime — Risk management and computer security." Computers & Security 4, no. 4 (December 1985): 287–95. http://dx.doi.org/10.1016/0167-4048(85)90047-1.
Full textMasurel, Enno. "SMEs and Crime." International Small Business Journal: Researching Entrepreneurship 22, no. 2 (April 2004): 197–205. http://dx.doi.org/10.1177/0266242604041314.
Full textYEUNG, DAVID W. K., YINGXUAN ZHANG, PATRICIA M. YEUNG, and DEMI MAK. "DYNAMIC GAME OF OFFENDING AND LAW ENFORCEMENT: A STOCHASTIC EXTENSION." International Game Theory Review 12, no. 04 (December 2010): 471–81. http://dx.doi.org/10.1142/s0219198910002787.
Full textHisham, Alyaa, Aya Ahmed, Mariam Khaled, Nour Abdullatif, and Sally Kassem. "Modelling of Crime Record Management System Using Unified Modeling Language." Ingénierie des systèmes d information 26, no. 4 (August 31, 2021): 365–73. http://dx.doi.org/10.18280/isi.260404.
Full textFelsenthal, Kim. "Navigating Crime." Analyses of Social Issues and Public Policy 8, no. 1 (September 19, 2008): 269–70. http://dx.doi.org/10.1111/j.1530-2415.2008.00160.x.
Full textBlumstein, Alfred. "Crime Modeling1." Operations Research 50, no. 1 (February 2002): 16–24. http://dx.doi.org/10.1287/opre.50.1.16.17794.
Full textSilva, Patrik, and Lin Li. "Urban Crime Occurrences in Association with Built Environment Characteristics: An African Case with Implications for Urban Design." Sustainability 12, no. 7 (April 10, 2020): 3056. http://dx.doi.org/10.3390/su12073056.
Full textRose, Gregory L. "Time for a Protocol on Transnational Environmental Crime?" Environmental Policy and Law 51, no. 1-2 (April 13, 2021): 75–80. http://dx.doi.org/10.3233/epl-219008.
Full textIshaya, Daniel. "COMMUNITY POLICING RELATIONS AND PARTNERSHIP AMONG LAW ENFORCEMENT IN 21ST CENTURY CRIME REGULATION, PREVENTION AND MANAGEMENT, NASARAWA STATE." International Journal of Innovative Research in Social Sciences and Strategic Management Techniques 7, no. 1 (September 3, 2020): 112–35. http://dx.doi.org/10.48028/iiprds/ijirsssmt.v7.i1.08.
Full textIvancevich, John M., Thomas N. Duening, Jacqueline A. Gilbert, and Robert Konopaske. "Deterring white-collar crime." Academy of Management Perspectives 17, no. 2 (May 2003): 114–27. http://dx.doi.org/10.5465/ame.2003.10025206.
Full textAzumah, Francess Dufie, John Onzaberigu Nachinaab, Charles Danso Sintim, and Samuel Krampah. "Crime Analysis and Conventional Policing Strategies: Evidence from a Community in the Western Region, Ghana." International Journal of Social Science Studies 7, no. 4 (June 24, 2019): 1. http://dx.doi.org/10.11114/ijsss.v7i4.4336.
Full textBarnett, Arnold. "Misapplications Reviews: Crime News." Interfaces 18, no. 3 (June 1988): 110–15. http://dx.doi.org/10.1287/inte.18.3.110.
Full text