Showing 321 - 340 results of 358 for search '"fraud"', query time: 0.07s Refine Results
  1. 321
  2. 322

    Rancang Bangun Sistem Try Out Berbasis Paperless untuk Evaluasi Hasil Belajar Siswa dengan MVC by Ramadhan Rakhmat Sani, Defri Kurniawan

    Published 2019-05-01
    “…So as to provide benefits in time and cost efficiency, reduce fraud and accelerate the evaluation process. The method used in the development of this application uses Rapid Application Development (RAD) which includes the stages of software requirements analysis, software design, software implementation and software testing with the application of the concept of System Development Life Cycle (SDLC) so that it is quickly evaluated by users. …”
    Get full text
    Article
  3. 323

    Design and Validation of Policy Making Model with Open Government Approach by Zahra Mohammadi, Abdolmajid Imani, Farahnaz Ahang

    Published 2024-06-01
    “…The beneficial consequences of implementing open government in higher education were evident in improved organizational accountability across organizational, legal, and professional domains, enhanced organizational performance including better social, economic, and innovative outcomes, and a reduction in academic corruption, which includes a decrease in data falsification, fraud, and other violations. Conclusion The study conclusively found that the antecedents of open government have a positive and significant impact on the implementation of open government initiatives. …”
    Get full text
    Article
  4. 324

    Digitalisasi Model Sistem Akuntansi Terintegrasi Bagi Usaha Bersama Simpan Pinjam di Kota Kupang by Yustina Alfira Nay, Selfiana Goetha, Maria Goreti Malut

    Published 2024-08-01
    “…Abtsract   Many people in East Nusa Tenggara (NTT) Province are not yet literate in financial digitalization or even traditional accounting systems, making them vulnerable to loan shark fraud, online loans, and bankruptcy caused by poor financial administration. …”
    Get full text
    Article
  5. 325

    Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA by Rahmat - Budiarto, Yanif Dwi Kuntjoro

    Published 2023-12-01
    “…Abstract Compared to other countries in the world, the level of cyber resilience in Indonesia is low as evidenced by the number of cybercrimes that occur, such as data and identity theft, fraud, and hacking of websites of government and private institutions that involve full or partial insider roles. …”
    Get full text
    Article
  6. 326

    The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation by mohammadsadegh aminipoor, HamidReza GholamniaRoshan, azadeh kiapour, Iman Dadashi

    Published 2024-09-01
    “…These features can reduce the risks associated with fraud, theft and unauthorized changes. Flexibility: Due to its distinctive method and technology, blockchain provides high flexibility against changes and organizational needs. …”
    Get full text
    Article
  7. 327

    Modeling the relationship between the moral charter derived from Islamic teachings and performance with the mediating variable of employees' perception by leila jahantigh, Abbas Babaeenezhad, Mohsen Zayandehroudi, saeed sayadi

    Published 2024-11-01
    “…One of the most common employee problems and issues that the management is widely faced with is dishonesty and fraud at work. Research shows that 90% of employees are dismissed due to theft and 88% of them are dismissed due to lying. …”
    Get full text
    Article
  8. 328

    Explaining the model of value creation of tax income and gross domestic product based on tax system reforms by Bahram Ramazani, Mojtaba Malekichoobari, Sina Kheradyar

    Published 2024-09-01
    “…Also, with the improvement of the tax transfer system and the progressive reduction of heavy tax effects, the incentives for tax fraud will decrease and public trust in the tax system will increase. …”
    Get full text
    Article
  9. 329

    Designing the strategic model of online banking relational marketing in the fourth industrial revolution with the foundation's data approach. by Aliasghar Atarodi, arezo ahmadi danyali, nader gharib nawaz

    Published 2025-03-01
    “…Mohammadi fateh et al, (2022) showed that the technologies of the fourth industrial revolution are big data, biological identification system, fraud detection technologies, contactless ATM, data mining, cloud computing, marketing, versatile channel, artificial intelligence, fintech, biometrics, blockchain, intelligent social networks, artificial neural networks, remote monitoring technologies, commercial Internet of Things, and digital account, respectively. …”
    Get full text
    Article
  10. 330

    Presenting the evaluation model of financial technology policies in National Bank of Iran by Vahid moradi, changiz mohammadi zadeh, ali farhadi mahali

    Published 2024-09-01
    “…However, with the advantages come disadvantages such as increased reliance on technology, high costs, increased job losses, data security risks and fraud, etc. The use of emerging technology and collaboration between fintech companies and banks can improve the financial stability of the entire system while minimizing the negative externalities of disruption and competition. …”
    Get full text
    Article
  11. 331

    Editorial – Revista Ambiente Contábil – Volume 17 – Número 1 – Ano 2025 (Jan./Jun. 2025) by Prof. Dr. Maurício Corrêa da Silva

    Published 2025-01-01
    “…To explore the types of fraud in financial reports that occur in publicly traded Brazilian companies. …”
    Get full text
    Article
  12. 332

    Lights or Shades? by Zenaida María Sáez

    Published 2009-09-01
    “…Editorial dirigida a combatir el fraude académico.…”
    Get full text
    Article
  13. 333

    Estafas informáticas en una comunidad agrícola del interior de Ecuador by Jairo Mauricio Puetate Paucar, Vanessa Lisseth Montenegro Altamirano, Rene Estalin Portilla Paguay

    Published 2024-12-01
    “…La mayoría de los encuestados, aunque utilizan tecnología en sus actividades diarias, no saben cómo prevenir fraudes, lo que pone en riesgo tanto sus datos personales como su economía. …”
    Get full text
    Article
  14. 334

    El discurso anarquista en dos documentales sobre la Segunda República y la Guerra Civil realizados durante la Transición by Jaime Céspedes

    Published 2015-03-01
    “…This article focuses on two anarchist documentary films about the Second Spanish Republic and the Spanish Civil War released Turing the Transition to democracy: Entre la esperanza y el fraude: España, 1931-1939 (by Cooperativa de Cine Alternativo, 1976) and Por qué perdimos la guerra (by Diego Abad de Santillán, 1978). …”
    Get full text
    Article
  15. 335

    Represión jurisdiccional de la corrupción de directivos esclavos en las empresas del imperio romano (siglo II a. C. – siglo III d. C.) by Guillermo Suárez Blázquez

    Published 2014-01-01
    “…Las fuentes jurídicas y literarias clásicas denuncian la existencia de nume- rosas actividades de corrupción y fraudes en las empresas romanas. Hechos civiles y penales, ex delicto, antijurídicos que eran realizados por la iniciativa de los directivos y de los factores comerciales de las empresas competidoras. …”
    Get full text
    Article
  16. 336

    Political Communication and the Nigerian Democratic Experiment: Critical Insights from Yorùbá Philosophy by Sharon Adetutu Omotoso

    Published 2021-12-01
    “… Nigeria’s political sphere is fraught with violence, electoral frauds, unfulfilled promises and negligence on the part of the ruling class, hence political communication in Nigeria have been faced with hostility from electorates spurred by public distrust of the mass media. …”
    Get full text
    Article
  17. 337

    Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality by Ujam Jaenudin, Elis Anisah Fitriah, Mirna Devi

    Published 2023-12-01
    “…Online identity frauds such as love scams, catfishing, and fake content are associated with the freedom of personalization offered by social media platforms which can lead to deceptive self-presentation behavior and impressions. …”
    Get full text
    Article
  18. 338

    Gestión de recursos humanos y globalización by Williams Aranguren A.

    Published 2006-01-01
    “…No obstante, con frecuencia se presentan diversas manifestaciones definidas por muchos autores como flexibilización, achatamiento, exrternalización, entre otras, las cuales en muchos casos desembocan en fraude laboral. A la gestión de los recursos humanos, partícipe de este proceso, le corresponde implementar los cambios en su materia, aunque probablemente su participación en la toma de decisiones haya sido muy limitada o en el peor de los casos, nula. …”
    Get full text
    Article
  19. 339

    Elecciones bajo sospecha. Análisis de las elecciones generales en Honduras 2017 by Cecilia Graciela Rodríguez

    Published 2019-01-01
    “…Este artículo aborda el último proceso electoral hondureño, iniciado en marzo de 2017 con las Elecciones Primarias y concluido el 26 de noviembre de ese mismo año con las cuestionadas Elecciones Generales que dieron como ganador a Juan Orlando Hernández, candidato por el oficialista Partido Nacional de Honduras (PNH), tras imponerse en las urnas por un estrecho margen de votos que puso en entredicho al Tribunal Supremo Electoral por la sospecha de fraude electoral. Para ello, se mencionan las principales características del sistema de partidos hondureño, se describe el contexto político, social y económico previo a las elecciones, se abordan los procesos electorales acaecidos en 2017, y se analizan sus resultados y las consecuencias de estas para el sistema de partidos. …”
    Get full text
    Article
  20. 340