نتایج جستجو برای: food fraud
تعداد نتایج: 278983 فیلتر نتایج به سال:
Purpose – The purpose of this study is to examine the extent to which accountants, internal auditors, and certified fraud examiners use fraud prevention and detection methods, and their perceptions regarding the effectiveness of these methods. Design/methodology/approach – A survey was administered to 86 accountants, internal auditors and certified fraud examiners. Findings – The results indica...
Article history: Received 26 May 2011 Received in revised form 5 March 2012 Accepted 6 March 2012 Current auditing standards require auditors to conduct a fraud brainstorming session aimed at considering ways in which the audit client's financial statements might be fraudulently misstated. Lynch et al. (2009) document that computer-mediated fraud brainstorming is significantly more effective th...
INTRODUCTION The 2008 Report to the Nation issued by the Association of Certified Fraud Examiners indicated that U.S. organizations lose almost 7 percent of their revenue to fraud, and that the Gross Domestic Product (GDP)-based annual fraud estimate for the United States alone was $994 billion (ACFE, 2008). Of course, we all now recognize that the scourge of fraud is a global phenomenon that e...
We expand accounting research on fraud by categorizing and analyzing fraudulent acts in virtual worlds. Virtual worlds are computer-generated, immersive environments where players control a character, an avatar, to interact with others online while engaging in social, entertainment, educational, and commercial endeavors. Virtual worlds include unique capabilities such as anonymous interaction t...
Most research on Internet auction fraud focuses exclusively on the relationship between the con-artist and victim. However, the con-artist and victim are situated in an ecology comprising the auction house, police, and auction community. This paper employs the ‘parasite’ metaphor as a way of building theory about Internet auction fraud. We begin by describing the parasite metaphor. We then intr...
We describe a common but poorly known type of fraud – so-called liar buyer fraud – and explain why traditional anti-fraud technology has failed to curb this problem. We then introduce a counter-intuitive technique based on user interface modification to address liar-buyer fraud, and report result of experiments supporting that our technique has the potential of dramatically reducing fraud losse...
One method for detecting fraud is to check for suspicious changes in user behavior over time. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining and machine learning techniques. It uses a rule-learning program to uncover indicators of fraudulent behavior from a large database customer transactions. Then the indic...
Phishing attack is used to steal confidential information of user. Fraud websites appear similar to genuine websites with the logo and graphics of trusted website. Fraud Website Detection application aims to detect fraud websites using data mining techniques. This project provides intelligent solution to phishing attack. W3C standard defines characteristics which can be used to distinguish frau...
It is estimated that between $600 and $850 billion annually is lost to fraud, waste, and abuse in the US healthcare system, with $125 to $175 billion of this due to fraudulent activity (Kelley 2009). Medicaid, a state-run, federally-matched government program which accounts for roughly one-quarter of all healthcare expenses in the US, has been particularly susceptible targets for fraud in recen...
The amount of online transactions is growing these days to a large number. A big portion of these transactions contains credit card transactions. The growth of online fraud, on the other hand, is notable, which is generally a result of ease of access to edge technology for everyone. There has been research done on many models and methods for credit card fraud prevention and detection. Artificia...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید