نتایج جستجو برای: fraud

تعداد نتایج: 8526  

2014
Shivakumar Swamy Sanjeev C. Lingareddy

Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud detection model by using this model. As e-commerce sales continue to grow, the associated online fraud remains an attractive source of revenue for fraudsters. Thes...

2005
Nagpurnanand Prabhala Yue Wang Vojislav Maksimovic

Title of dissertation: Securities Fraud: An Economic Analysis Yue Wang, Doctor of Philosophy, 2005 Dissertation directed by: Professor Lemma Senbet, Professor Nagpurnanand Prabhala Department of Finance This thesis develops an economic analysis of securities fraud. The thesis consists of a theory essay and an empirical essay. In the theory essay, I analyze a firm’s propensity to commit securiti...

Fraud detection is one of the ways to cope with damages associated with fraudulent activities that have become common due to the rapid development of the Internet and electronic business. There is a need to propose methods to detect fraud accurately and fast. To achieve to accuracy, fraud detection methods need to consider both kind of features, features based on user level and features based o...

2002
Richard J. Bolton

Fraud is increasing dramatically with the expansion of modern technology and the global superhighways of communication, resulting in the loss of billions of dollars worldwide each year. Although prevention technologies are the best way of reducing fraud, fraudsters are adaptive and, given time, will usually find ways to circumvent such measures. Methodologies for the detection of fraud are esse...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه قم - دانشکده الهیات و معارف اسلامی 1386

چکیده ندارد.

Journal: :Journal of insurance medicine 1996
M K Sparrow

The study summarized here examined the fraud-control apparatus currently used within the health care industry, and assessed the assumptions, policies, and systems that constitute the industry's current approaches to fraud control. The objective was to develop a better understanding of the strengths and weaknesses of existing approaches. Since 1992, with Health Care Reform under debate, the issu...

Journal: :Clinical gerontologist 2016
Peter Alexander Lichtenberg Michael A Sugarman Daniel Paulson Lisa J Ficker Annalise Rahman-Filipiak

Using cross sectional data Psychological vulnerability was identified as a correlate of older adult's being defrauded. We extend that research by examining fraud prevalence using longitudinal data from the Health and Retirement Study, and to identify the best predictors of fraud longitudinally across a 4-year time frame. Whereas reported fraud prevalence was 5.0% in a 5-year look-back period in...

2011
Sigi Goode David Lacey

Fraud and security continue to be problems for firms. Fraud information is typically incomplete and deliberately obfuscated. These qualities make fraud events harder to detect using conventional security controls. This study uses a knowledge management framework to explore how different types of controls are used to detect and investigate information fraud. The analysis is based on the customer...

2008
Štefan Furlan Marko Bajec

Fraud presents an immense problem for health insurance companies and the only way to fight fraud, is by using specialized fraud management systems. Current research community has focused great efforts on different fraud detection techniques, while neglecting other also important activities of fraud management. We propose a holistic approach that focuses on all 6 activities of fraud management, ...

2003
Lucian Vaisu Matthew Warren David Mackay

Fraud is one of the besetting evils of our time. While less dramatic than crimes of violence like murder or rape, fraud can inflict significant damage at organizational or individual level. Fraud is a concept that seems to have an obvious meaning until we try to define it. As fraud exists in many different guises, and it is necessary to carefully define what it is and to tailor policies and ini...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید