Showing 301 - 320 results of 358 for search '"fraud"', query time: 0.04s Refine Results
  1. 301

    Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm by Shahlaa Mashhadani

    Published 2025-01-01
    “…Investigators often deal with huge amounts of text-based evidence, so this technique helps them identify topics, such as fraud, especially in relation to text data, which is the core of our research. …”
    Get full text
    Article
  2. 302

    Specific features of obtaining and using electronic evidence in criminal proceedings by I. O. Teslenko

    Published 2024-03-01
    “…Today, many criminal offences are being committed with the help of information technology around the world, ranging from simple online fraud to the threat of a territorial act. Therefore, one of the ways to record (document) such illegal activities effectively is to obtain (collect) electronic evidence by law enforcement agencies in criminal proceedings. …”
    Get full text
    Article
  3. 303

    The Role of Financial Technology in Promoting Digital Finances in Algeria (2016-2024) by Abderraouf Abada, Messaoud Boukhalfi, Mohammed Abderrahmane Bentadjine, Abdelfattah Daoudi

    Published 2024-12-01
    “…Along with this, current challenges for further developing digital financial inclusion include: the slow pace of adopting modern technologies in the field of electronic payments; a lack of trust in new payment methods among some users; the absence of insurance for banks in the event of fraud through electronic payments.…”
    Get full text
    Article
  4. 304
  5. 305

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2024-12-01
    “…Well-researched fields include credit rating, fraud detection, bankruptcy prediction, and volatility forecasting. …”
    Get full text
    Article
  6. 306

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…These face forgery techniques can cause problems such as fraud and social engineering attacks in facial recognition and identity verification areas. …”
    Get full text
    Article
  7. 307

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2023-12-01
    “…Well-researched fields include credit rating, fraud detection, bankruptcy prediction, and volatility forecasting. …”
    Get full text
    Article
  8. 308

    Investigation of criminal offences against property: typical investigative situations and problems of applying specialised knowledge by R. L. Stepaniuk, V. O. Husieva

    Published 2023-07-01
    “…These include, inter alia, criminal offences against property, including theft, robbery, assault, extortion, fraud, misappropriation, embezzlement or misappropriation of property through abuse of office, and more. …”
    Get full text
    Article
  9. 309

    Forensic tactics: a review of the formation history and current trends by O. P. Shaituro

    Published 2021-12-01
    “…Although until 1929 the tactics included some elements of forensic methodology, including recommendations for the investigation of theft, fraud, murder. At the present stage of development of forensic tactics, scientists are emphasizing the expansion of its branches. …”
    Get full text
    Article
  10. 310

    Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online by Ferzha Putra Utama, Gusman Wijaya, Ruvita Faurina, Arie Vatresia

    Published 2023-10-01
    “…Although online exams can be held anywhere and anytime, unfortunately, many violations and fraud exist, such as leaking exam questions, spreading answer keys illegally, and changing exam result data. …”
    Get full text
    Article
  11. 311

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…This rapid expansion brings heightened risks, including data breaches, fraud, and difficulties in safeguarding sensitive policyholder information. …”
    Get full text
    Article
  12. 312

    Academic and Socioсultural Adaptation of Students in Russian Universities by P. A. Ambarova, G. E. Zborovsky, V. S. Nikolskiy, N. V. Shabrova

    Published 2022-12-01
    “…The negative trend of decreasing student activity in the research field compared to the school period of study , as well as the preservation of a high proportion of those who are prone to academic fraud due to the lack of adaptive resources, is shown. …”
    Get full text
    Article
  13. 313

    Concept, features and types of corruption by L. I. Kalienichenko, D. V. Slynko

    Published 2022-03-01
    “…On a territorial basis, a distinction should be made between domestic (national) and transnational corruption, depending on the form of corruption - bribery, fraud, extortion, embezzlement (misappropriation) of public funds, clientelism, lobbying, favoritism, nepotism, state capture. …”
    Get full text
    Article
  14. 314

    Impact of Effective Out Sourcing on Procurement Contract Performance: A Case Study of Kisoro District Local Government. by Ndayisenga, Jack

    Published 2024
    “…The study findings revealed the impact of flexibility on the reliability of procurement contract performance in local government and these included resilience from supply challenges comes from attacking supply chain constraints from all angles and having operational, enterprises should do more to prevent fraud by actively evaluating and estimating the obstacles that may be encountered in the process of execution, sourcing flexibility has many advantages as they help to the buying firm to reduce their backorders, shortcomings in the contract management process occur because the buyer and the supplier are two different entities. …”
    Get full text
    Thesis
  15. 315

    Influence of Information Technology on the Performance of Financial Institutions in Ntungamo: A Case Study of Centenary Bank Ntungamo Branch. by Murungi, Doreen

    Published 2024
    “…The adoption of ATM technology has improved cost efficiency in the institutions, improved fraud risk management in the bank, and improved new customer enrolment in the institutions. …”
    Get full text
    Thesis
  16. 316

    Truffle Species Discrimination Based on Their Chemical Composition, Chromaticity Coordinates and Antioxidant Capacity by Cristina Valencia-Sullca, Anja Rakotondramavo, Catherine Verret, Jean-Philippe Blondeau, Sullivan Renouard

    Published 2024-07-01
    “…This therefore leads to high risk of fraud. To prevent these frauds, this study proposes to explore the chemical composition and antioxidant capacity to discriminate the six-truffle species encountered in France. …”
    Get full text
    Article
  17. 317

    Feasibility Study of the Use of Handheld NIR Spectrometer for Simultaneous Authentication and Quantification of Quality Parameters in Intact Pineapple Fruits by Charles L. Y. Amuah, Ernest Teye, Francis Padi Lamptey, Kwasi Nyandey, Jerry Opoku-Ansah, Peter Osei-Wusu Adueming

    Published 2019-01-01
    “…The results generally indicated that portable NIR spectrometer coupled with the appropriate chemometric tools could be employed for rapid nondestructive examination of pineapple quality and also to detect pineapple fraud due to mislabeling of conventionally produced fruits as organic ones. …”
    Get full text
    Article
  18. 318

    Optimized Identification of Sentence-Level Multiclass Events on Urdu-Language-Text Using Machine Learning Techniques by Somia Ali, Uzma Jamil, Muhammad Younas, Bushra Zafar, Muhammad Kashif Hanif

    Published 2025-01-01
    “…We used sentence-level classification to categorize sentences including terrorist attacks, national news, sports, entertainment, politics, safety, earthquakes, fraud and corruption, sexual assault, weather, accidents, forces, inflation, murder and death, education, and international news. …”
    Get full text
    Article
  19. 319

    Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain by Suthir Sriram, P. R. Tharaniesh, Priyanka Saraf, Nivethitha Vijayaraj, Thangavel Murugan

    Published 2025-01-01
    “…This paper introduces a blockchain-based event management system that leverages Sui blockchain technology to address critical challenges such as ticket fraud, data security, and high transaction fees, which are prevalent in traditional event management systems. …”
    Get full text
    Article
  20. 320

    Akuisisi Bukti Digital Tiktok Berbasis Android Menggunakan Metode National Institute of Justice by Fitri Anggraini, Herman Herman, Anton Yudhana

    Published 2023-03-01
    “…Social media has a very positive impact on the general public such as easy access to information and access to the times, however it is possible that social media can have negative effects such as cyberbullying, fraud, threats, and defamation. The TikTok application is the most downloaded social media according to We Are Social and Hootsuite in January 2022 and the TikTok application is vulnerable to causing crimes of defamation, and threats. …”
    Get full text
    Article