Showing 201 - 220 results of 358 for search '"fraud"', query time: 0.06s Refine Results
  1. 201

    Research ethics by Aşkın Yaşar, Adnan Ataç

    “…If rt was made purposely by the researcher, this is scientific fraud. Publication brings about some special ethical problems. …”
    Get full text
    Article
  2. 202

    Navigating Auditing Risks in the Crypto Asset Landscape by Georgiana-Iulia LAZEA (TRIFA), Ovidiu-Constantin BUNGET, Anca-Diana BALAN, Mircea Stefan SOLOVASTRU

    Published 2025-02-01
    “…This paper explores the inherent, control, valuation, and related risks associated with crypto assets, emphasising the complexities of valuation, compliance, and fraud detection. Starting from a bibliometric visualisation in VOSviewer, it points out thematic trends and key concepts in crypto auditing. …”
    Get full text
    Article
  3. 203

    Las elecciones presidenciales de 1946 y el peronismo naciente vistos por el periódico La Vanguardia by Claudio Panella

    Published 2004-09-01
    “…As a result of this electoral contest -the first one free from fraud since 1928- Juan Domingo Perón became a constitutional president of Argentina.This paper will analyze the attitude of the aforementioned newspaper towards the election, the kind of discourse as well as the arguments used to definitely favour the Unión « Democrática » and harshly criticize Perón and his supporting political and social forces. …”
    Get full text
    Article
  4. 204

    Workshops for editors in the central region of Cuba: a proposal for the improvement of scientific journals in medical sciences by Yurima Hernández de la Rosa, Mikhail Benet Rodríguez, Francisco Luis Moreno Martínez, Ana María Molina Gómez, Belkis González Aguiar, Lucitere Rodríguez González

    Published 2011-08-01
    “…The authors also address the issue of fraud in the scientific literature from a national to respect debate and the discussion developed on this important subject in the second workshop.…”
    Get full text
    Article
  5. 205

    Development of an insurance industry image assessment index by O. I. Larina, N. V. Moryzhenkova

    Published 2022-07-01
    “…A low level of financial literacy, cases of fraud by insurers lead to the formation of a negative image of the insurance industry, even if the respondents have a positive experience of using insurance products. …”
    Get full text
    Article
  6. 206

    Recent Progress of Anomaly Detection by Xiaodan Xu, Huawen Liu, Minghai Yao

    Published 2019-01-01
    “…Anomaly analysis is of great interest to diverse fields, including data mining and machine learning, and plays a critical role in a wide range of applications, such as medical health, credit card fraud, and intrusion detection. Recently, a significant number of anomaly detection methods with a variety of types have been witnessed. …”
    Get full text
    Article
  7. 207

    Is financial stress a facilitating factor in cartel formation? by Jesper Fredborg Huric-Larsen

    Published 2025-03-01
    “…It is well-known that failing to achieve key organizational goals may pressure managers to commit fraud, but can it be a facilitating factor in cartel formation as well? …”
    Get full text
    Article
  8. 208

    L’abstention en Algérie : un autre mode de contestation politique by Louisa Dris-Aït Hamadouche

    Published 2009-11-01
    “…The consequences are a dissuasive electoral code, suspicious official electoral results and accusations and suspicions of fraud. Secondly, abstention is related to the political offer : the politics offered and the individuals who represent that offer constitute a disappointing choice for potential voters, especially youth, who lose interest in the elections. …”
    Get full text
    Article
  9. 209

    Application of K-means algorithm based on A-D model in calling abnormal customer mining by Jian ZHOU, Yongge SHI, Meibin HE

    Published 2018-04-01
    “…In order to make use of massive voice communication records and cluster high-quality clients (telecom fraud clients,advertisers) with various kinds of voice communication abnormalities,a behavioral feature model of abnormal voice communication customers was designed and constructed.Based on the model,a clustering analysis algorithm for customers with abnormal voice communication behavior was proposed.First of all,by analyzing the call records of customers,the characteristics of call behaviors was got,such as the number of calls,call rates,and so on.Then AHP-DEMATEL model was constructed by blending the AHP model and DEMATEL method.Secondly,based on the model,an improved K-means algorithm was proposed to cluster the abnormal clients according to the voice communication records.Finally,the real data was used to verify the analysis.The results show that compared with other similar algorithms,the proposed algorithm improves the performance of multi-type abnormal customer comprehensive clustering analysis and single-type abnormal customer clustering analysis greatly.…”
    Get full text
    Article
  10. 210

    Anomalous Trajectory Detection Using Masked Autoregressive Flow Considering Route Choice Probability by Pengqian Cao, Renxin Zhong, Wei Huang

    Published 2022-01-01
    “…However, anomalous trajectories such as trip fraud often occur due to greedy drivers. In this study, we propose an anomalous trajectory detection method that incorporates Route Choice analysis into Masked Autoregressive Flow, named MAFRC-ATD. …”
    Get full text
    Article
  11. 211

    Privacy-preserving multi-attribute reverse spectrum auction scheme by Jiaqi WANG, Ning LU, Qingfeng CHENG, Zhaoxia WU, Wenbo SHI

    Published 2020-09-01
    “…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
    Get full text
    Article
  12. 212

    Implementation of Internal Control Information System to Improve The Effectiveness of The Company's Financial Supervision by Anniza Rezky Z, F.X. Kurniawan Tjakrawala

    Published 2024-12-01
    “…The study results show that companies that use internal control information systems can reduce errors in financial records, increase transparency, and minimize the risk of financial fraud. This study implies that the implementation of an internal control information system can help companies improve operational efficiency and strengthen overall corporate governance, which ultimately has an impact on increasing investor and stakeholder confidence. …”
    Get full text
    Article
  13. 213

    Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies by Bo Liu, Chi-Man Pun, Xiao-Chen Yuan

    Published 2014-01-01
    “…In this paper, we proposed an integrated algorithm which was able to detect two commonly used fraud practices: copy-move and splicing forgery in digital picture. …”
    Get full text
    Article
  14. 214

    Design of blockchain based zero-knowledge proof of location system by Wei WU, Erwu LIU, Changxin YANG, Rui WANG

    Published 2020-04-01
    “…With the development of precise positioning technology,a growing number of location-based services (LBS) emerge.For example,visit a specific place to get the corresponding reward.This also leads to location fraud by illegal users in order to gain benefits.Thus,it is necessary to verify location certificates provided by users.However,present proof of location systems are deficient in verifying users’ location certificates while protecting users’ privacy.Users do not flexibly control their location certificates either.Based on blockchain,a kind of distributed proof of location system architecture was proposed and based on the proposed system architecture,a kind of proof of location protocol with zero-knowledge proof was proposed further.With the proposed architecture and the protocol,the proposed proof of location system allows users to freely select disclosed certificate parameters and positional accuracy according to their needs so that hierarchical location privacy protection was achieved.…”
    Get full text
    Article
  15. 215

    Development of Accounting Through Automation and Artificial Intelligence by Claudiu BRÂNDAȘ, Ioan MINDA

    Published 2025-01-01
    “…The integration of AI in accounting enhances processes like financial reporting, fraud detection, and cost analysis by automating labor-intensive tasks and providing real-time, data-driven insights. …”
    Get full text
    Article
  16. 216

    Le débat juridique et religieux sur la sorcellerie en Libye by Mazek Ayoub

    Published 2024-12-01
    “…Until recently, witchcraft was treated as a fraud offense under Article 461 of the 1954 Penal Code. …”
    Get full text
    Article
  17. 217

    Features of the use of big data in the financial sector by F. O. Chernenkov

    Published 2024-08-01
    “…It  has been revealed that the technology makes it   possible to  do better analytical research, create models for forecasting economic trends and market changes, study market dynamics, analyse medical data to  improve diagnosis and choice of   treatment methods, predict failure or  breakdown of   equipment in  production by   assessing data from sensors, develop social and economic programmes at   the state level, identify fraud and corruption in   the financial sector, etc. …”
    Get full text
    Article
  18. 218

    Navigating the ChatGPT Theological Terrain: Considerations for Graduate Theology Students by Mahlon Nyongesa Juma

    Published 2024-12-01
    “…The literature shows that professors are already worried about potential scholastic perversions resulting in plagiarism and academic fraud. Originality, creativity, synthesis, and critical thinking, diligent editing are still necessary. …”
    Get full text
    Article
  19. 219

    Kontrowersje wokół długoterminowych badań Gillesa-Erica Séraliniego nad bezpieczeństwem zdrowotnym kukurydzy GMO by Katarzyna Lisowska, Alexander Cortez

    Published 2014-09-01
    “…After one year of debate, the editors of Food Chem Toxicol. decided to retract the paper, an unprecedented event given that the published article was peer-reviewed and there was no evidence of plagiarism or fraud. Here, we stress the results of Seralini’s study, discuss the methodological hints of that work and cite the commentaries on the whole situation.…”
    Get full text
    Article
  20. 220

    Dusung Dati and Dusung Pusaka in a Livelihood Sustainability (Case Study in Ullath Village Maluku) by Jeanee Belthia Nikijuluw

    Published 2023-11-01
    “…However, it did not resolve the whole conflict due to fraud, and in the end, the farmers chose to do other work. …”
    Get full text
    Article