Dissertations / Theses on the topic 'Detection and prevention of fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Detection and prevention of fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Schillermann, Marcia. "Early Detection and Prevention of Corporate Financial Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6117.
Full textABEI, YOLANDA AJI. "Impact of Internal Control on Fraud Detection and Prevention in Microfinance Institutions." Thesis, Karlstads universitet, Avdelningen för företagsekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85431.
Full textFadayo, Matthew. "An examination of e-banking fraud prevention and detection in Nigerian banks." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/17520.
Full textOliveira, Rossimar Laura. "Gestão de fraudes financeiras externas em bancos." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/96/96132/tde-21122012-111004/.
Full textAccording to KPMG audit report, 69% of companies admitted being victims of some kind of fraud. In 2010, the banking sector have lost approximately R$ 1.5 billion due to financial fraud perpetrated on customers considering only documentary fraud and the electronic banking fraud losses exceeded R$ 900 million in the same year. The types of fraud were many, including fraud during account opening, cloned checks, forgery, alteration barcode and card cloning. Fraud is a common problem in organizations and widely discussed in the market, however it was found that there is a theoretical gap when it comes to managing external fraud. The objective of this research was to structure a conceptual framework for the Management of Fraud and its comparison with the practice. This is an exploratory qualitative study and was conducted through analysis based on Grounded Theory defining categories from the available literature and interviews with comparison to a bank and an association of financial institutions, in addition to news articles. Regarding the use of results is an applied research its result can also contribute to the theoretical discussion, and be applied to any organization interested in managing financial fraud. The results of the development of the conceptual framework shows that the management of external financial fraud has four phases: Continuous, Prevention, Detection and Reaction and the defined categories are located in them. Regarding the comparison of theory with practice, not all aspects verified in the literature could be found in the reports of interviews and newspaper articles analyzed.
Efiong, Eme Joel. "An exploration of forensic accounting education and practice for fraud prevention and detection in Nigeria." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/10118.
Full textAbiola, James. "The impact of information and communication technology on internal control's prevention and detection of fraud." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9496.
Full textMuthusamy, Gunasegaran. "Behavioral intention to use forensic accounting services for the detection and prevention of fraud by large Malaysian companies." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/216.
Full textExnerová, Irena. "Podvody, možné způsoby jejich prevence a jejich odhalování." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-15787.
Full textHradilová, Zuzana. "Pojistné podvody." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2014. http://www.nusl.cz/ntk/nusl-232859.
Full textHašková, Kristýna. "Podvod a audit." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-142209.
Full textKonopíková, Marie. "Pojistné podvody." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-205812.
Full textDepuru, Soma Shekara. "Modeling, Detection, and Prevention of Electricity Theft for Enhanced Performance and Security of Power Grid." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341522225.
Full textRücklová, Žaneta. "Techniky podvodného jednání a forenzní šetření." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-198862.
Full textGažová, Iva. "Pojistné podvody." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-232511.
Full textBeraldi, Fidel. "Atualização dinâmica de modelo de regressão logística binária para detecção de fraudes em transações eletrônicas com cartão de crédito." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-05022015-232801/.
Full textRegarding technological and economic development, which made communication process easier and increased purchasing power, credit card transactions have become the primary payment method in national and international retailers (Bolton e Hand , 2002). In this scenario, as the number of transactions by credit card grows, more opportunities are created for fraudsters to produce new ways of fraud, resulting in large losses for the financial system (Chan et al. , 1999). Fraud indexes have shown which e-commerce transactions are riskier than card present transactions, since those do not use secure and efficient processes to authenticate the cardholder, such as using personal identification number (PIN). Due to fraudsters adapt quickly to fraud prevention measures, statistical models for fraud detection need to be adaptable and flexible to change over time in a dynamic way. Raftery et al. (2010) developed a method called Dynamic Model Averaging (DMA), which implements a process of continuous updating over time. In this thesis, we develop DMA models within electronic transactions coming from ecommerce environment, which incorporate the trends and characteristics of fraud in each period of analysis. We have also developed classic logistic regression models in order to compare their performances in the fraud detection processes. The database used for the experiment was provided by a electronic payment service company. The experiment shows that DMA models present better results than classic logistic regression models in respect to the analysis of the area under the ROC curve (AUC) and F measure. The F measure for the DMA was 58% while the classic logistic regression model was 29%. For the AUC, the DMA model reached 93% and the classical model reached 84%. Considering the results for DMA models, we can conclude that its update over time characteristic makes a large difference when it comes to the analysis of fraud data, which undergo behavioral changes continuously. Thus, its application has proved to be appropriate for the detection process of fraudulent transactions in the e-commerce environment.
Howell, Andrew S. "Fraud prevention : the alignment between fraud-related legislation and fraud government practices." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/104398/1/Andrew_Howell_Thesis.pdf.
Full textPhillips, Thurman B., and Raymond J. Lanclos. "Data analytics in procurement fraud prevention." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42708.
Full textThe purpose of this research project is to explore the viability of detecting anomalies through using data analytics software as a tool in procurement fraud prevention and to analyze its potential policy implications on federal procurement stakeholders. According to a survey conducted in 2012 by the Association of Certified Fraud Examiners, organizations lose an estimated 5% of their revenues to fraud each year. In order to relate this estimate to the Department of Defense (DOD), this estimated percentage was applied to the requested DOD FY 2013 budget of $613.9 billion outlined in the Fiscal Year 2013 Budget Overview, resulting in a projected total fraud loss of $30.7 billion. The use of data analytics software has the potential to not only detect fraudulent procurements, but also to help deter fraudulent activities before they occur. The results of this research study will be a recommendation on the use of data analytics as a tool to detect anomalies that may indicate procurement fraud in DOD organizations.
Gill, Karen Ann. "Insurance fraud : causes, characteristics and prevention." Thesis, University of Leicester, 2014. http://hdl.handle.net/2381/29106.
Full textOliveira, Paulo Henrique Maestrello Assad. "Detecção de fraudes em cartões: um classificador baseado em regras de associação e regressão logística." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-01022016-204144/.
Full textCredit and debit cards are two methods of payments highly utilized. This awakens the interest of fraudsters. Businesses see fraudulent transactions as operating costs, which are passed on to consumers. Thus, the high number of transactions and the necessity to combat fraud stimulate the use of machine learning algorithms; among them, rule-based classifiers. However, a weakness of these classifiers is that, in practice, they are highly dependent on professionals who detect patterns of fraudulent transactions, transform them into rules and implement these rules in the classifier. Knowing this scenario, the aim of this thesis is to propose an architecture based on association rules and logistic regression - techniques studied in Machine Learning - for mining rules on data and produce rule sets to detect fraudulent transactions and make them available to experts. As a result, these professionals will have the aid of computers to discover the rules that support the classifier, decreasing the chance of having non-discovered fraudulent patterns and increasing the efficiency of generate and maintain these rules. In order to test the proposal, the experimental part of the thesis has used almost 7.7 million transactions provided by a real company. Moreover, after a long process of analysis of the database, 141 characteristics were combined using the algorithm FP-Growth, generating 38,003 rules. After a process of filtering and selection, they were grouped into five sets of rules which the biggest one has 1,285 rules. Each of the five sets was subjected to logistic regression, so their rules have been validated and weighted by statistical criteria. At the end of the process, the goodness of fit tests were satisfied and the performance indicators have shown very good classification powers (AUC between 0.788 and 0.820). In conclusion, the combined application of statistical techniques - cost sensitive learning, association rules and logistic regression - proved being conceptually and theoretically cohesive and coherent. Finally, the experiment and its results have demonstrated the technical and practical feasibilities of the proposal.
Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.
Full textTitle from opening screen, December 28, 1999.
Ayamga, Dominic. "TELECOMMUNICATION FRAUD PREVENTION POLICIES AND IMPLEMENTATION CHALLENGE." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69730.
Full textRahman, Md Mizanur. "Search Rank Fraud Prevention in Online Systems." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3909.
Full textLu, Yifei. "Deep neural networks and fraud detection." Thesis, Uppsala universitet, Tillämpad matematik och statistik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-331833.
Full textDomingues, Rémi. "Machine Learning for Unsupervised Fraud Detection." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-181027.
Full textJurgovsky, Johannes. "Context-aware credit card fraud detection." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI109.
Full textCredit card fraud has emerged as major problem in the electronic payment sector. In this thesis, we study data-driven fraud detection and address several of its intricate challenges by means of machine learning methods with the goal to identify fraudulent transactions that have been issued illegitimately on behalf of the rightful card owner. In particular, we explore several means to leverage contextual information beyond a transaction's basic attributes on the transaction level, sequence level and user level. On the transaction level, we aim to identify fraudulent transactions which, in terms of their attribute values, are globally distinguishable from genuine transactions. We provide an empirical study of the influence of class imbalance and forecasting horizons on the classification performance of a random forest classifier. We augment transactions with additional features extracted from external knowledge sources and show that external information about countries and calendar events improves classification performance most noticeably on card-not-present transaction. On the sequence level, we aim to detect frauds that are inconspicuous in the background of all transactions but peculiar with respect to the short-term sequence they appear in. We use a Long Short-term Memory network (LSTM) for modeling the sequential succession of transactions. Our results suggest that LSTM-based modeling is a promising strategy for characterizing sequences of card-present transactions but it is not adequate for card-not-present transactions. On the user level, we elaborate on feature aggregations and propose a flexible concept allowing us define numerous features by means of a simple syntax. We provide a CUDA-based implementation for the computationally expensive extraction with a speed-up of two orders of magnitude. Our feature selection study reveals that aggregates extracted from users' transaction sequences are more useful than those extracted from merchant sequences. Moreover, we discover multiple sets of candidate features with equivalent performance as manually engineered aggregates while being vastly different in terms of their structure. Regarding future work, we motivate the usage of simple and transparent machine learning methods for credit card fraud detection and we sketch a simple user-focused modeling approach
Dahabiyeh, Laila Ali. "IS security networks in credit card fraud prevention." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/88609/.
Full textEdmonds, Mark Allen. "THE INVISIBLE FRAUD: THE IMPACT OF INATTENTIONAL BLINDNESS ON AUDITOR FRAUD DETECTION." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/dissertations/1153.
Full textWesterlund, Fredrik. "CREDIT CARD FRAUD DETECTION (Machine learning algorithms)." Thesis, Umeå universitet, Statistik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-136031.
Full textYau, Kin-pong Harry. "The role of accountants in fraud detection." Click to view the E-thesis via HKUTO, 2000. http://sunzi.lib.hku.hk/hkuto/record/B42575552.
Full textRose, Lydia M. "Modernizing Check Fraud Detection with Machine Learning." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=13421455.
Full textEven as electronic payments and virtual currencies become more popular, checks are still the nearly ubiquitous form of payment for many situations in the United States such as payroll, purchasing a vehicle, paying rent, and hiring a contractor. Fraud has always plagued this form of payment, and this research aimed to capture the scope of this 15th century problem in the 21st century. Today, counterfeit checks originating from overseas are the scourge of online dating sites, classifieds forums, and mailboxes throughout the country. Additional frauds including alteration, theft, and check kiting also exploit checks. Check fraud is causing hundreds of millions in estimated losses to both financial institutions and consumers annually, and the problem is growing. Fraud investigators and financial institutions must be better educated and armed to successfully combat it. This research study collected information on the history of checks, forms of check fraud, victimization, and methods for check fraud prevention and detection. Check fraud is not only a financial issue, but also a social one. Uneducated and otherwise vulnerable consumers are particularly targeted by scammers exploiting this form of fraud. Racial minorities, elderly, mentally ill, and those living in poverty are disproportionately affected by fraud victimization. Financial institutions struggle to strike a balance between educating customers, complying with regulations, and tailoring alerts that are both valuable and fast. Applications of artificial intelligence including machine learning and computer vision have many recent advancements, but financial institution anti-fraud measures have not kept pace. This research concludes that the onus rests on financial institutions to take a modern approach to check fraud, incorporating machine learning into real-time reviews, to adequately protect victims.
Dan, Gorton. "Aspects of Modeling Fraud Prevention of Online Financial Services." Doctoral thesis, KTH, Transportvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176298.
Full textFinansiella nättjänster är en del av vår kritiska infrastruktur. På så vis utgör de en akilleshäl i samhället och måste skyddas på erforderligt sätt. Under de senaste tio åren har det skett en förskjutning från traditionella dataintrång för att visa upp att man kan till en it-brottslighet med stora ekonomiska konsekvenser för samhället. De olika hoten mot nättjänster har blivit värre och riskhantering med avseende på överbelastningsattacker, nätfiske och banktrojaner är nu en del av dagordningen för finansiella institutioner. Denna trend övervakas av ansvariga myndigheter som efterhand ökar sina minimikrav för riskhantering och bland annat kräver regelbunden riskbedömning av befintliga och nya hot.För den finansiella institutionen skapar denna situation ett behov av att förstå alla delar av incidenthanteringsprocessen, inklusive dess teknik, delprocesser och de resurser som kan arbeta med bedrägeribekämpning. Traditionellt har varje motåtgärds effektivitet mätts, om möjligt, för en teknik i taget, vilket leder till att ansvariga för bedrägeribekämpning får separata värden för autentisering, intrångsdetektering och bedrägeridetektering.I denna avhandling har vi fokuserat på två problem med denna situation. För det första finns det ett behov av ett verktyg som kan modellera effektiviteten för institutionens samlade motåtgärder mot bakgrund av befintliga och nya hot. För det andra saknas det tillgång till data för forskning rörande bedrägeridetektering, vilket hämmar utvecklingen inom området.I huvuddelen av avhandlingen ligger tonvikten på att studera ”hela” incidenthanteringsprocessen istället för att fokusera på en teknik i taget. I den första artikeln presenterar vi ett verktyg som gör det möjligt att mäta effektiviteten i incidenthanteringsprocessen. Vi kallar detta verktyg för ”incident response tree” (IRT) eller ”incidenthanteringsträd”. I den andra artikeln presenterar vi ett flertal scenarier som är relevanta för riskhantering av finansiella nättjänster med hjälp av IRT. Vi utvecklar också en kompletterande modell som är inspirerad av befintliga modeller för att mäta kreditrisk. Med hjälp av scenarioberoende mått för ”förväntat bedrägeri” och ”value at risk”, har vi möjlighet att jämföra risker mellan olika nättjänster. Slutligen, i den tredje artikeln, skapar vi ett agentbaserat simuleringsverktyg som gör det möjligt att använda scenariospecifika resultat tillsammans med modeller som ”avkastning på säkerhetsinvesteringar” för att stödja beslut om framtida investeringar i motåtgärder.I den andra delen av avhandlingen utvecklar vi en metod för att generera syntetiskt data för test av bedrägeridetektering. I den fjärde artikeln presenterar vi ett agentbaserat simuleringsverktyg som med hjälp av bland annat ”sociala nätverksanalyser” kan användas för att generera syntetiskt data med realistiskt utseende. I den femte artikeln fortsätter vi detta arbete genom att lägga till en plattform för testning av bedrägeridetektering.
QC 20151103
Perols, Johan L. "Detecting Financial Statement Fraud: Three Essays on Fraud Predictors, Multi-Classifier Combination and Fraud Detection Using Data Mining." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002486.
Full textBrawerman, Alessandro. "A Fraud-Prevention Framework for Software Defined Radio Mobile Devices." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7162.
Full textReaves, Michael Leland. "Healthcare Inequality & Fraud Prevention: Paternalism Justified to Enable Choice." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/579024.
Full textAmaya, de la Pena Ignacio. "Fraud detection in online payments using Spark ML." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219916.
Full textBedrägerier vid online-betalningar medför stora förluster, så företag bygger bedrägeribekämpningssystem för att förhindra dem. I denna avhandling studerar vi hur maskininlärning kan tillämpas för att förbättra dessa system. Tidigare studier har misslyckats med att hantera bedrägeribekämpning med verklig data, ett problem som kräver distribuerade beräkningsramverk för att hantera den stora datamängden. För att lösa det har vi använt betalningsdata från industrin för att bygga en klassificator för bedrägeridetektering via Spark ML. Obalanserade klasser och icke-stationäritet minskade träffsäkerheten hos våra modeller, så experiment för att hantera dessa problem har utförts. Våra bästa resultat erhålls genom att kombinera undersampling och oversampling på träningsdata. Att använda bara den senaste datan och kombinera flera modeller som ej har tränats med samma data förbättrar också träffsäkerheten. En slutgiltig modell har implementerats hos Qliro, en stor leverantör av online betalningar i Norden, vilket har förbättrat deras bedrägeribekämpningssystem och hjälper utredare att upptäcka bedrägerier som tidigare missades.
Dal, Pozzolo Andrea. "Adaptive Machine Learning for Credit Card Fraud Detection." Doctoral thesis, Universite Libre de Bruxelles, 2015. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/221654.
Full textDoctorat en Sciences
info:eu-repo/semantics/nonPublished
Zhou, Zhihong. "Applying manufacturing batch techniques to customer fraud detection /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?IEEM%202004%20ZHOU.
Full textIncludes bibliographical references (leaves 39-42). Also available in electronic version. Access restricted to campus users.
Riney, Felicia Ann. "A qualitative study| Being proactive in detecting and preventing fraud in the post Sarbanes-Oxley era." Thesis, University of Phoenix, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10164149.
Full textThe purpose of this study is to apply the qualitative research method of descriptive single-case study design to explore the phenomenon of fraud in companies in the state of Arkansas by conducting face-to-face interviews with mid-level officers, distributing questionnaires to upper-level officers, and reviewing company documentation in the retail, professional services, or manufacturing industries in Arkansas. The focus is to understand the phenomenon of fraud and company officers’ perceptions about tools for detecting and preventing fraud. Financial statement fraud tactics make up 9% of the fraud cases globally, which equates to a median loss of $1 million (Association of Certified Fraud Examiners, 2014). The research method involves the triangulation of data from interviewing mid-level company officers, distributing questionnaires to upper-level company officers, and reviewing organizational policy and procedure documents. Interviews will consist of at least 20–35 participants in a mid-level officer position to ascertain their perceptions about the fraud triangle as a tool and the Baldrige Criteria for Performance Excellence (BCPE) as a framework, a questionnaire will be distributed to upper-level officers to confirm/disconfirm themes, and company historical documents will be reviewed. Because officers are accountable for the accuracy of financial reporting and the ethical conduct of employees, establishing methods for detecting and preventing fraud averts fraudulent acts such as the embezzlement, false reporting, or bribery.
Bergman, Bengt. "E-fraud E-fraud, state of the art and counter measures." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2798.
Full textThis thesis investigates fraud and the situation on Internet with e-commerce today, to point on some potential threats and needed countermeasures. The work reviews several state of the art e-fraud schemes, techniques used in the schemes and statistics on the extent of e-fraud. This part shows that e-frauds are today both sophisticated and widespread.
Since real world frauds are deemed impossible to fully cover in order to predict potential new e-frauds, the thesis adopts a different approach. It suggests two abstraction models for fraud cases, a protocol model and a functional model. These are used to perform analysis on case studies on both telecom frauds and e-frauds. The analysis presents characteristics for both types of frauds. Using one of the abstraction models, the functional model, conceptually similar cases among telecom frauds as well as e-fraud cases are identified. The similar cases in each category are then compared, using the other abstraction model, the protocol model. The study shows that concepts from telecom frauds already exist in e-frauds.
Several challenges and some possibilities in e-fraud prevention and detection are also extracted in the comparative study of the different categories. The major consequence of the challenges is e-frauds’ higher scalability compared to telecom frauds.
Finally, this thesis covers several existing countermeasures in e-commerce along with specific countermeasures against auction fraud, phishing and spam. However, it is shown that these countermeasures do not address the challenges in e-fraud prevention and detection to a satisfactory extent. Therefore, this thesis proposes several high-level countermeasures in order to address the challenges.
Taylor, Gordon Douglas. "Actions Taken by Texas School Districts to Prevent Fraud." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68052/.
Full textSlezak, Kathleen. "Fraud Prevention and Employee Rationalization in New York State Public Schools." Thesis, State University of New York at Albany, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3611898.
Full textPrompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that an integral element is being overlooked in current fraud prevention efforts, namely employee attitudes (more formally rationalization).
In an effort to fill this gap, management and accounting literature is used to identify ten specific practices associated with a decreased likelihood of fraud rationalization in the business setting. Primary research is then used to ascertain the extent to which these business practices have been implemented in New York State public schools. HLM is used to examine the nature of the relationship between the presence of these practices within a school district and employee attitudes about rationalization, as a proxy measure of fraud risk.
Data concerning both district practices and employee attitudes about fraud were collected using an online survey of 938 employees from 56 randomly selected K-12 school districts in New York State. Findings reveal low or non-existent levels of district implementation for eight of the ten suggested fraud prevention strategies. However, where strategies have been implemented, employees are less likely to report rationalization about fraud. (As the number of strategies increases, rationalization tends to decrease.) The effect of individual strategies is examined. Several district and employee demographic factors are also found to have mitigating effects.
Based on the results of this research and analysis, specific recommendations are presented in an attempt to improve school district fraud prevention efforts. The analysis also suggests areas where follow-up research studies are warranted in light of this new base-line data.
Adawiah, Engku Rabiah. "Securities regulation and the prevention of securities fraud : a comparative study." Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU532150.
Full textKappelin, Frida, and Jimmie Rudvall. "Fraud Detection within Mobile Money : A mathematical statistics approach." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10898.
Full textAborbie, Solomon. "Narrowing the Gap of Financial Fraud Detection in Corporations." Thesis, Walden University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3688003.
Full textBusiness leaders remain exposed to financial and accounting fraud as well as loss of profitability, despite the dictates of the SOX Act of 2002. The most challenging aspect of corporate management is the unexpected nature of an emerging, existing, or an inherent financial risk. Guided by the evolution of fraud theory, this exploratory case study's purpose was to identify and explore the financial management strategies that corporate financial managers need to adequately protect investors. Twenty participants from a population group of corporate auditors of Fortune 1000 corporations within 70 miles of Columbus, Ohio provided input for this study. Data from the interviews were analyzed through coding, reviewing, categorizing, and combining common statements. The research findings included themes of knowledge and types of risks; the impact of financial fraud and risks on investment; the impact of accounting, auditing, and financial reporting standards; as well as financial management training to minimize audit expectations. These themes formed the focus of exploring the financial management strategies that corporate financial managers need to adequately protect investors and investments. In addition to the antifraud measures, financial managers may detect and control inherent risks in emerging opportunities for positive social change that includes enhanced knowledge in diversification of investments, an increase in economic resources, economic growth, and greater employment in the United States.
Liao, Chen-Yin, and 廖芝吟. "VoIP Dial Fraud Prevention and Detection." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/50557102922694736885.
Full text大同大學
資訊工程學系(所)
100
Due to the low cost of VoIP, it attracts many companies to introduce the technology into the enterprise for internal use to reduce the cost of communication. However, it is quite often that the user confidential information is stolen. In this case, the hacker may impersonate the user to make high cost calls. The extra telephone charges must be paid by the user. This vulnerability of VoIP has also become a major threat of enterprise information security. This study first proposes the basic security setting, which is often overlooked, for enterprises to implement the VoIP system in order to avoid hacker attacks. For the situation that the user confidential information is being stolen and the hacker try to impersonate the user to make calls, this study proposes two monitoring rules. One is the detection of suspicious registration message such that we can detect in the early stage whether the hacker want to steal confidential information. Another rule is to detect user abnormal conditions to judge whether the account has been stolen and is used to call the high cost phone. The proposed rules can detect a problem and send message to notify administrator to process in advance. According to the experimental results, the more messages being collected, the detection rate will get higher.
Lin, Jung-Cheng, and 林榮政. "Prevention of Fraud Crime Via Face Detection." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/44975943067784793774.
Full text國立臺北教育大學
資訊科學系碩士班
103
Gang of scammers often defrauds people by pretending to be government officials,job employers,debtee or kidnapers for ransom.They swindle people into transferring money or handing in money,ID cards, deposit books and name chops,and also they use those confidential belongings to open a dummy account and withdraw money illegally. Automatic teller machine(ATM) is unable to identify and notify account users instantly, which has put people’s property at risk.In this study,Raspberry Pi catches face features and then identifies people immediately by its face-recognition technology.This instant face detection system can function as a pre-warning security devise to prevent crime of fraud as it can provide scammers,face features and photos to the police authorities. After all,an ounce of prevention is better than a pound of cure.
CHEN, MIEN-TSUNG, and 陳綿宗. "Face Detection Technology In ATM Fraud Crime Prevention." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/14459111587198737807.
Full text國立臺北教育大學
資訊科學系碩士班
104
Due to the fact of enhanced development of technology, the development of face recognition technology and graphics has been used in a variety of locations including entry security systems, advertising systems and parking license plate recognition systems etc. Despite this, this technology is yet to be widespread or have an in-depth application in the banking system. It is important to have face detection to track and find criminals. In this paper, face detection technology is used in the banking system to make analysis and discussion for crime prevention. It has been suggested to use Raspberry Pi face detection technology to be placed in Automatic Teller Machines (ATM) to “scan the face” instead of withdrawing from financial cards (non-card withdrawal). This is an early preventive mechanism which will replace the traditional post-investigation of fraud. By doing this, criminals are less likely to use ATMs for their own interests, there will be fewer perpetrators and ultimately, criminals will be apprehensive to use ATMs as a tool for withdrawal.
LIU,CHIEN-KUO and 劉建國. "A Research on Countermeasures of Cross-Strait Trans-boundary Fraud Detection and Prevention." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8rw2e7.
Full text開南大學
人文社會學院法律碩士在職專班
106
Taiwan’s fraudulent cases have increased dramatically since 2000. This is because fraud groups have used human fears and greed in recent years to exploit emerging technologies such as finance, telecommunications, and the Internet, and their management loopholes, through criminal accounts such as head accounts and head phones. The tools, in a variety of ways, induce victims to go to ATMs for ATMs or remittances, or even go to the local government to withdraw funds, fraudulently plunder money from unsuspecting people, and make huge profits. This is a serious violation of people’s property safety. In the face of increasingly serious fraud cases, the Department of Police has joined forces of various ministries to launch an anti-fraud project since April 15, 2004. With the cooperation of various relevant departments, the Department has launched various defense measures to effectively crack down on Taiwan fraud. Crime in order to suppress the occurrence of fraud cases and ensure the safety of people’s property. Fraud cases have caused major public security threats in Taiwan since 2004. The government has mobilized resources from various departments to fight against it. It has developed relevant measures from the management level, investigative level, and the use of investigative crime techniques, and has implemented various raids through planning to try to suppress fraud. Although the arrogance has been carried out to a certain extent so far, it has still not been able to prevent the occurrence of fraud cases, partly due to "cross-border crimes." The development of fraud cases has so far been not only an issue of public security in an environment, but also a problem of cross-border crimes. Mainland China, Thailand, Indonesia, the Philippines, Malaysia, Cambodia, Vietnam, Laos, Fiji, Sri Lanka, Spain, and Africa Asia, Poland, Croatia, and other places have also been reported as cases. The crime of telecommunication fraud is a new crime on the mainland. Because of lack of information on deterring frauds and weak defensive capabilities, it is estimated that the mainland people will be the next major target of the fraud group. At this moment, we must face up to its hazards and threats. Otherwise, we will miss the opportunity. The loss of people's wealth will be no reason, and the prevention and control of the work will be lost. The "Agreement on Combating Crime and Mutual Legal Assistance across the Taiwan Strait" was signed on April 26, 2009 and came into effect on June 25. When the two sides of the Strait jointly fight against crimes towards a new era, when both sides of the Strait are determined to work together to combat crimes, the development of bilateral and benign interaction based on the principles of reciprocity, dignity, and mutual benefit, and the fight against cross-border fraud are the top priorities. Since the arrival of Cai Yingwen’s incumbent President and the Democratic Progressive Party in 2016, due to the lack of consensus and mutual trust between the new government and the Chinese mainland authorities, the mutual trust between the two sides of the strait has been lost, followed by stagnation of the two sides of the strait, in order to ensure the rights and interests of people on both sides of the strait. Cross-strait exchange order, more importantly, is to maintain cross-strait social harmony and effectively deal with the problems brought about by the close exchanges between the two sides of the strait. Without affecting the state’s power and organization, the “criminal suppression of crimes is not limited by boundaries and politics”. Based on ideas, we hope that we can truly implement human rights protection and create a win-win situation based on mutual respect, reciprocity, and reciprocity. The issue of cross-strait cooperation, when the cross-strait relationship has not been improved, and the identification of the bank has not yet established a positive identity, how to improve the interests of cross-strait cooperation is currently implemented by the government authorities. The establishment and expansion of the cooperative relationship can use the knot of the issue, so that the current cooperation on cross-border telecom fraud and the cooperation of other issues can be combined with the cooperation of other issues, so that the establishment or expansion of the cooperation issue must be carried out to promote cross-border telecommunications fraud. The implementation of criminal cooperation is a prerequisite. The topic of cross-strait cooperation is quite extensive. The Taiwan authorities need to think about the issue of cooperation as a bargaining chip for negotiations with China, or what kind of issue as a concession in exchange for the cooperation of China’s amnesty. The public security departments shall implement the requirements for cooperation. Because the cooperative relationship is not a unilateral request and appeal, it must be the mutual coordination of the two sides. With some retreat, the two sides can form a common goal and enhance the interests.
Mota, Gabriel Ivan da Silva Rosa Neco da. "Detection of fraud patterns in electronic commerce environments." Master's thesis, 2014. http://hdl.handle.net/1822/33392.
Full textElectronic transactions (e-commerce) have revolutionized the way consumers shop, making small and local retailers, which were being affected by the worldwide crisis, accessible to the entire world. As e-commerce market expands, commercial transactions supported by credit cards - Card or Customer Not Present (CNP) also increases. This growing relationship, quite natural and expected, has clear advantages, facilitating e-commerce transactions and attracting new possibilities for trading. However, at the same time a big and serious problem emerge: the occurrence of fraudulent situations in payments. Fraud imposes severe financial losses, which deeply impacts e-commerce companies and their revenue. In order to minimize losses, they spend a lot of efforts (and money) trying to establish the most satisfactory solutions to detect and counteract in a timely manner the occurrence of a fraud scenario. In the ecommerce domain, fraud analysts are typically interested in subject oriented customer data, frequently extracted from each order process that occurred in an e-commerce site. Besides transactional data, all their behavior data e.g. clickstream data are traced and recorded, enriching the means of detection with profiling data and providing a way to trace customers behavior along time. In this work, a signature-based method was used to establish the characteristics of user behavior and detect potential fraud cases. Signatures have already been used successfully for anomalous detection in many areas like credit card usage, network intrusion, and in particular in telecommunications fraud. A signature is defined by a set of attributes that receive a diverse range of variables - e.g. the average number of orders, time spent per order, number of payment attempts, number of days since last visit, and many others - related to the behavior of a user, referring to an e-commerce application scenario. Based on the analysis of user behavior deviation, detected by comparing the user recent activity with the user behavior data, which is expressed through the user signature, it's possible to detect potential fraud situations (deviate behaviors) in useful time, giving a more robust and accurate support decision system to the fraud analysts on their daily job.
As transações electrónicas (e-commerce) têm revolucionado a maneira como os consumidores fazem compras on-line, facilitando o acesso a partir de qualquer parte do globo, a retalhistas pequenos e locais, que estão a ser afectados pela crise mundial. À medida que o mercado do e-commerce se expande, transações comerciais suportadas por cartões de crédito – Cartão ou Cliente Não Presente (CNP) - também aumentam. Este crescimento natural e expectável apresenta claras vantagens, facilitando as transações e-commerce e atraindo novas possibilidades de negócio. Contudo, ao mesmo tempo, existe um grande e grave problema: a ocorrência de situações fraudulentas nos pagamentos. A fraude encontra-se associada a graves perdas financeiras, que têm um impacto profundo na receita de companhias de comércio electrónico. Grandes esforços (e dinheiro) são gastos numa tentativa de estabelecer soluções mais satisfatórias na detecção de casos de fraude em tempo útil, por forma a minimizar perdas. No domínio do e-commerce, os analistas de fraude estão tipicamente interessados em dados orientados ao consumidor, extraídos de cada uma das ordens de compra realizadas no site de comércio electrónico. Além dos dados transacionais, todos os dados comportamentais, i.e. dados clickstream, são guardados, enriquecendo assim os meios de detecção e garantindo uma forma de rastrear o comportamento dos consumidores ao longo do tempo. Neste trabalho utilizámos um método baseado na aplicação de assinaturas para estabelecer características comportamentais de consumidores e-commerce e assim, detectar potenciais casos de fraude. A aplicação de assinaturas foi já usada com sucesso na detecção de anomalias em diversas áreas, como a utilização de cartões de crédito, intrusão de redes e em particular, fraude em telecomunicações. Uma assinatura é definida por um conjunto de atributos que recebem um diverso leque de variáveis - e.g. número médio de encomendas, tempo de compra, número de tentativas de pagamento, número de dias desde a última visita, entre muitos outros – relacionados com o comportamento de um consumidor. Baseado na análise do desvio comportamental do consumidor, detectado através da comparação da sua atividade recente, com os seus dados comportamentais, expressados através da sua assinatura, é possível a detecção de potenciais casos de fraude (comportamentos díspares do habitual) em tempo real, garantindo assim um sistema mais robusto e preciso, capaz de servir de suporte à decisão aos analistas de fraude no seu trabalho diário.
DICHTLOVÁ, Anna. "Účetní podvody, možnosti jejich odhalování a prevence." Master's thesis, 2009. http://www.nusl.cz/ntk/nusl-47374.
Full text