-
121
ادمان شبکة الانترنت وأضرارها الصحیة والنفسیة والاجتماعیة على طلاب المدارس الثانویة بمدینة شبین الکوم بمحافظة المنوفیة...
Published 2020-01-01“…The most important results and recommendationsreached by the researcher through the field study in public secondary schools inShebin El-Kom city, Monofiya governorate, Egypt.The Results of the studyThe researcher reached many results as follows:-1. 1-The main causes of addiction to the students of secondary education forthe Internet Monofiya, the following respectively: entertainment and play,lack of control parents to me, a sense of vacuum time, ease of dealingwith others through the Internet, sense of comfort while using the Internet,to escape from the responsibility to study and study, not My interest onthe part of the family and the community around me, to escape from myproblems surrounding the family, rather than going out2. 2- The largest percentage of students addicted to the Internet in the agegroup of 16 years reached 102 respondents, representing 56.7% of thetotal male and female population in the study sample.3. .3- The most important negative aspects of the internet came between hisstudents and secondary education students in Monofiya, respectively:lack of supervision, porn sites, addiction to sit for long periods, violation ofrights, falling into unknown relationships, exposure to fraud and fraud.4. 4- came the most important health damage caused by Internet addictionamong education students secondary Monofiya: pain the eyes of the mostdifficult and the most first health damage caused by the use of the Internetamong students at a percentage of 60.5%, followed by insomnia andsleep deprivation, a percentage of 50.4%, followed by fatigue and fatigueby 49.7 %, mother bone by 45.7%, and diseases of the brain and nerves30.2%, heart disease by 22.7%, and finally skin diseases by 21.5% of thetotal sample.…”
Get full text
Article -
122
Enhancing identity and access management using Hyperledger Fabric and OAuth 2.0: A block-chain-based approach for security and scalability for healthcare industry
Published 2024-01-01“…Our statistical analysis demonstrates that the proposed approach can efficiently and securely manage patient identity and access, potentially transforming the healthcare industry by enhancing data interoperability, reducing fraud and errors, and improving patient privacy and security. …”
Get full text
Article -
123
Cyber security laws and safety in e-commerce in India
Published 2023-06-01“…However, with the rising dependence on internet commerce, the dangers of fraud and security and trust problems have become severe impediments. …”
Get full text
Article -
124
-
125
Women and Money: Unique Issues — Protecting Your Assets
Published 2013-07-01“…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. This 4-page fact sheet was written by Lynda Spence, Martie Gillen, and Diann Douglas, and published by the UF Department of Family Youth and Community Sciences, July 2013. …”
Get full text
Article -
126
Women and Money: Unique Issues — Protecting Your Assets
Published 2013-07-01“…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. This 4-page fact sheet was written by Lynda Spence, Martie Gillen, and Diann Douglas, and published by the UF Department of Family Youth and Community Sciences, July 2013. …”
Get full text
Article -
127
Smart Approach for Botnet Detection Based on Network Traffic Analysis
Published 2022-01-01“…Cybercriminals have exploited botnets for many illegal activities, including click fraud, DDOS attacks, and spam production. In this article, we suggest a method for identifying the behavior of data traffic using machine learning classifiers including genetic algorithm to detect botnet activities. …”
Get full text
Article -
128
ANALISIS SISTEM PENGGAJIAN KARYAWAN PERUMDA LT KABUPATEN MAGETAN
Published 2024-07-01“…The results of this research conclude that the Perumda LT employee payroll system is running quite well and effectively, but there are weaknesses in manual attendance which is less effective, making it possible for fraud to occur and errors in the employee payroll system. …”
Get full text
Article -
129
Criminal law /
Published 2013Table of Contents: “…Introduction -- Actus reus -- Mens rea and fault -- Non-fatal offences against the person -- Sexual offences -- Homicide -- General defences I : age and insanity -- General defences II : automatism, intoxication, mistake and self-defence -- General defences III : duress, necessity and marital coercion -- Offences against property I : theft -- Offences against property II : fraud -- Offences against property III -- Strict liability -- Secondary participation in crime -- Inchoate offences.…”
Publisher description
Table of contents only
View in OPAC
Book -
130
Jakość pracy naukowej, jej potwierdzenie a recenzja partnerska. Odbiór w środowisku naukowym i nieporozumienia. Postawy wobec recenzji partnerskiej (przekł. Tomasz Olszewski)
Published 2009-01-01“…Berti, 1981. Lerner E., Fraud shows peer-review flaw, „The Industrialist Physicist” 8(6), 2003. …”
Get full text
Article -
131
LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA
Published 2023-12-01“…Political leadership has been severely hampered by corruption, electoral fraud, resource mismanagement, and underdeveloped infrastructure. …”
Get full text
Article -
132
Automatic exchange of financial information from the perspective of tax fairness and transparency
Published 2024-11-01“…The results show that AEOI can help prevent tax evasion, ensure taxpayer compliance, and strengthen international cooperation in the fight against tax evasion and fraud. Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
Get full text
Article -
133
Research ethics
Get full text
Article -
134
Navigating Auditing Risks in the Crypto Asset Landscape
Published 2025-02-01“…This paper explores the inherent, control, valuation, and related risks associated with crypto assets, emphasising the complexities of valuation, compliance, and fraud detection. Starting from a bibliometric visualisation in VOSviewer, it points out thematic trends and key concepts in crypto auditing. …”
Get full text
Article -
135
Workshops for editors in the central region of Cuba: a proposal for the improvement of scientific journals in medical sciences
Published 2011-08-01“…The authors also address the issue of fraud in the scientific literature from a national to respect debate and the discussion developed on this important subject in the second workshop.…”
Get full text
Article -
136
Development of an insurance industry image assessment index
Published 2022-07-01“…A low level of financial literacy, cases of fraud by insurers lead to the formation of a negative image of the insurance industry, even if the respondents have a positive experience of using insurance products. …”
Get full text
Article -
137
Recent Progress of Anomaly Detection
Published 2019-01-01“…Anomaly analysis is of great interest to diverse fields, including data mining and machine learning, and plays a critical role in a wide range of applications, such as medical health, credit card fraud, and intrusion detection. Recently, a significant number of anomaly detection methods with a variety of types have been witnessed. …”
Get full text
Article -
138
Is financial stress a facilitating factor in cartel formation?
Published 2025-03-01“…It is well-known that failing to achieve key organizational goals may pressure managers to commit fraud, but can it be a facilitating factor in cartel formation as well? …”
Get full text
Article -
139
L’abstention en Algérie : un autre mode de contestation politique
Published 2009-11-01“…The consequences are a dissuasive electoral code, suspicious official electoral results and accusations and suspicions of fraud. Secondly, abstention is related to the political offer : the politics offered and the individuals who represent that offer constitute a disappointing choice for potential voters, especially youth, who lose interest in the elections. …”
Get full text
Article -
140
Anomalous Trajectory Detection Using Masked Autoregressive Flow Considering Route Choice Probability
Published 2022-01-01“…However, anomalous trajectories such as trip fraud often occur due to greedy drivers. In this study, we propose an anomalous trajectory detection method that incorporates Route Choice analysis into Masked Autoregressive Flow, named MAFRC-ATD. …”
Get full text
Article