نتایج جستجو برای: fraud

تعداد نتایج: 8526  

2010
Heith Copes Kent R. Kerley Rodney Huff John Kane

Despite the widespread attention given to identity theft, there is much confusion on how best to define and measure it. Recent attempts to measure its extent through victimization surveys or law enforcement files have varied considerably in the types of crimes included as identity theft. Some studies include credit card fraud, while others exclude it. This inconsistency in data collection has m...

2010
Peter Kiernan

The Serious Fraud Office investigates and prosecutes fraud, nothing else. As is the case in many countries, the United Kingdom has a number of organisations that investigate or prosecute criminal conduct. Indeed, there are many organisations in the United Kingdom that investigate or prosecute fraud. However, for the vast majority of these organisations, the investigation or prosecution of fraud...

2010
Mohammad Behdad Tim French Luigi Barone Mohammed Bennamoun

Fraud is a serious problem that costs the worldwide economy trillions of dollars annually. However, fraud detection is di cult as perpetrators actively attempt to masquerade their actions, among typically overwhelming large volumes of, legitimate activity. In this paper, we investigate the fraud detection problem and examine how learning classi er systems can be applied to it. We describe the c...

2014
K. R. Seeja Masoumeh Zareapoor

This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incomin...

2012
Lei Gao Rajendra P. Srivastava

This study investigates the process of perpetration and concealment of management fraud in financial statements. First, we argue that fraud schemes consist of two components: “account schemes” and “evidence schemes.” Account schemes are the schemes through which management perpetrates fraud by manipulating account balances or disclosures. Evidence schemes are the schemes through which managemen...

2014
James T. Graves Alessandro Acquisti Nicolas Christin

Credit card issuers face a choice when card data has been exposed in a data breach but has not yet been used for attempted fraud: reissue the cards or wait until fraud is attempted. This article empirically investigates the first-order public and private costs and benefits of each of these options. Based on extrapolations of the total number of credit card records exposed in data breaches, the ...

2011
Pooja Sachdeva Sangeeta Behl

Data mining is a combination of database and artificial intelligence technologies. It is a process of identifying and extracting patterns from data, particularly from very large and/or complex sets of data. The major focus of machine learning research is to automatically learn to recognize complex patterns and make intelligent decisions based on data. Data mining and Machine Learning is a relat...

2011
Andrew Clausen

November 15, 2011 In many moral hazard problems, an agent may manipulate the information that the principal observes. This type of fraud has attracted widespread attention in executive performance pay manipulation and public medical insurance fraud. However, fraud is possible but conspicuously absent in many other markets. For example, websites may defraud advertisers by inserting fake clicks o...

Journal: :journal of food quality and hazards control 0
s. azadmard-damirchi [email protected] m. torbati department of food science and technology, faculty of nutrition, tabriz university of medical sciences, tabriz, iran

vegetable oils and fats have a big contribution in our diet as cooking or frying oil, salad oil or in food products formulation. they are important from nutritional and economical point of views. their authenticity is a serious issue since old time. some edible oils and fats such as olive oil, cocoa butter and milk fat are so expensive which makes tempting to adulterate them with other lower pr...

2008
Rodger Jamieson Donald Winchester Gregory Stephens Stephen Smith

This paper addresses three main areas and develops a conceptual framework for identity fraud profiling. First, we identify the main contemporary profiling methods that are crime and/or business based. Second, accepting the current information systems (IS) facilitated attack channels and methods used by identity crime perpetrators (Jamieson & Stephens & Winchester 2007), we investigate how to be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید