Littérature scientifique sur le sujet « Commercial crimes – Prevention »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Commercial crimes – Prevention ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Commercial crimes – Prevention"

1

Zvarygin, V. E., et A. S. Kondakov. « CRIMINAL LEGAL PROBLEMS OF BRINGING TO RESPONSIBILITY FOR CORRUPTION-RELATED CRIMES ON THE EXAMPLE OF COMMERCIAL BRIBERY ». Bulletin of Udmurt University. Series Economics and Law 31, no 4 (12 août 2021) : 647–53. http://dx.doi.org/10.35634/2412-9593-2021-31-4-647-653.

Texte intégral
Résumé :
The article provides a complete and comprehensive analysis of the norms of legislation regulating the issues of combating corruption crimes on the example of commercial bribery. Using the comparative legal method of scientific knowledge, the main national normative legal acts regulating the fight against corruption are analyzed. The provisions of federal laws and by-laws of state authorities regulating the issues raised are also analyzed. In addition, the analysis of the law enforcement practice of law enforcement agencies and courts responsible for the organization of work on the identification, prevention and suppression of corruption crimes, as well as carrying out criminal prosecution for their commission, is carried out. The article also reveals law enforcement and other problems of bringing to criminal responsibility for commercial bribery, mediation in commercial bribery and small-scale commercial bribery, a criminal-legal analysis of these types of crimes by their elements is carried out. Based on the results of the analysis, proposals are formulated aimed at further improving the regulatory framework concerning the issues of countering corruption crimes.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Kobetc, Peter. « Improving the theoretical and organizational foundations for preventing crimes in the field of economic security is an essential element related to ensuring the national security of the country ». National Security and Strategic Planning 2020, no 4 (20 janvier 2021) : 5–11. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-5-11.

Texte intégral
Résumé :
The relevance of the research is due to the fact that the issues of countering crimes in the economic sphere have been sufficiently studied in the domestic and foreign literature, but it should be noted that most of these studies were conducted at the beginning of the new Millennium and they did not take into account some modern features. In particular, the study showed that most of the authors of the issues under consideration studied individual measures to prevent offenses in the economic sphere, among which, as a rule, measures of a General social preventive nature were studied, in some cases, special criminological measures applied by law enforcement officers were studied. At the same time, it is impossible not to say that these employees had the opportunity to effectively prevent the crimes in question, provided that the period of centralized economic processes. In the course of the research, the author comes to the conclusion that in the conditions of the beginning of the third Millennium of the XXI century, these subjects of preventive influence can only implement minor measures to prevent the acts in question. On a very large scale, employees of other state bodies and commercial organizations can counteract the crimes in question. The novelty of this research is the analysis of the theoretical and organizational foundations for the prevention of crimes in the field of economic security, which are the most important element in ensuring the national security of the Russian Federation. A number of other provisions of the study are also new. The practical significance of this work is the possibility of using its basic results to improve the theoretical and organizational foundations in the process of preventing economic crimes.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zainal, Rafidah, Ayub Md Som et Nafsiah Mohamed. « A REVIEW ON COMPUTER TECHNOLOGY APPLICATIONS IN FRAUD DETECTION AND PREVENTION ». Management and Accounting Review (MAR) 16, no 2 (31 décembre 2017) : 59. http://dx.doi.org/10.24191/mar.v16i2.671.

Texte intégral
Résumé :
Since the advancement in computer technology, fraud has become one of the high risk crimes in the world which needs urgent detection and prevention at early stage. Nowadays, different kinds of fraud exist in commercial areas namely; credit card, healthcare insurance, online reviews, telecommunications, automobile, etc. Fraud can also happen internally and externally in an organisation. In internal fraud an employee commits it individually, whereas the external fraud involves a wide range of schemes including a third party. Therefore, a detection and prevention mechanism system in the form of computer software is essential in preventing fraud so as to curb further financial losses. The aim of this paper is to critically review the use of computer technology to detect and prevent fraud in selected areas. Recent computer platforms used as a tool to develop fraud detection and prevention system are namely; spreadsheets, big data, forensic analytics, text analytics and expert systems. Based on the review, expert systems have been found to be the best option used as a future tool to curb fraud. The opportunities from this review may allow others to explore more on the technology implemented so as to improve fraud detection and prevention in the future.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Iqbal, Zahid, et Rehan Aslam. « A Qualitative Perspective of Practical Implication of Forensic Accounting for Fraud Detection and Prevention in Pakistan ». RMC Journal of Social Sciences and Humanities 1, no 1 (26 juin 2020) : 23–33. http://dx.doi.org/10.46256/rmcjsochum.v1i1.22.

Texte intégral
Résumé :
The staple objectives of this study are to determine the importance and worth of forensic accounting in the context of Pakistan. Accounting frauds are increasing day by day, especially in the commercial sector of Pakistan. In the majority of Pakistani companies' accountants are inexperienced and nonprofessional and unable to understand the new financial reporting standard that becomes a cause of enhancing accounting frauds. This study followed a qualitative approach to collect data through interviews from both participants, including academicians and practitioners who are working in a prestigious academic institution and business organization where the concept of forensic accounting is taught and implemented with the right letter and spirit. Finding have been derived by transcribing data through coding and taking essential themes regarding the practical implementation of forensic accounting practices in Pakistan by using NVIVO software. The findings of the study indicated that forensic accounting scope is broad, especially regarding the increasing ratio of white-collar crimes and digital crimes, and in a near-future lot of opportunities will be arises in Pakistan in the context of forensic accounting. Both academicians and practitioners agreed that the importance of forensic accounting could not be overlooked, especially concerning digital and white-collar frauds both in the private sector and public sector organizations.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Khalifa, Nasser AL-Dosari. « CYBERCRIME : THEORETICAL DETERMINANTS, CRIMINAL POLICIES, PREVENTION & ; CONTROL MECHANISMS ». International Journal of Technology and Systems 5, no 1 (10 septembre 2020) : 34–63. http://dx.doi.org/10.47604/ijts.1133.

Texte intégral
Résumé :
Purpose: The research aimed to explore the theoretical determinants of cybercrime in Qatar and assess how it can be prevented and minimised. Methodology: This was done using the mixed method research design through the survey strategy and semi-structured interviews with experts in the field of cybercrime in Qatar. Having adopted a mixed-method research methodology, the study had a target population of 200 participants for questionnaire survey, while expert interview had a target population of 11 experts. All these participants were purposively sampled in pursuit of engaging respondents who had knowledge, experience and expertise in cybercrime, such as IT experts and professionals working on cyber security solutions, Lawyers, police officers working in cybercrime department in Qatar, and lawyers who had dealt with cybercrime. The results of the survey were quantified using the Likert scale and analysed quantitatively by the factor analysis, and frequency tables. The results of the interviews were analysed qualitatively. Findings: The results of the survey revealed that the most typical types of cybercrime in Qatar include website hacking, email cyberattacks, and online banking cyberattacks. The predominant motive for cybercrime in the country is monetary gains. However, the findings from the logistic regression analysis reveal that different types of cybercrime are associated with different determinants, and online banking crimes are predominantly driven by monetary gains. Moreover, the findings from IT experts interviewed revealed various measures can be adopted as control measures of cybercrime activities and hazards, such as development of stronger networks by commercial companies to protect their cyber assets and use of up-to-date protective software that detect and ensures complete data security. Unique contribution to theory, practice and policy: Further, the findings, in relation to the effective methods and mechanisms for preventing cybercrime, suggest that it can be reduced through the spread of awareness among people and companies and through the adoption of preventive control mechanisms. Further, the study recommends that governments should formulate and implement legislations aimed at enhancing stringent measures of combating and dealing with cybercrime in convergence with international standards and practices. Besides, companies should adopt technological cybersecurity solutions to enhance effective protection of intellectual property, intrusion, and malicious damage of data as well as other cyber-related crimes.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Melnychuk, V. « COMMERCIAL SEXUAL EXPLOITATION OF CHILDREN : INTERNATIONAL LAW ». Bulletin of Taras Shevchenko National University of Kyiv. Social work, no 3 (2018) : 10–13. http://dx.doi.org/10.17721/2616-7786.2018/3-1/2.

Texte intégral
Résumé :
The article deals with the concept of commercial sexual exploitation of children. The forms of commercial sexual exploitation of children, among that there is child's prostitution, child's pornography, trading in children, child's sex-tourism, early marriage, are described. International documents, that regulate a legislation in relation to crimes, children related to commercial sexual exploitation, are considered. Work of ungovernmental organizations, that conduct active activity in relation to defence and help to the children that suffered from sexual violence, is described. It is noted that the fight against commercial sexual exploitation of children with sexual violence against children should be conducted, in addition to international, national and local levels. The principles of the legal principles and standards that should guide children's strategies and practices, including advocacy for the prevention of violence and measures to protect all children from all forms of violence are described. The economic, social and cultural rights that contain the provision according to which children should be protected from economic and social exploitation are indicated. It has been determined that commercial sexual exploitation of children is a violation of the rights of the child, which is considered as a subject of sex and the subject of trade; and includes sexual abuse of the child or exploitation of the child by an adult, as well as payment in cash or in kind. It has been established that the development of legislation and recognition of the problem of sexual exploitation and sexual abuse of children at the national and international levels will be an impetus in combating the commercial sexual exploitation of children. It has been stressed that commercial sexual exploitation of children in many countries is particularly dangerous criminal activity, violating the rights of the child.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Lee, Youngchoel. « Countermeasures of the Commercial Law and related Laws for the Prevention of Corporate Crimes - Focusing on the Internal Control System and Punitive Damages ». Gachon Law Review 11, no 4 (31 décembre 2018) : 187–222. http://dx.doi.org/10.15335/glr.2018.11.4.007.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Maha Rani, Dewanti Arya, I. Nyoman Gede Sugiartha et Ni Made Sukaryati Karma. « Uang Virtual (Cryptocurrency) Sebagai Sarana Tindak Pidana Pencucian Uang dalam Perdagangan Saham ». Jurnal Konstruksi Hukum 2, no 1 (1 mars 2021) : 19–23. http://dx.doi.org/10.22225/jkh.2.1.2961.19-23.

Texte intégral
Résumé :
The continuation of the electronic media that is widely discussed today is virtual money, commonly known as cryptocurrency. Cryptocurrency can also be referred to as an unformed commercial object; actually in digital form which can be used in electronic transactions. This study aims to analyze the existence of virtual money (cryptocurrency) in stock trading in Indonesia and to find out the responsibilities of money laundering offenders who use virtual money (cryptocurrency) in stock trading. The research method used is normative legal research. The results show that the existence of virtual money (cryptocurrency) in stock trading in Indonesia when used as currency unification, transact, trade or as a means of payment with businesses in this case, especially stock trading in Indonesia can be said to be invalid in terms of Law Number 7. 2011 concerning Currency. Users of virtual money (cryptocurrency) in Indonesia are quite widely used in business, which can be seen in Indonesia itself that virtual money (cryptocurreny) such as Bitcoin and Centcoin are circulating. Then, the responsibility of the perpetrators of money laundering who use virtual money (Cryptocurrency) in stock trading, where this action has a very negative impact on the Indonesian State, especially in terms of business because people who have committed these crimes take advantage of technological advances unwise so that the perpetrators can be ensnared based on Law No. 8 of 2010 concerning the prevention and eradication of the crime of money laundering.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Musaddiq, Nur Wahid. « TINJAUAN KRIMONOLOGI EKSPLOITASI SEKSUAL PADA ANAK ». Bilancia : Jurnal Studi Ilmu Syariah dan Hukum 13, no 2 (30 décembre 2019) : 305–30. http://dx.doi.org/10.24239/blc.v13i2.497.

Texte intégral
Résumé :
Sexual exploitation of children is a violation of children in the form of sexual violence committed by adults by giving rewards to children, or a third person, or other people who make children treated as sexual and commercial objects. This is forced labor and modern slavery of children because children often experience physical violence and trauma. Factors that cause sexual exploitation of children in Makassar City are environmental factors, technological factors and factors, economic factors, lack of understanding of religion and prevention efforts are carried out in two ways, namely pre-emptive, preventive and repressive measures. Recommendations that the government and the whole community participate in preventing sexual exploitation of children. Efforts that can be done by the community is if there is anything suspicious and should be suspected as a crime of sexual exploitation, the community must report to the authorities so that it can be followed up.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fauzi, Ahmad, et T. Riza Zarzani. « THE DEVELOPMENT OF CHILD SEX EXPLOITATION COMMERCIAL (CSEC) “RESPONSE MODEL IN MEDAN CITY” ». Journal of Community Research and Service 1, no 2 (29 mars 2018) : 83. http://dx.doi.org/10.24114/jcrs.v1i2.9342.

Texte intégral
Résumé :
Abstract The Child of Sex Exploitation Commercial (CSEC) is a fundamental violation of the rights of children. The violation is sexual violence by an adult with a gift to a child, or a third person, or other persons. Simply put, children are treated as sexual and commercial objects. This is a manifestation of forced labor and modern slavery, because not a few children are forced and subjected to physical violence and trauma. The purpose of this study is to examine the legal arrangements for the sexual exploitation of children in Indonesia, to examine and analyze prevention and mitigation of CSEC in Medan City, and to examine barriers to prevention and overcoming of CSEC and how to overcome it. This study uses sociological juridical approach that comes from primary data and secondary data. Data were collected through document studies and interviews conducted to Medan City Center for Childhood Study and Protection (PKPA) staff. The results of the study indicate that the legal arrangement of CSEC in Indonesia is conducted by stipulating several regulations, firstly, Child Protection Act No. 23 of 2002 and the Law on Eradication of Human Trafficking Crime Number 21 of 2007, besides Indonesia has ratified the UN Convention on Human Rights Rights of the Child (CRC) through Presidential Decree No. 36 of 1990. Efforts made to prevent and control the CSEC in Medan City, namely: to socialize in cooperation with various agencies to conduct prevention and prevention of criminal act in the city of Medan CSEC; building networks with various non-governmental organizations and with various institutions to give birth to Regional Regulation (Perda) Number 6 of 2004 on the Elimination of Trafficking in North Sumatra, making efforts of legal advocacy and advocacy from the Prosecutor to the Court; provide assistance to rehabilitate the physical and psychological child victims of CSEC (counseling and medical) and provide safe homes for children. Obstacles in preventing and preventing CSEC in Medan are: legislation that has not been specifically set CSEC, social, economic and psychological factors such as the attitude of community permissive or ignorance of CSEC issues, closed or complicated bureaucracy.Keywords: Efforts, Countermeasures, CSEC
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Commercial crimes – Prevention"

1

Herman, Dewald Gustav. « An analysis of security measures implemented on commercial private game reserves in Limpopo ». Diss., 2020. http://hdl.handle.net/10500/26768.

Texte intégral
Résumé :
South Africa presently experiences high levels of crime daily. Although crime is accepted as an everyday occurrence for its citizens, it affects the economy of the country. This study analysed security measures implemented on Commercial Private Game Reserves (CPGRs) in Limpopo and the impact of crime thereof. CPGRs are enclosed areas containing various species of fauna and flora. Visitors from domestic and foreign origins visit these reserves to enjoy nature and its tranquillity. This study analysed the security measures to determine their effectiveness for CPGRs. The study further explored the use of security risk management strategies and risk assessments as crime reduction tools. The study was carried out using a case study research design. Data were collected by the researcher using three methods: observation, onsite checklists and semi-structured one-on-one interviews which were conducted on site. Validity and reliability indicate the trustworthiness of the study. The researcher reduced the data gathered through the use of thematic data analysis. Interviews were transcribed and themes were created and identified by the researcher. The comprehensive data indicated the importance of a security risk manager on a CPGR. The research found that very few security risk managers are employed and that managers of security risks employed on CPGRs have various titles. However, while the CPGRs have similar risks, their risk reduction strategies vary. The most commonly used measures are people, physical and technological measures with each having various subdivisions. The security measures implemented by CPGRs in the Limpopo province which were analysed are not formulated using a scientific approach as most properties do not make use of a formal security risk assessment. The study is deemed valuable as a model was developed from the findings that could be used by game reserves to guide them to apply relevant security measures. A formal security programme is often limited due to financial constraints of the reserve or the reserve owners, however, not all strategies should be considered as a financial expense as much can be done without exhausting financial reserves. The findings contributed to making recommendations to improve the overall security of CPGRs. This study encourages more research into the subject to improve the security industry and to stimulate the tourism industry.
Security Risk Management
M. Tech. (Security Management)
Styles APA, Harvard, Vancouver, ISO, etc.
2

Mostert, Derick. « Utilisation of the financial intelligence centre as a crime intelligence source ». Diss., 2012. http://hdl.handle.net/10500/9116.

Texte intégral
Résumé :
The research was conducted as a result of the researcher‟s concern that the possibility exists that members of the different law enforcement agencies in South Africa might have a misconception about the mandate and functions of the Financial Intelligence Centre. If such a misconception in fact exists, it poses a huge challenge towards fruitful co-operation among the Centre and the different law enforcement agencies. The researcher identified certain practical problems, namely, that investigators are not aware of the types of intelligence that the Centre could provide them with, and that investigators might not be informed about the specific procedures to follow when they need to request intelligence from the Centre. The research has shown that, in the past, the Centre has been a useful source of crime intelligence concerning a range of predicate offences including narcotics, fraud and tax related crimes. The research has further found that, although the majority of participants gained a lot of experience in law enforcement and investigations, they had limited awareness about the Financial Intelligence Centre and its functions. This research project studied the utilisation of the Financial Intelligence Centre as a crime intelligence source.
Police Practice
M. Tech. (Forensic Investigation)
Styles APA, Harvard, Vancouver, ISO, etc.
3

Venter, Jan Willem Nicolaas. « The exploration of appraising internal controls to detect procurement fraud during the tender stage at mines ». Diss., 2016. http://hdl.handle.net/10500/22603.

Texte intégral
Résumé :
Text in English
Procurement fraud is an enormous problem and the South African news is perforated with reports of this illicit act. Procurement fraud occurs in all the phases of the procurement cycle, but this illicit act is mostly committed during the tender phase. Business does not see procurement fraud as a crime and therefor this crime is committed due to non-existent internal controls and processes to assess the adequacy of these controls. The purpose of the research was to highlight that procurement fraud occurs when internal controls are being bypassed or if an entity has an ineffective internal control system. The researcher studied the appraising of internal controls to understand the role it plays in detecting, preventing and investigating procurement fraud, specifically during the tender phase. The research design utilised was a qualitative research approach and an empirical design plan or strategy, to obtain the information. The researcher opted for this design to obtain information from literature and information from individuals in appraising internal controls. This ensured a comprehensive data gathering process. The goal of this research was to provide practical recommendations to assist investigators in private and public sectors with investigations into procurement fraud during a tender.
Police Practice
M. Tech. (Forensic Investigation)
Styles APA, Harvard, Vancouver, ISO, etc.
4

Zannoni, Elio. « Jewellery store robbery : a victim risk and intervention perspective ». Diss., 2008. http://hdl.handle.net/10500/1693.

Texte intégral
Résumé :
The exploratory study investigated jewellery store robbery from a victim risk and intervention perspective. An explanation of the phenomenon was offered based on the information obtained from a review of the existing literature, case studies, personal observations at jewellery stores, discussions with jewellers, a scientific questionnaire submitted to jewellers, and semi-structured and structured interviews conducted with a group of knowledgeable respondents and victimised jewellers respectively. A predominantly quantitative research method was applied. The research findings obtained during the study enabled a proposal for a jewellery store robbery intervention model based on the situational crime prevention perspective, which is inclusive of decisional, environmental, situational, procedural, personnel and business-oriented strategies.
Criminology
M.A. (Criminology)
Styles APA, Harvard, Vancouver, ISO, etc.
5

Koch, Ruan Hieronymus. « A meta-theoretical analysis of commercial crime prevention strategies in the BRICS countries / Ruan Hieronymus Koch ». Thesis, 2014. http://hdl.handle.net/10394/11731.

Texte intégral
Résumé :
Prior research on combating commercial crime has focused predominantly on the responsibilities of auditors and ex post facto forensic investigations. This dissertation aims rather to delve into the meta-theoretical philosophy of commercial crime prevention and the role that forensic accountants can play in this regard, postulating that proactive prevention of commercial crimes is a more effective approach. The BRICS countries (Brazil, Russia, India, China and South Africa) were chosen for deeper level analysis, based on their strong growth potential coupled with high levels of commercial crime. While the majority of the research centred around commercial crime prevention strategies for the BRICS countries, a secondary objective was to expand the research field associated with forensic accounting, so as to encourage research into incorporating more preventative strategies. Subsequently, from the literature review and philosophical analysis performed, this dissertation establishes that developing prevention strategies for commercial crime is a philosophical and also a feasible possibility in the BRICS countries.
MCom (Forensic Accountancy), North-West University, Potchefstroom Campus, 2014
Styles APA, Harvard, Vancouver, ISO, etc.
6

Botha, Andre Eduan. « The Net Worth method as technique to quantify income during investigation of financial crime ». Thesis, 2009. http://hdl.handle.net/10500/3305.

Texte intégral
Résumé :
It is a well-known fact that criminals derive an income from their illegal activities, live lavish lifestyles, flaunt their wealth for all to see and acquire luxury goods. It is also a well known fact that criminals living from the proceeds of crime do not want to not want to keep financial records of their transactions or illegitimate business for fear of being detected by the authorities and to escape being taxed. It is also a known fact that criminals do not declare income from criminal activities for income tax purposes to the revenue authorities for fear of the illegal origin of the income being made known to the investigating authorities and law enforcement. During the investigation of financial crimes, such as tax evasion and money laundering, it may be required that the amount or value of money, income or assets accrued by a subject is determined in order to determine for instance their liability to pay tax. This research project examines the Net Worth method as an indirect method to circumstantially quantify income during the investigation of financial crime.
Police Practice
M.Tech. (Forensic Investigation)
Styles APA, Harvard, Vancouver, ISO, etc.
7

Tanfa, Denis Yomi. « Advance fee fraud ». Thesis, 2006. http://hdl.handle.net/10500/2304.

Texte intégral
Résumé :
The focus of this thesis is on Advance Fee Fraud (419 scams) on how it is executed and more importantly, on how it can be prevented. The research addresses the origins of AFF, the nature and extent of this crime and how the perpetrators are able to defraud their victims. The research described, examined and analysed the crimes, the perpetrators, the victims, adjudication and the prevention strategies of this fraud. Information was gathered through literature and empirical research. A qualitative research method was used to gather information from AFF offenders who were incarcerated in South African prisons in 2005. The results of the empirical research were carefully examined, analyzed and integrated into the various chapters of this thesis. A theoretical framework was also developed in an attempt to explain this complex phenomenon. The findings and recommendations in terms of the crimes, the criminals, the victims, adjudication and prevention were also made and some suggestions for further research thereof were also cited.
Criminology
D. Litt. et Phil. (Criminology)
Styles APA, Harvard, Vancouver, ISO, etc.
8

Mynhardt, Armand Johann. « Investigation of misrepresentation in tender documents ». Diss., 2011. http://hdl.handle.net/10500/5495.

Texte intégral
Résumé :
Construction companies, in particular, abuse the objectives of BEE in order to secure multimillion-rand contracts. Misrepresentations, specifically to the Department of Public Works, are made in various forms and stages during the submission of tender documentation by contractors. The status of BEE company owners is abused in order to secure contracts. Apartheid in South Africa prevented black citizens from entering the corporate world and thereby attaining a quality education. The South African government has, since 1994, adopted the BEE policy in order to redress racial and economic imbalances of the past. Fronting (which is regarded as fraud) is detrimental to the objectives of BEE, which are governed by legislation. Fronting further negatively affects the transformation of the South African economy which could be globally competitive. Fraud detection and its investigation are two concepts which are closely linked to each other and are vitally important to any fraud investi-gator.
Police Practice
M. Tech. (Forensic Investigation)
Styles APA, Harvard, Vancouver, ISO, etc.
9

Thenga, Godfrey. « A critical analysis of the policing of counterfeit goods in South Africa ». Thesis, 2018. http://hdl.handle.net/10500/25343.

Texte intégral
Résumé :
The researcher conducted a critical analysis of the policing of counterfeit crime in South Africa. A pure qualitative research design and approach was adopted. A literature review, interviews and observations were conducted to provide an overview of this problem nationally and internationally. Interview schedules were designed with pre-determined open-ended questions, which allowed participants to explain their perceptions, opinions and viewpoints on the policing of counterfeit in South Africa. Some of the designed questions were mailed to respondents. Questions were posed to members of the Specialised Commercial Crime Unit, members of the South African Police Service’s Crime Prevention Unit, members of the Department of Trade and Industry who deal with counterfeit, prosecutors who normally prosecute counterfeit cases, brand owners/holders/representatives, and attorneys who assist in the policing of counterfeit crime. The findings of this study informed the proposed recommendations for preventative and reactive response mechanisms. These proposed recommendations suggest ways of improving efficiency and effectiveness in policing counterfeit in South Africa.
Criminology and Security Science
Ph. D. (Criminal Justice)
Styles APA, Harvard, Vancouver, ISO, etc.
10

Nevo, Eitan Manuel Damian. « The impact of the application of international air cargo security regulations in South Africa ». Diss., 2015. http://hdl.handle.net/10500/19885.

Texte intégral
Résumé :
Text in English
This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector.
Criminology and Security Science
M. Tech. (Security Management)
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Commercial crimes – Prevention"

1

Borbat, A. V. Ugolovno-pravovye i kriminologicheskie aspekty okhrany predprinimatelʹskoĭ dei︠a︡telʹnosti : Monografii︠a︡. Moskva : VNII MVD Rossii, 2004.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Levi, Michael. The incidence, reporting, and prevention of commercial fraud : Summary of findings. [Cardiff, Glomorshire : s.n.], 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Repet︠s︡kai︠a︡, Anna Leonidovna. Organizovannai︠a︡ prestupnostʹ v sfere ekonomiki i finansov i problemy borʹby s neĭ. Irkut︠s︡k : Irkut︠s︡kai︠a︡ gos. ekonomicheskai︠a︡ akademii︠a︡, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Repet︠s︡kai︠a︡, A. L. Organizovannai︠a︡ prestupnostʹ v sfere ėkonomiki i finansov i problemy borʹby s neĭ. Irkutsk : Irkutskai︠a︡ gos. ėkonomicheskai︠a︡ akademii︠a︡, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Maẓlūm, Ḥamad ʻAbd al-Raḥmān. al-Muwājahah al-amnīyah lil-jarāʼim al-ʻābirah lil-ḥudūd. Dubayy : Akādīmīyat Shurṭat Dubayy, 2013.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Nadwah al-ʻIlmīyah lil-Jarāʼim al-Iqtiṣādīyah wa-Asālīb Muwājahatihā (41st 1996 Akādīmīyat Nāyif al-ʻArabīyah lil-ʻUlūm al-Amnīyah). al-Nadwah al-ʻIlmīyah al-Ḥādiyah wa-al-Arbaʻūn [lil]-Jarāʼim al-Iqtiṣādīyah wa-Asālīb Muwājahatihā : Tanfīdhan li-mutaṭallabāt al-Khiṭṭah al-Amnīyah al-ʻArabīyah al-Thāniyah, naẓẓamat Akādīmīyat Nāyif al-ʻArabīyah lil-ʻUlūm al-Amnīyah hādhihi al-nadwah bi-maqarrihā bi-al-Riyāḍ, fī al-fatrah min 16-18 Jumādá al-Ūlá 1417 H, al-muwāfiq 28-30 Sibtambir (Aylūl) 1996 M. al-Riyāḍ : Akādīmīyat Nāyif al-ʻArabīyah lil-ʻUlūm al-Amnīyah, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dmitriev, Oleg Vladimirovich. Ėkonomicheskai︠a︡ prestupnostʹ i protivodeĭstvie eĭ v uslovii︠a︡kh rynochnoĭ sistemy khozi︠a︡ĭstvovanii︠a︡. Moskva : I︠U︡rist, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Satuev, R. S. Ėkonomicheskai︠a︡ prestupnostʹ v finansovo-kreditnoĭ sisteme. Moskva : T︠S︡entr ėkonomiki i marketinga, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Larichev, V. D., et B. V. Borin. Teoreticheskie osnovy preduprezhdenii︠a︡ prestupleniĭ ėkonomicheskoĭ napravlennosti : Monografii︠a︡. Moskva : I︠U︡rlitinform, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Vashchekin, N. P. Bezopasnostʹ predprinimatelʹskoĭ dei︠a︡telʹnosti : Uchebnoe posobie. 2e éd. Moskva : Ėkonomika, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Commercial crimes – Prevention"

1

Mugellini, Giulia, Giang Ly Isenring et Martin Killias. « Patterns of Theft and Fraud by Employees Against the Commercial Sector in Switzerland and in Italy ». Dans Organized Crime, Corruption and Crime Prevention, 127–34. Cham : Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-01839-3_15.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Masters, Adam, et Adam Graycar. « A New Victorian Era : Getting Crime Out of Commercial Sex ». Dans Crime Prevention in the 21st Century, 293–315. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-27793-6_18.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

« Commercial Land Uses ». Dans Planning for Crime Prevention, 196–206. Routledge, 2004. http://dx.doi.org/10.4324/9780203645055-30.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

O’Hara, Kieron. « Social Machines ». Dans Four Internets, 229–36. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197523681.003.0020.

Texte intégral
Résumé :
People use familiar networked technologies for coordinating social activities, from games to problem-solving. Such sociotechnical networks have been called social machines, and can be found in healthcare and well-being, crime prevention, transport, citizen science, and in particular during emergencies such as the COVID-19 pandemic. The role of platform(s) as host(s) is key as to how, and how privately, the social machine operates. Social machines can be monetized on the DC Commercial Internet, and monitored on the Beijing Paternal Internet. One means of democratizing the platform is the project to re-decentralize the Internet and Web, to break down the walls of walled gardens and restore decentralization. One such idea, Solid, is described in detail, where people take charge of their personal data, storing it as linked data to increase its utility, but keeping it in personal online datastores (pods) under their control.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kopyściańska, Katarzyna. « Changes of Rules Applicable to Value Added Tax ». Dans European Financial Law in Times of Crisis of the European Union, 265–74. Ludovika Egyetemi Kiadó, 2019. http://dx.doi.org/10.36250/00749.25.

Texte intégral
Résumé :
Every year the state budget loses several dozen billions of zlotys. What provides the measure of the extent of this loss is “the tax gap” (although in fact it is not a gap) which shows the level of discrepancies between theoretical receipts due to the state budget and receipts actually collected in its fiscal function.The paper therefore explores the analysis of selected changes which have been implemented and which are commonly referred to as “the tightening of the tax system”. This is the reaction to those behaviours within legal and commercial exchanges which could be classified as a misuse of the tax system. The paper collates the most important, in the author’s opinion, possible legal responses to exchange situations having as their consequence an impairment or threat to the financial interest of the state, including, in particular, the phenomenon for which the standard term in criminal law dogma is tax loss. In the paper, possible methods of countering tax losses in the tax system will be addressed, while identifying mechanisms which are relevant for the legal construction and specificities of the tax on goods and services. The existing legal regulations are not sufficient for preventing fiscal fraud; the structure of the tax itself and the rules on setting the tax rates are the source of the threats encountered, while the expectations placed upon the valued added tax by the EU and the Member States are not met.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Commercial crimes – Prevention"

1

Jiang, Hui-hui, et Shu-qi Liu. « The performance and prevention of credit risks of commercial banks in China ». Dans 2011 China located International Conference on Information Systems for Crisis Response and Management (ISCRAM-CHINA). IEEE, 2011. http://dx.doi.org/10.1109/iscram.2011.6184126.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Vinogradova, O. S. « Crisis forecasting as the basis for preventive risk management methods in a Russian commercial bank ». Dans SCIENTIFIC CONFERENCE DEDICATED TO THE 15TH ANNIVERSARY OF THE MOSCOW SCHOOL OF ECONOMY, MSU M. V. LOMONOSOVA. Знание-М, 2020. http://dx.doi.org/10.38006/907345-19-5.2020.270.272.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Wang, Zichen, Wei Song et Tongtong Zhu. « Chinese enterprise commercial secret risk management practice and improvement—the crisis early warning mechanism of prevention and control research ». Dans 2013 International Conference on Services Science and Services Information Technology. Southampton, UK : WIT Press, 2014. http://dx.doi.org/10.2495/sssit130831.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie