Academic literature on the topic 'Mail fraud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mail fraud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mail fraud"

1

Anandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.

Full text
Abstract:
Today, Email Spam has become a major problem, with Rapid increament of internet users, Email spams is also increasing. People are using email spam for illegal and unethical conducts, phishing and fraud. Sending malicious link through spam emails which can damage the system and can also seek in into your system. Spammer creates a fake profile and email account which is easier for them. These spammers target those peoples who are not aware about frauds. So there is a need to identify the fraud in terms of spam emails. In this paper we will identify the spam by using machine learning algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Bournellis, Cynthia. "E-mail fraud at universities." Computer Fraud & Security Bulletin 1995, no. 8 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80231-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Joshua J. S., and Mark David Chong. "Psychological influences in e‐mail fraud." Journal of Financial Crime 17, no. 3 (2010): 337–50. http://dx.doi.org/10.1108/13590791011056309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bradley, Craig M. "Foreword: Mail Fraud after "McNally" and "Carpenter": The Essence of Fraud." Journal of Criminal Law and Criminology (1973-) 79, no. 3 (1988): 573. http://dx.doi.org/10.2307/1143533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maus, Donna M. "License Procurement and the Federal Mail Fraud Statute." University of Chicago Law Review 58, no. 3 (1991): 1125. http://dx.doi.org/10.2307/1599999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Auerbach, Jonathan, and Steve Pierson. "Does Voting by Mail Increase Fraud? Estimating the Change in Reported Voter Fraud When States Switch to Elections By Mail." Statistics and Public Policy 8, no. 1 (2021): 18–41. http://dx.doi.org/10.1080/2330443x.2021.1906806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.

Full text
Abstract:
The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain a user’s personal or secret information. The variety of phishing attacks is very broad, and usage of novel, more sophisticated methods complicates its automated filtering. Therefore, it is important to form up-to-date and detailed phishing attack taxonomy, which could be used for both human education purposes as well as phishing attack discrete notation. In this paper, we pr
APA, Harvard, Vancouver, ISO, and other styles
8

Oyegoke, Temitayo O., Kehinde K. Akomolede, Adesola G. Aderounmu, and Emmanuel R. Adagunodo. "A Multi-Layer Perceptron Model for Classification of E-mail Fraud." European Journal of Information Technologies and Computer Science 1, no. 5 (2021): 16–22. http://dx.doi.org/10.24018/compute.2021.1.5.24.

Full text
Abstract:
This study was developed an e-mail classification model to preempt fraudulent activities. The e-mail has such a predominant nature that makes it suitable for adoption by cyber-fraudsters. This research used a combination of two databases: CLAIR fraudulent and Spambase datasets for creating the training and testing dataset. The CLAIR dataset consists of raw e-mails from users’ inbox which were pre-processed into structured form using Natural Language Processing (NLP) techniques. This dataset was then consolidated with the Spambase dataset as a single dataset. The study deployed the Multi-Layer
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, Taek Rim. "A Study on Mail and Wire Fraud in the U.S.C." Korean Lawyers Association Journal 60, no. 6 (2011): 5–77. http://dx.doi.org/10.17007/klaj.2011.60.6.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Molz, Todd E. "The Mail Fraud Statute: An Argument for Repeal by Implication." University of Chicago Law Review 64, no. 3 (1997): 983. http://dx.doi.org/10.2307/1600317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mail fraud"

1

Wihlke, Anna. "Bedragarretorik : En retorisk analys av scam-mail." Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-11347.

Full text
Abstract:
Every big scam starts with a small invite. You are about to face the inconvenient accusation of you being responsible for your own loss. At least, this was the case for the seller of ”Macbook Pro 15” 2.4 intel-core, 4GB, glossy” in early December 2010. This thesis is breaking apart the comfort zone of being a victim, suggesting we want to be betrayed. Although the ”victim” has detected a risk, his wish to beleive that the affair is what it’s told to be, nourishes the betrayal that can proceed. Cooperation is the key word and a possible explanation to scam or betrayal – spun out of our natural
APA, Harvard, Vancouver, ISO, and other styles
2

Knuth, Tobias. "Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1256175.

Full text
Abstract:
A remarkable gap exists between the financial impact of fraud in the B2C e-commerce mail order business and the amount of research conducted in this area — whether it be qualitative or quantitative research about fraud prevention. Projecting published fraud rates of only approx. one percent to e-commerce sales data, the affected sales volume amounts to $651 million in the German market, and in the North American market, the volume amounts to $5.22 billion; empirical data, however, indicate even higher fraud rates. Low profit margins amplify the financial damage caused by fraudulent activities.
APA, Harvard, Vancouver, ISO, and other styles
3

Kigerl, Alex Conrad. "An Empirical Assessment of the CAN SPAM Act." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/704.

Full text
Abstract:
In January 2004, the United States Congress passed and put into effect the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN SPAM). The Act was set forth to regulate bulk commercial email (spam) and set the limits for what was acceptable. Various sources have since investigated and speculated on the efficacy of the CAN SPAM Act, few of which report a desirable outcome for users of electronic mail. Despite the apparent consensus of anti-spam firms and the community of email users that the Act was less than effective, there is little to no research on the efficacy of th
APA, Harvard, Vancouver, ISO, and other styles
4

Osman, Ali Abdiasis. "VD-bedrägeri : Hur arbetar svenska kommuner för att minska risken för VD- bedrägeri?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18900.

Full text
Abstract:
The use of digital equipment and services is increasing both in organizations and private individuals. This means that more and more people are connecting to the Internet to communicate and share data that may include sensitive information. Due to security developments, unauthorized access to data has become increasingly sophisticated and therefore it has become difficult for cybercriminals to access it. Therefore, cybercriminals have begun to exploit human psychology. There are several different ways cybercriminals use to exploit the social aspect of people. One of these is CEO-fraud which ta
APA, Harvard, Vancouver, ISO, and other styles
5

Henshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Furlaneto, Neto Mário [UNESP]. "O assunto do e-mail como indício de fraude: contribuições da organização da informação para a prevenção criminal." Universidade Estadual Paulista (UNESP), 2008. http://hdl.handle.net/11449/103390.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:32:42Z (GMT). No. of bitstreams: 0 Previous issue date: 2008-07-29Bitstream added on 2014-06-13T19:03:12Z : No. of bitstreams: 1 furlanetoneto_m_dr_mar.pdf: 1796012 bytes, checksum: 865e52ab7d190c4e8c70356423defeb4 (MD5)<br>Universidade Estadual Paulista (UNESP)<br>Em uma sociedade cada vez mais globalizada e inserida digitalmente, o e-mail apresenta destaque importante, ao acelerar a comunicação entre as pessoas. No entanto, ao mesmo tempo em que a Internet revelou benefícios incomensuráveis para a sociedade tornou-se, também, um meio para a prática
APA, Harvard, Vancouver, ISO, and other styles
7

Furlaneto, Neto Mário. "O assunto do e-mail como indício de fraude : contribuições da organização da informação para a prevenção criminal /." Marília : [s.n.], 2008. http://hdl.handle.net/11449/103390.

Full text
Abstract:
Orientador: José Augusto Chaves Guimarães<br>Banca: Mariângela Spotti Lopes Fugita<br>Banca: João Batista Ernesto de Moraes<br>Banca: Edinilson Donisete Machado<br>Banca: José Fernando Modesto da Silva<br>Resumo: Em uma sociedade cada vez mais globalizada e inserida digitalmente, o e-mail apresenta destaque importante, ao acelerar a comunicação entre as pessoas. No entanto, ao mesmo tempo em que a Internet revelou benefícios incomensuráveis para a sociedade tornou-se, também, um meio para a prática dos crimes informáticos e, atualmente, constata-se o emprego do e-mail como fase do iter crimini
APA, Harvard, Vancouver, ISO, and other styles
8

Adler, Marianna. "Psychoanalysis as a praxis : metapsychology and ethics in the work of Freud, Lacan and Kristeva /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Santos, Yara Magalhães dos. "Do mal-estar docente de professores do ensino médio: contribuições de Nietzsche e Freud." Universidade Federal de Goiás, 2013. http://repositorio.bc.ufg.br/tede/handle/tde/2944.

Full text
Abstract:
Submitted by Cássia Santos (cassia.bcufg@gmail.com) on 2014-08-28T13:35:08Z No. of bitstreams: 2 license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) dissertacao Yara Magalhães dos Santos.pdf: 1877817 bytes, checksum: 4c4f6b175ff90553cc6349a9272f0ad8 (MD5)<br>Made available in DSpace on 2014-08-28T13:35:08Z (GMT). No. of bitstreams: 2 license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) dissertacao Yara Magalhães dos Santos.pdf: 1877817 bytes, checksum: 4c4f6b175ff90553cc6349a9272f0ad8 (MD5) Previous issue date: 2013-06-24<br>Fundação de Ampa
APA, Harvard, Vancouver, ISO, and other styles
10

Nascimento, Marcio Lima do. "Do mal-estar em Freud ao mal-estar em Bauman." Universidade Federal da Paraí­ba, 2014. http://tede.biblioteca.ufpb.br:8080/handle/tede/5673.

Full text
Abstract:
Made available in DSpace on 2015-05-14T12:11:58Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 978442 bytes, checksum: 7411b2c34ae2f7a349a842819e8f49d6 (MD5) Previous issue date: 2014-09-22<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>The purpose of this project is to portray a particular trait combination between guilt and fear and establish a connection between the analysis of Freud and Bauman on the notion of ill-being . Our reading of Freud's literature on the ill-being of civilization points to guilt as being a key element in the civilizing project, which transgress
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mail fraud"

1

American Law Institute-American Bar Association Committee on Continuing Professional Education., ed. Misery, malpractice, and mail fraud: Lawyers' professional liability in the 90s : ALI-ABA course of study materials : October 17-19, 1991, Hilton Head, South Carolina. American Law Institute-American Bar Association, Committee on Continuing Professional Education, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Steed, Robert L. Mail fraud: The laughable letters of Robert L. Steed. Longstreet Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doyle, Charles. Mail and wire fraud: Elements and considerations in federal crimes. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fake ID by mail and modem. Loompanics Unlimited, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Dept. of Energy. Computer Incident Advisory Capability (Team), ed. Hoaxbusters. Computer Incident Advisory Capability, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Unzip, Mr. How to screw the post office. Loompanics Unlimited, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Library of Congress. Congressional Research Service, ed. Insider trading: Carpenter v. United States. Congressional Research Service, Library of Congress, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guilty Admissions: The Bribes, Favors, and Phonies Behind the College Cheating Scandal. Grand Central Publishing, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security. Misleading mailings targeted to seniors: Hearing before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, One Hundred Seventh Congress, first session, July 26, 2001. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. Committee on Ways and Means. Subcommittee on Oversight. Deceptive mailing concerning tax refunds: Hearing before the Subcommittee on Oversight of the Committee on Ways and Means, House of Representatives, One Hundred Seventh Congress, first session, July 19, 2001. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Mail fraud"

1

Conrad, Robin. "Mail-Order Fraud." In Computer Fraud Casebook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119197416.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shumilina, Vera, and Amina Bokova. "ECONOMIC FRAUD AS A THREAT TO ECONOMIC SECURITY OF ECONOMIC ENTITIES." In Business security management in modern conditions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635a7ccb9.48196207.

Full text
Abstract:
The article presents the author's view on economic fraud, considers the main causes of their occurrence, and studies their types. Economic fraud is considered as a significant threat to the economic security of economic entities.
APA, Harvard, Vancouver, ISO, and other styles
3

de Oliveira Neto, Arnaldo Marques. "The Main Corporate Taxes of the STN." In Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2297-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Internet, Computer, and E- mail Fraud." In A Comprehensive Look at Fraud Identification and Prevention. Routledge, 2015. http://dx.doi.org/10.1201/b18429-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dhanalakshmi, Ranaganayakulu, and Chenniappan Chellappan. "Fraud and Identity Theft Issues." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch014.

Full text
Abstract:
Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In spite of the different possible attacks discussed in later chapters, this chapter can focus on phishing attacks – a form of indirect attacks– such as an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, et cetera. The vulnerabilities on various phishing methods such as domain name spoofing, URL obfuscation, susceptive e-mails, spoofed DNS and IP addresses, and cross site scripting are analyzed, and the chapter concludes that an integrated approach is required to mitigate phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Blevins, Cameron. "Mail Routes and the Costs of Expansion, 1866–83." In Paper Trails. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190053673.003.0005.

Full text
Abstract:
Chapter 4 examines the transportation of mail in the western United States. During the 1860s and 1870s the Post Office Department contracted with private stagecoach companies to carry the mail on its behalf, allowing it to extend mail routes across the region without establishing its own costly public infrastructure. Government mail contracts effectively subsidized the western stagecoach industry and facilitated the region’s breakneck growth during these decades. But staging companies began to lobby, collude, and bribe their way into exorbitant contracts worth millions of dollars, and by the end of the 1870s the situation had devolved into a full-fledged institutional crisis. This chapter is a story about mismanagement, fraud, and corruption, but it also speaks to the federal government’s lack of centralized administrative capacity. The decentralized agency model may have allowed the US Post to rapidly spread across the West, but this frenetic regional expansion project came with considerable costs.
APA, Harvard, Vancouver, ISO, and other styles
7

"13. Mail-Order "Health" The Post Office Department's contest with medical fraud since the 1930's." In The Medical Messiahs: A Social History of Medical Quackery in 20th Century America. Princeton University Press, 2015. http://dx.doi.org/10.1515/9781400868698-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tiemo, Pereware Aghwotu, and Christina Uyoyou Charles-Iyoha. "Cybercafés and Cyber Crime in Nigeria." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch019.

Full text
Abstract:
This chapter discusses cybercafés and cyber crime in Nigeria. It also identifies the various cyber criminals in Nigeria. The working groups set up by the government to redeem the image of Nigerians by monitoring cybercafés and handling cases of cyber criminals and cyber victims are also discussed. Some major factors affecting the rise in cyber crime in Nigeria and methods of preventing cyber crimes (scam mail) are outlined. It was recommended that there is need to educate the populace on café fraud and in fighting cyber crime, the working group established by the government needed to be adequately equipped with ICT knowledge and facilities.
APA, Harvard, Vancouver, ISO, and other styles
9

Johnson, Dennis W. "Voting and Participation." In Campaigns, Elections, and the Threat to Democracy. Oxford University Press, 2022. http://dx.doi.org/10.1093/wentk/9780197641972.003.0001.

Full text
Abstract:
The United States has a long history of denying citizens the right to vote. One of the most important protections, the Voting Rights Act of 1965, has been stripped of its enforcement powers; impediments to voting and voter suppression have resulted. Elections are administered at the state and local levels, but despite federal assistance, many of the state systems are fragile and vulnerable. Individual voter fraud, while employed as an excuse for further restricting, is nearly nonexistent. Mail-in voting and absentee voting have proven to be safe and valid exercises. Though the 2020 elections set all-time highs in voting participation, at the state and local levels, voter participation remains unremarkable.
APA, Harvard, Vancouver, ISO, and other styles
10

Child, John, and David Ormerod. "10. Fraud." In Smith, Hogan, & Ormerod's Essentials of Criminal Law. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198831921.003.0010.

Full text
Abstract:
This chapter deals with fraud, an offence under section 1 of the Fraud Act 2006 (FA 2006). It first discusses the central fraud offence, which can be committed by false representation, failure to disclose information, and/or abuse of position. The chapter then moves to consider related offences of obtaining services dishonestly and possession of articles for use in frauds, along with other fraud and deception offences. Finally, the chapter outlines potential options for legal reform concerning the drafting of FA 2006, fraud and the irrelevance of results, and distinguishing theft and fraud, as well as the potential application of fraud offences within a problem question. Relevant cases are highlighted throughout, with brief summaries of the main facts and judgments.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mail fraud"

1

Kerremans, Koen, Yan Tang, Rita Temmerman, and Gang Zhao. "Towards Ontology-based E-mail Fraud Detection." In 2005 Purtuguese Conference on Artificial Intelligence. IEEE, 2005. http://dx.doi.org/10.1109/epia.2005.341275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Shilpi, Tanupriya Choudhury, Prince Srivastava, and Mohit Porwal. "Fraud Mail Recognition Incorporated with Hypernyms Key Word Mining." In 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Мезенцева, Юлия, Yuliya Mezentseva, Ксения Вердеш, and Ksenia Verdesh. "CORPORATE FRAUD AS A THREAT TO THE ECONOMIC SECURITY OF THE COMPANY." In Topical issues of ensuring economic security in the Russian Federation in the digital economy. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/2317.

Full text
Abstract:
The article presents the author's view on corporate fraud, considers the main causes of their occurrence, studied their types. The concept of "corporate corruption"has been clarified. Corporate fraud is considered as a significant threat to the economic security of the company.
APA, Harvard, Vancouver, ISO, and other styles
4

Мезенцева, Юлия, Yuliya Mezentseva, Ксения Вердеш, and Ksenia Verdesh. "THE ROLE OF INTERNAL AUDIT IN THE SUPPRESSION AND PREVENTION OF CORPORATE FRAUD." In Modern problems of an economic safety, accounting and the right in the Russian Federation. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/conferencearticle_5c5060ceeb8df2.85068792.

Full text
Abstract:
The article presents the author's view on the role of internal audit in the prevention of corporate fraud, the main aspects of the internal audit service. Attention is paid to the consideration of the General signs of corporate crimes. Corporate fraud is considered as a significant threat to the economic security of the company, and the organization of an effective internal audit system – as one of the mechanisms to prevent them.
APA, Harvard, Vancouver, ISO, and other styles
5

Sutaka, Dar'ia Sergeevna, and Vladislav Vladimirovich Uskov. "Some Features of Lending Frauds in the Russian Federation." In International Scientific and Practical Conference. TSNS Interaktiv Plus, 2020. http://dx.doi.org/10.21661/r-541290.

Full text
Abstract:
In the modern world, the successful development of market relations, as well as the establishment of a credit and banking system, have led to the destabilization of the financial market and an increase in the number of crimes in the field of lending. Demand for loans, which generated a huge number of offers, caused serious competition for banks, as a result of which, due to simplification of the loan issuance procedure, fraud in this area began to develop intensively. There are people who use various schemes against the law, which is commonly called fraud.The article sets the task to consider
APA, Harvard, Vancouver, ISO, and other styles
6

Cindori, Sonja. "Distinctive Features and Scope of Carousel Frauds." In 6th International Scientific Conference – EMAN 2022 – Economics and Management: How to Cope With Disrupted Times. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/eman.2022.267.

Full text
Abstract:
One of the main characteristics of carousel fraud relates to “zero-rate” VAT system on intra-community trade regarding the obligation to collect and pay VAT on the acquisition of goods and the right to deduct the same amount as input VAT. Therefore, at the next sale of the same good, the taxpayer can collect VAT and “disappear” without remitting the collected tax. The next taxpayer demands from the tax authority the refund of the same VAT that the previous taxpayer did not pay to the state budget, thus committing the criminal offense of tax evasion which is a predicate offense of money launder
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Haobo, Zhao Li, Jiaming Huang, et al. "Collaboration Based Multi-Label Propagation for Fraud Detection." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/343.

Full text
Abstract:
Detecting fraud users, who fraudulently promote certain target items, is a challenging issue faced by e-commerce platforms. Generally, many fraud users have different spam behaviors simultaneously, e.g. spam transactions, clicks, reviews and so on. Existing solutions have two main limitations: 1) the correlations among multiple spam behaviors are neglected; 2) large-scale computations are intractable when dealing with an enormous user set. To remedy these problems, this work proposes a collaboration based multi-label propagation (CMLP) algorithm. We first introduce a general-purpose version th
APA, Harvard, Vancouver, ISO, and other styles
8

Seghedin, Neculai eugen, and Chitariu Dragos. "SOFTWARE APPLICATION FOR INTELLECTUAL FRAUD MANAGEMENT." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-261.

Full text
Abstract:
Ethics in scientific research is one of the most important fields of study, especially for students, graduate students and young researchers. Also, due to the multitude and diversity of the issues that intellectual fraud addresses, knowledge of fraud examples in the research field are of interest, for the experienced researchers, also, in order to avoid situations nonconforming with good conduit in scientific research. Scientific misconduct in research means fabrication, falsification, plagiarism or cheating in the proposal, conduct or communication of results and deviations deliberate, danger
APA, Harvard, Vancouver, ISO, and other styles
9

Pakhar, V. V. "Opportunistic behavior of illegal travel agencies in relation to consumers of a tourist product in Russia." In All-Russian Scientific Conference on Achievements of Science and Technology. Krasnoyarsk Science and Technology City Hall, 2021. http://dx.doi.org/10.47813/dnit.2021.2.334-339.

Full text
Abstract:
The article examines the opportunistic behavior of illegal travel agencies in relation to consumers of a tourist product in Russia. The paper analyzes the main schemes of fraud in relation to tourists and ways to combat the considered schemes. The negative phenomena of opportunistic behavior for the tourism sector of the economy are determined, the connection of opportunism with transaction costs is indicated. The main ways of reducing the level of uncertainty caused by the opportunistic behavior of "false travel agencies" in the Russian tourist market are identified.
APA, Harvard, Vancouver, ISO, and other styles
10

PREDU, Adrian. "Phishing: A Present Threat." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.07.

Full text
Abstract:
Phishing can be seen as a threat that keeps growing day by day, which has as a primary objective the obtaining of money from different kind of customers, through fraud. In less than two decades, this illegal practice managed to become an industry with an annual worldwide financial impact of billions of dollars. This paper tries to explain what phishing means and how it evolved into a global threat, presents the main types of phishing techniques that are currently used, as well as solutions against them.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mail fraud"

1

Dutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.

Full text
Abstract:
Cannabis legalization has spread rapidly in the United States. Although national surveys provide robust information on the prevalence of cannabis use, cannabis disorders, and related outcomes, information on knowledge, attitudes, and beliefs (KABs) about cannabis is lacking. To inform the relationship between cannabis legalization and cannabis-related KABs, RTI International launched the National Cannabis Climate Survey (NCCS) in 2016. The survey sampled US residents 18 years or older via mail (n = 2,102), mail-to-web (n = 1,046), and two social media data collections (n = 11,957). This report
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!