Search results

From ArticleWorld

For query "Crime"

For more information about searching ArticleWorld, see Searching ArticleWorld.

Showing below 108 results starting with #1.


View (previous 500) (next 500) (20 | 50 | 100 | 250 | 500).

Article title matches

  1. Victimless crime (3067 bytes)
    1: ...the age of consent. Common examples of victimless crimes are: prostitution, sale of alcohol, illegal drug...
    5: People believe that victimless crimes should be [[decriminalization|decrimimalized for...
  2. Blue-collar crime (2004 bytes)
    1: ...ance of the term blue-collar crime in relation to crimes committed in the streets.
    3: ...ional workers and government officers. These are crimes committed or in line with business activities in...
    7: ... computers in committing the crimes. Blue-collar crimes can be any, but not limited to the following
    16: ...dlines of the newspapers as these are sensational crimes. It grabs the attention of the masses because i...
    18: ...property like theft and shoplifting. Blue-collar crimes can also be directed against other persons such ...
  3. Battery (crime) (1528 bytes)
    1: '''Battery''' is a crime committed by touching another person intentionall...
    3: ...rm against another. It is said that assault is a crime preparatory to the commission of battery.
    7: ... of whether or not there was injury caused. This crime is considered as a misdemeanor and is punishable ...
    9: # Battery involving family is a crime inflicted on immediate members of the family of t...
    23: [[Category:Crimes]]
  4. Crime scene (1860 bytes)
    1: The '''Crime scene''' is the area where an unlawful act took p...
    3: ... of the offender or the victim, a car used in the crime, the parking lot where the victim was last seen, ...
    7: ...stigating and solving a crime. In all cases, the crime scene must be secured so as to preserve any evide...
    9: The condition of a crime scene must be documented as soon as possible to a...
    13: ...cene may consist of all the other areas where the crime may have been perpetrated.
  5. Crime in Australia (2710 bytes)
    1: ...families, mass murderers and drug traffickers. '''Crime in Australia''' has included some sensational and...
    12: .... The man who was found guilty and hanged for the crime was later thought to have been innocent; the Pyja...
    16: ... serial killing. The 1990’s was a busy time for crime including the Backpacker Murders, the killing of ...
    22: [[Category:History of Australia|Crime]]
    23: [[Category:Australia-related lists|Crime]]

Page text matches

  1. Thirteenth Amendment (2073 bytes)
    10: ...involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted,...
  2. Azaria Chamberlain (16278 bytes)
    158: *[[Crime in the Northern Territory]]
    192: [[Category:Crime in Australia]]
  3. Fat Albert and the Cosby Kids (2419 bytes)
    14: *Crime
  4. Mobile office (1425 bytes)
    9: Construction sites, [[crime scene]]s, and [[rescue]] or [[disaster area]]s of...
  5. Informant (2006 bytes)
    1: ...lity of authorities to charge them with a certain crime.
    3: ... of the guilt of the other people involved in the crime they are committing.
    9: ...y themselves have been arrested or charged with a crime. An exception of this is [[terrorist]] organizat...
  6. Victimless crime (3067 bytes)
    1: ...the age of consent. Common examples of victimless crimes are: prostitution, sale of alcohol, illegal drug...
    5: People believe that victimless crimes should be [[decriminalization|decrimimalized for...
  7. Form follows function (5647 bytes)
    1: ... by Adolf Loos's 1908 assertion that 'Ornament is crime', adapted by Frank Lloyd Wright and adopted by Mo...
    7: ...t [[Adolf Loos]], whose 1908 essay ''Ornament and Crime'' was the other battle-cry of architectural moder...
    23: ...argued that form follows function and ornament is crime are not as synonymous as they are perceived to be...
  8. Far East (2379 bytes)
    21: [[War crime|war criminals]]. The usage of the term ''Far East...
  9. Glass ceiling (1511 bytes)
    3: ...ke [[trash collector|garbage collector]], or in [[crime]] and [[prison]].
  10. Hardboiled (2194 bytes)
    1: ...classic American sub-genre of the [[crime fiction|crime]] or [[detective fiction|detective novel]]. The p...
    7: ...the focus in noir is away from the solvers of the crime and their lobby manager and newspaper friends. In...
  11. Culture of fear (3524 bytes)
    14: *Distraction from other issues such as [[crime]], [[education]], [[poverty]], [[pollution|the en...
    21: ...] or certain age groups are blamed en-masse for [[Crime|criminal]] activities, small-scale events are inf...
  12. Deviancy amplification spiral (2671 bytes)
    9: ...edia. The act is generally unusual from typical [[crime]]s. Examples include the following:
    12: *A particularly shocking act of [[Corporate crime|corporate fraud]], such as the [[1990]]s [[Servic...
    20: ... critics, the widespread, inflated reporting of [[Crime|criminal]] activity may lead to the rise of copyc...
  13. Microelectronics (2655 bytes)
    7: ...ns. Security systems, employee identification and crime detection are some of the other fields that use m...
  14. Corporate officer (1520 bytes)
    5: ...ion and any self-serving may even be considered a crime. Positions include the Chief Executive Officer, t...
  15. Sexual assault (2768 bytes)
    11: ...y physical injuries. Do not touch anything on the crime scene. If the nearest hospital emergency room is ...
    18: [[Category:Sex crimes]]
  16. Unemployment (2334 bytes)
    23: ...form of increased poverty, political instability, crime, mental health issues and lowered quality of heal...
  17. Arson (2511 bytes)
    3: Arson is a crime heavily frowned upon and seriously penalized by t...
    13: While the basic elements of the crime of arson involves malice in the burning of a dwel...
    19: ...nce that he used the said materials to commit the crime, unless he can debunk the presumption.
    21: ...gainst one's own property. The penalty for such crime can even be more serious, if it is committed to g...
    23: ... be proved before someone can be indicted for the crime. Malice or spite can be determined through physi...
  18. Blue-collar crime (2004 bytes)
    1: ...ance of the term blue-collar crime in relation to crimes committed in the streets.
    3: ...ional workers and government officers. These are crimes committed or in line with business activities in...
    7: ... computers in committing the crimes. Blue-collar crimes can be any, but not limited to the following
    16: ...dlines of the newspapers as these are sensational crimes. It grabs the attention of the masses because i...
    18: ...property like theft and shoplifting. Blue-collar crimes can also be directed against other persons such ...
  19. Cruelty to animals (2429 bytes)
    1: '''Cruelty to animals''' is a crime punishable under the United States Animal Welfare...
    34: [[Category:Crimes]]
  20. Extortion (1853 bytes)
    13: ...t the form it takes, is considered a white-collar crime. It is usually committed involving professional ...
    25: ...g laws in a particular state or country where the crime was committed. It also depends on the kind or na...
    27: [[Category:Crimes]][[Category:Illegal occupations]]
  21. Counterfeit (2479 bytes)
    3: ...the original. It is classified as a white-collar crime as it is usually committed by professional worker...
    5: This crime is not a modern-day crime because its origin can be traced back to the Civi...
    7: While counterfeiting is an old crime, it is now becoming more technology-based and tec...
    33: ...d the taking away of the articles involved in the crime.
    34: [[Category:Crimes]]
  22. Cyberstalking (2393 bytes)
    5: Unlike the common crime of stalking which creates the fear of being follo...
    30: [[Category: Crimes]]
  23. Battery (crime) (1528 bytes)
    1: '''Battery''' is a crime committed by touching another person intentionall...
    3: ...rm against another. It is said that assault is a crime preparatory to the commission of battery.
    7: ... of whether or not there was injury caused. This crime is considered as a misdemeanor and is punishable ...
    9: # Battery involving family is a crime inflicted on immediate members of the family of t...
    23: [[Category:Crimes]]
  24. Carjacking (2326 bytes)
    1: ... usually at gunpoint. It is considered a federal crime in the United States and usually handled in a fed...
    3: Like most federal crimes, carjacking is a felony and is punishable by mor...
    5: ...eir jurisdictions. Carjacking has become a major crime industry for syndicates not only in the United St...
    9: Carjacking is a crime distinct from motor vehicle theft in the followin...
    12: ...a non violent crime while Carjacking is a violent crime, sometimes leading to bodily harm and even death
  25. Burglary (2163 bytes)
    1: ...house or building with intent to gain or commit a crime, and without the consent of the owner.
    5: ...or a building, with the intention of committing a crime. The usual goal of a burglar in trespassing is t...
    13: The crime of Burglary can be aggravated when the burglar is...
    17: ...8 Theft Act of England. In the same country, the crime is punishable by a penalty of six months to life ...
    19: ...mized by Burglary, authorities say that this is a crime that can be prevented. The homeowners must know ...
  26. Forensics (2838 bytes)
    7: ...e Investigation makes use of Forensics in solving crimes that seem impossible to solve through ordinary m...
    13: ...hotographs, which can then be sued even after the crime scene has been cleared.
    15: ...erprinting makes use of the imprints found in the crime scene to gather evidence on the identity of possi...
    17: ...es that may have been used in the commission of a crime. This is particularly useful in drug cases or mu...
    21: ...o may have played a role in the commission of the crime.
  27. Fingerprint (1998 bytes)
    17: ...ible for putting a reputable lawyer in jail for a crime he did not commit.
  28. Crime scene (1860 bytes)
    1: The '''Crime scene''' is the area where an unlawful act took p...
    3: ... of the offender or the victim, a car used in the crime, the parking lot where the victim was last seen, ...
    7: ...stigating and solving a crime. In all cases, the crime scene must be secured so as to preserve any evide...
    9: The condition of a crime scene must be documented as soon as possible to a...
    13: ...cene may consist of all the other areas where the crime may have been perpetrated.
  29. Identity theft (2638 bytes)
    3: The crime if committed for espionage, blackmail, to ruin an...
    9: Those who commit the crime and use it to promote terrorism will get the addi...
    13: ...on's identity can be done in various ways but the crime is usually achieved by intercepting or stealing a...
    17: ...ng the factors responsible for an increase in the crime are:
    25: ... there are ways to avoid becoming a victim to the crime.
  30. Assault (1929 bytes)
    1: ...n another. When the act is consummated, then the crime is no longer assault but Battery.
    29: [[Category:Crimes]]
  31. Attempt (2070 bytes)
    1: '''Attempt''' is a crime committed by a person who has threatened to infli...
    3: ...e first step taken by the offender to fulfill the crime.
    7: ...to incriminate the offender, unless such acts are crimes in themselves.
    9: Among the preparatory acts considered as a crime in itself are the purchase of firearm without lic...
    11: ...orities to arrest a person attempting to commit a crime?
  32. Bait car (1614 bytes)
    9: ...f being induced by the police into committing the crime.
    15: ...ce operatives to curb the rising incidence of the crime of car theft The move is even supported by car ...
    17: [[Category:Crimes]]
  33. Death threat (2579 bytes)
    11: ...specially if they have establish a battle against crime syndicates or even legitimate groups that may suf...
    13: ... to the crime of blackmail. The latter being the crime of threatening another to act or not perform an a...
    19: ...also deemed unimportant in the prosecution of the crime.
    24: [[Category:Crimes]]
  34. Law & Order (3336 bytes)
    1: ...stigation of the police detectives in tracing the crime, before the culmination which shows the judiciary...
    9: ...a concrete ending. Like in the world of real-life crime fighters the battle is not always one when a susp...
    13: ... yet for what remains a hugely popular television crime drama.
    16: [[Category:Crime television series]]
  35. Desperate housewives (3737 bytes)
    9: ... found themselves committing at least one serious crime, which has appalled many. The portrayal of blatan...
  36. Magnum PI (2820 bytes)
    9: ...e laden thrills and spills. Solving mysteries and crimes driving a Ferrari 308 GTS, becoming entangled wi...
    15: [[Category:Crime television series]]
  37. Sanity (1612 bytes)
    13: ...of insanity and that it seems that the bigger the crime, the more insane the defendant.
  38. Forensic psychiatry (1913 bytes)
    7: ...sponsible for; his or her actions at the time the crime was committed.
    13: Although mental state at the time of the crime is taken into consideration in Britain, forensic ...
  39. Insanity (1502 bytes)
    7: ...and so cannot be held legally responsible for the crime. The psychiatrist gives an opinion based on exper...
  40. Marilyn Monroe (4129 bytes)
    23: ...rectal suppository. This cannot be proven as the crime scene was never secured. Therefore, there existe...
  41. Electronic commerce (2626 bytes)
    16: *Hackers or organised crime can also prove to be dangerous, mostly through th...
  42. Sicily (3604 bytes)
    27: Starting the19th century, the organized crime networks "the mafia" gained more influence and ha...
  43. Islamic law (3670 bytes)
    45: ...rly, the punishments will serve as a deterrent to crime.
  44. The Fountainhead (3845 bytes)
    27: *Roark stands trial for the crime. Wynand uses his paper to defend Roark. To...
  45. Edith Cowan (2588 bytes)
    1: ... shot and killed his second wife. He hung for his crime.
  46. Crime in Australia (2710 bytes)
    1: ...families, mass murderers and drug traffickers. '''Crime in Australia''' has included some sensational and...
    12: .... The man who was found guilty and hanged for the crime was later thought to have been innocent; the Pyja...
    16: ... serial killing. The 1990’s was a busy time for crime including the Backpacker Murders, the killing of ...
    22: [[Category:History of Australia|Crime]]
    23: [[Category:Australia-related lists|Crime]]
  47. Los Angeles (2905 bytes)
    8: ...e given in Grand Theft Auto: San Andreas and True Crime: Streets of LA.
  48. Bankruptcy (3340 bytes)
    11: ...ven when not insolvent is committing the business crime of ‘bankruptcy fraud’. Bankruptcy reforms ena...
    15: [[Category:Commercial crimes]]
  49. Cyberwar (1808 bytes)
    1: ... is bringing new modes of warfare, terrorism, and crime to the fore, namely, Cyber war. The basic theme ...
    5: ... operandi in this information-age of conflict and crime is largely to do with using and manipulating know...
  50. Casualty insurance (1789 bytes)
    1: ...f others. It may include such diverse areas like crime insurance, boiler and machinery insurance, plate ...
  51. Sirius Black (3166 bytes)
    9: ... also. Sirius, being the survivor at the scene of crime was convicted for the murder of Pettigrew and the...
  52. Veteran (2256 bytes)
    7: ...t veterans existed. They had to perforce turn to crime and begging to keep body and soul together.
  53. Forensic pathology (2244 bytes)
    5: ...th. Some of these doctors go to the scene of the crime in order to examine the body in situ and to evalu...
  54. Azkaban (2572 bytes)
    1: ...foul race of magical creatures, guard the prison. Crimes of a severe nature are punished with a term in A...
    7: Some of the crimes for which people are sent to Azkaban are perform...
  55. Shrieking Shack (2490 bytes)
    9: ... people with one curse. Sirius was blamed for the crime and put into Azkaban without a trial. Hermione an...
  56. African american literature (5597 bytes)
    15: ...ovels in the 1950’s and 60’s, and the crime novels by Walter Mosley. In the genre of ...
  57. Coach Carter (1864 bytes)
    13: ...scholarship. Or the kid who is pulled into street crime, yet he has a legitimate talent. He pushes to get...
  58. Assault on Precinct 13 (2005 film) (2104 bytes)
    1: ...er is set to testify against an elite police anti-crime unit accused of engaging in criminal acti...
    15: ... kill Bishop. The unit is really a anti-organized crime team intent on killing Bishop because he plans
  59. A History of Violence (film) (1834 bytes)
    5: ...ecently, he’s attained some fame when he fought crime by killing during an attempted robbery.
  60. Capote (film) (1901 bytes)
    10: ...the prospect of their death, yet acknowledges the crime and their guilt.
  61. Sin City (film) (1928 bytes)
    1: ...lace in the fictitious, Basin City. It is a grim, crime-ridden, violent town where murderers, prostitutes...
  62. Crash (2004 film) (4260 bytes)
    8: ...ell, but are into the frivolous pursuit of street crime.
    48: [[Category:Crime films]]
  63. Batman Begins (1852 bytes)
    1: ...in the Far East, he becomes committed to opposing crime in Gotham city.
    5: ...rents by a mugger, he becomes determined to fight crime and all forms of injustice.
    11: When he return home, Gotham City is riddled with crime, corruption and ineffective police protection. Th...
    19: ...athletic prowess and high-tech weaponry to outwit crime, corruption in Gotham City. He cleans up the la...
  64. Four Brothers (film) (1480 bytes)
    15: ...spread corruption on the part of the police and a crime ring in the community.
  65. Cybercrime (2218 bytes)
    1: ...me as a type of crime by itself. In general, cybercrime is used with a more general connotation, describi...
    3: Cybercrime is also used to refer to criminal activity agains...
    5: Some cybercrimes have regular users as targets. These may include...
    9: ...ong the ones mentioned above, the most common cybecrimes are:
    18: ...e other infractions that can be qualified as cybercrimes.
  66. Anabolic steriod (5072 bytes)
    17: ...ant smuggling operations, sophisticated organized crime is involved, often in conjunction with other smug...
    19: ...ing possession of the banned substances a federal crime. Many of these products are no longer available f...
  67. Breathalyzer (8450 bytes)
    9: ...lyzer reading will be offered as evidence of that crime, although the issue is what the BAC was at the ti...
  68. Bank Fraud (12788 bytes)
    1: ...tution. It is sometimes considered a white-collar crime.
    68: ... crimes or even to hide from prosecution for past crimes. The use of a stolen identity for other frauds s...
  69. Acid Attacks (4822 bytes)
    3: ...ggravated by the lenience of punishment for these crimes. Leaving aside the unknown, according to the kno...
    14: ...usmanno discusses attending a trial for a similar crime in Italy during the inter-war period. In Australi...
  70. Bride burning (5011 bytes)
    2: ... which statistics are available from the National Crime Records Bureau of India, confirmed and reported d...
    4: ...noring himself. Husbands who participate in these crimes may believe that burning their wife is a good wa...
    9: '''Dowry Crime & Laws'''
    12: ...help the victims of bride-burning and other dowry crimes. In many cases, even if a woman survives the bur...
    19: ...rovide medical assistance to the victims of these crimes
  71. Drug addiction (9554 bytes)
    19: ...ug dealers, who are often involved with organized crime.
  72. Drug tourism (4585 bytes)
    1: ...gal addictive drugs is one of the major causes of crime. Some estimates placed the value of the global tr...
  73. False advertising (4115 bytes)
    9: ...d is legal in the US.False advertising is often a crime. In some countries advertising practices (includi...
  74. War on drugs (8776 bytes)
    5: ...the most addicted commit large number of crimes. "Crime rates seem to increase when their heroin use incr...
    9: ...gal addictive drugs is one of the major causes of crime. Some estimates placed the value of the global tr...
  75. Anabolic steroid (5177 bytes)
    17: ...ant smuggling operations, sophisticated organized crime is involved, often in conjunction with other smug...
    19: ...ing possession of the banned substances a federal crime. Many of these products are no longer available f...
  76. Credit card fraud (7229 bytes)
    28: ...m any one business below $2,000. With credit card crime occurring across state lines, criminals often are...
  77. False insurance claims (4518 bytes)
    8: ...it’s just harmless fudging. But soft fraud is a crime, and raises everyone’s insurance costs.
  78. Health insurance fraud (4048 bytes)
    7: ...urance fraud is the second costliest white-collar crime in America, after tax evasion. It is estimated th...
  79. Internet fraud (8924 bytes)
    36: ...Investigation (FBI) and the National White Collar Crime Center (NW3C).
    38: ...chanism for complaints involving Internet related crimes.
    40: ...aggressive, proactive approach to combating cyber crime.
  80. Kidnapping (4857 bytes)
    5: ... war criminals and those suspected of genocide or crimes against humanity may be arrested.
    7: ...ften done for ransom or in furtherance of another crime. A majority of jurisdictions in the United States...
    9: ...nd the much better risk to benefit ratio of other crimes, has led kidnap for profit to virtually die out ...
  81. Pirate (11911 bytes)
    25: ...eat deal of technology. It has been reported that crimes of piracy have involved the use of mobile phones...
    47: ...ion of the concept of universal jurisdiction. The crime of piracy is considered jus cogens, a conventiona...
  82. Salami slicing (1971 bytes)
    3: ...et of a crime or is the means adopted to commit a crime.
    5: In computer crime, salami slicing is the illegal practice of steali...
    13: A '''salami slicing''' exploit is a computer crime technique premised on stealing lots of little bit...
  83. Airport security (3046 bytes)
    1: ...on aircraft from numerous factors that range from crime to terrorism. Airports are major transit points w...
    3: ...otential target for terrorists and other forms of crime. It may range from holding individuals for ransom...
  84. Hacker computer security (2502 bytes)
    1: ...heft, intellectual property theft, and many other crime like taking control of a remote computer through ...
  85. Motion detection (2048 bytes)
    1: ...ction tools are increasingly being brought in for crime prevention and early detection. It is suggested t...
  86. Numbered bank accounts (2726 bytes)
    1: ...unts are not to be used to hide the proceeds of a crime. This was incorporated after corrupt dictators to...
  87. James Frey (2633 bytes)
    1: ...tle Pieces, delved into his downfall of drugs and crime and subsequent recovery. It became a best seller ...
  88. Failure to appear (1975 bytes)
    1: ...s to do so without a valid and lawful cause. The crime can b e committed by person who may have been req...
    19: [[Category:Crimes]]
  89. Fraud (2425 bytes)
    1: '''Fraud''' is the crime committed by intentionally misleading another per...
    18: Offenders of this crime often use and take advantage of a potential victi...
    20: ...or in classifying a crime under fraud. Among the crimes classified as fraud are:
    25: [[Category:Crimes]]
  90. Graffiti (3933 bytes)
    1: ...es with words or drawings. However, it becomes a crime commonly known as vandalism, when the markings ar...
    7: ...ay crime known as vandalism. Vandalism is the crime of maliciously creating markings on private and p...
  91. Genocide (3755 bytes)
    1: '''Genocide''' is a crime against humanity, committed through a synchronize...
    3: ...nishment of the Crime of Genocide defines it as a crime committed in any of the following manner:
    21: The crime of genocide is best characterized by the Nazi-ins...
    23: ...a violation of the rules of war but is an immoral crime against the whole humanity.
    27: ...exempted themselves from persecution for the same crime they are seeking to prevent and to punish.
  92. Car chase (2103 bytes)
    11: [[Category:crime]]
  93. Thriller (1720 bytes)
    3: ...which needs to be solved and they often feature a crime of some sort. This can be, and often is, murder b...
  94. DNA (2315 bytes)
    11: ...y blood, semen, skin or hair left at the scene of crimes.
  95. DNA bank (1977 bytes)
    5: ...ta is also collected. This is DNA that is left at crime scenes. This is useful in cross referencing of DN...
  96. Ring (1474 bytes)
    13: ...phone ring, onion rings, ring roads or balt ways, crime ring and many others.
  97. Bank fraud (3750 bytes)
    1: .... It is sometimes considered to be a white-collar crime.
  98. Alexander Hacke (2304 bytes)
    5: ...anda Sex Garden, Sprung Aus Den Wolken, Mona Mur, Crime and the City Solution, Die Ichs, Schlaflose Naech...
  99. The Crow: City of Angels (1990 bytes)
    7: ... the first, he takes out each henchman before the crime lord, Judas.
    9: ...to him from her experiences with Eric Draven. The crime boss, Judah Earl, hungers for the power he sees i...
  100. Cassiopeia (constellation) (1902 bytes)
    13: ...e punishment shown was of the loss of dignity the crime was derived to be one of vanity.
  101. Backscatter X-ray (1970 bytes)
    12: ...r government uphold national security and prevent crime.
  102. Charity gambling (3835 bytes)
    7: ...d Crime in the Bingo Industry,'' the Pennsylvania Crime Commission reported:
    9: ...lent charitable Bingo is the perfect white-collar crime.''
  103. Identity theft protection (3548 bytes)
    1: ...y theft''' is not a physically noticeable type of crime but is one of the most rapidly growing felonies i...
    38: [[Category:Crimes]]

View (previous 500) (next 500) (20 | 50 | 100 | 250 | 500).



Search in namespaces :

List redirects   Search for

 

Toolbox