-
301
Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm
Published 2025-01-01“…Investigators often deal with huge amounts of text-based evidence, so this technique helps them identify topics, such as fraud, especially in relation to text data, which is the core of our research. …”
Get full text
Article -
302
Specific features of obtaining and using electronic evidence in criminal proceedings
Published 2024-03-01“…Today, many criminal offences are being committed with the help of information technology around the world, ranging from simple online fraud to the threat of a territorial act. Therefore, one of the ways to record (document) such illegal activities effectively is to obtain (collect) electronic evidence by law enforcement agencies in criminal proceedings. …”
Get full text
Article -
303
The Role of Financial Technology in Promoting Digital Finances in Algeria (2016-2024)
Published 2024-12-01“…Along with this, current challenges for further developing digital financial inclusion include: the slow pace of adopting modern technologies in the field of electronic payments; a lack of trust in new payment methods among some users; the absence of insurance for banks in the event of fraud through electronic payments.…”
Get full text
Article -
304
-
305
USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT
Published 2024-12-01“…Well-researched fields include credit rating, fraud detection, bankruptcy prediction, and volatility forecasting. …”
Get full text
Article -
306
Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection
Published 2024-11-01“…These face forgery techniques can cause problems such as fraud and social engineering attacks in facial recognition and identity verification areas. …”
Get full text
Article -
307
USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT
Published 2023-12-01“…Well-researched fields include credit rating, fraud detection, bankruptcy prediction, and volatility forecasting. …”
Get full text
Article -
308
Investigation of criminal offences against property: typical investigative situations and problems of applying specialised knowledge
Published 2023-07-01“…These include, inter alia, criminal offences against property, including theft, robbery, assault, extortion, fraud, misappropriation, embezzlement or misappropriation of property through abuse of office, and more. …”
Get full text
Article -
309
Forensic tactics: a review of the formation history and current trends
Published 2021-12-01“…Although until 1929 the tactics included some elements of forensic methodology, including recommendations for the investigation of theft, fraud, murder. At the present stage of development of forensic tactics, scientists are emphasizing the expansion of its branches. …”
Get full text
Article -
310
Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online
Published 2023-10-01“…Although online exams can be held anywhere and anytime, unfortunately, many violations and fraud exist, such as leaking exam questions, spreading answer keys illegally, and changing exam result data. …”
Get full text
Article -
311
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01“…This rapid expansion brings heightened risks, including data breaches, fraud, and difficulties in safeguarding sensitive policyholder information. …”
Get full text
Article -
312
Academic and Socioсultural Adaptation of Students in Russian Universities
Published 2022-12-01“…The negative trend of decreasing student activity in the research field compared to the school period of study , as well as the preservation of a high proportion of those who are prone to academic fraud due to the lack of adaptive resources, is shown. …”
Get full text
Article -
313
Concept, features and types of corruption
Published 2022-03-01“…On a territorial basis, a distinction should be made between domestic (national) and transnational corruption, depending on the form of corruption - bribery, fraud, extortion, embezzlement (misappropriation) of public funds, clientelism, lobbying, favoritism, nepotism, state capture. …”
Get full text
Article -
314
Impact of Effective Out Sourcing on Procurement Contract Performance: A Case Study of Kisoro District Local Government.
Published 2024“…The study findings revealed the impact of flexibility on the reliability of procurement contract performance in local government and these included resilience from supply challenges comes from attacking supply chain constraints from all angles and having operational, enterprises should do more to prevent fraud by actively evaluating and estimating the obstacles that may be encountered in the process of execution, sourcing flexibility has many advantages as they help to the buying firm to reduce their backorders, shortcomings in the contract management process occur because the buyer and the supplier are two different entities. …”
Get full text
Thesis -
315
Influence of Information Technology on the Performance of Financial Institutions in Ntungamo: A Case Study of Centenary Bank Ntungamo Branch.
Published 2024“…The adoption of ATM technology has improved cost efficiency in the institutions, improved fraud risk management in the bank, and improved new customer enrolment in the institutions. …”
Get full text
Thesis -
316
Truffle Species Discrimination Based on Their Chemical Composition, Chromaticity Coordinates and Antioxidant Capacity
Published 2024-07-01“…This therefore leads to high risk of fraud. To prevent these frauds, this study proposes to explore the chemical composition and antioxidant capacity to discriminate the six-truffle species encountered in France. …”
Get full text
Article -
317
Feasibility Study of the Use of Handheld NIR Spectrometer for Simultaneous Authentication and Quantification of Quality Parameters in Intact Pineapple Fruits
Published 2019-01-01“…The results generally indicated that portable NIR spectrometer coupled with the appropriate chemometric tools could be employed for rapid nondestructive examination of pineapple quality and also to detect pineapple fraud due to mislabeling of conventionally produced fruits as organic ones. …”
Get full text
Article -
318
Optimized Identification of Sentence-Level Multiclass Events on Urdu-Language-Text Using Machine Learning Techniques
Published 2025-01-01“…We used sentence-level classification to categorize sentences including terrorist attacks, national news, sports, entertainment, politics, safety, earthquakes, fraud and corruption, sexual assault, weather, accidents, forces, inflation, murder and death, education, and international news. …”
Get full text
Article -
319
Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain
Published 2025-01-01“…This paper introduces a blockchain-based event management system that leverages Sui blockchain technology to address critical challenges such as ticket fraud, data security, and high transaction fees, which are prevalent in traditional event management systems. …”
Get full text
Article -
320
Akuisisi Bukti Digital Tiktok Berbasis Android Menggunakan Metode National Institute of Justice
Published 2023-03-01“…Social media has a very positive impact on the general public such as easy access to information and access to the times, however it is possible that social media can have negative effects such as cyberbullying, fraud, threats, and defamation. The TikTok application is the most downloaded social media according to We Are Social and Hootsuite in January 2022 and the TikTok application is vulnerable to causing crimes of defamation, and threats. …”
Get full text
Article