63,697 Hits in 8.1 sec

E-CRIME System: A Knowledge Management Application in Public Administration [chapter]

Réka Vas, Barna Kovács, András Gábor
2004 Lecture Notes in Computer Science  
Our research project will be demonstrated, in which after the analysis of laws and legal studies the knowledge mapping of this domain has been realized.  ...  This paper will discuss in details the problems of the Hungarian juridical system, particularly those, which can be solved or supported by IT tools.  ...  The research shows a wider spectrum of possible improvements when the legislation process is analyzed.  ... 
doi:10.1007/978-3-540-24683-1_24 fatcat:xlirl5yj6jfmnhkh3xtiyosw6e


Jeffrey Ovre Agushaka, C. E. Chijioke, Yakmut I. Daniel
2022 FUDMA Journal of Sciences  
This research aims to develop an Intelligent Crime Management System for the Nigeria Police Force using a case study of Lafia metropolis in Nasarawa State.  ...  This system is comprised of an android based mobile application for crime reporting and awareness, a geospatial database that houses both legacy and new crime data, and a web-based intelligent application  ...  Balogun, et al. (2014) did a study that operationalized the application and utilization of geographical information systems in crime management and security situation analysis in Benin-Nigeria.  ... 
doi:10.33003/fjs-2022-0603-990 fatcat:ucktubx6uvc6bdhn6dc5rhwmeu

Correction at the Crossroads

Myrl E. Alexander
1960 Crime and delinquency  
It is an in- tegral part of management, not the tolerated avocation of the correctional dilettante. The administration of a correc- Myru E.  ...  A hospital must be administered by a skilled and trained hospital adminis. trator; a school system must be ad- ministered by a qualified person trained in educational administration; the manager of a mental  ... 
doi:10.1177/001112876000600402 fatcat:qjyyckskm5gjvhb7i43co3wgpu

EVALUATING EVERYDAY POLICIES Police Activity and Crime Incidence

E. Terrence Jones
1973 Urban Affairs Quarterly  
In recent years there has been a growing awareness of the importance of attracting well-qualified, competent people into local public service and insuring that they are provided not only with the resources  ...  Social scientists have also become increasingly interested in measuring and evaluating local public services in hopes of discovering factors that might be related to more effective service production.  ...  Yet there is also a clear expression of need for some training in relatively new areas, i. e., grant sources and applications, police human relations, and management and supervision training.  ... 
doi:10.1177/107808747300800301 fatcat:tjfsna2cvjhjtkjhi4tdcp62uq

SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases

Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang
2010 Computer Law and Security Review  
In addition, the case study and proposed suggestion of this paper are presented to counter Cyber-crime. ª 2009  ...  Digital evidence Trojan defense Triple-E strategy a b s t r a c t Cyber activity has become an essential part of the general public's everyday life.  ...  Acknowledgments This research was partially supported by the National Science Council of the Republic of China under the Grants NSC 98-2221-E-015-001-MY3-.  ... 
doi:10.1016/j.clsr.2009.09.008 fatcat:4wvmtlqqmrcerfhez3oz6q3ihe


Agata C. Amato Mangiameli (Universidade de Roma – Tor Vergata)
2017 Duc In Altum - Cadernos de Direito  
This paper aims investigate the general theory and the elements of the computer crimes as well it social engineering, because as technology advances, more and more people use it according to their needs  ...  Nowadays, their favorite vehicle of infection is represented by e-mails and peer-to-peer networks. Worm is a software which modifies the host operating system, in order to replicate itself.  ...  Some worms exploit the flaws -bugs -of the system to run automatically when the user views his e-mail.  ... 
doi:10.22293/2179-507x.v8i16.395 fatcat:gdtflgsfprclrgbpzqg4g62b5q


Dorothy E. Denning, William E. Baugh
1999 Information, Communication & Society  
Breaking the Codes It is often possible to obtain the key needed to decrypt data by exploiting a weakness in the encryption algorithm, implementation, key management system, or some other system component  ...  For example, PGP might be used for e-mail, while an application's builtin encryption might be used to protect documents within the application.  ... 
doi:10.1080/136911899359583 fatcat:3ffz6maiezhonhb4ditgndhtpu

Implementation of E-Commerce Crime Law Enforcement at the West Nusa Tenggara Regional Police

Siti Zahratul Azizah, Zainal Asikin, Lalu Parman
2021 International Journal of Multicultural and Multireligious Understanding  
This study aims to analyze the implementation of e-commerce criminal law enforcement in the NTB police institution related to how the law enforcement of e-commerce crime in the NTB Regional Police agency  ...  In e-commerce crime, the police have difficulties such as difficulty finding evidence, finding anonymous accounts and electronic identities.  ...  , improving the public mental health system, making international cooperation effective in eradicating cyber crime, improving the security system computers, and streamline administrative law and civil  ... 
doi:10.18415/ijmmu.v8i2.2273 fatcat:ljpufptdjjgqvh5lrmkmtwg3aa

The Security Survey: Creating A Proactive Foundation for Campus Crime Prevention

George E. Richards
1996 Journal of Contemporary Criminal Justice  
The applications of a security survey, as part of a systemic approach to campus crime prevention, work to the benefit of all who participate in the campus community.  ...  Journal of Contemporary Criminal Justice Vol. 12 «No. 1 * February 1996 The Security Survey: Creating A Proactive Foundation for Campus Crime Prevention George E.  ... 
doi:10.1177/104398629601200104 fatcat:sghcephya5a4hmyxrsisntrgri

Review of Crimes in Peru and Proposal of a Neural Network Architecture to Predict if a Person Could Commit a Crime

Hugo David Calderon Vilca, Luciano E. Carhuaricra Rivera, Oscar F. Abad Nauto, Jose A. Carrillo Estrada, Edwin F. Calderon-Vilca, Manuel Jesus Ibarra Cabrera
2021 Zenodo  
We have also implemented a web application as a tool for the institutions that administer and punish crimes.  ...  Due to this, in this research we propose an architecture de neural network capable of predicting the possible crimes that a person could commit, after answering a form about their family and social conditions  ...  administration 1: Yes 0: No DEL_8 Crimes against trust and good faith in business 1: Yes 0: No DEL_9 Crimes against the family 1: Yes 0: No DEL_10 Crimes against public faith 1: Yes 0:  ... 
doi:10.5281/zenodo.4770802 fatcat:e5ny6onflrenxgjuzgzrqbbfwi

Crime Mapping and Analysis [chapter]

Ronald E. Wilson, Katie M. Filbert
2008 Encyclopedia of GIS  
Geographic coverage is a concept for continuous phenomena. Geographic coverage standards defines conceptual schema for coverage and analyze coverage types and components, e. g., [1] .  ...  They can be described, published and found in standard service catalogues, be accessed by all compliant clients, and be connected in order to construct service chains to accomplish complex geospatial modeling  ...  Acknowledgements We would like to thank Keith Harries, Dan Helms, Chris Maxwell and Susan Wernicke-Smith for providing comments on this entry in a very short time. They provid-  ... 
doi:10.1007/978-0-387-35973-1_226 fatcat:al45fmugkjc4vfxp7jepyfhrti

Toward a Jurisprudence of Family Violence

Franklin E. Zimring
1989 Crime and justice  
Privatization is essentially a separation from the formal legal system, contingent intervention makes legal responses available only after the victim has taken action, and compulsory intervention involves  ...  a minor child was involved.  ...  E.  ... 
doi:10.1086/449161 fatcat:52zzkigd6bbmxjunrauehgol5q

E‐Commerce Security: The Birth of Technology, the Death of Common Sense?

Robin McCusker
2001 Journal of Financial Crime  
control and its weak application of its computer systems and processes.  ...  security is perceived to be a very real threat, it is a function routinely delegated to already hardpressed network or system administrators.  ... 
doi:10.1108/eb026009 fatcat:2iyejjpy6veproquslwg7jq7iy

The Most Recent Grist on Crime and Punishment

H. E. Barnes
1925 Social Forces  
She recognizes that they are the product of a system which vests prison and jail administration in about the most vile and incompetent type of public agents and officials.  ...  The methods of criminals are presented through a description of the stage management of spectacular crimes, blackmailers, the dinner thief and the pickpocket, and the “stick-up” and the house-prowler.  ... 
doi:10.2307/3005020 fatcat:2nfcwpekufd5biid2hv4exar7y


Vyacheslav Nekrasov, Vadym Melnyk, Konstiantyn Kryvosheiev, Yurii Kiiashko, Oleh Yemets
2020 Revista Gênero e Interdisciplinaridade  
of law enforcement agencies to ensure the economic security system in Ukraine.  ...  The relevance of this article is due to the place of law enforcement agencies in the system of economic security of Ukraine.  ...  informing the public about the results of activities to counter the threats to the economic security system of Ukraine. Ukraine's economic security system.  ... 
doi:10.51249/gei.v1i01.27 fatcat:blvqvdsyjjdpvojqjumr77nswi
« Previous Showing results 1 — 15 out of 63,697 results