Academic literature on the topic 'FRAUD AND DATA BREACHES'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'FRAUD AND DATA BREACHES.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "FRAUD AND DATA BREACHES"

1

Johnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.

Full text
Abstract:
Data Breaches occur in many forms that include bad security practices, hacking, insider attacks, stolen or lost equipment and computer or data theft. Data breaches happen to organizations of all types. In this paper, we present an analysis of the stock market’s assessment of the cost of data breaches through the examination of 467 heterogeneous data breach events that occurred at 261 publicly traded companies between year 2005 and 2014. Our event study findings indicate that publicly traded firms in the U.S. lost, on average, .37% of their equity value when a data breach occurs. Particularly,
APA, Harvard, Vancouver, ISO, and other styles
2

Bush, Don. "How data breaches lead to fraud." Network Security 2016, no. 7 (2016): 11–13. http://dx.doi.org/10.1016/s1353-4858(16)30069-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baladari, Venkata. "SMART PAYMENT SECURITY: A SOFTWARE DEVELOPER'S ROLE IN PREVENTING FRAUD AND DATA BREACHES." International Journal of Core Engineering and Management 6, no. 9 (2020): 165–75. https://doi.org/10.5281/zenodo.15020546.

Full text
Abstract:
Smart payment systems are increasingly vulnerable to security threats such as fraud and data breaches, necessitating effective protection measures. This study proposes a framework for software developers to boost transaction security via encryption, multi-factor authentication (MFA), secure API practices, and fraud prevention methods. The system also ensures adherence to requirements such as PCI DSS, GDPR, and PSD2, incorporating secure coding practices, DevSecOps, and real-time monitoring to mitigate potential risks. Through real-world examples and applied solutions, the research assesses the
APA, Harvard, Vancouver, ISO, and other styles
4

Sanskrati Agarwal and Usha J. "Detection of fraud card and data breaches in credit card transactions." International Journal of Science and Research Archive 9, no. 2 (2023): 576–82. http://dx.doi.org/10.30574/ijsra.2023.9.2.0603.

Full text
Abstract:
Data breaches and credit card fraud are now among the biggest problems affecting financial organizations and customers globally. The purpose of this study is to develop an effective fraud detection system that can detect fraudulent credit card transactions and prevent data breaches. The strategy proposed in this paper makes use of machine learning techniques like decision trees and logistic regression, to analyze large datasets of credit card transactions and identify suspicious patterns. The proposed system also includes a real-time monitoring mechanism that alerts the relevant authorities in
APA, Harvard, Vancouver, ISO, and other styles
5

Chaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Optimized early financial fraud detection and prevention method to enhance the security." Journal of Information and Optimization Sciences 46, no. 2 (2025): 359–69. https://doi.org/10.47974/jios-1920.

Full text
Abstract:
Financial fraud poses a major threat to banking and financial organizations, leading to financial losses and erosion of public trust. This paper proposes an early financial fraud detection and prevention method to secure financial data in transit, at rest, and in process to mitigate risks of frauds such as unauthorized transactions, identity thefts, data breaches, and cyberattacks. The method involves assessing the current cybersecurity posture through surveys, defining optimal security controls baseline per regulatory guidelines, performing gap analysis to identify vulnerabilities, and sugges
APA, Harvard, Vancouver, ISO, and other styles
6

Eze, Charles Uzodinma, Emmanuel Chukwuma Ebe, Ifeoma Mary Okwo, et al. "Effect of the Capability Component of Fraud Theory on Fraud Risk Management in Nigerian Banks." International Journal of Financial Research 13, no. 1 (2022): 90. http://dx.doi.org/10.5430/ijfr.v13n1p90.

Full text
Abstract:
The incidence of bank fraud is a fundamental problem with diverse consequences to banks and their stakeholders. Therefore, this study examined the effect of the capability component of fraud theory on fraud risk management in Nigerian banks. The specific objectives of the study are to: examine the effect of malicious insider abuses on fraud risk management efficiency of Nigerian banking sector; evaluate the effect of internal control bypasses on fraud risk management efficiency of Nigerian banking sector; investigate the effect of information security breaches on fraud risk management efficien
APA, Harvard, Vancouver, ISO, and other styles
7

Chaudhary, Newal. "Enacting Data Protection Law in Nepal." Prashasan: The Nepalese Journal of Public Administration 57, no. 1 (2025): 206–16. https://doi.org/10.3126/prashasan.v57i1.80668.

Full text
Abstract:
In today's interconnected world, digital transactions and online activities have become indispensable facets of daily life, revolutionizing the way we communicate, conduct business, and access information. However, this rapid digitalization has also raised a critical concern, the protection of personal and sensitive data. As individuals and organizations increasingly rely on digital platforms and services, the risk of unauthorized access, disclosure, or theft of confidential information has escalated significantly. Data breaches, which involve the unauthorized acquisition of sensitive data, po
APA, Harvard, Vancouver, ISO, and other styles
8

Hasan, Kumrul, Md Nazmul Hosen, and Kinjol Saha. "Federated Learning for Telecom Fraud Detection: A Privacy-Preserving Approach to Overcoming Data Fragmentation and Enhancing Security." European Journal of Theoretical and Applied Sciences 2, no. 6 (2024): 99–109. http://dx.doi.org/10.59324/ejtas.2024.2(6).08.

Full text
Abstract:
Over the last couple of years, the world has seen numerous frauds about telecom: fraud calls, phishing, and misutilization of personal numbers, among others. However, traditional methods of fraud detection cannot fit the shifting intricacy of these fraud schemes since they depend on data collection in a centralized way. While the arrival of deep learning improves the detection capability, it engenders considerable privacy risks and issues of data fragmentation. As one might guess, this work investigates federated learning as a decentralized solution to these limitations. The FL allows various
APA, Harvard, Vancouver, ISO, and other styles
9

Kumrul, Hasan, Nazmul Hosen Md, and Saha Kinjol. "Federated Learning for Telecom Fraud Detection: A Privacy-Preserving Approach to Overcoming Data Fragmentation and Enhancing Security." European Journal of Theoretical and Applied Sciences 2, no. 6 (2024): 99–109. https://doi.org/10.59324/ejtas.2024.2(6).08.

Full text
Abstract:
Over the last couple of years, the world has seen numerous frauds about telecom: fraud calls, phishing, and misutilization of personal numbers, among others. However, traditional methods of fraud detection cannot fit the shifting intricacy of these fraud schemes since they depend on data collection in a centralized way. While the arrival of deep learning improves the detection capability, it engenders considerable privacy risks and issues of data fragmentation. As one might guess, this work investigates federated learning as a decentralized solution to these limitations. The FL allows various
APA, Harvard, Vancouver, ISO, and other styles
10

SWAMY, Mr K. K., B. MEGHANA REDDY, K. SAI CHAITANYA, M. HARINI, and T. MEHER PRANEETH. "DETECTING UNAUTHORIZED OR FRAUD PROFILES USING ARTIFICIAL NEURAL NETWORKS." YMER Digital 21, no. 05 (2022): 404–11. http://dx.doi.org/10.37896/ymer21.05/43.

Full text
Abstract:
In moment's digital age, the ever- adding reliance on computer technology has left the average citizen vulnerable to crimes similar as data breaches and possible identity theft. These attacks can do without notice and frequently without announcement to the victims of a data breach. At this time, there's little provocation for social networks to ameliorate their data security. These breaches frequently target social media networks similar as Face book, Twitter, Instagram and many other platforms. They can also target banks and other fiscal institutions. Vicious users’ produce fake accounts to p
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "FRAUD AND DATA BREACHES"

1

Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.

Full text
Abstract:
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services
APA, Harvard, Vancouver, ISO, and other styles
2

Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.

Full text
Abstract:
Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the co
APA, Harvard, Vancouver, ISO, and other styles
3

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
APA, Harvard, Vancouver, ISO, and other styles
4

Phillips, Thurman B., and Raymond J. Lanclos. "Data analytics in procurement fraud prevention." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42708.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The purpose of this research project is to explore the viability of detecting anomalies through using data analytics software as a tool in procurement fraud prevention and to analyze its potential policy implications on federal procurement stakeholders. According to a survey conducted in 2012 by the Association of Certified Fraud Examiners, organizations lose an estimated 5% of their revenues to fraud each year. In order to relate this estimate to the Department of Defense (DOD), this estimated percentage was applied to the requested DO
APA, Harvard, Vancouver, ISO, and other styles
5

Kongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.

Full text
Abstract:
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased busines
APA, Harvard, Vancouver, ISO, and other styles
6

Perols, Johan L. "Detecting Financial Statement Fraud: Three Essays on Fraud Predictors, Multi-Classifier Combination and Fraud Detection Using Data Mining." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Osei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.

Full text
Abstract:
<p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of
APA, Harvard, Vancouver, ISO, and other styles
8

Moruzzi, Davide <1997&gt. "Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19916.

Full text
Abstract:
The thesis aims to summarise and motivate the cyber intelligence project carried out during the internship period in a local company. The scenario in which the developed software runs will be presented. The technologies and criticalities found will be highlighted and the final product that can be used by the company for its own purposes will be shown. It is possible to find everything you need by surfing the web, also a lot of stolen credentials. Everyday people upload on the web data which came from a breach due to lack of security in the network infrastructures, malware attacks or human err
APA, Harvard, Vancouver, ISO, and other styles
9

Ayereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.

Full text
Abstract:
This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preven
APA, Harvard, Vancouver, ISO, and other styles
10

Griffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.

Full text
Abstract:
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "FRAUD AND DATA BREACHES"

1

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Foster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vona, Leonard W. Fraud Data Analytics Methodology. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119270331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krausz, Michael. Managing Information Security Breaches: Studies from Real Life. IT Governance Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bower, George Spencer. The law relating to actionable non-disclosure and other breaches of duty in relations of confidence, influence and advantage. 2nd ed. Butterworths, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Parham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Parham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "FRAUD AND DATA BREACHES"

1

Lambert, Paul B. "Data Breaches." In Essential Introduction to Understanding European Data Protection Rules. Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781138069848-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lambert, Paul B. "Data Breaches." In Essential Introduction to Understanding European Data Protection Rules. Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315115269-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kyriazoglou, John. "Managing Data Breaches." In Information Security Incident and Data Breach Management. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0870-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walters, Robert. "Fraud." In Cybersecurity and Data Laws of the Commonwealth. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3935-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ayyagari, Ramakrishna. "Data Breaches and Carding." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kiesow Cortez, Elif. "Data Breaches and GDPR." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haunts, Stephen. "What Are Data Breaches?" In Applied Cryptography in .NET and Azure Key Vault. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4375-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ayyagari, Ramakrishna. "Data Breaches and Carding." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_37-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kiesow Cortez, Elif. "Data Breaches and GDPR." In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_39-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "FRAUD AND DATA BREACHES"

1

Sandeep, V., Jyotirmaya Sahoo, and Pawan Bhambu. "Defending Machine Learning in Agriculture Against Data Breaches and Misuse." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Angelis, John N., and Rajendran S. Murthy. "Blame Shifting, Shopping Intensity, and Revisit Likelihood in Data Breaches." In 2024 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2024. http://dx.doi.org/10.23919/picmet64035.2024.10653185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xiang, Hui, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, and Jiapeng Zhao. "Identifying Data Breaches in Dark Web through Prompt Active Learning." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bisht, Sameer Singh, Bibha Bindu Mohapatra, and Arvind Kumar. "Blockchain-Enabled Data Security in Healthcare: Reducing Data Breaches and Enhancing Patient Trust." In 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). IEEE, 2025. https://doi.org/10.1109/iccies63851.2025.11032433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdeen, Ahmad, Mahmoud Mohanna, Yusuf Mansur, and Elena Battini Sonmez. "Biometric Fraud Detection System." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nair, Sreejith Sreekandan, Govindarajan Lakshmikanthan, J.ParthaSarathy, Dinesh P. S, Kavitha Shanmugakani, and B.Jegajothi. "Enhancing Cloud Security with Machine Learning: Tackling Data Breaches and Insider Threats." In 2025 International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2025. https://doi.org/10.1109/icears64219.2025.10940401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

N, Arpitha C., Pratheek H. N, Shreyas D. S, Sujith D, and Vinay Kumar B. S. "Transaction Fraud Detection Using Data Mining Techniques." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ha, Kiet, Lucas Stowe, and Chandranil Chakraborttii. "Improving Insurance Fraud Detection With Generated Data." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rathore, Rachna, Yash Sharma, P. Ambika, Amit Kumar Upadhyay, Samriti Mahajan, and Rupendra Kumar. "Data Mining Techniques in Financial Fraud Detection." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Doodipala, Shreya, Mrudula Rahate, and J. Angel Arul Jothi. "Predicting Chargeback Fraud Using Data Mining Techniques." In 2024 7th International Conference on Signal Processing and Information Security (ICSPIS). IEEE, 2024. https://doi.org/10.1109/icspis63676.2024.10812614.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "FRAUD AND DATA BREACHES"

1

Fisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

M'Raihi, D., S. Boeyen, M. Grandcolas, and S. Bajaj. Sharing Transaction Fraud Data. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Phillips, Thurman B., and Raymond J. Lanclos III. Data Analytics in Procurement Fraud Prevention. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada626749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soramäki, Kimmo, and Florian Loecker. Preserving Data Sovereignty in National Fraud Portals- a Distributed Data Architecture. FNA, 2024. https://doi.org/10.69701/dhmk3850.

Full text
Abstract:
As a result of the widespread increase in consumer fraud and scams, several countries are looking to establish or strengthen cross-bank, cross-platform, and cross-industry utilities to counter fraud and scams on the national level and to augment traditional efforts at individual financial institutions1. However, questions quickly arise about how data on consumers and their payments can and should be shared across institutions. Some data sharing across Financial Institutions (FIs) is crucial for fighting consumer fraud and scams as it enables organizations to track fraudulent funds across the p
APA, Harvard, Vancouver, ISO, and other styles
6

Loecker, Florian, Amanah Ramadiah, and Kimmo Soramäki. Countering Consumer Fraud and Scams with National Fraud Portals. FNA, 2024. http://dx.doi.org/10.69701/oppl1525.

Full text
Abstract:
In this paper, we argue that setting up a new Digital Public Infrastructure - a National Fraud Portal (NFP) - is the only way to address fraud and consumer scams efficiently. NFPs provide a technological solution as a shared facility for banks, law enforcement, the Financial Intelligence Unit (FIU), the central bank, the conduct supervisor, and other stakeholders. Further down the line, NFPs can connect to one another as cross-border criminal activity increases (a likely consequence of suppressing fraud domestically). The National Fraud Portal (NFP) enables: The real-time tracing and tracking
APA, Harvard, Vancouver, ISO, and other styles
7

Musciotto, Dr Federico, and Matteo Neri. FNA Papers: Annex 4: Enhancing Fraud Detection with Real -Time Money Trails. FNA, 2025. https://doi.org/10.69701/dkfj2748.

Full text
Abstract:
Building AI models for fraud detection on the national or consortium level is challenging due to the need to combine payment and fraud data collected across different institutions. Fraud data may include labels for verified fraudulent transactions or labels for accounts that have been used for fraudulent transactions in the past. Payment data may include routing information, information on payment channels, etc.
APA, Harvard, Vancouver, ISO, and other styles
8

Loecker, Florian, Amanah Ramadiah, Kimmo Soramäki, and Will Towning. Building Robust Anti-Fraud & Scam Capabilities at the National Level. FNA, 2023. http://dx.doi.org/10.69701/ektb6000.

Full text
Abstract:
The introduction of instant payment systems around the world has accelerated in recent years. There are now over 80 instant payment systems globally, with more than 35 being launched in the last five years and eight currently being built. These systems bring unprecedented speed and efficiency to payments markets, with greater convenience for consumers. However, faster payments also means faster fraud. For example, in Hong Kong, the volume of fraud cases more than doubled in the four years following the introduction of the Faster Payment Service in 2018. Authorized Push Payments (APP) fraud los
APA, Harvard, Vancouver, ISO, and other styles
9

Volkova, Nataliia P., Nina O. Rizun, and Maryna V. Nehrey. Data science: opportunities to transform education. [б. в.], 2019. http://dx.doi.org/10.31812/123456789/3241.

Full text
Abstract:
The article concerns the issue of data science tools implementation, including the text mining and natural language processing algorithms for increasing the value of high education for development modern and technologically flexible society. Data science is the field of study that involves tools, algorithms, and knowledge of math and statistics to discover knowledge from the raw data. Data science is developing fast and penetrating all spheres of life. More people understand the importance of the science of data and the need for implementation in everyday life. Data science is used in business
APA, Harvard, Vancouver, ISO, and other styles
10

Dutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.

Full text
Abstract:
Cannabis legalization has spread rapidly in the United States. Although national surveys provide robust information on the prevalence of cannabis use, cannabis disorders, and related outcomes, information on knowledge, attitudes, and beliefs (KABs) about cannabis is lacking. To inform the relationship between cannabis legalization and cannabis-related KABs, RTI International launched the National Cannabis Climate Survey (NCCS) in 2016. The survey sampled US residents 18 years or older via mail (n = 2,102), mail-to-web (n = 1,046), and two social media data collections (n = 11,957). This report
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!