Dissertations / Theses on the topic 'FRAUD AND DATA BREACHES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'FRAUD AND DATA BREACHES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Full textOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textPhillips, Thurman B., and Raymond J. Lanclos. "Data analytics in procurement fraud prevention." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42708.
Full textKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Full textPerols, Johan L. "Detecting Financial Statement Fraud: Three Essays on Fraud Predictors, Multi-Classifier Combination and Fraud Detection Using Data Mining." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002486.
Full textOsei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.
Full textMoruzzi, Davide <1997>. "Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19916.
Full textAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Full textGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Full textGarringer, James. "The Role of Protocol Analysis in Cybersecurity| Closing the Gap on Undetected Data Breaches." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10974156.
Full textRenström, Martin, and Timothy Holmsten. "Fraud Detection on Unlabeled Data with Unsupervised Machine Learning." Thesis, KTH, Hälsoinformatik och logistik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230592.
Full textWashington, Kevin D. "The impact of data breaches on market value of firms in the E-Commerce marketplace." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10102712.
Full textEnríquez, Luis. "Personal data breaches : towards a deep integration between information security risks and GDPR compliance risks." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILD016.
Full textVan, Heerden Johan H. "Detecting fraud in cellular telephone networks." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50314.
Full textGadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.
Full textMetzler, Guillaume. "Learning from imbalanced data : an application to bank fraud detection." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES033.
Full textHaq, Ikram. "Fraud detection for online banking for scalable and distributed data." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/171977.
Full textOransky, Ivan. "Retractions, Post-Publication Peer Review and Fraud: Scientific Publishing's Wild West." University of Arizona Library (Tucson, AZ), 2016. http://hdl.handle.net/10150/621550.
Full textPelletier, Justin M. "Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10615009.
Full textMonteiro, António S. "Multiple additive regression trees : a methodology for predictive data mining for fraud detection /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMonteiro.pdf.
Full textAmaya, de la Pena Ignacio. "Fraud detection in online payments using Spark ML." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219916.
Full textZachis, Savio de Melo. "Analysis of breaches and co-breaks in financial series: a non-parametric approach data using high frequency." Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=3730.
Full textHawlová, Kateřina. "Návrh postupu odhalování podvodného chování." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114039.
Full textKävrestad, Joakim. "DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9732.
Full textEdge, Michael Edward. "A Policy Driven Approach to Proactive Fraud Management in Financial Data Streams." Thesis, University of Manchester, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525241.
Full textRouillard, Gregory W. "An improved unsupervised modeling methodology for detecting fraud in vendor payment transactions." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FRouillard.pdf.
Full textWesterlund, Fredrik. "CREDIT CARD FRAUD DETECTION (Machine learning algorithms)." Thesis, Umeå universitet, Statistik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-136031.
Full textMonteiro, Antonio Jorge Ferreira da Silva. "Multiple additive regression trees: a methodology for predictive data mining for fraud detection." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/4812.
Full textNsibande, Senzosenkosi. "The impact of data breaches of varying severity on the customer loyalty of high net worth individuals in retail banking." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79631.
Full textAbidogun, Olusola Adeniyi. "Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Full textÖtting, Marius [Verfasser]. "Sports statistics in the data age: betting fraud detection and performance evaluation / Marius Ötting." Bielefeld : Universitätsbibliothek Bielefeld, 2020. http://d-nb.info/1218230657/34.
Full textLopez-Rojas, Edgar Alonso. "Applying Simulation to the Problem of Detecting Financial Fraud." Doctoral thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12932.
Full textLudvigsen, Jesper. "Handling Imbalanced Data Classification With Variational Autoencoding And Random Under-Sampling Boosting." Thesis, Uppsala universitet, Statistiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412838.
Full textCanillas, Rémi. "Privacy and Security in a B2B environment : Focus on Supplier Impersonation Fraud Detection using Data Analysis." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI118.
Full textElmir, Ahmad. "PaySim Financial Simulator : PaySim Financial Simulator." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14061.
Full textJenkins, Donald J. "Evaluation of fraud detection data mining used in the auditing process of the Defense Finance And Accounting Service." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FJenkins.pdf.
Full textMinhas, Saliha Z. "A corpus driven computational intelligence framework for deception detection in financial text." Thesis, University of Stirling, 2016. http://hdl.handle.net/1893/25345.
Full textKnuth, Tobias. "Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1256175.
Full textKemp, Steven. "Fraud against individuals in the Internet era: trends, victimisation, impact and reporting." Doctoral thesis, Universitat de Girona, 2020. http://hdl.handle.net/10803/671164.
Full textParedes, Leandro Rocío Margaret. "An internal fraud model for operational losses : an application to evaluate data integration techniques in operational risk management in financial institutions." Doctoral thesis, Pontificia Universidad Católica del Perú, 2016. http://tesis.pucp.edu.pe/repositorio/handle/123456789/7998.
Full textEvett, Chantal. "What are the Potential Impacts of Big Data, Artificial Intelligence and Machine Learning on the Auditing Profession?" Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1642.
Full textZhang, Angang. "Some Advances in Classifying and Modeling Complex Data." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/77958.
Full textRahman, Mahmudur. "Data Verifications for Online Social Networks." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2299.
Full textIslam, Md Zahidul. "A Cloud Based Platform for Big Data Science." Thesis, Linköpings universitet, Programvara och system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-103700.
Full textCavina, Eugenio. "GEAR: una piattaforma Big Data per l'elaborazione di stream di dati attraverso Machine Learning e Business Rules." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20416/.
Full textYounis, Zaki Mohamed. "An ontological approach for monitoring and surveillance systems in unregulated markets." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/an-ontological-approach-for-monitoring-and-surveillance-systems-in-unregulated-markets(056f8010-08b2-4eb0-a75d-5301b899ec90).html.
Full textRavaglia, Alex. "Riconoscimento di frodi attraverso la modellazione del comportamento degli utenti." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23107/.
Full textVilar, Fabien. "Reasoning about big data flows : TOM4A recursive abstraction based problem solving method." Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0667/document.
Full textChau, Dueng Horng. "Data Mining Meets HCI: Making Sense of Large Graphs." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/94.
Full text