Results 91 to 100 of about 51,742 (230)

When Business Breaks the Rules: The Value of a Criminology‐Informed “Organizational” Perspective for the Regulation of White‐Collar and Corporate Crimes

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley   +1 more source

Informal Firms' Adoption and Use of Mobile Money Under Uncertain Times: Evidence From Burkina Faso

open access: yesReview of Development Economics, EarlyView.
ABSTRACT This paper investigates how uncertainty affects mobile money adoption and use by informal businesses. Despite the prevalence of the informal sector in developing countries and the recognized potential of mobile money for financial inclusion, empirical research on its adoption and usage among unregistered businesses is limited.
Serge Stéphane Ky, Clovis Rugemintwari
wiley   +1 more source

The Extreme Risk of Personal Data Breaches & The Erosion of Privacy

open access: yes, 2016
Personal data breaches from organisations, enabling mass identity fraud, constitute an \emph{extreme risk}. This risk worsens daily as an ever-growing amount of personal data are stored by organisations and on-line, and the attack surface surrounding ...
Maillart, Thomas   +2 more
core   +1 more source

On Using the Shapley Value for Anomaly Localization: A Statistical Investigation

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
ABSTRACT Recent publications have suggested using the Shapley value for anomaly localization for sensor data systems. We use a reasonable statistical model for the classifiers required to compute the Shapley value to provide repeatable and rigorous analysis in the anomaly localization application.
Rick S. Blum   +2 more
wiley   +1 more source

Effective fraud detection in e-commerce: Leveraging machine learning and big data analytics

open access: yesMeasurement: Sensors
Sophisticated cyber-infrastructure and information technology methods are necessary to exploit and analyse the massive amounts of data generated by online transactions.
Surendranadha Reddy Byrapu Reddy   +5 more
doaj   +1 more source

Global Risks 2012, Seventh Edition [PDF]

open access: yes, 2012
The World Economic Forum's Global Risks 2012 report is based on a survey of 469 experts from industry, government, academia and civil society that examines 50 global risks across five categories.

core  

Crisis Communication Readiness in the Age of Digital Transformation and GenAI: Insights From Hong Kong

open access: yesJournal of Contingencies and Crisis Management, Volume 34, Issue 2, June 2026.
ABSTRACT This study investigates the impact of digital transformation and emerging technologies, particularly generative artificial intelligence (GenAI), on the readiness and practices of crisis communication professionals in Hong Kong (HK). Despite growing theoretical advances, recent literature remains predominantly Western‐centric, with limited ...
Cindy Sing Bik Ngai   +3 more
wiley   +1 more source

Financial Fraud in Commercial Companies [PDF]

open access: yesOvidius University Annals: Economic Sciences Series
Financial fraud represents a significant threat to the financial integrity, performance, and reputation of commercial companies, with adverse effects on investor confidence and long-term sustainability.
Alina Melania Ionita, Mircea-Iosif Rus
doaj  

Home - About - Disclaimer - Privacy