نتایج جستجو برای: academic fraud

تعداد نتایج: 157610  

2010
Ulrich Flegel

In the year 2009 several data privacy scandals have hit the headlines where major corporations had a legitimate need for detecting fraud conducted by their own employees, but chose inappropriate measures for data screening. This contribution presents architectures and pseudonymization technology for privacy compliant fraud screening or fraud detection, in order to reduce the number of undiscove...

2000
Robert Willison

Although computer fraud continues to be a thorn in the side of many organizations, fresh perspectives to addressing this type of crime are rare. This paper advances a preventive approach which reduces those criminal opportunities that permit computer fraud to take place. The construction of crime specific opportunity structures, which enable the relevant parties to conceptualize the fraud envir...

2013
John Akhilomen

Since the evolution of the internet, many small and large companies have moved their businesses to the internet to provide services to customers worldwide. Cyber credit‐card fraud or no card present fraud is increasingly rampant in the recent years for the reason that the credit‐card i s majorly used to request payments by these companies on the internet. Therefore the need to ensure secured tr...

2014
Twinkle Patel

As the usage of credit card has increased the credit card fraud has also increased dramatically. Existing fraud detection techniques are not capable to detect fraud at the time when transaction is in progress. Improvement in existing fraud detection is necessary. In this paper Hidden Markov model is used to detect the fraud when transaction is in progress. Here is shown that hidden markov model...

2012
Aanjhan Ranganathan Nils Ole Tippenhauer Boris Skoric Dave Singelée Srdjan Capkun

Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few designs have been proposed and implemented. Currently, the most efficient implementation of distance bounding protocols uses analog processing and enables the prover to receive a message, process it and transmit the reply within 1 ns...

Journal: :Expert Syst. Appl. 2013
Yusuf Sahin Serol Bulkan Ekrem Duman

With the developments in the information technology, fraud is spreading all over the world, resulting in huge financial losses. Though fraud prevention mechanisms such as CHIP&PIN are developed for credit card systems, these mechanisms do not prevent the most common fraud types such as fraudulent credit card usages over virtual POS (Point Of Sale) terminals or mail orders so called online credi...

2003
Jiwei Wang K. A. Farrell K.A R. Parrino

Fraud scandals can create incentives to change managers in an attempt to improve the firm’s performance, recover lost reputational capital, or limit the firm’s exposure to liabilities that arise from the fraud. It also is possible that the revelation of fraud creates incentives to change the composition of the firm’s board, to improve the external monitoring of managers, or to rent new director...

2007
Jose R Hernandez Tom Groot

This study investigates the nature and extent to which managerial attitudes influence fraud risk perceptions, observations and experiences of audit partners. Using a sample of 5,603 client acceptance and audit continuance assessments at a Big Four audit firm in the Netherlands, this study finds that: (1) manager integrity, honesty, and ethics are considered by audit partners to be of highest im...

2013

A fraud survey found that 75 percent of the 459 responding organizations experienced some form of fraud during the prior 12 month period [1]. The Association of Certified Fraud Examiners (ACFE) estimates 6 percent of revenues are lost due to theft by employees and that small businesses suffer disproportionate losses because of limited resources devoted to fraud detection [2]. Most employee thef...

Journal: :J. Parallel Distrib. Comput. 2001
Peter Burge John Shawe-Taylor

This paper discusses the current status of research on fraud detection undertaken as part of the European Commission-funded ACTS ASPeCT (Advanced Security for Personal Communications Technologies) project, by Royal Holloway University of London. Using a recurrent neural network technique, we uniformly distribute prototypes over toll tickets, sampled from the U.K. network operator, Vodafone. The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید