نتایج جستجو برای: academic fraud
تعداد نتایج: 157610 فیلتر نتایج به سال:
Telecom providers are losing tremendous amounts of money due to fraud risks posed to Telecom services and products. Currently, they are mainly focusing on fraud detection approaches to reduce the impact of fraud risks against their services. However, fraud prevention approaches should also be investigated in order to further reduce fraud risks and improve the revenue of Telecom providers. Fraud...
Although medical centres have established boards, special committees, and offices for the review and redress of breaches in ethical behaviour, these mechanisms repeatedly prove themselves ineffective in addressing research misconduct within the institutions of academic medicine. As the authors see it, institutional design: (1) systematically ignores serious ethical problems, (2) makes whistlebl...
Previous studies on mobile ad fraud detection are limited to detecting certain types of ad fraud (e.g., placement fraud and click fraud). Dynamic interactive ad fraud has never been explored by previous work. In this paper, we propose an explorative study of ad fraud in Android apps. We first created a taxonomy of existing mobile ad fraud. Besides static placement fraud, we also created a new c...
Insurance fraud costs the property and casualty insurance industry over 25 billion dollars (USD) annually. This paper addresses workers' compensation claim fraud. A data mining approach is adopted, and issues of data preparation are discussed. The focus is on building predictive models to score an open claim for a propensity to be fraudulent. A key component to modeling is the use of textual da...
This paper analyzes a firm’s propensity to commit securities fraud and the real consequences of fraud. The theory shows that fraud has real economic cost, as investment distortions can arise from fraud-induced market misvaluation and management’s ability to influence the firm’s litigation risk through investment. The cost of inefficiency is borne by not only shareholders of fraudulent firms but...
this studyinvestigated therelations between examinees’ academic knowledge and theirperformanceonreading section of ielts and toefl (ibt) through using generalizabilitytheory. g-theory was utilized to investigate the effects of subtest, test items, participants and academic background on the reliability of ielts and toefl (ibt) score. tosamplethe subjectsofthissurvey,a placement testwasadministe...
Fraud is an unauthorized activity taking place in electronic payments systems, but these are treated as illegal activities. Fraud detection methods are continuously developed to defend criminals in adapting to their strategies. Fraud can be identified quickly and easily through fraud detection techniques. In this paper, clustering approach is used for credit card fraud detection. Data is genera...
Under the CEC’s ACTS’ programme, the collaborative R&D project ASPeCT2 was set up to look at the problems and possible solutions for security in future mobile telecommunications systems to follow on from GSM. The project consortium consisted of Network Operators (Vodafone, Panafon), equipment suppliers (Siemens ATEA, Siemens AG, Giesecke and Devrient) and academic institutions (Royal Holloway, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید