Academic literature on the topic 'Fraud Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fraud Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Fraud Analysis"
Mackevičius, Jonas, and Lukas Giriūnas. "TRANSFORMATIONAL RESEARCH OF THE FRAUD TRIANGLE." Ekonomika 92, no. 4 (January 1, 2013): 150–63. http://dx.doi.org/10.15388/ekon.2013.0.2336.
Full textAndon, Paul, Clinton Free, and Benjamin Scard. "Pathways to accountant fraud: Australian evidence and analysis." Accounting Research Journal 28, no. 1 (July 6, 2015): 10–44. http://dx.doi.org/10.1108/arj-06-2014-0058.
Full textHariawan, I. Made Hangga, Ni Komang Sumadi, and Ni Wayan Alit Erlinawati. "PENGARUH KOMPETENSI SUMBER DAYA MANUSIA, WHISTLEBLOWING SYSTEM, DAN MORALITAS INDIVIDU TERHADAP PENCEGAHAN KECURANGAN (FRAUD) DALAM PENGELOLAAN KEUANGAN DESA." Hita Akuntansi dan Keuangan 1, no. 1 (July 13, 2020): 586–618. http://dx.doi.org/10.32795/hak.v1i1.791.
Full textPiaszczyk, Artur. "FRAUD RISK ANALYSIS." Acta academica karviniensia 11, no. 4 (December 30, 2011): 169–78. http://dx.doi.org/10.25142/aak.2011.081.
Full textStroebe, Wolfgang, Tom Postmes, and Russell Spears. "Scientific Misconduct and the Myth of Self-Correction in Science." Perspectives on Psychological Science 7, no. 6 (November 2012): 670–88. http://dx.doi.org/10.1177/1745691612460687.
Full textJulian, Lufti, Razana Juhaida Johari, Jamaliah Said, and Ludovicus Sensi Wondabio. "Fraud risk judgment measurement scale development." Journal of Governance and Regulation 11, no. 1, special issue (2022): 303–11. http://dx.doi.org/10.22495/jgrv11i1siart10.
Full textVenkata Suryanarayana, S., G. N. Balaji, and G. Venkateswara Rao. "Machine Learning Approaches for Credit Card Fraud Detection." International Journal of Engineering & Technology 7, no. 2 (June 5, 2018): 917. http://dx.doi.org/10.14419/ijet.v7i2.9356.
Full textHermanson, Dana R., Scot E. Justice, Sridhar Ramamoorti, and Richard A. Riley. "Unique Characteristics of Predator Frauds." Journal of Forensic Accounting Research 2, no. 1 (April 1, 2017): A31—A48. http://dx.doi.org/10.2308/jfar-51747.
Full textSandhu, Namrata. "Red flag behaviors in financial services frauds: a mixed-methods study." Journal of Financial Regulation and Compliance 30, no. 2 (October 27, 2021): 167–95. http://dx.doi.org/10.1108/jfrc-01-2021-0005.
Full textDiansari, Rani Eka, and Arum Tri Wijaya. "Diamond fraud analysis in detecting financial statement fraud." Journal of Business and Information Systems (e-ISSN: 2685-2543) 1, no. 2 (November 4, 2019): 63–76. http://dx.doi.org/10.36067/jbis.v1i2.23.
Full textDissertations / Theses on the topic "Fraud Analysis"
Wang, Yue. "Securities fraud an economic analysis /." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2457.
Full textThesis research directed by: Business and Management. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Groves, Keleigh Ann. "Understanding benefit fraud : a qualitative analysis." Thesis, University of Leeds, 2002. http://etheses.whiterose.ac.uk/475/.
Full textRamage, Sally. "A comparative analysis of corporate fraud." Thesis, University of Wolverhampton, 2007. http://hdl.handle.net/2436/14408.
Full textShelton, Austin M. "Analysis of Capabilities Attributed to the Fraud Diamond." Digital Commons @ East Tennessee State University, 2014. https://dc.etsu.edu/honors/213.
Full textTan, Li Huang Joyce. "An analysis of internal controls and procurement fraud deterrence." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39022.
Full textThe rise in globalization, coupled with the use of technology to accelerate approval, and payable cycles, the increase of outsourcing of goods and services, and the pressure to cut costs, have resulted in government organizations being more exposed to the risk of fraud in their procurement process. Hence, appropriate internal controls and fraud prevention strategies are necessary for deterring, detecting, and managing procurement fraud. The purpose of this research was to develop a guideline to help government organizations design an effective system of internal controls to deter fraud in public procurement processes and practices. This was done through a review, analysis, and discussion of 20 case studies of actual fraud incidents. In each case study, internal control weaknesses were identified and analyzed in terms of the fundamental principles that are associated with the five internal control components. The analysis revealed that the majority of the organizations in the case studies lacked three internal control components, namely control environment, control activities, and monitoring activities. Recommendations for improvements for each case study were presented by applying relevant internal controls into its procurement process to deter procurement fraud. The areas for further research were also provided.
Castillo, Joe C., and Erin Flanigan. "Procurement fraud: a knowledge-level analysis of contracting personnel." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44533.
Full textContracting is an ever-important function that enables the federal government to acquire everything from small commodities to the most complex weapons systems. With recent fiscal constraints, the potential for fraud is a growing concern, and the ability to detect fraud, waste, and abuse is considered to be an essential skill. Additionally, in order to ensure auditability, an organization must emphasize the presence of competent personnel, capable processes, and effective internal controls. The purpose of this research is to assess the knowledge-level of Air Force contracting professionals as it pertains to the ability to identify procurement fraud within the six phases of contracting and the five internal control components. The research deployed a procurement fraud survey with procurement fraud knowledge questions and organizational perception questions within the Air Force Nuclear Weapons Center. The results of the survey identified a varying level of knowledge about procurement fraud among survey participants. The research also presented recommendations and areas for further research based on the results of the survey.
Garner, Philip David. "Security and fraud analysis for new models in mobile payment." Thesis, Lancaster University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441830.
Full textChang, Peter W., and Peter W. Chang. "Analysis of contracting processes, internal controls, and procurement fraud schemes." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34642.
Full textApproved for public release; distribution is unlimited
Contracting continues to play an important role in the Department of Defense (DoD) as a means to acquire a wide array of systems, supplies, and services. More than half of DoDs budget is spent through contracts. With these large dollars spent comes the possibility of fraud in contracting that can subvert the process causing waste and possibly impeding mission accomplishment. The purpose of this research was to analyze DoDs contracting workforces level of fraud knowledge, according to the six phases of contract management, five internal control components, and six procurement fraud scheme categories. This was done through the deployment of a survey consisting of fraud knowledge and organizational perception questions. The survey was completed by contracting personnel at the U.S. Army Mission and Installation Contracting Command. The results displayed differences in fraud awareness and perception among the different contracting phases, internal control components, and procurement fraud scheme categories. Recommendations for improving fraud awareness were also presented as well as areas for further research.
Contracting continues to play an important role in the Department of Defense (DoD) as a means to acquire a wide array of systems, supplies, and services. More than half of DoDs budget is spent through contracts. With these large dollars spent comes the possibility of fraud in contracting that can subvert the process causing waste and possibly impeding mission accomplishment. The purpose of this research was to analyze DoDs contracting workforces level of fraud knowledge, according to the six phases of contract management, five internal control components, and six procurement fraud scheme categories. This was done through the deployment of a survey consisting of fraud knowledge and organizational perception questions. The survey was completed by contracting personnel at the U.S. Army Mission and Installation Contracting Command. The results displayed differences in fraud awareness and perception among the different contracting phases, internal control components, and procurement fraud scheme categories. Recommendations for improving fraud awareness were also presented as well as areas for further research.
Jóhannsson, Jökull. "Detecting fraudulent users using behaviour analysis." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224196.
Full textMed den ökande användningen av strömmande media ökar också möjligheterna till missbruk av dessa platformar samt bedrägeri. Ett typiskt fall av bedrägeri är att använda automatiserade program för att strömma media, och därigenom generera intäkter samt att öka en artist popularitet. Med den växande ekonomin kring strömmande media växer också incitamentet till bedrägeriförsök. Denna studies fokus är att finna användarmönster och använda denna kunskap för att träna modeller som kan upptäcka bedrägeriförsök. The maskininlärningsalgoritmer som undersökts är Logistic Regression, Support Vector Machines, Random Forest och Artificiella Neurala Nätverk. Denna studie jämför effektiviteten och precisionen av dessa algoritmer, som tränats på obalanserad data som innehåller olika procentandelar av bedrägeriförsök. Modellerna som genererats av de olika algoritmerna har sedan utvärderas med hjälp av Precision Recall Area Under the Curve (PR AUC) och F1-score. Resultaten av studien visar på liknande prestanda mellan modellerna som genererats av de utvärderade algoritmerna. Detta gäller både när de tränats på balanserad såväl som obalanserad data. Resultaten visar också att Random Forestbaserade modeller genererar bättre resultat för alla dataset som testats i detta experiment.
ROCHA, JOSE EDUARDO NUNES DA. "INTELLIGENT SYSTEMS APPLIED TO FRAUD ANALYSIS IN THE ELECTRICAL POWER INDUSTRIES." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2003. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=4707@1.
Full textEsta dissertação investiga uma nova metodologia, baseada em técnicas inteligentes, para a redução das perdas comerciais relativas ao fornecimento de energia elétrica. O objetivo deste trabalho é apresentar um modelo de inteligência computacional capaz de identificar irregularidades na medição de demanda e consumo de energia elétrica, considerando as características sazonais não lineares das curvas de carga das unidades consumidoras, características essas que são difíceis de se representar em modelos matemáticos. A metodologia é baseada em três etapas: categorização, para agrupar unidades consumidoras em classes similares; classificação para descobrir relacionamentos que expliquem o perfil da irregularidade no fornecimento de energia elétrica e que permitam prever a classe de um padrão desconhecido; e extração de conhecimento sob a forma de regras fuzzy interpretáveis. O modelo resultante foi denominado Sistema de Classificação de Unidades Consumidoras de Energia Elétrica. O trabalho consistiu em três partes: um estudo sobre os principais métodos de categorização e classificação de padrões; definição e implementação do Sistema de Classificação de Unidades Consumidoras de Energia Elétrica; e o estudo de casos. No estudo sobre os métodos de categorização foi feito um levantamento bibliográfico da área, resultando em um resumo das principais técnicas utilizadas para esta tarefa, as quais podem ser divididas em algoritmos de categorização hierárquicos e não hierárquicos. No estudo sobre os métodos de classificação foram feitos levantamentos bibliográficos dos sistemas Neuro-Fuzzy que resultaram em um resumo sobre as arquiteturas, algoritmos de aprendizado e extração de regras fuzzy de cada modelo analisado. Os modelos Neuro-Fuzzy foram escolhidos devido a sua capacidade de geração de regras lingüísticas. O Sistema de Classificação de Unidades Consumidoras de Energia Elétrica foi definido e implementado da seguinte forma: módulo de categorização, baseado no algoritmo Fuzzy C-Means (FCM); e módulo de classificação baseado nos Sistemas Neuro-Fuzzy NEFCLASS e NFHB-Invertido. No primeiro módulo, foram utilizadas algumas medidas de desempenho como o FPI (Fuzziness Performance Index), que estima o grau de nebulosidade (fuziness) gerado por um número específico de clusters, e a MPE (Modified Partition Entropy), que estima o grau de desordem gerado por um número específico de clusters. Para validação do número ótimo de clusters, aplicou-se o critério de dominância segundo o método de Pareto. No módulo de classificação de unidades consumidoras levou-se em consideração a peculiaridade de cada sistema neuro-fuzzy, além da análise de desempenho comparativa (benchmarking) entre os modelos. Além do objetivo de classificação de padrões, os Sistemas Neuro-Fuzzy são capazes de extrair conhecimento em forma de regras fuzzy interpretáveis expressas como: SE x é A e y é B então padrão pertence à classe Z. Realizou-se um amplo estudo de casos, abrangendo unidades consumidoras de atividades comerciais e industriais supridas em baixa e média tensão. Os resultados encontrados na etapa de categorização foram satisfatórios, uma vez que as unidades consumidoras foram agrupadas de forma natural pelas suas características de demanda máxima e consumo de energia elétrica. Conforme o objetivo proposto, esta categorização gerou um número reduzido de agrupamentos (clusters) no espaço de busca, permitindo que o treinamento dos sistemas Neuro-Fuzzy fosse direcionado para o menor número possível de grupos, mas com elevada representatividade sobre os dados. Os resultados encontrados com os modelos NFHB-Invertido e NEFCLASS mostraram-se, na maioria dos casos, superiores aos melhores resultados encontrados pelos modelos matemáticos comumente utilizados. O desempenho dos modelos NFHB-Invertido e NEFCLASS, em relação ao te
This dissertation investigates a new methodology based on intelligent techniques for commercial losses reduction in electrical energy supply. The objective of this work is to present a model of computational intelligence able to identify irregularities in consumption and demand electrical measurements, regarding the non-linearity of the consumers seasonal load curve which is hard to represent by mathematical models. The methodology is based on three stages: clustering, to group consumers of electric energy into similar classes; patterns classification, to discover relationships that explain the irregularities profile and that determine the class for an unknown pattern; and knowledge extraction in form of interpretable fuzzy rules. The resulting model was entitled Electric Energy Consumers Classification System. The work consisted of three parts: a bibliographic research about main methods for clustering and patterns classification; definition and implementation of the Electric Energy Consumers Classification System; and case studies. The bibliographic research of clustering methods resulted in a survey of the main techniques used for this task, which can be divided into hierarchical and non-hierarchical clustering algorithms. The bibliographic research of classification methods provided a survey of the architectures, learning algorithms and rules extraction of the neuro-fuzzy systems. Neuro-fuzzy models were chosen due to their capacity of generating linguistics rules. The Electric Energy Consumers Classification System was defined and implemented in the following way: a clustering module, based on the Fuzzy CMeans (FCM) algorithm; and classification module, based on NEFCLASS and Inverted-NFHB neuro-fuzzy sytems. In the first module, some performance metrics have been used such as the FPI (Fuzziness Performance Index), which estimates the fuzzy level generated by a specific number of clusters; and the MPE (Modified Partition Entropy) that estimates disorder level generated by a specific number of clusters. The dominance criterion of Pareto method was used to validate optimal number of clusters. In the classification module, the peculiarities of each neuro-fuzzy system as well as performance comparison of each model were taken into account. Besides the patterns classification objective, the neuro-Fuzzy systems were able to extract knowledge in form of interpretable fuzzy rules. These rules are expressed by: IF x is A and y is B then the pattern belongs to Z class. The cases studies have considered industrial and commercial consumers of electric energy in low and medium tension. The results obtained in the clustering step were satisfactory, since consumers have been clustered in a natural way by their electrical consumption and demand characteristics. As the proposed objective, the system has generated an optimal low number of clusters in the search space, thus directing the learning step of the neuro-fuzzy systems to a low number of groups with high representation over data. The results obtained with Inverted-NFHB and NEFCLASS models, in the majority of cases, showed to be superior to the best results found by the mathematical methods commonly used. The performance of the Inverted-NFHB and NEFCLASS models concerning to processing time was also very good. The models converged to an optimal classification solution in a processing time inferior to a minute. The main objective of this work, that is the non- technical power losses reduction, was achieved by the assertiveness increases in the identification of the cases with measuring irregularities. This fact made possible some reduction in wasting with workers and effectively improved the billing.
Books on the topic "Fraud Analysis"
Coderre, David, ed. Fraud Analysis Techniques Using ACL. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781119203704.
Full textOvuakporie, Vincent. Bank frauds: Causes and preventions : an empirical analysis. Ibadan, Nigeria: Att Books, 1994.
Find full textLewis & Clark Business Law Forum (11th 2005 Portland, Or.). Behavioral analysis of corporate law: Instruction or distraction. [Portland, Or.]: Lewis & Clark Law School, 2005.
Find full textCaroline, Gerschlager, ed. Deception in markets: An economic analysis. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2005.
Find full textThe divine deception: The Church, the Shroud and the creation of a holy fraud. London: Headline, 2000.
Find full textBhattacharya, Chanchal A. The concept of theft in classical Hindu law: An analysis and the idea of punishment. Delhi: Munshiram Manoharlal Publishers, 1990.
Find full textLegal and institutional aspects of the European Anti-Fraud Office (OLAF): An analysis with a look forward to a European public prosecutor's office. Groningen: Europa Law Pub., 2011.
Find full textArchibald, Janice. The Internet: Fraud, encryption and legislation : a qualitative analysis of attitudes and strategy in the business sector. (s.l: The Author), 2001.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Hedge funds and independent analysts: How independent are their relationships? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Ninth Congress, second session, June 28, 2006. Washington: U.S. G.P.O., 2006.
Find full textBook chapters on the topic "Fraud Analysis"
Spink, John W. "Risk Analysis (Part 3 of 3): Implementation." In Food Fraud Prevention, 559–98. New York, NY: Springer New York, 2019. http://dx.doi.org/10.1007/978-1-4939-9621-6_17.
Full textBlakely, Elbert, Alan Poling, and Jeffrey Cross. "Fraud, Fakery, and Fudging." In Research Methods in Applied Behavior Analysis, 313–30. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-8786-2_15.
Full textSpink, John W. "Risk Analysis (Part 1 of 3): Basic Fundamentals." In Food Fraud Prevention, 501–28. New York, NY: Springer New York, 2019. http://dx.doi.org/10.1007/978-1-4939-9621-6_15.
Full textÇıtak, Nermin. "A Critical Analysis of the Effects of Measurements on International Company Scandals: The Fraud Act." In Emerging Fraud, 43–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-20826-3_3.
Full textPicard, Pierre. "Economic Analysis of Insurance Fraud." In Handbook of Insurance, 315–62. Dordrecht: Springer Netherlands, 2000. http://dx.doi.org/10.1007/978-94-010-0642-2_10.
Full textPicard, Pierre. "Economic Analysis of Insurance Fraud." In Handbook of Insurance, 349–95. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-0155-1_13.
Full textSpink, John W. "Risk Analysis (Part 2 of 3): Application to Food Fraud." In Food Fraud Prevention, 529–57. New York, NY: Springer New York, 2019. http://dx.doi.org/10.1007/978-1-4939-9621-6_16.
Full textBlackwell, Clive. "Using Fraud Trees to Analyze Internet Credit Card Fraud." In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 17–29. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-662-44952-3_2.
Full textSrinidhi, S., K. Sowmya, and S. Karthika. "Automatic Credit Fraud Detection Using Ensemble Model." In ICT Analysis and Applications, 211–24. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5655-2_20.
Full textDebant, Alexandre, Stéphanie Delaune, and Cyrille Wiedling. "Symbolic Analysis of Terrorist Fraud Resistance." In Lecture Notes in Computer Science, 383–403. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29959-0_19.
Full textConference papers on the topic "Fraud Analysis"
Julianto, Ardi, Ripki Mohamad Sopian, and Siti Nurlisma Vebrianti. "Fraud Analysis of Financial Statements in the Perspective of Fraud Triangle." In International Conference on Economics, Management and Accounting (ICEMAC 2021). Paris, France: Atlantis Press, 2022. http://dx.doi.org/10.2991/aebmr.k.220204.029.
Full textDaneeva, Saizhina. "Fraud as the basic risk of failed ICO." In System analysis in economics – 2018. Prometheus publishing house, 2018. http://dx.doi.org/10.33278/sae-2018.eng.248-251.
Full textCochrane, Nicholas, Thomas Gomez, John Warmerdam, Moises Flores, Preston Mccullough, Vincent Weinberger, and Matin Pirouz. "Pattern Analysis for Transaction Fraud Detection." In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9376045.
Full textPramudyastuti, Octavia, Nuwun Priyono, Utpala Rani, and Danar Miranda. "Analysis of Academic Fraud of Student in Unversity Based on Fraud Pentagon Theory." In Proceedings of the 1st Tidar International Conference on Advancing Local Wisdom Towards Global Megatrends, TIC 2020, 21-22 October 2020, Magelang, Jawa Tengah, Indonesia. EAI, 2021. http://dx.doi.org/10.4108/eai.21-10-2020.2311940.
Full textAyeb, Safa El, Baptiste Hemery, Fabrice Jeanne, and Estelle Cherrier. "Community Detection for Mobile Money Fraud Detection." In 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS). IEEE, 2020. http://dx.doi.org/10.1109/snams52053.2020.9336578.
Full textBakshi, Sonali. "Credit Card Fraud Detection : A classification analysis." In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2018. http://dx.doi.org/10.1109/i-smac.2018.8653770.
Full textBenson Edwin Raj, S., and A. Annie Portia. "Analysis on credit card fraud detection methods." In 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET). IEEE, 2011. http://dx.doi.org/10.1109/icccet.2011.5762457.
Full textTao, Yuan. "Analysis on financial fraud cases by Python." In 2019 International Conference on Education Science and Economic Development (ICESED 2019). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/icesed-19.2020.8.
Full textLeontjeva, A., K. Tretyakov, J. Vilo, and T. Tamkivi. "Fraud Detection: Methods of Analysis for Hypergraph Data." In 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012). IEEE, 2012. http://dx.doi.org/10.1109/asonam.2012.234.
Full textBranting, L. Karl, Flo Reeder, Jeffrey Gold, and Timothy Champney. "Graph analytics for healthcare fraud risk estimation." In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2016. http://dx.doi.org/10.1109/asonam.2016.7752336.
Full textReports on the topic "Fraud Analysis"
Castillo, Joe C., and Erin M. Flanigan. Procurement Fraud: A Knowledge-Level Analysis of Contracting Personnel. Fort Belvoir, VA: Defense Technical Information Center, December 2014. http://dx.doi.org/10.21236/ada619684.
Full textO'Malley, A. James, Thomas Bubolz, and Jonathan Skinner. The Diffusion of Health Care Fraud: A Network Analysis. Cambridge, MA: National Bureau of Economic Research, March 2021. http://dx.doi.org/10.3386/w28560.
Full textChang, Peter W. Analysis of Contracting Processes, Internal Controls, and Procurement Fraud Schemes. Fort Belvoir, VA: Defense Technical Information Center, June 2013. http://dx.doi.org/10.21236/ada583450.
Full textRendon, Juanita M. Identifying Procurement Fraud in Defense Agencies: An Analysis of the Government Purchase Card Program. Fort Belvoir, VA: Defense Technical Information Center, April 2011. http://dx.doi.org/10.21236/ada543852.
Full textDutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, September 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.
Full textvan Ruth, Saskia, and Linsey Nielen. Evaluation and deconstruction of fraud incidents, vulnerabilities, and social networks in organic ‘hotchpotch’ supply chains : report on fraud incident reports, vulnerability assessments, and social network analysis in the Dutch organic potatoes’, carrots’, and onions’ supply chains. Wageningen: Wageningen Food Safety Research, 2022. http://dx.doi.org/10.18174/579487.
Full textVolkova, Nataliia P., Nina O. Rizun, and Maryna V. Nehrey. Data science: opportunities to transform education. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3241.
Full textPhillips, Thurman B., and Raymond J. Lanclos III. Data Analytics in Procurement Fraud Prevention. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada626749.
Full textYagci Sokat, Kezban. Understanding the Role of Transportation in Human Trafficking in California. Mineta Transportation Institute, November 2022. http://dx.doi.org/10.31979/mti.2022.2108.
Full textBUHARI, Lateef Oluwafemi. Understanding the Causes of Electoral and Political Violence in Ekiti State, Nigeria: 2007-2010. Intellectual Archive, March 2021. http://dx.doi.org/10.32370/ia_2021_03_17.
Full text