Dissertations / Theses on the topic 'Fraud – Prevention'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Fraud – Prevention.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Howell, Andrew S. "Fraud prevention : the alignment between fraud-related legislation and fraud government practices." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/104398/1/Andrew_Howell_Thesis.pdf.
Full textPhillips, Thurman B., and Raymond J. Lanclos. "Data analytics in procurement fraud prevention." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42708.
Full textThe purpose of this research project is to explore the viability of detecting anomalies through using data analytics software as a tool in procurement fraud prevention and to analyze its potential policy implications on federal procurement stakeholders. According to a survey conducted in 2012 by the Association of Certified Fraud Examiners, organizations lose an estimated 5% of their revenues to fraud each year. In order to relate this estimate to the Department of Defense (DOD), this estimated percentage was applied to the requested DOD FY 2013 budget of $613.9 billion outlined in the Fiscal Year 2013 Budget Overview, resulting in a projected total fraud loss of $30.7 billion. The use of data analytics software has the potential to not only detect fraudulent procurements, but also to help deter fraudulent activities before they occur. The results of this research study will be a recommendation on the use of data analytics as a tool to detect anomalies that may indicate procurement fraud in DOD organizations.
Gill, Karen Ann. "Insurance fraud : causes, characteristics and prevention." Thesis, University of Leicester, 2014. http://hdl.handle.net/2381/29106.
Full textAyamga, Dominic. "TELECOMMUNICATION FRAUD PREVENTION POLICIES AND IMPLEMENTATION CHALLENGE." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69730.
Full textRahman, Md Mizanur. "Search Rank Fraud Prevention in Online Systems." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3909.
Full textFrank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.
Full textTitle from opening screen, December 28, 1999.
Dahabiyeh, Laila Ali. "IS security networks in credit card fraud prevention." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/88609/.
Full textSchillermann, Marcia. "Early Detection and Prevention of Corporate Financial Fraud." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6117.
Full textDan, Gorton. "Aspects of Modeling Fraud Prevention of Online Financial Services." Doctoral thesis, KTH, Transportvetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176298.
Full textFinansiella nättjänster är en del av vår kritiska infrastruktur. På så vis utgör de en akilleshäl i samhället och måste skyddas på erforderligt sätt. Under de senaste tio åren har det skett en förskjutning från traditionella dataintrång för att visa upp att man kan till en it-brottslighet med stora ekonomiska konsekvenser för samhället. De olika hoten mot nättjänster har blivit värre och riskhantering med avseende på överbelastningsattacker, nätfiske och banktrojaner är nu en del av dagordningen för finansiella institutioner. Denna trend övervakas av ansvariga myndigheter som efterhand ökar sina minimikrav för riskhantering och bland annat kräver regelbunden riskbedömning av befintliga och nya hot.För den finansiella institutionen skapar denna situation ett behov av att förstå alla delar av incidenthanteringsprocessen, inklusive dess teknik, delprocesser och de resurser som kan arbeta med bedrägeribekämpning. Traditionellt har varje motåtgärds effektivitet mätts, om möjligt, för en teknik i taget, vilket leder till att ansvariga för bedrägeribekämpning får separata värden för autentisering, intrångsdetektering och bedrägeridetektering.I denna avhandling har vi fokuserat på två problem med denna situation. För det första finns det ett behov av ett verktyg som kan modellera effektiviteten för institutionens samlade motåtgärder mot bakgrund av befintliga och nya hot. För det andra saknas det tillgång till data för forskning rörande bedrägeridetektering, vilket hämmar utvecklingen inom området.I huvuddelen av avhandlingen ligger tonvikten på att studera ”hela” incidenthanteringsprocessen istället för att fokusera på en teknik i taget. I den första artikeln presenterar vi ett verktyg som gör det möjligt att mäta effektiviteten i incidenthanteringsprocessen. Vi kallar detta verktyg för ”incident response tree” (IRT) eller ”incidenthanteringsträd”. I den andra artikeln presenterar vi ett flertal scenarier som är relevanta för riskhantering av finansiella nättjänster med hjälp av IRT. Vi utvecklar också en kompletterande modell som är inspirerad av befintliga modeller för att mäta kreditrisk. Med hjälp av scenarioberoende mått för ”förväntat bedrägeri” och ”value at risk”, har vi möjlighet att jämföra risker mellan olika nättjänster. Slutligen, i den tredje artikeln, skapar vi ett agentbaserat simuleringsverktyg som gör det möjligt att använda scenariospecifika resultat tillsammans med modeller som ”avkastning på säkerhetsinvesteringar” för att stödja beslut om framtida investeringar i motåtgärder.I den andra delen av avhandlingen utvecklar vi en metod för att generera syntetiskt data för test av bedrägeridetektering. I den fjärde artikeln presenterar vi ett agentbaserat simuleringsverktyg som med hjälp av bland annat ”sociala nätverksanalyser” kan användas för att generera syntetiskt data med realistiskt utseende. I den femte artikeln fortsätter vi detta arbete genom att lägga till en plattform för testning av bedrägeridetektering.
QC 20151103
Brawerman, Alessandro. "A Fraud-Prevention Framework for Software Defined Radio Mobile Devices." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7162.
Full textReaves, Michael Leland. "Healthcare Inequality & Fraud Prevention: Paternalism Justified to Enable Choice." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/579024.
Full textOliveira, Rossimar Laura. "Gestão de fraudes financeiras externas em bancos." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/96/96132/tde-21122012-111004/.
Full textAccording to KPMG audit report, 69% of companies admitted being victims of some kind of fraud. In 2010, the banking sector have lost approximately R$ 1.5 billion due to financial fraud perpetrated on customers considering only documentary fraud and the electronic banking fraud losses exceeded R$ 900 million in the same year. The types of fraud were many, including fraud during account opening, cloned checks, forgery, alteration barcode and card cloning. Fraud is a common problem in organizations and widely discussed in the market, however it was found that there is a theoretical gap when it comes to managing external fraud. The objective of this research was to structure a conceptual framework for the Management of Fraud and its comparison with the practice. This is an exploratory qualitative study and was conducted through analysis based on Grounded Theory defining categories from the available literature and interviews with comparison to a bank and an association of financial institutions, in addition to news articles. Regarding the use of results is an applied research its result can also contribute to the theoretical discussion, and be applied to any organization interested in managing financial fraud. The results of the development of the conceptual framework shows that the management of external financial fraud has four phases: Continuous, Prevention, Detection and Reaction and the defined categories are located in them. Regarding the comparison of theory with practice, not all aspects verified in the literature could be found in the reports of interviews and newspaper articles analyzed.
Taylor, Gordon Douglas. "Actions Taken by Texas School Districts to Prevent Fraud." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68052/.
Full textSlezak, Kathleen. "Fraud Prevention and Employee Rationalization in New York State Public Schools." Thesis, State University of New York at Albany, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3611898.
Full textPrompted by frequent media reports of school fraud and a lack of relevant K-12 literature, this research study was designed to investigate current fraud prevention practices in public school districts in New York State. Using a "fraud triangle" model, an analysis of existing legislation and professional practice guidelines reveals that an integral element is being overlooked in current fraud prevention efforts, namely employee attitudes (more formally rationalization).
In an effort to fill this gap, management and accounting literature is used to identify ten specific practices associated with a decreased likelihood of fraud rationalization in the business setting. Primary research is then used to ascertain the extent to which these business practices have been implemented in New York State public schools. HLM is used to examine the nature of the relationship between the presence of these practices within a school district and employee attitudes about rationalization, as a proxy measure of fraud risk.
Data concerning both district practices and employee attitudes about fraud were collected using an online survey of 938 employees from 56 randomly selected K-12 school districts in New York State. Findings reveal low or non-existent levels of district implementation for eight of the ten suggested fraud prevention strategies. However, where strategies have been implemented, employees are less likely to report rationalization about fraud. (As the number of strategies increases, rationalization tends to decrease.) The effect of individual strategies is examined. Several district and employee demographic factors are also found to have mitigating effects.
Based on the results of this research and analysis, specific recommendations are presented in an attempt to improve school district fraud prevention efforts. The analysis also suggests areas where follow-up research studies are warranted in light of this new base-line data.
Adawiah, Engku Rabiah. "Securities regulation and the prevention of securities fraud : a comparative study." Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU532150.
Full textABEI, YOLANDA AJI. "Impact of Internal Control on Fraud Detection and Prevention in Microfinance Institutions." Thesis, Karlstads universitet, Avdelningen för företagsekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85431.
Full textRockson, Albert. "Strategies for Preventing Financial Fraud in Church Organizations in Ghana." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7107.
Full textFadayo, Matthew. "An examination of e-banking fraud prevention and detection in Nigerian banks." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/17520.
Full textRückeshäuser, Nadine [Verfasser], and Günter [Akademischer Betreuer] Müller. "Distributed ledgers for the prevention of accounting fraud : : blockchains between expectations and reality." Freiburg : Universität, 2017. http://d-nb.info/1137466235/34.
Full textKävrestad, Joakim. "DEFINING, CATEGORIZING AND DEFENDING AGAINST ONLINE FRAUD." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9732.
Full textEfiong, Eme Joel. "An exploration of forensic accounting education and practice for fraud prevention and detection in Nigeria." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/10118.
Full textAbiola, James. "The impact of information and communication technology on internal control's prevention and detection of fraud." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9496.
Full textMakhooane, Stephen Malefane. "An investigation into fraud and corruption risk management policies and procedures at institutions of higher learning." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1003898.
Full textVälitalo, Heli. "CARD-NOT-PRESENT FRAUD IN FINLAND: WHO PAYS? AN ORGANIZATIONAL ECONOMICS APPROACH." Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-24620.
Full textAspvik, Daniel Weenås, and Preben Weenås Aspvik. "Contemporary Online Banking Fraud in Norway : A case study." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97710.
Full textExnerová, Irena. "Podvody, možné způsoby jejich prevence a jejich odhalování." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-15787.
Full textAl, Adwan Ahmad. "A cyber-consumer protection framework for prevention of online deceptive advertising." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/1744.
Full textMuthusamy, Gunasegaran. "Behavioral intention to use forensic accounting services for the detection and prevention of fraud by large Malaysian companies." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/216.
Full textHradilová, Zuzana. "Pojistné podvody." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2014. http://www.nusl.cz/ntk/nusl-232859.
Full textGöransson, Emelie. "Preventing Welfare Fraud in Sweden. Interviews with Officials from the County Government of Kalmar and Skåne." Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26379.
Full textKnuth, Tobias. "Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1256175.
Full textHašková, Kristýna. "Podvod a audit." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-142209.
Full textKonopíková, Marie. "Pojistné podvody." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-205812.
Full textMambwe, Richard. "FINANCIAL EXPLOITATION OF THE ELDERLY, WHAT IS THE WAY FORWARD?" Thesis, Malmö universitet, Malmö högskola, Institutionen för kriminologi (KR), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-18738.
Full textŠvec, Martin. "Pojistné podvody." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2012. http://www.nusl.cz/ntk/nusl-232651.
Full textWilson, Belinda R. "The Forgotten Signature: An Observational Study on Policy of Securing Identity in Prevention of Identity Theft and Credit/Debit Card Fraud at Retail Store POS Terminals." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3074.
Full textLiao, Chen-Yin, and 廖芝吟. "VoIP Dial Fraud Prevention and Detection." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/50557102922694736885.
Full text大同大學
資訊工程學系(所)
100
Due to the low cost of VoIP, it attracts many companies to introduce the technology into the enterprise for internal use to reduce the cost of communication. However, it is quite often that the user confidential information is stolen. In this case, the hacker may impersonate the user to make high cost calls. The extra telephone charges must be paid by the user. This vulnerability of VoIP has also become a major threat of enterprise information security. This study first proposes the basic security setting, which is often overlooked, for enterprises to implement the VoIP system in order to avoid hacker attacks. For the situation that the user confidential information is being stolen and the hacker try to impersonate the user to make calls, this study proposes two monitoring rules. One is the detection of suspicious registration message such that we can detect in the early stage whether the hacker want to steal confidential information. Another rule is to detect user abnormal conditions to judge whether the account has been stolen and is used to call the high cost phone. The proposed rules can detect a problem and send message to notify administrator to process in advance. According to the experimental results, the more messages being collected, the detection rate will get higher.
Lin, Jung-Cheng, and 林榮政. "Prevention of Fraud Crime Via Face Detection." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/44975943067784793774.
Full text國立臺北教育大學
資訊科學系碩士班
103
Gang of scammers often defrauds people by pretending to be government officials,job employers,debtee or kidnapers for ransom.They swindle people into transferring money or handing in money,ID cards, deposit books and name chops,and also they use those confidential belongings to open a dummy account and withdraw money illegally. Automatic teller machine(ATM) is unable to identify and notify account users instantly, which has put people’s property at risk.In this study,Raspberry Pi catches face features and then identifies people immediately by its face-recognition technology.This instant face detection system can function as a pre-warning security devise to prevent crime of fraud as it can provide scammers,face features and photos to the police authorities. After all,an ounce of prevention is better than a pound of cure.
Lin, Tzu-Kuei, and 林子貴. "Research on Prevention of Auto Insurance Fraud." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/68180778244282444623.
Full text崑山科技大學
企業管理研究所
104
The growing incidence of insurance fraud has become one of today's crime issues, which not only endanger the insurance market stability, but also affect the economic order of the country. How to make the prevention and control strategies effective has become the focus of the worldwide Insurance Supervisory. This study used case study, literature review, in-depth interview, and focus group interview from the industry, government, and academic experts, explored the following study topics: 1. Where profit was to be gained, no moral sense. 2. Insurance fraud crime had continuously regenerated, which would only have the transition of crime type or have the evolution of trick. Crime itself would not disappear. 3. Only the man who was close to the problem could solve it. 4. Stepping out with cautions, patience, and self-restraint to walk far. 5. Take precautions, get prepared before pouring rain. 6. Integrate every and each one in the industry by sharing information. And hence derived the following feasible tactical actions: 1. Set up the particular unit and assign the person in charge to deal with the relative issues. 2. Enhance internal education and on-job training to build up the curb of the prevention. 3. Firm internal audit and control to maintain the order. 4. Design the product with prudence and cautiousness and establish the database of fraud feature to systematically nose the trick out in the first place. 5. Integrate the notification mechanism and make well use of insurance fraud prevention platform. 6. Regularly share and exchange the information with other industry and expert to follow current trend. 7. Urge the government to pay much more attention to fraud crimes and to promote fraud prevention and control in people’s mind. 8. Prosecute fraud offenders with appropriate statute and clause to deter violators in futures. Hope this study will provide the insurance industry, following researcher, and authorities a well reference on prevention and control of insurance fraud.
SYU, RONG-TIAN, and 徐榮添. "Pattern and Prevention of Facebook Shopping Fraud." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ha3z5n.
Full text育達科技大學
資訊管理所
106
New gimmick of fraud case appears in the recent year, as era progresses, it evolves as well. According to National Police Agency, Ministry of the Interior, 165 anti-fraud counsel’s statistic shown: Fraud committed through social media (Facebook) is higher than auction website and has become the fraud ring’s favorite. From January to November, 2017, 4,275 cases of fraud have been committed. Regardless of government’s propaganda continuously reminding people, Facebook is just a social media and not shopping website, many people still uses Facebook to shop and become the victim of the fraud. Qualitative research method-semi-structured interview is used in this study, we divided Facebook fraud into, one-page advertisement, Facebook group buying, used item exchange, live online streaming etc. and interview both victims and officers to seek for ways to prevent fraud from happening. Research shown: Group buying or used item exchange uses rare item or price difference to attract victim. Then use common interest to gain their trust and led victims into the trap; one page advertisement uses pictures of celebrity or altered the news that victims believes it is used by celebrity or on the news and made the purchase. Victims usually don’t report the fraud to the police, instead, they take the matter into their own hand and more serious crime is committed as the result of it. The difficulties are police has many cases on hand and are committed in different ways. They are unable to gather enough information and look deeply into each case. Many cases are committed internationally and it is hard for the local police to solve the crime on their own. As the result, the public has negative impression that police are not seriously about solving the crime. The most effective ways to prevent Facebook fraud is to enhance Facebook user’s common sense on fraud and what to do if an user has become the victim of a fraud. Also work with popular social media group to publicize about fraud prevention and enhance the trust of the public towards the police solving the crime. Simplify the step to report a fraud and organized online fraud case from every cities and counties and restore judicial cooperation between China and Taiwan.
WANG, YAW-HUEI, and 王耀輝. "The Causes and Prevention Strategies of Telephone Fraud." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/00351497100532315496.
Full text國立臺北大學
犯罪學研究所
95
Telephone fraud has been a newly developing crime in recent years in Taiwan. Due to causing a lot of victims and money loss, it results in panic of the public and gets attention of the authorities. However, criminals of telephone fraud, who need not to present, cheat people by telephone , the public does not understand this kind of crime very much. This research expects to analyze crime pattern through interviewing with the criminals deeply. The study was based on in-depth interviews which selected five telephone fraud criminals to analyze the crime from criminals’ points of view. It generalizes the pattern of telephone fraud, the organization of telephone fraud, the interaction, psychology of telephone fraud criminal, etc.. It also discusses the rationalized crime strategy of telephone fraud criminal, crime course of analysis, interaction with the members and relationship with different groups. Finally, based on above result, this research establishes crime model of telephone fraud and describes overall crime process. And I propose the suggestion that generalizes 3C Prevention Strategies (construct, control and cooperation) to provide the practice unit for reference.
陳芳逸. "Embedded System-Based Home Phone Fraud Prevention Schem." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/nu29qd.
Full text中央警察大學
公共安全研究所
104
Due to the development of information and communication technology, telecom service providers can provide consumers telecom service with more variety and lower cost. But the criminal types and method of telecom fraud also advance with times. Criminal organizations also use all kinds of communication channels to contact with victims, including emails, communication softwares, smart phones and traditional home phones. They use the telecom service provided by telecom service providers to avoid investigation, save communication cost and tamper the caller ID. And they try to gain the victim’s trust through well-designed script and lifelike voice and intonation on the phone. Typical cases include charitable fraud, emergency fraud, online auction fraud, intimidation fraud, tax fraud, and so on, these fraud techniques often exploit human weaknesses to achieve. In order to mitigate the loss of civil property and socio-economic from fraud, the official and private try to elevate the civil anti-fraud awareness through propaganda and education, they also use functions and services provided by smartphones to develop the fraud prevention and warning app, such as whoscall, so the anti-fraud prevention schemes on smartphones are literally mature, including caller ID blacklist filter and SMS fraud keywords detection. Conversely, there are no any relevant prevention schemes on traditional home phone, even it has become gradually declined, a large proportion of families still have it, and most of the users are elderly, they are regarded as high risk population. Therefore, this study tries to combine relevant techniques, such as speech recognition and keywords detection, and using the Raspberry Pi, to propose an effective method and construct a home phone fraud prevention scheme, wishing to prevent the home phone fraud crime effectively.
CHEN, MIEN-TSUNG, and 陳綿宗. "Face Detection Technology In ATM Fraud Crime Prevention." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/14459111587198737807.
Full text國立臺北教育大學
資訊科學系碩士班
104
Due to the fact of enhanced development of technology, the development of face recognition technology and graphics has been used in a variety of locations including entry security systems, advertising systems and parking license plate recognition systems etc. Despite this, this technology is yet to be widespread or have an in-depth application in the banking system. It is important to have face detection to track and find criminals. In this paper, face detection technology is used in the banking system to make analysis and discussion for crime prevention. It has been suggested to use Raspberry Pi face detection technology to be placed in Automatic Teller Machines (ATM) to “scan the face” instead of withdrawing from financial cards (non-card withdrawal). This is an early preventive mechanism which will replace the traditional post-investigation of fraud. By doing this, criminals are less likely to use ATMs for their own interests, there will be fewer perpetrators and ultimately, criminals will be apprehensive to use ATMs as a tool for withdrawal.
WU, BANG-FAN, and 吳邦藩. "Research on Financial ATM Transfer Fraud Crime Prevention." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/s3nwz5.
Full text銘傳大學
犯罪防治學系兩岸與犯罪防治碩士在職專班
107
Financial ATM transfer fraud has become the most serious crime type in Taiwan’s economic crisis one. Study the law of its occurrence, development and evolution, and take the opposite countermeasures. Another important way. Financial ATM is the core of the modern economy and occupies a very important position in the national economy. Set. Because of this, financial institutions as traditional currencies and securities are criminals. The sinner is jealous. Especially in recent years, financial fraud crimes have become increasingly rampant, and new ways of committing crimes The increase and the increasing harm have become a public hazard that threatens the healthy development of the economy and finance. It seriously affects China's financial security and even economic security. Therefore, this article is to study one. The special causes of financial fraud cases. II. Financial ATM transfer fraud. Criminal techniques and three specific measures and countermeasures are of great importance Meaning and role.
Hsin, Tsui-Hua, and 辛翠華. "Financial Data Protection under Fraud Prevention--Centered around the Fraud Alert Information of Deposit Account." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/98686993213590791489.
Full text中原大學
財經法律研究所
100
The use of the fraud alert information of deposit account is a kind of credit information exchanging mechanism, set on financial fraud prevention. This mechanism is based upon Article 45-2, Paragraph 2, of the Banking Act, and Regulations Governing Bank Handling of Accounts with Suspicious or Unusual Transactions promulgated pursuant to Article 45-2, Paragraph 3, of the Banking Act. As to the information exchanging, it is operated by automation system of Joint Credit Information Center ("JCIC"). According to the current situation, this mechanism operates against those deposit account holders, and set them in a restrict position. The question is, do those restrictions meet the principle of law reservation, the principle of proportionality and the due process of law? Moreover, whether if the efficient system of JCIC can also prevent the rights and interests of people from improper use of information when it plays the role as a valuable crime prevention tool of the government? This thesis is aim to balance the conflict between financial fraud prevention and data protection inside the mechanism through literature analysis, comparative study and the writer’s work experience with anti-fraud helpline 165 of National Police Agency. The reference materials such as books, periodical materials, papers, research reports, OECD 「1980 Guidelines on the Protection of Privacy and Trans-Border Flows of Personal Data」, FATF「40+9 Recommendations」and the Fair Credit Reporting Act , (15 U.S.C. § 1681) are included. Finally, the last part of this thesis draws the conclusions about the framework of legal protection for the mechanism.
Ting, Shui-fu, and 丁水復. "Legal Prevention System of Newly Emerging Crime of Fraud." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/45584401485765643166.
Full text國立中山大學
大陸研究所
93
Abstract The newly emerging crime of fraud is classified as a new form of crime. The type of fraud is just like an amoeba with unpredictable forms. This type of crime is also rare overseas. Since 1997 as economy evolves, electronics communication prospers and internet becomes more common in Taiwan, several new crimes of fraud such as lottery, credit mortgage, purchasing, or cell phone text messaging have started to emerge. Some common characteristics of these newly emerging crimes are the use of large volumes of counterfeit documents, fraudulent accounts or deceptive phone calls to fake any forged but vivid and intense scenarios that induce or threaten victims to transfer money into fraudulent accounts appointed by the criminal group and seriously breach people''s financial safety protected by law. Although a number of public order, electronic communication and financial authorities and businesses have already enforced internal policies to prevent the fraud. However a statistic collected by the criminal police department shows that the number of fraud cases has increased drastically by 42.6 times in the past 11 years. Due to large number of victims and the urgency pushed by the people and public opinion, The Executive Yuan of the Republic of China has established an “Anti-Fraud Cross Functional Coordination Meeting” to coordinate the process from the perspective of public policies. However the progress is generally considered slow. The crimes has penetrated to the society and stretched into numerous forms. It has even lead to negative social external effect. This study focuses on the legal prevention system of newly emerging crime of fraud and references to other related administrative laws. The main theoretical framework is based on the basic theory of administrative laws which include theory, organization, right, relief and supervision. Finally the purpose of the theoretical framework is to evaluate the followings: effectiveness of anti-fraud actions in Taiwan, completeness of the current regulations, cooperation of various government authorities, and cooperation between the private financial organizations and communications businesses. This study will also find out whether it will be effective to establish a public order committee under the Executive Yuan of the Republic of China or a national crime research institute as in other developed countries to support the government in fighting against crime; whether a “financial police department” is necessary; and how China and Taiwan can cooperate through multi-delegation to battle against the crimes conducted by criminals or fugitives from justice who hide at the other side of the shore.
Pan, Wen-Chung, and 潘穩中. "Insurance Fraud Prevention from the Perspective of Insurance Law." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/89904647949592029943.
Full text國立臺灣大學
法律學研究所
101
Insurance fraud which occurs frequently has been tackled by insurance practice and related regulations. With more observation, they put more efforts to establish the preventive norms, especially on the fraudulent claim after the occurrence of insurance accident. However, there are varieties of insurance fraud which is not limited to the cases mentioned above. Besides, according to Article 29 Section2 at Insurance Law, the insurance contract can survive even though the fraud done by the insured wrecks a havoc on the reliance between the insurer and insured, needless to say the insurer is able to terminate the contract by Insurance Law. Taiwan Insurance Law contains myriads of disadvantages. In lieu of these, it is suggested to adopt with some rule such as clausula rebus sic stantibus, the rule of continuous contract in civil law and regulations on special provisions in Insurance Law. Albeit, there are still insufficient to handle all problems. As to clausula rebus sic stantibus, the conditions of the rule is not so concrete and full of limitation to fulfill its purpose. Take the rule of continuous contract for another example, judges would be reluctant to utilize it because of lack of accurate regulations. Even though we put more hopes on special provisions in Insurance Law, it is still limited to Article 54-1and eventually becomes unavailable on solutions. With the perception of these problems, there is the tremendous amendment in Japanese Insurance Law in 2008, including the addition on fundamental termination regulation to provides with more concrete and instructive solutions to insurance fraud. In a nutshell, the thesis try to provides with legislative suggestion and proposes some drafts with the introduction these development to Taiwan Insurance Law .
Ku, Hui-Chen, and 古慧珍. "Prevention of Internet Fraud--Focusing on the dummy account." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/48619870226570296728.
Full text國立交通大學
管理學院碩士在職專班科技法律組
94
Along with the popularity, technology enhancement, rapid growth of users and expansion of spending time in the Internet, the activities in this virtual world have multiplied. Its negative side-effect nourished new types of crime. Among them, Internet fraud has posed a serious threat to the development of e-commerce. Moreover, the anonymity and the instantaneous features of the Internet hinder the crackdown against this crime. According to this research, up to 66.2 percent of all Internet fraud cases, there was dummy account involvement. Therefore, hypothetically, detecting dummy accounts should effectively prevent Internet fraud. In the light of Becker’s “rational crime model”, prevention policies would function in two methods; one is to reduce the illegal gains, the other one is to increase the penalty. Several prevention policies announced on May 8, 2005 and April 27, 2006 justified the mechanism for banks to temporarily freeze dummy accounts. Nevertheless, modifications to a certain degree should be made to those laws and regulations regarding abuse of the power of autorotation and the manipulation for inappropriate purposes. Furthermore, this research tried to review the effectiveness of such prevention policies and regulations. Apparently, according to the statistics, there hasn’t been any obvious result in deterring Internet fraud by implementing policies to track down dummy accounts. From the viewpoint of economic analysis of law, this study probed the reasons why the prevention policies failed. In addition, following the “rational crime model” and the rule of minimum prevention cost, we suggest that, in order to deter Internet fraud in the most cost-effective way, the audit and screening procedures of personal accounts should be tightened up and the penalty of dummy accounts vending should be increased.
Liao, Yuan-hung, and 廖元宏. "Credit Card Fraud, Prevention and Counterfeit Immigration in Taiwan." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/41663817638744775398.
Full text世新大學
法律學研究所(含碩專班)
93
The credit card is so popular currently around the world for it's ability to play an important role of convenient payment tool. With high development of technology and the coming of knowledge-economy, not only the credit card business has been diversified, but the fraud risk has increased continuously. Hence bank is facing the greatest challenge and focusing on how to manage and control the serious fraud risk, as well as to promote the service quality. In view of the increase in credit card issuing, utility ratio and also fraud cases, first of all, this research is going to analyze criminal types with respective characteristics, fraud skills and to discuss future development based on criminal psychology. As overseas fraud groups take chance to migrate credit card forgery skills into Taiwan and together to cooperate with local fraud groups, this has resulted in the increase of credit card fraud cases and damage of rights/interests to customers, and banks with bearing bad debt risk. Due to the fact that credit card crime has been internationalized and grouped, secondly, this research is also to point out current and future credit card problems and to work out the prevention and precaution. Finally, to gather people in public to look into seriously credit card crime and develop the strategy of precaution, and further to remove this negative image as " Taiwan is a Kingdom/Heaven of Fraud and Forgery" are main topics for the purpose of protecting the consumer market and promoting banking business and environment to be more competitive all over the word.
Ching-Hai, Wu, and 吳清海. "The Research on Prevention Policy for Telephone Fraud Crime." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/58748085833121081139.
Full text佛光大學
公共事務學系
95
Telephone fraud is different from traditional fraud in which victims and swindlers are face-to-face. This new type of fraud makes use of various media, such as the convergence of information and communication, mass media, telecommunication network and financial services, etc., to contact victims indirectly in order to take advantage of the weaknesses of human nature. Cheated by excellent manipulation skill, victims are trapped and give away their money. Telephone fraud not only seriously affects citizen’s daily life but also makes a great impact on the public order. Nowadays, almost everyone has ever received phone calls from swindler. They feel helpless and depressed, and don’t even dare to speak loudly on the phone in case they’ll suffer greater damage after offending the deception group. Though news media reports occasionally that the police have cracked fraud group cases, this doesn’t seem to be good enough since each one of us or our friends keeps receiving phone calls from swindlers. This article treats certain resolved fraud group cases in order to understand the structure of the criminal groups, criminal mechanism and motives. This article concludes the criminal pattern and further provides detective officers with practical investigative mode and methods. Thus this kind of criminal cases can be solved efficiently, and victims’ right can be protected. 81 telephone fraud cases and official documents were gathered and analyzed by content analysis. The factors from criminal locations were quantified, and the distributions were analyzed. From the data, the criminal patterns were induced, and accordingly, I constructed various kinds of investigative modes. Through experts’ instructions and professionals’ in-depth interviews, the criminal pattern and investigative modes were checked and modified, which makes the research results more complete and practical. Finally, the feasibility of the investigative mode would be tested via practice units’ handling and investigating telephone fraud cases.