نتایج جستجو برای: accounting frauds

تعداد نتایج: 66122  

Decision making process requires information. Accounting is the most important source of information. In 1998, the international federation of accountants issued a statement about the scope and using of accounting. It identified 4 stages for using accounting information: cost determination, planning and financial control, reduction of resources waste and creation the value. This study was desig...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2022

Knowledge of the changing traffic is critical in risk management. Customs offices worldwide have traditionally relied on local resources to accumulate such knowledge and detect tax frauds. This naturally poses countries with weak infrastructure become havens potentially illicit trades. The current paper proposes DAS, a memory bank platform facilitate sharing across multi-national customs admini...

2004
Laurent Bussard Walid Bagga

Real-time frauds can be applied against numerous zero-knowledge or minimal disclosure identification schemes that protect physical services, be it opening a door or verifying attributes of a certified device. In [4], Brands and Chaum proposed distance-bounding protocols to forbid mafia fraud attacks and let the terrorist fraud attack as an open issue. In this paper, we describe an extension of ...

2004
B. Thomas

Fraud is a growing problem experienced by most organisations [1] as well as affecting the general public. Impersonation of an individual, using identity information stolen from them, is the fastest growing crime in the UK [2]. There are also other, very different, kinds of fraud. Some forms of fraud that are often omitted from consideration are research misconduct and plagiarisms, but these are...

2005
Gang Zhao Robert Meersman

This paper discusses methodological strategies for architecting ontologies. The development context is an EC IST project, aimed at the use of ontology to help detect and prevent financial frauds. The ontology engineering in this context faces challenges of the scalability of ontology, its applicability in multiple applications, its semantic consistency and comprehensiveness, among others. The p...

2003
Tommie Singleton Frank Messina

The financial frauds of recent past have created a lot of attention to financial audits and corporate governance. That attention includes the Sarbanes-Oxley Act of 2002. This Act has led to numerous changes in corporate governance. But will the changes affect financial fraud? This research attempts to gather empirical evidence about audit committees, S-OX, and whether the guidelines of S-OX hav...

2011
Sébastien Massoni Wing-Keung Wong

We develop a theoretical basis for integration and segregation of multiple outcomes with underlying S-shaped value functions. Our theoretical findings suggest that Thaler’ principles of mental accounting work as postulated when we deal with events having only positive outcomes (gains) or only negative ones (losses). In the case of ‘mixed’ events with positive and negative outcomes, determining ...

2004
Achim Schaffner

The object of the model ProFarm is the identification of the excellent production scheme in plant production in consideration of local characteristics. First the contribution margin accounting will be calculated based on an estimation of the yield potential. Finally the economically excellent production scheme will be determined on the base of the contribution margin.

Middle East countries have begun to implement economic reforms to stimulate private investment, promote economic growth and support the transition to market economy. Although, it is difficult to define the direct impact of the accounting system reform on economic transformation, as there are many other conditions that have influence on the transition process. However, with the central position ...

2014
Ioana Boureanu Serge Vaudenay

Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so far only two protocols, namely SKI (by Boureanu et al.) and FO (by Fischlin and Onete), offer all-encompassing security guaranties, i.e., resistance to distance-fraud, mafia-fraud, and terrorist-fraud. Matters lik...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید