Academic literature on the topic 'FRAUD AND DATA BREACHES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'FRAUD AND DATA BREACHES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "FRAUD AND DATA BREACHES"
Johnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Full textBush, Don. "How data breaches lead to fraud." Network Security 2016, no. 7 (2016): 11–13. http://dx.doi.org/10.1016/s1353-4858(16)30069-1.
Full textBaladari, Venkata. "SMART PAYMENT SECURITY: A SOFTWARE DEVELOPER'S ROLE IN PREVENTING FRAUD AND DATA BREACHES." International Journal of Core Engineering and Management 6, no. 9 (2020): 165–75. https://doi.org/10.5281/zenodo.15020546.
Full textSanskrati Agarwal and Usha J. "Detection of fraud card and data breaches in credit card transactions." International Journal of Science and Research Archive 9, no. 2 (2023): 576–82. http://dx.doi.org/10.30574/ijsra.2023.9.2.0603.
Full textChaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Optimized early financial fraud detection and prevention method to enhance the security." Journal of Information and Optimization Sciences 46, no. 2 (2025): 359–69. https://doi.org/10.47974/jios-1920.
Full textEze, Charles Uzodinma, Emmanuel Chukwuma Ebe, Ifeoma Mary Okwo, et al. "Effect of the Capability Component of Fraud Theory on Fraud Risk Management in Nigerian Banks." International Journal of Financial Research 13, no. 1 (2022): 90. http://dx.doi.org/10.5430/ijfr.v13n1p90.
Full textChaudhary, Newal. "Enacting Data Protection Law in Nepal." Prashasan: The Nepalese Journal of Public Administration 57, no. 1 (2025): 206–16. https://doi.org/10.3126/prashasan.v57i1.80668.
Full textHasan, Kumrul, Md Nazmul Hosen, and Kinjol Saha. "Federated Learning for Telecom Fraud Detection: A Privacy-Preserving Approach to Overcoming Data Fragmentation and Enhancing Security." European Journal of Theoretical and Applied Sciences 2, no. 6 (2024): 99–109. http://dx.doi.org/10.59324/ejtas.2024.2(6).08.
Full textKumrul, Hasan, Nazmul Hosen Md, and Saha Kinjol. "Federated Learning for Telecom Fraud Detection: A Privacy-Preserving Approach to Overcoming Data Fragmentation and Enhancing Security." European Journal of Theoretical and Applied Sciences 2, no. 6 (2024): 99–109. https://doi.org/10.59324/ejtas.2024.2(6).08.
Full textSWAMY, Mr K. K., B. MEGHANA REDDY, K. SAI CHAITANYA, M. HARINI, and T. MEHER PRANEETH. "DETECTING UNAUTHORIZED OR FRAUD PROFILES USING ARTIFICIAL NEURAL NETWORKS." YMER Digital 21, no. 05 (2022): 404–11. http://dx.doi.org/10.37896/ymer21.05/43.
Full textDissertations / Theses on the topic "FRAUD AND DATA BREACHES"
Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Full textOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textPhillips, Thurman B., and Raymond J. Lanclos. "Data analytics in procurement fraud prevention." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42708.
Full textKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Full textPerols, Johan L. "Detecting Financial Statement Fraud: Three Essays on Fraud Predictors, Multi-Classifier Combination and Fraud Detection Using Data Mining." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002486.
Full textOsei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.
Full textMoruzzi, Davide <1997>. "Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19916.
Full textAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Full textGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Full textBooks on the topic "FRAUD AND DATA BREACHES"
Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Find full textFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.
Find full textWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Full textRita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.
Find full textVona, Leonard W. Fraud Data Analytics Methodology. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119270331.
Full textKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. IT Governance Pub., 2010.
Find full textBower, George Spencer. The law relating to actionable non-disclosure and other breaches of duty in relations of confidence, influence and advantage. 2nd ed. Butterworths, 1990.
Find full textParham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Nova Science Publishers, 2009.
Find full textParham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Nova Science Publishers, 2009.
Find full textBook chapters on the topic "FRAUD AND DATA BREACHES"
Lambert, Paul B. "Data Breaches." In Essential Introduction to Understanding European Data Protection Rules. Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781138069848-29.
Full textLambert, Paul B. "Data Breaches." In Essential Introduction to Understanding European Data Protection Rules. Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315115269-29.
Full textKyriazoglou, John. "Managing Data Breaches." In Information Security Incident and Data Breach Management. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0870-8_6.
Full textDaswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.
Full textWalters, Robert. "Fraud." In Cybersecurity and Data Laws of the Commonwealth. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3935-0_19.
Full textAyyagari, Ramakrishna. "Data Breaches and Carding." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_37.
Full textKiesow Cortez, Elif. "Data Breaches and GDPR." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_39.
Full textHaunts, Stephen. "What Are Data Breaches?" In Applied Cryptography in .NET and Azure Key Vault. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4375-6_1.
Full textAyyagari, Ramakrishna. "Data Breaches and Carding." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_37-1.
Full textKiesow Cortez, Elif. "Data Breaches and GDPR." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_39-1.
Full textConference papers on the topic "FRAUD AND DATA BREACHES"
Sandeep, V., Jyotirmaya Sahoo, and Pawan Bhambu. "Defending Machine Learning in Agriculture Against Data Breaches and Misuse." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726152.
Full textAngelis, John N., and Rajendran S. Murthy. "Blame Shifting, Shopping Intensity, and Revisit Likelihood in Data Breaches." In 2024 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2024. http://dx.doi.org/10.23919/picmet64035.2024.10653185.
Full textXiang, Hui, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, and Jiapeng Zhao. "Identifying Data Breaches in Dark Web through Prompt Active Learning." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00016.
Full textBisht, Sameer Singh, Bibha Bindu Mohapatra, and Arvind Kumar. "Blockchain-Enabled Data Security in Healthcare: Reducing Data Breaches and Enhancing Patient Trust." In 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). IEEE, 2025. https://doi.org/10.1109/iccies63851.2025.11032433.
Full textAbdeen, Ahmad, Mahmoud Mohanna, Yusuf Mansur, and Elena Battini Sonmez. "Biometric Fraud Detection System." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710778.
Full textNair, Sreejith Sreekandan, Govindarajan Lakshmikanthan, J.ParthaSarathy, Dinesh P. S, Kavitha Shanmugakani, and B.Jegajothi. "Enhancing Cloud Security with Machine Learning: Tackling Data Breaches and Insider Threats." In 2025 International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2025. https://doi.org/10.1109/icears64219.2025.10940401.
Full textN, Arpitha C., Pratheek H. N, Shreyas D. S, Sujith D, and Vinay Kumar B. S. "Transaction Fraud Detection Using Data Mining Techniques." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690363.
Full textHa, Kiet, Lucas Stowe, and Chandranil Chakraborttii. "Improving Insurance Fraud Detection With Generated Data." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00321.
Full textRathore, Rachna, Yash Sharma, P. Ambika, Amit Kumar Upadhyay, Samriti Mahajan, and Rupendra Kumar. "Data Mining Techniques in Financial Fraud Detection." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895091.
Full textDoodipala, Shreya, Mrudula Rahate, and J. Angel Arul Jothi. "Predicting Chargeback Fraud Using Data Mining Techniques." In 2024 7th International Conference on Signal Processing and Information Security (ICSPIS). IEEE, 2024. https://doi.org/10.1109/icspis63676.2024.10812614.
Full textReports on the topic "FRAUD AND DATA BREACHES"
Fisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.
Full textFisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.
Full textM'Raihi, D., S. Boeyen, M. Grandcolas, and S. Bajaj. Sharing Transaction Fraud Data. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5941.
Full textPhillips, Thurman B., and Raymond J. Lanclos III. Data Analytics in Procurement Fraud Prevention. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada626749.
Full textSoramäki, Kimmo, and Florian Loecker. Preserving Data Sovereignty in National Fraud Portals- a Distributed Data Architecture. FNA, 2024. https://doi.org/10.69701/dhmk3850.
Full textLoecker, Florian, Amanah Ramadiah, and Kimmo Soramäki. Countering Consumer Fraud and Scams with National Fraud Portals. FNA, 2024. http://dx.doi.org/10.69701/oppl1525.
Full textMusciotto, Dr Federico, and Matteo Neri. FNA Papers: Annex 4: Enhancing Fraud Detection with Real -Time Money Trails. FNA, 2025. https://doi.org/10.69701/dkfj2748.
Full textLoecker, Florian, Amanah Ramadiah, Kimmo Soramäki, and Will Towning. Building Robust Anti-Fraud & Scam Capabilities at the National Level. FNA, 2023. http://dx.doi.org/10.69701/ektb6000.
Full textVolkova, Nataliia P., Nina O. Rizun, and Maryna V. Nehrey. Data science: opportunities to transform education. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3241.
Full textDutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.
Full text