Academic literature on the topic 'Prevention of fraudulent transactions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Prevention of fraudulent transactions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Prevention of fraudulent transactions"

1

Arkusha, Larysa, and Nataliia Chipko. "METHODS OF COMMITTING AND INVESTIGATION OF FRAUDULENT MOTOR VEHICLE TRANSACTIONS." Russian Law Journal 6, no. 4 (November 1, 2018): 126–53. http://dx.doi.org/10.17589/2309-8678-2018-6-4-126-153.

Full text
Abstract:
Having set the goal to investigate and analyze modern methods of committing fraudulent motor vehicle transaction, we systematize and classify them. Special attention is paid to systematizing data on the identity of scammers, organized criminal groups and victims. Methodological recommendations aimed to create computer psychological profiles of scammers involved in fraudulent motor vehicle transactions are offered. Empirical methods of investigation based on available historical information about the peculiarities of the methods of committing crimes in fraudulent motor vehicle transactions are developed herein. Application of such methods will increase the effectiveness of law enforcement institutions in detecting, preventing and investigating fraudulent motor vehicle transactions.
APA, Harvard, Vancouver, ISO, and other styles
2

Zamachsari, Faried, and Niken Puspitasari. "Penerapan Deep Learning dalam Deteksi Penipuan Transaksi Keuangan Secara Elektronik." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 2 (April 28, 2021): 203–12. http://dx.doi.org/10.29207/resti.v5i2.2952.

Full text
Abstract:
The rapid development of information technology coupled with an increase in public activity in electronic financial transactions has provided convenience but has been accompanied by the occurrence of fraudulent financial transactions. The purpose of this research is how to find the best model to be implemented in the banking payment system in detecting fraudulent electronic financial transactions so as to prevent losses for customers and banks. Fraud detection uses machine learning with ensemble and deep learning with SMOTE. Financial transaction data is taken from bank payment simulations built with the concept of Multi Agent-Based Simulation (MABS) by banks in Spain. To build the best model, not only pay attention to the accuracy value, but the value of precision is a value that needs attention. A precision score is very important for fraud prevention. Fraud detection gets the best results without the SMOTE process by using deep learning with an accuracy score of 99.602% and precision score of 90.574%. By adding SMOTE, it will increase the accuracy score and precision score with the best model produced in the Extra Trees Classification with an accuracy score of 99.835% and precision score of 99.786%.
APA, Harvard, Vancouver, ISO, and other styles
3

TAGHIYEV, KHAYALADDIN R., TAMERLAN H. RUSTAMOV, and ARAZ A. HASANZADE. "ANALYSIS OF PAYMENT CARDS FRAUD TRANSACTIONS AND MEASURES TO PREVENT THEM." Economic innovations 23, no. 2(79) (June 20, 2021): 172–84. http://dx.doi.org/10.31520/ei.2021.23.2(79).172-184.

Full text
Abstract:
Topicality. The trends of fraud and the history of fraud in general with the emergence of new gaps due to the rapid development of information technology is analysed in the article.The systematization of types and forms of fraudulent intervention, their consequences and ways of counteraction taking into account the interests of users is made.Aim and tasks. The causes of payment card fraud, the main forms and types of possible fraudulent transactions and areas of payment card fraud were further classified and investigated.Research results. The investigation revealed the most common cases, including lost and stolen payment cards, counterfeit cards and fraudulent transactions without a payment card, and identified measures to combat them. At the same time, the ways of using different methods for the implementation of fraudulent transactions were analyzed. In the context of the rapid growth of e-commerce during the global pandemic, widespread fraud and steps to be taken against them have been revealed. Another noteworthy part of the research is the continuation of research in the language of numbers based on statistical data, as well as the collection and accuracy of statistical reporting.Conclusion. Thus, first, the cases of fraud on payment card transactions in the European Union were disclosed, and then the correlation coefficient between payment transactions in the payment card market in the Republic of Azerbaijan and fraudulent transactions was calculated. An investigation was also conducted into the implementation of preventive measures against fraudulent transactions, which are important for financial institutions and payment service users, as well as and the steps to be taken in a consistent manner are explained in the article. The life cycle of payment cards is divided into three main stages, customer acceptance, identification and decision-making, the specific features of each stage and ways to prevent risks in these stages are noted in the article. In the end, the results of the research are reflected in the conclusion section of the article.
APA, Harvard, Vancouver, ISO, and other styles
4

Madkaikar, Kartik, Manthan Nagvekar, Preity Parab, Riya Raika, and Supriya Patil. "Credit Card Fraud Detection System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (July 30, 2021): 158–62. http://dx.doi.org/10.35940/ijrte.b6258.0710221.

Full text
Abstract:
Credit card fraud is a serious criminal offense. It costs individuals and financial institutions billions of dollars annually. According to the reports of the Federal Trade Commission (FTC), a consumer protection agency, the number of theft reports doubled in the last two years. It makes the detection and prevention of fraudulent activities critically important to financial institutions. Machine learning algorithms provide a proactive mechanism to prevent credit card fraud with acceptable accuracy. In this paper Machine Learning algorithms such as Logistic Regression, Naïve Bayes, Random Forest, K- Nearest Neighbor, Gradient Boosting, Support Vector Machine, and Neural Network algorithms are implemented for detection of fraudulent transactions. A comparative analysis of these algorithms is performed to identify an optimal solution.
APA, Harvard, Vancouver, ISO, and other styles
5

Lv, Fang, Wei Wang, Yuliang Wei, Yunxiao Sun, Junheng Huang, and Bailing Wang. "Detecting Fraudulent Bank Account Based on Convolutional Neural Network with Heterogeneous Data." Mathematical Problems in Engineering 2019 (March 25, 2019): 1–11. http://dx.doi.org/10.1155/2019/3759607.

Full text
Abstract:
Detecting fraudulent accounts by using their transaction networks is helpful for proactively preventing illegal transactions in financial scenarios. In this paper, three convolutional neural network models, i.e., NTD-CNN, TTD-CNN, and HDF-CNN, are created to identify whether a bank account is fraudulent. The three models, same in model structure, are different in types of the input features. Firstly, we embed the bank accounts’ historical trading records into a general directed and weighted transaction network. And then, a DirectedWalk algorithm is proposed for learning an account’s network vector. DirectedWalk learns social representations of a network’s vertices, by modeling a stream of directed and time-related trading paths. The local topological feature, generating by accounts’ network vector, is taken as input of NTD-CNN, and TTD-CNN takes time series transaction feature as input. Finally, the two kinds of heterogeneous data, being integrated into a novel feature matrix, are fed into HDF-CNN for classifying bank accounts. The experimental results, conducted on a real bank transaction dataset, show the advantage of HDF-CNN over the existing methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Sanz-Bas, David, Carlos del Rosal, Sergio Luis Náñez Alonso, and Miguel Ángel Echarte Fernández. "Cryptocurrencies and Fraudulent Transactions: Risks, Practices, and Legislation for Their Prevention in Europe and Spain." Laws 10, no. 3 (July 9, 2021): 57. http://dx.doi.org/10.3390/laws10030057.

Full text
Abstract:
Cryptocurrencies have been developing very rapidly in recent years, and their use is becoming more and more widespread in different areas. The use of digital currencies for legal uses is advancing along with technological development, but, at the same time, criminal activities are also emerging to take advantage of this boom. The aim of this paper has been, first, to analyze the various ways in which individuals and criminal organizations have taken advantage of the phenomenon of cryptocurrencies to carry out fraudulent activities such as laundering money of illicit origin and, second, to provide an overview of the legal tools that have been developed in this regard in Europe and, more specifically, in Spain to combat these activities. Undoubtedly, cryptocurrencies bring great benefits to the economy, but it is also necessary to know the risks and abuses that have been developed to prevent them.
APA, Harvard, Vancouver, ISO, and other styles
7

Sadgali, Imane, Naoual Sael, and Faouzia Benabbou. "Adaptive Model for Credit Card Fraud Detection." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 03 (February 28, 2020): 54. http://dx.doi.org/10.3991/ijim.v14i03.11763.

Full text
Abstract:
<p>While the flow of banking transactions is increasing, the risk of credit card fraud is becoming greater particularly with the technological revolution that we know, fraudulent are improve and always find new methods to deal with the preventive measures that financial systems set up. Several studies have proposed predictive models for credit card fraud detection based on different machine learning techniques. In this paper, we present an adaptive approach to credit card fraud detection that exploits the performance of the techniques that have given high level of accuracy and consider the type of transaction and the client's profile. Our proposition is a multi-level framework, which encompasses the banking security aspect, the customer profile and the profile of the transaction itself.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Korsik, K. A. "Some Aspects of the Preventive Function of the Notaries." Actual Problems of Russian Law 16, no. 5 (June 9, 2021): 148–54. http://dx.doi.org/10.17803/1994-1471.2021.126.5.148-154.

Full text
Abstract:
The paper examines the notaries as an institution that ensures the legal security of a transaction in the course of its daily work. The author identifies the issues that prevent notaries from preventing fraudulent actions of parties to civil transactions when performing a notarial act. The State Duma of the Federal Assembly of the Russian Federation is considering a draft Federal Law No. 925889-7 "On Amending Certain Legislative Acts of the Russian Federation", specifically about a registrar of persons found incapable by court, the register of notifications of cancellation of powers of attorney made in electronic form. Thus, the author analyzes the issue of creating a register of persons recognized as having no legal capacity or partially incapable. The paper considers the positive experience of the Federal Notary Chamber in maintaining public registers. The author concludes that strengthening of the preventive function of the notaries in the legal system of society depends on the powers granted to this institution.
APA, Harvard, Vancouver, ISO, and other styles
9

Esen, M. Fevzi. "A Robust Multivariate Outlier Detection Method for Detection of Securities Fraud." International Journal of Business Analytics 7, no. 3 (July 2020): 12–29. http://dx.doi.org/10.4018/ijban.2020070102.

Full text
Abstract:
Insider trading is one the most common deceptive trading practice in securities markets. Data mining appears as an effective approach to tackle the problems in fraud detection with high accuracy. In this study, the authors aim to detect outlying insider transactions depending on the variables affecting insider trading profitability. 1,241,603 sales and purchases of insiders, which range from 2010 to 2017, are analyzed by using classical and robust outlier detection methods. They computed robust distance scores based on minimum volume ellipsoid, Stahel-Donoho, and fast minimum covariance determinant estimators. To investigate the outlying observations that are likely to be fraudulent, they employ event study analysis to measure abnormal returns of outlying transactions. The results are compared to the abnormal returns of non-outlying transactions. They find that outlying transactions gain higher abnormal returns than transactions that are not flagged as outliers. Business intelligence and analytics may be a useful strategy for detecting and preventing of financial fraud for companies.
APA, Harvard, Vancouver, ISO, and other styles
10

Nataraj, Geethanjali, and Ashwani. "Banking Sector Regulation in India: Overview, Challenges and Way Forward." Indian Journal of Public Administration 64, no. 3 (July 24, 2018): 473–86. http://dx.doi.org/10.1177/0019556118783065.

Full text
Abstract:
The Indian banking industry is undergoing the rollout of innovative banking models in the form of more promotion to private banks for attaining the productivity and efficiency. However, increase in the quantity of non-performing assets, poor credit growth and low profitability of Indian banks cast doubt about the industry’s resilience towards maintaining the country’s economic growth trajectory. While taking lessons from global regulatory bodies and keeping in view the domestic problem of the Indian banking industry, the dire need of the hour is to maintain proper checks and balances on banking transactions. The article goes on to sum up the various measures initiated by government to deal with banking-sector challenges and how an attempt is made to adapt regulatory measures from global best practices which could help the banking sector in India become more robust, efficient and effective in preventing all fraudulent transactions and enhancing the quality of its assets.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Prevention of fraudulent transactions"

1

De, Villiers Casper. "A case study to examine the use of SMS-based transactional alerts in the banking sector in South Africa." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/962.

Full text
Abstract:
Thesis (MBA (Business Management))--University of Stellenbosch, 2010.
ENGLISH ABSTRACT: The mobile phone has not only changed the way the world works today, but also changed the direction the world is moving toward. The mobile phone changed the face of communication and enabled more people to reach more other people than ever before. The big four banks in South Africa represent 83.5 per cent of the total asset value of all banks in South Africa. Traditionally, banking customers (or potential customers) could be reached through the current 2 786 branches, 19 451 ATMs and potentially 4.59 million internet users. There are 47.9 million mobile phone subscribers in South Africa – increasing the number of potential contact points by order of magnitude. The possibilities for banks utilising the mobile phone are endless, however online banking and offering banking services through a mobile phone is increasingly more subject to fraud attacks. Online banking and credit card fraud is still on the increase. Today, SMS is used to alert customer of movements on their bank account. This keeps the customer informed and enables them to notify their banks and prevent subsequent fraudulent transactions. SMS can be sent from one mobile phone to another (P2P) or from a computer system to a mobile phone (A2P). In 2007, 2 trillion SMS's were sent worldwide and was responsible for 75 to 80 per cent of all mobile phone revenues. South Africa sent 34 billion A2P SMS in 2009 of which 29 per cent were sent as transactional SMS by the top three banks in South Africa. SMS-based transactional alerts are SMS sent each time a change occurs in a bank account, for example, when your credit card is used then you will get an SMS on your mobile phone. Each bank makes different functionalities available. Absa reported 2 million customers receiving SMS alerts in 2008. FNB reported 67 million transactional SMS per month in 2009. The core advantages for using transactional SMS are the cost, reliability and ubiquity. Research was conducted among five of the six largest banks. Data revealed that banks send between 16 million and 69.4 million SMS per month and have approximately between 4.5 and 5.1 million customers using this service. The impact was tested through personal interviews. The two common factors were fraud reduction and customer retention. The two key challenges the banks identified are: i) Capacity/throughput with the mobile network operators; and ii) Getting internal systems and processes defined and working together for the alerts. The advantages identified are competitive positioning, customer interaction, empowerment of people and revenue. Key findings of the research were: SMS-based transactional alerts offer strategic importance; Any system is as good as it is being utilised; Security controls are extremely complex; SMS capacity is a common challenge and big risk; Internal processes cause the most complexity; Return on investment is not adequately measured; Transactional alerts is a potential revenue stream; There is no interaction between the bank and the customer; SMS in South Africa create high dependencies; SMS-based transactional alerts are successful.
APA, Harvard, Vancouver, ISO, and other styles
2

Doležel, Jan. "Bariéry v komunikaci mezi vybranými úrovněmi managementu zdravotnického zařízení." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165310.

Full text
Abstract:
The aim of this work is to identify the most common communication errors in terms of transactional analysis taken from selected levels of management of medical facility, which undermine the social interaction at work, and analyse their causes and impact on the behaviour and experience of parties involved. Part of the work is a set of recommendations for the prevention and elimination of these barriers. For these goals to be met, I have developed questionnaires, particularly for top management, and especially for middle management, where the respondents assess themselves on how often they face barriers in the workplace and the impact of these barriers on their behaviour and experience. Their responses are processed in charts by allocation criteria. Communication theories and the barriers related to the identified data give an idea of how the top management of this medical facility (and possibly at other medical facilities of similar size and structure) should communicate with senior consultants with care. The contribution of this work should be to improve communication and achieve not only greater satisfaction for all employees, but also increase productivity during business hours. For this to transpire, it is first necessary to increase communication, especially the knowledge of effective communication, then accept their mistakes and make a constant effort to eliminate them. Some important basic concepts in communication, transactional, barriers of communication and removing communication barriers are clarified in the theoretical part. The practical part is focused on the environment of unnamed hospital. The most commonly met crossed transactions in the workplace and their impact on the behaviour and experience are shown and described there.
APA, Harvard, Vancouver, ISO, and other styles
3

Kessentini, Imed. "La prévention et le règlement non juridictionnel des litiges fiscaux : contribution à l'étude des voies de prévention et règlement non juridictionnel des litiges fiscaux en droit fiscal interne." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020082.

Full text
Abstract:
Dans le cadre de la recherche perpétuelle du renforcement du consentement à l'impôt et, plus largement de la légitimation de l'action du pouvoir fiscal, les pouvoirs publics ont créé et accumulé divers procédés visant à prévenir et régler amiablement les litiges fiscaux dans l'ordre interne. La présente thèse est consacrée à l'étude du rôle des modes de prévention et de règlement non juridictionnel des litiges dans la démarche des pouvoirs publics tendant à améliorer la situation du contribuable dans ses rapports avec l'administration. Elle vise à démontrer leur contribution dans le processus constant qui aspire à instaurer une relation de confiance entre ces acteurs, tout en dévoilant leurs limites révélées au cours de leur mise en œuvre et les enjeux cruciaux qu'elles impliquent pour le contribuable qui y a recours. Une première partie sera consacrée à l'exposé du développement des modes de prévention et de règlement des litiges fiscaux en tant que reflet d'un mouvement qui tend à l'amélioration de la relation contribuable-administration. Une seconde partie traitera des limites que présentent ces procédures et des perspectives d'amélioration envisageables pour pallier leurs défauts et assurer efficacement la protection du contribuable
As part of the ongoing search for the reinforcement of consent to taxation and, more broadly, to legitimize taxing authority action in general, the public authorities have created and accumulated various processes designed to prevent and resolve the amicable settlement oftax disputes in the domestic order. The aim ofthis is this thesis is the study of the roles of modes of prevention and the non-jurisdictional resolution of tax disputes following the public authorities approach which tend to reinforce the taxpayer's situation in its relationship with the tax administration. lt is specifically designed to demonstrate their contribution in the constant process that wishes to establish a relationship of trust between these actors, while revealing their limitations proved in their implementation and the major issues that will face the taxpayer who resorts to them. The first part will be dedicated to present the development of the modes of prevention and amicable resolution of tax disputes to be an expression of the movement toward improvement of the relationship between the taxpayer and the administration. The second part will deal with the limits of these procedures and the conceivable prospects for their improvement, in particular to counter their drawbacks and thereby protecting the taxpayer
APA, Harvard, Vancouver, ISO, and other styles
4

Söderberg, Anna. "Internprissättning och tullvärde : Det är bättre att förekomma än att förekommas." Thesis, Linköpings universitet, Affärsrätt, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127122.

Full text
Abstract:
Globaliseringen bidrar till en ökad världshandel och medför även ett växande antal gränsöverskridande koncerninterna transaktioner inom multinationella företag. Prissättningen av transaktioner vilka vidtas mellan närstående företag måste ske i enlighet med armlängdsprincipen som om transaktionerna vidtagits mellan två oberoende företag. Skattemyndigheterna kan justera internpriserna i slutet av beskattningsåret i de fall de anser att internprissättningen avviker från armlängdsprincipen och marknadsmässiga villkor. Utöver inkomstbeskattning åläggs företagen att betala tullavgifter i samband med transaktioner vidtagna med närstående företag etablerade utanför EU. I likhet med skattemyndigheterna granskar tullmyndigheterna företagens importpriser i syfte att säkerställa att parternas närståenderelation inte påverkat prissättningen. Båda myndigheterna arbetar således för samma mål, att upprätthålla prissättningens förenlighet med marknadsmässiga villkor. Skatte- och tullmyndigheterna tillämpar dock olika prissättningsmetoder i syfte att uppnå målet. Inkomstskatten baseras på företagens totala inkomster, relaterade till transaktionerna och tullavgiften beräknas baserat på varje specifik transaktion och vara. Det faktum att myndigheterna inkluderar olika tillgångar i de respektive beskattningsunderlagen kan medföra att de bedömer värdet av samma transaktion olika. Varierande bedömningar av samma pris kan vidare medföra krav på olika prisjusteringar i syfte att uppnå marknadsmässig prissättning. Prisjusteringar kan leda till onödiga skattetillägg och liknande straffavgifter. Det föreligger svårigheter för multinationella företag att bestämma transaktionspriser som uppfyller båda myndigheternas i syfte att undvika straffavgifter.     Problematiken är ännu relativt ouppmärksammad av företag i världen. I amerikansk praxis framkommer att möjligheterna är små för företag att förlita sig på dokumentation upprättad för internprissättning, i syfte att styrka tullavgifter och tullvärde. Det är således betydelsefullt att företag upprättar dokumentationer för både internprissättning och tullvärde för att undvika straffavgifter. Dokumentationen utgör huvudsakligt bevis och ligger till grund för bedömningen av huruvida företagen uppfyllt bevisbördan avseende prisernas förenlighet med marknadsmässiga villkor. Företagen bör etablera en öppen kommunikation med de respektive myndigheterna i syfte att minimera risker för missförstånd eventuella framtida prisjusteringar. Det är bättre att förekomma än att förekommas.
The ‘arm’s length principle’ is fundamental to transfer pricing and cross-border intercompany transactions. The principle states that the prices charged for transactions of goods between related parties must be the same as if the parties were unrelated. Simply, the price needs to equal market values. If the Tax Authority finds the pricing to be inconsistent with the arm’s length principle, the price may be adjusted. In relation to cross-border intercompany transactions outside of the EU, companies have to pay customs duty and regard customs values. The Customs Authorities work to ensure that the price has not been influenced by the intercompany relationship. Thus, the Tax and Customs Authorities share the same goal, which is to ensure that the transaction price is consistent with market values. However, the methods of pursuing the goal differ. The Tax Authorities determine the amount of income tax based on the company’s total revenues deriving from cross-border intragroup transactions. The Customs Authorities on the contrary determine the amount of taxable income based on the value of every specific imported product. The authorities usually consider different values and assets when determining the amount of taxable income. Therefore the same transaction price may be evaluated differently by the Tax and Customs authorities. Price adjustments may be made if the transaction price is considered to differ in relation to market values. Thus, the companies may be obligated to pay tax surcharges or similar monetary penalties. The authorities’ different assessments of the same transaction price may result in difficulties for multinational enterprises in their efforts of meeting both requirements. The problem is regarded in varying degrees in different countries. In American precedent the court has determined the opportunities to be low for companies to depend on transfer pricing documentation when supporting customs value. It is important for companies to keep detailed documentation of both transfer pricing and customs valuation. The documentation serve as vital evidence when proving the compatibility of transaction prices with market values. Companies should also establish good communications with the authorities in order to prepare them for potential future price adjustments.  Prevention is better than cure.
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Tzu-Ting, and 黃子庭. "The Case Study of Fraudulent Crime Prevention." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xahk53.

Full text
Abstract:
碩士
義守大學
資訊管理學系
107
We all have a responsibility in preventing incidents of fraud, however due to the fact that the lack of awareness about identity fraud is making it even easier for fraudsters to fraud succeed. Through the fraud cases reported by the police departments in 2018, this study thus used qualitative research, purposive sampling, and semi-structured interviews with the victims, as well as then provides keywords as the causes of this kind of criminal fraud. Furthermore, this study provides these keywords to the government departments as a reference for enhancing the activities of criminal fraud prevention, as well as to prevent that people would be falled into fraud in the future. This study found that fraudsters employ phone calls to contact with the victims. When the victims received messages from fraudsters disguised as civil servants of Prosecutors’ Office, Police Department or other government departments, they would easily be lured into the false situation. Therefore, according to the research results, there are four suggestions for the related government departments: 1. A comprehensive training for anti-fraud educators should be planned. 2. Complete education materials should be presented. 3. Hierarchal education and communication with the people should be expanded. 4. Promotion of the slogan “Do not act!” should be enhanced. For the people, there are also three suggestions: 1. People should activity participate in the activities of fraud prevention and pay more attention to the real fraud cases in order not to be cheated by the same tricks. 2. People should keep their personal information very well. 3. People should keep their personal properties very well. Society, government and industry all have a role in preventing fraud, and then to stop fraud rings from being active in the society.
APA, Harvard, Vancouver, ISO, and other styles
6

Horne, Andrew J. "Reviewable transactions in insolvency : the recognition of creditors’ interests in "subjective" and "objective" insolvency regimes." Thesis, 1999. http://hdl.handle.net/2429/9655.

Full text
Abstract:
A person on the eve of bankruptcy may enter into transactions or arrangements that are intended to, or that have the effect of, preserving its property from being seized and distributed among creditors. Such transactions may provide a bankrupt with collateral benefits such as the continued use and enjoyment of property, or they may benefit third parties such as members of the bankrupt's family, or they may benefit selected creditors to the detriment of others. The effect of such transactions is to frustrate the legislative scheme which provides for the distribution of a bankrupt's residual property. This effect may be desired by a bankrupt or by a recipient of the bankrupt's property, or it may be unintended. Insolvency legislation confers wide powers upon a trustee in bankruptcy to "review" such transactions by bringing proceedings to reverse their effect and recover the value lost to the bankrupt's estate. Reviewable transactions comprise two main categories: dispositions or unequal transactions in which a debtor parts with property for no or insufficient consideration (such as a transfer of property to a spouse or a sale in which a bankrupt does not receive a fair price) and preferential repayments of debts owed to certain creditors to the detriment of others. Reviewable transaction laws in Canada and England have a subjective basis in that they focus upon the intent of a debtor to defeat creditors or prefer one creditor over others. In contrast, relevant Australian and New Zealand laws have an objective focus and provide remedies where the effect of a transaction, rather than the intent of a debtor, is to defeat the interests of creditors. This paper conducts a comparative critique of reviewable transaction regimes. It makes the argument that subjective regimes tend to reflect their historical origins in fraud law and a desire to punish and frustrate the fraudulent intent of a bankrupt; an inappropriate policy foundation that fails to address the competing interests and policy considerations which should form the basis of reviewable transaction law. Objective regimes, which focus upon the effect of impugned transactions, provide more appropriately for the balancing of creditors' and recipients' interests and the making of provision for policy considerations. This paper also considers collateral effects of reviewable transaction regimes upon creditors' interests (such as effects upon claims to property recovered by a trustee) in a variety of circumstances and concludes that the results are often inconsistent and undesirable. In this respect the relative positions of secured and unsecured creditors are described in detail and proposals for reform are ventured.
APA, Harvard, Vancouver, ISO, and other styles
7

"A Model Framework to Estimate the Fraud Probability of Acquiring Merchants." Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.29798.

Full text
Abstract:
abstract: Using historical data from the third-party payment acquiring industry, I develop a statistical model to predict the probability of fraudulent transactions by the merchants. The model consists of two levels of analysis – the first focuses on fraud detection at the store level, and the second focuses on fraud detection at the merchant level by aggregating store level data to the merchant level for merchants with multiple stores. My purpose is to put the model into business operations, helping to identify fraudulent merchants at the time of transactions and thus mitigate the risk exposure of the payment acquiring businesses. The model developed in this study is distinct from existing fraud detection models in three important aspects. First, it predicts the probability of fraud at the merchant level, as opposed to at the transaction level or by the cardholders. Second, it is developed by applying machine learning algorithms and logistical regressions to all the transaction level and merchant level variables collected from real business operations, rather than relying on the experiences and analytical abilities of business experts as in the development of traditional expert systems. Third, instead of using a small sample, I develop and test the model using a huge sample that consists of over 600,000 merchants and 10 million transactions per month. I conclude this study with a discussion of the model’s possible applications in practice as well as its implications for future research.
Dissertation/Thesis
Doctoral Dissertation Business Administration 2015
APA, Harvard, Vancouver, ISO, and other styles
8

Budhram, Trevor. "Examining the unique security features of a credit card with the aim of identifying possible fraudulent use." Diss., 2007. http://hdl.handle.net/10500/631.

Full text
Abstract:
The use of credit cards has become a way of life in many parts of the world. Credit cards have also created many new opportunities for criminal activity. It is in this light that organizations such as VISA International have explored a variety of security alternatives by constantly reviewing security measures that may be applied to cards and devote considerable resources to the maintenance of security systems and programmes. These programmes mandated by the association, include uniform card standards, security standards for manufactures, embossing and encoding of cards, standards for mailing the cards and credit background investigations of applicants. These standards assist investigators in examining counterfeit cards and distinguish a counterfeit card from a genuine card. The constant reviewing of security features and methods by the association is to create a card that is technically difficult to alter or counterfeit.
Criminology
M.Tech. (Forensic Investigation)
APA, Harvard, Vancouver, ISO, and other styles
9

SHEU, CHING-SHIH, and 許清事. "The Cause and Prevention of Communication Financial Fraud Crime—To Instance the Investigations into the Surrogate–Related Fraudulent Crimes in Taipei County." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/52519237793088755133.

Full text
Abstract:
碩士
國立臺北大學
犯罪學研究所
94
The Crime of Communication Financial Fraud, to be more specific it is a crime which fraudsters using all sorts of communication tools or methods to deceive different levels among the people. It is a new emerge type of crime of fraud and behavior in nowadays society. Very common characteristics of these newly emerging crimes are: fake lottery wining, get a free refund, pretend close relative asked for financial help. There’s more, acted as they were Mafia and kidnap the rich for ransom, use newspaper ads and internet to forge credit mortgage, force victim transfer money from ATM into fraudulent accounts or cell phone text message con. Those tricks are become more and more well developed from fraudsters, it penetrated into people’s life gradually. They take advantage of people’s trust toward government organizations and unfamiliarity of public offices operation procedure, by mastered human weaknesses (compassion, endeavor, fear) to lead the victims step by step into their trap without knowing. Purpose of this study: To evaluate and data analyze of numbers, types, methods, gender, occupation and educational level of crime of fraud from year 1995~2004. This study is for better understanding of the whole picture of fraud movement. Furthermore, analyzing, comparing 1504 communication financial fraud crime cases which were reported between Sep 2005 and Mar 2006, and sampling the happened、disclosed new type of communication financial fraud of the two major cases from Taipei County Government Police Bureau. Find out the causes and factors why communication financial fraud crime occurred so often. Hoping that our government can build up an effective anti-fraud technology significantly to prevent crime behavior and also provide those to the relatived organizations to fight together against the crimes. After the analysis and study of modus operandi of victims experience of deception and the fraudulency traps of suspects, to further understand the reasons of significant amount of cases of communication banking fraud and crime, modus operandi of the fraud group (ring), and how the criminals utilize the weakness of human nature; also realize why this crime and not be prevented and terminated effectively is because “the fraud phone calls, number and fraud account can not be controlled and eliminated”, and the light punishment of current law can not impede the motivations of the criminals, and no official cooperation of fighting crime between Taiwan straits. At the end, in accordance with “situational crime prevention strategy” to enhance the protection of target by design, increase the mechanisms of monitor and control, raise the risk of committing crimes, diminish the motivations of criminals, and combine all the related government agencies such as the police force, telecommunication, finance, justice together, can definitely demonstrate more effective and significant performance of the anti-fraud tasks.
APA, Harvard, Vancouver, ISO, and other styles
10

Araújo, João Bosco de. "Etiologia criminal na gestão de contratos terceirizados." Master's thesis, 2017. http://hdl.handle.net/10284/6088.

Full text
Abstract:
No mundo contemporâneo, crimes econômicos e fraudes financeiras assumem diferentes formas, características e modalidades. A globalização e o dinâmico desenvolvimento tecnológico, tornaram sofisticados e complexos os crimes e fraudes, pois fragilizam mecanismos de defesas e controles internos devido a rapidez com que as mudanças organizacionais ocorrem e contribuem para elevar vulnerabilidades e riscos na gestão de contratos terceirizados. Os crimes e fraudes praticados durante a vigência de contratos, sejam privados ou públicos, evidenciam conflitos de interesses, desvios de condutas, oportunismos e desprezo aos valores éticos realizados por responsáveis que deveriam controlar acordos comerciais, licitações, seleções de fornecedores e/ou produtos, revelando um perfil fraudador com forte atuação predatória. A frágil, ou limitada, capacidade dos controles internos preventivos e a evidente manipulação das três linhas de defesa em todos os segmentos e portes empresariais ratificam, infelizmente, a elevação dos casos de fraudes e de crimes econômicos. Neste contexto, esta pesquisa procurou identificar riscos inerentes aos contratos e características do perfil fraudador responsável por anular controles e manipular linhas de defesa na gestão de contratos, estabelecendo o nexo causal entre a prática criminosa e a exposição aos riscos contratuais. Fundamentado nesse propósito, foram realizadas pesquisas específicas sobre os tipos de contratos impactados, características dos perfis dos fraudadores e identificação das principais medidas protecionistas implementadas para mitigar fraudes e crimes econômicos contratuais. Finalmente, espera-se que esta Dissertação concorra para a conscientização de empresários, gestores e, principalmente, auditores, sobre a importância em disseminar para os atores envolvidos na gestão de contratos terceirizados metodologias e ferramentas relacionadas à detecção, à prevenção, ao monitoramento e ao tratamento de riscos, alinhadas com regras de compliance específicas para os riscos contratuais inerentes, que permitam preservar a imagem da empresa, proteger investimentos, garantir operações e continuidade do negócio.
In the contemporary world, economic crimes and financial fraud take on different forms, characteristics and modalities. Globalization and dynamic technological development have made sophisticated and complex crimes and frauds as they weaken internal defenses and controls because of the rapidity with which organizational changes occur and contribute to the elevation of vulnerabilities and risks in the management of outsourced contracts. Crimes and fraud committed during the term of contracts, whether private or public, show conflicts of interest, misconduct, opportunism and contempt for the ethical values made by managers who should control commercial agreements, bids, supplier selections and / or products, Revealing a predatory fraud profile. The fragile or limited capacity of the internal preventive controls and the evident manipulation of the three lines of defense in all segments and sizes of business unfortunately ratify the increase of cases of fraud and economic crimes. In this context, this research sought to identify risks inherent in the contracts and characteristics of the fraud profile responsible for annulling controls and manipulating lines of defense in contract management, establishing the causal link between criminal practice and exposure to contractual risks. Based on this purpose, specific research was carried out on the types of contracts impacted, characteristics of fraudster profiles and identification of the main protectionist measures implemented to mitigate fraud and economic contractual crimes. Finally, it is expected that this Dissertation will contribute to the awareness of entrepreneurs, managers and, especially, auditors, about the importance of disseminating to the actors involved in the management of outsourced contracts methodologies and tools related to the detection, prevention, monitoring and Risk treatment in line with specific compliance rules for the inherent contractual risks that can preserve the company’s image, protect investments, guarantee operations and business continuity.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Prevention of fraudulent transactions"

1

Alces, Peter A. The law of fraudulent transactions. New York: Warren, Gorham & Lamont, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alces, Peter A. The law of fraudulent transactions. 2nd ed. Eagan, MN: Thomson/West, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Assembly, Canada Legislature Legislative. Bill: An act for the prevention of fraudulent invoices. Quebec: Thompson, Hunter, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stroligo, Klaudijo, Horst Intscher, and Susan Davis-Crockwell. Suspending suspicious transactions. Washington, D.C: World Bank, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Law of benami transaction. Lahore: Khyber Law Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fawad, Shafi Mian, ed. A marvellous book on Law of Benami Transactions: With up to dates case law of higher courts of Pakistan and overseas. Lahore: Khyber Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abagnale, Frank W. Abagnale's document verification and currency transactions manual. Washington, D.C: Abagnale and Associates, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Judiciary, United States Congress House Committee on the. Fraudulent Online Identity Sanctions Act: Report (to accompany H.R. 3754) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Judiciary, United States Congress House Committee on the. Fraudulent Online Identity Sanctions Act: Report (to accompany H.R. 3754) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vanuatu. State Law Office. Financial Intelligence Unit. Financial Transactions Reporting Act (cap. 268): Guidelines for financial institutions. Port Vila], Vanuatu: Financial Intelligence Unit, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Prevention of fraudulent transactions"

1

Belyakov, S. L., S. M. Karpov, and E. F. Zalilov. "Detecting Fraudulent Transactions Using a Machine Learning Algorithm." In Communications in Computer and Information Science, 46–55. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1480-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mehta, Priya, Jithin Mathews, Sandeep Kumar, K. Suryamukhi, Ch Sobhan Babu, and S. V. Kasi Visweswara Rao. "Big Data Analytics for Nabbing Fraudulent Transactions in Taxation System." In Lecture Notes in Computer Science, 95–109. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23551-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jing, Chen, Cheng Wang, and Chungang Yan. "Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features." In Financial Cryptography and Data Security, 588–604. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32101-7_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leve, Leslie D. "Applying Behavioral Genetics Research to Inform the Prevention of Developmental Psychopathology: Drawing from the Principles of Prevention Science." In Gene-Environment Transactions in Developmental Psychopathology, 251–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49227-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zainab, Kaneez, Namrata Dhanda, and Qamar Abbas. "Analysis of Various Boosting Algorithms Used for Detection of Fraudulent Credit Card Transactions." In Information and Communication Technology for Competitive Strategies (ICTCS 2020), 1083–91. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0882-7_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brody, Gene H. "Using Genetically Informed Prevention Trials to Test Gene × Environment Hypotheses." In Gene-Environment Transactions in Developmental Psychopathology, 211–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49227-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramanujan, Ajeesh, and Blesson Andrews Varghese. "A Survey on DDoS Prevention, Detection, and Traceback in Cloud." In Transactions on Computational Science and Computational Intelligence, 69–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49500-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kusy, Maciej, and Piotr A. Kowalski. "Detection of Fraudulent Credit Card Transactions by Computational Intelligence Models as a Tool in Digital Forensics." In Studies in Computational Intelligence, 205–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74970-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manlangit, Sylvester, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, Mirjam Jonkman, and Arasu Balasubramaniam. "An Efficient Method for Detecting Fraudulent Transactions Using Classification Algorithms on an Anonymized Credit Card Data Set." In Advances in Intelligent Systems and Computing, 418–29. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76348-4_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Czegledi, A., L. Scott Campbell, and D. Smiderle. "Using Cognitive Fit Theory to Evaluate the Effectiveness of Financial Information Visualization: An Example Using Data to Detect Fraudulent Transactions." In Springer Proceedings in Mathematics & Statistics, 655–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63591-6_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Prevention of fraudulent transactions"

1

Kondratev, Igor A., Vadim V. Bazanov, Daniil A. Uskov, Anna V. Kuchebo, and Tatyana E. Sereda. "Comparative Analysis of Methods for Detecting Fraudulent Transactions." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jing, Chen, Cheng Wang, and Chungang Yan. "Replay Attack: A Prevalent Pattern of Fraudulent Online Transactions." In 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud) and 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, 2018. http://dx.doi.org/10.1109/cscloud/edgecom.2018.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadineni, Praveen Kumar. "Detection of Fraudulent Transactions in Credit Card using Machine Learning Algorithms." In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2020. http://dx.doi.org/10.1109/i-smac49090.2020.9243545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Torres, Rodrigo Araujo Lima, and Marcelo Ladeira. "A proposal for online analysis and identification of fraudulent financial transactions." In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2020. http://dx.doi.org/10.1109/icmla51294.2020.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Wei, and Yuan Liu. "An Optimized SVM Model for Detection of Fraudulent Online Credit Card Transactions." In 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG). IEEE, 2012. http://dx.doi.org/10.1109/icmecg.2012.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dandash, Osama, Yiling Wang, Phu Dung Le, and Bala Srinivasan. "A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention." In Fourth International Conference on Information Technology (ITNG'07). IEEE, 2007. http://dx.doi.org/10.1109/itng.2007.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Laveti, Ramesh Naidu, Abhay Anand Mane, and Supriya N. Pal. "Dynamic Stacked Ensemble with Entropy based Undersampling for the Detection of Fraudulent Transactions." In 2021 6th International Conference for Convergence in Technology (I2CT). IEEE, 2021. http://dx.doi.org/10.1109/i2ct51068.2021.9417896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alanezi, Maha A., Mawra T. Homeed, Zahra S. Mohamed, and Ahmed M. Zeki. "Comparing Naïve Bayes, Decision Tree and Logistic Regression Methods in Fraudulent Credit Card Transactions." In 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI). IEEE, 2020. http://dx.doi.org/10.1109/icdabi51230.2020.9325705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Prusti, Debachudamani, Abhishek Kumar, Ingole Shubham Purusottam, and Santanu Kumar Rath. "A design methodology for web-based services to detect fraudulent transactions in credit card." In ISEC 2021: 14th Innovations in Software Engineering Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3452383.3452397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Caldeira, Evandro, Gabriel Brandao, and Adriano C. M. Pereira. "Fraud Analysis and Prevention in e-Commerce Transactions." In 2014 9th Latin American Web Congress (LA-WEB). IEEE, 2014. http://dx.doi.org/10.1109/laweb.2014.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Prevention of fraudulent transactions"

1

Dutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, September 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.

Full text
Abstract:
Cannabis legalization has spread rapidly in the United States. Although national surveys provide robust information on the prevalence of cannabis use, cannabis disorders, and related outcomes, information on knowledge, attitudes, and beliefs (KABs) about cannabis is lacking. To inform the relationship between cannabis legalization and cannabis-related KABs, RTI International launched the National Cannabis Climate Survey (NCCS) in 2016. The survey sampled US residents 18 years or older via mail (n = 2,102), mail-to-web (n = 1,046), and two social media data collections (n = 11,957). This report outlines two techniques that we used to problem-solve several challenges with the resulting data: (1) developing a model for detecting fraudulent cases in social media completes after standard fraud detection measures were insufficient and (2) designing a weighting scheme to pool multiple probability and nonprobability samples. We also describe our approach for validating the pooled dataset. The fraud prevention and detection processes, predictive model of fraud, and the methods used to weight the probability and nonprobability samples can be applied to current and future complex data collections and analysis of existing datasets.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography