Journal articles on the topic 'FRAUD AND DATA BREACHES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'FRAUD AND DATA BREACHES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Johnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Full textBush, Don. "How data breaches lead to fraud." Network Security 2016, no. 7 (2016): 11–13. http://dx.doi.org/10.1016/s1353-4858(16)30069-1.
Full textBaladari, Venkata. "SMART PAYMENT SECURITY: A SOFTWARE DEVELOPER'S ROLE IN PREVENTING FRAUD AND DATA BREACHES." International Journal of Core Engineering and Management 6, no. 9 (2020): 165–75. https://doi.org/10.5281/zenodo.15020546.
Full textSanskrati Agarwal and Usha J. "Detection of fraud card and data breaches in credit card transactions." International Journal of Science and Research Archive 9, no. 2 (2023): 576–82. http://dx.doi.org/10.30574/ijsra.2023.9.2.0603.
Full textChaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Optimized early financial fraud detection and prevention method to enhance the security." Journal of Information and Optimization Sciences 46, no. 2 (2025): 359–69. https://doi.org/10.47974/jios-1920.
Full textEze, Charles Uzodinma, Emmanuel Chukwuma Ebe, Ifeoma Mary Okwo, et al. "Effect of the Capability Component of Fraud Theory on Fraud Risk Management in Nigerian Banks." International Journal of Financial Research 13, no. 1 (2022): 90. http://dx.doi.org/10.5430/ijfr.v13n1p90.
Full textChaudhary, Newal. "Enacting Data Protection Law in Nepal." Prashasan: The Nepalese Journal of Public Administration 57, no. 1 (2025): 206–16. https://doi.org/10.3126/prashasan.v57i1.80668.
Full textHasan, Kumrul, Md Nazmul Hosen, and Kinjol Saha. "Federated Learning for Telecom Fraud Detection: A Privacy-Preserving Approach to Overcoming Data Fragmentation and Enhancing Security." European Journal of Theoretical and Applied Sciences 2, no. 6 (2024): 99–109. http://dx.doi.org/10.59324/ejtas.2024.2(6).08.
Full textKumrul, Hasan, Nazmul Hosen Md, and Saha Kinjol. "Federated Learning for Telecom Fraud Detection: A Privacy-Preserving Approach to Overcoming Data Fragmentation and Enhancing Security." European Journal of Theoretical and Applied Sciences 2, no. 6 (2024): 99–109. https://doi.org/10.59324/ejtas.2024.2(6).08.
Full textSWAMY, Mr K. K., B. MEGHANA REDDY, K. SAI CHAITANYA, M. HARINI, and T. MEHER PRANEETH. "DETECTING UNAUTHORIZED OR FRAUD PROFILES USING ARTIFICIAL NEURAL NETWORKS." YMER Digital 21, no. 05 (2022): 404–11. http://dx.doi.org/10.37896/ymer21.05/43.
Full textWanasiri, Yunita. "Analysis of NIK Data Breaches and Their Implications for Achieving the SDGs in Indonesia: A Case Study and Policy Recommendations." Records Management System Journal 3, no. 02 (2025): 11–19. https://doi.org/10.62201/rmsj.v3i02.204.
Full textAbhishek Jain. "AI-Driven Models for Financial Fraud Mitigation: A Data-Centric Approach to Detecting and Preventing Fraudulent Transactions." Darpan International Research Analysis 13, no. 2 (2025): 1–14. https://doi.org/10.36676/dira.v13.i2.164.
Full textOluwabiyi Oluwawapelumi Ajakaye, Ayobami Gabriel Olanrewaju, David Fawehinmi, Rasheed Afolabi, and Gold Mebari Pius-Kiate. "Integrating Artificial Intelligence in organizational cybersecurity: Enhancing consumer data protection in the U.S. Fintech Sector." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 2802–21. https://doi.org/10.30574/wjarr.2025.26.1.1421.
Full textGanji, Shubham. "Mobile Forensics in Financial Fraud Analysis." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30381.
Full textMd, Abdul Quadir, Dibyanshu Jaiswal, Jay Daftari, Sabireen Haneef, Celestine Iwendi, and Sanjiv Kumar Jain. "Efficient Dynamic Phishing Safeguard System Using Neural Boost Phishing Protection." Electronics 11, no. 19 (2022): 3133. http://dx.doi.org/10.3390/electronics11193133.
Full textBacellar, Leandro Wünsche, and Elizeu Luiz Toporoski. "Clonagem de cartão de crédito sob a perspectiva da Lei Geral de Proteção de Dados." Academia de Direito 6 (December 18, 2024): 4374–88. https://doi.org/10.24302/acaddir.v6.5673.
Full textJimmy, Fnu. "Enhancing Data Security in Financial Institutions with Blockchain Technology." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 5, no. 1 (2024): 424–37. http://dx.doi.org/10.60087/jaigs.v5i1.217.
Full textS Prabhakar, I Nalinaksha, and V Anjaneyulu. "Role of AI in enhancing cybersecurity measures to protect sensitive financial data." International Journal of Science and Research Archive 10, no. 1 (2023): 1091–97. http://dx.doi.org/10.30574/ijsra.2023.10.1.0700.
Full textSunil Kumar. "Blockchain and Machine Learning: A Multidisciplinary Synergistic Approach for Fraud Detection in Finance, Healthcare, and Cybersecurity." Communications on Applied Nonlinear Analysis 32, no. 4s (2024): 218–36. https://doi.org/10.52783/cana.v32.2768.
Full textKalyanasundharam, Ramachandran. "Shielding the Digital Vault: Harnessing Tokenization to Safeguard Financial Transactions." Journal of Scientific and Engineering Research 6, no. 8 (2019): 338–45. https://doi.org/10.5281/zenodo.11234558.
Full textLiu, Yanling, and Yun Li. "Financial Data Security Management in the Era of Big Data." Proceedings of Business and Economic Studies 8, no. 2 (2025): 37–42. https://doi.org/10.26689/pbes.v8i2.10259.
Full textRajkumar Sekar. "Designing secure data applications and products in the AI-driven finance sector." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 556–63. https://doi.org/10.30574/wjaets.2025.15.1.0238.
Full textJANISAR, MOHD. "Navigating the Cybersecurity Landscape: Trends, Threats, and Strategies." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28610.
Full textDoorn, Peter, Ingrid Dillo, and René Van Horik. "Lies, Damned Lies and Research Data: Can Data Sharing Prevent Data Fraud?" International Journal of Digital Curation 8, no. 1 (2013): 229–43. http://dx.doi.org/10.2218/ijdc.v8i1.256.
Full textДоценко, Тетяна, and Михайло Кузьменко. "CYBER FRAUD AS A THREAT TO THE SUSTAINABLE DEVELOPMENT OF THE HEALTH CARE SYSTEM: A SYSTEMATIC BIBLIOMETRIC ANALYSIS." Сталий розвиток економіки, no. 2(47) (December 29, 2023): 50–57. http://dx.doi.org/10.32782/2308-1988/2023-47-7.
Full textBandari, Madhu, and P. Pavan Kumar. "Securing Iot Networks Against Fraud Using Deep Radial Basis Function Neural Networks." Journal of Neonatal Surgery 14, no. 5 (2025): 219–26. https://doi.org/10.52783/jns.v14.2926.
Full textNidhi Sonkar. "An Empirical Study on the Economic Impact of Cybersecurity Breaches and Computer Fraud on SMEs." Journal of Information Systems Engineering and Management 10, no. 7s (2025): 730–35. https://doi.org/10.52783/jisem.v10i7s.986.
Full textAjay Tanikonda. "Deep Learning for Anomaly Detection in E-commerce and Financial Transactions: Enhancing Fraud Prevention and Cybersecurity." Journal of Information Systems Engineering and Management 10, no. 30s (2025): 70–77. https://doi.org/10.52783/jisem.v10i30s.4776.
Full textXu, Yue. "Research on Social Network Secunity Issues and Countermeasures Based on Big Data." International Journal of Computer Science and Information Technology 4, no. 3 (2024): 373–79. https://doi.org/10.62051/ijcsit.v4n3.42.
Full textNero, Alex, and Gifty Sarin. "A study on analysing the role of blockchain in supply chain data security and developing a conceptual diagram." Journal of Management Research and Analysis 11, no. 4 (2025): 202–8. https://doi.org/10.18231/j.jmra.2024.035.
Full textSONI, ADITYA. "The Impact of Artificial Intelligence on Financial Services Industry: JP Morgan." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50802.
Full textN, Mrs Sridevi. "A Review on UPI Fraud Detection using Machine Learning and Deep Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 18–22. https://doi.org/10.22214/ijraset.2024.65514.
Full textKato, Jimmy, Eria Othieno Pinyi, Iga Daniel Ssetimba, Harriet Norah Nakayenga, Brian Akashaba, and Evans Twineamatsiko. "Securing Taxpayer Data: Advancing Cybersecurity in Tax Accounting Practices." International Journal of Research in Interdisciplinary Studies 2, no. 7 (2024): 42–46. https://doi.org/10.5281/zenodo.12793618.
Full textHaland, Christoffer, and Anders Granmo. "Machine Learning for Anomaly Detection: Insights into Data-Driven Applications." International journal of data science and machine learning 05, no. 01 (2025): 36–41. https://doi.org/10.55640/ijdsml-05-01-07.
Full textUnuigbokhai, Nkem Belinda, Godfrey Perfectson Oise, Babalola Eyitemi Akilo, et al. "ADVANCEMENTS IN FEDERATED LEARNING FOR SECURE DATA SHARING IN FINANCIAL SERVICES." FUDMA JOURNAL OF SCIENCES 9, no. 5 (2025): 80–86. https://doi.org/10.33003/fjs-2025-0905-3207.
Full textSoundararajan, Balaji. "Challenges and Checkpoints of Payment Systems Security." Journal of Software Engineering and Simulation 7, no. 9 (2021): 46–53. https://doi.org/10.35629/3795-07094653.
Full textMotak, Maciej. "Enhance Cloud Security for Financial Data with Blockchain Integration and ECC Encryption." International Journal of Multidisciplinary Research and Growth Evaluation 1, no. 4 (2020): 67–76. https://doi.org/10.54660/.ijmrge.2020.1.4.67-76.
Full textKshitij Varshney. "Digital Identity Management Using Biometric Systems: BioTrace." Journal of Information Systems Engineering and Management 10, no. 51s (2025): 374–85. https://doi.org/10.52783/jisem.v10i51s.10396.
Full textVaishnavi, R., and Robert M. Sandeepthi. "Cybersecurity Challenges and Regulatory Compliance in Neobanking in India." TECHNO REVIEW Journal of Technology and Management 4, no. 4 (2024): 24–33. https://doi.org/10.31305/trjtm2024.v04.n04.004.
Full textP., R. Gowdham Sankar, and Mahalakshmi K. "MICRO PAYMENTS IN OFF-LINE SECURE CREDITS USING RODO RESILIENT DEVICE." International Journal of Advanced Trends in Engineering and Technology 2, no. 1 (2017): 34–38. https://doi.org/10.5281/zenodo.495579.
Full textAdonis, Ridoh, and Bethuel Sibongiseni Ngcamu. "An empirical investigation into the information management systems at a South African financial institution." Banks and Bank Systems 11, no. 3 (2016): 58–65. http://dx.doi.org/10.21511/bbs.11(3).2016.06.
Full textMs., Manindra Singh Hanspal, and Ashutosh Acharya Mr. "Cybercrimes in the Digital Age: Typologies, Legal Challenges, And Countermeasures." Annual International Journal of Vaikunta Baliga College of Law (AIJVBCL) 2 (May 2, 2025): 201–15. https://doi.org/10.5281/zenodo.15327248.
Full textManish keshavrao Hadap, Arvinder Kour Mehta, Gitti Narsimlu, Parag Jawarkar, Vijay kumar Kaluvala, and Ajay Kumar Chaturvedi. "An Empirical Study on the Economic Impact of Cybersecurity Breaches and Computer Fraud on SMEs." Metallurgical and Materials Engineering 31, no. 2 (2025): 93–97. https://doi.org/10.63278/1340.
Full textMithun, Kumar A., and V. Kavitha Dr. "Navigating Cyber Crime and Fraud in the Metaverse: Emerging Threats and Mitigation Techniques." International Journal of Innovative Science and Research Technology (IJISRT) 10, no. 1 (2025): 2064–70. https://doi.org/10.5281/zenodo.14836484.
Full textPavan, Kumar Joshi, and Kotha Rajesh. "An In-depth Knowledge on EMV Tags and their Adoption in FinTech and Traditional Banking." Journal of Scientific and Engineering Research 10, no. 9 (2023): 77–86. https://doi.org/10.5281/zenodo.14049938.
Full textNagesh Mapari, Samiksha Sandip Borkar, Karan Pradip Morey, Harshwardhan Tejrao Pawar, and Om Vishwanath Vasu. "A Systematic Credit Card Analysis for Detection of Compromised Data Using Machine Learning." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 04 (2025): 1273–77. https://doi.org/10.47392/irjaem.2025.0208.
Full textAltynov, Artem I., and Yulia V. Turovets. "Regulatory technologies in traditional industries as an element of the digital transformation: Perspectives for development." Vestnik of Saint Petersburg University. Management 21, no. 2 (2022): 237–62. http://dx.doi.org/10.21638/11701/spbu08.2022.204.
Full textR, Anuvidhya. "RANFO: An Intelligent Anomaly Detection in IoT Edge Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 2900–2907. http://dx.doi.org/10.22214/ijraset.2021.35622.
Full textJagetia, Anoop. "The Factors that are Influencing Mobile Banking App Adoption: Focusing on Security Perceptions, Behavioral Intentions and Technological Trust in Emerging Markets." Journal of Extension Systems 38, no. 2 (2023): 16–21. https://doi.org/10.48165/jes2022.38.2.3.
Full textMahaboobsubani, Shaik. "Edge Computing for Financial Data Processing." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 3, no. 3 (2017): 1–9. https://doi.org/10.5281/zenodo.14352602.
Full text