Showing 161 - 180 results of 358 for search '"fraud"', query time: 0.10s Refine Results
  1. 161

    Victimization analysis model of user network behavior based on network traffic by Shengli ZHOU, Xiaoyang XU

    Published 2021-02-01
    “…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
    Get full text
    Article
  2. 162
  3. 163

    Comparison of Attenuated Total Reflectance Mid-Infrared, Near Infrared, and 1H-Nuclear Magnetic Resonance Spectroscopies for the Determination of Coffee’s Geographical Origin by Jessica Medina, Diana Caro Rodríguez, Victoria A. Arana, Andrés Bernal, Pierre Esseiva, Julien Wist

    Published 2017-01-01
    “…This raises the threat of fraud by adulteration using coffee grains from other countries, thus creating a demand for robust and cost-effective methods for the determination of geographical origin of coffee samples. …”
    Get full text
    Article
  4. 164

    Measuring postal access and direct delivery services among Native American reservations in Montana and South Dakota by Ryan Weichelt

    Published 2024-12-01
    “…In recent years, many states have passed laws to limit the scope of absentee voting as necessary to curtail voter fraud. Though no evidence exists that fraud is more likely with mail-in voting, such laws have been found to have a disproportionate impact on some groups of voters more than others. …”
    Get full text
    Article
  5. 165

    Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions by R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Chithirai Pon Selvan, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2025-01-01
    “…The Real-time analysis of the transactions can be done with CNNs to detect fraud. Streaming transaction data is analyzed by CNNs leveraging the privacy-preserving global model and producing immediate alerts and actions for detected fraud. …”
    Get full text
    Article
  6. 166

    Internal Control and Budget Implementation in Kabale District Uganda by Eton, Marus, Caroline Murezi, Fabian, Mwosi, Benard, Patrick Ogwel

    Published 2019
    “…The study revealed that Kabale district local government had the internal controls systems mechanisms to manage risks but the actual management of risks and fraud was indeed very weak. Segregation of duties and periodical evaluation of staff were low. …”
    Get full text
    Article
  7. 167

    Application of generative adversarial networks for financial data by CUI Yihao, LIU Sen, YE Guangnan

    Published 2024-06-01
    “…The application practice of the GAN model in generating financial tabular data, generating financial time series, and financial fraud detection, as well as other financial data fields, was explored. …”
    Get full text
    Article
  8. 168

    Acumulação primitiva: um processo atuante na sociedade contemporânea by Sandra Lencioni

    Published 2012-03-01
    “…The second part discusses about the primitive accumulation of today, repeating the fraud, the theft and the violence, that were presents in the moment of the genesis of capitalism. …”
    Get full text
    Article
  9. 169

    Phishing detection algorithm based on attention and feature fusion by ZHANG Sirui, YAN Zhiwei, DONG Kejun, YUCHI Xuebiao

    Published 2024-08-01
    “…Phishing has been the primary means utilized by attackers to conduct cyber fraud. As national anti-cyber fraud efforts continue to increase, the technical confrontation of various phishing activities has also escalated, bringing significant pressure to phishing detection work. …”
    Get full text
    Article
  10. 170

    Notary independence in the course of notarial acts by M. Ye. Vasylenko

    Published 2023-07-01
    “…This, in turn, ensures the reliability and legitimacy of transactions concluded between the parties and helps to prevent attempts at fraud and manipulation of documents. It has been generalised that ensuring the appropriate level of notary independence in the course of notarial acts is important: firstly, for notaries themselves, since in this case they are able to perform their activities free from any influence, which is an additional guarantee of ensuring the regime of legality in their work; secondly, for users of notaries’ services, since notary independence is a guarantee of observance of the rights and freedoms of individuals and legal entities, and is also a preventive measure against any unlawful acts (fraud, document forgery, etc.).…”
    Get full text
    Article
  11. 171

    Survey on Ethereum phishing detection technology by Zhao CAI, Tao JING, Shuang REN

    Published 2023-04-01
    “…With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high degree of deception and concealment, causing significant losses to both users and businesses.Ethereum platform, with its smart contract functionality, has attracted many crypto currency investors.However, this widespread popularity has also attracted an influx of criminals, leading to the rise of cybercrime activities.Among them, phishing scams are one of the main forms of fraud on the Ethereum platform.To tackle this issue, researchers have developed Ethereum network phishing identification technology, achieving significant progress in this field.However, there has been relatively little systematic analysis and summary of these research results.The current state of phishing fraud on the Ethereum network was analyzed.Moreover, a comprehensive summary of existing phishing detection datasets and evaluation metrics were provided.On this basis, methods for detecting phishing on Ethereum were reviewed, including those based on transaction information, graph embedding and graph neural networks.Transaction information-based methods are the most common, analyzing information such as input and output addresses and amounts in transaction data to determine whether a transaction is abnormal.Methods based on graph embedding and graph neural networks place more emphasis on analyzing the entire transaction network, constructing a graph structure to analyze the relationships between nodes, and more accurately identifying phishing attacks.In addition, a comparative analysis of the advantages and disadvantages of various methods was conducted, explaining the applicability and limitations of each method.Finally, the challenges facing Ethereum phishing detection were pointed out, and the future research trends for Ethereum phishing detection were predicted.…”
    Get full text
    Article
  12. 172

    Saunders Medical Office Management / by Andress, Alice Anne

    Published 2009
    Table of Contents: “…The health care professional -- Personnel management -- The front office -- Written communication -- Medical record -- Billing, coding, and collections -- Fraud, abuse, and compliance -- Documentation and risk assessment -- Ethical and legal issues -- Health care technology -- Safety and health -- Responsibilities of the manager -- Outpatient services, ambulatory surgery centers, and hospitals -- The financial side -- Medical marketing.…”
    Table of contents only
    View in OPAC
    Book
  13. 173

    Cases and materials on criminal law / by Dine, Janet

    Published 2011
    Table of Contents: “…Crime, punishment and human rights -- The conduct component of crime : Actus Reus -- The mental component of crime : Mens Rea -- Homicide -- Non-fatal offences against the person -- Sexual offences -- Property offences -- Fraud and making-off without payment -- The principle of capacity -- Defences -- European criminal law -- Encouragement, assistance, conspiracy and attempt -- Parties to crime.…”
    View in OPAC
    Book
  14. 174

    Digital Financial Literacy and Life Satisfaction: Evidence from South Korea by Youngjoo Choung, Tae-Young Pak, Swarn Chatterjee

    Published 2025-01-01
    “…The results showed a significant association between digital financial literacy and life satisfaction, with self-protection against fraud being the most influential subdimension. Notably, financial knowledge was not associated with life satisfaction when other dimensions of digital financial literacy were independently included in the regression models. …”
    Get full text
    Article
  15. 175

    FEAR AND FEELING OF INSECURITY IN HOTELS AND HOST COMMUNITIES, IBADAN, NIGERIA by Gbenga John OLADEHINDE, Adeola Francisca OLADELE, Lateef Adeleke ADENIYI, Olubunmi Lukman LAWAL

    Published 2024-04-01
    “…The result showed that theft, fraud, robbery sexual abuse, and burglary were the most frequently worried crime in the hotel industry while robbery, theft, fraud, burglary, and sexual abuse were highly worried among the residents of host communities. …”
    Get full text
    Article
  16. 176

    Fengsel eller frihet: Noe om reaksjonsvalg i norsk strafferett by Morten Holmboe

    Published 2016-05-01
    “…Nonetheless, general deterrence has been given different weight in comparable areas, e.g. fraud against insurance companies versus fraud against the social services. …”
    Get full text
    Article
  17. 177

    Become Captain of Your Financial Ship, Unit 4: Stay the Course by Josephine Turner

    Published 2007-01-01
    “…It includes a slide presentation and information on consumer protection and regulations, such as those relating to credit identify theft and protection against consumer fraud, as well as information on garage sales, store sales, and warranties. …”
    Get full text
    Article
  18. 178

    Theory, application fields and challenge of the blockchain technology by Dong LI, Jinwu WEI

    Published 2016-12-01
    “…Blockchain technology has gradually caught attention of the public, causing widespread concern and discussion in the world with the features of distributed, decentralized and non fraud. The working theory of the blockchain and its application in the field of finance and non-finance were described. …”
    Get full text
    Article
  19. 179

    Become Captain of Your Financial Ship, Unit 4: Stay the Course by Josephine Turner

    Published 2007-01-01
    “…It includes a slide presentation and information on consumer protection and regulations, such as those relating to credit identify theft and protection against consumer fraud, as well as information on garage sales, store sales, and warranties. …”
    Get full text
    Article
  20. 180

    ادمان شبکة الانترنت وأضرارها الصحیة والنفسیة والاجتماعیة على طلاب المدارس الثانویة بمدینة شبین الکوم بمحافظة المنوفیة... by د. میرفت مفید عبد الستار

    Published 2020-01-01
    “…The most important results and recommendationsreached by the researcher through the field study in public secondary schools inShebin El-Kom city, Monofiya governorate, Egypt.The Results of the studyThe researcher reached many results as follows:-1. 1-The main causes of addiction to the students of secondary education forthe Internet Monofiya, the following respectively: entertainment and play,lack of control parents to me, a sense of vacuum time, ease of dealingwith others through the Internet, sense of comfort while using the Internet,to escape from the responsibility to study and study, not My interest onthe part of the family and the community around me, to escape from myproblems surrounding the family, rather than going out2. 2- The largest percentage of students addicted to the Internet in the agegroup of 16 years reached 102 respondents, representing 56.7% of thetotal male and female population in the study sample.3. .3- The most important negative aspects of the internet came between hisstudents and secondary education students in Monofiya, respectively:lack of supervision, porn sites, addiction to sit for long periods, violation ofrights, falling into unknown relationships, exposure to fraud and fraud.4. 4- came the most important health damage caused by Internet addictionamong education students secondary Monofiya: pain the eyes of the mostdifficult and the most first health damage caused by the use of the Internetamong students at a percentage of 60.5%, followed by insomnia andsleep deprivation, a percentage of 50.4%, followed by fatigue and fatigueby 49.7 %, mother bone by 45.7%, and diseases of the brain and nerves30.2%, heart disease by 22.7%, and finally skin diseases by 21.5% of thetotal sample.…”
    Get full text
    Article