To see the other types of publications on this topic, follow the link: Mobile crime.

Dissertations / Theses on the topic 'Mobile crime'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 dissertations / theses for your research on the topic 'Mobile crime.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Stones, Elizabeth Kelly. "Mobile communications : m-crime and security." Thesis, University College London (University of London), 2017. http://discovery.ucl.ac.uk/1571072/.

Full text
Abstract:
The dramatic growth of mobile communications creates many opportunities for previously disconnected populations to enhance their access to information and resources during periods of crisis, particularly where formal services are weak. While numerous studies have lauded the potential benefits of mobiles, the potential security and crime risks and benefits associated with mobile ownership and use have been largely overlooked. This thesis is concerned with understanding the relationship between crime, the security of developing world populations and the increasing penetration of mobile telephony
APA, Harvard, Vancouver, ISO, and other styles
2

Burke, Mark John. "Enabling anonymous crime reporting on mobile phones in the developing world." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/6645.

Full text
Abstract:
Various campaigns indicate that a need exists for a convenient and anonymous crime reporting framework for the context of the developing world. In this thesis a contribution is made by means of a framework that facilitates reporting crime anonymously based on a secure platform. The framework comprises of two main components namely, a reporting module that is facilitated by unstructured supplementary service data (USSD) on a mobile phone and an anonymization module that is supported by a k-anonymity algorithm. The advantage of using USSD is that it is available to all mobile phones (including t
APA, Harvard, Vancouver, ISO, and other styles
3

Mailley, Jennifer. "The prevention of mobile phone theft : a case study of crime as pollution : rational choices and consumer demand." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/9645.

Full text
Abstract:
This thesis makes two contributions to environmental criminology. The first contribution is a rational choice event model for mobile phone thieves. This is based on interviews with 40 mobile phone thieves. In addition, the deterrent effects of 23 designs of phone are assessed. Comparisons are made between the responses of offenders and non-offenders; and between experienced offenders and less experienced offenders. The results show that mobile phone thieves make discerning choices about which model of phone to steal at the point of theft. The factors affecting handset choice reflect Clarke s (
APA, Harvard, Vancouver, ISO, and other styles
4

Norman, Paul. "European police cooperation : police accountability and the policing of internationally-mobile offending in England and Wales." Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.481734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rutkowski, Michael. "An Examination of Victory Seeker Use and Recidivism." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5580.

Full text
Abstract:
The current study extended earlier findings about the RealVictory program by using a larger sample and by examining Victory Seeker phone use in more detail. Using a sample of 144 juveniles, it was found that as the number of calls answered increased, the likelihood of a rearrest and the number of rearrests decreased slightly but the differences were not statistically significant. However, as the number of calls increased, the likelihood of a felony rearrest decreased significantly and the total number of felony arrests decreased significantly. These findings suggest that Victory Seeker may be
APA, Harvard, Vancouver, ISO, and other styles
6

Lagoutte, Julien. "Les conditions de la responsabilité en droit privé : éléments pour une théorie générale de la responsabilité juridique." Thesis, Bordeaux 4, 2012. http://www.theses.fr/2012BOR40032.

Full text
Abstract:
Alors que l’on enseigne classiquement la distinction radicale du droit pénal et de la responsabilité civile, une étude approfondie du droit positif révèle une tendance générale et profonde à la confusion des deux disciplines. Face à ce paradoxe, le juriste s’interroge : comment articuler le droit civil et le droit pénal de la responsabilité ? Pour y répondre, cette thèse suggère d’abandonner l’approche traditionnelle de la matière, consistant à la tenir pour une simple catégorie de classement des différentes branches, civile et pénale, du droit de la responsabilité. La responsabilité juridique
APA, Harvard, Vancouver, ISO, and other styles
7

趙瑞昇. "Integration of Mobile Device Data Analysis for Crime Investigation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/ay7mcb.

Full text
Abstract:
碩士<br>中央警察大學<br>資訊管理研究所<br>103<br>Nowadays mobile devices have been widely used in our daily life. Telecommunication carriers always book user communication records while providing communication services to their customers for accounting purpose. In addition, the data stored in mobile user devices can also be retrieved with forensic tools and provide more information about the user. By integrating with data from other security systems, such as GPS and CCTV, user communication records can also be used for position tracking applications. For example, telecommunication records can be used to loca
APA, Harvard, Vancouver, ISO, and other styles
8

左育丞. "High-tech Crime and Digital Forensics in Mobile iPhone Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/2wrvr9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Yu-Shan, and 林郁珊. "Automated Analysis of mobile and video evidence for crime investigation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/k68587.

Full text
Abstract:
碩士<br>大同大學<br>資訊經營學系(所)<br>102<br>New information and communication technology (ICT) brings convenience to people&apos;s lives and well-being. Otherwise, if they are used to carry out criminal acts, the impact is more rapid and far-reaching than traditional crimes caused.In recent years serveral well-known cases occurred in Taiwan,were all detected by search the video from video surveillance and corelateing mobile communication records that proved ICT can accelerate fighting against crime. The mobile communication records from lawful interception and images from video surveillance implemented
APA, Harvard, Vancouver, ISO, and other styles
10

Lockyer-Cotter, James. "Web GIS Tools for Crime Mapping in Toronto." Thesis, 2013. http://hdl.handle.net/10012/7900.

Full text
Abstract:
The field of crime mapping has an extensive history, yet it has managed to remain an effective tool for policing even in modern times. This success can be attributed in part to the field’s willingness to adapt to newer technologies as they have become available. A current trend that is occurring internationally is the practice of online crime mapping. Many police services from around the world have recognized the importance of using the Internet to connect with the public that they serve. To this end, while most police services have an online presence in the form of a Web site, some have o
APA, Harvard, Vancouver, ISO, and other styles
11

Visser, Bennet Louis. "The significance of physical surveillance as a method in the investigation of insurance fraud: a Discovery Life perspective." Diss., 2015. http://hdl.handle.net/10500/20182.

Full text
Abstract:
Text in English<br>The primary aim of this study is to determine the significance of the application of physical surveillance as a method in the investigation of insurance fraud conducted by the Surveillance Unit at the Forensic Department of Discovery Life. Various objectives were fulfilled in this study:  To explore, identify and describe the value of the application of physical surveillance, as a forensic investigation method, in order to determine the significance of this method in the investigation of insurance fraud at the Forensic Department of Discovery Life.  To determine whether
APA, Harvard, Vancouver, ISO, and other styles
12

Esteves, Herculano José Rodrigues. "O crime de furto qualificado previsto no artigo 204 nº 2 al. e) do Código Penal e a definição legal de arrombamento." Master's thesis, 2017. http://hdl.handle.net/10400.14/23783.

Full text
Abstract:
A compreensão do crime de furto qualificado por penetração por arrombamento em certos espaços fechados exige a análise da conceptualização da norma material e da norma que define o referido modo de execução e a análise da complexa conexão que se estabelece entre elas. Dessa exegese resulta que é a norma incriminatória que fixa aqueles espaços. Entendendo-se (como deve entender-se) o conceito “casa” em sentido amplo e heterogéneo mas sempre como espaço autónomo, então a norma material não abrange o “lugar fechado dela dependente” exclusivamente previsto na norma definitória. A exigência de inte
APA, Harvard, Vancouver, ISO, and other styles
13

Obi, Isioma Ruby. "The role of government in the Nigerian mobile telecommunications industry: a focus on cybercrime and mobile broadband policies." Thesis, 2017. http://hdl.handle.net/10539/23470.

Full text
Abstract:
A research report submitted to the Faculty of Commerce, Law and Management, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Masters of Management by Dissertation (MM-D). October, 2016<br>The role played by a governing authority is crucial to the long term survival and development of its governed unit, irrespective of the size and function of the said unit. In the event that a government fails to protect the interests of its governed, a state of wide-spread dissatisfaction and palpable frustration becomes inevitable. Through the application o
APA, Harvard, Vancouver, ISO, and other styles
14

LIANG, CHE-PIN, and 梁哲賓. "Study on High-Tech Crimes--Discussion on the Investigation Challenge and Correspondence of Using Mobile Applications as a Criminal Tool." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/v49wh2.

Full text
Abstract:
碩士<br>南華大學<br>資訊管理學系<br>107<br>Gangsters use high-tech technology to carry out their criminal activities. This type of crime is not only a crime of using computer crime but also uses special high-tech electronic products, such as smartphone, digital photography equipment, various smart cards, etc. Recently, investigators discovered that more and more suspects in Taiwan have used mobile devices as their criminal tools, especially in fraud, drug, gambling, and prostitution cases are the most broadly used. Everyone received those fraudulent messages if he/she has social media or instant messaging
APA, Harvard, Vancouver, ISO, and other styles
15

Lochner, Hendrik Thomas. "Kartering van selfoontegnologie." Diss., 2007. http://hdl.handle.net/10500/554.

Full text
Abstract:
It is sincerely hoped that this work will motivate other researchers and in particular my colleagues to do further research in the field of cellphone technology, especially how it can be mapped to enable it to be utilised as evidence in our courts. This research aims to develop the mapping of cellphone technology as an aid in the investigation of crime. The mapping of cellphone technology refers to how cellphone technology can be utilised in crime investigation and in particular how a criminal can be placed at the scene of a crime, as a result of a cellphone call that was either made or
APA, Harvard, Vancouver, ISO, and other styles
16

Choinière-Tran, Kim. "La mise en scène de l’intervention psychosociale en contexte de crise : ethnographie d’un partenariat « policier-travailleur social »." Thèse, 2019. http://hdl.handle.net/1866/22468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Donga, Gift Taruwandira. "The moderating effect of information security on the adoption of mobile marketing transactions among South African tertiary students." Thesis, 2020. http://hdl.handle.net/11602/1527.

Full text
Abstract:
PhD (Business Management)<br>Department of Business Management<br>Despite the fast pace of development within the mobile commerce industry globally, marketers in developing countries are still lagging in understanding why and how consumers participate in mobile marketing transactions. The literature reporting on mobile marketing transactions’ adoption in a South African context remains largely inconsistent and fragmented as most previous studies are based on the experience of consumers in a non-South African (and nondeveloping country) context. Therefore, this study identifies a literature gap
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!