-
141
Strategic business movements? The migration of online romance fraudsters from Nigeria to Ghana
Published 2025-03-01Subjects: “…Online romance fraud…”
Get full text
Article -
142
ASAD: A Meta Learning-Based Auto-Selective Approach and Tool for Anomaly Detection
Published 2025-01-01Subjects: Get full text
Article -
143
Banking Cybercrime as One of the Main Problems of Modern Society
Published 2021-04-01Subjects: Get full text
Article -
144
ESTUDIO COMPARADO EN LA PROTECCIÓN PENAL DE LOS INGRESOS AL ESTADO
Published 2018-01-01Subjects: Get full text
Article -
145
Drawing on social approval as a linguistic strategy: A discourse semantic analysis of judgement evaluation in suspected online romance scammer dating profiles
Published 2024-01-01Subjects: “…online romance fraud…”
Get full text
Article -
146
Data mining approach in detecting inaccurate financial statements in government-owned enterprises
Published 2025-01-01Subjects: Get full text
Article -
147
A problem-agnostic approach to feature selection and analysis using SHAP
Published 2025-01-01Subjects: Get full text
Article -
148
THE EXPERIENCE OF COMBATING THE SHADOW ECONOMY IN THE EUROPEAN COUNTRIES
Published 2018-01-01Subjects: Get full text
Article -
149
Muhâsebede Hata ve Hilelerin Önlenmesinde Mali Hizmet Çalışanlarının Sorumluluğunun Tespitine Yönelik Bir Araştırma
Published 2021-11-01Subjects: Get full text
Article -
150
İHMALİ HAREKETLERLE İŞLENEN DOLANDIRICILIK SUÇUNUN CEZALANDIRILMASI SORUNU
Published 2025-01-01Subjects: “…fraud…”
Get full text
Article -
151
FORMATION AND DEVELOPMENT OF CONSTITUTIONAL BASIS FINANCIAL LAW OF TUNISIA
Published 2014-06-01Subjects: Get full text
Article -
152
Imitations in Higher Education as a Social Problem
Published 2021-06-01Subjects: Get full text
Article -
153
-
154
ANTICORRUPTION POLICY IN HIGHER EDUCATION AND NEW ACADEMIC ETHICS
Published 2016-12-01Subjects: Get full text
Article -
155
İkna Yoluyla Dolandırıcılık: Dolandırıcılık Faaliyetlerinde İkna ve Etkili İletişim Yöntemlerinin Tespiti Üzerine Bir Araştırma
Published 2020-06-01Subjects: “…fraud by persuasion…”
Get full text
Article -
156
AYNÎ HAK SAHİBİ OLMAYAN SATICI VEYA SAĞLAYICININ TÜKETİCİYE DEVRE TATİL SÖZLEŞMESİ SATMASI SUÇU
Published 2025-01-01Subjects: Get full text
Article -
157
The Risk of Corruption and Money Laundering: An Analysis of Personal Predespositions and Socio-Economic Challenges
Published 2024-12-01“…Using logistic regression (LR), the research found that age and workplace are associated positively to the likelihood of ones to commit to fraud. Elder fraudsters are documented to have 1,72 higher possibility to commit to fraud compared to younger fraudsters. …”
Get full text
Article -
158
Detecting Rug-Pull: Analyzing Smart Contract Backdoor Codes in Ethereum
Published 2025-01-01“…However, the absence of such a certification authority increases the risk of fraud. Rug-pull, a typical form of fraud, involves developers hiding backdoor codes in smart contracts to steal funds under certain conditions, causing significant damage to users. …”
Get full text
Article -
159
An integrated optimization model of network behavior victimization identification based on association rule feature extraction
Published 2023-08-01“…The identification of the risk of network behavior victimization was of great significance for the prevention and warning of telecom network fraud.Insufficient mining of network behavior features and difficulty in determining relationships, an integrated optimization model for network behavior victimization identification based on association rule feature extraction was proposed.The interactive traffic data packets generated when users accessed websites were captured by the model, and the implicit and explicit behavior features in network traffic were extracted.Then, the association rules between features were mined, and the feature sequences were reconstructed using the FP-Growth algorithm.Finally, an analysis model of telecom network fraud victimization based on network traffic analysis was established, combined with the stochastic forest algorithm of particle swarm optimization.The experiments show that compared with general binary classification models, the proposed model has better precision and recall rates and can effectively improve the accuracy of network fraud victimization identification.…”
Get full text
Article -
160
Explainable unsupervised anomaly detection for healthcare insurance data
Published 2025-01-01“…Abstract Background Waste and fraud are important problems for health insurers to deal with. …”
Get full text
Article