Results 81 to 90 of about 463,296 (299)

Specific Features of the Classification of War Crimes Against Property Involving Elements of Theft

open access: yesLaw and Safety
The article is devoted to the development of theoretical foundations and practical recommendations for the correct classification of war crimes directed against property and involving elements of theft.
Yu. V. Orlov
doaj   +1 more source

Differences in Attitudes towards Theft between British and Romanian Students

open access: yesFields, 2019
Fear of crime as a subject has received increasing levels of attention from scholars over the years. The phenomenon has been explored across diverse crimes and cultures with varying results, the better part of the literature revolving around general fear
Alexandra Diana Gorcea
doaj   +2 more sources

Narcotic Theft [PDF]

open access: yesThe Journal of the American Board of Family Medicine, 1999
R, Kakaiya, J, Wenzel-Wamhoff
openaire   +2 more sources

The decline in robbery and theft: inter-state comparisons [PDF]

open access: yes
This paper finds that the national decline in robbery and theft offences is partly due to a reduction in heroin use and partly due to improvements in the economy, but that other factors are likely to have also played a role.Aim: To describe and ...
Don Weatherburn, Jessie Holmes
core  

‘When joy comes your way, you have to grab it!’ Troubling how queer joy features in the lives of LGBT+ school‐attending youth in South Africa

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Recently, the concept ‘queer joy’ has gained interest in LGBT+ scholarship in the West. I use this scholarship as an entry point to explore how school‐attending LGBT+ youth express joy and how joy serves as a form of resistance against gender and sexuality norms in educational settings.
Dennis Francis
wiley   +1 more source

No. 21: Cross-Border Raiding and Community Conflict in the Lesotho-South African Border Zone [PDF]

open access: yes, 2001
Movement backwards and forwards across borders for work is often considered to be the primary form of unauthorized movement in Southern Africa. In southern Lesotho, a new and particularly dangerous form of two-way cross-border movement has become ...
Cekwane, Tsepang   +6 more
core   +1 more source

Securing Internet Protocol (IP) Storage: A Case Study

open access: yes, 2010
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S   +1 more
core   +1 more source

Heritage, crisis, and community crime prevention in Nepal [PDF]

open access: yes, 2018
Following Nepal's 2015 earthquake there was speculation that sacred art would be looted from the ruins of severely damaged temples due to breakdown in formal security.
Mackenzie, Simon, Yates, Donna
core   +3 more sources

Between soft power and suspicion: Chinese international students as diasporic actors in U.S.‐China geopolitical tensions

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This study examines the under‐theorized political role and identity of Chinese international students, who emerge as significant actors caught between U.S. soft power ambitions and rising geopolitical suspicion. Amid escalating U.S.‐China tensions, these students are forced to confront environments shaped by competing geopolitical discourses ...
Jing Yu
wiley   +1 more source

Women’s crime in Munster in the first half of the XVII century [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: История. Международные отношения
Based on the analysis of the preserved materials of the judicial and investigative cases of Munster in the first half of the XVII century, the article identifies the features of the women’s crime in the city.
Chavkina, Olesya V.   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy