How to Get Away with Armed Bank Robbery

2020 ◽  
Author(s):  
Tyler Woods
Keyword(s):  

2021 ◽  
pp. 009862832110227
Author(s):  
Peter Strelan

Background: The concept of reliability is central to conducting—and understanding—research in Psychology. Students’ understanding of concepts are strengthened when they learn by applying concepts. Objective: This article describes initial evidence of an activity for teaching reliability. Method: Students watched a short video of a staged bank robbery. They then tested the reliability of two different forms of police instructions for eyewitness recall. In so doing, they gained practice at calculating and interpreting inter-rater reliability and test-retest reliability. Results: Data collected from N = 191 students indicates that the exercise has a statistically significant positive effect on student understanding of and confidence about reliability concepts contributes to a roughly 20% increase in performance when comparing responses on pre- and post-exercise multiple choice questions. Conclusion: The activity gives students practice with the concept of reliability in a way that is engaging and memorable insofar as it demonstrates the implications of reliability for the real world. Teaching Implications: The activity is straightforward to implement and encourages students to learn by “doing.”





2020 ◽  
Vol 1 (1) ◽  
pp. 201-206
Author(s):  
Ida Ayu Gede Kristina Dewi ◽  
I Nyoman Gede Sugiartha ◽  
Ida Ayu Putu Widiati

Nowadays, advances in technology and information, criminal acts also often occur, automatic teller machines (ATMs) in the banking world are a form of Bank Customer Service that uses machines or can be said as well as electronic devices. Service is an important factor in attracting the attention of customers. Because of this technological sophistication as we know cyber crime, crime is a new form of contemporary crime that has been in the spotlight worldwide. Internet users here become victims because of crime through this electronic system by utilizing and seeing their virtual. In this research, there are at least two problems of violating the automatic cash register (ATM) account theft account: And (2) how is the judge's consideration in determining the crime of bank robbery through an ATM. The research method used is information retrieval using a normative approach based on legal sources, study of literature in studying the legal materials of the legislation as a process to find the rule of law, legal source collection techniques used in this research are records and documentation. Based on research it can be started that the criminal sanctions regulation against account robbery criminal acts. Through the Automatic teller Machine (ATM) in the Criminal Code law contained in Article 362 of the Criminal Code, in the ITE Law the theft is contained in Article 30 paragraph (1), Article 30 paragraph (3), Article 32 paragraph (2), Article 32 paragraph (3 ), Article 36. And there is an addition to Law Number 3 of 2011 concerning the transfer of theft funds contained in Article 81, Article 83 paragraph (1), Article 83 paragraph (2), decision number: 688 / PID. B / 2012 / PN. The judge ruled the case that the defendant was firmly proven legally and convincingly guilty of committing a crime against the law of buying, renting, exchanging, accepting as a promise, accepting as a gift or by accepting as a gift or in the hope of getting a profit selling, saving, exchanging, mortgaging, transported, stored or hidden items.



1992 ◽  
Vol 25 (1) ◽  
pp. 83-88 ◽  
Author(s):  
Ronald V Clarke ◽  
Gerry McGrath

In response to concern about newspaper coverage of bank robberies in Australia, this study examines whether newspaper publicity resulting from successful bank robberies leads to copycat increases of bank and other robberies during the following week. It makes use of police records of robberies in New South Wales and newspaper stories for 1987 to 1989 from the two tabloids published daily in Sydney. No evidence of any copycat effect was found. Moreover, there was little evidence that the newspapers concerned were paying undue attention to bank robbery.



Author(s):  
Michael BEST ◽  
Lachezar KRUMOV ◽  
Ioan BACIVAROV

Because banks are very often target of a cyber-attack, they have also good security controls in place. This paper analysis modern threats to banks and proposes an approach to detect and visualize the risk of data leakage. In the first part of this paper, a comparative analysis of the most common threats to the banking sector is made, based on both bank reports and cyber security companies. The authors came to the conclusion that at the bottom line, insider knowledge is necessary, which is the result of data leakage. This paper comparatively analysis modern threats to banks and shows an approach to detect and visualize the risk of data leakage. In the second part of the paper, a model - based on network graph - that can enumerate the risk of data leakage is proposed. Graphing a network of an organization with the connections of data flow between assets and actors can identify insecure connections that may lead to data leakage. As is demonstrated in this paper, financial institutions are important targets of cyber attacks. Consequently, the financial sector must invest heavily in cybersecurity and find the best ways to counter cyber attacks and cyber bank robbery attempts.





1974 ◽  
Vol 3 (1) ◽  
pp. 19-51 ◽  
Author(s):  
Tim Ozenne
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document