نتایج جستجو برای: fraud

تعداد نتایج: 8526  

2018
I. O. Alabi R. G. Jimoh

The ubiquitous cases of abnormal transactions with intent to defraud is a global phenomenon. An architecture that enhances fraud detection using a radial basis function network was designed using a supervised data mining technique― radial basis function (RBF) network, interpolation approximation method. Several base models were thus created, and in turn used in aggregation to select the optimum...

2014
Abdikarim Hussein Elmi Roselina Sallehuddin Subariah Ibrahim Azlan Mohd Zain

SIM box fraud is classified as one of the dominant types of fraud instead of subscription and superimposed types of fraud. This fraud activity has been increasing dramatically each year due to the new modern technologies and the global superhighways of communication, resulting the decreasing of the revenue and quality of service in telecommunication providers especially in Africa and Asia. This...

2013
Alexander Dyck Adair Morse Luigi Zingales

We estimate what percentage of firms engage in fraud and the economic cost of fraud. Our estimates are based on detected frauds, and frauds that we infer are started but are not caught. To identify the ‘iceberg’ of undetected fraud we take advantage of an exogenous shock to the incentives for fraud detection: Arthur Andersen’s demise, which forces companies to change auditors. By assuming that ...

2010
Richard Sullivan

The rapid transition to card payments has sparked a search for effective countermeasures to those who exploit card payment security vulnerabilities to commit payment fraud. A review of these vulnerabilities finds that they are tied together by an information-intensive payment approval system. Especially damaging are large data breaches, which are often the result of criminals gathering informat...

2011
Rekha Bhowmik

The paper presents fraud detection method to predict and analyze fraud patterns from data. To generate classifiers, we apply the Naïve Bayesian Classification, and Decision Tree-Based algorithms. A brief description of the algorithm is provided along with its application in detecting fraud. The same data is used for both the techniques. We analyze and interpret the classifier predictions. The m...

2005
William Roberds Charles M. Kahn

The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a des...

2014
KAI WAI HUI CLIVE LENNOX GUOCHANG ZHANG Kevin Chen Tai-Yuan Chen Steve Matsunaga Chul Park Katherine Schipper

This study examines the market valuation of accounting earnings during the period before it is publicly revealed that the earnings are fraudulent. Using both cross-sectional and time-series valuation models, we first find that the market accords less weight to earnings when the accounting numbers are fraudulent. We also show that the market better anticipates the presence of fraud when there is...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2012
Ferric C Fang R Grant Steen Arturo Casadevall

A detailed review of all 2,047 biomedical and life-science research articles indexed by PubMed as retracted on May 3, 2012 revealed that only 21.3% of retractions were attributable to error. In contrast, 67.4% of retractions were attributable to misconduct, including fraud or suspected fraud (43.4%), duplicate publication (14.2%), and plagiarism (9.8%). Incomplete, uninformative or misleading r...

2014
Mona Mohamed Zaki Ali Babis Theodoulidis

The paper proposes a linguistics-based text mining approach to demonstrate the process of extracting financial concepts from the Security Exchange Commission (SEC) litigation releases (LR). The proposed approach presents the extracted information as a knowledge base to be used in market monitoring surveillance systems. Also, it facilitates users’ acquisition, maintenance and access to financial...

Journal: :IACR Cryptology ePrint Archive 2009
Dang Nguyen Duc Kwangjo Kim

In this paper, we propose a grouping-proof protocol for RFID tags based on secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud atttack. Mafia fra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید