Journal articles on the topic 'Cyber frauds'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber frauds.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dr., Manish Bhatnagar &. Dr. Pragati Bhatnagar. "CYBER CRME AND ITS PROTECTION." Scholarly Research Journal for Interdisciplinary studies 13, no. 87 (2025): 102–8. https://doi.org/10.5281/zenodo.15148000.
Full textZare, Chaitali B., and L. D. Bodile. "DETERMINATION OF FINANCIAL AWARENESS ABOUT ATM FRAUDS BASED ON DEMOGRAPHICAL FACTORS IN AKOLA AND AMRAVATI DISTRICTS OF MAHARASHTRA." International Journal of Innovations & Research Analysis 04, no. 02(II) (2024): 102–9. http://dx.doi.org/10.62823/4.2(ii).6694.
Full textWhitty, Monica T. "Predicting susceptibility to cyber-fraud victimhood." Journal of Financial Crime 26, no. 1 (2019): 277–92. http://dx.doi.org/10.1108/jfc-10-2017-0095.
Full textMalik, Aftab Ahmad. "Online shopping, Cyber frauds and Fraud prevention Strategies." International Journal for Electronic Crime Investigation 8, no. 1 (2024): 49–56. http://dx.doi.org/10.54692/ijeci.2024.0801186.
Full textKumar Goutam, Rajesh, and Deepak Kumar Verma. "Top Five Cyber Frauds." International Journal of Computer Applications 119, no. 7 (2015): 23–25. http://dx.doi.org/10.5120/21080-3759.
Full textKumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.
Full textNatesan, Dr Gobi. "PREVENTION OF CYBER FRAUDS IN THE BANKING SECTOR." International Scientific Journal of Engineering and Management 03, no. 03 (2024): 1–22. http://dx.doi.org/10.55041/isjem01341.
Full textPranav Kumar, Ray. "A study on cyber financial frauds in the district of Jamtara, Jharkhand." Journal of Forensic Science and Research 6, no. 1 (2022): 042–44. http://dx.doi.org/10.29328/journal.jfsr.1001034.
Full textChaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Optimized early financial fraud detection and prevention method to enhance the security." Journal of Information and Optimization Sciences 46, no. 2 (2025): 359–69. https://doi.org/10.47974/jios-1920.
Full textParameshwara, Parameshwara. "E-Banking system in India and Cyber Frauds." International Journal of Scientific Research 2, no. 8 (2012): 81–83. http://dx.doi.org/10.15373/22778179/aug2013/25.
Full textSaxena, Anubha, and Geetika T. Kapoor. "Public perception and responsibility in cyber security: A study on assessing awareness and effective prevention of cyber frauds in Lucknow region." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42481.
Full textShah, Dr. Nileshkumar V. "Cyber Crime With Respect To Violation of Fundamental Rights." International Journal of Advance and Applied Research 5, no. 21 (2024): 64–67. https://doi.org/10.5281/zenodo.12705113.
Full textMagliulo, Antonio. "Cyber Security and Tourism Competitiveness." European Journal of Tourism, Hospitality and Recreation 7, no. 2 (2016): 128–34. http://dx.doi.org/10.1515/ejthr-2016-0015.
Full textCrasta, Saritha. "ENHANCING CONSUMER VIGILANCE AND MITIGATING TACTICS AGAINST INTERNET SHOPPING FRAUD." Al-Shodhana 12, no. 2 (2024): 86–93. http://dx.doi.org/10.70644/as.v12.i2.7.
Full textBhattacharya, Sumanta, Bhavneet Kaur Sachdev, Arpan Kundu, and Khewan Bansal. "IMPACT OF CYBER LAW IN MODERN ERA WITH ADVANCEMENT IN TECHNOLOGY AND PROTECTION FROM RISING THREATS OF CYBER CRIMES IN OUR SOCIO ECONOMIC SECTOR." International Journal of Advanced Research 9, no. 09 (2021): 274–79. http://dx.doi.org/10.21474/ijar01/13404.
Full textNaik, Sadananda B., and Sangram Biradar. "Are Doctors Easy Targets for Cyber Frauds?" Bengal Physician Journal 12, no. 1 (2025): 34–37. https://doi.org/10.5005/jp-journals-10070-8081.
Full textM, Manjunath, and Dr Selvi S. "A Study on Cyber Frauds Post Digitalization in India." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 1790–806. http://dx.doi.org/10.22214/ijraset.2024.60191.
Full textArora, Moulik Singh. "Threats, Effects, and Awareness of Cybercrime: A Survey." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32833.
Full textIdemili-Aronu, Ngozi, Ifeyinwa Angela Ajah, Oguejiofo C. P. Ezeanya, Joy Chikaodili Omaliko, and Oluchukwu Sunday Nwonovo. "Get Rich Syndrome: Examining the Fight against Cybercrime in Enugu State, Nigeria." International Journal of Criminology and Sociology 10 (October 8, 2021): 1390–96. http://dx.doi.org/10.6000/1929-4409.2021.10.159.
Full textKuzmenko, Olha V., Tetiana V. Dotsenko, and Liliia O. Skrynka. "Economic and Mathematical Modelling of the Effectiveness of the National System for Combatting Cyber Fraud and Legalisation of Criminal Proceeds Based on Survival Analysis Methods." Scientific Bulletin of Mukachevo State University Series “Economics” 8, no. 1 (2021): 144–53. http://dx.doi.org/10.52566/msu-econ.8(1).2021.144-153.
Full textChaudhari, Tejas N., and Pratiksha K. Borse. "Understanding cyber fraud risks: How first-time internet users are targeted by scammers in Palghar, Maharashtra." International Journal of Advance and Applied Research 6, no. 25(B) (2025): 136–39. https://doi.org/10.5281/zenodo.15314801.
Full textWatney, Murdoch. "Exploring Cyber Fraud within the South African Cybersecurity Legal Framework." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 632–38. http://dx.doi.org/10.34190/eccws.23.1.2204.
Full textC.Meenakshi, Anisha Asirvatham,. "SmishSMS- The Latest Detection of SMS Phishing Trends." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 796–806. http://dx.doi.org/10.52783/tjjpt.v44.i4.936.
Full textDotsenko, Tetiana, Hanna Yarovenko, and Darina Berezhna. "Due diligence in the aspect of countering financial cyber fraud: modeling trends." Economic Herald of SHEI USUCT 17, no. 1 (2023): 20–30. http://dx.doi.org/10.32434/2415-3974-2022-17-1-20-30.
Full textSubudhi, Srihari, Sahaja Akuthota, and Mayukha Anumula. "Cyber Frauds in India - An Investigation of Technological & Psychological Perspectives." International Journal of Science and Research (IJSR) 13, no. 11 (2024): 296–301. http://dx.doi.org/10.21275/sr241104223224.
Full textYarovenko, Hanna, Aleksandra Kuzior, and Alona Raputa. "The Modeling of the Probable Behaviour of Insider Cyber Fraudsters in Banks." Financial Markets, Institutions and Risks 7, no. 4 (2023): 155–67. http://dx.doi.org/10.61093/fmir.7(4).155-167.2023.
Full textSaidov, Ibrokhim. "Understanding and analyzing the cyber risk in financial services." Общество и инновации 4, no. 6/S (2023): 322–28. http://dx.doi.org/10.47689/2181-1415-vol4-iss6/s-pp322-328.
Full textJACOB OBAFEMI FATOKI. "The influence of cyber security on financial fraud in the Nigerian banking industry." International Journal of Science and Research Archive 9, no. 2 (2023): 503–15. http://dx.doi.org/10.30574/ijsra.2023.9.2.0609.
Full textWaykar, Mrunmayee. "Fraud Detection using IBMs Differential Privacy Library." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 749–54. http://dx.doi.org/10.22214/ijraset.2023.56095.
Full textSingh, Nimisha, and Abha Rishi. "Pyramid: A Case Study of Cyber Security in India." South Asian Journal of Business and Management Cases 4, no. 1 (2015): 135–42. http://dx.doi.org/10.1177/2277977915574046.
Full textVyas, Avinash, and Abdullah khalid. "Cyber Threats and Digital Forensic Accounting: Identifying Financial Frauds in Online Banking Transactions." Journal of Research & Development 17, no. 2 (2025): 52–59. https://doi.org/10.5281/zenodo.15064053.
Full textHaoxiang, Wang, and Smys S. "A Survey on Digital Fraud Risk Control Management by Automatic Case Management System." March 2021 3, no. 1 (2021): 1–14. http://dx.doi.org/10.36548/jeea.2021.1.001.
Full textShailaj, Kumar Shrivastava, and Kumar Amitesh. "PREDICTIVE ANALYTICS: PROACTIVE APPROACH TO COMBAT FRAUD AND CYBER ATTACKS." Journal of Emerging Technologies and Innovative Research 6, no. 6 (2019): 88–90. https://doi.org/10.5281/zenodo.10836707.
Full textBalaji Dhashanamoorthi. "Analyzing detection algorithms for cybersecurity in financial institutions." International Journal of Science and Research Archive 11, no. 2 (2024): 558–68. http://dx.doi.org/10.30574/ijsra.2024.11.2.0478.
Full textRamesh, K. P., R. Amudha, K. Prasob, and K. S. Kanna. "Fintech innovations in E-payments: Privacy and security in cybercrime threats." Multidisciplinary Science Journal 5 (August 29, 2023): 2023ss0320. http://dx.doi.org/10.31893/multiscience.2023ss0320.
Full textDr UzohNzekwe E, Dr UzohNzekwe E. "Cyber Fraud, Causes and Its Effect on Money Deposit Banks." Journal of Software Engineering and Simulation 10, no. 10 (2024): 61–70. http://dx.doi.org/10.35629/3795-10106170.
Full textAhire, Prof Pritam. "A Survey on Malware detection using ML." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 314–24. http://dx.doi.org/10.22214/ijraset.2022.39813.
Full textBhanushali, Aastha. "AI-Driven Cybersecurity: A Cornerstone of National Security Amidst Emerging Threats and Innovative Solutions." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1265–69. https://doi.org/10.22214/ijraset.2025.67522.
Full textSumaira Hassan, Muhammad Shafiullah, Ali Ahmed, and Fahim Muhammad Khan. "Advances in AI to Predict and Prevent Cyber Security Attacks: A Comprehensive Analysis of Modern World." Physical Education, Health and Social Sciences 3, no. 1 (2025): 47–55. https://doi.org/10.63163/jpehss.v3i1.209.
Full textErondu, Chinyere Iheoma, and Udochukwu Iheanacho Erondu. "The Role of Cyber security in a Digitalizing Economy: A Development Perspective." International Journal of Research and Innovation in Social Science VII, no. XI (2023): 1558–70. http://dx.doi.org/10.47772/ijriss.2023.7011121.
Full textKoibichuk, Vitaliia, Natalia Ostrovska, Flora Kashiyeva, and Aleksy Kwilinski. "Innovation technology and cyber frauds risks of neobanks: gravity model analysis." Marketing and Management of Innovations, no. 1 (2021): 253–65. http://dx.doi.org/10.21272/mmi.2021.1-19.
Full textSakshi Vashisth. "A Study on Emerging Trends of Cyber Frauds and Digitalization in India Including Financial Cybercrime Legal Implications." Journal of Information Systems Engineering and Management 10, no. 47s (2025): 690–96. https://doi.org/10.52783/jisem.v10i47s.9330.
Full textRao, K. Srinivas, V. Harsha Shastri, and RK Raman. "A comprehensive study of fraudulent activities on social media networks." International Journal of Science and Social Science Research 2, no. 2 (2024): 248–57. https://doi.org/10.5281/zenodo.13733964.
Full textAftab Ahmad Malik, Dr Aftab Ahmad Malik. "Effective Prosecution to Support Digital Forensic Evidence during Investigation and Court Proceedings." International Journal for Electronic Crime Investigation 2, no. 2 (2018): 7. http://dx.doi.org/10.54692/ijeci.2018.020213.
Full textShaukat, Kamran, Suhuai Luo, Vijay Varadharajan, et al. "Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity." Energies 13, no. 10 (2020): 2509. http://dx.doi.org/10.3390/en13102509.
Full textIslam, Muhammad Tanbirul, Md Fokhrul Islam, and Juairiya Sawda. "E-Commerce and Cyber Vulnerabilities in Bangladesh." International Journal of Law and Society (IJLS) 1, no. 3 (2022): 184–202. http://dx.doi.org/10.59683/ijls.v1i3.24.
Full textRaj CA, Riya. "A Review on the Application of Lifestyle-Routine Activity Theory in Cyber Criminology." International Journal of Forensic Sciences 9, no. 3 (2024): 1–4. http://dx.doi.org/10.23880/ijfsc-16000401.
Full textDevarasetty, Narendra. "AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems." International Journal of Scientific Research and Management (IJSRM) 12, no. 01 (2024): 1038–73. https://doi.org/10.18535/ijsrm/v12i01.ec05.
Full textГончарова, М. В., and В. И. Шиян. "Cyber fraud is an actual threat to the security of the Internet of Things." Вестник Московской академии Следственного комитета Российской Федерации, no. 1(35) (March 14, 2023): 28–34. http://dx.doi.org/10.54217/2588-0136.2023.35.1.002.
Full textAamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan." Strategic Studies 39, no. 1 (2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.
Full text