Academic literature on the topic 'Theft – Prevention'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Theft – Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Theft – Prevention"

1

K, Ashwitha, Gracy A, Pooja sree M, Somashekar B, and Dhayanand B R. "POWER THEFT PREVENTION SYSTEM USING IOT." International Journal of Current Engineering and Scientific Research 6, no. 6 (June 2019): 118–25. http://dx.doi.org/10.21276/ijcesr.2019.6.6.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clarke, Ronald V., and Patricia M. Harris. "Auto Theft and Its Prevention." Crime and Justice 16 (January 1992): 1–54. http://dx.doi.org/10.1086/449203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sutar, Ankush, Tukaram Kocharekar, and Piyush Mestry Prathamesh Sawantdesai Mrs Suhasini S. Goilkar. "Smart Bag with Theft Prevention and Real Time Tracking." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (February 28, 2018): 1118–20. http://dx.doi.org/10.31142/ijtsrd9571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gonzalez-Navarro, Marco. "Deterrence and Geographical Externalities in Auto Theft." American Economic Journal: Applied Economics 5, no. 4 (October 1, 2013): 92–110. http://dx.doi.org/10.1257/app.5.4.92.

Full text
Abstract:
Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. However, 18 percent of the reduction in thefts was displaced toward unprotected Lojack models in non-Lojack states, providing new evidence of geographical crime displacement in auto theft. (JEL H76, H77, K42, O17, O18, R23)
APA, Harvard, Vancouver, ISO, and other styles
5

Shahria, M. M., Mohammed Nazim Uddin, and Miraj Ahmed. "Social Media Security: Identity Theft Prevention." Volume 5 - 2020, Issue 8 - August 5, no. 8 (September 16, 2020): 1656–62. http://dx.doi.org/10.38124/ijisrt20aug762.

Full text
Abstract:
Social networking sites are becoming parts and parcels of our daily life. With the increasing of its popularity, the cybercrimes, targeting these platforms are also increasing. Cybercriminals use this platform to harass the victims personally, socially and financially. Such type of crimes is performed using some of the vulnerabilities of the social networking platforms. Identity theft is one of those crimes which is increasing alarmingly. By creating a fake account, using the same information and profile picture, one can easily take disguise of another person. Hence, the criminal can chat with other persons impersonating the victim. Thus, the criminal takes the disguise of a person and starts harassing other people. The consequence of this problem is very dangerous. By doing so, the criminal ruins the image of the victim. There are so many cases where victims attempted to commit suicide after facing this type of terrible problem. All these things are occurring as the criminal can download or collect the profile picture of the victim easily and open a clone account easily. The availability of information is giving the chance to the cybercriminal to make an account exactly looks like the victim’s one. In this paper, we attempt to prevent this type of identity theft by an image based solution on the social networking platforms. The name of this model is ‘Image Based Identity Theft Prevention’.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Chong, Xi Chen, Lin Liu, Minxuan Lan, and Debao Chen. "Assessing Impacts of New Subway Stations on Urban Thefts in the Surrounding Areas." ISPRS International Journal of Geo-Information 10, no. 10 (September 23, 2021): 632. http://dx.doi.org/10.3390/ijgi10100632.

Full text
Abstract:
Whether newly implemented public transit stations influence the nearby crime pattern has been debated for years. In ZG City, China, 2 new subway lines and 20 new stations were implemented in 2017. This intervention allows us to test the plausible relationship between new public transit stations and thefts in the surrounding areas. We use the difference-in-differences (DID) model to assess the theft in the treatment and control areas before and after the implementation of the new stations, with necessary socioeconomic and land-use variables and time from the addition of the station being controlled. We also explicitly examine the impacts of the proximity of the stations and the Spring Festival on theft. The results suggest the following: (1) theft around the new subway stations significantly increases after the stations’ implementation, while the control area does not see much change in thefts; (2) proximity between the neighboring stations’ increases thefts; and (3) theft near the new stations significantly decreases during the month of the Spring Festival. This study contributes to the literature on the relationship between the subway system and crime, especially from a Chinese perspective. The finding of the research can bring insights to urban transit planning, allocation of the police force, and crime prevention.
APA, Harvard, Vancouver, ISO, and other styles
7

Thakran, Eva, Shrestha Bhattacharya, and Seema Verma. "PROPOSED METHOD FOR CAR THEFT PREVENTION TECHNIQUES." International Journal of Technical Research & Science Special, Issue3 (August 15, 2020): 108–13. http://dx.doi.org/10.30780/specialissue-icaccg2020/022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ghamri, Nayef Salah. "Positive and Negative Effects of Using Electronic Banking on Customers and Small Entrepreneurs: An Exploratory Study in the Western Region of Saudi Arabia." Business and Economic Research 7, no. 2 (October 16, 2017): 311. http://dx.doi.org/10.5296/ber.v7i2.11999.

Full text
Abstract:
Currently, the exchange of digital knowledge is not confined to a place or time. Knowledge is being shared among peoples all over the world regardless of the geographical and political boundaries. Technology, from the time of its existence, has contributed in changing many people’s rooted concepts that they have been accustomed to in their lives. While technology has positively contributed in shortening the time and distances among nations, it has also created some negative consequences such as the difficulty of protecting the individual’s privacy. In the era of widespread technology, new types of money thefts have emerged. These thefts do not include breaking into houses and banks but rather, Internet piracy. This is one of the modern types of thefts, which is represented in many forms such as identity theft, transferring money from one bank account into another, and the thefts of sensitive and confidential information. Therefore, information technology has an important role to play in our life, and it became one of our priorities. This research study focuses on assessing the risks related to the theft of the information of the clients of the commercial banks and even considering the level of security and theft prevention of such information as one of the key factors of quality that most banks show as one of their competitive advantages which they are trying to maintain.
APA, Harvard, Vancouver, ISO, and other styles
9

Anderson, David. "Stock theft and moral economy in colonial Kenya." Africa 56, no. 4 (October 1986): 399–416. http://dx.doi.org/10.2307/1159997.

Full text
Abstract:
Opening ParagraphFrom the earliest years of colonial government in Kenya, cattle raiding by Africans against their neighbours, and in particular livestock thefts from European farmers, presented the administration with their most persistent policing problem in the rural areas of the colony. As the period of colonial rule in Kenya was drawing to a close, reported cases of stock theft were once again showing a sharp increase, climbing from 1578 cases in 1955 to 4243 in 1962 (Kenya Police Dept, 1955 and 1962). In a pattern by then familiar to the Kenya administration, this prompted the renewal of demands from the European settler community for more extensive and concerted government action to deal with the activities of the thieves. Settler opinion held that the continuing prevalence of stock theft had much to do with the ‘social prestige’ attached to the crime in many African communities. The unwillingness of the African public to assist in the prevention and detection of stock theft had long been interpreted as a tacit sanctioning of such theft, leading to the conclusion that, within the ‘moral economy’ of many African communities, stock theft was not thought of as a crime at all. ‘After all,’ commented the Provincial Commissioner of the Rift Valley Province in 1959, ‘stock theft is the traditional sport of the young men of many tribes, and the elders cannot be expected to act as kill-joys and stamp it out unless they themselves are liable to suffer.’ This view was applied most readily to the pastoralists of the Rift Valley and western Kenya, the Maasai and Kalenjin, who were commonly involved in crimes of this sort. The belief that stock theft was an acceptable form of accumulation within Kalenjin and Maasai society determined the nature of the legislation put forward by the colonial administration to deal with the crime. Policing and punishment were accordingly based upon the notion of collective responsibility for acts of stock theft, with wide powers to extend collective punishments to families, villages and even entire locations found to be implicated in thefts.
APA, Harvard, Vancouver, ISO, and other styles
10

Nithin, Chatla. "Vehicle Theft Detecting System using GPS Tracking." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4277–83. http://dx.doi.org/10.22214/ijraset.2021.35796.

Full text
Abstract:
Nowadays, automobile thefts and the production of vehicle are increasing in yearly throughout the world. So, vehicle theft is a universal problem. Yearly around 10 million property and automobile cases are reporting. There are so many recent technologies evolving and new methods are being upgraded to overcome this issue. The methods involved in vehicle theft detection have become aware to everyone including the burglars and they try to break the system and steal the vehicle.It is important to keep our properties secure. Ofcourse as the technology increases the thieves are looking for better plans.Prevention of accidents is better than facing them later. Today we have many approaches to prevent the accidents. prevention is nothing but allowing people to do things under limit. This paper work presents an model which can solve the addressed problem.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Theft – Prevention"

1

Ruppar, Carrie Aliene. "Identity theft prevention in CyberCIEGE." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FRuppar.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.
Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
3

Whitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.

Full text
Abstract:
3 pp.
The publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
APA, Harvard, Vancouver, ISO, and other styles
4

Whitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdullah. "Knowledge sharing processes for identity theft prevention within online retail organisations." Thesis, University of Central Lancashire, 2017. http://clok.uclan.ac.uk/23998/.

Full text
Abstract:
The occurrence of identity theft has increased dramatically in recent times, becoming one of the fastest-growing crimes in the world. Major challenges associated with identity theft related offences include problems of consumers with credit, such as: aggravation by debt collectors; rejection of loans; disturbance in normal lives such as reputation damage; and the psychological disruption of providing personal data to organisations and banks during the investigation. For these reasons, and with the ready access of identity thieves to the retail industry, this problem is acute in the online retail industry, yet there has been insufficient research undertaken in this domain. This research investigated knowledge sharing processes for identity theft prevention within online retail organisations. An analysis of how individual staff and teams share their knowledge for identity theft prevention in organisations is presented, which includes the investigation of existing barriers in knowledge sharing for identity theft prevention in organisations. A qualitative case study research approach, using the guiding framework proposed by Salleh (2010), was adopted and extended to improve knowledge sharing processes for identity theft prevention in online retail organisations. Three case studies were conducted with leading online retailers in the UK. Data collection included one-to- one semi-structured interviews, internal documents from the researched companies and external documents from various secondary sources. The researcher used the thematic analysis approach using the NVivo software tool and a manual coding process. The total number of interviews was 34 across 3 case studies, with each interview lasting between 45 and 75 minutes. The participants were selected according to their experience, knowledge and involvement in solving identity theft issues and knowledge sharing. Investigation of internal documents included email conversations, policy documents and internal conversations such as emails and memos from the researched companies. This study found that knowledge of identity theft prevention is not being shared within online retail organisations. Individual staff members are learning from their experiences, which is time-consuming. Existing knowledge sharing barriers within the organisations were identified, and improvements in knowledge sharing processes in the online retail industry of the UK using the extended framework are proposed. This research contributes to existing research by providing new insights into knowledge sharing for identity theft prevention. It extends an existing framework proposed by Salleh (2010) in the new context of knowledge sharing processes for ID theft prevention in the retail industry by simplifying the model and combining elements into a more coherent framework. The present study also contributes by investigating the online retail sector for knowledge sharing for ID theft prevention. The empirical research identifies the barriers to knowledge sharing for ID theft prevention and the weaknesses of knowledge sharing in online retail organisations relevant to ID theft prevention. Finally, this study provides managers with useful guidelines for developing appropriate knowledge sharing processes for ID theft prevention in their organisation, and to educate staff in effective knowledge sharing.
APA, Harvard, Vancouver, ISO, and other styles
6

Swaim, Pattrick Lee Jr. "Diffusion of the Texas Cooperative Extension's horse theft awareness and prevention initiative." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3279.

Full text
Abstract:
The primary purpose of this study was to identify the Horse Theft Awareness and Prevention Initiative (HTAPI) participants and the theft prevention practices used in Texas. The secondary purpose was to evaluate the educational effectiveness of the HTAPI on the first three of Kirkpatrick’s levels, namely learner satisfaction, knowledge acquired, and change in behavior. The third purpose was to examine relationships between the rate of adoption of HTAPI recommended practices and the following demographic variables: gender, age, equine discipline, number of horses owned, and size of investment in the equine business. Survey instruments were used to gather data. Due to sampling constraints, the Solomon four step research design method was modified by removing one group following Seger’s (1998). The sample groups consisted of a pre/only test group, pre/post test group, post/only test group minus the control pre/post test group. The pre/only sample group data was collected in Denton and Montgomery Counties and yielded 56 usable instruments. Using Dillman’s (2000) procedures, data from participants of the HTAPI programs were collected using two mailed survey instruments. One hundred ninety two participants of the 2004 Mare Foal, Basic Horse Management 101, and the Performance Horse workshops were mailed a post/only instrument; 96 were returned for a 49% response rate. Thirty two pre-test instruments were administered in Hopkins and Polk County and thirty days later these participants were mailed a post/only instrument. A response rate of 66% and 63% in the respective sample groups. The sample population can be described as mainly women (68.3%) 43 years of age who owned 7.3 horses each. The average investment in horses totaled $31,658. The most frequently owned breed was the Quarter Horse (f=133), and the most frequently listed discipline was for breeding purposes (f=121). There were no relationships detected between gender or age and theft prevention practices or innovativeness. Positive relationships were found between the breeds of horses owned and the type of permanent identification of horses and the theft prevention practices used. Additionally, positive relationships were detected between breeding and riding discipline of horses, the types of permanent identification, the theft prevention practices used, and owner innovativeness.
APA, Harvard, Vancouver, ISO, and other styles
7

Berg, Sara E. "Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies /." Link to online version, 2006. https://ritdml.rit.edu/dspace/handle/1850/1647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Depuru, Soma Shekara. "Modeling, Detection, and Prevention of Electricity Theft for Enhanced Performance and Security of Power Grid." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341522225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Poole, Martin. "Progress towards the development and implementation of an unambiguous copper wire fingerprinting system." Thesis, Rhodes University, 2003. http://eprints.ru.ac.za/214/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mailley, Jennifer. "The prevention of mobile phone theft : a case study of crime as pollution : rational choices and consumer demand." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/9645.

Full text
Abstract:
This thesis makes two contributions to environmental criminology. The first contribution is a rational choice event model for mobile phone thieves. This is based on interviews with 40 mobile phone thieves. In addition, the deterrent effects of 23 designs of phone are assessed. Comparisons are made between the responses of offenders and non-offenders; and between experienced offenders and less experienced offenders. The results show that mobile phone thieves make discerning choices about which model of phone to steal at the point of theft. The factors affecting handset choice reflect Clarke s (1999) CRAVED characteristics. Mobile phone thieves are differentially deterred by a variety of design solutions, the most effective of which reduce the resale value of stolen handsets. In contrast with offenders, non-offenders are more easily deterred, and statistically significantly more deterred for five of the 23 designs presented in this thesis; do not appreciate the importance of resale value; and are not so aware of the possibilities for circumventing or neutralising security technology. The differences between offender and non-offender responses mean that offenders are arguably best placed to assess product use and misuse in the process of designing-out crime. The second contribution of this thesis is a Mobile Phone Theft Index which controls for phone availability in the absence of handset sales data. Mobile phone theft is arguably a form of pollution (Roman and Farrell, 2002) and can, therefore, be controlled using traditional pollution control instruments (Farrell and Roman, 2006). Informing the public of their risk of victimisation according to handset ownership would make security a marketable aspect of handset design, incentivising industry to decrease theft rates. Industry action to date shows evidence of obstructionism and pre-regulatory initiatives (Newman, 2004) meaning that a novel instrument such as the Index is necessary to alter the current status quo where industry costs UK society an estimated £1.2 billion per year (Mailley and Farrell, 2006).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Theft – Prevention"

1

Lyons, Donna. Auto theft prevention. Denver, Colo: National Conference of State Legislatures, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Torp, Jeffrey. Identity theft prevention program. Austin, Tex: AlexInformation, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weber, Thad L. Alarm systems and theft prevention. 2nd ed. Boston: Butterworth, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Identity theft. New York: Chelsea House, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

New Mexico. Governor's Organized Crime Prevention Commission. Auto theft report. [Albuquerque, N.M. (2501 Carlisle Blvd. N.E., Albuquerque 87110): the Commission, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kiesbye, Stefan. Identity theft. Detroit: Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Identity theft. Upper Saddle River, NJ: Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kiesbye, Stefan. Identity theft. Detroit: Greenhaven Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cargo crime: Security and theft prevention. Boca Raton: Taylor & Francis, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Black, Bryce N. Identity theft: Trends and prevention efforts. Hauppauge, N.Y: Nova Science Publishers, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Theft – Prevention"

1

Clack, Willie. "Livestock theft prevention." In Rural Crime Prevention, 205–19. 1 Edition. | New York City : Routledge, 2020. | Series: Routledge studies in rural criminology: Routledge, 2020. http://dx.doi.org/10.4324/9780429460135-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tajpour, Atefeh, and Mazdak Zamani. "Identity Theft and Prevention." In Information Security and Optimization, 25–42. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hayes, Read. "Vendor Theft and Error." In Retail Security and Loss Prevention, 25–28. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598546_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harkness, Alistair, and Jo-ann Larkins. "Technological approaches to preventing property theft from farms." In Rural Crime Prevention, 226–44. 1 Edition. | New York City : Routledge, 2020. | Series: Routledge studies in rural criminology: Routledge, 2020. http://dx.doi.org/10.4324/9780429460135-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hayes, Read. "Controlling Cargo Theft and Supply Chain Loss." In Retail Security and Loss Prevention, 29–32. London: Palgrave Macmillan UK, 2007. http://dx.doi.org/10.1057/9780230598546_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kwon, Taekyoung, and Hyeonjoon Moon. "Multi-modal Techniques for Identity Theft Prevention." In Lecture Notes in Computer Science, 291–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11527725_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mugellini, Giulia, Giang Ly Isenring, and Martin Killias. "Patterns of Theft and Fraud by Employees Against the Commercial Sector in Switzerland and in Italy." In Organized Crime, Corruption and Crime Prevention, 127–34. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01839-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sil, Shalini, Subhomoy Daw, and Arpan Deyasi. "Smart Intelligent System Design for Accident Prevention and Theft Protection of Vehicle." In Nanoelectronics, Circuits and Communication Systems, 523–30. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7486-3_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Varma, V. Brijendra, B. V. Kiranmayee, L. Ashwik Reddy, S. Sravan Kumar, and P. Sandeep Varma. "Smart Wireless Black Box with Intelligent Facial Recognition System for Prevention of Accidents and Theft of Vehicles Using Raspberry Pi Along with Sensors Based on IoT." In Learning and Analytics in Intelligent Systems, 381–92. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9293-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pratt, Lester Amos. "Embezzlement Controls for Business Enterprises." In Preventing and Detecting Employee Theft and Embezzlement, 253–90. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119205135.app1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Theft – Prevention"

1

Bhilegaonkar, Pushkar, Rupesh Patil, Anamay Belekar, Mohnish Gujarathi, and Shilpa Sondkar. "Fuel Theft Prevention System." In 2020 International Conference on Industry 4.0 Technology (I4Tech). IEEE, 2020. http://dx.doi.org/10.1109/i4tech48345.2020.9102689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zala, Dhruvi K. "Bike Security with Theft Prevention." In 2018 3rd International Conference on Inventive Computation Technologies (ICICT). IEEE, 2018. http://dx.doi.org/10.1109/icict43934.2018.9034252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chee Kyun Ng, Kong Seng Wee, Nor Kamariah Noordin, M. Iqbal Saripan, Raja Syamsul, and Azmir Raja Abdullah. "Theft prevention using wireless security system (WSS)." In 2008 IEEE International RF and Microwave Conference (RFM). IEEE, 2008. http://dx.doi.org/10.1109/rfm.2008.4897429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pachica, Archie O., Dhave S. Barsalote, Jessy Mae P. Geraga, Jhestine M. Ong, and Michael D. Sajulan. "Motorcycle theft prevention and recovery security system." In 2017 14th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). IEEE, 2017. http://dx.doi.org/10.1109/ecticon.2017.8096372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bakkar, Mahmoud, and Ammar Alazab. "Designing Security Intelligent Agent for Petrol Theft Prevention." In 2019 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2019. http://dx.doi.org/10.1109/ccc.2019.00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amarnath, R., N. Kalaivani, and V. Priyanka. "Prevention of power blackout and power theft using IED." In 2013 IEEE Global Humanitarian Technology Conference (GHTC). IEEE, 2013. http://dx.doi.org/10.1109/ghtc.2013.6713659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jog, Vivek V., Darshan Jain, Rohan Arora, and Badal Bhat. "Theft prevention ATM model using dormant monitoring for transactions." In 2013 IEEE Conference on Information & Communication Technologies (ICT). IEEE, 2013. http://dx.doi.org/10.1109/cict.2013.6558274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shakil, Md, Md Rashid, and Ajit B. Patil. "Automobile Theft Prevention Using 3D Gesture Key Fob and Cryptography." In 2015 International Conference on Computing Communication Control and automation(ICCUBEA). IEEE, 2015. http://dx.doi.org/10.1109/iccubea.2015.64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shah, Mahmood, and Romanus Izuchukwu Okeke. "A Framework for Internal Identity Theft Prevention in Retail Industry." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Shilpi. "Data theft prevention using user behavior profiling and decoy documents." In 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon). IEEE, 2017. http://dx.doi.org/10.1109/smarttechcon.2017.8358513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography