Results 61 to 70 of about 139,322 (228)

An Investigation of the Relationship Between Central Bank Unconventional Monetary Policy and Bitcoin Activity

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This article investigates whether the unconventional monetary policy (UMP) measures pursued by the Federal Reserve, the Bank of England, the Bank of Japan, and the European Central Bank since the Global Financial Crisis (GFC) are associated with an appetite for cryptocurrency.
Niamh Wylie, Martha O'Hagan‐Luff
wiley   +1 more source

Credit Card Fraud Detection Using Machine Learning Techniques [PDF]

open access: yes, 2022
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily.
Elhusseny, Nermin Samy   +2 more
core   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Analisis Perilaku Konsumen Dan Keamanan Kartu Kredit Perbankan

open access: yesJurnal Perbankan Syariah, 2020
This paper discusses consumer behavior and banking credit card security. Credit cards are present as one of the non-cash payment methods that simplify business and financial matters so that many consumers use them.
Decky Hendarsyah
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

An Adversary Model of Fraudsters’ Behavior to Improve Oversampling in Credit Card Fraud Detection

open access: yesIEEE Access, 2023
Imbalanced learning jeopardizes the accuracy of traditional classification models, particularly for what concerns the minority class, which is often the class of interest.
Daniele Lunghi   +3 more
doaj   +1 more source

Maintaining consumer confidence in electronic payment mechanisms [PDF]

open access: yes, 2000
Credit card fraud is already a significant factor inhibiting consumer confidence in e-commerce. As more advanced payment systems become common, what legal and technological mechanisms are required to ensure that fraud does not do long-term damage to ...
Brown, I
core  

Ensemble of Example-Dependent Cost-Sensitive Decision Trees [PDF]

open access: yes, 2015
Several real-world classification problems are example-dependent cost-sensitive in nature, where the costs due to misclassification vary between examples and not only within classes.
Aouada, Djamila   +2 more
core   +2 more sources

Contrasts or Carryover? Demands–Capabilities Fit and Task‐Level Intrinsic Motivation Across the Workday

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT In the course of a workday, employees attend to various tasks whose challenge might be equal to, higher than, or lower than employees' present level of capabilities. Moreover, employees encounter these tasks sequentially throughout the day with different levels of prior motivation. Investigating carryover effects in motivation from one task to
Sherry (Qiang) Fu   +4 more
wiley   +1 more source

Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection

open access: yesJournal of Cybersecurity and Privacy
The increasing sophistication of fraud tactics necessitates advanced detection methods to protect financial assets and maintain system integrity. Various approaches based on artificial intelligence have been proposed to identify fraudulent activities ...
Mohammed Tayebi, S. E. Kafhali
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy