Academic literature on the topic 'Theft insurance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Theft insurance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Theft insurance"

1

Depken, Craig A., and E. Frank Stephenson. "Copper Theft in the United States." American Economist 62, no. 1 (October 11, 2016): 66–76. http://dx.doi.org/10.1177/0569434516672760.

Full text
Abstract:
Using monthly data for three proxies of copper theft, this article uses multivariate regression models to examine the relationship between copper prices and copper theft in the United States from 2006 through mid-2013. The findings indicate that copper thefts, as proxied by insurance claims for copper theft, newspaper articles in LexisNexis mentioning copper theft, and Google searches, are positively related to copper prices with the former two reflecting a constant elasticity not statistically different from unity. There is some evidence that copper thefts are related to the general pattern of property crime but there is no evidence that copper thefts are related to unemployment or foreclosures.
APA, Harvard, Vancouver, ISO, and other styles
2

Confer, Leanne M., John H. Boman, Cori Pryor, Thomas J. Mowen, and Paul Hemez. "Theft, Opioid Pills, Unemployment, and Insurance: A Longitudinal Analysis of American Counties in the Wake of the Opioids Crisis." Journal of Drug Issues 51, no. 3 (March 24, 2021): 504–17. http://dx.doi.org/10.1177/0022042621998690.

Full text
Abstract:
This study examines the relationships between prescription opioid pills, unemployment, health insurance, and theft. Covering the years 2006–2012, our data are an aggregate of information from the Drug Enforcement Administration, the Federal Bureau of Investigation’s National Incident-Based Reporting System, and the American Community Survey (ACS). The unit of analysis is time nested within counties. Preliminary results demonstrate that there were approximately 46 prescription opioid pills distributed per person annually in the United States between 2006 and 2012. Multivariate results reveal that counties with higher numbers of prescription opioid pills tend to experience significantly higher patterns of theft. Interestingly, health insurance is positively associated with theft while unemployment appears to protect against theft. The relationship between pills and theft is also conditioned by both unemployment and health insurance. Future research should explore these relationships to better inform efforts at making responsible social policy in the midst of the opioids crisis.
APA, Harvard, Vancouver, ISO, and other styles
3

CIOACA, Catalin, and Florin OLTEANU. "THEORETICAL CONSIDERATIONS ON POSSIBLE INSURANCE OF DRONES AGAINST DAMAGE AND THEFT." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 1 (June 24, 2016): 133–38. http://dx.doi.org/10.19062/2247-3173.2016.18.1.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dionne, Georges, and Kili C. Wang. "Does insurance fraud in automobile theft insurance fluctuate with the business cycle?" Journal of Risk and Uncertainty 47, no. 1 (July 3, 2013): 67–92. http://dx.doi.org/10.1007/s11166-013-9171-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Talesh, Shauhin A. "Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses." Law & Social Inquiry 43, no. 02 (2018): 417–40. http://dx.doi.org/10.1111/lsi.12303.

Full text
Abstract:
While data theft and cyber risk are major threats facing organizations, existing research suggests that most organizations do not have sufficient protection to prevent data breaches, deal with notification responsibilities, and comply with privacy laws. This article explores how insurance companies play a critical, yet unrecognized, role in assisting organizations in complying with privacy laws and dealing with cyber theft. My analysis draws from and contributes to two literatures on organizational compliance: new institutional organizational sociology studies of how organizations respond to legal regulation and sociolegal insurance scholars' research on how institutions govern through risk. Through participant observation at conferences, interviews, and content analysis of insurer manuals and risk management services, my study highlights how insurers act as compliance managers for organizations dealing with cyber security threats. Well beyond pooling and transferring risk, insurance companies offer cyber insurance and unique risk management services that influence the ways organizations comply with privacy laws.
APA, Harvard, Vancouver, ISO, and other styles
6

Wieteska, Stanisław. "Ubezpieczenia od kradzieży ruchomych zabytków kultury z ekspozycji stałej w Polsce." Kwartalnik Kolegium Ekonomiczno-Społecznego. Studia i Prace 4, no. 3 (December 13, 2015): 279–94. http://dx.doi.org/10.33119/kkessip.2015.4.3.19.

Full text
Abstract:
Insurance coverage is one of the methods of providing security for movablecultural property. The article discusses the scale of theft of such objects in Polandand methods of valuation for the purposes of determining the sum of insurance.
APA, Harvard, Vancouver, ISO, and other styles
7

Fadiya, Olusanjo O., Panos Georgakis, Ezekiel Chinyio, and Peter Akadiri. "Analysing the perceptions of UK building contractors on the contributors to the cost of construction plant theft." Journal of Financial Management of Property and Construction 18, no. 2 (August 2, 2013): 128–41. http://dx.doi.org/10.1108/jfmpc-10-2012-0039.

Full text
Abstract:
PurposeThe purpose of this paper is to consider the significance of the sources of cost of construction plant theft identified in previous studies and derive rates which can enhance proper estimation of the cost of plant theft to the construction industry. The direct and indirect costs of plant theft include replacement cost (new‐for‐old/depreciated), emergency cost, hire replacement cost, productivity loss, increased labour cost, loss of goodwill, administration cost, increased insurance premium and social cost.Design/methodology/approachThe cost‐contribution of these various sources was studied, using a structured questionnaire which was administered to building contractors in the UK construction industry, to measure their opinions of the frequency and severity of the contribution of the sources to the cost of construction plant theft. The questionnaires were administered to 220 companies and 51 of them were fully completed, representing 23.1 per cent of the original sample. The responses were analysed using descriptive and inferential statistics to derive the probabilities of sources contributing to the cost of plant theft.FindingsThe results of the analysis show that the rates of contribution to the cost of plant theft varies significantly between the sources, with “loss of output” and “increased insurance premium” ranking as the top‐two costs of plant theft in the UK construction industry. The rates derived in this study can be used by contractors to reasonably estimate the cost of plant theft, especially when there is need to justify the adoption of measures that can mitigate plant theft.Originality/valueThis study generated rates of contribution by factors which contribute to the overall cost of theft of construction plant in the UK. These rates can provide a more reliable estimate of the cost of plant theft than current estimations which vary significantly.
APA, Harvard, Vancouver, ISO, and other styles
8

Moussa, H. "An Alternative Solution to the Moral Hazard Problem and Some Sufficient Conditions for Its Absence." Recherches économiques de Louvain 51, no. 2 (June 1985): 181–94. http://dx.doi.org/10.1017/s077045180008252x.

Full text
Abstract:
Moral hazard is one of the problems that is believed to plague the insurance industry. A major aspect of the problem deals with the effect of the availability of insurance on the level of care exercised by the insured to reduce the probability of loss. When an insurance policy is not available against, say theft, an economic agent could devote time to watching over his property. At the extreme he could ensure that the probability of loss was zero, but the cost of such a strategy would likely be prohibitive. For such an instance the optimal action is to expend an effort less than that required to reduce the probability of theft to zero and hence to bear some risk. If we assume that economic agents are risk averse they would be willing to pay for a transfer of risk to another economic agent thereby enhancing their welfare. This transfer of risk is obtained through the purchase of an insurance policy. However if all goods are normal, the increase in welfare obtained from the purchase of insurance will be used to increase the consumption of leisure and that of other goods. As a consequence the purchase of insurance will cause the economic agents to expand less effort on the reduction of the probability of loss. That is, the optimal level of effort devoted to guarding against loss will depend on whether insurance is available.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Fan. "Does Identity Theft Insurance Undermine Risk Perceptions and Increase Risky Behavioral Intentions?" Asian Economic and Financial Review 9, no. 8 (2019): 926–35. http://dx.doi.org/10.18488/journal.aefr.2019.98.926.935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pao, Tsung-I., Larry Y. Tzeng, and Kili C. Wang. "Typhoons and Opportunistic Fraud: Claim Patterns of Automobile Theft Insurance in Taiwan." Journal of Risk and Insurance 81, no. 1 (February 14, 2013): 91–112. http://dx.doi.org/10.1111/j.1539-6975.2012.01498.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Theft insurance"

1

Clement, Junior V. "Strategies to Prevent and Reduce Medical Identity Theft Resulting in Medical Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4843.

Full text
Abstract:
Medical identity fraud is a byproduct of identity theft; it enables imposters to procure medical treatment, thus defrauding patients, insurers, and government programs through forged prescriptions, falsified medical records, and misuse of victim's health insurance. In 2014, for example, the United States Government lost $14.1 billion in improper payments. The purpose of this multiple case study, grounded by the Health Insurance Portability and Accountability Act as the conceptual framework, was to explore the strategies 5 healthcare leaders used to prevent identity theft and medical identity fraud and thus improve business performance in the state of New York. Data were collected using telephone interviews and open-ended questions. The data were analyzed using Yin's 5 step process. Based on data analysis, 5 themes emerged including: training and education (resulting to sub-themes: train employees, train patients, and educate consumers), technology (which focused on Kiosk, cloud, off-site storage ending with encryption), protective measures, safeguarding personally identifiable information, and insurance. Recommendations calls for leaders of large, medium, and small healthcare organizations and other industries to educate employees and victims of identity theft because the problems resulting from fraud travel beyond the borders of medical facilities: they flow right into consumers' residences. Findings from this study may contribute to social change through improved healthcare services and reduced medical costs, leading to more affordable healthcare.
APA, Harvard, Vancouver, ISO, and other styles
2

Piao, Tsung-I., and 鮑宗毅. "Hidden Information in Automobile Theft Insurance Market--Hot Time and Hot Point of Theft." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/67890565551408399322.

Full text
Abstract:
碩士
淡江大學
保險學系保險經營碩士在職專班
99
Automobile theft danger occurrence, whether has hot time and hot point existence? Coordinates the insurance company by the typhoon attack to be the victim of a robbery the material to analyze whether it has created hot time, this research uses the Logisitc regression analysis, confirmed the typhoon has the remarkable influence to the automobile theft, causes the typhoon to create the automobile theft to have hot time effect. In addition research drew up the Taina theft using the google map to have the place chart, used seven years material to select east the area and the peaceful area alternately steals the thermal region for Taina''s automobile, confirmed stole the thermal region the existence.
APA, Harvard, Vancouver, ISO, and other styles
3

Liao, Wan-ting, and 廖婉婷. "The Asymmetric Information Problems in Taiwan’s Automobile Theft Insurance Market." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71538744032677933355.

Full text
Abstract:
碩士
淡江大學
保險學系保險經營碩士班
98
There are tens of thousands of auto thefts in Taiwan, so the demand for auto theft is very high. With insurance rates rising, the loss rate can not be improved. In view of this, exploring the high loss rate of the reason may be due to Asymmetric Information, impeding the normal operation of the insurance market functions. Therefore, this study used in a particular sample of domestic insurance companies to study Taiwan’s auto theft loss insurance on the asymmetric information. In addition to the existence of asymmetric information, more importantly, try to distinguish the asymmetric information, which is from adverse selection, ex ante moral hazard, ex post moral hazard (opportunistic fraud). To do this, follow the example of Dionne and Gagne (2002), which is an approach to the use of static data. In the same contract year, the policy at different time points, moral hazard, motivation and characteristics observed correlation between types of policies and loss time , and loss reason, distinguishing the ex post moral hazard(opportunistic fraud), adverse selection, and ex ante moral hazard. Through Chiappori and Salanie (2000) residual correlation model, and Dionne, Gourieroux, and Vanasse (2001) two-stage model of cross-validation, the results show the policy close to expiration, the insured with high sum insured coverage policy (plus replacement cost provisions), easily gets the whole vehicle theft risk, shows vehicle theft loss in Taiwan insurance market, the information asymmetry of moral hazard problem does exist. And has been confirmed in the presence of moral hazard, through risk protection of parts stolen and the correlation between the conditions and probability of wreck, inspection will show that as moral hazard afterwards behavior (i.e. speculative fraud).
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chien-lin, and 陳建霖. "Analysis of Moral Hazard Risk Indicators of Auto Theft Loss Insurance using Checklist for Risk of Auto Theft Cases." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/69701993916452576054.

Full text
Abstract:
碩士
東吳大學
財務工程與精算數學系
98
In recent years, pouring of insurance fraud cases cause serious impact on operation of insurance companies. These insurance fraud cases not only exert bad influence on the allocation of social resources but also harm the rights and interests of the mass of insured people. The topic of this thesis is the auto theft loss insurance which is a kind of car insurance. We discuss about whether the checklist of risk of theft cases meet best practice or not. By analyzing and comparison between normal claims settlement and unusual claims settlement, we preserve those choices meet best practice and we hope this study serve as a reference for insurance industry. By discussing the usability of the checklist for risk of auto theft cases, this study also shows that the purpose of the checklist is to explore suspected moral hazard cases, and to find the doubtful point ahead, and then can deal prudently while searching the evidence. This study suggests that insurance companies should use checklist for risk of auto theft cases properly to explore moral hazard cases in advance and to protect other insured’s right.
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Jung-Hung, and 林榮宏. "Auto Theft Loss Coverage - Study on Fraud type for General Insurance." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/52j97u.

Full text
Abstract:
碩士
國立臺北科技大學
車輛工程系所
99
Car theft is a safety and security issue that everybody is concerned about, as well as an important index of the public order. Recently car theft has been connected with insurance fraud. The criminals either open an account in someone else’s name to buy a car and get an auto theft loss coverage, make a false car theft report, then sell the car after receiving the compensation, or they buy new- secondhand car, used cars or accident vehicles at a low price and buy insurance with a high premium rate, make a false car theft report, then make illegal money from insurance fraud by making up stories, cheating and hiding. This study is an exploratory research of the practice with the design of qualitative analysis to analyze the criminal techniques and characteristics according to the details, information and suspicious points of the case, in order to propose fraud prevention and management measures and make a conclusion by aid of the researcher’s participation and assistance in the investigation of a legal case as well as the court decision. It also compares the common features of insurance frauds by means of empirical case and synthesized study and tries to find out the similarity and difference between them. With the researcher’s practical experiences and opinions, the following suggestions are proposed for the reference of the general public, government authorities and insurance companies: This study suggests: 1. The competent authority and related department should (1) enhance the function of insurance fraud prevention organization and information exchange platform (2) promote the insurance fraud prevention (3) hold seminars on insurance fraud prevention (4) set up responsible department and organization (5) push for legislation to make insurance fraud a crime. 2. The insurance companies should (1) emphasize the underwriting quality and implement the mechanisms (2) strengthen the professional knowledge of underwriters and insurance claims processors (3) intensify the recognition of vehicle information and appraisal of the car value (4) establish the consolidated mechanisms of the report and claim for theft and serious damage of vehicles (5) enhance the information exchange platform between the insurance company, government authority and the related department. 3. The car owner should (1) understand and choose appropriate insurance product (2) pay attention when selecting car dealer, repair shop and insurance company (3) maintain a correct sense of value and have a true understanding of insurance.
APA, Harvard, Vancouver, ISO, and other styles
6

Hsu, Chih-Wei, and 許致維. "Change in Chattel real right:An Argument Based on Auto Theft Insurance." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/36313914938465312129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Wei-Cheng, and 劉威呈. "A Study Of The Asymmetric Information Problems And Risk Factors In Automobile Theft Insurance." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/85745430845792056596.

Full text
Abstract:
碩士
逢甲大學
風險管理與保險學系
101
This thesis use parts stolen additional insurance as the basis of protection option level, we want to analysis the correlation between protection option and automobile theft insurance claim rate to view the existence of asymmetric information problem and verify the risk factors in automobile theft insurance. The result show that the new cars appear higher partial loss claim rate when insured don`t have the protection of parts stolen additional insurance, we guess it is possible that the insured to make an illusion that the recovery of the car stolen for getting the partial loss claim, it is an ex post moral hazard. The old car samples appear higher partial loss claim rate when insured have the protection of parts stolen additional insurance, the result show that the old cars insured may have morale hazard. The result about risk factors show that the insured of under 30 years old and male appear higher claim rate;The new cars appear higher claim rate;The insured live in Taichung city, Chiayi city, Tainan city and Kaohsiung city appear higher claim rate.
APA, Harvard, Vancouver, ISO, and other styles
8

Liang, Chung-Hao, and 梁仲豪. "Correlation between Taiwan’s business cycle and automobile theft insurance claims –using Hualien County, Hualien City and Taipei City as Case Studies." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/jukjq3.

Full text
Abstract:
碩士
國立東華大學
管理學院高階經營管理碩士在職專班
101
The purpose of this study is to examine the correlation between the business cycle and the number of thefts and insurance claims in Hualien County/City and Taipei City. The data were collected between January 1996 and October 2011, a total of 190 months for observation. Taiwan business cycle base dates and the high and low points in the stock market index were used to correlate with the number of thefts and insurance claims in Hualien County/City and Taipei City to analyze, research, and verify the relationships of leading and falling behind at the peaks and troughs of the business cycle. This study empirically proves that: (1) when the business cycle is at a peak, there is greater influence on the number of automobile thefts in Hualien County/City, and a smaller influence on the number of automobile thefts in Taipei City. The primary reason is because when the business cycle is good, there is an increased demand in automobile parts, thus, there is an increase in the number of automobile theft cases in Hualien County/City, resulting in an increase in the number of insurance claims; (2) whether during the peak or recession of the business cycle, the number of insurance claims for automobile theft in Hualien County/City are greatly influenced by the business cycle and the TAIEX.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Theft insurance"

1

Institute, Highway Loss Data, ed. Insurance theft report. Washington, DC (Watergate 600, Washington 20037): HLDI, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Institute, Highway Loss Data, ed. Insurance theft report. Arlington, VA (1005 N. Glebe Rd., Arlington 22201): HLDI, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

California. Legislature. Senate. Committee on Insurance. Fraud on wheels: Vehicle theft, staged accidents, bogus auto body work. Sacramento, CA (1020 N Street, Room B-53, Sacramento 95814): Senate Publications, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Congress. House. Committee on Banking, Finance, and Urban Affairs. Subcommittee on Policy Research and Insurance. Federal Crime Insurance Program: Hearing before the Subcommittee on Policy Research and Insurance of the Committee on Banking, Finance, and Urban Affairs, House of Representatives, One Hundred First Congress, first session, June 28, 1989. Washington: U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Questions and answers on the Federal crime insurance program. Rockville, Md: Federal Emergency Management Agency, Federal Crime Insurance Program, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Institute, Highway Loss Data, ed. The Effect of vehicle component parts marking on theft losses. Arlington, Va. (1005 North Glebe Road, Arlington, Va. 22201): Highway Loss Data Institute, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lewis, Helen. Insuring against burglary losses. London: Home Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Federal crime insurance program: Commercial coverage rate tables. [Washington, D.C.?]: Federal Emergency Management Agency, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Federal Emergency Management Agency, ed. Federal crime insurance program: Commercial coverage rate tables, September 1990. [Washington, D.C.?: Federal Emergency Management Agency, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marmor, Randall I., and Susan Koehler Sullivan. Commercial crime insurance coverage. Edited by American Bar Association. Fidelity and Surety Law Committee. Chicago, IL: American Bar Association, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Theft insurance"

1

Taplin, Ruth. "Insurance sector." In Cyber Risk, Intellectual Property Theft and Cyberwarfare, 103–15. Routledge, 2020. http://dx.doi.org/10.4324/9780429453199-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Art theft." In The Law and Practice of Fine Art, Jewellery and Specie Insurance, 71–92. Edward Elgar Publishing, 2021. http://dx.doi.org/10.4337/9781800373440.00016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Prevention, Detection, and Insurance." In Preventing and Detecting Employee Theft and Embezzlement, 227–37. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119205135.ch14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Insurance as Enabling Risk and Security." In The Securitization and Policing of Art Theft, 123–44. Routledge, 2016. http://dx.doi.org/10.4324/9781315553054-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Governmental Nodes Enabling Security beyond Insurance." In The Securitization and Policing of Art Theft, 145–62. Routledge, 2016. http://dx.doi.org/10.4324/9781315553054-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stiefel, Dieter. "National Socialist Theft: The Problem of Life-insurance policies 1." In Revisiting the National Socialist Legacy, 173–77. Routledge, 2019. http://dx.doi.org/10.4324/9781351320887-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tamunobarafiri, Amavey, Shaun Aghili, and Sergey Butakov. "Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers." In Cloud Security, 970–91. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch050.

Full text
Abstract:
Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.
APA, Harvard, Vancouver, ISO, and other styles
8

Horton, Sarah Bronwen. "Ghost Workers." In They Leave Their Kidneys in the Fields. University of California Press, 2016. http://dx.doi.org/10.1525/california/9780520283268.003.0004.

Full text
Abstract:
Migrant farmworkers’ exclusion from many labor protections and forms of social assistance forces them to rely on informal and illicit subsistence strategies. One such strategy is “identity loan,” in which a migrant with legal status loans an undocumented migrant the work authorization documents that the latter needs to work. Unlike “identity theft,” then, “identity loan” is the voluntary and mutually beneficial exchange of work authorization documents. This chapter explores why document exchange flourishes in migrant communities, even as labor supervisors take advantage of such loans to reduce their labor costs. Labor supervisors often threaten to falsely position identity “loans” as “thefts,” denying “identity recipients” their right to workers’ compensation insurance when they are injured. Thus the recent trend towards governing immigration through crime—that is, federal and local officials’ reliance on criminal prosecution to deter undocumented migration— hands labor supervisors yet one more tool to create a docile labor force.
APA, Harvard, Vancouver, ISO, and other styles
9

Kierkegaard, Sylvia. "Cloud State Surveillance." In Web Services, 1917–40. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7501-6.ch099.

Full text
Abstract:
Concerns about government snooping in the wake of revelations by whistle blower Edward Snowden have deterred enterprises and IT professionals from keeping sensitive data in the clouds. Moving towards cloud-based computing has emerged and has gained acceptance as a solution to the tasks related to the processing of information. However, cloud computing carries serious risks to business information. The questions around risk and compliance are still largely unknown and need to be ironed out. Cloud computing opens numerous legal, privacy, and security implications, such as copyright, data loss, destruction of data, identity theft, third-party contractual limitations, e-discovery, risk/insurance allocation, and jurisdictional issues. This chapter discusses the associated legal risks inherent in cloud computing, in particular the international data transfer between EU and non-EU states.
APA, Harvard, Vancouver, ISO, and other styles
10

Kierkegaard, Sylvia. "Cloud State Surveillance." In Web-Based Services, 2032–54. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch089.

Full text
Abstract:
Concerns about government snooping in the wake of revelations by whistle blower Edward Snowden have deterred enterprises and IT professionals from keeping sensitive data in the clouds. Moving towards cloud-based computing has emerged and has gained acceptance as a solution to the tasks related to the processing of information. However, cloud computing carries serious risks to business information. The questions around risk and compliance are still largely unknown and need to be ironed out. Cloud computing opens numerous legal, privacy, and security implications, such as copyright, data loss, destruction of data, identity theft, third-party contractual limitations, e-discovery, risk/insurance allocation, and jurisdictional issues. This chapter discusses the associated legal risks inherent in cloud computing, in particular the international data transfer between EU and non-EU states.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Theft insurance"

1

Huge, Elijah. "Proof (Saving the City)." In 2018 ACSA International Conference. ACSA Press, 2018. http://dx.doi.org/10.35483/acsa.intl.2018.41.

Full text
Abstract:
In 1752, the year Benjamin Franklin is credited with the invention of the lightning rod, he also established the first American fire insurance company. The coincidence of these innovations prefigures the parallel development and interwoven relationships between invention, building insurance, and legislation that underlie the production of architecture today. Industrialization brought new threats to the city (e.g. electricity, speed, explosives) while also dramatically increasing the scale of historical perils (e.g. flood, fire, theft). In turn, these threats gave rise to a field of new products, accessory to conventional building. In their early forms, the automatic sprinkler, exterior fire escape, panic bar, emergency light, and theft alarm were, like Franklin’s lightning rod, ready for production and deployment on a large scale, without definitive spatial identity, and suitable for use in new or existing construction. Negotiating the thresholds between the developing infrastructures of the city and its private spaces (as insured and legally defined), these devices may be understood collectively as a crumple zone intended not to prevent architectural emergency but to absorb, limit, and contain its effects.
APA, Harvard, Vancouver, ISO, and other styles
2

Herselman, Marlien, and Matt Warren. "Cyber Crime Influencing Businesses in South Africa." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2838.

Full text
Abstract:
This study shows that cyber crime is a recent addition to the list of crimes that can adversely affect businesses directly or indirectly. This phenomenon was not directly prosecutable in South Africa until the enactment of the ECT Act in July 2002. However this Act also prevents businesses to fully prosecute a hacker due to incompleteness. Any kind of commercially related crime can be duplicated as cyber crime. Therefore very little research appears or has been documented about cyber crime in South African companies before 2003. The motivation to do this study was that businesses often loose millions in cyber attacks, not necessarily through direct theft but by the loss of service and damage to the image of the company. Most of the companies that were approached for interviews on cyber crime were reluctant to share the fact that they were hacked or that cyber crime occurred at their company as it violates their security policies and may expose their fragile security platforms. The purpose of this study was to attempt to get an overall view on how South African businesses are affected by cyber crime in the banking and short term insurance sector of the South African industry and also to determine what legislation exist in this country to protect them. The case study approach was used to determine the affect of cyber crime on businesses like banks and insurance companies and higher education institutions. Each case was interviewed, monitored and was observed over a period of a year. This study discloses the evaluation of the results of how cyber crime affected the cases, which were part of this study. The banks and higher education institutions felt that they were at an increased risk both externally and internally, which is likely to increase as the migration towards electronic commerce occurs. The insurance industry felt that they are not yet affected by external cyber crime attacks in this country.
APA, Harvard, Vancouver, ISO, and other styles
3

Oliveira, Adriana Anselmo, Leonel Ribeiro, and Nelson Ferreira. "THE USE OF 3D SCANNING AND PRINTING IN THE RESTORATION PROCESS OF THE EXPOSED CERAMIC PANELS OF JORGE BARRADAS (PALÁCIO DA JUSTIÇA DE LISBOA)." In RECH6 - 6th International Meeting on Retouching of Cultural Heritage. València: Editorial Universitat Politècnica de València, 2021. http://dx.doi.org/10.4995/rech6.2021.13611.

Full text
Abstract:
The techniques applied to restore and conserve the 16 ceramic panels which are an integral part the façade of the Palácio da Justiça’s South Building, in Lisbon (authored by Jorge Barradas, Querubim Lapa and Júlio Resende), was marked by the adoption of disruptive technology as one of the main methods of approaching the pieces in need of intervention. Different materials and techniques, both digital and manual, either from physical or aesthetic perspectives, guaranteed their future preservation. Following principles of restoration ethics, photographic references of the compositions served as a goal to assimilate the original work as much as possible. Recurring missing parts were then to be reconstructed by means of 3D scanning and current object printing technology. Such technique allows a preview and manipulation through specific computer software. Once the file has been completed with all the information necessary to produce the object, it can be sent directly to a 3D printer. The main objective of intervening Jorge Barradas' panels with 3D printed objects, was to replace large key pieces in a non-intrusive way and without damaging the original work. Simultaneously, in addition to the durability of such printed materials, a "life insurance" is created in case of any damage or theft, since it can be replicated quickly from the thorough scan, stored in a digital file format.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography