نتایج جستجو برای: fraud risk components
تعداد نتایج: 1319956 فیلتر نتایج به سال:
It is well-known that criminals have many ways of illegally accessing ATM machines to access the account of legitimate users. In this paper, we briefly provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and justify why the use of biometric should be considered as preventive measure. A prototype of biometric ATM was designed and questionnaires were dis...
Fraud is an unauthorized activity taking place in electronic payments systems, but these are treated as illegal activities. Fraud detection methods are continuously developed to defend criminals in adapting to their strategies. Fraud can be identified quickly and easily through fraud detection techniques. In this paper, clustering approach is used for credit card fraud detection. Data is genera...
In this study, I investigate the economic determinants of firms’ propensity to commit securities fraud and the determinants of fraud detection. The analysis is based on a new handcompiled fraud sample of private securities class action litigation suits filed between 1996 and 2003 involving allegations of accounting irregularities. I use econometric methods to account for the unobservability of ...
Fraud is an unauthorized activity taking place in electronic payments systems, but these are treated as illegal activities. Fraud detection methods are continuously developed to defend criminals in adapting to their strategies. Fraud can be identified quickly and easily through fraud detection techniques. In this paper, clustering approach is used for credit card fraud detection. Data is genera...
it is definitely necessary to understand the concept and behavior of causation of life insurance policies and its determinants for insurance managers, regulators, and customers. for insurance managers, the profitability and liquidity of insurers can be increasingly influenced by the number of causation through costs, adverse selection, and cash surrender values. therefore, causation is a materi...
In distance-bounding protocols, verifiers use a clock to measure the time elapsed in challenge-response rounds, thus upper-bounding their distance to the prover. This should prevent man-in-the-middle (MITM) relay attacks. Distance-bounding protocols may aim to prevent several attacks, amongst which terrorist fraud, where a dishonest prover helps the adversary to authenticate, but without passin...
As technology advances, fraud is becoming increasingly complicated and difficult to detect, especially when individuals collude. Surveys show that the median loss from collusive fraud is much greater than fraud perpetrated by individuals. Despite its prevalence and potentially devastating effects, internal auditors often fail to consider collusion in their fraud assessment and detection efforts...
62 Abstract— With an increase in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection has become an emerging topics of great importance for academics, research and industries. Financial fraud is a deliberate act that is contrary to law, rule or policy with intent to obtain unauthorized financial benefit and intentional misstatements or om...
The majority of the United States health care fraud has been focused on the major public program, Medicare. The yearly financial loss from Medicare fraud has been estimated at about $54 billion. The purpose of this research study was to explore the current state of Medicare fraud in the United States, identify current policies and laws that foster Medicare fraud, and determine the financial imp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید