[go: up one dir, main page]

Mast, 1984 - Google Patents

Ripping off and ripping out: Book theft and mutilation from academic libraries

Mast, 1984

Document ID
13015557060515292220
Author
Mast S
Publication year
Publication venue
Library & archival security

External Links

Snippet

In this paper thc phenomena of book theft and mutilation from academic libraries are analyzed from the standpoint of the sociology of deviance, using librarianship literature as the data base. It is argued that the control of these behaviors cannot be achieved simply by …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Wilson The police and the delinquent in two cities
Dolinko Some thoughts about retributivism
Gupta et al. Identity theft: a small step towards big financial crimes
Thorson The reporting of crime and violence in the Los Angeles Times: Is there a public health perspective?
Volokh et al. School violence prevention: Strategies to keep schools safe
Ebert Detecting the phallus: authority, ideology, and the production of patriarchal agents in detective fiction
Mast Ripping off and ripping out: Book theft and mutilation from academic libraries
Fyfe Terry: a [n ex-] cop's view
Okereafoezeke Traditional social control in an ethnic society: Law enforcement in a Nigerian community 1
Pfuhl Jr Computer abuse: Problems of instrumental control
Steinberg High School Drug Testing and the Original Understanding of the Fourth Amendment
Libby When Off-Duty State Officials Act Under Color of State Law for the Purposes of Section 1983
King et al. Compensatory Damages for Newsgatherer Torts: Toward a Workable Standard
Deflem The invisibilities of social control
Singer In favor of presumptive sentences set by a sentencing commission
Ophield The Impact of World War Two on Crime and Policing in Cambridge
Ervin Jr Campaign Practices and the Law: Watergate and beyond
Zombek The Power of the Press: Defining Disloyalty at Old Capitol Prison
Martin The Saying and the Doing: The Literature and Reality of Theft Prevention Measures in US Archives-Part 1
Lamm Terrorism and immigration: We need a border
Wardle Money Laundering: A Prosecutor's Perspective
Fennelly et al. Ten risk factors
Colino Felony 101
Katsiyiannis Hyper‐nationalism and irredentism in the Macedonian region: Implications for US policy, Part II
Sobnosky A critical rhetorical analysis of three responses to white supremacy