When crime events defy classification: The case of product counterfeiting as white-collar crime (Englisch)
- Neue Suche nach: Heinonen, Justin A
- Neue Suche nach: Heinonen, Justin A
- Neue Suche nach: Spink, John
- Neue Suche nach: Wilson, Jeremy M
In:
Security journal
;
30
, 2
; 621
;
2014
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:When crime events defy classification: The case of product counterfeiting as white-collar crime
-
Beteiligte:
-
Erschienen in:Security journal ; 30, 2 ; 621
-
Verlag:
- Neue Suche nach: Palgrave Macmillan
-
Erscheinungsort:Basingstoke
-
Erscheinungsdatum:2014
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 53.83
- Weitere Informationen zu Basisklassifikation
- Neue Suche nach: 770/6645
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 30, Ausgabe 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 335
-
Do Web surveys facilitate reporting less favourable opinions about law enforcement?Boivin, Rémi et al. | 2014
- 349
-
Raising the bar: Professionalism and service delivery standards within New Zealand's contract private security industryTrevor Bradley et al. | 2017
- 367
-
CCTV in jail housing: An evaluation of technology-enhanced supervisionDebus-Sherrill, Sara A et al. | 2014
- 385
-
Prevention of white-collar crime through licensing: The case of the licensing of employees in the Swedish securities industryEngdahl, Oskar et al. | 2014
- 401
-
The economics of private security expenditure: The influence of perceptions of crimeManning, Matthew et al. | 2014
- 417
-
The war on terror and accomplices: An exploratory study of individuals who provide material support to terroristsHarms, Joshua et al. | 2015
- 437
-
A partial test of the impact of a casino on neighborhood crimeJohnson, Lallen T et al. | 2014
- 454
-
Voice phishing fraud and its modus operandiChoi, Kwan et al. | 2015
- 467
-
End-user perceptions of intelligence dissemination from a state fusion centerLewandowski, Carla et al. | 2014
- 487
-
Reducing metal thefts through the use of local ordinances: An evaluation of an impromptu Market Reduction Approach in St. Louis, MOMares, Dennis M et al. | 2014
- 504
-
Minority threat and school security: Assessing the impact of Black and Hispanic student representation on school security measuresMowen, Thomas J et al. | 2014
- 523
-
Have the standards for private security guards become more stringent in the post 9/11 era? An assessment of security guard regulations in the US from 1982 to 2010Nalla, Mahesh K et al. | 2014
- 538
-
An analysis of the method of approach (MA) and modus operandi (MO) of armed robbery and armed robbers in contemporary NigeriaOtu, Smart E et al. | 2014
- 556
-
Tackling cyber-terrorism: Balancing surveillance with counter-communicationPalasinski, Marek et al. | 2014
- 569
-
Reducing welfare fraud: An Australian case studyPrenzler, Tim et al. | 2014
- 585
-
Evaluating the adequacy of private security industry regulation in FinlandSantonen, Teemu et al. | 2014
- 605
-
Understanding crisis communications: Examining students’ perceptions about campus notification systemsSchildkraut, Jaclyn et al. | 2015
- 621
-
When crime events defy classification: The case of product counterfeiting as white-collar crimeHeinonen, Justin A et al. | 2014
- 640
-
Product fraud and product counterfeiting as a source of terrorist financingSpink, John et al. | 2015
- 646
-
The effectiveness of burglary security devicesTseloni, Andromachi et al. | 2014