Mast, 1984 - Google Patents
Ripping off and ripping out: Book theft and mutilation from academic librariesMast, 1984
- Document ID
- 13015557060515292220
- Author
- Mast S
- Publication year
- Publication venue
- Library & archival security
External Links
Snippet
In this paper thc phenomena of book theft and mutilation from academic libraries are analyzed from the standpoint of the sociology of deviance, using librarianship literature as the data base. It is argued that the control of these behaviors cannot be achieved simply by …
- 230000006399 behavior 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wilson | The police and the delinquent in two cities | |
| Dolinko | Some thoughts about retributivism | |
| Gupta et al. | Identity theft: a small step towards big financial crimes | |
| Thorson | The reporting of crime and violence in the Los Angeles Times: Is there a public health perspective? | |
| Volokh et al. | School violence prevention: Strategies to keep schools safe | |
| Ebert | Detecting the phallus: authority, ideology, and the production of patriarchal agents in detective fiction | |
| Mast | Ripping off and ripping out: Book theft and mutilation from academic libraries | |
| Fyfe | Terry: a [n ex-] cop's view | |
| Okereafoezeke | Traditional social control in an ethnic society: Law enforcement in a Nigerian community 1 | |
| Pfuhl Jr | Computer abuse: Problems of instrumental control | |
| Steinberg | High School Drug Testing and the Original Understanding of the Fourth Amendment | |
| Libby | When Off-Duty State Officials Act Under Color of State Law for the Purposes of Section 1983 | |
| King et al. | Compensatory Damages for Newsgatherer Torts: Toward a Workable Standard | |
| Deflem | The invisibilities of social control | |
| Singer | In favor of presumptive sentences set by a sentencing commission | |
| Ophield | The Impact of World War Two on Crime and Policing in Cambridge | |
| Ervin Jr | Campaign Practices and the Law: Watergate and beyond | |
| Zombek | The Power of the Press: Defining Disloyalty at Old Capitol Prison | |
| Martin | The Saying and the Doing: The Literature and Reality of Theft Prevention Measures in US Archives-Part 1 | |
| Lamm | Terrorism and immigration: We need a border | |
| Wardle | Money Laundering: A Prosecutor's Perspective | |
| Fennelly et al. | Ten risk factors | |
| Colino | Felony 101 | |
| Katsiyiannis | Hyper‐nationalism and irredentism in the Macedonian region: Implications for US policy, Part II | |
| Sobnosky | A critical rhetorical analysis of three responses to white supremacy |