Academic literature on the topic 'Mail fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mail fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mail fraud"
Anandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.
Full textBournellis, Cynthia. "E-mail fraud at universities." Computer Fraud & Security Bulletin 1995, no. 8 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80231-2.
Full textChang, Joshua J. S., and Mark David Chong. "Psychological influences in e‐mail fraud." Journal of Financial Crime 17, no. 3 (2010): 337–50. http://dx.doi.org/10.1108/13590791011056309.
Full textBradley, Craig M. "Foreword: Mail Fraud after "McNally" and "Carpenter": The Essence of Fraud." Journal of Criminal Law and Criminology (1973-) 79, no. 3 (1988): 573. http://dx.doi.org/10.2307/1143533.
Full textMaus, Donna M. "License Procurement and the Federal Mail Fraud Statute." University of Chicago Law Review 58, no. 3 (1991): 1125. http://dx.doi.org/10.2307/1599999.
Full textAuerbach, Jonathan, and Steve Pierson. "Does Voting by Mail Increase Fraud? Estimating the Change in Reported Voter Fraud When States Switch to Elections By Mail." Statistics and Public Policy 8, no. 1 (2021): 18–41. http://dx.doi.org/10.1080/2330443x.2021.1906806.
Full textRastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textOyegoke, Temitayo O., Kehinde K. Akomolede, Adesola G. Aderounmu, and Emmanuel R. Adagunodo. "A Multi-Layer Perceptron Model for Classification of E-mail Fraud." European Journal of Information Technologies and Computer Science 1, no. 5 (2021): 16–22. http://dx.doi.org/10.24018/compute.2021.1.5.24.
Full textOh, Taek Rim. "A Study on Mail and Wire Fraud in the U.S.C." Korean Lawyers Association Journal 60, no. 6 (2011): 5–77. http://dx.doi.org/10.17007/klaj.2011.60.6.001.
Full textMolz, Todd E. "The Mail Fraud Statute: An Argument for Repeal by Implication." University of Chicago Law Review 64, no. 3 (1997): 983. http://dx.doi.org/10.2307/1600317.
Full textDissertations / Theses on the topic "Mail fraud"
Wihlke, Anna. "Bedragarretorik : En retorisk analys av scam-mail." Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-11347.
Full textKnuth, Tobias. "Fraud prevention in the B2C e-Commerce mail order business : a framework for an economic perspective on data mining." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1256175.
Full textKigerl, Alex Conrad. "An Empirical Assessment of the CAN SPAM Act." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/704.
Full textOsman, Ali Abdiasis. "VD-bedrägeri : Hur arbetar svenska kommuner för att minska risken för VD- bedrägeri?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18900.
Full textHenshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.
Full textFurlaneto, Neto Mário [UNESP]. "O assunto do e-mail como indício de fraude: contribuições da organização da informação para a prevenção criminal." Universidade Estadual Paulista (UNESP), 2008. http://hdl.handle.net/11449/103390.
Full textFurlaneto, Neto Mário. "O assunto do e-mail como indício de fraude : contribuições da organização da informação para a prevenção criminal /." Marília : [s.n.], 2008. http://hdl.handle.net/11449/103390.
Full textAdler, Marianna. "Psychoanalysis as a praxis : metapsychology and ethics in the work of Freud, Lacan and Kristeva /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.
Full textSantos, Yara Magalhães dos. "Do mal-estar docente de professores do ensino médio: contribuições de Nietzsche e Freud." Universidade Federal de Goiás, 2013. http://repositorio.bc.ufg.br/tede/handle/tde/2944.
Full textNascimento, Marcio Lima do. "Do mal-estar em Freud ao mal-estar em Bauman." Universidade Federal da Paraíba, 2014. http://tede.biblioteca.ufpb.br:8080/handle/tede/5673.
Full textBooks on the topic "Mail fraud"
American Law Institute-American Bar Association Committee on Continuing Professional Education., ed. Misery, malpractice, and mail fraud: Lawyers' professional liability in the 90s : ALI-ABA course of study materials : October 17-19, 1991, Hilton Head, South Carolina. American Law Institute-American Bar Association, Committee on Continuing Professional Education, 1991.
Find full textSteed, Robert L. Mail fraud: The laughable letters of Robert L. Steed. Longstreet Press, 1991.
Find full textDoyle, Charles. Mail and wire fraud: Elements and considerations in federal crimes. Nova Science Publishers, 2011.
Find full textUnited States. Dept. of Energy. Computer Incident Advisory Capability (Team), ed. Hoaxbusters. Computer Incident Advisory Capability, 1995.
Find full textLibrary of Congress. Congressional Research Service, ed. Insider trading: Carpenter v. United States. Congressional Research Service, Library of Congress, 1987.
Find full textGuilty Admissions: The Bribes, Favors, and Phonies Behind the College Cheating Scandal. Grand Central Publishing, 2021.
Find full textUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security. Misleading mailings targeted to seniors: Hearing before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, One Hundred Seventh Congress, first session, July 26, 2001. U.S. G.P.O., 2001.
Find full textUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Oversight. Deceptive mailing concerning tax refunds: Hearing before the Subcommittee on Oversight of the Committee on Ways and Means, House of Representatives, One Hundred Seventh Congress, first session, July 19, 2001. U.S. G.P.O., 2001.
Find full textBook chapters on the topic "Mail fraud"
Conrad, Robin. "Mail-Order Fraud." In Computer Fraud Casebook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119197416.ch4.
Full textShumilina, Vera, and Amina Bokova. "ECONOMIC FRAUD AS A THREAT TO ECONOMIC SECURITY OF ECONOMIC ENTITIES." In Business security management in modern conditions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635a7ccb9.48196207.
Full textde Oliveira Neto, Arnaldo Marques. "The Main Corporate Taxes of the STN." In Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2297-5_3.
Full text"Internet, Computer, and E- mail Fraud." In A Comprehensive Look at Fraud Identification and Prevention. Routledge, 2015. http://dx.doi.org/10.1201/b18429-16.
Full textDhanalakshmi, Ranaganayakulu, and Chenniappan Chellappan. "Fraud and Identity Theft Issues." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch014.
Full textBlevins, Cameron. "Mail Routes and the Costs of Expansion, 1866–83." In Paper Trails. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190053673.003.0005.
Full text"13. Mail-Order "Health" The Post Office Department's contest with medical fraud since the 1930's." In The Medical Messiahs: A Social History of Medical Quackery in 20th Century America. Princeton University Press, 2015. http://dx.doi.org/10.1515/9781400868698-014.
Full textTiemo, Pereware Aghwotu, and Christina Uyoyou Charles-Iyoha. "Cybercafés and Cyber Crime in Nigeria." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch019.
Full textJohnson, Dennis W. "Voting and Participation." In Campaigns, Elections, and the Threat to Democracy. Oxford University Press, 2022. http://dx.doi.org/10.1093/wentk/9780197641972.003.0001.
Full textChild, John, and David Ormerod. "10. Fraud." In Smith, Hogan, & Ormerod's Essentials of Criminal Law. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198831921.003.0010.
Full textConference papers on the topic "Mail fraud"
Kerremans, Koen, Yan Tang, Rita Temmerman, and Gang Zhao. "Towards Ontology-based E-mail Fraud Detection." In 2005 Purtuguese Conference on Artificial Intelligence. IEEE, 2005. http://dx.doi.org/10.1109/epia.2005.341275.
Full textSharma, Shilpi, Tanupriya Choudhury, Prince Srivastava, and Mohit Porwal. "Fraud Mail Recognition Incorporated with Hypernyms Key Word Mining." In 2016 Sixth International Conference on Advanced Computing & Communication Technologies. Research Publishing Services, 2016. http://dx.doi.org/10.3850/978-981-11-0783-2_397.
Full textМезенцева, Юлия, Yuliya Mezentseva, Ксения Вердеш, and Ksenia Verdesh. "CORPORATE FRAUD AS A THREAT TO THE ECONOMIC SECURITY OF THE COMPANY." In Topical issues of ensuring economic security in the Russian Federation in the digital economy. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/2317.
Full textМезенцева, Юлия, Yuliya Mezentseva, Ксения Вердеш, and Ksenia Verdesh. "THE ROLE OF INTERNAL AUDIT IN THE SUPPRESSION AND PREVENTION OF CORPORATE FRAUD." In Modern problems of an economic safety, accounting and the right in the Russian Federation. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/conferencearticle_5c5060ceeb8df2.85068792.
Full textSutaka, Dar'ia Sergeevna, and Vladislav Vladimirovich Uskov. "Some Features of Lending Frauds in the Russian Federation." In International Scientific and Practical Conference. TSNS Interaktiv Plus, 2020. http://dx.doi.org/10.21661/r-541290.
Full textCindori, Sonja. "Distinctive Features and Scope of Carousel Frauds." In 6th International Scientific Conference – EMAN 2022 – Economics and Management: How to Cope With Disrupted Times. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/eman.2022.267.
Full textWang, Haobo, Zhao Li, Jiaming Huang, et al. "Collaboration Based Multi-Label Propagation for Fraud Detection." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/343.
Full textSeghedin, Neculai eugen, and Chitariu Dragos. "SOFTWARE APPLICATION FOR INTELLECTUAL FRAUD MANAGEMENT." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-261.
Full textPakhar, V. V. "Opportunistic behavior of illegal travel agencies in relation to consumers of a tourist product in Russia." In All-Russian Scientific Conference on Achievements of Science and Technology. Krasnoyarsk Science and Technology City Hall, 2021. http://dx.doi.org/10.47813/dnit.2021.2.334-339.
Full textPREDU, Adrian. "Phishing: A Present Threat." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2014. http://dx.doi.org/10.19107/cybercon.2014.07.
Full textReports on the topic "Mail fraud"
Dutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.
Full text