Academic literature on the topic 'Prevention of fraudulent transactions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Prevention of fraudulent transactions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Prevention of fraudulent transactions"
Arkusha, Larysa, and Nataliia Chipko. "METHODS OF COMMITTING AND INVESTIGATION OF FRAUDULENT MOTOR VEHICLE TRANSACTIONS." Russian Law Journal 6, no. 4 (November 1, 2018): 126–53. http://dx.doi.org/10.17589/2309-8678-2018-6-4-126-153.
Full textZamachsari, Faried, and Niken Puspitasari. "Penerapan Deep Learning dalam Deteksi Penipuan Transaksi Keuangan Secara Elektronik." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 2 (April 28, 2021): 203–12. http://dx.doi.org/10.29207/resti.v5i2.2952.
Full textTAGHIYEV, KHAYALADDIN R., TAMERLAN H. RUSTAMOV, and ARAZ A. HASANZADE. "ANALYSIS OF PAYMENT CARDS FRAUD TRANSACTIONS AND MEASURES TO PREVENT THEM." Economic innovations 23, no. 2(79) (June 20, 2021): 172–84. http://dx.doi.org/10.31520/ei.2021.23.2(79).172-184.
Full textMadkaikar, Kartik, Manthan Nagvekar, Preity Parab, Riya Raika, and Supriya Patil. "Credit Card Fraud Detection System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (July 30, 2021): 158–62. http://dx.doi.org/10.35940/ijrte.b6258.0710221.
Full textLv, Fang, Wei Wang, Yuliang Wei, Yunxiao Sun, Junheng Huang, and Bailing Wang. "Detecting Fraudulent Bank Account Based on Convolutional Neural Network with Heterogeneous Data." Mathematical Problems in Engineering 2019 (March 25, 2019): 1–11. http://dx.doi.org/10.1155/2019/3759607.
Full textSanz-Bas, David, Carlos del Rosal, Sergio Luis Náñez Alonso, and Miguel Ángel Echarte Fernández. "Cryptocurrencies and Fraudulent Transactions: Risks, Practices, and Legislation for Their Prevention in Europe and Spain." Laws 10, no. 3 (July 9, 2021): 57. http://dx.doi.org/10.3390/laws10030057.
Full textSadgali, Imane, Naoual Sael, and Faouzia Benabbou. "Adaptive Model for Credit Card Fraud Detection." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 03 (February 28, 2020): 54. http://dx.doi.org/10.3991/ijim.v14i03.11763.
Full textKorsik, K. A. "Some Aspects of the Preventive Function of the Notaries." Actual Problems of Russian Law 16, no. 5 (June 9, 2021): 148–54. http://dx.doi.org/10.17803/1994-1471.2021.126.5.148-154.
Full textEsen, M. Fevzi. "A Robust Multivariate Outlier Detection Method for Detection of Securities Fraud." International Journal of Business Analytics 7, no. 3 (July 2020): 12–29. http://dx.doi.org/10.4018/ijban.2020070102.
Full textNataraj, Geethanjali, and Ashwani. "Banking Sector Regulation in India: Overview, Challenges and Way Forward." Indian Journal of Public Administration 64, no. 3 (July 24, 2018): 473–86. http://dx.doi.org/10.1177/0019556118783065.
Full textDissertations / Theses on the topic "Prevention of fraudulent transactions"
De, Villiers Casper. "A case study to examine the use of SMS-based transactional alerts in the banking sector in South Africa." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/962.
Full textENGLISH ABSTRACT: The mobile phone has not only changed the way the world works today, but also changed the direction the world is moving toward. The mobile phone changed the face of communication and enabled more people to reach more other people than ever before. The big four banks in South Africa represent 83.5 per cent of the total asset value of all banks in South Africa. Traditionally, banking customers (or potential customers) could be reached through the current 2 786 branches, 19 451 ATMs and potentially 4.59 million internet users. There are 47.9 million mobile phone subscribers in South Africa – increasing the number of potential contact points by order of magnitude. The possibilities for banks utilising the mobile phone are endless, however online banking and offering banking services through a mobile phone is increasingly more subject to fraud attacks. Online banking and credit card fraud is still on the increase. Today, SMS is used to alert customer of movements on their bank account. This keeps the customer informed and enables them to notify their banks and prevent subsequent fraudulent transactions. SMS can be sent from one mobile phone to another (P2P) or from a computer system to a mobile phone (A2P). In 2007, 2 trillion SMS's were sent worldwide and was responsible for 75 to 80 per cent of all mobile phone revenues. South Africa sent 34 billion A2P SMS in 2009 of which 29 per cent were sent as transactional SMS by the top three banks in South Africa. SMS-based transactional alerts are SMS sent each time a change occurs in a bank account, for example, when your credit card is used then you will get an SMS on your mobile phone. Each bank makes different functionalities available. Absa reported 2 million customers receiving SMS alerts in 2008. FNB reported 67 million transactional SMS per month in 2009. The core advantages for using transactional SMS are the cost, reliability and ubiquity. Research was conducted among five of the six largest banks. Data revealed that banks send between 16 million and 69.4 million SMS per month and have approximately between 4.5 and 5.1 million customers using this service. The impact was tested through personal interviews. The two common factors were fraud reduction and customer retention. The two key challenges the banks identified are: i) Capacity/throughput with the mobile network operators; and ii) Getting internal systems and processes defined and working together for the alerts. The advantages identified are competitive positioning, customer interaction, empowerment of people and revenue. Key findings of the research were: SMS-based transactional alerts offer strategic importance; Any system is as good as it is being utilised; Security controls are extremely complex; SMS capacity is a common challenge and big risk; Internal processes cause the most complexity; Return on investment is not adequately measured; Transactional alerts is a potential revenue stream; There is no interaction between the bank and the customer; SMS in South Africa create high dependencies; SMS-based transactional alerts are successful.
Doležel, Jan. "Bariéry v komunikaci mezi vybranými úrovněmi managementu zdravotnického zařízení." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165310.
Full textKessentini, Imed. "La prévention et le règlement non juridictionnel des litiges fiscaux : contribution à l'étude des voies de prévention et règlement non juridictionnel des litiges fiscaux en droit fiscal interne." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020082.
Full textAs part of the ongoing search for the reinforcement of consent to taxation and, more broadly, to legitimize taxing authority action in general, the public authorities have created and accumulated various processes designed to prevent and resolve the amicable settlement oftax disputes in the domestic order. The aim ofthis is this thesis is the study of the roles of modes of prevention and the non-jurisdictional resolution of tax disputes following the public authorities approach which tend to reinforce the taxpayer's situation in its relationship with the tax administration. lt is specifically designed to demonstrate their contribution in the constant process that wishes to establish a relationship of trust between these actors, while revealing their limitations proved in their implementation and the major issues that will face the taxpayer who resorts to them. The first part will be dedicated to present the development of the modes of prevention and amicable resolution of tax disputes to be an expression of the movement toward improvement of the relationship between the taxpayer and the administration. The second part will deal with the limits of these procedures and the conceivable prospects for their improvement, in particular to counter their drawbacks and thereby protecting the taxpayer
Söderberg, Anna. "Internprissättning och tullvärde : Det är bättre att förekomma än att förekommas." Thesis, Linköpings universitet, Affärsrätt, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-127122.
Full textThe ‘arm’s length principle’ is fundamental to transfer pricing and cross-border intercompany transactions. The principle states that the prices charged for transactions of goods between related parties must be the same as if the parties were unrelated. Simply, the price needs to equal market values. If the Tax Authority finds the pricing to be inconsistent with the arm’s length principle, the price may be adjusted. In relation to cross-border intercompany transactions outside of the EU, companies have to pay customs duty and regard customs values. The Customs Authorities work to ensure that the price has not been influenced by the intercompany relationship. Thus, the Tax and Customs Authorities share the same goal, which is to ensure that the transaction price is consistent with market values. However, the methods of pursuing the goal differ. The Tax Authorities determine the amount of income tax based on the company’s total revenues deriving from cross-border intragroup transactions. The Customs Authorities on the contrary determine the amount of taxable income based on the value of every specific imported product. The authorities usually consider different values and assets when determining the amount of taxable income. Therefore the same transaction price may be evaluated differently by the Tax and Customs authorities. Price adjustments may be made if the transaction price is considered to differ in relation to market values. Thus, the companies may be obligated to pay tax surcharges or similar monetary penalties. The authorities’ different assessments of the same transaction price may result in difficulties for multinational enterprises in their efforts of meeting both requirements. The problem is regarded in varying degrees in different countries. In American precedent the court has determined the opportunities to be low for companies to depend on transfer pricing documentation when supporting customs value. It is important for companies to keep detailed documentation of both transfer pricing and customs valuation. The documentation serve as vital evidence when proving the compatibility of transaction prices with market values. Companies should also establish good communications with the authorities in order to prepare them for potential future price adjustments. Prevention is better than cure.
Huang, Tzu-Ting, and 黃子庭. "The Case Study of Fraudulent Crime Prevention." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xahk53.
Full text義守大學
資訊管理學系
107
We all have a responsibility in preventing incidents of fraud, however due to the fact that the lack of awareness about identity fraud is making it even easier for fraudsters to fraud succeed. Through the fraud cases reported by the police departments in 2018, this study thus used qualitative research, purposive sampling, and semi-structured interviews with the victims, as well as then provides keywords as the causes of this kind of criminal fraud. Furthermore, this study provides these keywords to the government departments as a reference for enhancing the activities of criminal fraud prevention, as well as to prevent that people would be falled into fraud in the future. This study found that fraudsters employ phone calls to contact with the victims. When the victims received messages from fraudsters disguised as civil servants of Prosecutors’ Office, Police Department or other government departments, they would easily be lured into the false situation. Therefore, according to the research results, there are four suggestions for the related government departments: 1. A comprehensive training for anti-fraud educators should be planned. 2. Complete education materials should be presented. 3. Hierarchal education and communication with the people should be expanded. 4. Promotion of the slogan “Do not act!” should be enhanced. For the people, there are also three suggestions: 1. People should activity participate in the activities of fraud prevention and pay more attention to the real fraud cases in order not to be cheated by the same tricks. 2. People should keep their personal information very well. 3. People should keep their personal properties very well. Society, government and industry all have a role in preventing fraud, and then to stop fraud rings from being active in the society.
Horne, Andrew J. "Reviewable transactions in insolvency : the recognition of creditors’ interests in "subjective" and "objective" insolvency regimes." Thesis, 1999. http://hdl.handle.net/2429/9655.
Full text"A Model Framework to Estimate the Fraud Probability of Acquiring Merchants." Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.29798.
Full textDissertation/Thesis
Doctoral Dissertation Business Administration 2015
Budhram, Trevor. "Examining the unique security features of a credit card with the aim of identifying possible fraudulent use." Diss., 2007. http://hdl.handle.net/10500/631.
Full textCriminology
M.Tech. (Forensic Investigation)
SHEU, CHING-SHIH, and 許清事. "The Cause and Prevention of Communication Financial Fraud Crime—To Instance the Investigations into the Surrogate–Related Fraudulent Crimes in Taipei County." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/52519237793088755133.
Full text國立臺北大學
犯罪學研究所
94
The Crime of Communication Financial Fraud, to be more specific it is a crime which fraudsters using all sorts of communication tools or methods to deceive different levels among the people. It is a new emerge type of crime of fraud and behavior in nowadays society. Very common characteristics of these newly emerging crimes are: fake lottery wining, get a free refund, pretend close relative asked for financial help. There’s more, acted as they were Mafia and kidnap the rich for ransom, use newspaper ads and internet to forge credit mortgage, force victim transfer money from ATM into fraudulent accounts or cell phone text message con. Those tricks are become more and more well developed from fraudsters, it penetrated into people’s life gradually. They take advantage of people’s trust toward government organizations and unfamiliarity of public offices operation procedure, by mastered human weaknesses (compassion, endeavor, fear) to lead the victims step by step into their trap without knowing. Purpose of this study: To evaluate and data analyze of numbers, types, methods, gender, occupation and educational level of crime of fraud from year 1995~2004. This study is for better understanding of the whole picture of fraud movement. Furthermore, analyzing, comparing 1504 communication financial fraud crime cases which were reported between Sep 2005 and Mar 2006, and sampling the happened、disclosed new type of communication financial fraud of the two major cases from Taipei County Government Police Bureau. Find out the causes and factors why communication financial fraud crime occurred so often. Hoping that our government can build up an effective anti-fraud technology significantly to prevent crime behavior and also provide those to the relatived organizations to fight together against the crimes. After the analysis and study of modus operandi of victims experience of deception and the fraudulency traps of suspects, to further understand the reasons of significant amount of cases of communication banking fraud and crime, modus operandi of the fraud group (ring), and how the criminals utilize the weakness of human nature; also realize why this crime and not be prevented and terminated effectively is because “the fraud phone calls, number and fraud account can not be controlled and eliminated”, and the light punishment of current law can not impede the motivations of the criminals, and no official cooperation of fighting crime between Taiwan straits. At the end, in accordance with “situational crime prevention strategy” to enhance the protection of target by design, increase the mechanisms of monitor and control, raise the risk of committing crimes, diminish the motivations of criminals, and combine all the related government agencies such as the police force, telecommunication, finance, justice together, can definitely demonstrate more effective and significant performance of the anti-fraud tasks.
Araújo, João Bosco de. "Etiologia criminal na gestão de contratos terceirizados." Master's thesis, 2017. http://hdl.handle.net/10284/6088.
Full textIn the contemporary world, economic crimes and financial fraud take on different forms, characteristics and modalities. Globalization and dynamic technological development have made sophisticated and complex crimes and frauds as they weaken internal defenses and controls because of the rapidity with which organizational changes occur and contribute to the elevation of vulnerabilities and risks in the management of outsourced contracts. Crimes and fraud committed during the term of contracts, whether private or public, show conflicts of interest, misconduct, opportunism and contempt for the ethical values made by managers who should control commercial agreements, bids, supplier selections and / or products, Revealing a predatory fraud profile. The fragile or limited capacity of the internal preventive controls and the evident manipulation of the three lines of defense in all segments and sizes of business unfortunately ratify the increase of cases of fraud and economic crimes. In this context, this research sought to identify risks inherent in the contracts and characteristics of the fraud profile responsible for annulling controls and manipulating lines of defense in contract management, establishing the causal link between criminal practice and exposure to contractual risks. Based on this purpose, specific research was carried out on the types of contracts impacted, characteristics of fraudster profiles and identification of the main protectionist measures implemented to mitigate fraud and economic contractual crimes. Finally, it is expected that this Dissertation will contribute to the awareness of entrepreneurs, managers and, especially, auditors, about the importance of disseminating to the actors involved in the management of outsourced contracts methodologies and tools related to the detection, prevention, monitoring and Risk treatment in line with specific compliance rules for the inherent contractual risks that can preserve the company’s image, protect investments, guarantee operations and business continuity.
Books on the topic "Prevention of fraudulent transactions"
Alces, Peter A. The law of fraudulent transactions. New York: Warren, Gorham & Lamont, 1989.
Find full textAlces, Peter A. The law of fraudulent transactions. 2nd ed. Eagan, MN: Thomson/West, 2002.
Find full textAssembly, Canada Legislature Legislative. Bill: An act for the prevention of fraudulent invoices. Quebec: Thompson, Hunter, 2003.
Find full textStroligo, Klaudijo, Horst Intscher, and Susan Davis-Crockwell. Suspending suspicious transactions. Washington, D.C: World Bank, 2013.
Find full textFawad, Shafi Mian, ed. A marvellous book on Law of Benami Transactions: With up to dates case law of higher courts of Pakistan and overseas. Lahore: Khyber Publishers, 2011.
Find full textAbagnale, Frank W. Abagnale's document verification and currency transactions manual. Washington, D.C: Abagnale and Associates, 1991.
Find full textJudiciary, United States Congress House Committee on the. Fraudulent Online Identity Sanctions Act: Report (to accompany H.R. 3754) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Find full textJudiciary, United States Congress House Committee on the. Fraudulent Online Identity Sanctions Act: Report (to accompany H.R. 3754) (including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Find full textVanuatu. State Law Office. Financial Intelligence Unit. Financial Transactions Reporting Act (cap. 268): Guidelines for financial institutions. Port Vila], Vanuatu: Financial Intelligence Unit, 2008.
Find full textBook chapters on the topic "Prevention of fraudulent transactions"
Belyakov, S. L., S. M. Karpov, and E. F. Zalilov. "Detecting Fraudulent Transactions Using a Machine Learning Algorithm." In Communications in Computer and Information Science, 46–55. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1480-4_4.
Full textMehta, Priya, Jithin Mathews, Sandeep Kumar, K. Suryamukhi, Ch Sobhan Babu, and S. V. Kasi Visweswara Rao. "Big Data Analytics for Nabbing Fraudulent Transactions in Taxation System." In Lecture Notes in Computer Science, 95–109. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23551-2_7.
Full textJing, Chen, Cheng Wang, and Chungang Yan. "Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features." In Financial Cryptography and Data Security, 588–604. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32101-7_34.
Full textLeve, Leslie D. "Applying Behavioral Genetics Research to Inform the Prevention of Developmental Psychopathology: Drawing from the Principles of Prevention Science." In Gene-Environment Transactions in Developmental Psychopathology, 251–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49227-8_13.
Full textZainab, Kaneez, Namrata Dhanda, and Qamar Abbas. "Analysis of Various Boosting Algorithms Used for Detection of Fraudulent Credit Card Transactions." In Information and Communication Technology for Competitive Strategies (ICTCS 2020), 1083–91. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0882-7_98.
Full textBrody, Gene H. "Using Genetically Informed Prevention Trials to Test Gene × Environment Hypotheses." In Gene-Environment Transactions in Developmental Psychopathology, 211–33. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49227-8_11.
Full textRamanujan, Ajeesh, and Blesson Andrews Varghese. "A Survey on DDoS Prevention, Detection, and Traceback in Cloud." In Transactions on Computational Science and Computational Intelligence, 69–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49500-8_7.
Full textKusy, Maciej, and Piotr A. Kowalski. "Detection of Fraudulent Credit Card Transactions by Computational Intelligence Models as a Tool in Digital Forensics." In Studies in Computational Intelligence, 205–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74970-5_24.
Full textManlangit, Sylvester, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, Mirjam Jonkman, and Arasu Balasubramaniam. "An Efficient Method for Detecting Fraudulent Transactions Using Classification Algorithms on an Anonymized Credit Card Data Set." In Advances in Intelligent Systems and Computing, 418–29. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76348-4_41.
Full textCzegledi, A., L. Scott Campbell, and D. Smiderle. "Using Cognitive Fit Theory to Evaluate the Effectiveness of Financial Information Visualization: An Example Using Data to Detect Fraudulent Transactions." In Springer Proceedings in Mathematics & Statistics, 655–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63591-6_60.
Full textConference papers on the topic "Prevention of fraudulent transactions"
Kondratev, Igor A., Vadim V. Bazanov, Daniil A. Uskov, Anna V. Kuchebo, and Tatyana E. Sereda. "Comparative Analysis of Methods for Detecting Fraudulent Transactions." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396074.
Full textJing, Chen, Cheng Wang, and Chungang Yan. "Replay Attack: A Prevalent Pattern of Fraudulent Online Transactions." In 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud) and 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, 2018. http://dx.doi.org/10.1109/cscloud/edgecom.2018.00022.
Full textSadineni, Praveen Kumar. "Detection of Fraudulent Transactions in Credit Card using Machine Learning Algorithms." In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2020. http://dx.doi.org/10.1109/i-smac49090.2020.9243545.
Full textTorres, Rodrigo Araujo Lima, and Marcelo Ladeira. "A proposal for online analysis and identification of fraudulent financial transactions." In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2020. http://dx.doi.org/10.1109/icmla51294.2020.00047.
Full textXu, Wei, and Yuan Liu. "An Optimized SVM Model for Detection of Fraudulent Online Credit Card Transactions." In 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG). IEEE, 2012. http://dx.doi.org/10.1109/icmecg.2012.39.
Full textDandash, Osama, Yiling Wang, Phu Dung Le, and Bala Srinivasan. "A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention." In Fourth International Conference on Information Technology (ITNG'07). IEEE, 2007. http://dx.doi.org/10.1109/itng.2007.12.
Full textLaveti, Ramesh Naidu, Abhay Anand Mane, and Supriya N. Pal. "Dynamic Stacked Ensemble with Entropy based Undersampling for the Detection of Fraudulent Transactions." In 2021 6th International Conference for Convergence in Technology (I2CT). IEEE, 2021. http://dx.doi.org/10.1109/i2ct51068.2021.9417896.
Full textAlanezi, Maha A., Mawra T. Homeed, Zahra S. Mohamed, and Ahmed M. Zeki. "Comparing Naïve Bayes, Decision Tree and Logistic Regression Methods in Fraudulent Credit Card Transactions." In 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI). IEEE, 2020. http://dx.doi.org/10.1109/icdabi51230.2020.9325705.
Full textPrusti, Debachudamani, Abhishek Kumar, Ingole Shubham Purusottam, and Santanu Kumar Rath. "A design methodology for web-based services to detect fraudulent transactions in credit card." In ISEC 2021: 14th Innovations in Software Engineering Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3452383.3452397.
Full textCaldeira, Evandro, Gabriel Brandao, and Adriano C. M. Pereira. "Fraud Analysis and Prevention in e-Commerce Transactions." In 2014 9th Latin American Web Congress (LA-WEB). IEEE, 2014. http://dx.doi.org/10.1109/laweb.2014.23.
Full textReports on the topic "Prevention of fraudulent transactions"
Dutra, Lauren M., Matthew C. Farrelly, Brian Bradfield, Jamie Ridenhour, and Jamie Guillory. Modeling the Probability of Fraud in Social Media in a National Cannabis Survey. RTI Press, September 2021. http://dx.doi.org/10.3768/rtipress.2021.mr.0046.2109.
Full text