Results 31 to 40 of about 629,768 (208)

Search Rank Fraud De-Anonymization in Online Systems

open access: yes, 2018
We introduce the fraud de-anonymization problem, that goes beyond fraud detection, to unmask the human masterminds responsible for posting search rank fraud in online systems.
Akoglu Leman   +6 more
core   +1 more source

How Informative Are Fraud and Non-Fraud Firms\u27 Earnings? [PDF]

open access: yes, 2019
This study evaluates how informative the earnings of fraud firms are compared to peer non-fraud firms by assessing informativeness in the context of persistence, analysts’ forecast errors, and stock returns.
Asare, Kwadwo Nyarko
core   +1 more source

LITERATURE REVIEW: FRAUD AUDITING IN INDONESIA

open access: yesInternational Journal of Innovative Technologies in Economy, 2023
Financial statement fraud or corruption is one of the most common types of fraud committed by company executives. Pressure, opportunity, rationalization, arrogance, and the ability to commit fraud are all factors that contribute to financial statement ...
Barnabas Tridig S.   +2 more
doaj   +1 more source

Smishing Detection From a Messaging Platform View

open access: yesIEEE Access
Application-to-person messages for mobile marketing democratized the way enterprises interact with their clients. Messaging services are booming across all sectors allowing companies to solve real business problems and make services more efficient ...
Stephane F. Schwarz   +2 more
doaj   +1 more source

Model Teori Fraud Diamond mempengaruhi Financial Statement Fraud dimoderasi oleh Innovation Strategy

open access: yesJurnal Ilmiah Wahana Akuntansi, 2023
Penelitian ini bertujuan untuk meneliti pengaruh fraud diamond terhadap financial statement fraud dan peran dari innovation strategy dalam memoderasi pengaruh fraud diamond terhadap financial statement fraud.
Viona Angelina, Budi Chandra
doaj   +1 more source

Cross-Border Evidence Gathering in Criminal Crypto Investigations: A Case Study of the Netherlands

open access: yesTilburg Law Review
This article focuses on the practical and legal-normative challenges and opportunities for cross-border criminal crypto investigations. Cryptocurrencies are (mis)used in various criminal activities.
Tessa van Roomen
doaj   +1 more source

The Politics of Voter Fraud [PDF]

open access: yes, 2007
The purpose of this report is to disentangle the myth from the reality and to separate the politics of voter fraud from legitimate administrative concerns about the integrity of the electoral process.
Lorraine C. Minnite
core  

Economic Motives and Willingness of Young People to Participate in Fraud

open access: yesNaše Gospodarstvo, 2022
Fraud is linked to economic and financial pressures that force people to commit it. Any fraud, regardless of the gender and age of the fraud perpetrators, inevitably leaves a short-term or long-term negative mark on society’s economy.
Dimitrijević Dragomir, Jovanović Dejan
doaj   +1 more source

What Is Fraud and Who Is Responsible? [PDF]

open access: yes, 2006
Research shows that fraudulent activity affecting the financial statements is more prevalent than ever despite the increased attention devoted to the prevention and detection of fraud by companies and professional accountants.
Akers, Michael D., Gissel, Jodi L.
core   +1 more source

Fraud detection in energy consumption: a supervised approach [PDF]

open access: yes, 2016
Data from utility meters (gas, electricity, water) is a rich source of information for distribution companies, beyond billing. In this paper we present a supervised technique, which primarily but not only feeds on meter information, to detect meter ...
Alcoverro, Santiago   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy