Journal articles on the topic 'Identification fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identification fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Wei, Amna Saeed Khalifa, Kate L. Morgan, and Ken T. Trotman. "The effect of brainstorming guidelines on individual auditors’ identification of potential frauds." Australian Journal of Management 43, no. 2 (2017): 225–40. http://dx.doi.org/10.1177/0312896217728560.
Full textChen, Wei, Amna Saeed Khalifa, and Ken T. Trotman. "Facilitating Brainstorming: Impact of Task Representation on Auditors' Identification of Potential Frauds." AUDITING: A Journal of Practice & Theory 34, no. 3 (2014): 1–22. http://dx.doi.org/10.2308/ajpt-50986.
Full textRavi, S., J. Thanga Kumar, Dr Linda Joseph, Sumanth Raju Kunjeti, Nandu Vardhan Saniboina, and Sandeel Reddy Endela. "An Unique Methodology for Credit Card Fraud Detection based on Convolutional Neural Network." Alinteri Journal of Agriculture Sciences 36, no. 1 (2021): 277–80. http://dx.doi.org/10.47059/alinteri/v36i1/ajas21041.
Full textChen, Clara Xiaoling, Ken T. Trotman, and Flora (Hailan) Zhou. "Nominal versus Interacting Electronic Fraud Brainstorming in Hierarchical Audit Teams." Accounting Review 90, no. 1 (2014): 175–98. http://dx.doi.org/10.2308/accr-50855.
Full textZheng, Yuan, Xiaolan Ye, and Ting Wu. "Using an Optimized Learning Vector Quantization- (LVQ-) Based Neural Network in Accounting Fraud Recognition." Computational Intelligence and Neuroscience 2021 (June 28, 2021): 1–10. http://dx.doi.org/10.1155/2021/4113237.
Full textSimon, Chad A. "Individual Auditors' Identification of Relevant Fraud Schemes." AUDITING: A Journal of Practice & Theory 31, no. 1 (2012): 1–16. http://dx.doi.org/10.2308/ajpt-10169.
Full textQin, Rongyuan. "Identification of Accounting Fraud Based on Support Vector Machine and Logistic Regression Model." Complexity 2021 (April 10, 2021): 1–11. http://dx.doi.org/10.1155/2021/5597060.
Full textGăbudeanu, Larisa, Iulia Brici, Codruța Mare, Ioan Cosmin Mihai, and Mircea Constantin Șcheau. "Privacy Intrusiveness in Financial-Banking Fraud Detection." Risks 9, no. 6 (2021): 104. http://dx.doi.org/10.3390/risks9060104.
Full textHong, Young-Ran, and Dong-Soo Kim. "Fraud Click Identification Using Fingerprinting Method." Journal of Society for e-Business Studies 16, no. 3 (2011): 159–68. http://dx.doi.org/10.7838/jsebs.2011.16.3.159.
Full textEndres, Kyle, and Costas Panagopoulos. "Photo identification laws and perceptions of electoral fraud." Research & Politics 8, no. 3 (2021): 205316802110304. http://dx.doi.org/10.1177/20531680211030435.
Full text이명걸 and YoungGyu Ahn. "Fraud Triangle Theory and Identification of Financial Fraud From China’s Listed Company." Korea International Accounting Review ll, no. 58 (2014): 470–87. http://dx.doi.org/10.21073/kiar.2014..58.024.
Full textCarpenter, Tina D. "Audit Team Brainstorming, Fraud Risk Identification, and Fraud Risk Assessment: Implications of SAS No. 99." Accounting Review 82, no. 5 (2007): 1119–40. http://dx.doi.org/10.2308/accr.2007.82.5.1119.
Full textGeng, Xiuqin, and Dawei Yang. "Intelligent Prediction Mathematical Model of Industrial Financial Fraud Based on Data Mining." Mathematical Problems in Engineering 2021 (August 3, 2021): 1–8. http://dx.doi.org/10.1155/2021/8520094.
Full textHaoxiang, Wang, and Smys S. "A Survey on Digital Fraud Risk Control Management by Automatic Case Management System." March 2021 3, no. 1 (2021): 1–14. http://dx.doi.org/10.36548/jeea.2021.1.001.
Full textSELISHCHEV, Serhii. "Fraud risk identification in project management in transport and logistics business." Economics. Finances. Law, no. 5 (May 26, 2021): 13–15. http://dx.doi.org/10.37634/efp.2021.5.3.
Full textRuggieri, Lynn. "From Horses To Log Cabins A $9 Million Embezzlement Case: How Did The Owner Not Know?" Journal of Business Case Studies (JBCS) 8, no. 6 (2012): 575–84. http://dx.doi.org/10.19030/jbcs.v8i6.7379.
Full textDoosti, Abbas, Payam Ghasemi Dehkordi, and Ebrahim Rahimi. "Molecular assay to fraud identification of meat products." Journal of Food Science and Technology 51, no. 1 (2011): 148–52. http://dx.doi.org/10.1007/s13197-011-0456-3.
Full textCarpenter, Tina D., and Jane L. Reimers. "Professional Skepticism: The Effects of a Partner's Influence and the Level of Fraud Indicators on Auditors' Fraud Judgments and Actions." Behavioral Research in Accounting 25, no. 2 (2013): 45–69. http://dx.doi.org/10.2308/bria-50468.
Full textSchultz, David. "Is Voter Fraud Like Littering?: Empirical and Methodological Considerations." American Review of Politics 33 (November 1, 2012): 233–43. http://dx.doi.org/10.15763/issn.2374-7781.2012.33.0.233-243.
Full textAgostini, Marisa. "Two common steps in firms’ failing path." Risk Governance and Control: Financial Markets and Institutions 3, no. 1 (2013): 108–21. http://dx.doi.org/10.22495/rgcv3i1c1art5.
Full textGong, Jibing, Hekai Zhang, and Weixia Du. "Research on Integrated Learning Fraud Detection Method Based on Combination Classifier Fusion (THBagging): A Case Study on the Foundational Medical Insurance Dataset." Electronics 9, no. 6 (2020): 894. http://dx.doi.org/10.3390/electronics9060894.
Full textAbbas, Doosti, Abbasi Pejman, and Ghorbani Dalini Sadegh. "Fraud identification in fishmeal using polymerase chain reaction (PCR)." African Journal of Biotechnology 10, no. 59 (2011): 12762–65. http://dx.doi.org/10.5897/ajb11.2997.
Full textO Henriques, Henrique, Heraldo L S Almeida, Marcio Z Fortes, Felipe B Carregosa, and Wlademir L Moura. "Prospecting and Fraud Combat Actions Identification to Commercial Losses." IEEE Latin America Transactions 13, no. 12 (2015): 3851–62. http://dx.doi.org/10.1109/tla.2015.7404919.
Full textMajewski, Wojciech. "Integrated Platform for Identification and Verification of Insurance Crime as a Modern Tool to Combat Insurance Fraud – Legal Conditions." Prawo Asekuracyjne 4, no. 101 (2019): 70–83. http://dx.doi.org/10.5604/01.3001.0013.6743.
Full textKnapp, Michael C., and Carol A. Knapp. "Of Hurricanes and Harness Racing: The Accounting Fraud at DHB Industries, Inc." Issues in Accounting Education 28, no. 1 (2012): 131–52. http://dx.doi.org/10.2308/iace-50297.
Full textHammersley, Jacqueline S. "A Review and Model of Auditor Judgments in Fraud-Related Planning Tasks." AUDITING: A Journal of Practice & Theory 30, no. 4 (2011): 101–28. http://dx.doi.org/10.2308/ajpt-10145.
Full textLi, Chenglong, Ning Ding, Haoyun Dong, and Yiming Zhai. "Application of Credit Card Fraud Detection Based on CS-SVM." International Journal of Machine Learning and Computing 11, no. 1 (2021): 34–39. http://dx.doi.org/10.18178/ijmlc.2021.11.1.1011.
Full textAgostinho, PJF, and CJ Cherry. "The significance of claims fraud in microinsurance and a statistical method to channel limited fraud identification resources." South African Actuarial Journal 16, no. 1 (2016): 143. http://dx.doi.org/10.4314/saaj.v16i1.6.
Full textKlimek, Libor. "Misuse of Contactless Payment Cards with Radio-Frequency Identification." Masaryk University Journal of Law and Technology 14, no. 2 (2020): 259–74. http://dx.doi.org/10.5817/mujlt2020-2-5.
Full textKnežević, Snežana, Aleksandar Živković, and Stefan Milojević. "The role and importance of internal control and internal audit in the prevention and identification of fraudulent actions in banks." Bankarstvo 50, no. 1 (2021): 66–89. http://dx.doi.org/10.5937/bankarstvo2101066k.
Full textHan, Dan. "Researches of Detection of Fraudulent Financial Statements Based on Data Mining." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 32–36. http://dx.doi.org/10.1166/jctn.2017.6119.
Full textKashyap, Navneet, B. K. Pandey, and H. L. Mandoria. "Analysis of Pattern Identification Using Graph Database for Fraud Detection." Oriental journal of computer science and technology 9, no. 2 (2016): 81–91. http://dx.doi.org/10.13005/ojcst/9.02.04.
Full textAtkeson, Lonna Rae, R. Michael Alvarez, Thad E. Hall, and J. Andrew Sinclair. "Balancing Fraud Prevention and Electoral Participation: Attitudes Toward Voter Identification." Social Science Quarterly 95, no. 5 (2014): 1381–98. http://dx.doi.org/10.1111/ssqu.12110.
Full text., Nandini B. "A SURVEY ON IDENTIFICATION OF RANKING FRAUD FOR MOBILE APPLICATIONS." International Journal of Research in Engineering and Technology 05, no. 03 (2016): 473–78. http://dx.doi.org/10.15623/ijret.2016.0503085.
Full textGhovvati, S., M. R. Nassiri, S. Z. Mirhoseini, A. Heravi Moussavi, and A. Javadmanesh. "Fraud identification in industrial meat products by multiplex PCR assay." Food Control 20, no. 8 (2009): 696–99. http://dx.doi.org/10.1016/j.foodcont.2008.09.002.
Full textZha, Daiming, Xiumei Xing, and Fuhe Yang. "A multiplex PCR assay for fraud identification of deer products." Food Control 21, no. 10 (2010): 1402–7. http://dx.doi.org/10.1016/j.foodcont.2010.04.013.
Full textSezer, Banu, Sahin Durna, Gonca Bilge, Aysel Berkkan, Atilla Yetisemiyen, and Ismail Hakki Boyaci. "Identification of milk fraud using laser-induced breakdown spectroscopy (LIBS)." International Dairy Journal 81 (June 2018): 1–7. http://dx.doi.org/10.1016/j.idairyj.2017.12.005.
Full textEdelson, Jack, Alexander Alduncin, Christopher Krewson, James A. Sieja, and Joseph E. Uscinski. "The Effect of Conspiratorial Thinking and Motivated Reasoning on Belief in Election Fraud." Political Research Quarterly 70, no. 4 (2017): 933–46. http://dx.doi.org/10.1177/1065912917721061.
Full textFadina, Yulia P. "CRIMINAL-LEGAL CHARACTERISTIC OF FRAUD ON THE INTERNET." Yugra State University Bulletin 13, no. 1-2 (2017): 117–21. http://dx.doi.org/10.17816/byusu2017131-2117-121.
Full textYu, So-Jin, and Jin-Sung Rha. "Research Trends in Accounting Fraud Using Network Analysis." Sustainability 13, no. 10 (2021): 5579. http://dx.doi.org/10.3390/su13105579.
Full textKolesnikova, E. N., and N. N. Trushina. "PROBLEMS OF DETECTION AND DOCUMENTATION OF FRAUD IN THE AGRO-INDUSTRIAL COMPLEX." Bulletin of Udmurt University. Series Economics and Law 29, no. 6 (2019): 861–67. http://dx.doi.org/10.35634/2412-9593-2019-29-6-861-867.
Full textTang, Jiali, and Khondkar E. Karim. "Financial fraud detection and big data analytics – implications on auditors’ use of fraud brainstorming session." Managerial Auditing Journal 34, no. 3 (2019): 324–37. http://dx.doi.org/10.1108/maj-01-2018-1767.
Full textКочинев, Yuriy Kochinev, Виноградова, and O. Vinogradova. "Identification of the facts and the evidence obtained Unscrupulous entity." Auditor 1, no. 1 (2015): 32–39. http://dx.doi.org/10.12737/12788.
Full textNikulina, O. M., and M. V. Vrublevskaya. "Identification by the auditor in corporate fraud schemes with current assets." Problemy ucheta i finansov, no. 25 (March 1, 2017): 42–44. http://dx.doi.org/10.17223/22229388/25/6.
Full textPEREZ, JULIANA, and EVA GARCIA-VAZQUEZ. "Genetic Identification of Nine Hake Species for Detection of Commercial Fraud." Journal of Food Protection 67, no. 12 (2004): 2792–96. http://dx.doi.org/10.4315/0362-028x-67.12.2792.
Full textChen, Min, Varghese S. Jacob, Suresh Radhakrishnan, and Young U. Ryu. "Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies?" Information Systems Research 26, no. 4 (2015): 754–72. http://dx.doi.org/10.1287/isre.2015.0598.
Full textWesterski, Adam, Rajaraman Kanagasabai, Eran Shaham, Amudha Narayanan, Jiayu Wong, and Manjeet Singh. "Explainable anomaly detection for procurement fraud identification—lessons from practical deployments." International Transactions in Operational Research 28, no. 6 (2021): 3276–302. http://dx.doi.org/10.1111/itor.12968.
Full textPandey, Arpit. "Cyber Security: Cyber Fraud on Carding: A Review." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2525–29. http://dx.doi.org/10.22214/ijraset.2021.36882.
Full textHonchar, Liubov, Anzhela Malakhova, and Olha Nevkypila. "FINANCIAL FRAUD AND SECURITY." INNOVATIVE ECONOMY, no. 3-4 (2021): 170–74. http://dx.doi.org/10.37332/2309-1533.2021.3-4.24.
Full textBarreto, Matt A., Stephen A. Nuño, and Gabriel R. Sanchez. "The Disproportionate Impact of Voter-ID Requirements on the Electorate—New Evidence from Indiana." PS: Political Science & Politics 42, no. 01 (2009): 111–16. http://dx.doi.org/10.1017/s1049096509090283.
Full text