-
201
Research ethics
Get full text
Article -
202
Navigating Auditing Risks in the Crypto Asset Landscape
Published 2025-02-01“…This paper explores the inherent, control, valuation, and related risks associated with crypto assets, emphasising the complexities of valuation, compliance, and fraud detection. Starting from a bibliometric visualisation in VOSviewer, it points out thematic trends and key concepts in crypto auditing. …”
Get full text
Article -
203
Las elecciones presidenciales de 1946 y el peronismo naciente vistos por el periódico La Vanguardia
Published 2004-09-01“…As a result of this electoral contest -the first one free from fraud since 1928- Juan Domingo Perón became a constitutional president of Argentina.This paper will analyze the attitude of the aforementioned newspaper towards the election, the kind of discourse as well as the arguments used to definitely favour the Unión « Democrática » and harshly criticize Perón and his supporting political and social forces. …”
Get full text
Article -
204
Workshops for editors in the central region of Cuba: a proposal for the improvement of scientific journals in medical sciences
Published 2011-08-01“…The authors also address the issue of fraud in the scientific literature from a national to respect debate and the discussion developed on this important subject in the second workshop.…”
Get full text
Article -
205
Development of an insurance industry image assessment index
Published 2022-07-01“…A low level of financial literacy, cases of fraud by insurers lead to the formation of a negative image of the insurance industry, even if the respondents have a positive experience of using insurance products. …”
Get full text
Article -
206
Recent Progress of Anomaly Detection
Published 2019-01-01“…Anomaly analysis is of great interest to diverse fields, including data mining and machine learning, and plays a critical role in a wide range of applications, such as medical health, credit card fraud, and intrusion detection. Recently, a significant number of anomaly detection methods with a variety of types have been witnessed. …”
Get full text
Article -
207
Is financial stress a facilitating factor in cartel formation?
Published 2025-03-01“…It is well-known that failing to achieve key organizational goals may pressure managers to commit fraud, but can it be a facilitating factor in cartel formation as well? …”
Get full text
Article -
208
L’abstention en Algérie : un autre mode de contestation politique
Published 2009-11-01“…The consequences are a dissuasive electoral code, suspicious official electoral results and accusations and suspicions of fraud. Secondly, abstention is related to the political offer : the politics offered and the individuals who represent that offer constitute a disappointing choice for potential voters, especially youth, who lose interest in the elections. …”
Get full text
Article -
209
Application of K-means algorithm based on A-D model in calling abnormal customer mining
Published 2018-04-01“…In order to make use of massive voice communication records and cluster high-quality clients (telecom fraud clients,advertisers) with various kinds of voice communication abnormalities,a behavioral feature model of abnormal voice communication customers was designed and constructed.Based on the model,a clustering analysis algorithm for customers with abnormal voice communication behavior was proposed.First of all,by analyzing the call records of customers,the characteristics of call behaviors was got,such as the number of calls,call rates,and so on.Then AHP-DEMATEL model was constructed by blending the AHP model and DEMATEL method.Secondly,based on the model,an improved K-means algorithm was proposed to cluster the abnormal clients according to the voice communication records.Finally,the real data was used to verify the analysis.The results show that compared with other similar algorithms,the proposed algorithm improves the performance of multi-type abnormal customer comprehensive clustering analysis and single-type abnormal customer clustering analysis greatly.…”
Get full text
Article -
210
Anomalous Trajectory Detection Using Masked Autoregressive Flow Considering Route Choice Probability
Published 2022-01-01“…However, anomalous trajectories such as trip fraud often occur due to greedy drivers. In this study, we propose an anomalous trajectory detection method that incorporates Route Choice analysis into Masked Autoregressive Flow, named MAFRC-ATD. …”
Get full text
Article -
211
Privacy-preserving multi-attribute reverse spectrum auction scheme
Published 2020-09-01“…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
Get full text
Article -
212
Implementation of Internal Control Information System to Improve The Effectiveness of The Company's Financial Supervision
Published 2024-12-01“…The study results show that companies that use internal control information systems can reduce errors in financial records, increase transparency, and minimize the risk of financial fraud. This study implies that the implementation of an internal control information system can help companies improve operational efficiency and strengthen overall corporate governance, which ultimately has an impact on increasing investor and stakeholder confidence. …”
Get full text
Article -
213
Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
Published 2014-01-01“…In this paper, we proposed an integrated algorithm which was able to detect two commonly used fraud practices: copy-move and splicing forgery in digital picture. …”
Get full text
Article -
214
Design of blockchain based zero-knowledge proof of location system
Published 2020-04-01“…With the development of precise positioning technology,a growing number of location-based services (LBS) emerge.For example,visit a specific place to get the corresponding reward.This also leads to location fraud by illegal users in order to gain benefits.Thus,it is necessary to verify location certificates provided by users.However,present proof of location systems are deficient in verifying users’ location certificates while protecting users’ privacy.Users do not flexibly control their location certificates either.Based on blockchain,a kind of distributed proof of location system architecture was proposed and based on the proposed system architecture,a kind of proof of location protocol with zero-knowledge proof was proposed further.With the proposed architecture and the protocol,the proposed proof of location system allows users to freely select disclosed certificate parameters and positional accuracy according to their needs so that hierarchical location privacy protection was achieved.…”
Get full text
Article -
215
Development of Accounting Through Automation and Artificial Intelligence
Published 2025-01-01“…The integration of AI in accounting enhances processes like financial reporting, fraud detection, and cost analysis by automating labor-intensive tasks and providing real-time, data-driven insights. …”
Get full text
Article -
216
Le débat juridique et religieux sur la sorcellerie en Libye
Published 2024-12-01“…Until recently, witchcraft was treated as a fraud offense under Article 461 of the 1954 Penal Code. …”
Get full text
Article -
217
Features of the use of big data in the financial sector
Published 2024-08-01“…It has been revealed that the technology makes it possible to do better analytical research, create models for forecasting economic trends and market changes, study market dynamics, analyse medical data to improve diagnosis and choice of treatment methods, predict failure or breakdown of equipment in production by assessing data from sensors, develop social and economic programmes at the state level, identify fraud and corruption in the financial sector, etc. …”
Get full text
Article -
218
Navigating the ChatGPT Theological Terrain: Considerations for Graduate Theology Students
Published 2024-12-01“…The literature shows that professors are already worried about potential scholastic perversions resulting in plagiarism and academic fraud. Originality, creativity, synthesis, and critical thinking, diligent editing are still necessary. …”
Get full text
Article -
219
Kontrowersje wokół długoterminowych badań Gillesa-Erica Séraliniego nad bezpieczeństwem zdrowotnym kukurydzy GMO
Published 2014-09-01“…After one year of debate, the editors of Food Chem Toxicol. decided to retract the paper, an unprecedented event given that the published article was peer-reviewed and there was no evidence of plagiarism or fraud. Here, we stress the results of Seralini’s study, discuss the methodological hints of that work and cite the commentaries on the whole situation.…”
Get full text
Article -
220
Dusung Dati and Dusung Pusaka in a Livelihood Sustainability (Case Study in Ullath Village Maluku)
Published 2023-11-01“…However, it did not resolve the whole conflict due to fraud, and in the end, the farmers chose to do other work. …”
Get full text
Article