-
441
The Use of Speech Technology to Protect the Document Turnover
Published 2017-06-01“…The importance of such factor as the time of fraud detection towards the efficiency of documents protection is shown. …”
Get full text
Article -
442
Prevention and detection of corporate fraud : procedures practiced in Singapore
Published 2015“…There was no single most dominant reason for the difficulties in fraud detection. However, respondents considered "Perpetrator's objective is to hide fraud and he is often familiar with the control procedures", as a more prevalent factor contributing · to the difficulties in fraud detection. …”
Get full text
Final Year Project (FYP) -
443
Forensic accounting and fraud examination /
Published c201“…The forensic accounting legal environment -- Fundamentals I : accounting information systems -- Fundamentals II : the auditing environment -- Fraud prevention and risk management -- Fraud detection -- The fraud investigation and engagement processes -- The evidence collection process -- Fraud examination evidence I : physical, documentary, and observational evidence -- Fraud examination evidence II : interview and interrogation methods -- Fraud examination evidence III : forensic science and computer forensics -- The fraud report, litigation, and the recovery process -- Employee, vendor, and other frauds against the organization -- Financial statement fraud -- Fraud and SOX compliance -- Tax fraud -- Bankruptcy, divorce, and identity theft -- Organized crime, counterterrorism, and anti-money laundering -- Business valuation -- Dispute resolution services.…”
-
444
The audit expectation gap: A review of the academic literature
Published 2020-03-01“…The most frequently identified gaps refer to fraud detection. Education and the expansion of the auditor report are two response strategies often analysed by prior research.…”
Get full text
Article -
445
AUCReshaping: improved sensitivity at high-specificity
Published 2023-11-01“…We primarily investigated the impact of AUCReshaping in the context of abnormality detection tasks, specifically in Chest X-Ray (CXR) analysis, followed by breast mammogram and credit card fraud detection tasks. The results reveal a substantial improvement, ranging from 2 to 40%, in sensitivity at high-specificity levels for binary classification tasks.…”
Get full text
Article -
446
Internal Control Tools to Strengthen the Fight Against Fraud in the European Union
Published 2024-02-01“…This approach allows for a nuanced understanding of fraud dynamics, contributing significantly to the field of fraud detection and prevention. …”
Get full text
Article -
447
VisAuth: authentication over a visual channel using an embedded image
Published 2018“…In this paper, we identify five common problems in existing systems: (i) specialist hardware requirements, (ii) no reader-to-user authentication, (iii) use of invisible channels, (iv) dependence on a client-server connection, and (v) no inherent fraud detection. We then propose a novel system which overcomes these problems, so as to mutually authenticate a user, a point-of-sale reader, and a verifier over a visual channel, using an embedded image token to transport information, while providing inherent unauthorised usage detection. …”
Conference item -
448
PROPAGATION OF MISCLASSIFIED INSTANCES TO HANDLE NONSTATIONARY IMBALANCED DATA STREAM
Published 2018-04-01“…Many real time problems like intrusion detection, credit card fraud detection, weather forecasting and many more applications suffer concept drift as well as class imbalance as they change with time. …”
Get full text
Article -
449
Pendeteksian Fraud Pada Tata Kelola Penatausahaan Persediaan Badan Layanan Umum
Published 2018-12-01“…This study aims to analyze and interpret fraud detection on the governance of the BLU inventory administration of University X. …”
Get full text
Article -
450
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions
Published 2018-04-01“…Abstract Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems for card-present transactions. …”
Get full text
Article -
451
The performance of expectation maximization (EM) algorithm in Gaussian Mixed Models (GMM)
Published 2009“…In this paper, the performance of the said algorithm in finding the Maximum Likelihood for the Gaussian Mixed Models (GMM), a probabilistic model normally used in fraud detection and recognizing a person’s voice in speech recognition field, is shown and discussed. …”
Get full text
Article -
452
Understanding Life And Medical Insurance Policy In Malaysia /
Published 2005“…It also provides information on possible fraud detection and prevention. This book is also suitable for the general public who is interested to know more about life and medical insurance. …”
text -
453
An Internal Audit Expectation Gap in Poland
Published 2021-11-01“…According to their views, the raison d’être of the internal audit function is fraud detection. This perception of internal audit that emerged in its early years still determines the majority of opinions about its effectiveness.…”
Get full text
Article -
454
Natural and Artificial Dynamics in Graphs: Concept, Progress, and Future
Published 2022-12-01“…Based on graphs, many algorithms and tools are proposed and developed for dealing with real-world tasks such as recommendation, fraud detection, molecule design, etc. In this paper, we first discuss three topics of graph research, i.e., graph mining, graph representations, and graph neural networks (GNNs). …”
Get full text
Article -
455
Holistic approach to fraud management in health insurance
Published 2008-12-01“…The current research community focussed great efforts on different fraud detection techniques while neglecting other also important activities of fraud management. …”
Get full text
Article -
456
Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System
Published 2012-12-01“…The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.…”
Get full text
Article -
457
THE DUAL CONTROL – A REQUIREMENT OF THE CURRENT BANK MANAGEMENT
Published 2014-10-01“…The authors of this study attempt to present the concept of dual control as it is currently applied in the banking system, trying to analyze contextually its capacities of fraud detection, its consequences in terms of risk and costs as well as its effects on bank performance.…”
Get full text
Article -
458
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures
Published 2015-10-01“…In this work, we present a Fraud Detection System that classifies transactions in a Mobile Money Transfer infrastructure by using the data fusion algorithms derived from these new models. …”
Get full text
Article -
459
The implementation of forensic accounting and investigative audit in the BPKP of East Nusa Tenggara Province
Published 2018-06-01“…This study aims to explore and analyze (1) the effect of the implementation of forensic accounting on fraud prevention; (2) the effect of the implementation of forensic accounting on fraud detection; and (3) the effect of the implementation of investigative audit on fraud disclosure in regional fi nancial management. …”
Get full text
Article -
460
The power of one: Benford's Law
Published 2017-08-01“…However, it has developed into a recognised statistical technique with several practical applications, of which the most notable is as a fraud detection mechanism in forensic accounting. This paper will briefly discuss and demonstrate the special numerical characteristics of Benford’s law. …”
Get full text
Article