-
1
Fraud triangle dimensions on academic fraud behavior
Published 2023-09-01Subjects: “…fraud triangle…”
Get full text
Article -
2
Financial statement fraud based on Hexagon Fraud Approach
Published 2023-09-01Subjects: “…fraud hexagon, financial statement, financial statement fraud…”
Get full text
Article -
3
Integrating fraud hexagon into fraud control system: a study of Indonesia
Published 2024-06-01“…The purpose of this research is to determine the effectiveness of the newly formed Fraud Control System regulations with the integration of Fraud Hexagon to formulate effective fraud prevention and detection procedures. …”
Get full text
Article -
4
-
5
-
6
Avoiding Frauds and Deception
Published 2019-11-01“…DH219/DH219: Avoiding Fraud and Deception (ufl.edu) …”
Get full text
Article -
7
Avoiding Frauds and Deception
Published 2019-11-01“…DH219/DH219: Avoiding Fraud and Deception (ufl.edu) …”
Get full text
Article -
8
Avoiding Frauds and Deception
Published 2003-07-01“…DH219/DH219: Avoiding Fraud and Deception (ufl.edu) …”
Get full text
Article -
9
Avoiding Frauds and Deception
Published 2003-07-01“…DH219/DH219: Avoiding Fraud and Deception (ufl.edu) …”
Get full text
Article -
10
-
11
-
12
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Published 2014-01-01“…This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. …”
Get full text
Article -
13
Contract and Procurement Fraud Investigation Guidebook /
Published 2017Table of Contents: “…Preface -- Acknowledgments -- Author -- Introduction to contracts, procurements and related fraud -- Corruption in contracting -- Source selection and competition schemes -- Contractor and vendor performance schemes -- Contractor and vendor payment schemes -- Investigators, enforcers and statutes -- Investigative sources and resources -- Investigative tools and techniques -- Interviews and interrogations -- Investigative reports and evidence -- Investigative case planning, goals, and strategies -- (the Piper method of conducting thorough and complete investigations*) -- Case presentations and testifying -- Post adjudicative action -- Sample case study-story # 1 -- Sample case study-story # 2 -- Sample case study-story # 3 -- Conclusion -- Appendix: Samples of visual aids for presentations on contract and procurement fraud, collusion and corruption investigations -- Index.…”
View in OPAC
Book -
14
-
15
Cryptocurrencies as a subject of financial fraud
Published 2022-01-01Subjects: Get full text
Article -
16
-
17
The Efficacy of Predictive Methods in Financial Statement Fraud
Published 2019-01-01“…The existence and persistence of financial statement fraud (FSF) are detrimental to the financial health of global capital markets. …”
Get full text
Article -
18
Enhancing Fraud Detection in Banking With Deep Learning: Graph Neural Networks and Autoencoders for Real-Time Credit Card Fraud Prevention
Published 2025-01-01Subjects: Get full text
Article -
19
Peculiarities of the investigation of frauds disguised as civil legal relations
Published 2023-07-01Subjects: “…fraud…”
Get full text
Article -
20
Fraud Research in Economic Entities – A Conceptual Perspective
Published 2025-02-01Subjects: “…fraud…”
Get full text
Article