-
261
The Parmalat Scandal: An Analysis of Financial Deception and Its Implications for Global Business
Published 2024-01-01“… The Parmalat scandal, often compared to Europe's Enron case, highlights one of the biggest financial frauds in global business history. Revealed in 2003, the case exposed an astonishing €14 billion deficit in the company's accounts, resulting from fraud, mismanagement, and oversight failures. …”
Get full text
Article -
262
Political Alienation and Electoral Participation in Nigeria's Democratization Process:A Survey of Voter Behavior in the 2019 General Elections
Published 2023-02-01“…The findings from the study showed that the failure of elected political officers to fulfill electoral promises, electoral fraud, and violence, are responsible for voter alienation in Nigeria. …”
Get full text
Article -
263
BidCorpus: A multifaceted learning dataset for public procurementHugging Face
Published 2025-02-01“…The models could also tolerate intentional changes made to bidding notices to evade fraud detection. All the resources from this work are publicly available, including the documents, pre-processing scripts, and training and evaluation of the models. …”
Get full text
Article -
264
Portrayal of Corruption in the Novel Devil on the Cross by Ngugi wa Thiong’o.
Published 2024“…In the discussion chapter, I discuss different forms of corruption which include; nepotism, bribery, fraud corruption, moral corruption, political corruption, and extortion as portrayed in Devil on the Cross. …”
Get full text
Thesis -
265
Portrayal of Corruption in the Novel Devil on the Cross by Ngugi Wa Thiong’o.
Published 2025“…In the discussion chapter, I discuss different forms of corruption which include; nepotism, bribery, fraud corruption, moral corruption, political corruption, and extortion as portrayed in Devil on the Cross. …”
Get full text
Thesis -
266
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01“…By using technologies such as blockchain, digital currency, as a new type of monetary asset, has been promoting the development of digital economy.Digital currency trading platform plays an important role in the use of private digital currency by digital currency users.Existing digital currency trading platforms may expose users’ privacy and provide illegal elements with the conditions to participate in various abnormal trading behaviors such as“air dropping” events, extortion, fraud, etc.The strong anonymity protection of users by digital currency trading platforms also make it more difficult for regulatory authorities to supervise digital currency transactions.Therefore, the strength of the anonymity protection of users by digital currency trading platforms need to consider not only the privacy protection of users, but also meet the regulatory requirements.For this reason, based on the analysis of the relationship between the digital currency trading platforms and the supervisory departments, an evolutionary game model was established, the digital currency trading platform and the supervisory game model were defined and constructed, and the replication dynamic equation was solved and the balanced solution was obtained according to the income matrix between the digital currency trading platform and the supervisory department.By building a Jacobian matrix, the stability of the evolutionary system under different parameters was analyzed.Besides, the evolutionary stable selection and strategy of the digital currency trading platform and the regulatory authority under different conditions were also analyzed.With Matlab, different strategies of anonymity protection of the digital currency trading platform and different strategies of supervision strategy of the regulatory department were simulated to verify the accuracy of the game model.Based on the results of the simulations, some suggestions on the supervision of digital currency trading platforms are put forward, which provides a theoretical basis for the future supervision of digital currency trading platforms in China.…”
Get full text
Article -
267
Gyroscope-Based Smartphone Model Identification via WaveNet and EfficientNetV2 Ensemble
Published 2024-01-01“…Smartphone model detection through sensor data is important for enhancing security protocols, preventing device fraud, and ensuring authorized service access. While extensive research has utilized sensors like cameras, microphones, accelerometers, and magnetometers for device fingerprinting, gyroscope data has remained largely unexplored for model detection due to its high susceptibility to noise from small vibrations and mechanical imperfections. …”
Get full text
Article -
268
Employee attendance system using face recognition and GPS using local binary pattern histogram
Published 2024-12-01“…This integrated system is especially useful in contemporary hybrid workplaces, as it minimizes attendance fraud and enhances operational efficiency. Although the system is capable of functionally robust performance under normal conditions, tests point to possible scalability and performance improvements in extreme lighting conditions and outdoor applications, thus establishing future development paths for environmental adaptation.…”
Get full text
Article -
269
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. …”
Get full text
Article -
270
Digital technologies in territorial development: Opportunities and challenges of application in state and municipal administration
Published 2025-01-01“…To ensure effective digitalization of territories at different levels, it is necessary to define the boundaries and standards for the use of digital technologies, develop technical com petencies of decision-makers, guarantee information security and protection of personal data, and reduce fraud risk.…”
Get full text
Article -
271
BNPL in the Consumerism World: About the Excessive Debt Trap
Published 2024-12-01“…Additionally, consumers should stay cautious to avoid fraud, like phishing, by being aware of the risks.…”
Get full text
Article -
272
INTEGRITY WHISTLEBLOWERS IN THE ROMANIAN LEGAL SYSTEM
Published 2024-05-01“…They can take many forms, such as corruption or fraud, unfair business practices or negligence. If no action is taken, they may cause serious damage to the public interest. …”
Get full text
Article -
273
Forensic Discrimination Potential of Blue, Black, Green, and Red Colored Fountain Pen Inks Commercially Used in Pakistan, by UV/Visible Spectroscopy, Thin Layer Chromatography, and...
Published 2019-01-01“…Examination and comparison of fountain pen inks are very important in forensic questioned documents examination in developing countries where the chances of fraud are greater in cases of cheques, marriage papers, entry of birth and death, etc. …”
Get full text
Article -
274
A dual benchmarking study of facial forgery and facial forensics
Published 2024-12-01“…Abstract In recent years, visual facial forgery has reached a level of sophistication that humans cannot identify fraud, which poses a significant threat to information security. …”
Get full text
Article -
275
Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana
Published 2024-11-01“…The findings highlight that a significant proportion of the population engages in cybercrime, with online romance scams and financial fraud being the common forms of cybercrime being practiced. …”
Get full text
Article -
276
Blockchain enabled traceability in the jewel supply chain
Published 2025-01-01“…Blockchain operates as a secure, immutable ledger, ensuring data integrity and transparency while preventing fraud and tampering due to its decentralized nature. …”
Get full text
Article -
277
Internal Control Systems and service delivery in Kabale Municipal Council, Kabale District, Uganda.
Published 2020“…Specifically the study investigated whether and how internal control systems employed support service delivery, the relationship between compliance, fraud prevalence, resource adequacy and service delivery; it assessed how control environment impacts effectiveness of internal controls in relation to service delivery. …”
Get full text
Thesis -
278
Price Manipulation in Common Stock Transactions and Analysis Prohibition of Obscenity in Some Cases
Published 2024-05-01“…In this article, we are looking for an answer to this question, can some types of common stock transactions be considered as examples of fraud? We have used descriptive-analytical method to answer this question. …”
Get full text
Article -
279
Is digital crime victimization increasing in Iceland – may the Me-too movement influence how victimization is experienced
Published 2020-04-01“…According to the results, approximately 13 % of respondents reported digital victimization during the three years prior to the survey. Slander and consumer fraud were the most common types of victimization. …”
Get full text
Article -
280
Evolutionary Game Analysis of Online Shopping Quality Control: The Roles of Risk Attitude and Government Supervision
Published 2021-01-01“…The current research finds that (1) the decrease of the quality control cost and the increase of the government’s benchmark fine are conducive to increasing the platform’s controlling probability; (2) the decrease of the proportion of rent and the increase of sellers’ fraud cost and the government’s benchmark fines are conducive to increasing the seller’s compliance probability; (3) when both the platform and seller are unwilling to make efforts for quality assurance, risk-seeking members make the seller gradually choose to provide compliant products; and (4) when the members are all risk-seeking, strengthening government supervision will help promote the transition of members’ behavioural choices in a benign direction. …”
Get full text
Article