To see the other types of publications on this topic, follow the link: Mail fraud.

Journal articles on the topic 'Mail fraud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mail fraud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Anandpara, Rahul. "Secured Mail Transformation System Using Machine Learnin." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1880–86. http://dx.doi.org/10.22214/ijraset.2021.36764.

Full text
Abstract:
Today, Email Spam has become a major problem, with Rapid increament of internet users, Email spams is also increasing. People are using email spam for illegal and unethical conducts, phishing and fraud. Sending malicious link through spam emails which can damage the system and can also seek in into your system. Spammer creates a fake profile and email account which is easier for them. These spammers target those peoples who are not aware about frauds. So there is a need to identify the fraud in terms of spam emails. In this paper we will identify the spam by using machine learning algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Bournellis, Cynthia. "E-mail fraud at universities." Computer Fraud & Security Bulletin 1995, no. 8 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80231-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Joshua J. S., and Mark David Chong. "Psychological influences in e‐mail fraud." Journal of Financial Crime 17, no. 3 (2010): 337–50. http://dx.doi.org/10.1108/13590791011056309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bradley, Craig M. "Foreword: Mail Fraud after "McNally" and "Carpenter": The Essence of Fraud." Journal of Criminal Law and Criminology (1973-) 79, no. 3 (1988): 573. http://dx.doi.org/10.2307/1143533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maus, Donna M. "License Procurement and the Federal Mail Fraud Statute." University of Chicago Law Review 58, no. 3 (1991): 1125. http://dx.doi.org/10.2307/1599999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Auerbach, Jonathan, and Steve Pierson. "Does Voting by Mail Increase Fraud? Estimating the Change in Reported Voter Fraud When States Switch to Elections By Mail." Statistics and Public Policy 8, no. 1 (2021): 18–41. http://dx.doi.org/10.1080/2330443x.2021.1906806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.

Full text
Abstract:
The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain a user’s personal or secret information. The variety of phishing attacks is very broad, and usage of novel, more sophisticated methods complicates its automated filtering. Therefore, it is important to form up-to-date and detailed phishing attack taxonomy, which could be used for both human education purposes as well as phishing attack discrete notation. In this paper, we pr
APA, Harvard, Vancouver, ISO, and other styles
8

Oyegoke, Temitayo O., Kehinde K. Akomolede, Adesola G. Aderounmu, and Emmanuel R. Adagunodo. "A Multi-Layer Perceptron Model for Classification of E-mail Fraud." European Journal of Information Technologies and Computer Science 1, no. 5 (2021): 16–22. http://dx.doi.org/10.24018/compute.2021.1.5.24.

Full text
Abstract:
This study was developed an e-mail classification model to preempt fraudulent activities. The e-mail has such a predominant nature that makes it suitable for adoption by cyber-fraudsters. This research used a combination of two databases: CLAIR fraudulent and Spambase datasets for creating the training and testing dataset. The CLAIR dataset consists of raw e-mails from users’ inbox which were pre-processed into structured form using Natural Language Processing (NLP) techniques. This dataset was then consolidated with the Spambase dataset as a single dataset. The study deployed the Multi-Layer
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, Taek Rim. "A Study on Mail and Wire Fraud in the U.S.C." Korean Lawyers Association Journal 60, no. 6 (2011): 5–77. http://dx.doi.org/10.17007/klaj.2011.60.6.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Molz, Todd E. "The Mail Fraud Statute: An Argument for Repeal by Implication." University of Chicago Law Review 64, no. 3 (1997): 983. http://dx.doi.org/10.2307/1600317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Ji-Yong. "Analysis of Electronic Trade Fraud and Countermeasures - Focus on E-mail Hacking Cases -." E-Business Studies 18, no. 6 (2017): 265–77. http://dx.doi.org/10.20462/tebs.2017.12.18.6.265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ezersky, Peter R. "Intra-Corporate Mail and Wire Fraud: Criminal Liability for Fiduciary Breach." Yale Law Journal 94, no. 6 (1985): 1427. http://dx.doi.org/10.2307/796135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

DeLiema, Marguerite, and Lynn Langton. "Older Victims of Mass Marketing Scams: An Analysis of Data Seized From Scammers." Innovation in Aging 5, Supplement_1 (2021): 323. http://dx.doi.org/10.1093/geroni/igab046.1257.

Full text
Abstract:
Abstract Mass marketing scams are some of the most common frauds in America, and include scams perpetrated through the mail. A growing body of research indicates that older adults face a greater risk of victimization due to age-related changes in cognitive functioning and social isolation, and may be more likely to fall victim repeatedly. The aim of this study is to determine the frequency of repeat mass marketing fraud (revictimization) among older adults and patterns of victimization associated with age, scam type, seasonality, and geography. We use two decades of non-public administrative d
APA, Harvard, Vancouver, ISO, and other styles
14

Chapman, Robert B. "Tax Compliance and the Revenue Rule in Prosecutions for Wire and Mail Fraud." International and Comparative Law Quarterly 48, no. 2 (1999): 437–46. http://dx.doi.org/10.1017/s0020589300063284.

Full text
Abstract:
The “revenue rule” is a “well-settled principle of international law that one nation's courts will not enforce the tax claims of another jurisdiction”.1 The US Court of Appeals for the Second Circuit has recently held, however, that using US foreign or interstate telecommunications to devise a scheme to defraud a foreign revenue authority is wire fraud under US law. In United States v. Trapilo2 the Second Circuit reversed the dismissal of indictments against alleged smugglers charged with using telephones and fax machines to effect tax-evasive importation of alcohol into Canada. Under Trapilo,
APA, Harvard, Vancouver, ISO, and other styles
15

Alflaieh, Moh’d. "Electronic Fraud in the Context of E-Commerce under Jordanian Legislation." Al-Zaytoonah University of Jordan Journal for Legal Studies 3, no. 3 (2022): 67–82. http://dx.doi.org/10.15849/zujjls.221130.04.

Full text
Abstract:
Abstract Electronic fraud is a criminal behavior that is implemented in whole or in part by electronic means, and uses Internet components such as e-mail, chat rooms or websites, and aims to seize the money of others by fraud and deception. Accordingly, the Jordanian legislator did not criminalize electronic fraud as in the ordinary crime of fraud in the Penal Code in Article (417). However, it emphasized in Article (15) of the Electronic Crimes Law No. 27 of 2015 that any person committing any crime stipulated in Jordanian legislation by using any electronic means shall be subject to the same
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Yahao, Jin Pang, and Hongshan Yin. "The Optimization Analysis of Phishing Email Filtering in Network Fraud based on Improved Bayesian Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 504–8. http://dx.doi.org/10.46300/9106.2022.16.62.

Full text
Abstract:
Mail transmission was not only the main function of information system, but also the main way of network virus and Trojan horse transmission, which has a key impact on the running state of information. In order to deal with the threats of network viruses and Trojans and improve the level of e-mail management, this paper studies the filtering of information system, and proposes a phishing e-mail filtering method based on Improved Bayesian model. MATLAB simulation results show that the consistency p between the amount of data sent by e-mail and the amount received is good, the consistency rate r
APA, Harvard, Vancouver, ISO, and other styles
17

Raj S, Jeevan, Raghav K Sejpal, Priya N, and Dr Mir Aadil. "SUSPICIOUS E-MAIL DETECTION USING VARIOUS TECHNIQUES." International Journal of Engineering Applied Sciences and Technology 6, no. 10 (2022): 212–16. http://dx.doi.org/10.33564/ijeast.2022.v06i10.028.

Full text
Abstract:
In today's world, email spam has become a serious concern, since the number of internet users has grown rapidly. Illegal and unethical practices, such as phishing and fraud, are taking advantage of the diverse classes of users that use different web services. Users that send unsolicited emails with the intention of disrupting or attracting legitimate customers are known as "spammers" by infecting the user system by sending malicious links in a spam email. Spammers prey on those who are unaware of their deceptions by posing as real people in their unsolicited emails and setting up bogus social
APA, Harvard, Vancouver, ISO, and other styles
18

P.S, Jagadeesh Kumar, Meenakshi Sundaram S, and Ranjeet Kumar. "An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing." International Journal of Network Security & Its Applications 7, no. 5 (2015): 49–67. http://dx.doi.org/10.5121/ijnsa.2015.7503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Neese, William T., Linda Ferrell, and O. C. Ferrell. "An analysis of federal mail and wire fraud cases related to marketing." Journal of Business Research 58, no. 7 (2005): 910–18. http://dx.doi.org/10.1016/j.jbusres.2004.01.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Honchar, Liubov, Anzhela Malakhova, and Olha Nevkypila. "FINANCIAL FRAUD AND SECURITY." INNOVATIVE ECONOMY, no. 3-4 (2021): 170–74. http://dx.doi.org/10.37332/2309-1533.2021.3-4.24.

Full text
Abstract:
Purpose. The aim of the study is to characterize the features of financial fraud in enterprises and in people’s lives, to identify identification criteria and substantiate practical recommendations for ways to minimize it in modern conditions. Methodology of research. The methodological basis of the study was scientific methods of cognition, based on a systematic approach to solving problems. A number of general and special scientific research methods were used to achieve this goal and obtain research results: dialectical; monographic (when processing scientific publications); system analysis
APA, Harvard, Vancouver, ISO, and other styles
21

Gere, Charlie. "Book Review: Art is not terrorism! Steve Kurtz, Robert Ferrell, bioterrorism and mail fraud." Visual Communication 4, no. 1 (2005): 65–68. http://dx.doi.org/10.1177/1470357205048937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Utakrit, Nathaporn, and Pongpisit Wuttidittachotti. "Possible attempts to identify e-mail header of the sender for academic qualification fraud." International Journal of Electronic Security and Digital Forensics 13, no. 1 (2021): 28. http://dx.doi.org/10.1504/ijesdf.2021.10033312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Utakrit, Nathaporn, and Pongpisit Wuttidittachotti. "Possible attempts to identify e-mail header of the sender for academic qualification fraud." International Journal of Electronic Security and Digital Forensics 13, no. 1 (2021): 28. http://dx.doi.org/10.1504/ijesdf.2021.111719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yusrianti, Hasni, Imam Ghozali, and Etna N. Yuyetta. "ASSET MISAPPROPRIATION TENDENCY: RATIONALIZATION, FINANCIAL PRESSURE, AND THE ROLE OF OPPORTUNITY (STUDY IN INDONESIAN GOVERNMENT SECTOR)." Humanities & Social Sciences Reviews 8, no. 1 (2020): 373–82. http://dx.doi.org/10.18510/hssr.2020.8148.

Full text
Abstract:
Purpose: The purpose of this study is to analyze the relationship between Rationalization and Financial Pressure on Asset Misappropriation Tendency by mediating Opportunity in the Indonesian government sector based on the Fraud Triangle perspective.
 Methodology: The Population of this study was Indonesian government employees. The Sample method was Purposive Sampling and the survey method was direct surveys, postal mail, and online surveys. The number of respondents was 363 and analyzed using Structural Equation Model with AMOS-based covariance.
 Main Findings: The results show that
APA, Harvard, Vancouver, ISO, and other styles
25

Hostetler, Michael J. "Intangible Property under the Federal Mail Fraud Statute and the Takings Clause: A Case Study." Duke Law Journal 50, no. 2 (2000): 589. http://dx.doi.org/10.2307/1373098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ugowe, Davies. "The Normalization of Fraud in Nigeria: An Excerpt From "In a Time of Fraud: The Untold Story of the Nigerian Fraudster"." African Journal of Social Sciences and Humanities Research 5, no. 5 (2022): 126–38. http://dx.doi.org/10.52589/ajsshr-p2iaqib1.

Full text
Abstract:
The proliferation and widespread use of the internet in Nigeria has resulted in the emergence and spread of a wide range of computer- and internet-enabled device-related crimes. Identity theft, fraudulent electronic mail transmission, hacking, spamming, and machine spoofing are just a few examples of internet-facilitated crimes. This paper is an excerpt from the same author's unpublished book, "In a Time of Fraud: The Untold Story of the Nigerian Fraudster." Through participatory observations, surveys, and interviews, it aimed to expose the methods of internet fraudsters in Nigeria, also known
APA, Harvard, Vancouver, ISO, and other styles
27

Spinsante, Susanna. "Delivery of a Certified E-mail Service over the Digital Terrestrial Television Platform." Journal of Communications Software and Systems 4, no. 2 (2008): 113. http://dx.doi.org/10.24138/jcomss.v4i2.224.

Full text
Abstract:
At present, the electronic mail service is probably the most widespread and commonly used asynchronous way ofexchanging information among people, thanks to its immediacy and easiness of use. Information delivered through E-mail can be sensitive or confidential: ensuring the sender’s identity and providing privacy has become a vital step in stopping spam, fraud and even more serious crimes. To this aim, public entities have adopted Certified E-mail systems to manage secure interactions with citizens.Digital Terrestrial Television introduced new facilities in thetraditional broadcasting environm
APA, Harvard, Vancouver, ISO, and other styles
28

Harrison, Brynne, Elena Svetieva, and Arun Vishwanath. "Individual processing of phishing emails." Online Information Review 40, no. 2 (2016): 265–81. http://dx.doi.org/10.1108/oir-04-2015-0106.

Full text
Abstract:
Purpose – The purpose of this paper is to explore user susceptibility to phishing by unpacking the mechanisms that may influence individual victimization. The focus is on the characteristics of the e-mail message, users’ knowledge and experience with phishing, and the manner in which these interact and influence how users cognitively process phishing e-mails. Design/methodology/approach – A field experiment was conducted where 194 subjects were exposed to a real phishing attack. The experimenters manipulated the contents of the message and measures of user traits and user processing were obtai
APA, Harvard, Vancouver, ISO, and other styles
29

Cox, Landis. "Targeting Sports Agents with the Mail Fraud Statute: United States v. Norby Walters & Lloyd Bloom." Duke Law Journal 41, no. 5 (1992): 1157. http://dx.doi.org/10.2307/1372763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zingale, Mark. "Fashioning a Victim Standard in Mail and Wire Fraud: Ordinarily Prudent Person or Monumentally Credulous Gull?" Columbia Law Review 99, no. 3 (1999): 795. http://dx.doi.org/10.2307/1123521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Dee, Carol Callaway, and Cindy Durtschi. "Return of the Tallahassee BeanCounters: A Case in Forensic Accounting." Issues in Accounting Education 25, no. 2 (2010): 279–321. http://dx.doi.org/10.2308/iace.2010.25.2.279.

Full text
Abstract:
ABSTRACT: Your firm has been engaged to conduct a forensic investigation of the Tallahassee BeanCounters (TBC), a privately owned minor league baseball team in Tallahassee, Florida. Team owner Franklin Kennedy has told employees that the audit is related to the mortgage TBC obtained for the recently constructed training facility. However, Mr. Kennedy tells you privately that the investigation is not due to loan requirements; rather, it is due to his concerns arising from an anonymous tip he received in the mail. The assignment requires you and your investigative team to (1) analyze the financi
APA, Harvard, Vancouver, ISO, and other styles
32

Prieto-Gonzalez, Mayelin. "Supreme Court Limits Permissible Scope of Government’s Ability to Force Medication of Mentally Ill Defendants." Journal of Law, Medicine & Ethics 31, no. 4 (2003): 737–39. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00144.x.

Full text
Abstract:
On June 16, 2003, the Supreme Court ruled that forced administration of antipsychotic drugs to a defendant facing serious criminal charges is appropriate in order to render that defendant competent to stand trial, but only in limited circumstances. The treatment must be medically appropriate, substantially unlikely to have side effects that may undermine the fairness of the trial, and necessary to significantly further important government interests, after taking account of less-intrusive alternatives.Charles Sell, a former dentist, had a long history of mental illness. He had been hospitalize
APA, Harvard, Vancouver, ISO, and other styles
33

Nuryatno, Muhammad A. "KETERKAITAN KUALITAS TATA KELOLA KORPORASI, IMPLEMENTASI PRINSIP ETIKA BISNIS DAN POTENSI KECURANGAN PELAPORAN KEUANGAN." Media Riset Akuntansi, Auditing & Informasi 10, no. 1 (2010): 19–45. http://dx.doi.org/10.25105/mraai.v10i1.2798.

Full text
Abstract:
The purpose of this research is to make clear the phenomena about the relationship between the likelihood of the financial reporting fraud, the implementation of business ethics principles and the quality of corporate governance. The objective of this research is to test empirically about them, based on auditors’ perception. The method used or the detailed of the study are: the nature of the study was hypothesis testing; the type of investigation used was causal relationship; the extent of researcher interference was minimal; the environment where the research undertaken was field experiment;
APA, Harvard, Vancouver, ISO, and other styles
34

Kumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.

Full text
Abstract:
Abstract: The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The C
APA, Harvard, Vancouver, ISO, and other styles
35

Vial, Virginie. "The Universal Postal Union's strategy for fighting “snail mail” fraud may be the key to making e-commerce safer." Global Business and Organizational Excellence 27, no. 4 (2008): 32–39. http://dx.doi.org/10.1002/joe.20211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.

Full text
Abstract:
Insider threats are malicious activities by authorized users, such as theft of intellectual property or security information, fraud, and sabotage. Although the number of insider threats is much lower than external network attacks, insider threats can cause extensive damage. As insiders are very familiar with an organization’s system, it is very difficult to detect their malicious behavior. Traditional insider-threat detection methods focus on rule-based approaches built by domain experts, but they are neither flexible nor robust. In this paper, we propose insider-threat detection methods based
APA, Harvard, Vancouver, ISO, and other styles
37

Prakoso, Bagus Andi Dwi, I. Nyoman Sujana, and Luh Putu Suryani. "Perlindungan Hukum terhadap Korban Penipuan Jual Beli Online." Jurnal Konstruksi Hukum 1, no. 2 (2020): 266–70. http://dx.doi.org/10.22225/jkh.2.1.2591.266-270.

Full text
Abstract:
Currently, the internet is often used as a means of trading in Indonesia, which often leads to cybercrime crimes, from fraud in trading to fraudulent objects of buying and selling online, requiring legal preservation. What is the form of legal preservation of the object of fraud in online trading? How do criminal sanctions for fraudsters roll out online? These two questions are the problems examined in this study. This study was designed using a normative legal research design. The results of research and assessment can be concluded that legal protection for victims of online buying and sellin
APA, Harvard, Vancouver, ISO, and other styles
38

Chirra, Venkata RamiReddy, Hoolda Daniel Maddiboyina, Yakobu Dasari, and Ranganadhareddy Aluru. "Performance Evaluation of Email Spam Text Classification Using Deep Neural Networks." Review of Computer Engineering Studies 7, no. 4 (2020): 91–95. http://dx.doi.org/10.18280/rces.070403.

Full text
Abstract:
Spam in email box is received because of advertising, collecting personal information, or to indulge malware through websites or scripts. Most often, spammers send junk mail with an intention of committing email fraud. Today spam mail accounts for 45% of all email and hence there is an ever-increasing need to build efficient spam filters to identify and block spam mail. However, notably today’s spam filters in use are built using traditional approaches such as statistical and content-based techniques. These techniques don’t improve their performance while handling huge data and they need a lot
APA, Harvard, Vancouver, ISO, and other styles
39

Watanabe, Ruriko, Nobutada Fujii, Daisuke Kokuryo, Toshiya Kaihara, and Yoichi Abe. "Text Mining to Support Consulting Services for Client Company State Recognition." International Journal of Automation Technology 14, no. 5 (2020): 779–90. http://dx.doi.org/10.20965/ijat.2020.p0779.

Full text
Abstract:
This study was conducted to devise a method for supporting consulting service companies in their response to client demands irrespective of the expertise of consultants. With emphasis on revitalization of small and medium-sized enterprises, the importance of support systems for consulting services to serve them is increasing. Those systems must support solutions to difficulties that must be addressed by enterprises. Consulting companies can respond to widely various management consultations. Nevertheless, because the consultation contents are highly specialized, service proposals and problem d
APA, Harvard, Vancouver, ISO, and other styles
40

Balajichandrasekhar M., V., T. Srinivasa Rao, and G. Srinivas. "An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (2018): 2239. http://dx.doi.org/10.11591/ijece.v8i4.pp2239-2246.

Full text
Abstract:
At the end of 2015, there were 4.7 billion noteworthy mobile subscribers globally, equivalent to 63% of the world’s population. Mobile phones had all the essential components or characteristics neatly fitted into a small space and designed to achieve high speeds, massive storage, and increased functionalities. Smart phones used to carry out imparting or exchanging of information such as calling, texting, Internet browsing, e-mail, photos, videos, and etc. Criminals can use smart phones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug traffi
APA, Harvard, Vancouver, ISO, and other styles
41

Якуб, А. В. "The State, Society and Philately in the Soviet Reality of the First Half of the 1920s, or How they Fought Against Postal Fraud and Fiction." Диалог со временем, no. 78(78) (April 24, 2022): 293–310. http://dx.doi.org/10.21267/aquilo.2022.78.78.019.

Full text
Abstract:
Рассматривается политика советского руководства в области защиты государственного интереса в сфере почты и филателии как внутри страны, так и за рубежом, связанного с увеличением количества фальшивых и фантастических знаков почтовой оплаты. Выделяются два основных периода в этой деятельности: «оборонительный» (1917–1921) и «контрнаступательный» (1922–1925). Характеризуются основные механизмы, методы и средства в борьбе с изготовлением фальшивых почтовых марок с целью защиты политико-экономических интересов страны, особенно за рубежом, и интересов отдельных коллекционеров. The article considers
APA, Harvard, Vancouver, ISO, and other styles
42

Ahmad, M. A., D. D. Wisdom, and S. Isaac. "An Empirical Analysis of Cybercrime Trends and Its Impact on Moral Decadence Among Secondary School Level Students in Nigeria." advances in multidisciplinary & scientific research journal publication 26, no. 1 (2020): 73–84. http://dx.doi.org/10.22624/isteams/v26p10-ieee-ng-ts.

Full text
Abstract:
Cybercrimes in various forms are on the raise daily; these crimes pose a potential threat to our moral society as well as economy and nation building at large. They are namely: social engineering, malvertising, ransom ware, Spamming, Botnets, fake bank alert messages (SMS) /unsolicited SMS requesting you to provide bank details as Bank Verification Number (BVN), fraud, identity theft, piracy, pornography, hacking, fraudulent e-mail related SMS, forgery such as fake documents as Certificate etc. Thus, Cybercrime is gradually becoming a threat to our moral society at large. Hence, the increase n
APA, Harvard, Vancouver, ISO, and other styles
43

Vilic, Vida. "Cyberstalking victimization." Temida 16, no. 1 (2013): 151–62. http://dx.doi.org/10.2298/tem1301151v.

Full text
Abstract:
Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure,
APA, Harvard, Vancouver, ISO, and other styles
44

Godana, Hillary, Samson Wokabi Mwangi, and Panuel Mwaeke. "Security Managers’ Perspectives on Challenges Facing Commercial Banks in Preventing Frauds in Nairobi City County, Kenya." Advances in Social Sciences Research Journal 9, no. 12 (2022): 1–12. http://dx.doi.org/10.14738/assrj.912.13539.

Full text
Abstract:
This paper uses data collected for an MA Thesis on Security Managers’ perspectives on challenges facing Commercial Banks in Preventing Frauds in Nairobi County, Kenya. The study was motivated by continued rise of frauds in commercial banks in the county, despite the extensive mitigation measures put in place to deter frauds. The study established the nature of frauds prevalent in Kenya commercial banks in Nairobi County, assessed the determinants of fraud in Kenya commercial banks, determined Bank Security Managers Capacity in fraud prevention, and finally examined Security Managers perception
APA, Harvard, Vancouver, ISO, and other styles
45

Sánchez Ríos, José. "Análisis de percepciones de dos grupos independientes, gerenciales no convictos y gerenciales convictos, en el delito del fraude en las variables capacidad-presión, capacidad-racionalización y capacidad-oportunidad." Oikos 20, no. 41 (2016): 121. http://dx.doi.org/10.29344/07184670.41.956.

Full text
Abstract:
RESUMENEl objetivo principal de esta investigación fue establecer si las percepciones sobre las variables capacidad-presión, capacidad-racionalización y capacidad-oportunidad, que forman parte de loselementos comunes en las teorías del fraude, pueden ser distintas en dos grupos independientes. Seutilizó una muestra de 32 gerentes no convictos por fraude ni por ningún delito y 31 convictos pordelitos relacionados al fraude en apropiación de activos. Ambos grupos respondieron a las mismaspreguntas utilizando el mismo cuestionario. Se utilizó la prueba estadística Mann-Whitney paracomparar las re
APA, Harvard, Vancouver, ISO, and other styles
46

Rustam, Suhardi. "ANALISA CLUSTERING PHISING DENGAN K-MEANS DALAM MENINGKATKAN KEAMANAN KOMPUTER." ILKOM Jurnal Ilmiah 10, no. 2 (2018): 175–81. http://dx.doi.org/10.33096/ilkom.v10i2.309.175-181.

Full text
Abstract:
Almost the crime in cyber is a condition of criminal activity using computers or computer networks as tools and also as a target. Fraud in academic websites the most at risk. The action of Phishing is on the rise. Recorded globally, the number of fraudulent mode phishing 42% of the mode in addition to phishing which is stated in the website Anti-Phishing Working Group (APWG) in its monthly report, noting there 12.845 e-mail new and unique as well as 2.560 a fake site that is used as a means of phishing, in Addition to increase the quantity, the quality of the attacks is also increasing, the ne
APA, Harvard, Vancouver, ISO, and other styles
47

Zisopoulos, A. D., K. G. Panitsidis, G. K. Broni, and N. D. Kartalis. "Cross border Interbank Payment System (CIPS) Security Supplements; Tangible Radio Safety Box, Software as non-textual Password and Revolving Executable Code Modules." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 20 (December 14, 2022): 273–83. http://dx.doi.org/10.37394/23207.2023.20.26.

Full text
Abstract:
Our research started a long ago as additional security for the asset owner to facilitate CIPS ( Cross-border Interbank Payment System) holistic security. Minor corrections were proposed, like an e-mail with a new domain for every transaction, Ping services in a VPN environment, and mirroring avoidance. Our primary approach was to fight internal fraud and hacking threats. Apart from these known vulnerabilities indemnification, we propose three specific security supplements. A shortwave activated latch inside a local safe box and Thales interconnector for a tangible bank security system. The ass
APA, Harvard, Vancouver, ISO, and other styles
48

Student. "FINE IN AN INFANT DRUG CASE." Pediatrics 84, no. 2 (1989): A29. http://dx.doi.org/10.1542/peds.84.2.a29.

Full text
Abstract:
St. Louis, Jan. 21 (AP)—A pharmaceutical company has been fined $115,000 and a former executive sentenced to six months in a work-release program for marketing an unapproved drug linked to the death of 38 premature babies. The sentences were imposed Friday by Judge Clyde Cahill of Federal District Court here, which had jurisdiction in the case because the company, O'Neal, Jones & Feldman Pharmaceuticals, now called O'Neal Inc., is based in the St. Louis suburb of Maryland Heights. O'Neal was the sole distributor of E-Ferol Aqueous Solution, used for treatment of retrolental fibroplasia, a
APA, Harvard, Vancouver, ISO, and other styles
49

Dimitrijević, Dragomir, and Dejan Jovanović. "Economic Motives and Willingness of Young People to Participate in Fraud." Naše gospodarstvo/Our economy 68, no. 3 (2022): 18–27. http://dx.doi.org/10.2478/ngoe-2022-0015.

Full text
Abstract:
Abstract Fraud is linked to economic and financial pressures that force people to commit it. Any fraud, regardless of the gender and age of the fraud perpetrators, inevitably leaves a short-term or long-term negative mark on society’s economy. Many financial frauds in the past (Enron, WorldCom, Parmalat) have left profound negative consequences on global financial markets. Such “financial strikes” on the financial markets led to financial losses of many companies (not only those in which frauds were committed), the dismissal of many workers, and even the bankruptcy of companies. Successful det
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, Hae-Myoung. "Marcus Garvey’s Charismatic Leadership and Black Nationalism." Korea Association of World History and Culture 63 (June 30, 2022): 211–49. http://dx.doi.org/10.32961/jwhc.2022.06.63.211.

Full text
Abstract:
This paper examines the charismatic leadership and black nationalism of Jamaican-born black leader Marcus Garvey. Garvey’s charismatic leadership has created a black vision and consensus that can inspire African pride, African culture to blacks and realize a sharp sense of history and zeitgeist. He also became a political leader from a labor activist to advocate blackness, independence, and Africa for Africans, and united the black public with passion, wide-ranging insight and appealing eloquence, becoming the first pioneer of black popular movements in the world.
 Garvey’s black national
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!