Results for 'extortion'

12 found
Order:
  1. (1 other version)Bribery and Business.J. Drake - 2021 - Encyclopedia of Business and Professional Ethics.
    The concept of bribery is important to our thinking about ethics, especially in professional contexts. This is in no small part due to the thought that, as Seamus Miller has put it, bribery is “a paradigm of corruption”. Business persons and corporate entities are often evaluated by how well they remain free from, root out, and punish corruption – especially in democratic societies. It is a common thought, for example, that a democratic institution ought to be free from corruption. Since (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  33
    Credit Card Fraud Observation Using AdaBoost and Majority Voting Techniques.Peddinti Janani Akanksha SriLakshmi L. - 2020 - International Journal of Innovative Research in Science, Engineering and Technology 9 (6):4187-4191.
    Charge card extortion is a difficult issue in monetary administrations. Billions of dollars are lost because of charge card misrepresentation consistently. There is an absence of research concentrates on dissecting true Mastercard information attributable to classification issues. In this paper, AI calculations are utilized to identify charge card misrepresentation. Standard models are utilized. At that point, hybrid techniques which use AdaBoost and Majority Voting are applied. To assess the model viability, a freely accessible charge card informational collection is utilized. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Psychology of Anger: George Kelly 's Phenomenology of Hostility.Joshua Soffer Mr - manuscript
    The way that George Kelly treats moving from an act of love to an act of hate, via his formulation of the construct of hostility, may indicate how far apart Kelly’s model and embodied intersubjective approaches stand concerning the issue of the fundamental integrity of experiencing. All feeling and emotion for Kelly expresses an awareness of the relative ongoing success or failure in relating new events to one’s outlook. But his definition of hostility stands out from his account of guilt, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  53
    Frantz Fanon and the Critique of Colonialism: A Philosophical Inquiry.Ridwan Ishola Mogaji & Adewale Oluwaseun Motadegbe - 2025 - International Journal of Religions and Peacebuilding (Injorep) 2 (1):80-97.
    The question of colonialism has been a deteriorating phenomenon in African history. Frantz Fanon conceived colonialism as a form of domination with the goal redefining the reality of the world of indigenous (“native”) peoples, which he considered possible through the means of violence. His conception of colonialism is that which with no doubt is embedded in vices and nothing more irrespective of the claims of the colonial masters that they aim at civilizing the people of Africa. Exploitation, extortion, economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Teknoloji Çağında Rasyonalite, Deneyim ve Bilgi Sorunlar & Eleştiriler.Mete Han Ariturk - 2014 - Kaygi (22):113-131.
    Özet -/- Bu çalışmada modern endüstri toplumlarında teknolojinin, bireylerin ve bir bütün olarak toplumun rasyonalitesini nasıl etkilediği ve bunun da ötesinde nasıl belirlediği incelenecektir. Bu inceleme Herbert Marcuse’nin Tek Boyutlu İnsan adlı eserinde ortaya koyduğu teknolojiye ilişkin görüşleri üzerinden yapılacaktır. Rasyonalite, bilgi ve deneyim arasındaki ilişki teknoloji üzerinden irdelenecek ve daha sonra Marcuse’nin ‘teknolojik rasyonalite’ kavramı Claus Offe’nin eleştirileri bağlamında çözümlenecektir. Son olarak Marcuse’nin teknoloji eleştirisi günümüzde ortaya çıkan toplumsal pratiklerle ele alınarak değerlendirilecektir. -/- Anahtar Terimler Teknoloji, Bilgi, Eleştiri, Pratik, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  32
    The End of Crime Syndicates: How the Universal Formula Will Reshape Society.Angelito Malicse - manuscript
    -/- The End of Crime Syndicates: How the Universal Formula Will Reshape Society -/- Introduction -/- Crime syndicates have existed throughout human history, thriving on corruption, ignorance, and economic imbalance. Despite law enforcement efforts, they continue to evolve and adapt, making them seemingly indestructible. However, with the full implementation of the universal formula, the mechanisms that sustain crime syndicates will be dismantled. The universal formula, as the most powerful tool in mind programming, has the potential to eradicate criminal organizations by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. THE MECHANISM OF LAW AS MEDIUM OF VIOLENCE AND THE EMERGENCE OF END SARS: TOWARDS THE ARTICULATION OF GOOD LEADERSHIP IN NIGERIA.Simon Efenji, Joseph - 2018 - Journal of Rare Ideas 1 (1).
    This work establishes that the primary justification for the state is its role as the guarantor of last resort of the personal safety, liberty and property of the citizens. The essay upholds that the state exists fundamentally for the protection of life and property and ensuring the wellbeing of the citizens and unless it performs this basic function it has no reason to exist. The essay equally establishes that no other time since the civil war era has Nigeria's state been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  69
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based security solutions, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Moral Coercion.Saba Bazargan - 2014 - Philosophers' Imprint 14.
    The practices of using hostages to obtain concessions and using human shields to deter aggression share an important characteristic which warrants a univocal reference to both sorts of conduct: they both involve manipulating our commitment to morality, as a means to achieving wrongful ends. I call this type of conduct “moral coercion”. In this paper I (a) present an account of moral coercion by linking it to coercion more generally, (b) determine whether and to what degree the coerced agent is (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  12. The Solution to the Real Blackmail Paradox: The Common Link Between Blackmail and Other Criminal Threats.Ken Levy - 2007 - Connecticut Law Review 39:1051-1096.
    Disclosure of true but reputation-damaging information is generally legal. But threats to disclose true but reputation-damaging information unless payment is made are generally criminal. Many scholars think that this situation is paradoxical because it seems to involve illegality mysteriously arising out of legality, a criminal act mysteriously arising out of an independently legal threat to disclose conjoined with an independently legal demand for money. -/- But this formulation is not quite right. The real paradox raised by the different legal statuses (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation