Showing 121 - 140 results of 247 for search '"fraud"', query time: 0.04s Refine Results
  1. 121

    ادمان شبکة الانترنت وأضرارها الصحیة والنفسیة والاجتماعیة على طلاب المدارس الثانویة بمدینة شبین الکوم بمحافظة المنوفیة... by د. میرفت مفید عبد الستار

    Published 2020-01-01
    “…The most important results and recommendationsreached by the researcher through the field study in public secondary schools inShebin El-Kom city, Monofiya governorate, Egypt.The Results of the studyThe researcher reached many results as follows:-1. 1-The main causes of addiction to the students of secondary education forthe Internet Monofiya, the following respectively: entertainment and play,lack of control parents to me, a sense of vacuum time, ease of dealingwith others through the Internet, sense of comfort while using the Internet,to escape from the responsibility to study and study, not My interest onthe part of the family and the community around me, to escape from myproblems surrounding the family, rather than going out2. 2- The largest percentage of students addicted to the Internet in the agegroup of 16 years reached 102 respondents, representing 56.7% of thetotal male and female population in the study sample.3. .3- The most important negative aspects of the internet came between hisstudents and secondary education students in Monofiya, respectively:lack of supervision, porn sites, addiction to sit for long periods, violation ofrights, falling into unknown relationships, exposure to fraud and fraud.4. 4- came the most important health damage caused by Internet addictionamong education students secondary Monofiya: pain the eyes of the mostdifficult and the most first health damage caused by the use of the Internetamong students at a percentage of 60.5%, followed by insomnia andsleep deprivation, a percentage of 50.4%, followed by fatigue and fatigueby 49.7 %, mother bone by 45.7%, and diseases of the brain and nerves30.2%, heart disease by 22.7%, and finally skin diseases by 21.5% of thetotal sample.…”
    Get full text
    Article
  2. 122

    Enhancing identity and access management using Hyperledger Fabric and OAuth 2.0: A block-chain-based approach for security and scalability for healthcare industry by Shrabani Sutradhar, Sunil Karforma, Rajesh Bose, Sandip Roy, Sonia Djebali, Debnath Bhattacharyya

    Published 2024-01-01
    “…Our statistical analysis demonstrates that the proposed approach can efficiently and securely manage patient identity and access, potentially transforming the healthcare industry by enhancing data interoperability, reducing fraud and errors, and improving patient privacy and security. …”
    Get full text
    Article
  3. 123

    Cyber security laws and safety in e-commerce in India by A. K. Kashyap, M. Chaudhary

    Published 2023-06-01
    “…However, with the rising dependence on internet commerce, the dangers of fraud and security and trust problems have become severe impediments. …”
    Get full text
    Article
  4. 124
  5. 125

    Women and Money: Unique Issues — Protecting Your Assets by Lynda Spence, Martie Gillen, Diann Douglas

    Published 2013-07-01
    “…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. This 4-page fact sheet was written by Lynda Spence, Martie Gillen, and Diann Douglas, and published by the UF Department of Family Youth and Community Sciences, July 2013. …”
    Get full text
    Article
  6. 126

    Women and Money: Unique Issues — Protecting Your Assets by Lynda Spence, Martie Gillen, Diann Douglas

    Published 2013-07-01
    “…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. This 4-page fact sheet was written by Lynda Spence, Martie Gillen, and Diann Douglas, and published by the UF Department of Family Youth and Community Sciences, July 2013. …”
    Get full text
    Article
  7. 127

    Smart Approach for Botnet Detection Based on Network Traffic Analysis by Alaa Obeidat, Rola Yaqbeh

    Published 2022-01-01
    “…Cybercriminals have exploited botnets for many illegal activities, including click fraud, DDOS attacks, and spam production. In this article, we suggest a method for identifying the behavior of data traffic using machine learning classifiers including genetic algorithm to detect botnet activities. …”
    Get full text
    Article
  8. 128

    ANALISIS SISTEM PENGGAJIAN KARYAWAN PERUMDA LT KABUPATEN MAGETAN by Yurisa Dwi Aprilia Ningtias, Stely Aulia Trifananta, Elana Era Yusdita

    Published 2024-07-01
    “…The results of this research conclude that the Perumda LT employee payroll system is running quite well and effectively, but there are weaknesses in manual attendance which is less effective, making it possible for fraud to occur and errors in the employee payroll system. …”
    Get full text
    Article
  9. 129

    Criminal law / by De Than, Claire

    Published 2013
    Table of Contents: “…Introduction -- Actus reus -- Mens rea and fault -- Non-fatal offences against the person -- Sexual offences -- Homicide -- General defences I : age and insanity -- General defences II : automatism, intoxication, mistake and self-defence -- General defences III : duress, necessity and marital coercion -- Offences against property I : theft -- Offences against property II : fraud -- Offences against property III -- Strict liability -- Secondary participation in crime -- Inchoate offences.…”
    Publisher description
    Table of contents only
    View in OPAC
    Book
  10. 130

    Jakość pracy naukowej, jej potwierdzenie a recenzja partnerska. Odbiór w środowisku naukowym i nieporozumienia. Postawy wobec recenzji partnerskiej (przekł. Tomasz Olszewski) by Adrian Mulligan

    Published 2009-01-01
    “…Berti, 1981. Lerner E., Fraud shows peer-review flaw, „The Industrialist Physicist” 8(6), 2003. …”
    Get full text
    Article
  11. 131

    LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA by ADENIYI ADEKUNLE

    Published 2023-12-01
    “…Political leadership has been severely hampered by corruption, electoral fraud, resource mismanagement, and underdeveloped infrastructure. …”
    Get full text
    Article
  12. 132

    Automatic exchange of financial information from the perspective of tax fairness and transparency by Isnaini Isnaini, Joni Emirzon, Ridwan Ridwan

    Published 2024-11-01
    “…The results show that AEOI can help prevent tax evasion, ensure taxpayer compliance, and strengthen international cooperation in the fight against tax evasion and fraud. Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
    Get full text
    Article
  13. 133

    Research ethics by Aşkın Yaşar, Adnan Ataç

    “…If rt was made purposely by the researcher, this is scientific fraud. Publication brings about some special ethical problems. …”
    Get full text
    Article
  14. 134

    Navigating Auditing Risks in the Crypto Asset Landscape by Georgiana-Iulia LAZEA (TRIFA), Ovidiu-Constantin BUNGET, Anca-Diana BALAN, Mircea Stefan SOLOVASTRU

    Published 2025-02-01
    “…This paper explores the inherent, control, valuation, and related risks associated with crypto assets, emphasising the complexities of valuation, compliance, and fraud detection. Starting from a bibliometric visualisation in VOSviewer, it points out thematic trends and key concepts in crypto auditing. …”
    Get full text
    Article
  15. 135

    Workshops for editors in the central region of Cuba: a proposal for the improvement of scientific journals in medical sciences by Yurima Hernández de la Rosa, Mikhail Benet Rodríguez, Francisco Luis Moreno Martínez, Ana María Molina Gómez, Belkis González Aguiar, Lucitere Rodríguez González

    Published 2011-08-01
    “…The authors also address the issue of fraud in the scientific literature from a national to respect debate and the discussion developed on this important subject in the second workshop.…”
    Get full text
    Article
  16. 136

    Development of an insurance industry image assessment index by O. I. Larina, N. V. Moryzhenkova

    Published 2022-07-01
    “…A low level of financial literacy, cases of fraud by insurers lead to the formation of a negative image of the insurance industry, even if the respondents have a positive experience of using insurance products. …”
    Get full text
    Article
  17. 137

    Recent Progress of Anomaly Detection by Xiaodan Xu, Huawen Liu, Minghai Yao

    Published 2019-01-01
    “…Anomaly analysis is of great interest to diverse fields, including data mining and machine learning, and plays a critical role in a wide range of applications, such as medical health, credit card fraud, and intrusion detection. Recently, a significant number of anomaly detection methods with a variety of types have been witnessed. …”
    Get full text
    Article
  18. 138

    Is financial stress a facilitating factor in cartel formation? by Jesper Fredborg Huric-Larsen

    Published 2025-03-01
    “…It is well-known that failing to achieve key organizational goals may pressure managers to commit fraud, but can it be a facilitating factor in cartel formation as well? …”
    Get full text
    Article
  19. 139

    L’abstention en Algérie : un autre mode de contestation politique by Louisa Dris-Aït Hamadouche

    Published 2009-11-01
    “…The consequences are a dissuasive electoral code, suspicious official electoral results and accusations and suspicions of fraud. Secondly, abstention is related to the political offer : the politics offered and the individuals who represent that offer constitute a disappointing choice for potential voters, especially youth, who lose interest in the elections. …”
    Get full text
    Article
  20. 140

    Anomalous Trajectory Detection Using Masked Autoregressive Flow Considering Route Choice Probability by Pengqian Cao, Renxin Zhong, Wei Huang

    Published 2022-01-01
    “…However, anomalous trajectories such as trip fraud often occur due to greedy drivers. In this study, we propose an anomalous trajectory detection method that incorporates Route Choice analysis into Masked Autoregressive Flow, named MAFRC-ATD. …”
    Get full text
    Article