نتایج جستجو برای: financial fraud detection

تعداد نتایج: 714167  

2009
Xiaoyun He Jaideep Vaidya Basit Shafiq Nabil R. Adam Evimaria Terzi Tyrone Grandison

Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interaction among entities, for example between people or even bank accounts. The need for link discovery arises in many applications including law enforcement, counter-terrorism, social network analysis, intrusion detection, and frau...

Journal: :Inf. Syst. 2014
Giorgia Lodi Leonardo Aniello Giuseppe Antonio Di Luna Roberto Baldoni

Organizations must protect their information systems from a variety of threats. Usually they employ isolated defenses such as firewalls, intrusion detection and fraud monitoring systems, without cooperating with the external world. Organizations belonging to the same markets (e.g., financial organizations, telco providers) typically suffer from the same cyber crimes. Sharing and correlating inf...

Journal: :Decision Support Systems 2011
Wei Zhou Gaurav Kapoor

Available online 24 August 2010

Journal: :The Journal of Social Sciences Research 2018

Journal: :Balance vocation accounting journal 2023

The purpose of this study is to determine the influence diamond fraud elements consisting pressure (which are proxied with financial stability, external pressure, and targets), oppoturnity by nature industry ineffective monitoring), rationalization audit opinions, capability changing directors statements. This research uses a qualitative descriptive method secondary data sources collected throu...

2007
Jeffrey Bardzell Markus Jakobsson Shaowen Bardzell Tyler Pace William Odom Aaron R. Houssian

We survey known security vulnerabilities in Massively Multiplayer Online Games (MMOGs), and describe how these are used to cheat. While such abuse often is aimed at gaining an edge in the game, there is a recent trend of financial fraud in MMOGs. We review common types of online fraud (such as phishing and click-fraud) that we believe increasingly will migrate into the MMOG sphere. We refer to ...

Journal: :International journal of electrical & electronics research 2022

Cyber security comes with a combination of various policies, AI techniques, network technologies that work together to protect computing resources like networks, intelligent programs, and sensitive data from attacks. Nowadays, the shift digital freedom had led opened many new challenges for financial services. Cybercriminals have found ability leverage e- currency exchanges other transactions p...

Journal: :IJAB : Indonesian Journal of Accounting and Business 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید