Journal articles on the topic 'Mail fraud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mail fraud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Anandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.
Full textBournellis, Cynthia. "E-mail fraud at universities." Computer Fraud & Security Bulletin 1995, no. 8 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80231-2.
Full textChang, Joshua J. S., and Mark David Chong. "Psychological influences in e‐mail fraud." Journal of Financial Crime 17, no. 3 (2010): 337–50. http://dx.doi.org/10.1108/13590791011056309.
Full textBradley, Craig M. "Foreword: Mail Fraud after "McNally" and "Carpenter": The Essence of Fraud." Journal of Criminal Law and Criminology (1973-) 79, no. 3 (1988): 573. http://dx.doi.org/10.2307/1143533.
Full textMaus, Donna M. "License Procurement and the Federal Mail Fraud Statute." University of Chicago Law Review 58, no. 3 (1991): 1125. http://dx.doi.org/10.2307/1599999.
Full textAuerbach, Jonathan, and Steve Pierson. "Does Voting by Mail Increase Fraud? Estimating the Change in Reported Voter Fraud When States Switch to Elections By Mail." Statistics and Public Policy 8, no. 1 (2021): 18–41. http://dx.doi.org/10.1080/2330443x.2021.1906806.
Full textRastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textOyegoke, Temitayo O., Kehinde K. Akomolede, Adesola G. Aderounmu, and Emmanuel R. Adagunodo. "A Multi-Layer Perceptron Model for Classification of E-mail Fraud." European Journal of Information Technologies and Computer Science 1, no. 5 (2021): 16–22. http://dx.doi.org/10.24018/compute.2021.1.5.24.
Full textOh, Taek Rim. "A Study on Mail and Wire Fraud in the U.S.C." Korean Lawyers Association Journal 60, no. 6 (2011): 5–77. http://dx.doi.org/10.17007/klaj.2011.60.6.001.
Full textMolz, Todd E. "The Mail Fraud Statute: An Argument for Repeal by Implication." University of Chicago Law Review 64, no. 3 (1997): 983. http://dx.doi.org/10.2307/1600317.
Full textKim, Ji-Yong. "Analysis of Electronic Trade Fraud and Countermeasures - Focus on E-mail Hacking Cases -." E-Business Studies 18, no. 6 (2017): 265–77. http://dx.doi.org/10.20462/tebs.2017.12.18.6.265.
Full textEzersky, Peter R. "Intra-Corporate Mail and Wire Fraud: Criminal Liability for Fiduciary Breach." Yale Law Journal 94, no. 6 (1985): 1427. http://dx.doi.org/10.2307/796135.
Full textDeLiema, Marguerite, and Lynn Langton. "Older Victims of Mass Marketing Scams: An Analysis of Data Seized From Scammers." Innovation in Aging 5, Supplement_1 (2021): 323. http://dx.doi.org/10.1093/geroni/igab046.1257.
Full textChapman, Robert B. "Tax Compliance and the Revenue Rule in Prosecutions for Wire and Mail Fraud." International and Comparative Law Quarterly 48, no. 2 (1999): 437–46. http://dx.doi.org/10.1017/s0020589300063284.
Full textAlflaieh, Moh’d. "Electronic Fraud in the Context of E-Commerce under Jordanian Legislation." Al-Zaytoonah University of Jordan Journal for Legal Studies 3, no. 3 (2022): 67–82. http://dx.doi.org/10.15849/zujjls.221130.04.
Full textZhang, Yahao, Jin Pang, and Hongshan Yin. "The Optimization Analysis of Phishing Email Filtering in Network Fraud based on Improved Bayesian Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 504–8. http://dx.doi.org/10.46300/9106.2022.16.62.
Full textRaj S, Jeevan, Raghav K Sejpal, Priya N, and Dr Mir Aadil. "SUSPICIOUS E-MAIL DETECTION USING VARIOUS TECHNIQUES." International Journal of Engineering Applied Sciences and Technology 6, no. 10 (2022): 212–16. http://dx.doi.org/10.33564/ijeast.2022.v06i10.028.
Full textP.S, Jagadeesh Kumar, Meenakshi Sundaram S, and Ranjeet Kumar. "An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing." International Journal of Network Security & Its Applications 7, no. 5 (2015): 49–67. http://dx.doi.org/10.5121/ijnsa.2015.7503.
Full textNeese, William T., Linda Ferrell, and O. C. Ferrell. "An analysis of federal mail and wire fraud cases related to marketing." Journal of Business Research 58, no. 7 (2005): 910–18. http://dx.doi.org/10.1016/j.jbusres.2004.01.010.
Full textHonchar, Liubov, Anzhela Malakhova, and Olha Nevkypila. "FINANCIAL FRAUD AND SECURITY." INNOVATIVE ECONOMY, no. 3-4 (2021): 170–74. http://dx.doi.org/10.37332/2309-1533.2021.3-4.24.
Full textGere, Charlie. "Book Review: Art is not terrorism! Steve Kurtz, Robert Ferrell, bioterrorism and mail fraud." Visual Communication 4, no. 1 (2005): 65–68. http://dx.doi.org/10.1177/1470357205048937.
Full textUtakrit, Nathaporn, and Pongpisit Wuttidittachotti. "Possible attempts to identify e-mail header of the sender for academic qualification fraud." International Journal of Electronic Security and Digital Forensics 13, no. 1 (2021): 28. http://dx.doi.org/10.1504/ijesdf.2021.10033312.
Full textUtakrit, Nathaporn, and Pongpisit Wuttidittachotti. "Possible attempts to identify e-mail header of the sender for academic qualification fraud." International Journal of Electronic Security and Digital Forensics 13, no. 1 (2021): 28. http://dx.doi.org/10.1504/ijesdf.2021.111719.
Full textYusrianti, Hasni, Imam Ghozali, and Etna N. Yuyetta. "ASSET MISAPPROPRIATION TENDENCY: RATIONALIZATION, FINANCIAL PRESSURE, AND THE ROLE OF OPPORTUNITY (STUDY IN INDONESIAN GOVERNMENT SECTOR)." Humanities & Social Sciences Reviews 8, no. 1 (2020): 373–82. http://dx.doi.org/10.18510/hssr.2020.8148.
Full textHostetler, Michael J. "Intangible Property under the Federal Mail Fraud Statute and the Takings Clause: A Case Study." Duke Law Journal 50, no. 2 (2000): 589. http://dx.doi.org/10.2307/1373098.
Full textUgowe, Davies. "The Normalization of Fraud in Nigeria: An Excerpt From "In a Time of Fraud: The Untold Story of the Nigerian Fraudster"." African Journal of Social Sciences and Humanities Research 5, no. 5 (2022): 126–38. http://dx.doi.org/10.52589/ajsshr-p2iaqib1.
Full textSpinsante, Susanna. "Delivery of a Certified E-mail Service over the Digital Terrestrial Television Platform." Journal of Communications Software and Systems 4, no. 2 (2008): 113. http://dx.doi.org/10.24138/jcomss.v4i2.224.
Full textHarrison, Brynne, Elena Svetieva, and Arun Vishwanath. "Individual processing of phishing emails." Online Information Review 40, no. 2 (2016): 265–81. http://dx.doi.org/10.1108/oir-04-2015-0106.
Full textCox, Landis. "Targeting Sports Agents with the Mail Fraud Statute: United States v. Norby Walters & Lloyd Bloom." Duke Law Journal 41, no. 5 (1992): 1157. http://dx.doi.org/10.2307/1372763.
Full textZingale, Mark. "Fashioning a Victim Standard in Mail and Wire Fraud: Ordinarily Prudent Person or Monumentally Credulous Gull?" Columbia Law Review 99, no. 3 (1999): 795. http://dx.doi.org/10.2307/1123521.
Full textDee, Carol Callaway, and Cindy Durtschi. "Return of the Tallahassee BeanCounters: A Case in Forensic Accounting." Issues in Accounting Education 25, no. 2 (2010): 279–321. http://dx.doi.org/10.2308/iace.2010.25.2.279.
Full textPrieto-Gonzalez, Mayelin. "Supreme Court Limits Permissible Scope of Government’s Ability to Force Medication of Mentally Ill Defendants." Journal of Law, Medicine & Ethics 31, no. 4 (2003): 737–39. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00144.x.
Full textNuryatno, Muhammad A. "KETERKAITAN KUALITAS TATA KELOLA KORPORASI, IMPLEMENTASI PRINSIP ETIKA BISNIS DAN POTENSI KECURANGAN PELAPORAN KEUANGAN." Media Riset Akuntansi, Auditing & Informasi 10, no. 1 (2010): 19–45. http://dx.doi.org/10.25105/mraai.v10i1.2798.
Full textKumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.
Full textVial, Virginie. "The Universal Postal Union's strategy for fighting “snail mail” fraud may be the key to making e-commerce safer." Global Business and Organizational Excellence 27, no. 4 (2008): 32–39. http://dx.doi.org/10.1002/joe.20211.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textPrakoso, Bagus Andi Dwi, I. Nyoman Sujana, and Luh Putu Suryani. "Perlindungan Hukum terhadap Korban Penipuan Jual Beli Online." Jurnal Konstruksi Hukum 1, no. 2 (2020): 266–70. http://dx.doi.org/10.22225/jkh.2.1.2591.266-270.
Full textChirra, Venkata RamiReddy, Hoolda Daniel Maddiboyina, Yakobu Dasari, and Ranganadhareddy Aluru. "Performance Evaluation of Email Spam Text Classification Using Deep Neural Networks." Review of Computer Engineering Studies 7, no. 4 (2020): 91–95. http://dx.doi.org/10.18280/rces.070403.
Full textWatanabe, Ruriko, Nobutada Fujii, Daisuke Kokuryo, Toshiya Kaihara, and Yoichi Abe. "Text Mining to Support Consulting Services for Client Company State Recognition." International Journal of Automation Technology 14, no. 5 (2020): 779–90. http://dx.doi.org/10.20965/ijat.2020.p0779.
Full textBalajichandrasekhar M., V., T. Srinivasa Rao, and G. Srinivas. "An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (2018): 2239. http://dx.doi.org/10.11591/ijece.v8i4.pp2239-2246.
Full textЯкуб, А. В. "The State, Society and Philately in the Soviet Reality of the First Half of the 1920s, or How they Fought Against Postal Fraud and Fiction." Диалог со временем, no. 78(78) (April 24, 2022): 293–310. http://dx.doi.org/10.21267/aquilo.2022.78.78.019.
Full textAhmad, M. A., D. D. Wisdom, and S. Isaac. "An Empirical Analysis of Cybercrime Trends and Its Impact on Moral Decadence Among Secondary School Level Students in Nigeria." advances in multidisciplinary & scientific research journal publication 26, no. 1 (2020): 73–84. http://dx.doi.org/10.22624/isteams/v26p10-ieee-ng-ts.
Full textVilic, Vida. "Cyberstalking victimization." Temida 16, no. 1 (2013): 151–62. http://dx.doi.org/10.2298/tem1301151v.
Full textGodana, Hillary, Samson Wokabi Mwangi, and Panuel Mwaeke. "Security Managers’ Perspectives on Challenges Facing Commercial Banks in Preventing Frauds in Nairobi City County, Kenya." Advances in Social Sciences Research Journal 9, no. 12 (2022): 1–12. http://dx.doi.org/10.14738/assrj.912.13539.
Full textSánchez Ríos, José. "Análisis de percepciones de dos grupos independientes, gerenciales no convictos y gerenciales convictos, en el delito del fraude en las variables capacidad-presión, capacidad-racionalización y capacidad-oportunidad." Oikos 20, no. 41 (2016): 121. http://dx.doi.org/10.29344/07184670.41.956.
Full textRustam, Suhardi. "ANALISA CLUSTERING PHISING DENGAN K-MEANS DALAM MENINGKATKAN KEAMANAN KOMPUTER." ILKOM Jurnal Ilmiah 10, no. 2 (2018): 175–81. http://dx.doi.org/10.33096/ilkom.v10i2.309.175-181.
Full textZisopoulos, A. D., K. G. Panitsidis, G. K. Broni, and N. D. Kartalis. "Cross border Interbank Payment System (CIPS) Security Supplements; Tangible Radio Safety Box, Software as non-textual Password and Revolving Executable Code Modules." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 20 (December 14, 2022): 273–83. http://dx.doi.org/10.37394/23207.2023.20.26.
Full textStudent. "FINE IN AN INFANT DRUG CASE." Pediatrics 84, no. 2 (1989): A29. http://dx.doi.org/10.1542/peds.84.2.a29.
Full textDimitrijević, Dragomir, and Dejan Jovanović. "Economic Motives and Willingness of Young People to Participate in Fraud." Naše gospodarstvo/Our economy 68, no. 3 (2022): 18–27. http://dx.doi.org/10.2478/ngoe-2022-0015.
Full textKim, Hae-Myoung. "Marcus Garvey’s Charismatic Leadership and Black Nationalism." Korea Association of World History and Culture 63 (June 30, 2022): 211–49. http://dx.doi.org/10.32961/jwhc.2022.06.63.211.
Full text