Results 1 to 10 of about 1,891 (142)

A systematic review of literature on credit card cyber fraud detection using machine and deep learning [PDF]

open access: yesPeerJ Computer Science, 2023
The increasing spread of cyberattacks and crimes makes cyber security a top priority in the banking industry. Credit card cyber fraud is a major security risk worldwide.
Eyad Abdel Latif Marazqah Btoush   +5 more
doaj   +3 more sources

Enhancing credit card fraud detection with a stacking-based hybrid machine learning approach [PDF]

open access: yesPeerJ Computer Science
The swift progression of technology has increased the complexity of cyber fraud, posing an escalating challenge for the banking sector to reliably and efficiently identify fraudulent credit card transactions.
Eyad Abdel Latif Marazqah Btoush   +4 more
doaj   +3 more sources

Dynamic and bibliometric analysis of terms identifying the combating financial and cyber fraud system [PDF]

open access: yesFinancial Markets, Institutions and Risks, 2022
The main purpose of this study is to conduct a dynamic and bibliometric analysis of the main terms that identify the system for combating financial and fraud to identify trends in the formation of social and scientific thought.
Hanna Yarovenko, Marina Rogkova
doaj   +1 more source

The court’s judgment on the true identity of the author responsible for identity fraud and the consequent batch retraction of Iranian’s papers in the journal of diagnostic pathology [PDF]

open access: yesDiagnostic Pathology
This letter concerns retracted papers published in the Journal of Diagnostic Pathology, where my name was misused as the author or corresponding author without my permission or knowledge. Considering that all misconducts were directed by an author during
Aram Mokarizadeh
doaj   +2 more sources

Due diligence in the aspect of countering financial cyber fraud: modeling trends [PDF]

open access: yesЕкономічний вісник Державного вищого навчального закладу Український державний хіміко-технологічний університет, 2023
The article emphasizes that financial cyber frauds pose a significant risk to the financial and economic security and stability of modern business entities.
Tetiana Dotsenko   +2 more
doaj   +1 more source

The Modeling of the Probable Behaviour of Insider Cyber Fraudsters in Banks [PDF]

open access: yesFinancial Markets, Institutions and Risks, 2023
Insider cyber fraud in the banking sector is a serious and complex issue for financial institutions. This form of cyber fraud is particularly insidious due to insiders’ inherent access and knowledge, necessitating banks to implement comprehensive ...
Hanna Yarovenko   +2 more
doaj   +1 more source

Towards a Cyber Resilient Banking System: Effectiveness of Cyber Fraud Risk Management Strategies Adopted by Commercial Banks in Zimbabwe

open access: yesStudies and Scientific Researches: Economics Edition, 2023
The advent of digital financial technology left the business community and its clients celebrating convenient ways of online shopping, paying bills and money transfers.
Bronson Mutanda, Maireva Chrispen
doaj   +3 more sources

CYBER FRAUD PROFILING WITH ROUTINE ACTIVITY THEORY USING DATA MINING TECHNIQUES [PDF]

open access: yesMalaysian Journal of Computing, 2023
Cyber profiling, as one of the supporting parts of digital forensics, is not only used to record and investigate cybercriminal behaviour. It can also be used to profile victim demographics based on victim characteristics.
Sunardi   +2 more
doaj   +1 more source

The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China

open access: yesISPRS International Journal of Geo-Information, 2021
As a typical cybercrime, cyber fraud poses severe threats to civilians’ property safety and social stability. Traditional criminological theories such as routine activity theory focus mainly on the effects of individual characteristics on cybercrime ...
Shuai Chen   +7 more
doaj   +1 more source

Digital Deception: Cyber Fraud and Online Misinformation [PDF]

open access: yesIT Professional, 2020
PHISHING, USER ACCOUNT takeovers, and other computing-related threats have made it easy for criminals to deceive people for financial and other gain. It is now considered standard practice for an advanced cyberattack, even a highly technical one, to start in a nontechnical manner: a spearphishing email deceiving an organization’s employees into ...
Loukas, George   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy