Showing 261 - 280 results of 358 for search '"fraud"', query time: 0.05s Refine Results
  1. 261

    The Parmalat Scandal: An Analysis of Financial Deception and Its Implications for Global Business by Edgar Manuel Cambaza

    Published 2024-01-01
    “… The Parmalat scandal, often compared to Europe's Enron case, highlights one of the biggest financial frauds in global business history. Revealed in 2003, the case exposed an astonishing €14 billion deficit in the company's accounts, resulting from fraud, mismanagement, and oversight failures. …”
    Get full text
    Article
  2. 262

    Political Alienation and Electoral Participation in Nigeria's Democratization Process:A Survey of Voter Behavior in the 2019 General Elections by God'stime Igiebor

    Published 2023-02-01
    “…The findings from the study showed that the failure of elected political officers to fulfill electoral promises, electoral fraud, and violence, are responsible for voter alienation in Nigeria. …”
    Get full text
    Article
  3. 263

    BidCorpus: A multifaceted learning dataset for public procurementHugging Face by Weslley Lima, Victor Silva, Jasson Silva, Ricardo Lira, Anselmo Paiva

    Published 2025-02-01
    “…The models could also tolerate intentional changes made to bidding notices to evade fraud detection. All the resources from this work are publicly available, including the documents, pre-processing scripts, and training and evaluation of the models. …”
    Get full text
    Article
  4. 264

    Portrayal of Corruption in the Novel Devil on the Cross by Ngugi wa Thiong’o. by Natumanya, Blessed

    Published 2024
    “…In the discussion chapter, I discuss different forms of corruption which include; nepotism, bribery, fraud corruption, moral corruption, political corruption, and extortion as portrayed in Devil on the Cross. …”
    Get full text
    Thesis
  5. 265

    Portrayal of Corruption in the Novel Devil on the Cross by Ngugi Wa Thiong’o. by Natumanya, Blessed

    Published 2025
    “…In the discussion chapter, I discuss different forms of corruption which include; nepotism, bribery, fraud corruption, moral corruption, political corruption, and extortion as portrayed in Devil on the Cross. …”
    Get full text
    Thesis
  6. 266

    Analysis on anonymity and regulation of digital currency transactions based on game theory by Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING

    Published 2022-10-01
    “…By using technologies such as blockchain, digital currency, as a new type of monetary asset, has been promoting the development of digital economy.Digital currency trading platform plays an important role in the use of private digital currency by digital currency users.Existing digital currency trading platforms may expose users’ privacy and provide illegal elements with the conditions to participate in various abnormal trading behaviors such as“air dropping” events, extortion, fraud, etc.The strong anonymity protection of users by digital currency trading platforms also make it more difficult for regulatory authorities to supervise digital currency transactions.Therefore, the strength of the anonymity protection of users by digital currency trading platforms need to consider not only the privacy protection of users, but also meet the regulatory requirements.For this reason, based on the analysis of the relationship between the digital currency trading platforms and the supervisory departments, an evolutionary game model was established, the digital currency trading platform and the supervisory game model were defined and constructed, and the replication dynamic equation was solved and the balanced solution was obtained according to the income matrix between the digital currency trading platform and the supervisory department.By building a Jacobian matrix, the stability of the evolutionary system under different parameters was analyzed.Besides, the evolutionary stable selection and strategy of the digital currency trading platform and the regulatory authority under different conditions were also analyzed.With Matlab, different strategies of anonymity protection of the digital currency trading platform and different strategies of supervision strategy of the regulatory department were simulated to verify the accuracy of the game model.Based on the results of the simulations, some suggestions on the supervision of digital currency trading platforms are put forward, which provides a theoretical basis for the future supervision of digital currency trading platforms in China.…”
    Get full text
    Article
  7. 267

    Gyroscope-Based Smartphone Model Identification via WaveNet and EfficientNetV2 Ensemble by Erkan Kiymik, Ali Emre Ozturk

    Published 2024-01-01
    “…Smartphone model detection through sensor data is important for enhancing security protocols, preventing device fraud, and ensuring authorized service access. While extensive research has utilized sensors like cameras, microphones, accelerometers, and magnetometers for device fingerprinting, gyroscope data has remained largely unexplored for model detection due to its high susceptibility to noise from small vibrations and mechanical imperfections. …”
    Get full text
    Article
  8. 268

    Employee attendance system using face recognition and GPS using local binary pattern histogram by Narahari Vigraha Prasada, Ikrimach

    Published 2024-12-01
    “…This integrated system is especially useful in contemporary hybrid workplaces, as it minimizes attendance fraud and enhances operational efficiency. Although the system is capable of functionally robust performance under normal conditions, tests point to possible scalability and performance improvements in extreme lighting conditions and outdoor applications, thus establishing future development paths for environmental adaptation.…”
    Get full text
    Article
  9. 269

    Consumer Protection of Girls from Cybercrime in a Gender Perspective by Susilowati Suparto, Deviana Yuanitasari, Sonny Dewi Judiasih, Yamudin Salaeh

    Published 2024-12-01
    “…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. …”
    Get full text
    Article
  10. 270

    Digital technologies in territorial development: Opportunities and challenges of application in state and municipal administration by Ivan A. Antipin, Natalya Yu. Vlasova, Elena A. Shishkina

    Published 2025-01-01
    “…To ensure effective digitalization of territories at different levels, it is necessary to define the boundaries and standards for the use of digital technologies, develop technical com petencies of decision-makers, guarantee information security and protection of personal data, and reduce fraud risk.…”
    Get full text
    Article
  11. 271

    BNPL in the Consumerism World: About the Excessive Debt Trap by Bartosz Bagniewski, Jakub Kubiczek, Zuzanna Żuchowska

    Published 2024-12-01
    “…Additionally, consumers should stay cautious to avoid fraud, like phishing, by being aware of the risks.…”
    Get full text
    Article
  12. 272

    INTEGRITY WHISTLEBLOWERS IN THE ROMANIAN LEGAL SYSTEM by Florin STOICA

    Published 2024-05-01
    “…They can take many forms, such as corruption or fraud, unfair business practices or negligence. If no action is taken, they may cause serious damage to the public interest. …”
    Get full text
    Article
  13. 273

    Forensic Discrimination Potential of Blue, Black, Green, and Red Colored Fountain Pen Inks Commercially Used in Pakistan, by UV/Visible Spectroscopy, Thin Layer Chromatography, and... by Mehwish Sharif, Madeeha Batool, Sohail Chand, Zahoor Hussain Farooqi, Syed Azhar Ali Shah Tirmazi, Makshoof Athar

    Published 2019-01-01
    “…Examination and comparison of fountain pen inks are very important in forensic questioned documents examination in developing countries where the chances of fraud are greater in cases of cheques, marriage papers, entry of birth and death, etc. …”
    Get full text
    Article
  14. 274

    A dual benchmarking study of facial forgery and facial forensics by Minh Tam Pham, Thanh Trung Huynh, Thanh Tam Nguyen, Thanh Toan Nguyen, Thanh Thi Nguyen, Jun Jo, Hongzhi Yin, Quoc Viet Hung Nguyen

    Published 2024-12-01
    “…Abstract In recent years, visual facial forgery has reached a level of sophistication that humans cannot identify fraud, which poses a significant threat to information security. …”
    Get full text
    Article
  15. 275

    Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana by Charles Obeng, Paul Kwasi Kumah, Hubert Bimpeh Asiedu, Felix Awuah Obeng Senior

    Published 2024-11-01
    “…The findings highlight that a significant proportion of the population engages in cybercrime, with online romance scams and financial fraud being the common forms of cybercrime being practiced. …”
    Get full text
    Article
  16. 276

    Blockchain enabled traceability in the jewel supply chain by Aman Patel, Siva Sai, Ankit Daiya, Harshal Akolekar, Vinay Chamola

    Published 2025-01-01
    “…Blockchain operates as a secure, immutable ledger, ensuring data integrity and transparency while preventing fraud and tampering due to its decentralized nature. …”
    Get full text
    Article
  17. 277

    Internal Control Systems and service delivery in Kabale Municipal Council, Kabale District, Uganda. by Boaz, Abomugisha

    Published 2020
    “…Specifically the study investigated whether and how internal control systems employed support service delivery, the relationship between compliance, fraud prevalence, resource adequacy and service delivery; it assessed how control environment impacts effectiveness of internal controls in relation to service delivery. …”
    Get full text
    Thesis
  18. 278

    Price Manipulation in Common Stock Transactions and Analysis Prohibition of Obscenity in Some Cases by Ali Hassanzadeh Sarvestani, Seyed Mohammad Reza Seydnorani, Fathollah Tari

    Published 2024-05-01
    “…In this article, we are looking for an answer to this question, can some types of common stock transactions be considered as examples of fraud? We have used descriptive-analytical method to answer this question. …”
    Get full text
    Article
  19. 279

    Is digital crime victimization increasing in Iceland – may the Me-too movement influence how victimization is experienced by Helgi Gunnlaugsson, Jónas Orri Jónasson

    Published 2020-04-01
    “…According to the results, approximately 13 % of respondents reported digital victimization during the three years prior to the survey. Slander and consumer fraud were the most common types of victimization. …”
    Get full text
    Article
  20. 280

    Evolutionary Game Analysis of Online Shopping Quality Control: The Roles of Risk Attitude and Government Supervision by Decheng Wen, Dongwei Yan, Xiaojing Sun, Xiao Chen

    Published 2021-01-01
    “…The current research finds that (1) the decrease of the quality control cost and the increase of the government’s benchmark fine are conducive to increasing the platform’s controlling probability; (2) the decrease of the proportion of rent and the increase of sellers’ fraud cost and the government’s benchmark fines are conducive to increasing the seller’s compliance probability; (3) when both the platform and seller are unwilling to make efforts for quality assurance, risk-seeking members make the seller gradually choose to provide compliant products; and (4) when the members are all risk-seeking, strengthening government supervision will help promote the transition of members’ behavioural choices in a benign direction. …”
    Get full text
    Article