Search Results - "extortion"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Crime and tourist arrivals: Is there any relationship? by Thian, Li Shya

    Published 2012
    “…The main purpose of this study is to investigate the dynamic relationship between crimes (Total Crime, Thefts and Other Stealing, Robbery and Extortion, Burglary, House and Store Breaking, Arson, Murder and Manslaughter, and Assaults) and tourist arrivals in Sarawak. …”
    Get full text
    Get full text
    Get full text
  2. 2

    Women and corruption by Akhmetova, Elmira

    Published 2014
    “…In Islam, any form of corruption (fasÉd) like bribery, extortion, kickback and illegal gratuity are strictly prohibited by the texts. …”
    Get full text
    Get full text
  3. 3

    Federations: The Political Dynamics of Cooperation by Fenna, Alan

    Published 2012
    “…Chad Rector develops a new theory that states federate when their leaders expect benefits from closer military or economic cooperation but also expect that cooperation via an international organization would put some of the states in a vulnerable position, open to extortion from their erstwhile partners. The potentially vulnerable states hold out, refusing to join alliances or customs unions, and only agreeing to military and economic cooperation under a federal constitution. …”
    Get full text
  4. 4

    Ransomware: Stages, detection and evasion by Yus Kamalrul, Mohamed Yunus, Syahrulanuar, Ngah

    Published 2021
    “…This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion. It also discusses on steps that organization should take to prevent ransomware attack and several detection methods for ransomware. …”
    Get full text
  5. 5

    Ransomware: stages, detection and evasion by Yus Kamalrul, Mohamed Yunus, Syahrulanuar, Ngah

    Published 2022
    “…This paper discuses on stages of ransomware attacks starting from reconnaissance to extortion. It also discusses on steps that organization should take to prevent ransomware attack and several detection methods for ransomware. …”
    Get full text
    Get full text
  6. 6

    Digital revolution and fake news by Ahmad Farouk, Azeem Fazwan

    Published 2017
    “…The negative effects include a black market in computerised extortion, the rise in depression and the spread of fake news. …”
    Get full text
    Get full text
  7. 7

    Mean-variance model with fuzzy random data by Othman, Mohammad Haris Haikal, Arbaiy, Nureize, Che Lah, Muhammad Shukri, Pei, Chun Lin

    Published 2020
    “…The reproduced outcomes will be indicated that the channel occupied component extortion with utilized distribution presents much better exactness with less algorithmic unpredictability than other discourse feeling articulation acknowledgment draws near.…”
    Get full text
    Get full text
  8. 8

    Persepsi pelancong terhadap aspek keselamatan (kajian kes : daerah Johor Bahru) by Mohamad Nur, Hanirah

    Published 2007
    “…Incident of crimes such theft, extortion, theft of motor vehicle and robbery were highly considered by tourist. …”
    Get full text
    Get full text
  9. 9

    Critical moment for Indonesian journalism: disappearance of journalistic firewall by Nanang Krisdinanto, Merlina Maria Barbara Apul, Rajab Ritonga

    Published 2024
    “…The COVID-19 pandemic has accelerated the process of eroding journalists’ welfare and reviving pre-pandemic unethical practices, such as bribery, extortion and news withdrawal on the pretext of welfare. …”
    Get full text
    Get full text
  10. 10

    Indian gangsterism in Kuala Lumpur / Thevendran S Sivanantham by Thevendran S, Sivanantham

    Published 1985
    “…As a criminal gang, the activities of these gangs include gang fights and "table talks", vice rings, drug pushing, extortion and "protection service". For these purposes, the gangs use a wide range of weapons, from meat choppers to revolvers. …”
    Get full text
    Get full text
  11. 11

    Non-identity, sufficiency and exploitation by Rendall, Matthew

    Published 2011
    “…When groups are threatened with extortion, we often render their rights inalienable. …”
    Get full text
  12. 12

    A study on the policies and procedures of anti-money laundering framework practiced by Am Assurance / Norhazwani Hasinah Haniffuddin by Haniffuddin, Norhazwani Hasinah

    Published 2009
    “…Money laundering is the process by which criminals attempt to conceal the true origin and ownership of the proceeds of their unlawful activities such as smuggling offence, false trading, bucketing, inducing persons to invest money, dangerous drugs, kidnapping, theft, robbery, slavery, extortion, terrorism and others. The issue is how the launderers clean their “dirty money” from an illegal business through bought an Insurance policy. …”
    Get full text
  13. 13
  14. 14

    Public perception on safety awareness of petrol station / Muhammad Firdaus Zakaria by Zakaria, Muhammad Firdaus

    Published 2013
    “…Majority of respondents agreed that the kiosk should be operating in 24 hours to ease public to use the facilities provided at petrol station and commented that the place to be added more safety features such as security guard and cctv in order to avoid robbery and snatching.The study also showed other results such as the level of knowledge of respondents about awareness of fire and explosion, accident and injury, and robbery, extortion…”
    Get full text
  15. 15

    Socio-economic impact of Niger Delta Development Commission (NDDC) infrastructural projects in selected communities in IMO State Nigeria by Isidiho, Alphonsus Okpechi, Sabran, Mohammad Shatar

    Published 2015
    “…Most government provides these facilities to check their cost and charges when provided by individuals or companies so as to control the capitalist monopolist tendencies of exorbitant charges and extortion since they are necessities of life. The Niger Delta Region covered by NDDC are the nine states in Nigeria as follows: Delta, Akwa-Ibom, Bayelsa, Cross River, Rivers, Ondo, Imo, Abia and Edo States but this study is concentrating on the communities of Ohaji/Egbema, Obowo and Oguta in Imo state. …”
    Get full text
    Get full text
  16. 16

    Analysis of known and unknown malware bypassing techniques by Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood

    Published 2013
    “…Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. …”
    Get full text
    Get full text
  17. 17

    The classification of corruption in Indonesia: a behavioral perspective by Hamdani, Rizki, Kumalahadi, Kumalahadi, Urumsah, Dekar

    Published 2017
    “…The researcher interviewed deeply 9 suspects of corruption cases being imprisoned.The results of the research show that the classification of corruptors in Indonesia includes all types of corruptions constructed by the Association of Certified Fraud Examiners (ACFE), namely: conflict of interest, bribery, illegal gratuities, and economic extortion. Based on the interview, it is found that the interviewees perform different types of corruptions as follows: there are some suspects perform more than one type of corruptions; there are some suspects perform single corruptions with the same type, and there are some suspects perform single corruptions with the different type. …”
    Get full text
  18. 18

    The impact of external factor on bank fraud prevention and the role of capability element as moderator in Saudi Arabia banking sektor by Baz, Rayaan, Samsudin, Rose Shamsiah, Che Ahmad, Ayoib

    Published 2017
    “…This paper talks about the effect of external factors considers on fraud prevention to examine the directing impact of capacity component of extortion on external factors and fraud prevention in the Saudi bank system This paper discusses the impact of external industry factors on fraud prevention with the primary aim to investigate the moderating effect of capability element of fraud on external industry factors and fraud prevention in the Saudi Arabian banking sector. …”
    Get full text
  19. 19

    Model for phishing websites classification using artificial neural network by Hassan, N. H., Abdul Sahli, Fakharudin

    Published 2021
    “…Phishing can be regarded as a type of web extortions described as the skill of imitating an honest company's website aimed at obtaining private information for example usernames, passwords, and bank information. …”
    Get full text
    Get full text