Showing 201 - 220 results of 247 for search '"fraud"', query time: 0.06s Refine Results
  1. 201

    Specific features of obtaining and using electronic evidence in criminal proceedings by I. O. Teslenko

    Published 2024-03-01
    “…Today, many criminal offences are being committed with the help of information technology around the world, ranging from simple online fraud to the threat of a territorial act. Therefore, one of the ways to record (document) such illegal activities effectively is to obtain (collect) electronic evidence by law enforcement agencies in criminal proceedings. …”
    Get full text
    Article
  2. 202
  3. 203

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2024-12-01
    “…Well-researched fields include credit rating, fraud detection, bankruptcy prediction, and volatility forecasting. …”
    Get full text
    Article
  4. 204

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…These face forgery techniques can cause problems such as fraud and social engineering attacks in facial recognition and identity verification areas. …”
    Get full text
    Article
  5. 205

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2023-12-01
    “…Well-researched fields include credit rating, fraud detection, bankruptcy prediction, and volatility forecasting. …”
    Get full text
    Article
  6. 206

    Investigation of criminal offences against property: typical investigative situations and problems of applying specialised knowledge by R. L. Stepaniuk, V. O. Husieva

    Published 2023-07-01
    “…These include, inter alia, criminal offences against property, including theft, robbery, assault, extortion, fraud, misappropriation, embezzlement or misappropriation of property through abuse of office, and more. …”
    Get full text
    Article
  7. 207

    Forensic tactics: a review of the formation history and current trends by O. P. Shaituro

    Published 2021-12-01
    “…Although until 1929 the tactics included some elements of forensic methodology, including recommendations for the investigation of theft, fraud, murder. At the present stage of development of forensic tactics, scientists are emphasizing the expansion of its branches. …”
    Get full text
    Article
  8. 208

    Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online by Ferzha Putra Utama, Gusman Wijaya, Ruvita Faurina, Arie Vatresia

    Published 2023-10-01
    “…Although online exams can be held anywhere and anytime, unfortunately, many violations and fraud exist, such as leaking exam questions, spreading answer keys illegally, and changing exam result data. …”
    Get full text
    Article
  9. 209

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…This rapid expansion brings heightened risks, including data breaches, fraud, and difficulties in safeguarding sensitive policyholder information. …”
    Get full text
    Article
  10. 210

    Academic and Socioсultural Adaptation of Students in Russian Universities by P. A. Ambarova, G. E. Zborovsky, V. S. Nikolskiy, N. V. Shabrova

    Published 2022-12-01
    “…The negative trend of decreasing student activity in the research field compared to the school period of study , as well as the preservation of a high proportion of those who are prone to academic fraud due to the lack of adaptive resources, is shown. …”
    Get full text
    Article
  11. 211

    Concept, features and types of corruption by L. I. Kalienichenko, D. V. Slynko

    Published 2022-03-01
    “…On a territorial basis, a distinction should be made between domestic (national) and transnational corruption, depending on the form of corruption - bribery, fraud, extortion, embezzlement (misappropriation) of public funds, clientelism, lobbying, favoritism, nepotism, state capture. …”
    Get full text
    Article
  12. 212

    Impact of Effective Out Sourcing on Procurement Contract Performance: A Case Study of Kisoro District Local Government. by Ndayisenga, Jack

    Published 2024
    “…The study findings revealed the impact of flexibility on the reliability of procurement contract performance in local government and these included resilience from supply challenges comes from attacking supply chain constraints from all angles and having operational, enterprises should do more to prevent fraud by actively evaluating and estimating the obstacles that may be encountered in the process of execution, sourcing flexibility has many advantages as they help to the buying firm to reduce their backorders, shortcomings in the contract management process occur because the buyer and the supplier are two different entities. …”
    Get full text
    Thesis
  13. 213

    Influence of Information Technology on the Performance of Financial Institutions in Ntungamo: A Case Study of Centenary Bank Ntungamo Branch. by Murungi, Doreen

    Published 2024
    “…The adoption of ATM technology has improved cost efficiency in the institutions, improved fraud risk management in the bank, and improved new customer enrolment in the institutions. …”
    Get full text
    Thesis
  14. 214

    Truffle Species Discrimination Based on Their Chemical Composition, Chromaticity Coordinates and Antioxidant Capacity by Cristina Valencia-Sullca, Anja Rakotondramavo, Catherine Verret, Jean-Philippe Blondeau, Sullivan Renouard

    Published 2024-07-01
    “…This therefore leads to high risk of fraud. To prevent these frauds, this study proposes to explore the chemical composition and antioxidant capacity to discriminate the six-truffle species encountered in France. …”
    Get full text
    Article
  15. 215

    Feasibility Study of the Use of Handheld NIR Spectrometer for Simultaneous Authentication and Quantification of Quality Parameters in Intact Pineapple Fruits by Charles L. Y. Amuah, Ernest Teye, Francis Padi Lamptey, Kwasi Nyandey, Jerry Opoku-Ansah, Peter Osei-Wusu Adueming

    Published 2019-01-01
    “…The results generally indicated that portable NIR spectrometer coupled with the appropriate chemometric tools could be employed for rapid nondestructive examination of pineapple quality and also to detect pineapple fraud due to mislabeling of conventionally produced fruits as organic ones. …”
    Get full text
    Article
  16. 216

    Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain by Suthir Sriram, P. R. Tharaniesh, Priyanka Saraf, Nivethitha Vijayaraj, Thangavel Murugan

    Published 2025-01-01
    “…This paper introduces a blockchain-based event management system that leverages Sui blockchain technology to address critical challenges such as ticket fraud, data security, and high transaction fees, which are prevalent in traditional event management systems. …”
    Get full text
    Article
  17. 217

    Akuisisi Bukti Digital Tiktok Berbasis Android Menggunakan Metode National Institute of Justice by Fitri Anggraini, Herman Herman, Anton Yudhana

    Published 2023-03-01
    “…Social media has a very positive impact on the general public such as easy access to information and access to the times, however it is possible that social media can have negative effects such as cyberbullying, fraud, threats, and defamation. The TikTok application is the most downloaded social media according to We Are Social and Hootsuite in January 2022 and the TikTok application is vulnerable to causing crimes of defamation, and threats. …”
    Get full text
    Article
  18. 218
  19. 219

    Rancang Bangun Sistem Try Out Berbasis Paperless untuk Evaluasi Hasil Belajar Siswa dengan MVC by Ramadhan Rakhmat Sani, Defri Kurniawan

    Published 2019-05-01
    “…So as to provide benefits in time and cost efficiency, reduce fraud and accelerate the evaluation process. The method used in the development of this application uses Rapid Application Development (RAD) which includes the stages of software requirements analysis, software design, software implementation and software testing with the application of the concept of System Development Life Cycle (SDLC) so that it is quickly evaluated by users. …”
    Get full text
    Article
  20. 220

    Design and Validation of Policy Making Model with Open Government Approach by Zahra Mohammadi, Abdolmajid Imani, Farahnaz Ahang

    Published 2024-06-01
    “…The beneficial consequences of implementing open government in higher education were evident in improved organizational accountability across organizational, legal, and professional domains, enhanced organizational performance including better social, economic, and innovative outcomes, and a reduction in academic corruption, which includes a decrease in data falsification, fraud, and other violations. Conclusion The study conclusively found that the antecedents of open government have a positive and significant impact on the implementation of open government initiatives. …”
    Get full text
    Article