Introduction/Introduction Linden, Rick; Mann, Robert E
Canadian journal of criminology and criminal justice,
02/2014, Letnik:
56, Številka:
2
Journal Article
The discovery of the tomb of Tutankhamun in 1922 was a landmark event in Egyptology that was celebrated around the world. Had Howard Carter found his prize a few years earlier, however, the treasures ...of Tut might now be in the British Museum in London rather than the Egyptian Museum in Cairo. That's because the years between World War I and World War II were a transitional period in Middle Eastern archaeology, as nationalists in Egypt and elsewhere asserted their claims to antiquities discovered within their borders. These claims were motivated by politics as much as by scholarship, with nationalists seeking to unite citizens through pride in their ancient past as they challenged Western powers that still exercised considerable influence over local governments and economies. James Goode's analysis of archaeological affairs in Turkey, Egypt, Iran, and Iraq during this period offers fascinating new insight into the rise of nationalism in the Middle East, as well as archaeological and diplomatic history.
The first such work to compare archaeological-nationalistic developments in more than one country,Negotiating for the Pastdraws on published and archival sources in Arabic, English, French, German, Persian, and Turkish. Those sources reveal how nationalists in Iraq and Iran observed the success of their counterparts in Egypt and Turkey, and were able to hold onto discoveries at legendary sites such as Khorsabad and Persepolis. Retaining artifacts allowed nationalists to build museums and control cultural heritage. As Goode writes, "Going to the national museum became a ritual of citizenship." Western archaeologists became identified (in the eyes of many) as agents of imperialism, thus making their work more difficult, and often necessitating diplomatic intervention. The resulting "negotiations for the past" pulled patrons (such as John D. Rockefeller, Jr., and Lord Carnarvon), archaeologists (James Breasted and Howard Carter), nationalist leaders (Ataturk and Sa'd Zaghlul), and Western officials (Charles Evan Hughes and Lord Curzon) into intractable historical debates with international implications that still resonate today.
Stealing Cars Heitmann, John A; Morales, Rebecca H
2014, 2014-06-26
eBook
As early as 1910 Americans recognized that cars were easy to steal and, once stolen, hard to find—especially since cars looked much alike. Model styles and colors eventually changed, but so did the ...means of making a stolen car disappear. Though changing license plates and serial numbers remain basic procedure, thieves have created highly sophisticated networks to disassemble stolen vehicles, distribute the parts, and/or ship the altered cars out of the country. Stealing cars has become as technologically advanced as the cars themselves.
John A. Heitmann and Rebecca H. Morales’s study of automobile theft and culture examines a wide range of related topics that includes motives and methods, technological deterrents, place and space, institutional responses, international borders, and cultural reflections.
Only recently have scholars begun to move their focus away from the creators and manufacturers of the automobile to its users. Stealing Cars illustrates the power of this approach, as it aims at developing a better understanding of the place of the automobile in the broad texture of American life. There are many who are fascinated by aspects of automobile history, but many more readers enjoy the topic of crime, in terms of motives, methods, escaping capture, and of course solving the crime and bringing criminals to justice.
Stealing Cars brings together expertise from the history of technology and cultural history as well as city planning and transborder studies to produce a compelling and detailed work that raises questions concerning American priorities and values. Drawing on sources that include interviews, government documents, patents, sociological and psychological studies, magazines, monographs, scholarly periodicals, film, fiction, and digital gaming, Heitmann and Morales tell a story that highlights both human creativity and some of the paradoxes of American life.
We explore why and how individuals adaptively and maladaptively respond to the threat of identity theft. We use protection motivation theory and regret theory, shedding light on how the individual’s ...reflection of a future negative event, which they did nothing to prevent, would influence their current behavior. Fear appeal is experimentally manipulated to test different models of high and low threat. By comparing the impact of anticipated regret and fear on individuals’ protection motivation, we find that discrete emotions of fear and anticipated regret behave differently in increasing adaptive and reducing maladaptive responses to identity theft. Specifically, whereas fear is only effective when threat is high, anticipated regret is effective in both high and low threat conditions. Also, we find that anticipated regret has the most potent effect on increasing adaptive coping responses in a low threat model. This means that anticipated regret could be used in situations where the threat is low rather than fear. This research provides empirical evidence of conditions under which fear and regret motivate personal security protection measures, enabling practitioners to promote identity theft protection more efficiently.
•Fear and anticipated regret behave differently in increasing protection motivation.•Fear is only effective on adaptive coping responses when threat is high.•Anticipated regret is effective in both high and low threat conditions.•Anticipated regret is effective in reducing maladaptive coping responses.
As one of the key components of the smart grid, advanced metering infrastructure brings many potential advantages such as load management and demand response. However, computerizing the metering ...system also introduces numerous new vectors for energy theft. In this paper, we present a novel consumption pattern-based energy theft detector, which leverages the predictability property of customers' normal and malicious consumption patterns. Using distribution transformer meters, areas with a high probability of energy theft are short listed, and by monitoring abnormalities in consumption patterns, suspicious customers are identified. Application of appropriate classification and clustering techniques, as well as concurrent use of transformer meters and anomaly detectors, make the algorithm robust against nonmalicious changes in usage pattern, and provide a high and adjustable performance with a low-sampling rate. Therefore, the proposed method does not invade customers' privacy. Extensive experiments on a real dataset of 5000 customers show a high performance for the proposed method.