Academic literature on the topic 'Mobile crime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile crime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile crime"

1

Sutikno, Tole. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology (IJ-ICT) 13, no. 2 (2024): 321. http://dx.doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
<p>Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic D
APA, Harvard, Vancouver, ISO, and other styles
2

Tole, Sutikno. "Mobile forensics tools and techniques for digital crime investigation: a comprehensive review." International Journal of Informatics and Communication Technology 13, no. 2 (2024): 321–32. https://doi.org/10.11591/ijict.v13i2.pp321-332.

Full text
Abstract:
Extracting and analyzing data from smartphones, IoT devices, and drones is crucial for conducting digital crime investigations. Effective cyberattack mitigation necessitates the use of advanced Android mobile forensics techniques. The investigation necessitates proficiency in manual, logical, hex dump, chip-off, and microread methodologies. This paper provides a comprehensive overview of Android mobile forensics tools and techniques for digital crime investigation, as well as their use in gathering and analyzing evidence. Forensic software tools like Cellebrite UFED, Oxygen Forensic Detective,
APA, Harvard, Vancouver, ISO, and other styles
3

Fadess, Gongolo, Medi Chipatso, and Mkandawire Mtende. "Development of mobile-based application of crime reporting and handling in Malawi police service." i-manager's Journal on Mobile Applications and Technologies 11, no. 1 (2024): 22. http://dx.doi.org/10.26634/jmt.11.1.20690.

Full text
Abstract:
Crime is increasing worldwide, and quick reporting of crimes is a very important aspect of anti-crime efforts. This problem is noticeable in Malawi, as people often refrain from reporting or sharing information due to the perceived lack of professionalism among some police officers within the security system, despite the presence of professional officers in the Malawi Police Service. With the increase in smartphone usage in Malawi, an opportunity arises to address this issue by tapping into the gap in incident reporting. Developing a mobile-based application is the proposed solution that can f
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.

Full text
Abstract:
Abstract: The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The C
APA, Harvard, Vancouver, ISO, and other styles
5

Gombiro, Cross, Mmaki Jantjies, and Nehemiah Mavetera. "A conceptual framework for detecting financial crime in mobile money transactions." Journal of Governance and Regulation 4, no. 4 (2015): 727–34. http://dx.doi.org/10.22495/jgr_v4_i4_c6_p8.

Full text
Abstract:
Mobile money has made it possible for the unbanked to access financial service to areas previous not accessibly to traditional banking systems. Africa in particular, has indeed seen a growth in use of such services owing to the high penetration of mobile phones. While traditional banking services have been well regulated and secured, mobile money services are still new and vulnerable. Also, attacks and crimes targeting the internet, new technologies and new methods of payments have become sophisticated. This scenario requires novel proactive, real time techniques and solutions to detect financ
APA, Harvard, Vancouver, ISO, and other styles
6

Dimovski, Darko. "Crime prevention through digitalization." Zbornik radova Pravnog fakulteta Nis 60, no. 91 (2021): 227–42. http://dx.doi.org/10.5937/zrpfn0-32144.

Full text
Abstract:
Common crime prevention measures have not yielded the expected results. It is important to examine the possibilities of using the latest achievements in crime prevention. One of the available options is digitalization. Starting from the definition of digitalization as the use of digital technologies to change the business model and provide new opportunities for generating income and value, the author emphasizes that digitalization can be used as a measure to prevent crime. In this regard, some solutions for preventing crime through digitalization are embodied in the use of digital currencies,
APA, Harvard, Vancouver, ISO, and other styles
7

Feng, Jiaxin, Lin Liu, Dongping Long, and Weiwei Liao. "An Examination of Spatial Differences between Migrant and Native Offenders in Committing Violent Crimes in a Large Chinese City." ISPRS International Journal of Geo-Information 8, no. 3 (2019): 119. http://dx.doi.org/10.3390/ijgi8030119.

Full text
Abstract:
Immigrants and natives are generally comparable in committing violent crimes in many Western cities. However, little is known about spatial differences between internal migrant offenders and native offenders in committing violence in contemporary urban China. To address this gap, this research aims to explore spatial variation in violent crimes committed by migrant and native offenders, and examine different effects of ambient population, crime attractors, crime generators, and offender anchor points on these crimes. Offender data, mobile phone data, and points-of-interest (POI) data are combi
APA, Harvard, Vancouver, ISO, and other styles
8

Alameri, Thamer, Ahmed Hazim Alhilali, Nabeel Salih Ali, and Jawad Kadhim Mezaal. "Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq." Journal of Intelligent Systems 31, no. 1 (2022): 726–38. http://dx.doi.org/10.1515/jisys-2022-0034.

Full text
Abstract:
Abstract Crimes are increasing in our society as a serious worldwide issue. Fast reporting of crimes is a significantly important area in anticrime. This problem is visible in Iraq as people avoid information-sharing due to the lack of trust in the security system despite some contact lines between citizens and police in Iraq. Furthermore, there has been a little empirical study in this field. We proposed a multi-approach for crime reporting and police control to address these issues. First, this study has two goals: (1) investigating the adopted method in reporting crimes to police sectors to
APA, Harvard, Vancouver, ISO, and other styles
9

신재헌 and 김상운. "A Study on Mobile Crime Prevention." Police Science Journal 9, no. 1 (2014): 123–44. http://dx.doi.org/10.16961/polips.2014.9.1.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baber, Chris, Paul Smith, Mark Butler, James Cross, and John Hunter. "Mobile technology for crime scene examination." International Journal of Human-Computer Studies 67, no. 5 (2009): 464–74. http://dx.doi.org/10.1016/j.ijhcs.2008.12.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mobile crime"

1

Stones, Elizabeth Kelly. "Mobile communications : m-crime and security." Thesis, University College London (University of London), 2017. http://discovery.ucl.ac.uk/1571072/.

Full text
Abstract:
The dramatic growth of mobile communications creates many opportunities for previously disconnected populations to enhance their access to information and resources during periods of crisis, particularly where formal services are weak. While numerous studies have lauded the potential benefits of mobiles, the potential security and crime risks and benefits associated with mobile ownership and use have been largely overlooked. This thesis is concerned with understanding the relationship between crime, the security of developing world populations and the increasing penetration of mobile telephony
APA, Harvard, Vancouver, ISO, and other styles
2

Burke, Mark John. "Enabling anonymous crime reporting on mobile phones in the developing world." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/6645.

Full text
Abstract:
Various campaigns indicate that a need exists for a convenient and anonymous crime reporting framework for the context of the developing world. In this thesis a contribution is made by means of a framework that facilitates reporting crime anonymously based on a secure platform. The framework comprises of two main components namely, a reporting module that is facilitated by unstructured supplementary service data (USSD) on a mobile phone and an anonymization module that is supported by a k-anonymity algorithm. The advantage of using USSD is that it is available to all mobile phones (including t
APA, Harvard, Vancouver, ISO, and other styles
3

Mailley, Jennifer. "The prevention of mobile phone theft : a case study of crime as pollution : rational choices and consumer demand." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/9645.

Full text
Abstract:
This thesis makes two contributions to environmental criminology. The first contribution is a rational choice event model for mobile phone thieves. This is based on interviews with 40 mobile phone thieves. In addition, the deterrent effects of 23 designs of phone are assessed. Comparisons are made between the responses of offenders and non-offenders; and between experienced offenders and less experienced offenders. The results show that mobile phone thieves make discerning choices about which model of phone to steal at the point of theft. The factors affecting handset choice reflect Clarke s (
APA, Harvard, Vancouver, ISO, and other styles
4

Norman, Paul. "European police cooperation : police accountability and the policing of internationally-mobile offending in England and Wales." Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.481734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rutkowski, Michael. "An Examination of Victory Seeker Use and Recidivism." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5580.

Full text
Abstract:
The current study extended earlier findings about the RealVictory program by using a larger sample and by examining Victory Seeker phone use in more detail. Using a sample of 144 juveniles, it was found that as the number of calls answered increased, the likelihood of a rearrest and the number of rearrests decreased slightly but the differences were not statistically significant. However, as the number of calls increased, the likelihood of a felony rearrest decreased significantly and the total number of felony arrests decreased significantly. These findings suggest that Victory Seeker may be
APA, Harvard, Vancouver, ISO, and other styles
6

Lagoutte, Julien. "Les conditions de la responsabilité en droit privé : éléments pour une théorie générale de la responsabilité juridique." Thesis, Bordeaux 4, 2012. http://www.theses.fr/2012BOR40032.

Full text
Abstract:
Alors que l’on enseigne classiquement la distinction radicale du droit pénal et de la responsabilité civile, une étude approfondie du droit positif révèle une tendance générale et profonde à la confusion des deux disciplines. Face à ce paradoxe, le juriste s’interroge : comment articuler le droit civil et le droit pénal de la responsabilité ? Pour y répondre, cette thèse suggère d’abandonner l’approche traditionnelle de la matière, consistant à la tenir pour une simple catégorie de classement des différentes branches, civile et pénale, du droit de la responsabilité. La responsabilité juridique
APA, Harvard, Vancouver, ISO, and other styles
7

趙瑞昇. "Integration of Mobile Device Data Analysis for Crime Investigation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/ay7mcb.

Full text
Abstract:
碩士<br>中央警察大學<br>資訊管理研究所<br>103<br>Nowadays mobile devices have been widely used in our daily life. Telecommunication carriers always book user communication records while providing communication services to their customers for accounting purpose. In addition, the data stored in mobile user devices can also be retrieved with forensic tools and provide more information about the user. By integrating with data from other security systems, such as GPS and CCTV, user communication records can also be used for position tracking applications. For example, telecommunication records can be used to loca
APA, Harvard, Vancouver, ISO, and other styles
8

左育丞. "High-tech Crime and Digital Forensics in Mobile iPhone Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/2wrvr9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Yu-Shan, and 林郁珊. "Automated Analysis of mobile and video evidence for crime investigation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/k68587.

Full text
Abstract:
碩士<br>大同大學<br>資訊經營學系(所)<br>102<br>New information and communication technology (ICT) brings convenience to people&apos;s lives and well-being. Otherwise, if they are used to carry out criminal acts, the impact is more rapid and far-reaching than traditional crimes caused.In recent years serveral well-known cases occurred in Taiwan,were all detected by search the video from video surveillance and corelateing mobile communication records that proved ICT can accelerate fighting against crime. The mobile communication records from lawful interception and images from video surveillance implemented
APA, Harvard, Vancouver, ISO, and other styles
10

Lockyer-Cotter, James. "Web GIS Tools for Crime Mapping in Toronto." Thesis, 2013. http://hdl.handle.net/10012/7900.

Full text
Abstract:
The field of crime mapping has an extensive history, yet it has managed to remain an effective tool for policing even in modern times. This success can be attributed in part to the field’s willingness to adapt to newer technologies as they have become available. A current trend that is occurring internationally is the practice of online crime mapping. Many police services from around the world have recognized the importance of using the Internet to connect with the public that they serve. To this end, while most police services have an online presence in the form of a Web site, some have o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mobile crime"

1

Daele, Stijn Van. Extending offender mobility: Investigating mobile offenders through the case study of 'itinerant crime groups'. Maklu, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hajime, Yadate, Tomino Yoshiyuki, Hiroe Ikoi, Morrissey Paul, and Toda Yasunari, eds. Mobile suit gundam seed astray R. Tokyopop, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hajime, Yadate, Tomino Yoshiyuki, Hiroe Ikoi, Lewter Troy, and Toda Yasunari, eds. Mobile suit gundam seed astray R. Tokyopop, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hajime, Yadate, Tomino Yoshiyuki, Hiroe Ikoi, Morrissey Paul, Toda Yasunari, and Tanck Paul, eds. Mobile suit gundam seed astray R. Tokyopop, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ushaw, Gary. Mobfire. DC Comics, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Davis, Mary McGowan. Helping to combat impunity for sexual crimes in DRC: An evaluation of the mobile gender justice courts. Open Society Initiative for Southern Africa, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Samuel, Alex. Investigation of cyber crimes: Information technology, electronic evidence, computer crimes, e-computers, video conferencing, and privacy of mobile phone users. Dwivedi & Co., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

author, Rzeszut Eric J., ed. 10 don'ts on your digital devices: The non-techie's survival guide to cyber security and privacy. Apress, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Palmer, Tink. Just one click: Sexual abuse of children and young people through the internet and mobile telephone technology. Barnardo's, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

service), ScienceDirect (Online, ed. Android forensics: Investigation, analysis, and mobile security for Google Android. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Mobile crime"

1

Kumar, Manish. "Mobile Forensics." In Crime Science and Digital Forensics. CRC Press, 2021. http://dx.doi.org/10.1201/9780429322877-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vecellio, Mark E., and Erick P. Bryant. "Mobile Device Photography." In Pocket Guide to Crime Scene Photography, 2nd ed. CRC Press, 2025. https://doi.org/10.4324/9781003440413-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Piipponen, Maarit, Helen Mäntymäki, and Marinella Rodi-Risberg. "From Mobile Crimes to Crimes of Mobility." In Transnational Crime Fiction. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53413-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cadonici, Luca. "Advanced Mobile Forensics." In Advancements in Cyber Crime Investigations and Modern Data Analytics. CRC Press, 2024. http://dx.doi.org/10.1201/9781003471103-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nolan, Meghan P. "The Socially Mobile Female in Victorian and Neo-Victorian Mysteries." In Transnational Crime Fiction. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53413-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Henderson, Heike. "Crime and Detection in a Virtually Mobile World: Tom Hillenbrand’s Drohnenland." In Transnational Crime Fiction. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-53413-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

William, P., Anurag Shrivastava, N. Shunmuga Karpagam, T. A. Mohanaprakash, Korakod Tongkachok, and Keshav Kumar. "Crime Analysis Using Computer Vision Approach with Machine Learning." In Mobile Radio Communications and 5G Networks. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-7982-8_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Song, Chang-Woo, Jeong-Hyun Lim, Kyung-Yong Chung, Ki-Wook Rim, and Jung-Hyun Lee. "Fast Data Acquisition with Mobile Device in Digital Crime." In IT Convergence and Security 2012. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaushik, Keshav. "Investigation on Mobile Forensics Tools to Decode Cyber Crime." In Security Analytics. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003206088-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mitsiou, Ekaterini. "Mobile Criminals: Crime and Punishment in Thirteenth-Century Byzantine Epirus." In Microstructures and Mobility in the Byzantine World. V&R unipress, 2024. http://dx.doi.org/10.14220/9783737014977.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile crime"

1

Chowdhury, Mahfuzulhoq, Afroza Akter, Estiak Ahamed Sazid, Md Zanea Alam, Mohammad Salah Uddin, and Kaniz Fatima Tonni. "Blueprint: A Cyber Crime, Personal Security, and Police Assistant Mobile Application Featuring Fraud Investigation and Crime Reporting Features." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11032035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reddi, Tarun, Charvi Kusuma, and Shamsad Parvin. "Mapping Crime Dynamics: Integrating Textual, Spatial, and Temporal Perspectives." In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2024. http://dx.doi.org/10.1109/uemcon62879.2024.10754762.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Parameshwara, Praveen Kuruvangi, and Shilpa Gupta. "Intelligent Automation of SFO Crime Prediction using Multiple Artificial Intelligence Methods." In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2024. http://dx.doi.org/10.1109/uemcon62879.2024.10754733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tortor, Rhea Nayang, Thea Carole Mariano BRIONES, Kevin Daniel Andres JEBULAN, Martin Enriquez Hernandez, and Clyd Eddieson Cinense MARIÑAS. "IPANIC: A Mobile Emergency Crime Case Reporting Tool with GPS-Based Location Detection and Alert Notification." In 2024 22nd International Conference on ICT and Knowledge Engineering (ICT&KE). IEEE, 2024. https://doi.org/10.1109/ictke62841.2024.10787178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Megalathan, Gajaanuja, and Banuka Athuraliya. "“CrimeLock” A Mobile Application for Analysing and Forecasting Crime using Autoregressive Integrated Moving Average with Artificial Neural Network." In 2024 Intelligent Systems and Machine Learning Conference (ISML). IEEE, 2024. https://doi.org/10.1109/isml60050.2024.11007295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rey, William P. "An Empirical Study on the Usability of Melden: A Crowdsourcing-Based Mobile Crime Reporting Application Using the PACMAD Model." In 2024 8th International Conference on Communication and Information Systems (ICCIS). IEEE, 2024. https://doi.org/10.1109/iccis63642.2024.10779432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ciocoiu, Gabriel-Alin. "The nstitution of the crime in the criminal legislation of the countries in the european community: a comparative study." In International scientific conference "Development Through Research and Innovation" IDSC-2025. Academy of Economic Studies, 2025. https://doi.org/10.53486/dri2025.66.

Full text
Abstract:
The ideas in this article are in the context of analyzing the causes that lead to the commission of crimes in the community space. The analytical deepening of the institution of crime leads us to identify the causes that lead to the violation of legal norms in the community space; the nature, character, and value of legislative behaviors and customs in the community space; the behavior of a person or a community from a legislative point of view. Crime has become more complex and has spread globally in recent times. Crime is facilitated by the internet and continues to develop with the use of m
APA, Harvard, Vancouver, ISO, and other styles
8

Maghanoy, Joie Ann W. "Crime mapping report mobile application using GIS." In 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP). IEEE, 2017. http://dx.doi.org/10.1109/siprocess.2017.8124542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moczulski, Wojciech, Kazimierz Bulandra, and Marek Adamczyk. "Autonomous mobile robotic system for supporting counterterrorist and surveillance operations." In Counterterrorism, Crime Fighting, Forensics, and Surveillance, edited by Henri Bouma, Felicity Carlysle-Davies, Robert J. Stokes, and Yitzhak Yitzhaky. SPIE, 2017. http://dx.doi.org/10.1117/12.2278657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Suhong, Param Joshi, Parminder Singh Kalsi, and Pooya Taheri. "Crime Analysis Through Machine Learning." In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2018. http://dx.doi.org/10.1109/iemcon.2018.8614828.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile crime"

1

Sabogal-Cardona, Orlando, Lynn Scholl, Daniel Oviedo, Amado Crotte, and Felipe Bedoya. Not My Usual Trip: Ride-hailing Characterization in Mexico City. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003516.

Full text
Abstract:
With a few exceptions, research on ride-hailing has focused on North American cities. Previous studies have identified the characteristics and preferences of ride-hailing adopters in a handful of cities. However, given their marked geographical focus, the relevance and applicability of such work to the practice of transport planning and regulation in cities in the Global South is minimal. In developing cities, the entrance of new transport services follows very different trajectories to those in North America and Europe, facing additional social, economic, and cultural challenges, and involvin
APA, Harvard, Vancouver, ISO, and other styles
2

Megersa, Kelbesa. Technologie et fiscalité : Adoption et impact des services électroniques au Rwanda. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ictd.2024.069.

Full text
Abstract:
De nombreux pays à faible revenu numérisent de plus en plus leurs services fiscaux, ce qui peut apporter toute une série d’avantages, allant de la réduction des coûts de mise en conformité et de l’amélioration de la tenue des registres à la réduction des possibilités de corruption et à l’amélioration de l’équité du système fiscal. Cependant, la concrétisation de ces avantages dépend des niveaux adéquats de sensibilisation et d’adoption des services électroniques parmi les contribuables ; lorsque ces niveaux ne sont pas optimaux, les services fiscaux électroniques peuvent ne produire que des av
APA, Harvard, Vancouver, ISO, and other styles
3

Rousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, 2022. http://dx.doi.org/10.54932/wodt6646.

Full text
Abstract:
Introduction u cours des deux derniers millénaires, il y a eu plusieurs façons de conserver, transmettre et même créer la connaissance ; la tradition orale, l’écrit manuscrit, l’écrit imprimé et l’écrit numérisé. La tradition orale et le manuscrit ont dominé pendant plus de 1400 ans, et ce, jusqu’à l’apparition du livre imprimé en 1451, résultant de l’invention mécanique de Gutenberg. Il faudra attendre un peu plus de 550 ans, avant que l’invention du support électronique déloge à son tour le livre imprimé, prenant une ampleur sans précédent grâce à la révolution numérique contemporaine, résul
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!