Academic literature on the topic 'Vehicle hijacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vehicle hijacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Vehicle hijacking"

1

Davis, Linda. "Carjacking — Insights from South Africa to a New Crime Problem." Australian & New Zealand Journal of Criminology 36, no. 2 (2003): 173–91. http://dx.doi.org/10.1375/acri.36.2.173.

Full text
Abstract:
Although vehicle hijacking is a worldwide phenomenon, it has increased to such an extent in South Africa that it is currently regarded as one of the countries with the highest hijacking figures in the world. It is estimated that a motor vehicle is hijacked every 40 to 54 minutes in South Africa. This implies that more than 25 motor vehicle drivers become victims of hijackings daily. Despite these statistics, little is known about the factors that could increase an individual's potential to become a victim of this crime. In this article, selective research findings of an exploratory study of 12
APA, Harvard, Vancouver, ISO, and other styles
2

Kruger, Joshua J. "Vehicle Fraud Detection Using Microscopy." Microscopy Today 8, no. 6 (2000): 8–11. http://dx.doi.org/10.1017/s1551929500052779.

Full text
Abstract:
In a criminal case, such as vehicle theft or vehicle hijacking, where a vehicle has been dismantled, the forensic scientist is many times faced with the problem of establishing the history of a specific auto body part. The normal method for doing this is by performing paint analysis. There are, however, a few shortcomings to paint analysis. In this paper another technique for determining the history of a body part is discussed, namely the comparison of surface replicas.
APA, Harvard, Vancouver, ISO, and other styles
3

Macgregor, J., WJ Schoeman, and AD Stuart. "The victim's experience of hijacking: an exploratory study." Health SA Gesondheid 7, no. 1 (2002): 33–45. http://dx.doi.org/10.4102/hsag.v7i1.374.

Full text
Abstract:
This paper summarises a phenomenological study that was designed to explore the victim's lived experience of
 undergoing a motor vehicle hijacking. OpsommingHierdie artikel verskaf 'n oorsig oor 'n fenomenologiese studio wat ontwerp is om die slagofferse geleefde ervaring van 'n motorkaping te ondersoek.
 
 *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.
APA, Harvard, Vancouver, ISO, and other styles
4

Ziehn, Jens R., Masoud Roschani, Miriam Ruf, Dennis Bruestle, Jürgen Beyerer, and Melanie Helmer. "Imaging vehicle-to-vehicle communication using visible light." Advanced Optical Technologies 9, no. 6 (2020): 339–48. http://dx.doi.org/10.1515/aot-2020-0038.

Full text
Abstract:
AbstractWith advances in automated and connected driving, secure communication is increasingly becoming a safety-critical function. Injection of manipulated radio messages into traffic can cause severe accidents in the foreseeable future, and can currently be achieved without having to manipulate on-board vehicle systems directly, for example by hijacking cellphones instead and using these as senders. Thereby, large-scale attacks on vehicles can be executed remotely, and target relatively vulnerable devices. To mitigate remaining vulnerabilities in current automotive security architectures, th
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Junsong, Qikun Zhang, Xianling Lu, and Yong Gan. "A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment." Wireless Communications and Mobile Computing 2021 (June 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/6692568.

Full text
Abstract:
With the rapid development of communication and microelectronic technology, the vehicular ad hoc network (VANET) has received extensive attention. However, due to the open nature of wireless communication links, it will cause VANET to generate many network security issues such as data leakage, network hijacking, and eavesdropping. To solve the above problem, this paper proposes a new authentication protocol which uses bilinear pairings and temporary pseudonyms. The proposed authentication protocol can realize functions such as the identity authentication of the vehicle and the verification of
APA, Harvard, Vancouver, ISO, and other styles
6

Cao, Yue, Omprakash Kaiwartya, Sinem Coleri Ergen, Houbing Song, Jaime Lloret, and Naveed Ahmad. "Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) From Virtual Vehicle Hijacking." IEEE Internet of Things Journal 6, no. 4 (2019): 5866–69. http://dx.doi.org/10.1109/jiot.2019.2926608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zheng, Xian-Chun, and Hung-Min Sun. "Hijacking Unmanned Aerial Vehicle by Exploiting Civil GPS Vulnerabilities Using Software-defined Radio." Sensors and Materials 32, no. 8 (2020): 2729. http://dx.doi.org/10.18494/sam.2020.2783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kong, Victor, Ross Weale, Joanna Blodgett, John Bruce, Grant Laing, and Damian Clarke. "Spectrum of injuries resulting from gunshot wounds in car hijacking: a South African experience." Trauma Surgery & Acute Care Open 3, no. 1 (2018): e000260. http://dx.doi.org/10.1136/tsaco-2018-000260.

Full text
Abstract:
BackgroundCar hijacking, known as “carjacking”, is a form of aggravated robbery of a vehicle from the driver frequently involving firearm and is common in South Africa. There is, however, little literature on the spectrum of injuries sustained by victims of car hijacking. The study aimed to describe the spectrum of gunshot wound-related (GSW) injuries and review our experience of management of victims of car hijacking in our trauma center based in South Africa.MethodsA retrospective review was conducted during an 8-year period from January 2010 to January 2018 on all patients who presented wit
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Ming Tu, Gang Chen, Yu Hao Ma, Zhi Gang Li, and Yi Feng. "The Development and Application Research of Light Weight Heat Treated C-Grade Bullet Proof Steel." Advanced Materials Research 1063 (December 2014): 21–27. http://dx.doi.org/10.4028/www.scientific.net/amr.1063.21.

Full text
Abstract:
The Light weight heat treated C-grade bullet proof steel was developed through composition design and optimization based on multiplex alloying, multiplex micro-alloying design ideas and complex phase structure strengthening theory. The puzzle how to avoid the quenching deformation problem of super high strength thin sheet was solved through heat treatment in die with a suit of cooling system. Such C-grade bullet proof steel plate has fine tempered lath martensite structure and has a higher strength than production which is made by a Inc. in Sweden. The shooting and certification test results s
APA, Harvard, Vancouver, ISO, and other styles
10

Thobane, Mahlongonolo, and Johan Prinsloo. "Is crime getting increasingly violent? An assessment of the role of bank associated robbery in South Africa." South African Crime Quarterly, no. 65 (September 30, 2018): 33–41. http://dx.doi.org/10.17159/2413-3108/2018/v0n65a4367.

Full text
Abstract:
There is public concern about the violent nature of crime in South Africa and the continuously increasing levels of crime, both of which place a huge burden on the resources of the criminal justice system. ‘Bank associated robbery’ is a bank-related robbery (or attempted robbery) of cash, committed against a bank client while en route to or from a bank or ATM. Although this phenomenon is relatively unknown both in the academe and to the general public, the drastic increase in these violent and potentially traumatic crimes puts the general public at risk, and is therefore of particular concern
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Vehicle hijacking"

1

Zheng, Xian-Chun, and 鄭先淳. "Hijacking Unmanned Aerial Vehicle Exploiting Civil GPS Vulnerability by Software Defined Radio." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6x66h4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wienand, Liezl. "The influence of a vehicle hijacking prevention intervention on stress experience and personal competence." Thesis, 2010. http://hdl.handle.net/10210/3350.

Full text
Abstract:
M.A.<br>One of the most perturbing factors of South Africa's communal existence is the high rates of violent crime and the high incidence of Post-Traumatic Stress Disorder JPTSD) amongst all communities. Crime-related PTSD is a problem of epidemic proportions. Therapeutic and mental health services for trauma related counselling are limited and in some communities non-existent. It is therefor essential to develop preventative programmes aimed at equipping individuals with the skills to avoid possible trauma-inducing situations such as vehicle hijacking. It was decided to utilise a vehicle hija
APA, Harvard, Vancouver, ISO, and other styles
3

Steenkamp, Douw Gerbrand. "Motor vehicle theft: a comparative study." Thesis, 1999. http://hdl.handle.net/10530/1035.

Full text
Abstract:
Submitted to the Faculty of Arts in fulfillment of the requirements for the Degree Master of Arts in the Department of Criminal Justice at the University of Zululand, South Africa, 1999.<br>This investigation entails a study of motor vehicle theft and hijacking in KwaZulu-Natal and Western Cape for the period of 1 January till 31 December 1995. The present study is empirically founded and for this purpose an information schedule has been implemented to capture data from police case dossiers for statistical analysis and description. Data forthcoming from a previous Honours study in the Westem
APA, Harvard, Vancouver, ISO, and other styles
4

Symington, Claire. "The application of emotional intelligence incorporated in therapy to a vehicle hijack survivor." Diss., 2007. http://hdl.handle.net/2263/26749.

Full text
Abstract:
Hijacking is an invasive and confrontational traumatic event that impacts significantly on the survivor’s biopsychosocial functioning. The experience of trauma shatters assumptions held about oneself, others and the world. It brings with it a diverse set of consequences that could possibly threaten effective coping behaviour (Meischenbaum, 1994). The purpose of the proposed study is to explore the application of emotional intelligence (EI) incorporated in therapy to a vehicle hijack survivor. It is therefore my intention to research the application value of emotional intelligence therapy as a
APA, Harvard, Vancouver, ISO, and other styles
5

Mathebula, Esewu Mxolisi. "Prevention of theft of official vehicles of the South African National Defence Force (SANDF) in the Gauteng Province." Diss., 2014. http://hdl.handle.net/10500/14140.

Full text
Abstract:
The South African National Defence Force (SANDF) was formed in 1994 after the integration of different “defence forces” into one large force. The sole existence of the SANDF is to protect the borders of the Republic of South Africa and its inhabitants. Resources such as vehicles make it easier for the SANDF to conduct mobile patrols and other operations to ensure that the organisation is always combat-ready. Motor vehicle theft is a crime that affects both individual citizens and organisations in South Africa; the SANDF is not immune to the crime. Many SANDF motor vehicles are stolen al
APA, Harvard, Vancouver, ISO, and other styles
6

Mpata, Modjadji Fletta. "Personal experiences of victims of violent crimes: an African perspective." Diss., 2011. http://hdl.handle.net/10500/7693.

Full text
Abstract:
This research focused on the personal experiences of both male and female victims of violent crimes. The aim of this research was to explore how indigenous Black South Africans understand and deal with victimisation. An African epistemology was used to help gain a deeper understanding of the experiences of the participants. Participants were recruited using purposive sampling strategy. Five participants were selected for this study. Data was collected using individual face-to-face semi-structured interviews. Based on the transcribed data, themes were extracted and analysed using content analys
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Vehicle hijacking"

1

Big money: 2.5 billion dollars, one suspicious vehicle, and a pimp-- on the trail of the ultra-rich hijacking American politics. PublicAffairs, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Vehicle hijacking"

1

Liu, Xiaoming, and Shaozhong Jiang. "The vehicle hijacking alarm system." In 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2017. http://dx.doi.org/10.1109/fskd.2017.8393344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Negi, Naman, Ons Jelassi, Stephan Clemencon, and Sebastian Fischmeister. "A LSTM Approach to Detection of Autonomous Vehicle Hijacking." In 5th International Conference on Vehicle Technology and Intelligent Transport Systems. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007726004750482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Giray, Sait Murat. "Anatomy of unmanned aerial vehicle hijacking with signal spoofing." In 2013 6th International Conference on Recent Advances in Space Technologies (RAST). IEEE, 2013. http://dx.doi.org/10.1109/rast.2013.6581320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faughnan, M. S., B. J. Hourican, G. C. MacDonald, et al. "Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection." In 2013 IEEE Systems and Information Engineering Design Symposium (SIEDS). IEEE, 2013. http://dx.doi.org/10.1109/sieds.2013.6549509.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Vehicle hijacking"

1

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Full text
Abstract:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review foc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!