نتایج جستجو برای: fraud predictors
تعداد نتایج: 110487 فیلتر نتایج به سال:
Since the evolution of the internet, many small and large companies have moved their businesses to the internet to provide services to customers worldwide. Cyber credit‐card fraud or no card present fraud is increasingly rampant in the recent years for the reason that the credit‐card i s majorly used to request payments by these companies on the internet. Therefore the need to ensure secured tr...
As the usage of credit card has increased the credit card fraud has also increased dramatically. Existing fraud detection techniques are not capable to detect fraud at the time when transaction is in progress. Improvement in existing fraud detection is necessary. In this paper Hidden Markov model is used to detect the fraud when transaction is in progress. Here is shown that hidden markov model...
Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few designs have been proposed and implemented. Currently, the most efficient implementation of distance bounding protocols uses analog processing and enables the prover to receive a message, process it and transmit the reply within 1 ns...
With the developments in the information technology, fraud is spreading all over the world, resulting in huge financial losses. Though fraud prevention mechanisms such as CHIP&PIN are developed for credit card systems, these mechanisms do not prevent the most common fraud types such as fraudulent credit card usages over virtual POS (Point Of Sale) terminals or mail orders so called online credi...
Fraud scandals can create incentives to change managers in an attempt to improve the firm’s performance, recover lost reputational capital, or limit the firm’s exposure to liabilities that arise from the fraud. It also is possible that the revelation of fraud creates incentives to change the composition of the firm’s board, to improve the external monitoring of managers, or to rent new director...
This study investigates the nature and extent to which managerial attitudes influence fraud risk perceptions, observations and experiences of audit partners. Using a sample of 5,603 client acceptance and audit continuance assessments at a Big Four audit firm in the Netherlands, this study finds that: (1) manager integrity, honesty, and ethics are considered by audit partners to be of highest im...
A fraud survey found that 75 percent of the 459 responding organizations experienced some form of fraud during the prior 12 month period [1]. The Association of Certified Fraud Examiners (ACFE) estimates 6 percent of revenues are lost due to theft by employees and that small businesses suffer disproportionate losses because of limited resources devoted to fraud detection [2]. Most employee thef...
We analyze the strategic decision of firms to voluntarily certify corporate social responsibility (CSR) practices in a context where other firms can falsely pretend to be socially responsible. Equilibrium outcomes are crucially determined by consumers' beliefs about the credibility of firms' CSR claims, which depend in turn on the (expected) fines for fraud. First, we show that an increase in s...
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, maa fraud and terrorist fraud attacks. Reid et al. proposed the rst symmetric key distance bounding protocol against maa and terrorist fraud attacks [1]. However, [2] claims that this is only achieved with a (7/8) probability of success for maa fraud, rather than the theoretical value...
The Fraud Bill, which received Royal Assent on 8 November 2006, created an offence of fraud in English criminal law which marks a departure of utmost significance from the approach adopted hitherto, whereby a number of related offences cover behaviour deemed to amount to fraud. To mark the passage of the Fraud Act 2006 into law, this article examines the references which were made during its co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید