Search

Your search keyword '"Extortion"' showing total 11,752 results

Search Constraints

Start Over You searched for: Descriptor "Extortion" Remove constraint Descriptor: "Extortion"
11,752 results on '"Extortion"'

Search Results

2. Evolving Trends in Ransomware: Inherent Advanced Persistent Threat

3. The impact of the kingpin strategy on extortion and kidnapping.

4. Anatomy of a route: Script analysis of irregular migration, smuggling and harms on the Central Mediterranean route to Europe.

5. "دور الأنظمة في الحد من جريمة الابت ا زز الإلكتروني في النظام السعودي")دراسة مقارنة في الأنظمة المنظمة للابتزاز الإلكتروني النظام السعودي والقانون الإماراتي ()BLLM- ضمن مقرر البحث) 698

6. City on fire: The role of extortion in urban fires.

7. Dating Applications: A Honeypot for Sextortion Victims.

8. The New Legislative Trends to Combat Bullying Crimes in Jordanian Legislation.

9. مشروعية المسؤولية الجزائية في جرائم الابتزاز الإلكتروني للأحداث.

10. Ask Pollex: Legal column: Common law extortion is rife in South Africa.

11. Rebel Taxation as Extortion or a Technology of Governance? Telling the Difference in India's Northeast.

12. Extortion experiences of recent adult immigrants from Latin America: self-reported prevalence, associated costs, and current mental health

13. Corruption, language and popular agency: Review of Daniel E. Agbiboa, They Eat Our Sweat. Transport Labor, Corruption, and Everyday Survival in Urban Nigeria. Oxford, Oxford University Press, 2022, 266 pp., £75.00 (hardback), ISBN: 9780198861546.

14. The Persistence of Latin America's Violent Democracies: Reviewing the Research Agenda on Policing, Militarization, and Security Across the Region.

15. Algorithmic governance or extortion? Everyday experiences of fintech for loans in Nigeria.

16. Beyond exit: how populist governments disengage from international institutions.

17. Extortion experiences of recent adult immigrants from Latin America: self-reported prevalence, associated costs, and current mental health.

18. السلم المجتمعي وحيازة السلاح دراسة ميدانية في مدينة بغداد.

19. موظفو الأجهزة الامنية والابتزاز الالكتروني (دراسة في وزارة الداخلية).

20. Hybrid video steganography and cryptography techniques: Review paper.

22. Ratio Legis of Article 12 Letter F : The Extortion in Corruption

23. Terrorism and the Media-The Right to Know and the Challenges of Extortion

24. Korruption an der Warteschlange im Flughafenterminal.

25. I SAID NOTHING.

26. Responses to Killing in State-Sanctioned and Unsanctioned Killers: Pathways of Construing.

27. Recognising and evaluating the effectiveness of extortion in the Iterated Prisoner's Dilemma.

28. Protection or predation? Examining COVID-19 policing and the nuances of police corruption in Nigeria.

29. Electronic Extortion is a Crime, According to Jordan's Electronic Crimes Law No. 17 of 2023.

30. Emotional Blackmail in Breaking Bad Series: A Pragma-Stylistic Study.

31. Clarification, Prioritization, and Examination of the Role of Financial Corruption Dimensions in Financial Statement Manipulation.

32. جريمة الابتزاز الإلكتروني (دراسة مقارنة).

33. EL PROBLEMÁTICO TRATAMIENTO PENAL DE LA COMPRA DE VOTOS EN LA LEY ORGÁNICA DEL RÉGIMEN ELECTORAL GENERAL.

34. Azerbaijan's power plays: analyzing Baku's policy towards Armenia and Nagorno-Karabakh after 2020.

35. Terrorism and the Media-The Right to Know and the Challenges of Extortion.

36. Blackmail, Unproductive Exchanges, Fraud, and the Libertarian Theory of Voluntariness.

37. Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users.

41. Retreating from Legitimacy: Hamas's Engagement In and Disengagement From Governance.

42. Procurement mafias: Affecting all sectors.

43. Hackers are exploiting Microsoft 365 to send extortion emails

46. ALLEGIANCE BLINDNESS, EXTRA-TERRITORIAL EXUBERANCE, AND SECURITY AMBIVALENCE: A CRITICAL ANALYSIS OF THE RULING OF THE EUROPEAN COURT OF JUSTICE ON PRODUCTS ORIGINATING FROM WESTERN SAHARA.

47. Análisis de la tendencia del crimen violento en la Zona Metropolitana del Valle de México.

48. Against the Odds: Small Business Strategies for Managing Extortion in San Salvador.

49. وعي طلبة الجامعة ناهزة الابتزاز الالكتروني وسبل مواجهتهامن مغغلور خريقة خدمة الجماعة

50. Moving Through Conflict: Transit Migration and Rebel Capacity in Mali.

Catalog

Books, media, physical & digital resources