Showing 221 - 240 results of 358 for search '"fraud"', query time: 0.05s Refine Results
  1. 221

    Smart Contracts as a New Technology in the Digital Economy by Irina Glazkova, Dorota Kozioł-Kaczorek, Sergey Shmatko

    Published 2018-12-01
    “…Some of the main features of modern digital technologies are speeding up business processes, reducing costs, eliminating the possibility of fraud, ensuring the transparency of the system and the ability to check and analyze the system. …”
    Get full text
    Article
  2. 222

    Evaluation of Price Prediction of Houses in a Real Estate via Machine Learning by A. A. Ibrahim, O. A. Ayilara-Adewale, A. A. Alabi, D. A. Olusesi

    Published 2025-02-01
    “… Traditional (manual) methods of determining real estate house prices are in some cases prone to mistakes which may be due to distractions, lack of attentiveness or vulnerability to real estate agent fraud. This work focuses on evaluation house price prediction in real estate using more recent methods. …”
    Get full text
    Article
  3. 223

    State and trends of regulation of crypto assets and cryptocurrency exchanges by M. B. Kitinov

    Published 2025-01-01
    “…The author emphasises the need for interaction between industry representatives and regulators to manage the risks associated with cryptocurrencies, including prevention of market manipulation and fraud. The results of the work will be useful in shaping the concepts of the national and global regular framework regarding the trading of the crypto assets. …”
    Get full text
    Article
  4. 224

    On Putting an End to the Backlash Against Electrophysical Agents by Alain-Yvan Belanger, David M. Selkowitz, Daryl Lawson

    Published 2023-10-01
    “…This rhetoric suggests that EPA interventions are "magical" treatments and that those practitioners who include them in their plans of care may be committing fraud. Such bashing rhetoric is in striking contradiction to the APTA's Guide to Physical Therapist Practice 4.0, which lists EPAs as one of its categories of interventions, the CAPTE's program accreditation policy, and the FSBPT's national licensing exam. …”
    Get full text
    Article
  5. 225

    The role and the influence of internal audit in the public sector by Vesić Tamara, Jevtić Dalibor

    Published 2019-01-01
    “…It is known that in our country the occurrence of financial fraud is more and more frequent, and the audit is of great importance, because its role is to detect irregularities if there has been a misuse of public funds, wasteful and inefficient use of available budgetary resources. …”
    Get full text
    Article
  6. 226

    Violencia extrema y delito en el marco de la campaña de represión clandestina en Argentina (1976–1983) by Mario Ranalletti

    Published 2018-07-01
    “…It tries to show the link between the use of extreme violence, the commission of some crimes (theft, economic fraud, extortion) and the indoctrination received previously by special unit members. …”
    Get full text
    Article
  7. 227

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  8. 228

    The power of social media to influence people in Indonesia: case study of crazy rich scam and big data of election postponement by Garcia Krisnando Nathanael, Devi Angeliawati, Muhadjir Muhadjir

    Published 2023-03-01
    “…This study aims to explain the power of social media to influence people in Indonesia with the fraud case carried out by crazy rich Doni Salmanan and Indra Kenz, as well as the Big Data claim case which shows the postponement of the 2024 election. …”
    Get full text
    Article
  9. 229

    Missing Trader Ontology (MTO): un’ontologia per il rilevamento delle società cartiere e la prevenzione delle frodi all’IVA intracomunitaria by Matteo Longo

    Published 2024-07-01
    “…Lo sviluppo dei fenomeni fraudolenti in danno dell’IVA intracomunitaria e, in particolare, l’evoluzione delle Missing Trader Intra-Community VAT fraud (frodi all’IVA intracomunitaria con utilizzo di società cosiddette “cartiere”) obbliga costantemente le Istituzioni Unionali a potenziare ed adeguare le azioni di contrasto, sempre più a carattere preventivo. …”
    Get full text
    Article
  10. 230

    The Effects of cashless policy implementation on revenue optimization in Kakamega County, Kenya by Livingstone Eshitika

    Published 2025-01-01
    “…The findings indicate a substantial improvement in revenue collection, with a marked reduction in fraud and mismanagement. However, the study also identifies challenges such as initial resistance from the revenue clerks, the need for continuous training of revenue clerks, and technical issues related to the cashless system's infrastructure. …”
    Get full text
    Article
  11. 231

    DNA-based detection of Rat in the meatballs product using a real-time polymerase chain reaction method by Etin Diah Permanasari, Hadi Sunaryo, Adia Putra Wirman, Nuriza Rahmadini, Savira Yustinah Aggasy, Nurul Azmah Nikmatullah

    Published 2024-11-01
    “…This demand creates opportunities for food fraud by specific industries, including adulterating meat with non-halal species, such as rats. …”
    Get full text
    Article
  12. 232

    Voters response to public information disclosure policies in the local head election of Ciamis Regency 2024 by Kiki Endah, Irfan Nursetiawan, Endah Vestikowati

    Published 2024-12-01
    “…Voters are vulnerable to negative influences in the local head election process and are rooted in political fraud at the grassroots. This study aims to determine Voters response to public information disclosure policies in the local head election of Ciamis Regency 2024. …”
    Get full text
    Article
  13. 233

    State Mode and Management Style: the Difficulties of Democratic Transformation by E. V. Okhotsky

    Published 2017-03-01
    “…In the result remain on top of the bureaucracy, the corruption, the brutality, the callousness and irresponsibility, and the bottom begins to dominate legal nihilism, distrust of authorities, double standards.Analyzing the distinguished types of styles, the author stops at the optimally-effective style performance focuses on the value of the benefits and ways of learning, introduces into scientific circulation the concept of “style of meanness and hypocrisy” – style, based on lies, double standards, fraud, provocations and corruption.This article presents some value judgments made appropriate generalizations and conclusions, analyzes the actions taken by a state in respect of establishing proper order in the system of public administration and public service. …”
    Get full text
    Article
  14. 234

    The importance of forensic accounting for the management process in medium-sized enterprises, the example of the Republic of Serbia by Gligović Dejan, Brakus Aleksandra, Jović Vladan

    Published 2024-01-01
    “…., preventing corrupt actions, fraud in public procurement, that is, in a word, in the prevention of criminal activities. …”
    Get full text
    Article
  15. 235
  16. 236

    Consumer Protection in The Perspective Of Islamic Law: The Principle of Dignified Justice by Dwi Edi Wibowo, Fradhana Putra Disantara

    Published 2024-12-01
    “…The principle of dignified justice emphasizes that consumers' rights must be protected and treated with respect, including consumer rights to correct information, freedom from fraud, and guarantees of product quality. This research uses a philosophical normative approach which will discuss the importance of values in Islamic sharia to provide more fair protection for consumers. …”
    Get full text
    Article
  17. 237

    Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency by Arlan Leon Allacsta, T. Yudi Hadiwandra

    Published 2024-11-01
    “…In addition to the Geofence feature, the app includes QR code validation to minimize the potential for fraud. The application development methodology follows a prototype approach, starting from the communication phase to identify company needs, followed by quick design, wireframe creation, and mockups. …”
    Get full text
    Article
  18. 238

    Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis by Tamer Say, Mustafa Alkan, Aynur Kocak

    Published 2025-01-01
    “…The rapid advancement of synthetic media, while beneficial, has also spawned GAN-generated deepfakes, which pose risks, including misinformation and digital fraud. This paper investigates the detectability of GAN-generated static images, focusing on residual artifacts that are imperceptible to humans but detectable through digital analysis. …”
    Get full text
    Article
  19. 239

    Blockchain’s Impact on Morocco’s Financial Sector: Opportunities and Challenges by Asly Ishaq, Essabbar Driss

    Published 2024-01-01
    “…The financial industry faces numerous challenges in combating fraud and embezzlement, due to the complexity and scale of its operations. …”
    Get full text
    Article
  20. 240

    Tail Risks Across Investment Funds by Jerchern Lin

    Published 2024-12-01
    “…Examples of fund-specific extreme events include those due to big bets or fraud. This paper studies the two components in relation to compensation structure in managed portfolios. …”
    Get full text
    Article