-
221
Smart Contracts as a New Technology in the Digital Economy
Published 2018-12-01“…Some of the main features of modern digital technologies are speeding up business processes, reducing costs, eliminating the possibility of fraud, ensuring the transparency of the system and the ability to check and analyze the system. …”
Get full text
Article -
222
Evaluation of Price Prediction of Houses in a Real Estate via Machine Learning
Published 2025-02-01“… Traditional (manual) methods of determining real estate house prices are in some cases prone to mistakes which may be due to distractions, lack of attentiveness or vulnerability to real estate agent fraud. This work focuses on evaluation house price prediction in real estate using more recent methods. …”
Get full text
Article -
223
State and trends of regulation of crypto assets and cryptocurrency exchanges
Published 2025-01-01“…The author emphasises the need for interaction between industry representatives and regulators to manage the risks associated with cryptocurrencies, including prevention of market manipulation and fraud. The results of the work will be useful in shaping the concepts of the national and global regular framework regarding the trading of the crypto assets. …”
Get full text
Article -
224
On Putting an End to the Backlash Against Electrophysical Agents
Published 2023-10-01“…This rhetoric suggests that EPA interventions are "magical" treatments and that those practitioners who include them in their plans of care may be committing fraud. Such bashing rhetoric is in striking contradiction to the APTA's Guide to Physical Therapist Practice 4.0, which lists EPAs as one of its categories of interventions, the CAPTE's program accreditation policy, and the FSBPT's national licensing exam. …”
Get full text
Article -
225
The role and the influence of internal audit in the public sector
Published 2019-01-01“…It is known that in our country the occurrence of financial fraud is more and more frequent, and the audit is of great importance, because its role is to detect irregularities if there has been a misuse of public funds, wasteful and inefficient use of available budgetary resources. …”
Get full text
Article -
226
Violencia extrema y delito en el marco de la campaña de represión clandestina en Argentina (1976–1983)
Published 2018-07-01“…It tries to show the link between the use of extreme violence, the commission of some crimes (theft, economic fraud, extortion) and the indoctrination received previously by special unit members. …”
Get full text
Article -
227
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
228
The power of social media to influence people in Indonesia: case study of crazy rich scam and big data of election postponement
Published 2023-03-01“…This study aims to explain the power of social media to influence people in Indonesia with the fraud case carried out by crazy rich Doni Salmanan and Indra Kenz, as well as the Big Data claim case which shows the postponement of the 2024 election. …”
Get full text
Article -
229
Missing Trader Ontology (MTO): un’ontologia per il rilevamento delle società cartiere e la prevenzione delle frodi all’IVA intracomunitaria
Published 2024-07-01“…Lo sviluppo dei fenomeni fraudolenti in danno dell’IVA intracomunitaria e, in particolare, l’evoluzione delle Missing Trader Intra-Community VAT fraud (frodi all’IVA intracomunitaria con utilizzo di società cosiddette “cartiere”) obbliga costantemente le Istituzioni Unionali a potenziare ed adeguare le azioni di contrasto, sempre più a carattere preventivo. …”
Get full text
Article -
230
The Effects of cashless policy implementation on revenue optimization in Kakamega County, Kenya
Published 2025-01-01“…The findings indicate a substantial improvement in revenue collection, with a marked reduction in fraud and mismanagement. However, the study also identifies challenges such as initial resistance from the revenue clerks, the need for continuous training of revenue clerks, and technical issues related to the cashless system's infrastructure. …”
Get full text
Article -
231
DNA-based detection of Rat in the meatballs product using a real-time polymerase chain reaction method
Published 2024-11-01“…This demand creates opportunities for food fraud by specific industries, including adulterating meat with non-halal species, such as rats. …”
Get full text
Article -
232
Voters response to public information disclosure policies in the local head election of Ciamis Regency 2024
Published 2024-12-01“…Voters are vulnerable to negative influences in the local head election process and are rooted in political fraud at the grassroots. This study aims to determine Voters response to public information disclosure policies in the local head election of Ciamis Regency 2024. …”
Get full text
Article -
233
State Mode and Management Style: the Difficulties of Democratic Transformation
Published 2017-03-01“…In the result remain on top of the bureaucracy, the corruption, the brutality, the callousness and irresponsibility, and the bottom begins to dominate legal nihilism, distrust of authorities, double standards.Analyzing the distinguished types of styles, the author stops at the optimally-effective style performance focuses on the value of the benefits and ways of learning, introduces into scientific circulation the concept of “style of meanness and hypocrisy” – style, based on lies, double standards, fraud, provocations and corruption.This article presents some value judgments made appropriate generalizations and conclusions, analyzes the actions taken by a state in respect of establishing proper order in the system of public administration and public service. …”
Get full text
Article -
234
The importance of forensic accounting for the management process in medium-sized enterprises, the example of the Republic of Serbia
Published 2024-01-01“…., preventing corrupt actions, fraud in public procurement, that is, in a word, in the prevention of criminal activities. …”
Get full text
Article -
235
Discrimination of Pakistani Fountain Pen Inks by Gas Chromatography-Mass Spectrometry (GC-MS)
Published 2022-01-01“…In developing countries, the chances of fraud in written documents are comparatively high. …”
Get full text
Article -
236
Consumer Protection in The Perspective Of Islamic Law: The Principle of Dignified Justice
Published 2024-12-01“…The principle of dignified justice emphasizes that consumers' rights must be protected and treated with respect, including consumer rights to correct information, freedom from fraud, and guarantees of product quality. This research uses a philosophical normative approach which will discuss the importance of values in Islamic sharia to provide more fair protection for consumers. …”
Get full text
Article -
237
Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency
Published 2024-11-01“…In addition to the Geofence feature, the app includes QR code validation to minimize the potential for fraud. The application development methodology follows a prototype approach, starting from the communication phase to identify company needs, followed by quick design, wireframe creation, and mockups. …”
Get full text
Article -
238
Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis
Published 2025-01-01“…The rapid advancement of synthetic media, while beneficial, has also spawned GAN-generated deepfakes, which pose risks, including misinformation and digital fraud. This paper investigates the detectability of GAN-generated static images, focusing on residual artifacts that are imperceptible to humans but detectable through digital analysis. …”
Get full text
Article -
239
Blockchain’s Impact on Morocco’s Financial Sector: Opportunities and Challenges
Published 2024-01-01“…The financial industry faces numerous challenges in combating fraud and embezzlement, due to the complexity and scale of its operations. …”
Get full text
Article -
240
Tail Risks Across Investment Funds
Published 2024-12-01“…Examples of fund-specific extreme events include those due to big bets or fraud. This paper studies the two components in relation to compensation structure in managed portfolios. …”
Get full text
Article