Showing 181 - 200 results of 247 for search '"fraud"', query time: 0.06s Refine Results
  1. 181

    Consumer Protection of Girls from Cybercrime in a Gender Perspective by Susilowati Suparto, Deviana Yuanitasari, Sonny Dewi Judiasih, Yamudin Salaeh

    Published 2024-12-01
    “…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. …”
    Get full text
    Article
  2. 182

    Forensic Discrimination Potential of Blue, Black, Green, and Red Colored Fountain Pen Inks Commercially Used in Pakistan, by UV/Visible Spectroscopy, Thin Layer Chromatography, and... by Mehwish Sharif, Madeeha Batool, Sohail Chand, Zahoor Hussain Farooqi, Syed Azhar Ali Shah Tirmazi, Makshoof Athar

    Published 2019-01-01
    “…Examination and comparison of fountain pen inks are very important in forensic questioned documents examination in developing countries where the chances of fraud are greater in cases of cheques, marriage papers, entry of birth and death, etc. …”
    Get full text
    Article
  3. 183

    Blockchain enabled traceability in the jewel supply chain by Aman Patel, Siva Sai, Ankit Daiya, Harshal Akolekar, Vinay Chamola

    Published 2025-01-01
    “…Blockchain operates as a secure, immutable ledger, ensuring data integrity and transparency while preventing fraud and tampering due to its decentralized nature. …”
    Get full text
    Article
  4. 184

    Internal Control Systems and service delivery in Kabale Municipal Council, Kabale District, Uganda. by Boaz, Abomugisha

    Published 2020
    “…Specifically the study investigated whether and how internal control systems employed support service delivery, the relationship between compliance, fraud prevalence, resource adequacy and service delivery; it assessed how control environment impacts effectiveness of internal controls in relation to service delivery. …”
    Get full text
    Thesis
  5. 185

    Price Manipulation in Common Stock Transactions and Analysis Prohibition of Obscenity in Some Cases by Ali Hassanzadeh Sarvestani, Seyed Mohammad Reza Seydnorani, Fathollah Tari

    Published 2024-05-01
    “…In this article, we are looking for an answer to this question, can some types of common stock transactions be considered as examples of fraud? We have used descriptive-analytical method to answer this question. …”
    Get full text
    Article
  6. 186

    Evolutionary Game Analysis of Online Shopping Quality Control: The Roles of Risk Attitude and Government Supervision by Decheng Wen, Dongwei Yan, Xiaojing Sun, Xiao Chen

    Published 2021-01-01
    “…The current research finds that (1) the decrease of the quality control cost and the increase of the government’s benchmark fine are conducive to increasing the platform’s controlling probability; (2) the decrease of the proportion of rent and the increase of sellers’ fraud cost and the government’s benchmark fines are conducive to increasing the seller’s compliance probability; (3) when both the platform and seller are unwilling to make efforts for quality assurance, risk-seeking members make the seller gradually choose to provide compliant products; and (4) when the members are all risk-seeking, strengthening government supervision will help promote the transition of members’ behavioural choices in a benign direction. …”
    Get full text
    Article
  7. 187

    Molecular and Biochemical Characterization of the Greek Pepper ( Capsicum annuum ) Cultivars ‘Florinis’ and ‘Karatzova’ by Niki Mougiou, Foteini Trikka, Sofia Michailidou, Mariana Pantoura, Anagnostis Argiriou

    Published 2021-03-01
    “…Such an analysis could be used for the discrimination of pepper cultivars sharing common morphological traits ensuring the unique identity of each cultivar and protecting farmers and consumers from fraud.…”
    Get full text
    Article
  8. 188

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. The techniques of detection conventionally applied are based on blacklisting and heuristic analyses, which are gradually becoming inefficient against sophisticated, rapidly evolving threats. …”
    Get full text
    Article
  9. 189

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…AD is crucial for various applications, including network security, fraud detection, predictive maintenance, fault diagnosis, and industrial and healthcare monitoring. …”
    Get full text
    Article
  10. 190

    Transforming Education Through Blockchain: A Systematic Review of Applications, Projects, and Challenges by Xianxian Wang, Muhammad Younas, Yicun Jiang, Muhammad Imran, Norah Almusharraf

    Published 2025-01-01
    “…Within the education sphere, blockchain applications protect academic records, ensure their trustworthiness, reduce fraud, and improve the value of educational assets. …”
    Get full text
    Article
  11. 191

    Performance determinants of higher education institutions and the mediating role of quality culture: internal auditors’ perspectives by Helmi Yazid, Lili Sugeng Wiyantoro, Tubagus Ismail, Iis Ismawati

    Published 2025-12-01
    “…Internal audit scopes (IAS), professional skills (PS), organizational commitment (OC), applied procedure (AP), internal auditor experience (IAE), fraud prevention (FP), information technology (IT), ITIC internal controls (ITICs) and quality culture (QC) all have an impact on the performance of HEIs (PHEIs) audited by internal auditors. …”
    Get full text
    Article
  12. 192

    Gluten Detection by Real-Time PCR: an Alternative for Tracking Processed Foods by Wemerson de Castro Oliveira, Hans Fröder, Eléia Righi

    Published 2025-02-01
    “…The real-time PCR protocol was validated in different meats (beef, chicken, pork, horse and lamb) with an average Cq of 25.69. Tests to verify fraud in industrialized foods were carried out with the following products: cereal bars, chocolate, crackers and two types of snacks. …”
    Get full text
    Article
  13. 193

    Electricity theft detection in integrated energy systems considering multi-energy loads by Wenlong Liao, Dechang Yang, Leijiao Ge, Yixiong Jia, Zhe Yang

    Published 2025-03-01
    “…Additionally, the detection performance of the proposed ChebGCN is consistently better than both classical and state-of-the-art machine learning models, no matter whether the fraud rate of the dataset is low or high.…”
    Get full text
    Article
  14. 194

    Features of conducting a forensic commodity examination of furniture products by M. V. Hаrbuz, L. Yu. Ulybіnа

    Published 2023-09-01
    “…In practice, there are cases of fraud on the part of companies and individuals, for example, when users intentionally damage parts or components of a product in order to return a product under warranty and receive monetary compensation for an allegedly defective product. …”
    Get full text
    Article
  15. 195

    Circumstances for Committing Crimes in the Banking Sector: Normative and Legal Aspect by V. V. Korniienko

    Published 2020-12-01
    “…The key factors in the situation of committing crimes in the presented area are: search for opportunities for criminal enrichment by using existing powers; conspiracy of officials of commercial banks with representatives of supervisory agencies (curators from some units of the National Bank of UKraine) in order to cover up criminal activity; development of a plan of financial fraud with representatives of commercial organizations in order to steal the entrusted funds and their further legalization. …”
    Get full text
    Article
  16. 196

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Nuruzzaman Faruqui

    Published 2025-01-01
    “…This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
    Get full text
    Article
  17. 197

    Digitalisation Profile of the Elderly and ‘Grey Digital Violence’ by Hatice Oğuz Özgür

    Published 2024-12-01
    “…The elderly are sometimes exposed to actions such as deception, fraud, insult and humiliation by those who use digital technologies with bad intentions. …”
    Get full text
    Article
  18. 198

    Auditing and Performance of Micro Finance Institutions: A Case Study of Rukiga SACCO Kabale Branch. by Niwamanya, Sarah

    Published 2024
    “…The study findings on the relationship between auditing and the performance of Micro Finance Institutions, the highest number of respondents mentioned that effective auditing helps identify and assess risks within MFIs, such as credit risk, operational risk, and compliance risk and the least number of respondents mentioned that auditing helps identify inefficiencies in the operations of MFIs, such as wasteful spending, fraud, or ineffective internal controls. The study recommended that there should be ensuring that all internal policies, procedures, and audit findings are well-documented and accessible to relevant staff and maintain an organized repository for audit-related documents to facilitate easy reference.…”
    Get full text
    Thesis
  19. 199

    Young urban people’s impulsive online shopping behavior and its financial literacy by Bagong Suyanto, Nadia Egalita, Rahma Sugihartati, Siti Mas’udah, Pingkan Sekar Savira, Claudia Anridho, Nur Syamsiyah

    Published 2025-12-01
    “…The skill of managing money can reduce the potential online shopping fraud yet this research shows that respondents admitted that they had been victims of it. …”
    Get full text
    Article
  20. 200

    Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm by Shahlaa Mashhadani

    Published 2025-01-01
    “…Investigators often deal with huge amounts of text-based evidence, so this technique helps them identify topics, such as fraud, especially in relation to text data, which is the core of our research. …”
    Get full text
    Article