November 2003
Weekly Reader News - Senior;11/14/2003, Vol. 82 Issue 12, p7
Presents a problem-solving activity about stealing.


Related Articles

  • Criminal Identity Deception and Deception Detection in Law Enforcement. Wang, Gang; Chen, Hsinchun; Atabakhsh, Homa // Group Decision & Negotiation;Mar2004, Vol. 13 Issue 2, p111 

    Criminals often falsify their identities intentionally in order to deter police investigations. In this paper we focus on uncovering patterns of criminal identity deception observed through a case study performed at a local law enforcement agency. We define criminal identity deception based on...

  • The Criminalisation of Identity Theft under the Saudi Anti-Cybercrime Law 2007. Almerdas, Suhail // Journal of International Commercial Law & Technology;Apr2014, Vol. 9 Issue 2, p80 

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial...

  • Anti-theft procedures and fixtures: a randomized controlled trial of two situational crime prevention measures. Hayes, Read; Downs, Daniel; Blackwood, Robert // Journal of Experimental Criminology;Mar2012, Vol. 8 Issue 1, p1 

    Objectives: This study was designed to test two problem-focused situational crime prevention treatments (protective display fixtures and special high-loss product handling procedures) on loss and sales levels of a perennial 'hot product' (premium shaving blade replacement packs). Methods: The...

  • Study on the Anti-theft System for Notebooks on Campus. Jiayi Zhang; Fengjie Yu; Yuqin Gao; Qiang Gao // Applied Mechanics & Materials;2014, Vol. 687-691, p2161 

    With the rapid development of Internet of Things technology, the application of it has extended to all areas closely related to people's life. In recent years, notebooks stolen on campus along with the widespread use of them are arousing people's increasing concern. To solve this problem, an...

  • Look at Risk from a Different Angle to Achieve Results. Gates, Robert D. // Security: Solutions for Enterprise Security Leaders;Jun2011, Vol. 48 Issue 6, p32 

    The article focuses on the need to view risk at a different side in order to achieve better solutions for security problems. It states that true security leadership calls for improved tactics which are based on how a particular problem is seen. It mentions that like in the case of metal theft,...

  • The case of the leftover locker. Woods, Khadia // Scholastic SuperScience;Sep97, Vol. 9 Issue 1, p15 

    Presents a problem-solving activity the objective of which to search a leftover locker for clues about its former owner.

  • Resolving conflicts step by step. Arbetter, S. // Current Health 2;Sep91, Vol. 18 Issue 1, p14 

    Outlines a five-step method for resolving conflicts. Includes identifying the problem, looking for possible solutions, choosing the best solution, acting on a solution and evaluating the outcome. INSET: Consider the consequences (hints for impulse control)..

  • Solving problems successfully: Think before you act. Sanders, Lynn B. // Current Health 2;Sep97, Vol. 24 Issue 1, p13 

    Discusses the importance of tuning in to your inner self when confronted with a problem or difficult situation. Comment that the way you talk to yourself determines your attitudes, actions, and degree of success in life; Steps on how to avoid unnecessary disagreement and conflict. INSET: Tips...

  • Let's negotiate! Donahue, Marilyn Cram // Current Health 2;Feb98, Vol. 24 Issue 6, p13 

    Focuses on the need to incorporate negotiation and cooperation in the decision making and problem solving processes. How negotiation can make a difference; Discussion on decision making; What can e accomplished from cooperation.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics