To see the other types of publications on this topic, follow the link: Theft – Prevention.

Dissertations / Theses on the topic 'Theft – Prevention'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Theft – Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ruppar, Carrie Aliene. "Identity theft prevention in CyberCIEGE." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FRuppar.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.
Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
3

Whitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.

Full text
Abstract:
3 pp.
The publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
APA, Harvard, Vancouver, ISO, and other styles
4

Whitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdullah. "Knowledge sharing processes for identity theft prevention within online retail organisations." Thesis, University of Central Lancashire, 2017. http://clok.uclan.ac.uk/23998/.

Full text
Abstract:
The occurrence of identity theft has increased dramatically in recent times, becoming one of the fastest-growing crimes in the world. Major challenges associated with identity theft related offences include problems of consumers with credit, such as: aggravation by debt collectors; rejection of loans; disturbance in normal lives such as reputation damage; and the psychological disruption of providing personal data to organisations and banks during the investigation. For these reasons, and with the ready access of identity thieves to the retail industry, this problem is acute in the online retail industry, yet there has been insufficient research undertaken in this domain. This research investigated knowledge sharing processes for identity theft prevention within online retail organisations. An analysis of how individual staff and teams share their knowledge for identity theft prevention in organisations is presented, which includes the investigation of existing barriers in knowledge sharing for identity theft prevention in organisations. A qualitative case study research approach, using the guiding framework proposed by Salleh (2010), was adopted and extended to improve knowledge sharing processes for identity theft prevention in online retail organisations. Three case studies were conducted with leading online retailers in the UK. Data collection included one-to- one semi-structured interviews, internal documents from the researched companies and external documents from various secondary sources. The researcher used the thematic analysis approach using the NVivo software tool and a manual coding process. The total number of interviews was 34 across 3 case studies, with each interview lasting between 45 and 75 minutes. The participants were selected according to their experience, knowledge and involvement in solving identity theft issues and knowledge sharing. Investigation of internal documents included email conversations, policy documents and internal conversations such as emails and memos from the researched companies. This study found that knowledge of identity theft prevention is not being shared within online retail organisations. Individual staff members are learning from their experiences, which is time-consuming. Existing knowledge sharing barriers within the organisations were identified, and improvements in knowledge sharing processes in the online retail industry of the UK using the extended framework are proposed. This research contributes to existing research by providing new insights into knowledge sharing for identity theft prevention. It extends an existing framework proposed by Salleh (2010) in the new context of knowledge sharing processes for ID theft prevention in the retail industry by simplifying the model and combining elements into a more coherent framework. The present study also contributes by investigating the online retail sector for knowledge sharing for ID theft prevention. The empirical research identifies the barriers to knowledge sharing for ID theft prevention and the weaknesses of knowledge sharing in online retail organisations relevant to ID theft prevention. Finally, this study provides managers with useful guidelines for developing appropriate knowledge sharing processes for ID theft prevention in their organisation, and to educate staff in effective knowledge sharing.
APA, Harvard, Vancouver, ISO, and other styles
6

Swaim, Pattrick Lee Jr. "Diffusion of the Texas Cooperative Extension's horse theft awareness and prevention initiative." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3279.

Full text
Abstract:
The primary purpose of this study was to identify the Horse Theft Awareness and Prevention Initiative (HTAPI) participants and the theft prevention practices used in Texas. The secondary purpose was to evaluate the educational effectiveness of the HTAPI on the first three of Kirkpatrick’s levels, namely learner satisfaction, knowledge acquired, and change in behavior. The third purpose was to examine relationships between the rate of adoption of HTAPI recommended practices and the following demographic variables: gender, age, equine discipline, number of horses owned, and size of investment in the equine business. Survey instruments were used to gather data. Due to sampling constraints, the Solomon four step research design method was modified by removing one group following Seger’s (1998). The sample groups consisted of a pre/only test group, pre/post test group, post/only test group minus the control pre/post test group. The pre/only sample group data was collected in Denton and Montgomery Counties and yielded 56 usable instruments. Using Dillman’s (2000) procedures, data from participants of the HTAPI programs were collected using two mailed survey instruments. One hundred ninety two participants of the 2004 Mare Foal, Basic Horse Management 101, and the Performance Horse workshops were mailed a post/only instrument; 96 were returned for a 49% response rate. Thirty two pre-test instruments were administered in Hopkins and Polk County and thirty days later these participants were mailed a post/only instrument. A response rate of 66% and 63% in the respective sample groups. The sample population can be described as mainly women (68.3%) 43 years of age who owned 7.3 horses each. The average investment in horses totaled $31,658. The most frequently owned breed was the Quarter Horse (f=133), and the most frequently listed discipline was for breeding purposes (f=121). There were no relationships detected between gender or age and theft prevention practices or innovativeness. Positive relationships were found between the breeds of horses owned and the type of permanent identification of horses and the theft prevention practices used. Additionally, positive relationships were detected between breeding and riding discipline of horses, the types of permanent identification, the theft prevention practices used, and owner innovativeness.
APA, Harvard, Vancouver, ISO, and other styles
7

Berg, Sara E. "Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies /." Link to online version, 2006. https://ritdml.rit.edu/dspace/handle/1850/1647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Depuru, Soma Shekara. "Modeling, Detection, and Prevention of Electricity Theft for Enhanced Performance and Security of Power Grid." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341522225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Poole, Martin. "Progress towards the development and implementation of an unambiguous copper wire fingerprinting system." Thesis, Rhodes University, 2003. http://eprints.ru.ac.za/214/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mailley, Jennifer. "The prevention of mobile phone theft : a case study of crime as pollution : rational choices and consumer demand." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/9645.

Full text
Abstract:
This thesis makes two contributions to environmental criminology. The first contribution is a rational choice event model for mobile phone thieves. This is based on interviews with 40 mobile phone thieves. In addition, the deterrent effects of 23 designs of phone are assessed. Comparisons are made between the responses of offenders and non-offenders; and between experienced offenders and less experienced offenders. The results show that mobile phone thieves make discerning choices about which model of phone to steal at the point of theft. The factors affecting handset choice reflect Clarke s (1999) CRAVED characteristics. Mobile phone thieves are differentially deterred by a variety of design solutions, the most effective of which reduce the resale value of stolen handsets. In contrast with offenders, non-offenders are more easily deterred, and statistically significantly more deterred for five of the 23 designs presented in this thesis; do not appreciate the importance of resale value; and are not so aware of the possibilities for circumventing or neutralising security technology. The differences between offender and non-offender responses mean that offenders are arguably best placed to assess product use and misuse in the process of designing-out crime. The second contribution of this thesis is a Mobile Phone Theft Index which controls for phone availability in the absence of handset sales data. Mobile phone theft is arguably a form of pollution (Roman and Farrell, 2002) and can, therefore, be controlled using traditional pollution control instruments (Farrell and Roman, 2006). Informing the public of their risk of victimisation according to handset ownership would make security a marketable aspect of handset design, incentivising industry to decrease theft rates. Industry action to date shows evidence of obstructionism and pre-regulatory initiatives (Newman, 2004) meaning that a novel instrument such as the Index is necessary to alter the current status quo where industry costs UK society an estimated £1.2 billion per year (Mailley and Farrell, 2006).
APA, Harvard, Vancouver, ISO, and other styles
11

Okeke, Romanus Izuchukwu. "The prevention of internal identity theft-related crimes : a case study research of the UK online retail companies." Thesis, University of Central Lancashire, 2015. http://clok.uclan.ac.uk/12124/.

Full text
Abstract:
Ranked the third biggest cyber security threats of 2013 by Forbes, Internal Identity Theft-Related Crimes (IIDTRC) leave countless victims in their wake, including online retail companies and consumers. With the rapid growth in the use of credit and debit cards in e-commerce, the online retail has been a key target for the IIDTRC perpetrators. IIDTRC involve the misuse of information systems (IS) by the dishonest employees to steal victims’ personal identifiable data. The crimes pose significant socio-economic impact and data security risks. In the context of online retail, relatively little research has been done to prevent IIDTRC. A few studies focus on situational-based IIDTRC prevention approach built on an independent use of software security. Others develop IIDTRC prevention frameworks in the context of generic e-businesses. The majority of the frameworks have little or no grounded empirical research. This research entitled the ‘The Prevention of Internal Identity Theft-Related Crimes: A Case Study Research of the UK Online Retail Companies’, attempts to bridge this research gap. It provides answers to two questions – what is the nature of IIDTRC in online retail companies and what framework can be used for IIDTRC prevention. This research set out three aims to answer the two questions. First, it provides understanding of causes, methods of carrying out and prevention of IIDTRC. Second, it extends a role-based framework (RBF) for the prevention of IIDTRC. Third, it evaluates the extent the RBF can be applied in the prevention of IIDTRC in online retail companies. A qualitative case study was used to achieve these aims. The empirical data were collected in the northwest of UK from 2011 to 2013. The field study was carried through archival analysis, semi-structured interview and participant observation. Organisational role theory (ORT) was used to guide the concept of a role-based framework (RBF) – a collaborative approach where the key components of management work in unison is required to prevent IIDTRC. The attributes of RBF were synthesised from the recommended IIDTRC prevention practices. The empirical evidence suggests that IIDTRC perpetrators in online retail companies are likely to be the top management and call centre employees. The findings suggest that online retail consumers’ credits/debits cards details are as much vulnerable to IIDTRC as the companies’ identities such as trade secrets and trademarks. Furthermore, the common methods used by the IIDTRC perpetrators include collaboration, collusion, infiltration and social engineering. Some of the IIDTRC prevention practices, of which the majority is software security, are implemented without considering the contribution of human-centred security based on management roles. In examining the contribution of the management roles in implementing Information Systems security practices, major challenges that are faced by online retail companies were identified. They include lack of resources, lack of management support and lack of IIDTRC prevention awareness training. This research concludes that an application of RBF can reduce the impact of the identified challenges. This was suggested by applying RBF in conducting IS security auditing in three online retail companies. The finding from the selected companies suggests that the RBF approach can maximise management performance in providing effective IIDTRC prevention practices. It provides better returns on cost, quality and time in the IS security auditing. It has an impact on management attitudes on preventing IIDTRC by clarifying and aligning their roles in implementing effective IS security auditing. There is heterogeneity of this effect across the companies suggesting that some are utilising the RBF approach while others are not. The finding confirms the plausibility of the RBF attributes. It suggests that the human-centred security play an integral role for effective internal data security in preventing IIDTRC. It suggests that it pays to use the collaborative management roles approach for implementing IIDTRC prevention practices. Furthermore, the use of the RBF approach can improve the effectiveness of the online retail companies in preventing IIDTRC. The findings suggest that benefits may accrue from the RBF approach when supplemented with a collaborative IS auditing. The benefits depend on the level of management IT skills, their perception of their roles, top management support and the organisational operations. This research contributes to the literature in identity theft prevention in online retail. To IS security practitioners, it identifies the data security challenges and IIDTRC prevention practices. To theory, it extends a role-based framework for IIDTRC prevention. To the emerging research in the digital economy, it puts forward as a robust starting point for further related works in cyber security, cybercrimes prevention and criminology.
APA, Harvard, Vancouver, ISO, and other styles
12

Chavez, Nicholas Marshall. "CAN WE LEARN FROM HACKERS TO PROTECT VICTIMS?" CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/690.

Full text
Abstract:
This project examines the protection methods suggested by hackers to guard against online victimization through the lens of Situation Crime Prevention. Data were collected from 85 webpages representing three categories of electronic communications: forums, blogs, and fan pages. The goal of this project was to identify which of the 25 opportunity reduction techniques the hacking community recommend most often, as well as, what level of expertise was associated with the suggested security measures. Results indicate that the technique most recommended by the hacking community was to remove targets with 27% of the total codings. From the results three themes were found: (1) most recommendations are such that implementing the strategies would serve to protect against opportunistic, low-skilled attacks; (2) most recommendations could be considered routine precautions, that when bundled, would secure most people against cyber-theft; and finally, (3) the Situational Crime Prevention framework was not fully realized because much of cyber-theft does not involve direct victim-perpetrator interactions. From these three themes policy recommendation and limitations are presented as well as avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
13

Megaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.

Full text
Abstract:
E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
APA, Harvard, Vancouver, ISO, and other styles
14

Bila, Hlengani Phanuel. "An assessment of application of intelligence-driven investigation in the combating of organised vehicle theft in Thohoyandou Cluster." Thesis, University of Limpopo, 2015. http://hdl.handle.net/10386/1552.

Full text
Abstract:
Thesis (Ph. D. (Criminology)) -- University of Limpopo, 2015
The research concerned with the aim of this study, was to assess the appli-cation of intelligence-driven investigation in combating organised motor vehicle theft. The strategic intelligence plan, information sharing and understanding of or-ganised vehicle theft, are some of approaches which will assist in dealing with the challenge of the illegal sale of vehicles and vehicle parts. There is indeed a need to address police corruption, if the battle against vehicle theft is to be realised. The objectives of this study were the following: to explain the strategic intelli-gence plan for investigating motor vehicle theft; to evaluate whether investiga-tions of organised motor vehicle theft in Thohoyandou cluster are intelligence-driven; to assess if the cluster uses intelligence offender profiling in investi-gations; to explore how intelligence-driven investigation assists in information sharing; and, to make recommendations for the improvement of intelligence-driven vehicle theft investigation. The researcher wanted to apply new research knowledge, in order to develop good practice in the field. This has been done by recommending new proced-ures to enhance performance and to improve the ways and means of combating organised vehicle theft. KEY TERMS Intelligence-driven investigation; strategic intelligence; intelligence cycle; crime investigations; modus operandi; offender profiling; organised crime; systems theory; motor vehicle theft; information sharing.
APA, Harvard, Vancouver, ISO, and other styles
15

Wilson, Belinda R. "The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3074.

Full text
Abstract:
Identity theft and credit and bank card fraud is increasing in America and worldwide. Given the current statistics of its prevalence and practices around the world, many in government are starting to take critical notice due to its impact on a nation’s economy. Limited amounts of research have been conducted regarding the practices of applying the Routine Activities Theory (Cohen & Felson, 1979) to better equip store managers in understanding the critical need for capable and effective point of sale guardianship for in-store prevention of credit or bank card fraud due to identity theft. This research has used qualitative observational studies to investigate the presence of or lack of capable guardianship at point of sales transactions in large department stores where a majority of in-store credit and bank card fraud loss occurs. Findings conclude an overwhelming lack of capable guardianship at retail store POS terminals.
APA, Harvard, Vancouver, ISO, and other styles
16

Ashby, M. P. J. "Using crime science for understanding and preventing theft of metal from the British railway network." Thesis, University College London (University of London), 2016. http://discovery.ucl.ac.uk/1507833/.

Full text
Abstract:
Metal theft has emerged as a substantial crime problem, causing widespread disruption and damage in addition to the loss of metal itself, but has been the subject of little research. This thesis uses the paradigm of crime science to analyse the problem, focusing on thefts from the railway network in Great Britain. Two theoretical concepts are used: crime scripts and the routine-activities approach. Police-recorded crime and intelligence data are used to develop a crime script, which in turn is used to identify features of the problem a) analysis of which would potentially be useful to practitioners seeking to understand and prevent metal theft, and b) for which sufficient data are available to make analysis practical. Three such features are then analysed in more detail. First, spatial and temporal distributions of metal theft are analysed. Metal theft appears to differ from other types of acquisitive crime in ways potentially useful for prevention, for example in clustering outside (but close to) cities, and in exhibiting significant repeat victimisation over a longer period than found for other crimes. Second, the potential crime-prevention value of the market-reduction approach is analysed by testing for clusters of thefts close to the locations of scrap-metal dealers. Scrap-yard locations are found to be a significant predictor of local thefts, controlling for metal availability, area accessibility, and density of population and industry. Third, the involvement of organised crime groups (OCGs) in metal theft is tested. Due to the difficulty of defining and measuring organised crime, multiple approaches are used: all show OCG involvement to be rarer than official estimates previously suggested. The implications of these findings for practitioners are discussed. The thesis also considers the relevance of the results for the use of crime science and the analysis of OCGs.
APA, Harvard, Vancouver, ISO, and other styles
17

Bundy, Barbara E. "Preventing looting and vandalism of archaeological sites in the Pacific Northwest." view abstract or download file of text, 2005. http://wwwlib.umi.com/cr/uoregon/fullcit?p3181086.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2005.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 264-281). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
18

Axelsson, Henrik. "Kriminalitetens geografi : vardagsbrottslighetens spatiala fördelning i Borlänge." Thesis, Högskolan Dalarna, Kulturgeografi, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:du-3352.

Full text
Abstract:
The aim of this thesis is to describe and analyze the geographical distribution of everyday criminality in the town of Borlänge during the year 2002 and to analyze which measures to be taken in the physical social planning to decrease this everyday criminality there. The term everyday criminality is here to be understood as those categories of crime that appear most frequently in the records of reports to the police every year. Here two kinds of crime have been in focus, thefts from cars and office burglary.In fulfilling this aim two main questions have been answered. The first one is how the everyday criminality was distributed geographically in the town of Borlänge during the year 2002. The second one is which measures to be taken in the physical social planning to decrease this everyday criminality in the town of Borlänge.In order to answer the first question a spatial autocorrelation analysis, Local Moran LISA has been used. This method is based on the measurement Moran´s I and shows the spatial autocorrelation for every single location. To answer the second question three different theories of crime prevention through environmental design have been studied and applied in the analysis. These are Jane Jacobs’ ideas about ”the living city”, Oscar Newman´s ideas about ”defensible space” and Ronald V. Clarke´s theories about crime prevention.The major conclusions that can be drawn from this thesis are that the risk of being exposed to thefts from cars, during the analyzed time period, was highest in Centrum and Hagalund and their surroundings. The lowest risk of being exposed to this type of crime was found in Domnarvet and Islingby, during the year 2002. The highest risk of being a victim of the crime office burglary was found in Hagalund and its surroundings and in the single area of Kvarnsveden. The corresponding lowest risk was found in Lergärdet and its surroundings and in Norra Backa and Kupolen. The measures that should be taken in order to decrease these types of criminality can be divided into overall changes and place-specific changes. When it comes to the crime thefts from cars a more attractive central business district, a better view of parking lots from nearby buildings, dividing of larger parking lot zones into smaller ones, migration of hidden parking lots and stronger access control to parking lots where problems with this kind of crime have occurred have been suggested as overall changes. The corresponding place-specific changes are to remove vegetation that is blocking the view, better lighting and to put up signs with information about increased risk of exposure to crime at parking lots with the most problems. To decrease the amount of office burglaries overall changes as to create a better view of the area from nearby surroundings, move bigger office compartments or divide them into smaller units, rebuild characteristic buildings and increase security by strengthening the access control to offices with these kinds of problems could be useful. Finally there are possibilities to decrease office burglary by using place-specific measures as surveillance cameras combined with signs containing information about these, high fences and better lighting around the buildings where a higher risk of being exposed to this kind of criminality is present.
APA, Harvard, Vancouver, ISO, and other styles
19

Nkwari, Patrick Kibambe Mashoko. "Cattle monitoring and theft prevention system using ZigBee and WiFi." Thesis, 2015. http://hdl.handle.net/10210/14566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

CHU, WU HSIN, and 吳新竹. "Bicycle Theft and Situational Crime Prevention: A Case Study ofTaipei City." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/60566525548384305755.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
98
The purpose of the study is to analyze the factors related to bike theft through examining bike theft statistics. The cases will be systematically examined under the characteristics of victims, bicycles, location, and time. Moreover, in order to set up the best strategy for decreasing the rate of bike theft, the study will identify the characteristics of the prevention bike theft situational factors and contrast the difference between the result of the study and the bike theft prevention strategies of the government. The study analyzed the data of bike thefts based on the reports of the Taipei City Police Department Criminal records from 2007 to 2009, a total number of 718 cases. In addition, the author observed the features of the crime prevention programs at the two stolen bike hot spots in Taipei. Four points were found in the study including: (1) the bikes are often stolen during the day time and at the MRT stations, entertainment venues, or near schools; (2) men, office workers or housewives are most often the people to report a stolen bike; (3) most thieves steal bikes with their bare hands and sell the bikes immediately; (4) most bikes thefts occur due to opportunity, as long as thieves have easy access to poorly secured bicycles. According to the study result, the author recommends bike owners, bike operators, police and government use bike theft prevention strategies that emphasize reducing situational factors.
APA, Harvard, Vancouver, ISO, and other styles
21

HUANG, CHIH-YUAN, and 黃志源. "Campus Theft and Situational Crime Prevention in Taipei City High Schools." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/39687202428114226249.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
98
A school campus should be a delightful learning environment; however, theft on campus causes not merely the loss of school property and raises doubts about school security but also perhaps creates distrust among students in the longer term. Therefore, this study aimed to examine, from a situational prevention perspective, the current problem of theft on campus. Using a questionnaire, with appropriate survey sample of 70 public and private schools in Taipei, I discovered that high school campus theft averages 11 to 30 cases in a semester and that most remain unsolved. Second, there are certain activities in the weekday, but o fixed time or route for preventive patrol. Third, the optimal and economic solution is to lock the classroom doors. Fourth, the less pressure or frustration students have, the more effective the prevention measure. From the study, the following are recommendations for all levels of education decision-making units, schools, teachers and students: 1.education authorities and schools need to increase the budget for school security, and to enhance the management of school safety. 2.Education authorities and schools need to examine why the campus is not informed of the reason for the theft, and to enforce the school safety notification system. 3.Education authorities need to focus on the the criminogenic factors in high-risk crime in schools, to promote crime prevention and to improve the effectiveness of crime control. 4.Increase students’ adversity quotient . 5.Campus security practices need to be reviewed Key word: high schools, campus theft, situational factors
APA, Harvard, Vancouver, ISO, and other styles
22

Coetzee, Ben. "A case study of non-ferrous metal theft at a selected mine in South Africa." Diss., 2013. http://hdl.handle.net/10500/13332.

Full text
Abstract:
The threat posed by non-ferrous metal theft to industries in South Africa is substantial but is also regarded with indifference. A reason for this view may be that the criminal act is ordinarily not accompanied by violence and the target of the crime is an object that is far removed from the vicinity of the majority of South Africans. Non-ferrous metal theft may sometimes even be erroneously termed a victimless crime. This study endeavours to shed light on the complexities of non-ferrous metal theft and the industrial dangers that may be suffered if this crime is not eradicated. A case study from the mining industry was used to examine the nature and extent of non-ferrous metal theft. A mixed methods approach was followed in terms of which qualitative and quantitative research was done sequentially to provide the best possible representation of the situation. The participant allowed access to data over a six-year period as well as access to mine employees for interviews to assist with understanding the safety and security measures that the mine put in place to protect its workforce. This information led to another realisation, namely that if non-ferrous metal thieves cut an electricity supply line that is critical for life support and transportation in the mine, mineworkers may succumb to the harsh conditions underground. It also became evident that the police and the criminal justice system must develop a better understanding of the seriousness of non-ferrous metal theft. If this does not happen in the near future, managing the consequences of nonferrous metal theft at South African mines will become a mammoth task. Such mines and other industries affected by non-ferrous metal related theft must collaborate with each other and the police in order to understand the nature of the crime and to ensure that the prosecution of the perpetrators is handled properly. These industries should also subscribe to a pragmatic approach to crime prevention whereby various components from different crime prevention strategies are used to address the issues being experienced and whereby a unique crime prevention model for each industry and mining site can be developed.
Police Practice
M.A. (Policing)
APA, Harvard, Vancouver, ISO, and other styles
23

Maluleke, Witness. "Perspectives on stock theft prevention in the Giyani policing area of Limpopo Province." 2014. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001402.

Full text
Abstract:
M. Tech. Policing
Residents in the Giyani Policing Area of Limpopo Province are witnessing a scourge of stock theft, with the inhabitants of surrounding communities living in fear and isolation for their livestock, and the protection and preservation, thereof. This study sets out to carefully analyse, and evaluate, the extent of stock theft in the Giyani Policing Area, taking all contributory factors into consideration, determining the relationship between the Giyani South African Police Service Stock Theft Unit and livestock owners, as well as looking at existing strategies (and their effectiveness) in response to stock theft crimes in that area.
APA, Harvard, Vancouver, ISO, and other styles
24

Bechan, Upasna. "Towards a framework for securing a business against electronic identity theft." Diss., 2008. http://hdl.handle.net/10500/1304.

Full text
Abstract:
The continuing financial losses incurred by individuals and companies due to identity information being phished are necessitating more innovative approaches to solving the problem of phishing attacks at the company level. Security standards are developed by respected experts in the profession and are widely accepted in the industry. The purpose of this study was to investigate whether a standard can be adapted to develop a framework that may guide companies in determining how to protect themselves against phishing attacks. A qualitative approach using design research as the methodology was used during the research. The data collection took place by means of a literature survey and semi-structured interviews. The artefact developed was a phishing-prevention framework based on the ISO/IEC 17799 standard, and the evaluation thereof took place through test cases. The findings communicated to the managerial audience was a set of recommendations as a further investment in their security protection against phishing attacks; the findings communicated to the technical audience was the successful adaptation of an existing security standard to produce a usable framework. Further research initiatives should extend the types of test cases that the phishing-prevention framework was evaluated against, and explore the use of tools for determining compliance with the framework.
Theoretical Computing
M. Sc. (Information Systems)
APA, Harvard, Vancouver, ISO, and other styles
25

Rafolatsane, Api. "The role of police and civil society in combating cross-border stock theft." Thesis, 2013. http://hdl.handle.net/10539/13110.

Full text
Abstract:
Thesis (M.M. (Security))--University of the Witwatersrand, Faculty of Commerce, Law and Management, Graduate School of Public and Development Management, 2013.
Stock theft is a national crisis in, across and throughout Lesotho. This fact has led the Lesotho Mounted Police Service to place stock theft management under the serious crimes unit. In the mid-1990s stock theft reached epidemic proportions in the southern district adjoining the Eastern Cape Province of the Republic of South Africa. This problem still persists and has lately turned very violent and deadly in the Qachas’nek District. However, the Quthing district has seen a relative decrease in the rate of stock theft in the mid-2000s. The purpose of this study was to investigate the factors and strategies used in both Quthing and Qachas’nek districts to curb cross border stock theft. These factors and strategies are then compared to establish why crossborder stock theft is decreasing in Quthing while it escalates in Qachas’nek. The main finding of the research is that the Quthing community adopted the strategy of community policing and were trained on crime prevention while the opposite is true in the Qachas’nek district. A community policing strategy has not been adopted in Qachas’nek. It has also been established that training in community policing and crime prevention has to be offered to police officers and the members of crime prevention committee members. Lastly, the study revealed that laws governing stock theft have to be amended and the crime prevention committees should be better empowered
APA, Harvard, Vancouver, ISO, and other styles
26

Pretorius, William Lyon. "A criminological analysis of copper cable theft in Gauteng." Diss., 2012. http://hdl.handle.net/10500/10598.

Full text
Abstract:
This dissertation focuses on the phenomenon of copper cable theft within the Gauteng Province of South Africa. Data was collected from literature sources as well as from security professionals combating copper theft. There are five primary objectives in this research: 1. To explore and to describe the extent and the impact of copper cable theft. 2. To gain insight into the profile and the modus operandi of the offender. 3. To evaluate current intervention measures used to combat the copper cable theft. 4. To describe the general factors limiting the success of combating copper cable theft. 5. To recommend probable intervention measures with which to combat copper cable theft. Semi-structured interviews were conducted with responsible security officials of victim stakeholder groups in Gauteng. It was established that copper cable theft is currently a very serious crime that deserves both attention and quick intervention before it does irreparable damage to the utility infrastructure of Gauteng, in particular, and in fact to all these infrastructures in South Africa.
Criminology
M.A. (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
27

Leab, Abigail. "The saying and the doing: a survey of security and theft prevention measures in U.S. archives." Thesis, 1998. http://hdl.handle.net/2429/7935.

Full text
Abstract:
Although the principles and model practices of archival security are well known in the United States having been codified by the Society of American Archivists in the 1970s, little is known about archives' actual policies and their implementation. This study attempts to determine whether there is a dichotomy between principles and practice in the area of archival security. Analysis of the genesis of the SAA Archival Security Program and of its components (including the Register of Lost or Stolen Materials, the newsletter, the consultancy service, the model legislation), especially Timothy Walch's standard setting 1977 manual, as well as other historical events such as the Oberlin Conference on Theft not only illuminate the ideal principles with which to compare practices, but also reveal the reactive nature of the field. Examination of related literature from 1977 to the present demonstrates both trends concerning the topic and the need to make it part of everyday archival functions rather than debating whether it is part of disaster planning or preservation. It also establishes the contributions to the topic of archival security made by such activists as Philip P. Mason, Timothy Walch, Gregor Trinkaus-Randall and Richard Strassberg. The results of a questionnaire focusing on handling of materials and patrons demonstrates the gulf between the real and the ideal in various types of archives and examines how lack of staffing, budget and knowledge contribute to this gap. Finally, methods and practices are suggested for improvement of security awareness and methods. The willingness of the SAA to take a leadership role and to update of the components of the original Archival Security Program using new technology (such as the Internet) to create a centralized source of information for archivists struggling with balancing access and security is key. The work already started by the newly re-established SAA Security Roundtable needs to be built upon by the SAA's devoting financial and organizational support in order to make archival security a proactive and effective field. If that were to happen, the principles and the practice, the saying and the doing, could then become synonymous.
APA, Harvard, Vancouver, ISO, and other styles
28

Morodi, Lebogang Richard. "Juvenile perceptions of shop theft in the Mabopane area." Diss., 2004. http://hdl.handle.net/10500/1396.

Full text
Abstract:
This research is a exploratory and descriptive study based on juvenile's perceptions with regard to shop theft. Secondary data sources were consulted to supplement the empirical data collected by means of a comprehensive questionnaire. Five hundred learners from grades 10, 11 and 12 in Mabopane were selected for the completion of the questionnaires. Shop theft was further elucidated by the application of criminological theories to explain research findings by highlighting their relationship with shop theft. Main research findings established that there are significant statistical differences with regard to the learner gender, age and grade as far as their views on shop theft were concerned. Recommendations based on the findings include teaching Criminology at secondary schools, the development of an anti shop theft youth oriented crime prevention program, shop theft educational and awareness programmes, and shoplifter offender prevention programs.
Criminology
M.A. (Criminology)
APA, Harvard, Vancouver, ISO, and other styles
29

Horn, Riana Elizabeth. "A pro-active approach to curb asset theft at a South African mine." Thesis, 2012. http://hdl.handle.net/10500/6039.

Full text
Abstract:
The South African mining industry has not been shielded from the criminal threat the country faces. In this case study, the nature and extent of asset theft at one of the largest mining companies in South Africa is analysed. The crime prevention strategy adopted by the mine to curb asset theft was studied over a period of five years. This involved a survey of the views of the security managers on the effectiveness of the strategy implemented by the mine. Against the background of the South African Government’s broad description of the crime prevention approach adopted by the country, the researcher explored whether it would be practicable to implement an integrated crime prevention strategy – encompassing situational, social and law enforcement crime prevention approaches on primary, secondary and tertiary level – at the participating mine in order to curb asset theft.
Police Practice
M. Tech. (Policing)
APA, Harvard, Vancouver, ISO, and other styles
30

YEH, HSIEN-WEI, and 葉憲威. "Investigating Car Theft Prevention and Investigation from the Perspective of Game Theory: The Case of Pingtung County." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3tyxbf.

Full text
Abstract:
碩士
國立高雄大學
高階法律暨管理碩士在職專班(EMLBA)
106
Since ancient times, theft has been among the types of criminal behaviors abhorred by the public; and now, with the occurrence of auto theft, a single incident can easily result in a relatively high loss, frequently ranging anywhere from 100,000 to over 1 million NTD. Thus, this type of activity is often the source of public complaint. Since auto theft prevention and investigation methods are specific to a given region, the findings of municipalities might not be applicable to counties and cities; likewise, conclusions made by one county might not even have application to a neighboring one. Pingtung County is located in the most southern end of Taiwan, with cities and towns largely dependent on agriculture and tourism. In comparison with metropolitan areas, lifestyle in Pingtung County is quite simple; but as a result of this, it has also established its own regional pattern of criminality. Most of the existing studies related to the prevention and investigation of auto theft are conducted according to traditional theories of criminology. However, along with the technological developments, criminals have also innovated their techniques – resulting in a battle of the wits between law enforcement and perpetrators. This study, therefore, attempts to employ game theory in combination with traditional methods of criminal analysis on auto theft according to the variables of participants, actions, cognitions, results, and preferences. This is done to analyze past investigations and further develop methods of prevention and investigation more in-tune with modern times, while also combining the unique attributes of Pingtung County to provide recommendations for prevention and investigation that are suitable for local application.
APA, Harvard, Vancouver, ISO, and other styles
31

Štěpánová, Petra. "Majetková kriminalita a její prevence." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-368793.

Full text
Abstract:
The topic of this thesis is property criminality and its prevention, the most essential part of the general criminality, which is still actual and often discussed thema. The work is divided into two main parts, the theoretical part and the special part. The theoretical part at first defines the term of property criminality from the perspective of the criminal law and the criminology, then it analyse the phenomenology of the property criminality, its offenders and the issue of the punishments. In the end of this chapter is in outline described the possible next course of the property criminality in the next three years on the basis of using the technique called time series analysis. Subsequently the work dedicates to the causes of the property criminality and its control with the emphasis on the crime prevention. The work detailed deals with the situational crime prevention, which plays very important role of the property crime prevention. Then is also introduced one of the new criminological theories occupied of the environmental criminology and the possibilities of its practical utilization by taking preventive measures. In the last chapter of the theoretical part is described the german criminal law legislation of the property criminality and its phenomenology, which is compared to the...
APA, Harvard, Vancouver, ISO, and other styles
32

Du, Plessis Willem Jacobus. "Misdaadvoorkomingsmodel vir motorvoertuigdiefstal." Diss., 1992. http://hdl.handle.net/10500/16697.

Full text
Abstract:
Text in Afrikaans
Die aard en omvang van motorvoertuigdiefstal in Suid-Afrika, het die ondersoeker aangespoor om 'n studie van die verskynsel soos dit in die Pretoria-Sentraal polisiestasiegebied voorkom, te loods. Data wat uit die dokumentere studie van gebeure ingesamel is, is rekenkundig gekwantifiseer en het besondere misdaadpatrone wat betrekking het op motordiefstal aan die lig gebring. Dit het tot die formulering van 'n multidissiplinere misdaadvoorkomingsbestuursmodel bygedra. Vanwee die erns van die verskynsel en die ekonomiese implikasies wat dit meebring, moet daar op 'n voortdurende grondslag navorsing uitgevoer word ten einde metodes te verskaf om die omvang van motorvoertuigdiefstal te verminder. Die owerheid moet 'n belangrike rol speel in die oplossing van die probleem.
The nature and extent of motorvehicle theft in South Africa encouraged the researcher to pilot a study into the phenomenon as it manifests itself at the Pretoria-Central police station area. Data gathered, in a documentary study of events, has been arithmetically quantified and reveal particular crime patterns relating to motorcar theft. This contributed to the formulation of a multidisciplinary crime prevention management model. Due to the seriousness of the phenomenon and the economic implications it causes, in depth research needs to be undertaken on a continuous basis to establish means to reduce the extent of motorvehicle theft. The authorities should play an important role in resolving the problem.
Criminology and Security Science
M.A. (Kriminologie)
APA, Harvard, Vancouver, ISO, and other styles
33

Mathebula, Esewu Mxolisi. "Prevention of theft of official vehicles of the South African National Defence Force (SANDF) in the Gauteng Province." Diss., 2014. http://hdl.handle.net/10500/14140.

Full text
Abstract:
The South African National Defence Force (SANDF) was formed in 1994 after the integration of different “defence forces” into one large force. The sole existence of the SANDF is to protect the borders of the Republic of South Africa and its inhabitants. Resources such as vehicles make it easier for the SANDF to conduct mobile patrols and other operations to ensure that the organisation is always combat-ready. Motor vehicle theft is a crime that affects both individual citizens and organisations in South Africa; the SANDF is not immune to the crime. Many SANDF motor vehicles are stolen almost every day, and in most cases, these vehicles are taken without a trace. While there are security measures in place aimed at preventing theft of SANDF vehicles but these methods have proven futile. A literature review formed the basis of the study. Once the main theory and ideologies were identified, unstructured interviews were undertaken to gather information from various stakeholders. Observations were also conducted to determine behavioural patterns within military bases/units with regard to the parking of SANDF vehicles, even when the vehicles were parked in urban settings. Essentially, there is a problem regarding the security of SANDF vehicles and also the security within military bases / units. This study indicated that the SANDF loses vast amounts of money due to motor vehicle theft in Gauteng Province. The findings also revealed that the current vehicle security measures are outdated, ineffective and inadequate in preventing SANDF vehicles from being stolen. The recommendations are that the SANDF must invest more of its budget on vehicle security, rather than continuing with fruitless and monetary expenditure by conducting Board of Inquiries (BOI) or lengthy investigations in an attempt to relocate stolen vehicles or to determine how a particular vehicle was stolen. The SANDF requires a comprehensive system that should prevent the theft of its vehicles, as well as curbing the misuse of vehicles which ultimately renders SANDF vehicles as easy targets.
Police Practice
M. Tech. (Policing)
APA, Harvard, Vancouver, ISO, and other styles
34

Lee, Hsien-Tung, and 李献同. "A Study On Effectiveness Of Auto Theft Prevention With ID On Auto Major Parts – A Case In Taoyuan County." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/49844116254045001381.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
100
In Taiwan, there’s a large number of cars, and it has almost become a household essential transport. Due to geographical and social factors, the lack of domestic automobile personal parking space, and the auto parts needs of the car repair workshop and used car dealers, resulting in the development of a considerable number of illegal car factories, and disposal of stolen goods smoothing, so car theft is very serious in the early years. The average every day over one hundred cars are stolen. In order to effectively reduce the incidence of car theft cases, police units have been taken in the past many project of automobile anti-theft measures, and to strengthen the investigation of the stolen vehicle. One of the car anti-theft measures by the National Police Administration announced in 2007, is the “Regulations of specific parts additional anti-theft identification code in passenger cars, small vans, small trucks and heavy motorcycle” , commonly known as auto marking. The regulations mandatory since October 2007, all new vehicles to apply for a license or imported by agents, must be at least fifteen components on additional anti-theft ID code. In this paper, the concept of rational choice theory, routine activity theory and situational crime prevention as a basis for auto theft information to each branch of the Taoyuan area, explore the effectiveness of the car theft rate and theft clearance rate after Compulsory Automobile mark identification code, and discuss the interest spread and crime may be caused by the transfer situation. The results showed that the new vehicles with additional anti-theft ID code is indeed caused by the transfer of the subject of crime. Due to the expectations of the thief, so the act of stealing, especially older vehicles with no ID code, resulting in increase the rate of car theft in short-term. But in the long-term, the auto marking does effectively reduce the rate of car theft, and result in greater impact than other anti-theft strategies during the same period. It is noteworthy that this study also found that the auto marking does not help the police car theft clearance rate apparently. Based on the findings, this study suggests that to prevent car theft should continue to "strengthen the subject matter" and "to reduce the disposal of stolen goods channel" to proceed, and combined with the use of anti-theft devices, the security of the parking areas, and the support of community relationship. Through various measures to discourage thieves motivation, we can achieve the purpose of reducing theft crime.
APA, Harvard, Vancouver, ISO, and other styles
35

Rytina, Marek. "Majetková kriminalita a její prevence." Master's thesis, 2019. http://www.nusl.cz/ntk/nusl-397151.

Full text
Abstract:
Property criminality and its prevention Bicycle theft in the context of general property criminality Abstract Property criminality is a very serious social pathological phenomenon. In the long run, it accounts for the largest share of total crime by far. Property offenses are the most numerous and also represent the largest amount of police work. Bicycle theft is a common property offense. This diploma thesis deals with both of these phenomena, considering the thefts of bicycles in the context of general property crime. Both phenomena are defined and evaluated in terms of statistical indicators. Here it mainly examines the state and dynamics of both phenomena. In the area of bicycle theft, there are additionally evaluated other statistical data such as theft detection, data on prosecuted persons and the proportion of repeat offenders in committing this type of offense. Subsequently, the causes of property crime are investigated and the causes of bicycle theft are evaluated. The socio-historical context is outlined and then the motives of the perpetrators to commit property offenses and specifically theft of bicycles are analyzed. Much of this thesis is aimed to criminal prevention. Firstly, the thesis describes the theoretical bases, which divide crime prevention in terms of content into social, situational...
APA, Harvard, Vancouver, ISO, and other styles
36

Mokhuane, Seadimo Joseph. "A security risk management approach to the prevention of theft of platinum group metals: case study of Impala Platinum Mines and Refinery." Diss., 2016. http://hdl.handle.net/10500/22196.

Full text
Abstract:
Text in English
The purpose of this study was to establish the vulnerabilities of the security control measures that are being used at Impala Platinum mines and refinery to prevent the theft of Platinum Group Metals (PGMs). It is important to ensure that the security control measures in place are effective and efficient in preventing the occurrence of such theft. The research examined the security risk management approach to the prevention of theft of PGMs and the causes of theft of PGMs by organised crime syndicates operating in South Africa and abroad. The study found that Impala Platinum employees, in collusion with contractors and members of mine security services, are involved in the theft of PGMs. To achieve the goals and objective of the research study, effective security control measures were identified that will help Impala Platinum mines and refinery to overcome the risks and challenges related to the theft of PGMs.
Security Risk Management
M. Tech. (Security Management)
APA, Harvard, Vancouver, ISO, and other styles
37

HUANG, CHING-YAO, and 黃靖堯. "Study to assess the effectiveness of the police investigation motorcycle theft prevention measures - in New Taipei City Police Bureau as an Example." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/93004328538854412449.

Full text
Abstract:
碩士
銘傳大學
社會與安全管理學系兩岸關係與安全管理碩士在職專班
104
This research focuses on discussing whether the investigative and preventive measures against scooter theft exerting impacts on scooter theft incidences and detection rate and evaluating the relevant investigative and preventive measures carried out by police departments over the years. This research is conducted by interviewing the executors and organizers of investigative and preventive measures against scooter theft and analyzing the interview results to find out the best solutions for investigating and preventing scooter theft and then putting forward associated recommendations expecting to reduce scooter theft incidences and improve the detection rates. It is also hoped that the hardened thieves fail to pilferage with the most widely-used scooters because of the constant rises of burglar ability of themselves and ultimately drops down the scooter theft incidents. The research results are shown as followings: 1. The impacts investigative and preventive measures exerting on the scooter theft incidences and detection rates: (1). The scooter theft incidences decrease continuously. (2). The importance police bureaus attach to investigative and preventive measures has an effect on detection rates. 2. Effectiveness evaluation of investigative and preventive measures: (1). Effective investigative and preventive measures: 1). Intensify the efforts in mopping up the vehicles and bicycles. 2). Those scooters released over five years should apply for temporary examination when proceeding transfer. 3). The manufacturers are required to replace engine module on a regular basis. 4). Scooter license plate branding. 5). Advocate locking the scooters with wheel locks. (2). Those invalid and scrapped scooters at present are still necessary to be applied with investigative and preventive measures: 1). Investigate and seize those places for disposing of stolen scooters. 2). Inspect modified scooters. 3. The implementary challenges and experience of police: (1). The public are unwilling to be cooperative. (2). Complex duties and items. (3). With the stereotyped investigative and preventive contents as a change in form but not in content. (4). Insufficient inspection abilities or police forces. (5). Without relevant legislation in inspecting places for disposing of stolen scooters.
APA, Harvard, Vancouver, ISO, and other styles
38

FANG, DI, and 方迪. "Study of applying the integration of GSM/GPS and a battery management system to the traffic monitoring and car theft prevention of electric vehicle." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/ng55un.

Full text
Abstract:
碩士
聖約翰科技大學
資訊與通訊系碩士班
104
This paper presents a vehicle traffic monitoring system using a set of Microchip microcontroller which integrated global system for mobile communications (GSM), global positioning system (GPS), and battery management system (BMS). This system consists of two parts: The first part is the electric vehicle battery management system. This system can manage the conditions and restrictions of battery charging and discharging as well as the batteries temperature. This can protect the batteries and extend the batteries life. The second part is the traffic monitoring system for transmission. Using the SMS of GSM function and GPRS mobile network function, the location data, the health of the battery, and other environmental information are returned to the server database. Furthermore, Google Map is used to monitor the vehicle and to allow users to be up to date with the electric car’s condition. In addition, when the electric car is stolen, SMS can be used to alert the vehicle traffic monitoring system and command it to turn off the electrical power supper system of the stolen car. The vehicle can also be located using the web database.
APA, Harvard, Vancouver, ISO, and other styles
39

Lebeya, Seswantsho Godfrey. "Organised crime in the Southern African development community with specific reference to motor vehicle theft." Diss., 2007. http://hdl.handle.net/10500/1621.

Full text
Abstract:
International police co-operation is a recipe for success in the fight against transnational organised crime. Such cooperation has never been without challenges, especially in the light of disharmonious national laws. SARPCCO has made promising advances towards the elimination of blockages which hamper police cooperation. The joint, bilateral, simultaneous operations which are continuously carried out and the transferring of skills through training are exemplary to the rest of the world. SARPCCO is, however, struggling to make serious inroads into the organised motor vehicle theft because of the problems in returning them to their lawful owners. The objective of this study is to analyse the laws used by the SARPCCO member countries in fighting motor vehicle theft, transnational organised crime, recoveries, repatriation, prosecution and extradition of offenders. The SARPCCO member countries on which the analysis is done are Lesotho, South Africa, Swaziland and Zambia.
Jurisprudence
LL. M.
APA, Harvard, Vancouver, ISO, and other styles
40

Liebenberg, Andre Sarel. "Examining the significance of modus operandi information in copper theft investigation." Diss., 2018. http://hdl.handle.net/10500/26428.

Full text
Abstract:
This study sought to examine the significance of modus operandi information in the investigation of copper theft. Data was collected by means of a literature study and individual semi-structured interviews conducted with detectives at the SAPS Philippi East, in the Nyanga policing cluster, in the Western Cape, to promote knowledge and understanding of the significance of modus operandi information in copper theft investigations. A comprehensive literature study, concerning the dynamics of modus operandi information in forensic investigation and copper theft in South Africa, was conducted. From the results of this research, it appears that participants do realize the significance of modus operandi information in the investigation of copper theft. It is, however, evident that they do not optimally utilize modus operandi information regarding copper thieves as a result of limited experience, case docket overload, and the inaccessibility of available data – all of which inhibit the establishment of modus operandi information pertaining to copper thieves. Role-players in the copper theft investigation sphere isolate themselves from each other and do not share the available modus operandi information amongst each other; these results in a non-systematic integrated approach to copper theft investigation. The study identifies the challenges and shortcomings, experienced by detectives at SAPS Philippi East, which inhibit the optimal utilization of modus operandi information in the investigation of copper theft. The study then puts forward a set of recommendations that could assist the SAPS, the relevant parastatals and other role-players in enhancing the utilization of such information.
Criminology and Security Science
M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
41

Chang, Chih-wei, and 張致微. "A Study on the Assessment of the Social Security Planners Implementation(Theft Prevention)--A Case Study of one Police Precinct in Chia-yi city for Example." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/26815328013538865909.

Full text
Abstract:
碩士
南華大學
非營利事業管理研究所
97
Theft has been around for a long time. Even though there have been scientific advancements, theft hasn''t really declined. In fact, thieves’ techniques are getting more and more advanced. Even though the government tries to protect the public, and the government might have high approval rating, people still don''t believe that public security is getting better.    Of all non-violent crimes, people hate residential theft the most. Not only because of the physical loss of personal items, but also the emotional trauma aspect makes it difficult to overcome. Therefore, the current focus of the research is on checking door locks, screen door window''s thickness, stairway passage, surrounding areas, and the lighting equipments.    There are people who can help you plan the protection of your house, and who can talk about areas of safety and theft hotspots.    Research has shown that a lot of thefts occur due to because of the inhabitants own negligence. Thief''s favorite thing to take is money, because it''s small but highly valuable, other favorites are jewels, jewelry, and watches because they are easily sold or pawned. If a crime isn''t solved within 3 months, the criminal will go free unless new evidence can be presented. Residential crimes usually happen during the day as opposed to at night because the resident is usually out working.    People should keep track of their belongings by cataloging records and photographing their personal items. When shops like silver stores or pawn shops receive new goods, they should make a detailed record of the products they receive so that the records can be used by both the public and police authorities. We can learn from thieves by going to a previously robbed residence and examining it. We can make suggestions about the software and hardware to improve crime prevention, and can put the I.P.C (I PREVENT CRIME) into action.
APA, Harvard, Vancouver, ISO, and other styles
42

Lee, Chung-Lin, and 李宗霖. "Effectiveness of Adopting Mixed Land‐Use Strategy on Theft Crime Rates based on Natural Surveillance Concept under Crime Prevention through Environmental Design - Case Study of Taipei Beitou District." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/56687520341519644953.

Full text
Abstract:
碩士
中國文化大學
景觀學系
101
Since the Industrial Revolution, urbanization and population sprawl have moved residential areas toward suburban, resulting in higher crime rate at central business centers in the night. Situational Crime Prevention Theory including the strategy of Crime Prevention through Environmental Design was developed by experts and researchers in the U.S. to reduce crime rate, through increasing access control and providing natural surveillance by mixing various activities. However, this strategy has not been examined in Taiwan, where most urbanized areas are mixed residential area with commercial and retail. Therefore, this research aims at evaluating the effectiveness of natural surveillance under mixed land‐use for minimizing larceny occurrence. Evidence based on geographic hot‐spot and statistical analyses shows that 24 hour operation stores such as 7‐eleven, self‐service laundry, and police station are not associated with lower larceny rate, due to natural surveillance ineffective during night. However, the more the stores of dressing, sewing, pharmacy, jewelry, watch smith, motorcycle selling and repairing, and parking lots, the lower the larceny occurrence. It is possible associated with the effectiveness of natural surveillance based on routine operation hours preventing larceny from happening in the date. On the contrary, the more the clinics, beauty shops, real estates, and after school care centers, the higher the larceny occurrence. It is possible relating to indoor oriented activities irrelevant to outdoor natural surveillance.
APA, Harvard, Vancouver, ISO, and other styles
43

Jota, Laura Lamosa Gomes. "Furtos e roubos como ação coletiva: olhares e práticas de reclusos, vítimas e tribunal." Master's thesis, 2014. http://hdl.handle.net/1822/33555.

Full text
Abstract:
Dissertação de mestrado em Crime, Diferença e Desigualdade
Em Portugal, o crime contra o património tem um peso relativo de 55.1% na criminalidade participada. Especificamente, os tipos de crimes mais participados são os furtos e roubos. Este estudo tem como objetivo principal perspetivar este tipo de criminalidade a partir das representações sociais e das práticas de vários atores sociais: tribunais, reclusos e vítimas. Adota-se uma abordagem teórica interacionista, que visa compreender as diferentes dinâmicas que compõem a construção social do desvio como uma ação coletiva, na qual intervêm a ação do controlo social, dos desviantes e da reação social. A metodologia adotada combina diversas técnicas de pesquisa, desde análise documental de processos judiciais, à realização de entrevistas semiestruturadas a reclusos e a vítimas. Pretende-se assim, atingir um duplo objetivo, não só contribuir para que os resultados alcançados permitam aprofundar o conhecimento científico sobre esta temática a partir de uma abordagem multifacetada apoiada nas perspetivas de atores sociais diferentemente posicionados, como também desenvolver um programa de prevenção deste tipo de criminalidade com base em tecnologias de informação e comunicação.
In Portugal, crime against people’s heritage has a relative weight of 55.1% in reported crime. Specifically, the most reported types of crime are thefts and robberies. This study aims to demonstrate this type of crime in social representations and its practices with various social actors: courts, prisoners and victims. This implements an interactionist theoretical approach that seeks to understand the different dynamics that make up the social construction from the diverted as a class action, which involves the control of the social action of the diverted and the social reaction. The methodology combines various research techniques like documentary analysis of court cases and conducting semi-structured interviews to offenders and victims. The aim is to achieve a double goal which is not only to contribute to the possible achievements that extend scientific knowledge on this subject from a multidimensional approach reinforced with different social actors from different backgrounds, but also to develop a program to prevent this type of crime based on information and communication technologies.
APA, Harvard, Vancouver, ISO, and other styles
44

Nek, Mbulelo David. "Combating diamond theft through intelligence-led and technology-based solutions : case study Cullinan Diamond Mine, South Africa." Diss., 2019. http://hdl.handle.net/10500/26483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Liebenberg, Andre Sarel. "An evaluation of the impact of the Non-ferrous Metals Crime Combating Committee on copper cable theft." Thesis, 2020. http://hdl.handle.net/10500/27467.

Full text
Abstract:
English, Zulu and Northern Sotho summaries
This study aims to evaluate the Non-Ferrous Metals Crime Combating Committee's impact on combating copper cable theft in South Africa. Data was collected via in-depth interviews with awaiting trial detainees charged with copper cable theft at the Pollsmoor Correctional Centre in the Western Cape; members of the Mpumalanga and Gauteng Provincial Non-Ferrous Metals Crime Combating Committee; members of Business Against Crime South Africa; and investigators attached to Combined Private Investigations who investigate copper theft nationally. The in-depth interviews provided a comprehensive understanding of participant experiences relating to the impact of the Non-Ferrous Metals Crime Combating Committee on the combating of copper cable theft in South Africa. Moreover, the researcher performed a thorough literature study of the phenomenon locally and internationally. Research findings indicate shortcomings in the Non-Ferrous Metals Crime Combating Committee's effectiveness, limiting its impact on preventing copper cable theft. Based on these findings, the study recommends that the Non-Ferrous Metals Crime Combating Committee be replaced with a specialised South African Police Service Non-Ferrous Metals Theft Unit. Consequently, this study puts forward a set of recommendations proposing a systematic pro-active plan to address and minimise copper cable theft in South Africa. The proposed plan convincingly presents practical solutions to minimise copper cable theft and contributes to the current body of scholarship on copper cable theft in South Africa.
Inhloso yalolu cwaningo ukuhlola umthelela wohlelo lwe-Non-Ferrous Metals Crime Combating Committee mayelana nokuqedwa kokutshontshwa kwentambo yogesi (copper cable). Idatha iqoqwe ngokusebenzisa izinhlolovo ezijulile ezenziwa ngokusebenzisa iziboshwa eziboshelwe izintambo zikagesi ezisamele ukugwetshwa ejele lase Pollsmoor Correctional Centre ngaseNtshonalanga Kapa, amalunga eMpumalanga and Gauteng Provincial Non-Ferrous Metals Crime Combating Committee, amalunga eBusiness Against Crime South Africa kanye nabaphenyi abahambisana nophiko lweCombined Private Investigations oluphenya ukutshontshwa kwezintambo zikagesi ezweni lonke. Lezi zinhlolovo ezijulile zinikeze ulwazi olubanzi lwabadlalindima olumayelana nomthelela weNon-Ferrous Metals Crime Combating Committee mayelana nokuqedwa kokutshontshwa kwezintambo zikagesi. Ngaphezu kwalokho, umcwaningi wenze ucwaningo olunzulu lombhalo wobuciko mayelana nokutshontshwa kwezintambo zikagesi lapha ekhaya kanye nasemhlabeni wonke jikelele. Ulwazi olutholakele lukhombisa iziqi ezikhinyabeza ukusebenza kahle kweKomithi mayelana nokuvimbela umthelela walo mayelana nokutshontshwa kwezintambo zikagesi. Ngezizathu ezisuselwa phezu kwalolu lwazi, lolu cwaningo lubeka phambili isethi lezincomo ezinganceda iKomiti ekuqiniseni umthintela walo ngokuhlongoza uhlelo olugqugquzelayo lokunciphisa izinga lokutshontshwa kwezintambo zikagesi eNingizimu Afrika. Lolu hlelo oluhlongoziwe ngaphandle kokungabaza lwethula izixazululo ezenzeka empilweni yangempela ukunciphisa ukwetshiwa kwezintambo zikagesi kanti lokhu kunegalelo kwiziko lamanje futhi luqhubekisa iziko lamanje lwezifundo esimayelana nokwetshiwa kwezintambo zikagesi.
Maikemisetso a thutelo ye ke go lekola khuetso ya Komiti ya Twantsho ya Bosenyi bja Dimetale tse di Sego tsa Tshipi ka ga go lwantsha kutso ya megala ya koporo. Datha e kgobokeditswe ka mokgwa wa ditherisano tse di tseneletsego tseo di sepeditswego le mahodu a megala ya koporo ao a golegilwego ao a letetsego go sekiswa Senthareng ya Tshokollo ya Pollsmoor go la Kapa Bodikela, maloko a Diprofense tsa Mpumalanga le Gauteng a Komiti ya Twantsho ya Bosenyi bja Dimetale tse di sego tsa Tshipi, maloko a Dikgwebo tsa Kgahlanong le Bosenyi tsa Afrika Borwa le banyakisisi bao ba dirisanago le Dinyakisiso tsa Praebete tse Kopantswego tseo di nyakisisago kutso ya koporo kemong ya bosetshaba. Ditherisano tse di tseneletsego tse di file kwesiso ka botlalo ya maitemogelo a batseakarolo ye e sepelelanago le khuetso ya Komiti ya Twantsho ya Bosenyi bja Dimetale tse di sego tsa Tshipi ka ga go lwantsha kutso ya megala ya koporo. Gape, monyakisisi o dirile thutelo ya dingwalo ka botebo ya kutso ya megala ya koporo tikologong ya leagong le kemong ya boditshabatshaba. Dikhwetso tsa dinyakisiso di supa mafokodi ao a lebanego bokgoni bja Komiti tshitisong ya khuetso ya yona go kutso ya megala ya koporo. Go ya ka dikhwetso tse, thutelo ye e hlagisa sehlopha sa dikeletso tseo di ka thusago Komiti go tswetsa khuetso ya yona pele ka go sisinya leano la go itokisetsa seemo se ka diregago ka mokgwa wo o beakantswego go fokotsa kutso ya megala ya koporo ka Afrika Borwa. Leano leo le sisintswego le hlagisa ka mo go kgodisago ditharollo tse di ka phethagatswago go fokotsa kutso ya megala ya koporo ka gona la ba la seabe go le go tswetsa pele popego ya bjale ya borutegi ka ga kutso ya megala ya koporo.
Criminology and Security Science
Ph. D. (Criminal Justice)
APA, Harvard, Vancouver, ISO, and other styles
46

Abdelhalim, Amany. "New method for learning decision trees from rules and its illustration for online identity application fraud detection." Thesis, 2009. http://hdl.handle.net/1828/3084.

Full text
Abstract:
A decision tree is a graph or model for representing all the alternatives in a decision making process. Most of the methods that generate decision trees for a specific problem use examples of data instances in the decision tree generation process. We propose a new method called "RBDT-1"- rule based decision tree -for learning a decision tree from a set of decision rules that cover the data instances. RBDT-l method uses a set of declarative rules as an input for generating a decision tree. The method's goal is to create on-demand a short and accurate decision tree from a stable or dynamically changing set of rules. The rules used by RBDT-1 could be generated either by an expert or induced directly from a rule induction method or indirectly by extracting them from a decision tree. We conduct a comparative study of RBDT-1 with four existing decision tree methods based on different problems. The outcome of the study shows that in terms of tree complexity (number of nodes and leaves in the decision tree) RBDT-1 compares favorably to AQDT-1 and AQDT-2 which are methods that create decision trees from rules. RBDT-1 compares favorably also to ID3 while is as effective as C4.5 where both (ID3 and C4.5) are famous methods that generate decision trees from data examples. Experiments show that the classification accuracies of the different decision trees produced by the different methods under comparison are equal. To illustrate how RBDT-1 can successfully be applied to an existing real life problem that could benefit from the method, we choose identity application fraud detection. We designed a new unsupervised framework to detect fraudulent applications for identity certificates by extracting identity patterns from the web, and crossing these patterns with information contained in the application forms in order to detect inconsistencies or anomalies. The outcome of this process is submitted to a decision tree classifier generated using RBDT-1 on the fly from a rule base which is derived from heuristics and expert knowledge, and updated as more information are obtained on fraudulent behavior. We evaluate the proposed framework by collecting real identity information online and generating synthetic fraud cases, achieving encouraging performance results.
APA, Harvard, Vancouver, ISO, and other styles
47

Van, Niekerk Anna-Marie. "The analysis of a cell phone record as a source of intelligence in the investigation of copper cable theft." Diss., 2015. http://hdl.handle.net/10500/19238.

Full text
Abstract:
Copper cable theft (CCT) has a devastating effect on the South African economy, and essential services such as TELKOM, ESKOM AND TRANSNET have been seriously disrupted, due to CCT. This dissertation focuses on the value of the cell phone record as a source of intelligence during (CCT) investigations. The cell phone industry is growing each year, and millions of people worldwide possess a cell phone. Some of these people are involved in criminal activities – which mean that cell phones, with their advanced capabilities, hold evidence which relates to crime. The activation of cell phone activity is contained on a cell phone record, and, when analysed, such information becomes intelligence which has a positive impact on CCT investigations. The purpose of this study is to assist and give guidance to investigators, in order to analyse the cell phone record(s) of CCT thieves.
Criminology and Security Science
M. Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
48

ZENG, JIA-YI, and 曾佳怡. "A Study on the Preventive Effects of Anti-theft Equipment and Major Parts-marking Against Motorcycle and Auto Thefts." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/523t6h.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
107
Motor vehicle thefts are always a major crime problem in Taiwan society. However, in recent years, there is a reduction of auto thefts worldwide, including Taiwan. There are three research purposes for this study: (1) collecting and analyzing the literature of the criminal policies which may causes the motor vehicle crime drop in Taiwan (2) discussing the possible evolution of anti-theft equipment (3) analyzing association between the policy of major parts-marking and the drop of motor vehicle thefts. Two research methods are used for the study: (1) in-depth interview of four anti-motor vehicle-thefts experts and (2) statistical analysis of motor vehicle crime occurred monthly from January 1,2000 to December 31,2018 recorded by the police. The research findings are: (1) the invention and used of the wafer keys affected the auto thefts to drop significantly (2) the policy of major parts-marking is associated with the decrease of the vehicle thefts (3) the policy of regular inspection has the effect of reducing the motor vehicle thefts (4) the policy of anti-theft doesn’t cause crime displacement to other crimes (5) the rise of CCTV affected the motor vehicle thefts to drop. There are five suggestions based on the research findings: (1) increase the risk of stealing, (2) install extra anti-theft equipment whenever possible, (3) train the employees of the insurance companies to against fraudulent motor vehicle insurance, (4) law enforcement authority should crack the stolen markets and (5) develop the new anti- theft lock technique.
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Shiau-Chi, and 吳曉綺. "The Crime Prevention Effects Of Police-Installed CCTV On Thefts." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55717489083850272945.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
100
The government has been dedicated to improving the security by installing Closed Circuit Television (CCTV) in recent years. Many surveys revealed a high level of public consider installing CCTV is a good way to reduce the crime and showed that the presence of cameras in the city has made people feel safer. The policy of installing CCTV has received widespread support. In Taiwan, it is estimated that the government spent an average of 1.1 billion dollars to install and repair CCTV system every year. This shows that the crime prevention effect of CCTV is an important issue and deserves our careful confirmation. Currently, many studies assess the crime prevention effects of CCTV by interviewing police and citizen however a few study used quantitative methods.   The purpose of the study is to evaluate the crime prevention effects of CCTV on thefts and residential burglary in Taipei. A quasi-experimental research design, the study select 3 experimental and 3 control groups after taking account of environmental characteristic and development pattern. Using geographical information system (GIS) to mark off the experimental area. These experimental areas cover the shopping, business and residential areas of the city. Crime data was sourced from Taipei City Police Department, covering theft and residential burglary taking place from July 2008 to the end of December 2011, for 42 months before and after camera installation dates.   Finally, there was no significant difference on theft and residential burglary crime between experimental group and control group. Examining the relationship between crime means before and after CCTV installation. As a result, there was no significant difference after installing CCTV. However, an independent samples t test of the experimental group, within the 50 and 100 meter buffers reach statistical significance.
APA, Harvard, Vancouver, ISO, and other styles
50

Chang, Lin-Hui, and 張琳慧. "Stationery Retailing Theft Preventive Strategy Study : Case of Chiu Ta Stationery Co., Ltd." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/64867650849292115176.

Full text
Abstract:
碩士
國立臺灣大學
商學組
98
Theft study in retailing industry had been long gone since the 1st shrinkage showed in retailing reports,it had been a urgent but also difficult to manage issue。With the technique improved from the past few decades,almost every retail stores equipped with the Anti-theft instruments,yet still the shrinkage ratio shows no sign of decline in every stores,on the other hand, the figures keep rising annually。 Stationery retailing used to so traditional in Taiwan,mostly family business oriented,and the industry changed the way it looks since 1st Chiu-Ta stationery opened 2000,in a modern-trade retailing style。There were more of the wholesalers started opened similar type of stores after the 1st pioneer success。 Theft in stores is an issue need to be taken into consideration,yet difficult to solve。RSP (retail selling price) in this industry relatively lower compared to other retailing categories,products mix is also huge & massy,those factors increase the difficulty of managing the theft issue in stationery retailing stores。 Examine the service models in specific definition,combined with the theories of shoplifting intentions。This study analysis the theft prevent by various perspectives of “Environment“、”In store staff managing” 、”Technology” and even “Customers side” to justify what will be the most effective ways of prevent the theft in stationery stores,hereby to come out with solutions for theft prevent in stationery retailing stores。
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography