نتایج جستجو برای: fraud

تعداد نتایج: 8526  

2012
Rajendra P. Srivastava Theodore J. Mock

The main purpose of this paper is to introduce the Dempster-Shafer theory (“DS” theory) of belief functions for managing uncertainties, specifically in the auditing and information systems domains. We illustrate the use of DS theory by deriving a fraud risk assessment formula for a simplified version of a model developed by Srivastava, Mock, and Turner (2007). In our formulation, fraud risk is ...

2015
James L. Bierstaker Richard G. Brody Carl Pacini

Purpose – The purpose of this study is to examine the extent to which accountants, internal auditors, and certified fraud examiners use fraud prevention and detection methods, and their perceptions regarding the effectiveness of these methods. Design/methodology/approach – A survey was administered to 86 accountants, internal auditors and certified fraud examiners. Findings – The results indica...

2015
Antoinette L. Smith Uday S. Murthy Terry J. Engle

Article history: Received 26 May 2011 Received in revised form 5 March 2012 Accepted 6 March 2012 Current auditing standards require auditors to conduct a fraud brainstorming session aimed at considering ways in which the audit client's financial statements might be fraudulently misstated. Lynch et al. (2009) document that computer-mediated fraud brainstorming is significantly more effective th...

2008
Sridhar Ramamoorti

INTRODUCTION The 2008 Report to the Nation issued by the Association of Certified Fraud Examiners indicated that U.S. organizations lose almost 7 percent of their revenue to fraud, and that the Gross Domestic Product (GDP)-based annual fraud estimate for the United States alone was $994 billion (ACFE, 2008). Of course, we all now recognize that the scourge of fraud is a global phenomenon that e...

2011
William N. Dilla

We expand accounting research on fraud by categorizing and analyzing fraudulent acts in virtual worlds. Virtual worlds are computer-generated, immersive environments where players control a character, an avatar, to interact with others online while engaging in social, entertainment, educational, and commercial endeavors. Virtual worlds include unique capabilities such as anonymous interaction t...

Journal: :Information and Organization 2008
Cecil Eng Huang Chua Jonathan Wareham

Most research on Internet auction fraud focuses exclusively on the relationship between the con-artist and victim. However, the con-artist and victim are situated in an ecology comprising the auction house, police, and auction community. This paper employs the ‘parasite’ metaphor as a way of building theory about Internet auction fraud. We begin by describing the parasite metaphor. We then intr...

2015
Markus Jakobsson Hossein Siadati Mayank Dhiman

We describe a common but poorly known type of fraud – so-called liar buyer fraud – and explain why traditional anti-fraud technology has failed to curb this problem. We then introduce a counter-intuitive technique based on user interface modification to address liar-buyer fraud, and report result of experiments supporting that our technique has the potential of dramatically reducing fraud losse...

2003
Tom Fawcett

One method for detecting fraud is to check for suspicious changes in user behavior over time. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining and machine learning techniques. It uses a rule-learning program to uncover indicators of fraudulent behavior from a large database customer transactions. Then the indic...

2016
Urvashi Prajapati Neha Sangal Deepti Patole

Phishing attack is used to steal confidential information of user. Fraud websites appear similar to genuine websites with the logo and graphics of trusted website. Fraud Website Detection application aims to detect fraud websites using data mining techniques. This project provides intelligent solution to phishing attack. W3C standard defines characteristics which can be used to distinguish frau...

2011
Peter Travaille Roland M. Müller Dallas Thornton Jos van Hillegersberg

It is estimated that between $600 and $850 billion annually is lost to fraud, waste, and abuse in the US healthcare system, with $125 to $175 billion of this due to fraudulent activity (Kelley 2009). Medicaid, a state-run, federally-matched government program which accounts for roughly one-quarter of all healthcare expenses in the US, has been particularly susceptible targets for fraud in recen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید