To see the other types of publications on this topic, follow the link: Cyber frauds.

Journal articles on the topic 'Cyber frauds'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber frauds.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dr., Manish Bhatnagar &. Dr. Pragati Bhatnagar. "CYBER CRME AND ITS PROTECTION." Scholarly Research Journal for Interdisciplinary studies 13, no. 87 (2025): 102–8. https://doi.org/10.5281/zenodo.15148000.

Full text
Abstract:
<strong><em>&nbsp;</em></strong><em>Present era is an era of digital technologies and artificial intelligence. AI and new digital technologies are bringing drastic changes in our life. We are performing our routine tasks through technology .We are using digital devices for routing financial transactions, for our academic and research purpose, for our business, for e-shopping, for booking our tickets etc. Although the use of technology has made our many tasks very easy and efficient but it has brought to us the danger of cyber frauds. Daily in news papers we are reading about the cyber frauds h
APA, Harvard, Vancouver, ISO, and other styles
2

Zare, Chaitali B., and L. D. Bodile. "DETERMINATION OF FINANCIAL AWARENESS ABOUT ATM FRAUDS BASED ON DEMOGRAPHICAL FACTORS IN AKOLA AND AMRAVATI DISTRICTS OF MAHARASHTRA." International Journal of Innovations & Research Analysis 04, no. 02(II) (2024): 102–9. http://dx.doi.org/10.62823/4.2(ii).6694.

Full text
Abstract:
After the wider use of Automated Teller Machine (ATM), the number of frauds has increased rapidly. In Maharashtra state, financial cyber frauds are highest. There were less crimes regarding ATMs, in Akola district compared to district of Amravati. The main objective of the research paper is to find out the awareness in respect to ATM frauds in Akola and Amravati districts of Maharashtra using demographic factors. For primary data collection, a structured questionnaire was prepared and 500 responses were recorded i.e. 250 each from Akola and Amravati districts of Maharashtra state. Secondary da
APA, Harvard, Vancouver, ISO, and other styles
3

Whitty, Monica T. "Predicting susceptibility to cyber-fraud victimhood." Journal of Financial Crime 26, no. 1 (2019): 277–92. http://dx.doi.org/10.1108/jfc-10-2017-0095.

Full text
Abstract:
Purpose This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood. Design/methodology/approach A survey was constructed to examine whether personality, socio-demographic characteristics and online routine activities predicted one-off and repeat victimhood of cyber-fraud. Overall, 11,780 participants completed a survey (one-off victims, N = 728; repeat victims = 329). Findings The final saturated model revealed that psychological and socio-demographic characteristics and online routine activities should be considered when predicting victimhood. Consi
APA, Harvard, Vancouver, ISO, and other styles
4

Malik, Aftab Ahmad. "Online shopping, Cyber frauds and Fraud prevention Strategies." International Journal for Electronic Crime Investigation 8, no. 1 (2024): 49–56. http://dx.doi.org/10.54692/ijeci.2024.0801186.

Full text
Abstract:
Online shopping is increasingly being targeted by hackers and cyber criminals, who exploit the anonymity of the internet to deceive unsuspecting shoppers. These scams involve fake websites or ads, posing as legitimate sellers, damaging innocent citizens' bank accounts and databases, and causing damage to customers. Online shopping fraud involves using stolen credit or debit cards for purchases, while identity theft involves stealing personal information for fraudulent purposes like credit or illegal purchases. We discuss, the safety tips to avoid online shopping scams, using these safety tips
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar Goutam, Rajesh, and Deepak Kumar Verma. "Top Five Cyber Frauds." International Journal of Computer Applications 119, no. 7 (2015): 23–25. http://dx.doi.org/10.5120/21080-3759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.

Full text
Abstract:
Abstract: The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The C
APA, Harvard, Vancouver, ISO, and other styles
7

Natesan, Dr Gobi. "PREVENTION OF CYBER FRAUDS IN THE BANKING SECTOR." International Scientific Journal of Engineering and Management 03, no. 03 (2024): 1–22. http://dx.doi.org/10.55041/isjem01341.

Full text
Abstract:
The project under study explores the prevention of cyber fraud in the banking sector. With the rise of digital banking and increasing cyber threats, it is crucial to identify effective measures to combat cyber fraud and protect the integrity of the banking system. The key strategies for prevention, include education and awareness, technology solutions, fraud detection, and monitoring, as well as collaboration and regulatory measures. Educating customers and bank employees about cyber fraud risks, implementing multi-factor authentication systems, utilizing encryption techniques, and employing a
APA, Harvard, Vancouver, ISO, and other styles
8

Pranav Kumar, Ray. "A study on cyber financial frauds in the district of Jamtara, Jharkhand." Journal of Forensic Science and Research 6, no. 1 (2022): 042–44. http://dx.doi.org/10.29328/journal.jfsr.1001034.

Full text
Abstract:
The study has been undertaken to investigate the determination of digital financial fraud (cyber fraud) in Jamtara district of Jharkhand (the hub of cyber fraudsters) the basic tools &amp; techniques which are used by the offenders and to find out the socio-economic condition of their social life &amp; find the new challenging in cybercrime investigation and to find out the more secure way of digital financial flow, by using survey research method and work on secondary as well primary data which was related to this study, cybercrime especially financial fraud becomes the new challenging task f
APA, Harvard, Vancouver, ISO, and other styles
9

Chaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Optimized early financial fraud detection and prevention method to enhance the security." Journal of Information and Optimization Sciences 46, no. 2 (2025): 359–69. https://doi.org/10.47974/jios-1920.

Full text
Abstract:
Financial fraud poses a major threat to banking and financial organizations, leading to financial losses and erosion of public trust. This paper proposes an early financial fraud detection and prevention method to secure financial data in transit, at rest, and in process to mitigate risks of frauds such as unauthorized transactions, identity thefts, data breaches, and cyberattacks. The method involves assessing the current cybersecurity posture through surveys, defining optimal security controls baseline per regulatory guidelines, performing gap analysis to identify vulnerabilities, and sugges
APA, Harvard, Vancouver, ISO, and other styles
10

Parameshwara, Parameshwara. "E-Banking system in India and Cyber Frauds." International Journal of Scientific Research 2, no. 8 (2012): 81–83. http://dx.doi.org/10.15373/22778179/aug2013/25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Saxena, Anubha, and Geetika T. Kapoor. "Public perception and responsibility in cyber security: A study on assessing awareness and effective prevention of cyber frauds in Lucknow region." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42481.

Full text
Abstract:
Cybercrimes are on the rise and pose serious hazards to individuals, corporations, and governments as digital technologies become a part of our lives. This study looks at people's knowledge, awareness, perceptions, attitudes, and countermeasures regarding cyber frauds today. This study aims at determining the general awareness of cybercrimes, their perceptions across different demographic groups, and investigate the efficacy of current reporting procedures and preventive measures through a structured online questionnaire. The result of the study shows that though there is a growing awareness o
APA, Harvard, Vancouver, ISO, and other styles
12

Shah, Dr. Nileshkumar V. "Cyber Crime With Respect To Violation of Fundamental Rights." International Journal of Advance and Applied Research 5, no. 21 (2024): 64–67. https://doi.org/10.5281/zenodo.12705113.

Full text
Abstract:
<strong>Abstract :&nbsp; </strong> &nbsp;Fundamental rights are those that are absolutely necessary for one to live and be treated with dignity. These are the rights that aid citizens in achieving full growth in all areas of their lives. Life without internet is improbable existence in this era. Due to choice less need of internet, its extreme use made us victim of cyber fraud. A threat to people, property, governments, and societies has emerged from cybercrime. Legal mechanism introduced for regulating cyber frauds are lacking jacket proof formula to control crime through internet. Hence, fro
APA, Harvard, Vancouver, ISO, and other styles
13

Magliulo, Antonio. "Cyber Security and Tourism Competitiveness." European Journal of Tourism, Hospitality and Recreation 7, no. 2 (2016): 128–34. http://dx.doi.org/10.1515/ejthr-2016-0015.

Full text
Abstract:
AbstractUntil a few years ago, markets were basically physical spaces, more or less large, where sellers and buyers could meet. The exchanges happened through physical contacts at the local as well as the international level. Security meant, basically, to protect people against tangible threats (frauds, thefts etc.). Nowadays, we are facing a new challenge. Markets are mainly becoming a cyberspace where sellers, dealers and buyers can meet without the need for physical contact. Security also has to mean protecting people against cyber threats (internet frauds, identity thefts etc.). In this pa
APA, Harvard, Vancouver, ISO, and other styles
14

Crasta, Saritha. "ENHANCING CONSUMER VIGILANCE AND MITIGATING TACTICS AGAINST INTERNET SHOPPING FRAUD." Al-Shodhana 12, no. 2 (2024): 86–93. http://dx.doi.org/10.70644/as.v12.i2.7.

Full text
Abstract:
Cyber fraud poses a growing threat to individuals and organizations worldwide, exploiting vulnerabilities in online systems and human behaviours. By examining prevalent cyber fraud tactics, such as phishing, identity theft, and social engineering, the paper highlights key vulnerabilities and proposes effective countermeasures. It emphasizes the importance of consumer education, awareness campaigns, and technology-based solutions, such as two-factor authentication and real- time fraud detection systems. Additionally, the role of regulatory frameworks and industry collaboration in combating cybe
APA, Harvard, Vancouver, ISO, and other styles
15

Bhattacharya, Sumanta, Bhavneet Kaur Sachdev, Arpan Kundu, and Khewan Bansal. "IMPACT OF CYBER LAW IN MODERN ERA WITH ADVANCEMENT IN TECHNOLOGY AND PROTECTION FROM RISING THREATS OF CYBER CRIMES IN OUR SOCIO ECONOMIC SECTOR." International Journal of Advanced Research 9, no. 09 (2021): 274–79. http://dx.doi.org/10.21474/ijar01/13404.

Full text
Abstract:
Cyber space industry has made massive profit during this pandemic with everything going online along with the electronic industry in India , Today , Asia has the maximum population playing video gamers, the gaming industry is earning in billions , digital education , digital economy , work from home everything went online over night , which gave rise to cyber crime cases in India . India data is vulnerable and there is no cyber law which talks about privacy , more than 50% of the population lost their sensitive information online , there was cases of online job frauds and debit and credit frau
APA, Harvard, Vancouver, ISO, and other styles
16

Naik, Sadananda B., and Sangram Biradar. "Are Doctors Easy Targets for Cyber Frauds?" Bengal Physician Journal 12, no. 1 (2025): 34–37. https://doi.org/10.5005/jp-journals-10070-8081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

M, Manjunath, and Dr Selvi S. "A Study on Cyber Frauds Post Digitalization in India." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 1790–806. http://dx.doi.org/10.22214/ijraset.2024.60191.

Full text
Abstract:
Abstract: In the modern era of Digitalization, Digital banking has become more relevant due to the latest demonetization happened in India. The digitization of banking has made financial transactions swift and brought luxurious banking from anywhere, anytime. Indian government is not only encouraging using the cashless transactions but also providing financial benefits on digital transactions. As the usage of digital banking transactions increased, it introduced differenttypes of cyber frauds and the rate of fraudulent practices also got amplified, therefore sound knowledge of usage of digital
APA, Harvard, Vancouver, ISO, and other styles
18

Arora, Moulik Singh. "Threats, Effects, and Awareness of Cybercrime: A Survey." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32833.

Full text
Abstract:
The emergence of the digital age has ushered in unprecedented connectivity and convenience, but it has also brought about a surge in cybercrimes, posing significant challenges to security. Criminals exploit vulnerabilities in cyberspace to access sensitive information, perpetrate fraudulent activities, and undermine trust in online interactions. Despite the pervasive impact of cyber threats on various facets of society, awareness levels among the general populace remain a critical concern. This paper presents findings from a comprehensive survey aimed at assessing public awareness of cybercrim
APA, Harvard, Vancouver, ISO, and other styles
19

Idemili-Aronu, Ngozi, Ifeyinwa Angela Ajah, Oguejiofo C. P. Ezeanya, Joy Chikaodili Omaliko, and Oluchukwu Sunday Nwonovo. "Get Rich Syndrome: Examining the Fight against Cybercrime in Enugu State, Nigeria." International Journal of Criminology and Sociology 10 (October 8, 2021): 1390–96. http://dx.doi.org/10.6000/1929-4409.2021.10.159.

Full text
Abstract:
Despite the large scale provisions within the Nigerian legal framework that address the issue of cyber frauds, there is an alarming increase in cyber-offences in Nigeria. This necessitated the present study that employed semi-structured interviews to draw data from civil servants from grade level twelve and above and business owners aged 40 years and over [N = 34]. The study participants were recruited through a purposive sampling method and data were analyzed thematically. Results show that individuals and different organizations are often hit through direct hacking, malware planting, and man
APA, Harvard, Vancouver, ISO, and other styles
20

Kuzmenko, Olha V., Tetiana V. Dotsenko, and Liliia O. Skrynka. "Economic and Mathematical Modelling of the Effectiveness of the National System for Combatting Cyber Fraud and Legalisation of Criminal Proceeds Based on Survival Analysis Methods." Scientific Bulletin of Mukachevo State University Series “Economics” 8, no. 1 (2021): 144–53. http://dx.doi.org/10.52566/msu-econ.8(1).2021.144-153.

Full text
Abstract:
In modern world, the digitalisation of financial relations, the development of innovative technologies, and the emergence and use of cryptocurrencies for payments lead to an increase in the number of cyber frauds in the financial sector and their intellectualisation, increasing the illegal outflow of funds abroad. Ineffective decisions and inaction in counteracting these threats lead to large-scale negative consequences of both financial and social nature. The purpose of this study is to implement economic and mathematical modelling of the effectiveness of the national system for combatting cy
APA, Harvard, Vancouver, ISO, and other styles
21

Chaudhari, Tejas N., and Pratiksha K. Borse. "Understanding cyber fraud risks: How first-time internet users are targeted by scammers in Palghar, Maharashtra." International Journal of Advance and Applied Research 6, no. 25(B) (2025): 136–39. https://doi.org/10.5281/zenodo.15314801.

Full text
Abstract:
<strong>Abstract:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </strong> Beginners using the internet for the first time tend to not possess the required basic knowledge and skills that allow them to spot online scams easily which makes them fall easy prey to cyber frauds. This study focuses on the incidence of cyber fraud in new internet users, the reasons why they are at risk, and the role of cybersecurity knowledge in mitigating these risks. This research is derived from survey information collected from people with different demographic profile attributes. The results show alarming gaps
APA, Harvard, Vancouver, ISO, and other styles
22

Watney, Murdoch. "Exploring Cyber Fraud within the South African Cybersecurity Legal Framework." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 632–38. http://dx.doi.org/10.34190/eccws.23.1.2204.

Full text
Abstract:
All countries are globally struggling with the challenges cybercrime presents to the cybersecurity legal framework. Fraud is not a new crime and existed long before the internet. The internet provides a threat actor access to a lot of potential victims and the use of various threat vectors to gain access to personal information by means of social engineering. It is therefore not surprising that cyber fraud has become a serious threat which continues to escalate globally. In 2021, around $100 million was lost in Canada due to online fraud. The United Kingdom (UK) Finance indicated that cyber fr
APA, Harvard, Vancouver, ISO, and other styles
23

C.Meenakshi, Anisha Asirvatham,. "SmishSMS- The Latest Detection of SMS Phishing Trends." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 796–806. http://dx.doi.org/10.52783/tjjpt.v44.i4.936.

Full text
Abstract:
Banking frauds is an emergency issue of concern in today’s busy schedule of the people around the world which has left many banking organizations bankrupt, and also has led many customers to a deadly torment. It is a cyber-security attack, where each day the fraudsters are inventing newer techniques which uses Short Message Service (SMS) to steal the credentials of mobile users. This paper has recklessly examined the e-banking frauds, the different methods for detection of e-banking frauds, control of banking frauds and the challenges associated with the detection and control of e-banking frau
APA, Harvard, Vancouver, ISO, and other styles
24

Dotsenko, Tetiana, Hanna Yarovenko, and Darina Berezhna. "Due diligence in the aspect of countering financial cyber fraud: modeling trends." Economic Herald of SHEI USUCT 17, no. 1 (2023): 20–30. http://dx.doi.org/10.32434/2415-3974-2022-17-1-20-30.

Full text
Abstract:
The article emphasizes that financial cyber frauds pose a significant risk to the financial and economic security and stability of modern business entities. It was emphasized that in order to prevent fraud, in order increase the efficiency of economic activity, it is necessary to introduce a system of reliable protection of subjects based on the application of various mechanisms and tools, which include proper verification of the functioning of enterprises. Goal of the study is to determine the latest trends in modeling the fight against financial cyber fraud based on the Due Diligence methodo
APA, Harvard, Vancouver, ISO, and other styles
25

Subudhi, Srihari, Sahaja Akuthota, and Mayukha Anumula. "Cyber Frauds in India - An Investigation of Technological & Psychological Perspectives." International Journal of Science and Research (IJSR) 13, no. 11 (2024): 296–301. http://dx.doi.org/10.21275/sr241104223224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yarovenko, Hanna, Aleksandra Kuzior, and Alona Raputa. "The Modeling of the Probable Behaviour of Insider Cyber Fraudsters in Banks." Financial Markets, Institutions and Risks 7, no. 4 (2023): 155–67. http://dx.doi.org/10.61093/fmir.7(4).155-167.2023.

Full text
Abstract:
Insider cyber fraud in the banking sector is a serious and complex issue for financial institutions. This form of cyber fraud is particularly insidious due to insiders’ inherent access and knowledge, necessitating banks to implement comprehensive strategies for detecting, preventing, and responding to these internal threats. The aim of this study is to develop a scientific and methodological approach to model the probable behaviour of insider cyber fraudsters in banks based on a complex combination of principal component analysis, k-means clustering, and associative analysis. During the analys
APA, Harvard, Vancouver, ISO, and other styles
27

Saidov, Ibrokhim. "Understanding and analyzing the cyber risk in financial services." Общество и инновации 4, no. 6/S (2023): 322–28. http://dx.doi.org/10.47689/2181-1415-vol4-iss6/s-pp322-328.

Full text
Abstract:
This paper will closely look through all possible reasons for cybercrime, discuss those who commit the crime, bring some current actions which are being taken against online frauds, and propose some possible preventative regulations which may help to decrease the number of cybercrimes.
APA, Harvard, Vancouver, ISO, and other styles
28

JACOB OBAFEMI FATOKI. "The influence of cyber security on financial fraud in the Nigerian banking industry." International Journal of Science and Research Archive 9, no. 2 (2023): 503–15. http://dx.doi.org/10.30574/ijsra.2023.9.2.0609.

Full text
Abstract:
The study looked at Financial Institution in Nigeria for how cyber security affects financial fraud in Nigerian banks. The study focused on the following topics: the types of electronic frauds committed in the banking industry, the reasons why cyber fraud occurs in banks, the difficulties in preventing cyber fraud in banks, the impact of cyber fraud on Nigerian banks, and potential solutions for preventing cyber fraud in banks. The two hypotheses that the study is based on. Six Nigeria Banks made up the study's population, which used a survey research design. 557 bank employees were sampled us
APA, Harvard, Vancouver, ISO, and other styles
29

Waykar, Mrunmayee. "Fraud Detection using IBMs Differential Privacy Library." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 749–54. http://dx.doi.org/10.22214/ijraset.2023.56095.

Full text
Abstract:
Abstract: In the year 2022, a total of 602 billion rupees were lost on bank frauds consisting of over 9103 major fraudulent cases. Due to the increasing number of frauds all around the world, it is vital to safeguard consumers' privacy. There is a prediction of a spike in cyber credit fraud in the future years. There are currently various techniques for credit card fraud detection but all the ML models have lower accuracies and cannot cope with the real-time datasets as the transaction data is extremely confidential. To address this issue we have used differential privacy for fraud detection.
APA, Harvard, Vancouver, ISO, and other styles
30

Singh, Nimisha, and Abha Rishi. "Pyramid: A Case Study of Cyber Security in India." South Asian Journal of Business and Management Cases 4, no. 1 (2015): 135–42. http://dx.doi.org/10.1177/2277977915574046.

Full text
Abstract:
As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their app
APA, Harvard, Vancouver, ISO, and other styles
31

Vyas, Avinash, and Abdullah khalid. "Cyber Threats and Digital Forensic Accounting: Identifying Financial Frauds in Online Banking Transactions." Journal of Research & Development 17, no. 2 (2025): 52–59. https://doi.org/10.5281/zenodo.15064053.

Full text
Abstract:
<strong><em>Abstract:</em></strong> <em>The expansion of online banking has revolutionized financial transactions, enhancing accessibility and convenience for users. However, the increasing reliance on digital platforms has also led to a surge in cyber threats, including phishing, malware attacks, identity theft, and unauthorized transactions. Cybercriminals exploit system vulnerabilities, causing financial losses and reputational damage to financial institutions. Traditional fraud detection methods often fail to address the dynamic nature of cyber threats, necessitating the adoption of digita
APA, Harvard, Vancouver, ISO, and other styles
32

Haoxiang, Wang, and Smys S. "A Survey on Digital Fraud Risk Control Management by Automatic Case Management System." March 2021 3, no. 1 (2021): 1–14. http://dx.doi.org/10.36548/jeea.2021.1.001.

Full text
Abstract:
In this digital era, a huge amount of money had been laundered via digital frauds, which mainly occur in the timeframe of electronic payment transaction made by first-time credit/debit card users. Currently, Finance organizations are facing several fraud attempts and it likely happens due to the current infrastructure, which only has an older database.. The current infrastructure diminishes the working environment of any finance organization sector with frequent fraud attempts. In this perspective, the roposed research article provides an overview for the development of an automated prevention
APA, Harvard, Vancouver, ISO, and other styles
33

Shailaj, Kumar Shrivastava, and Kumar Amitesh. "PREDICTIVE ANALYTICS: PROACTIVE APPROACH TO COMBAT FRAUD AND CYBER ATTACKS." Journal of Emerging Technologies and Innovative Research 6, no. 6 (2019): 88–90. https://doi.org/10.5281/zenodo.10836707.

Full text
Abstract:
&nbsp; &nbsp;In ever-increasing era of digital world, all transactions of corporate, enterprise and governance goes digital. &nbsp;The execution of transactions are easier, efficient, timely, correctly and user friendly. There are wide variety of associated threats and vulnerability with it. These threats may be internal or external. One of the biggest and high cost threats is &lsquo;Fraud&rsquo;. Fraudulent activities have ability that can compromise integrity of organization and at the same time may cripple organizations bottom-line. &nbsp; As the volume of data increases, the possible and p
APA, Harvard, Vancouver, ISO, and other styles
34

Balaji Dhashanamoorthi. "Analyzing detection algorithms for cybersecurity in financial institutions." International Journal of Science and Research Archive 11, no. 2 (2024): 558–68. http://dx.doi.org/10.30574/ijsra.2024.11.2.0478.

Full text
Abstract:
Frauds in financial services are an ever-increasing phenomenon, and cybercrime generates multimillion revenues. Even a small improvement in fraud detection rates would lead to significant savings. Traditional rule-based systems have limitations in blocking potentially fraudulent transactions. This chapter explores how machine learning, specifically supervised and unsupervised learning, can address these limitations more effectively. We present a novel AI-based fraud detection system that combines supervised and unsupervised models. In the batch layer, transaction data undergoes pre-processing
APA, Harvard, Vancouver, ISO, and other styles
35

Ramesh, K. P., R. Amudha, K. Prasob, and K. S. Kanna. "Fintech innovations in E-payments: Privacy and security in cybercrime threats." Multidisciplinary Science Journal 5 (August 29, 2023): 2023ss0320. http://dx.doi.org/10.31893/multiscience.2023ss0320.

Full text
Abstract:
The digitalization challenges in the e-commerce world provide ample opportunities and advantages for the corporates, financial institutions and the consumers but also have posed several threats in the form of financial thefts and cyber frauds. The Fintech innovations have brought in effective solutions for many fraud detections and poised to have a controlled safety and security systems in handling the financial and other commercial transactions, most specifically in the fund transfers and other payment processes in the Electronic Payments Systems (EPS) in the current era. Absence of security
APA, Harvard, Vancouver, ISO, and other styles
36

Dr UzohNzekwe E, Dr UzohNzekwe E. "Cyber Fraud, Causes and Its Effect on Money Deposit Banks." Journal of Software Engineering and Simulation 10, no. 10 (2024): 61–70. http://dx.doi.org/10.35629/3795-10106170.

Full text
Abstract:
The study examined cyber fraud, causes and its effect on money deposit banks (DMB) in Nigeria: a study of Zenith Bank. The main objective is to examine electronic frauds, causes and its challenges in the banking sector. The study is hinged on two hypotheses; 49 branches; sample of 557 staff. Structured questionnaire was used to capture the response of the bank staff and it was analyzed using statistical package for social science version 27 (SPSS). Descriptive statistics and multiple regression were employed in the data analysis. Among the findings were accounting fraud by bank staff, identity
APA, Harvard, Vancouver, ISO, and other styles
37

Ahire, Prof Pritam. "A Survey on Malware detection using ML." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 314–24. http://dx.doi.org/10.22214/ijraset.2022.39813.

Full text
Abstract:
Abstract: This Malware detection is a field of computer security that deals with the study and prevention of malicious software. It is not the only way to defend a company against a cyber- attack. In order to be effective, companies should analyse their risk and identify the vulnerabilities. In this paper, we will examine different techniques used to detect computer malware and malicious websites as well as future directives in this area of study and also, we will discuss the growth in computer malware and how traditional methods of detection are being replaced by innovative techniques like be
APA, Harvard, Vancouver, ISO, and other styles
38

Bhanushali, Aastha. "AI-Driven Cybersecurity: A Cornerstone of National Security Amidst Emerging Threats and Innovative Solutions." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1265–69. https://doi.org/10.22214/ijraset.2025.67522.

Full text
Abstract:
In the current digital environment, cybersecurity has emerged as a key component of national security. Advanced defences have become necessary due to the quick evolution of cyberthreats, such as ransomware, cyberwarfare, and AI-driven attacks. Artificial intelligence (AI) including into cybersecurity systems has transformed security automation, incident response, and threat detection. The influence of AI in cybersecurity, new threats, legal frameworks governing cyber laws, real-world case studies of cyber frauds, and AI-driven cybersecurity solutions are all covered in this research paper. Add
APA, Harvard, Vancouver, ISO, and other styles
39

Sumaira Hassan, Muhammad Shafiullah, Ali Ahmed, and Fahim Muhammad Khan. "Advances in AI to Predict and Prevent Cyber Security Attacks: A Comprehensive Analysis of Modern World." Physical Education, Health and Social Sciences 3, no. 1 (2025): 47–55. https://doi.org/10.63163/jpehss.v3i1.209.

Full text
Abstract:
The following research paper emphasis over the importance of AI and it’s one component that is Cyber Security that has now became an essential part to address CS threats &amp; frauds and detect any more attacks while mitigating issues arises from it. The research paper discovers hidden significance of AI in cyber security that emphasize on advanced machine learning algorithms predictive analytics and automatic to enhance thread detections and response mechanisms. The global use of artificial intelligence in cyber security is not just restricted to one state but it is now becoming the essential
APA, Harvard, Vancouver, ISO, and other styles
40

Erondu, Chinyere Iheoma, and Udochukwu Iheanacho Erondu. "The Role of Cyber security in a Digitalizing Economy: A Development Perspective." International Journal of Research and Innovation in Social Science VII, no. XI (2023): 1558–70. http://dx.doi.org/10.47772/ijriss.2023.7011121.

Full text
Abstract:
A transforming economy undergoes several transformations including digitalization. The 21st-century economy must be driven on the wheels of digital technologies that cannot be wished away. This requires protecting vital information in the digital space with an increasing number of actual cyber-attacks and cyber frauds. The economy remains the base of any society and determines its level of development, any form of compromise in this institution spells doom for its various organizations or arms. There is a need to protect vital information which is key to development in any sector. Therefore, t
APA, Harvard, Vancouver, ISO, and other styles
41

Koibichuk, Vitaliia, Natalia Ostrovska, Flora Kashiyeva, and Aleksy Kwilinski. "Innovation technology and cyber frauds risks of neobanks: gravity model analysis." Marketing and Management of Innovations, no. 1 (2021): 253–65. http://dx.doi.org/10.21272/mmi.2021.1-19.

Full text
Abstract:
In the system of global information space, it is important to adequately calculate and assess the factors of successful functioning of the banking system, which are directly the engines of the country's development, economic stability, especially from the standpoint of qualitative measurement of innovative technology and human capital in rapid cyber fraud. The work is devoted to studying factors that describe the components of efficiency and potential use of innovative technologies in neo-banking in 90 countries to determine the level of risk of their use for money laundering based on gravitat
APA, Harvard, Vancouver, ISO, and other styles
42

Sakshi Vashisth. "A Study on Emerging Trends of Cyber Frauds and Digitalization in India Including Financial Cybercrime Legal Implications." Journal of Information Systems Engineering and Management 10, no. 47s (2025): 690–96. https://doi.org/10.52783/jisem.v10i47s.9330.

Full text
Abstract:
Since the most recent demonetization in India, digital banking has grown in importance in the current era of digitalization. The digitization of banking has made fast financial transactions and opulent banking from anywhere at any time possible. In addition to promoting cashless transactions, the Indian government is offering financial. The current study aims to identify the many causes of fraud in the Indian banking sector and illustrate the types of fraud that have occurred since the banking industry went digital. Since India's recent demonetization, digital banking has grown in importance i
APA, Harvard, Vancouver, ISO, and other styles
43

Rao, K. Srinivas, V. Harsha Shastri, and RK Raman. "A comprehensive study of fraudulent activities on social media networks." International Journal of Science and Social Science Research 2, no. 2 (2024): 248–57. https://doi.org/10.5281/zenodo.13733964.

Full text
Abstract:
In the last few years social networks are gaining a vital importance and its popularity is tremendous. We can say that social media has become a part of the every one lives. Social media networks are widely used by people for various purposes like interactions, looking for opportunities in business and career, entertainment and so-on. But it has evidently shown that there are lot of frauds taking place through these online platforms. It has become a wide cyber threat in these social media sites. Especially the targets are those people who look for business opportunities, work from home job opp
APA, Harvard, Vancouver, ISO, and other styles
44

Aftab Ahmad Malik, Dr Aftab Ahmad Malik. "Effective Prosecution to Support Digital Forensic Evidence during Investigation and Court Proceedings." International Journal for Electronic Crime Investigation 2, no. 2 (2018): 7. http://dx.doi.org/10.54692/ijeci.2018.020213.

Full text
Abstract:
Firstly, the purpose of this work is to highlight the significance of digital evidence that exists in the form of digital data and is to be presented in court of law. Secondly, how this evidence (the digital information) can be effectively used during investigation process by the investigating agency. Thirdly, essence of keeping up continued liaison by investigating agency with the prosecutor who is to defend the prosecution side in the court. This paper deals with the offences carried out by offenders using computer, internet, digital media, other electronic devices, hacking and tracking the
APA, Harvard, Vancouver, ISO, and other styles
45

Shaukat, Kamran, Suhuai Luo, Vijay Varadharajan, et al. "Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity." Energies 13, no. 10 (2020): 2509. http://dx.doi.org/10.3390/en13102509.

Full text
Abstract:
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief r
APA, Harvard, Vancouver, ISO, and other styles
46

Islam, Muhammad Tanbirul, Md Fokhrul Islam, and Juairiya Sawda. "E-Commerce and Cyber Vulnerabilities in Bangladesh." International Journal of Law and Society (IJLS) 1, no. 3 (2022): 184–202. http://dx.doi.org/10.59683/ijls.v1i3.24.

Full text
Abstract:
The e-commerce growth scenario is forging a new dynamism in business and does not offer time-bound, cost-effective and hassle-free buying and selling. Following the changing approach, security management in e-commerce (cyber security) is now a focus. This research is a qualitative research that uses a case study method to analyze risks and vulnerabilities in the field. People in Bangladesh are primarily unaware of the risks related to using computing and digital devices and online platforms. This article articulates the risk factors associated with the growing reliance on digital technologies
APA, Harvard, Vancouver, ISO, and other styles
47

Raj CA, Riya. "A Review on the Application of Lifestyle-Routine Activity Theory in Cyber Criminology." International Journal of Forensic Sciences 9, no. 3 (2024): 1–4. http://dx.doi.org/10.23880/ijfsc-16000401.

Full text
Abstract:
In an age dominated by technology across all facets of living, the rise of cybercrime emerges as a significant issue for the individuals. The integration of lifestyle-routine activity theory (L-RAT) in the field of cyber criminology offers a robust framework for understanding the dynamics of online victimization. This review paper explores how L-RAT can be useful in detecting the unique characteristics of cybercrime. By examining the key components of L-RAT like motivated offenders, suitable targets and the absence of capable guardians by demonstrating its relevance in digital context. This re
APA, Harvard, Vancouver, ISO, and other styles
48

Devarasetty, Narendra. "AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems." International Journal of Scientific Research and Management (IJSRM) 12, no. 01 (2024): 1038–73. https://doi.org/10.18535/ijsrm/v12i01.ec05.

Full text
Abstract:
Cyber fraud is experienced in digital ecosystems, and it is very dangerous to organizational and individuals’ experiments. The general approaches to fraud detection work well in stable environments but are incapable of the real-time results required by modern digital spaces. This article aims to demonstrate how artificial intelligence (AI) can complement approaches for data engineering to meet these challenges. When AI models are supported with strong data feeds, organising can, therefore, identify fraudulent activities in real-time, thereby reducing losses and encouraging a safe digital econo
APA, Harvard, Vancouver, ISO, and other styles
49

Гончарова, М. В., and В. И. Шиян. "Cyber fraud is an actual threat to the security of the Internet of Things." Вестник Московской академии Следственного комитета Российской Федерации, no. 1(35) (March 14, 2023): 28–34. http://dx.doi.org/10.54217/2588-0136.2023.35.1.002.

Full text
Abstract:
Развитие науки и техники, глобализация информационных процессов, виртуализация жизнедеятельности, продолжающийся рост количества подключенных к Интернету устройств и программных комплексов, расширение спектра их применения до постоянного и повсеместного – от индивидуальных пользователей до промышленных масштабов; при межотраслевом взаимодействии; в национальных и межгосударственных рамках – обусловило переход от так называемого интернета людей к интернету вещей. В современных условиях актуальную угрозу безопасности интернета вещей представляет кибермошенничество. Цель исследования: на основе и
APA, Harvard, Vancouver, ISO, and other styles
50

Aamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan." Strategic Studies 39, no. 1 (2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.

Full text
Abstract:
With the rapid developments in the cyberspace domain, Pakistan has emerged as one of the fastest growing digital economies in the world. Pakistan’s internet penetration and teledensity are increasing exponentially, resulting in greater global connectivity. However, this connectivity has become a tool and target of conflict, crime and crisis which varies with respect to nature, occurrence and power. Pakistan is exposed to multidimensional cyber threats like computer malware, identity theft, economic data theft, cyber frauds and espionage attempts on critical infrastructures. However, the state
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!