Search Results - "extortion"
-
1
Crime and tourist arrivals: Is there any relationship?
Published 2012“…The main purpose of this study is to investigate the dynamic relationship between crimes (Total Crime, Thefts and Other Stealing, Robbery and Extortion, Burglary, House and Store Breaking, Arson, Murder and Manslaughter, and Assaults) and tourist arrivals in Sarawak. …”
Get full text
Get full text
Get full text
-
2
Women and corruption
Published 2014“…In Islam, any form of corruption (fasÉd) like bribery, extortion, kickback and illegal gratuity are strictly prohibited by the texts. …”
Get full text
Get full text
-
3
Federations: The Political Dynamics of Cooperation
Published 2012“…Chad Rector develops a new theory that states federate when their leaders expect benefits from closer military or economic cooperation but also expect that cooperation via an international organization would put some of the states in a vulnerable position, open to extortion from their erstwhile partners. The potentially vulnerable states hold out, refusing to join alliances or customs unions, and only agreeing to military and economic cooperation under a federal constitution. …”
Get full text
-
4
Ransomware: Stages, detection and evasion
Published 2021“…This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion. It also discusses on steps that organization should take to prevent ransomware attack and several detection methods for ransomware. …”
Get full text
-
5
Ransomware: stages, detection and evasion
Published 2022“…This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion. It also discusses on steps that organization should take to prevent ransomware attack and several detection methods for ransomware. …”
Get full text
Get full text
-
6
Digital revolution and fake news
Published 2017“…The negative effects include a black market in computerised extortion, the rise in depression and the spread of fake news. …”
Get full text
Get full text
-
7
Mean-variance model with fuzzy random data
Published 2020“…The reproduced outcomes will be indicated that the channel occupied component extortion with utilized distribution presents much better exactness with less algorithmic unpredictability than other discourse feeling articulation acknowledgment draws near.…”
Get full text
Get full text
-
8
Persepsi pelancong terhadap aspek keselamatan (kajian kes : daerah Johor Bahru)
Published 2007“…Incident of crimes such theft, extortion, theft of motor vehicle and robbery were highly considered by tourist. …”
Get full text
Get full text
-
9
Critical moment for Indonesian journalism: disappearance of journalistic firewall
Published 2024“…The COVID-19 pandemic has accelerated the process of eroding journalists’ welfare and reviving pre-pandemic unethical practices, such as bribery, extortion and news withdrawal on the pretext of welfare. …”
Get full text
Get full text
-
10
Indian gangsterism in Kuala Lumpur / Thevendran S Sivanantham
Published 1985“…As a criminal gang, the activities of these gangs include gang fights and "table talks", vice rings, drug pushing, extortion and "protection service". For these purposes, the gangs use a wide range of weapons, from meat choppers to revolvers. …”
Get full text
Get full text
-
11
Non-identity, sufficiency and exploitation
Published 2011“…When groups are threatened with extortion, we often render their rights inalienable. …”
Get full text
-
12
A study on the policies and procedures of anti-money laundering framework practiced by Am Assurance / Norhazwani Hasinah Haniffuddin
Published 2009“…Money laundering is the process by which criminals attempt to conceal the true origin and ownership of the proceeds of their unlawful activities such as smuggling offence, false trading, bucketing, inducing persons to invest money, dangerous drugs, kidnapping, theft, robbery, slavery, extortion, terrorism and others. The issue is how the launderers clean their “dirty money” from an illegal business through bought an Insurance policy. …”
Get full text
-
13
Socio-Economic Condition and Occupation Migration of Fisherman of the Jamuna River under Shirajgonj District in Bangladesh
Published 2014“…The main problems are extortion by the local extortionists, inadequate credit, lack of appropriate gear etc. …”
Get full text
Get full text
-
14
Public perception on safety awareness of petrol station / Muhammad Firdaus Zakaria
Published 2013“…Majority of respondents agreed that the kiosk should be operating in 24 hours to ease public to use the facilities provided at petrol station and commented that the place to be added more safety features such as security guard and cctv in order to avoid robbery and snatching.The study also showed other results such as the level of knowledge of respondents about awareness of fire and explosion, accident and injury, and robbery, extortion…”
Get full text
-
15
Socio-economic impact of Niger Delta Development Commission (NDDC) infrastructural projects in selected communities in IMO State Nigeria
Published 2015“…Most government provides these facilities to check their cost and charges when provided by individuals or companies so as to control the capitalist monopolist tendencies of exorbitant charges and extortion since they are necessities of life. The Niger Delta Region covered by NDDC are the nine states in Nigeria as follows: Delta, Akwa-Ibom, Bayelsa, Cross River, Rivers, Ondo, Imo, Abia and Edo States but this study is concentrating on the communities of Ohaji/Egbema, Obowo and Oguta in Imo state. …”
Get full text
Get full text
-
16
Analysis of known and unknown malware bypassing techniques
Published 2013“…Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. …”
Get full text
Get full text
-
17
The classification of corruption in Indonesia: a behavioral perspective
Published 2017“…The researcher interviewed deeply 9 suspects of corruption cases being imprisoned.The results of the research show that the classification of corruptors in Indonesia includes all types of corruptions constructed by the Association of Certified Fraud Examiners (ACFE), namely: conflict of interest, bribery, illegal gratuities, and economic extortion. Based on the interview, it is found that the interviewees perform different types of corruptions as follows: there are some suspects perform more than one type of corruptions; there are some suspects perform single corruptions with the same type, and there are some suspects perform single corruptions with the different type. …”
Get full text
-
18
The impact of external factor on bank fraud prevention and the role of capability element as moderator in Saudi Arabia banking sektor
Published 2017“…This paper talks about the effect of external factors considers on fraud prevention to examine the directing impact of capacity component of extortion on external factors and fraud prevention in the Saudi bank system This paper discusses the impact of external industry factors on fraud prevention with the primary aim to investigate the moderating effect of capability element of fraud on external industry factors and fraud prevention in the Saudi Arabian banking sector. …”
Get full text
-
19
Model for phishing websites classification using artificial neural network
Published 2021“…Phishing can be regarded as a type of web extortions described as the skill of imitating an honest company's website aimed at obtaining private information for example usernames, passwords, and bank information. …”
Get full text
Get full text