CINXE.COM

Search results for: terrorist fraud

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: terrorist fraud</title> <meta name="description" content="Search results for: terrorist fraud"> <meta name="keywords" content="terrorist fraud"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="terrorist fraud" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="terrorist fraud"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 367</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: terrorist fraud</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">367</span> Practical Limitations of the Fraud Triangle Framework in Fraud Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alexander%20Glebovskiy">Alexander Glebovskiy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Practitioners charged with fraud prevention and investigation strongly rely on the Fraud Triangle framework developed by Joseph T. Wells in 1997 while analyzing the causes of fraud at business organizations. The Fraud Triangle model explains fraud by elements such as pressure, opportunity, and rationalization. This view is not fully suitable for effective fraud prevention as the Fraud Triangle model provides limited insight into the causation of fraud. Fraud is a multifaceted phenomenon, the contextual factors of which may not fit into any framework. Employee criminal behavior in business organizations is influenced by environmental, individual, and organizational aspects. Therefore, further criminogenic factors and processes facilitating fraud in organizational settings need to be considered in the root-cause analysis: organizational culture, leadership style, groupthink effect, isomorphic behavior, crime of obedience, displacement of responsibility, lack of critical thinking and unquestioning conformity and loyalty. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminogenesis" title="criminogenesis">criminogenesis</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20triangle" title=" fraud triangle"> fraud triangle</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20prevention" title=" fraud prevention"> fraud prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20culture" title=" organizational culture"> organizational culture</a> </p> <a href="https://publications.waset.org/abstracts/117811/practical-limitations-of-the-fraud-triangle-framework-in-fraud-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">300</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">366</span> Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamel%20Miri">Jamel Miri</a>, <a href="https://publications.waset.org/abstracts/search?q=Bechir%20Nsiri"> Bechir Nsiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ridha%20Bouallegue"> Ridha Bouallegue</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distance%20bounding" title="distance bounding">distance bounding</a>, <a href="https://publications.waset.org/abstracts/search?q=mapping%20code%20ultrawideband" title=" mapping code ultrawideband"> mapping code ultrawideband</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud" title=" terrorist fraud"> terrorist fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20layer%20technology" title=" physical layer technology"> physical layer technology</a> </p> <a href="https://publications.waset.org/abstracts/72772/secure-distance-bounding-protocol-on-ultra-wideband-based-mapping-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72772.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">365</span> Confusion on the Definition of Terrorism and Difficulty in Criminalizing Terrorist Financing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hamed%20Tofangsaz">Hamed Tofangsaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the absence of an internationally agreed definition of terrorism, the question which needs to be posed is whether there is a clear and common understanding of what constitutes terrorism, terrorist acts and terrorist groups, the financing of which needs to be stopped. That is, from a criminal law perspective, whether the Terrorist Financing Convention, as the backbone of the counter-terrorist financing regime, clarifies what types of conduct, by who, in what circumstances and when, against whom (targets or victims) and with what intention or motivation should be considered terrorism? It will be explained how and why it has been difficult to reach an agreement on the definition of terrorism. The endeavour of the drafters of the Terrorist Financing Convention and others involved in countering terrorist financing to establish a general definition of terrorism will be examined. The record of attempts to define the elements of terrorism proves that it is hardly possible to reach an agreement on a generic definition of terrorism because the concept of terrorism is elusive and subject to various understandings. Even the definition provided by the Terrorist Financing Convention, is not convincing. With regard to the findings, this paper calls for further research on the legal consequences of the implementation of the terrorist financing-counter measures while the scope of terrorism, terrorist acts and terrorist organizations have been left vague. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20financing" title=" terrorist financing"> terrorist financing</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=convention" title=" convention"> convention</a> </p> <a href="https://publications.waset.org/abstracts/22409/confusion-on-the-definition-of-terrorism-and-difficulty-in-criminalizing-terrorist-financing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22409.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">568</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">364</span> Detecting Model Financial Statement Fraud by Auditor Industry Specialization with Fraud Triangle Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reskino%20Resky">Reskino Resky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research purposes to create a model to detecting financial statement fraud. This research examines the variable of fraud triangle and auditor industry specialization with financial statement fraud. This research used sample of company which is listed in Indonesian Stock Exchange that have sanctions and cases by Financial Services Authority in 2011-2013. The number of company that were became in this research were 30 fraud company and 30 non-fraud company. The method of determining the sample is by using purposive sampling method with judgement sampling, while the data processing methods used by researcher are mann-whitney u and discriminants analysis. This research have two from five variable that can be process with discriminant analysis. The result shows the financial targets can be detect financial statement fraud, while financial stability can’t be detect financial statement fraud. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fraud%20triangle%20analysis" title="fraud triangle analysis">fraud triangle analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20targets" title=" financial targets"> financial targets</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20stability" title=" financial stability"> financial stability</a>, <a href="https://publications.waset.org/abstracts/search?q=auditor%20industry%20specialization" title=" auditor industry specialization"> auditor industry specialization</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20statement%20fraud" title=" financial statement fraud "> financial statement fraud </a> </p> <a href="https://publications.waset.org/abstracts/27587/detecting-model-financial-statement-fraud-by-auditor-industry-specialization-with-fraud-triangle-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27587.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">363</span> Computer Fraud from the Perspective of Iran&#039;s Law and International Documents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Babak%20Pourghahramani">Babak Pourghahramani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fraud" title="fraud">fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20fraud" title=" cyber fraud"> cyber fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20fraud" title=" computer fraud"> computer fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=classic%20fraud" title=" classic fraud"> classic fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20crime" title=" computer crime"> computer crime</a> </p> <a href="https://publications.waset.org/abstracts/72041/computer-fraud-from-the-perspective-of-irans-law-and-international-documents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">362</span> Insider Fraud and its Risks to FinTechs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claire%20Maillet">Claire Maillet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Insider fraud, including its various forms such as employee fraud or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective or past employer. ‘Employee’ covers anyone employed by the company, including contractors, agency workers, directors and part time staff. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic and the cost-of-living crisis, which have generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime; Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud. Given that the number of FinTechs is on the rise and there is a significant lack of empirically based solutions for reducing insider fraud, these are gaps in the research space that this thesis aims to fill. Finally, Kassem (2022) notes that “academic research plays a crucial role in raising awareness about fraud and researching effective methods for countering it”. Thus, this thesis may be used as an opportune tool to provide an extensive list of controls spanning detection, deterrence and prevention, that are recommended to be implemented to help combat the insider threat. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insider%20fraud" title="insider fraud">insider fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20fraud" title=" internal fraud"> internal fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=Covid-19" title=" Covid-19"> Covid-19</a> </p> <a href="https://publications.waset.org/abstracts/190043/insider-fraud-and-its-risks-to-fintechs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190043.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">22</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">361</span> An Investigation into Fraud Detection in Financial Reporting Using Sugeno Fuzzy Classification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Sarchami">Mohammad Sarchami</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohsen%20Zeinalkhani"> Mohsen Zeinalkhani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Always, financial reporting system faces some problems to win public ear. The increase in the number of fraud and representation, often combined with the bankruptcy of large companies, has raised concerns about the quality of financial statements. So, investors, legislators, managers, and auditors have focused on significant fraud detection or prevention in financial statements. This article aims to investigate the Sugeno fuzzy classification to consider fraud detection in financial reporting of accepted firms by Tehran stock exchange. The hypothesis is: Sugeno fuzzy classification may detect fraud in financial reporting by financial ratio. Hypothesis was tested using Matlab software. Accuracy average was 81/80 in Sugeno fuzzy classification; so the hypothesis was confirmed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fraud" title="fraud">fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20reporting" title=" financial reporting"> financial reporting</a>, <a href="https://publications.waset.org/abstracts/search?q=Sugeno%20fuzzy%20classification" title=" Sugeno fuzzy classification"> Sugeno fuzzy classification</a>, <a href="https://publications.waset.org/abstracts/search?q=firm" title=" firm"> firm</a> </p> <a href="https://publications.waset.org/abstracts/82712/an-investigation-into-fraud-detection-in-financial-reporting-using-sugeno-fuzzy-classification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82712.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">248</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">360</span> A Study of Management Principles Incorporating Corporate Governance and Advocating Ethics to Reduce Fraud at a South African Bank</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roshan%20Jelal">Roshan Jelal</a>, <a href="https://publications.waset.org/abstracts/search?q=Charles%20Mbohwa"> Charles Mbohwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s world, internal fraud remains one of the most challenging problems within companies worldwide and despite investment in controls and attention given to the problem, the instances of internal fraud has not abated. To the contrary it appears that internal fraud is on the rise especially in the wake of the economic downturn. Leadership within companies believes that the more sophisticated the controls employed the less likely it would be for employees to pilfer. This is a very antiquated view as investment in controls may not be enough to curtail internal fraud; however, ensuring that a company drives the correct culture and behaviour within the organisation is likely to yield desired results. This research aims to understand how creating a strong ethical culture and embedding the principle of good corporate governance impacts on levels of internal fraud with an organization (a South African Bank). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internal%20fraud" title="internal fraud">internal fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=reserve%20bank" title=" reserve bank"> reserve bank</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20King%20Code" title=" the King Code "> the King Code </a> </p> <a href="https://publications.waset.org/abstracts/4044/a-study-of-management-principles-incorporating-corporate-governance-and-advocating-ethics-to-reduce-fraud-at-a-south-african-bank" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">416</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">359</span> An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claire%20Norman-Maillet">Claire Norman-Maillet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insider%20fraud" title="insider fraud">insider fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=occupational%20fraud" title=" occupational fraud"> occupational fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID" title=" COVID"> COVID</a>, <a href="https://publications.waset.org/abstracts/search?q=coronavirus" title=" coronavirus"> coronavirus</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20fraud" title=" internal fraud"> internal fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20crime" title=" financial crime"> financial crime</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20crime" title=" economic crime"> economic crime</a> </p> <a href="https://publications.waset.org/abstracts/174096/an-exploration-of-why-insider-fraud-is-the-biggest-threat-to-your-business" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174096.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">358</span> A Study on How Insider Fraud Impacts FinTechs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claire%20Norman-Maillet">Claire Norman-Maillet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insider%20fraud" title="insider fraud">insider fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=occupational%20fraud" title=" occupational fraud"> occupational fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID" title=" COVID"> COVID</a>, <a href="https://publications.waset.org/abstracts/search?q=Coronavirus" title=" Coronavirus"> Coronavirus</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20fraud" title=" internal fraud"> internal fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20crime" title=" financial crime"> financial crime</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20crime" title=" economic crime"> economic crime</a> </p> <a href="https://publications.waset.org/abstracts/174098/a-study-on-how-insider-fraud-impacts-fintechs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174098.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">357</span> An Assessment of the Extent and Impact of Motor Insurance Fraud Claims in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olatokunbo%20Shoyemi">Olatokunbo Shoyemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mario%20Brito"> Mario Brito</a>, <a href="https://publications.waset.org/abstracts/search?q=Ian%20Dawson"> Ian Dawson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent times, the Nigerian motor insurers have experienced high volume of motor insurance claim pay-outs and insignificant contribution to the net premium income of the Nigerian insurance market, which has been a major concern for the shareholders/stakeholders. It has been argued that there are many factors that have brought about these concerns. However, anecdotal evidence (ongoing debates among industry practitioners) suggests prevalence of fraud due to poor practices in motor insurance business in Nigeria. This study is therefore aimed to carry out an assessment of fraud in motor insurance claims as perceived by experts in the Nigerian insurance market. This study adopted a descriptive research design, and the analysis was built on a survey among insurance experts in Nigeria using a designed questionnaire. A purposive and snowball sampling were used to select our sample (N = 120) - representing a selection of all professionally qualified insurance experts in Nigeria insurance industry. The study found that Nigerian insurance experts (i) largely agree that there is a problematic level of fraud in the Nigerian motor insurance industry; (ii) perceive soft fraud to be about 3 times more common than hard fraud in the Nigerian motor insurance industry, and (iii) strongly agree there are problematic impacts from fraud on the solvency of the Nigerian motor insurers. This paper has provided an empirical understanding of the existence, extent, and impact of fraud risks within the Nigerian insurance market based on expert knowledge and insights rather than, as has often been the case, a reliance on individual anecdotes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=claims" title="claims">claims</a>, <a href="https://publications.waset.org/abstracts/search?q=net%20premium%20income" title=" net premium income"> net premium income</a>, <a href="https://publications.waset.org/abstracts/search?q=motor%20insurance" title=" motor insurance"> motor insurance</a>, <a href="https://publications.waset.org/abstracts/search?q=soft%20fraud" title=" soft fraud"> soft fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20fraud" title=" hard fraud"> hard fraud</a> </p> <a href="https://publications.waset.org/abstracts/148212/an-assessment-of-the-extent-and-impact-of-motor-insurance-fraud-claims-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">356</span> Terrorism: A Threat in Constant Evolution Still Misunderstood</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20J.%20Gazapo%20Lapayese">M. J. Gazapo Lapayese </a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=responses" title="responses">responses</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/29879/terrorism-a-threat-in-constant-evolution-still-misunderstood" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29879.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">453</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">355</span> Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avinash%20Malladhi">Avinash Malladhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AI" title="AI">AI</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting%20%26%20fraud%20detection" title=" forensic accounting &amp; fraud detection"> forensic accounting &amp; fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=anti%20money%20laundering" title=" anti money laundering"> anti money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=Benford%27s%20law" title=" Benford&#039;s law"> Benford&#039;s law</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20triangle%20theory" title=" fraud triangle theory"> fraud triangle theory</a> </p> <a href="https://publications.waset.org/abstracts/165809/harnessing-artificial-intelligence-and-machine-learning-for-advanced-fraud-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165809.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">354</span> Sonic Therapeutic Intervention for Preventing Financial Fraud: A Phenomenological Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vasudev%20Das">Vasudev Das</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a global survey of more than 5,000 participants in 99 territories, PwC found a loss of $42 billion through fraud in the last 24 months. The specific problem is that private and public organizational leaders often do not understand the importance of sonic therapeutic intervention in preventing financial fraud. The study aimed to explore sonic therapeutic intervention practitioners' lived experiences regarding the value of sonic therapeutic intervention in preventing financial fraud. The data collection methods were semi-structured interviews of purposeful samples and documentary reviews, which were analyzed thematically. Four themes emerged from the analysis of interview transcription data: Sonic therapeutic intervention enabled self-control, pro-spiritual values, consequentiality mindset, and post-conventional consciousness. The itemized four themes helped non-engagement in financial fraud. Implications for positive social change include enhanced financial fraud management, more significant financial leadership, and result-oriented decision-taking in the financial market. Also, the study results can improve the increased de-escalation of anxiety/stress associated with defrauding. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consciousness" title="consciousness">consciousness</a>, <a href="https://publications.waset.org/abstracts/search?q=consequentiality" title=" consequentiality"> consequentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=rehabilitation" title=" rehabilitation"> rehabilitation</a>, <a href="https://publications.waset.org/abstracts/search?q=reintegration" title=" reintegration"> reintegration</a> </p> <a href="https://publications.waset.org/abstracts/136308/sonic-therapeutic-intervention-for-preventing-financial-fraud-a-phenomenological-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136308.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">353</span> The Value of Online News: Addressing the Problem of Online Investment Fraud Crimes in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thapthep%20Paprach">Thapthep Paprach</a>, <a href="https://publications.waset.org/abstracts/search?q=Benya%20Lertsuwan"> Benya Lertsuwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Investment fraud is not a new criminal, but there are still more victims during the Internet of Things era. This kind of criminal has been classified as a national and transnational financial crime problem all over the world. In Thailand, the country has also been attacked by this kind of crime. This research concerns whether the mass media that is supposed to cover news about online investment scams realized and warned Thais about this crime. Thus, this study explores the value of news about investment fraud in terms of frequency. The methodology uses web crawling from the top 5 news agency websites that have the most access. We pull out all information reporting about investment fraud. The findings revealed that the ‘Khaosod’ news agency was the first rank in reporting on investment crime. On the other hand, ‘Matichon’ was the least reported. Thairat news agencies frequently reported such criminals from midnight to very early in the morning, while other news agencies reported during the daytime. The results between the frequency of news reporting about investment fraud and the monthly number of victim reports are not correlated. Although the most cases reported to Thai police were in February 2023, but the most news reported was in January 2023. In conclusion, there might be a negative correlation between the amount of investment fraud news reported and the number of victims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=investment%20fraud" title="investment fraud">investment fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20value" title=" news value"> news value</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20news%20report" title=" online news report"> online news report</a>, <a href="https://publications.waset.org/abstracts/search?q=Ponzi%20schemes" title=" Ponzi schemes"> Ponzi schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=Romance%20scam" title=" Romance scam"> Romance scam</a> </p> <a href="https://publications.waset.org/abstracts/170639/the-value-of-online-news-addressing-the-problem-of-online-investment-fraud-crimes-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">352</span> The Importance of Information in Psychological Operations for Counterterrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abbas%20Fazelinia">Abbas Fazelinia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is not a new phenomenon to the world, yet it remains difficult to define and to counter. Countering terrorism requires several measures that must be taken at the same time. Counterterrorism strategies of most countries depend on military measures. However, those strategies should also focus on nonlethal measures, such as economic, political, and social measures. The psychological dimensions of terrorism must be understood, evaluated, and used in countering terrorism. This study suggests that psychological operations, as nonlethal military operations, can be used to influence individuals not to join terrorist organizations and to facilitate defections from terrorist organizations. However, in order to implement effective psychological operations, one has to have appropriate intelligence about terrorist organizations. Examining terrorist organizations help us to identify their vulnerabilities and obtain this intelligence. This article concludes that terrorists’ motivations, terrorist organizations’ radicalization, recruitment, and conversion processes, ideology, goals, strategies, and general structure form the intelligence requirement for psychological operations in counterterrorism. The methodology used in this article is a mixed method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20operations" title="psychological operations">psychological operations</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist" title=" terrorist"> terrorist</a>, <a href="https://publications.waset.org/abstracts/search?q=counterterrorism" title=" counterterrorism"> counterterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/48243/the-importance-of-information-in-psychological-operations-for-counterterrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48243.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">351</span> &#039;Propaganda by the Deed&#039;, &#039;Armed Propaganda&#039; and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ersun%20N.%20Kurtulus">Ersun N. Kurtulus</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=repression" title=" repression"> repression</a>, <a href="https://publications.waset.org/abstracts/search?q=radical%20left" title=" radical left"> radical left</a>, <a href="https://publications.waset.org/abstracts/search?q=mobilization%20of%20masses" title=" mobilization of masses"> mobilization of masses</a> </p> <a href="https://publications.waset.org/abstracts/86297/propaganda-by-the-deed-armed-propaganda-and-mass-mobilization-the-missing-link-in-the-left-wing-terrorist-thinking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86297.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">225</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">350</span> The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jinming%20Ma">Jinming Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Tianbing%20Xia"> Tianbing Xia</a>, <a href="https://publications.waset.org/abstracts/search?q=Janusz%20Getta"> Janusz Getta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20internet" title="mobile internet">mobile internet</a>, <a href="https://publications.waset.org/abstracts/search?q=advertisement" title=" advertisement"> advertisement</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-fraud" title=" anti-fraud"> anti-fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20set%20theory" title=" fuzzy set theory"> fuzzy set theory</a> </p> <a href="https://publications.waset.org/abstracts/135225/the-application-of-fuzzy-set-theory-to-mobile-internet-advertisement-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135225.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">349</span> The Role of Information and Communication Technology in Curbing Electoral Malpractices in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fred%20Fudah%20Moveh">Fred Fudah Moveh</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Abba%20Jallo"> Muhammad Abba Jallo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electoral fraud remains a persistent threat to democracy in Nigeria, undermining public trust and stalling political development. This study explores the role of Information and Communication Technology (ICT) in curbing electoral fraud, focusing on its application in recent Nigerian elections. The paper identifies the main forms of electoral fraud, evaluates the effectiveness of ICT-based interventions like the Permanent Voter Card (PVC) and the Bi-modal Voter Accreditation System (BVAS), and discusses challenges such as poor infrastructure, voter intimidation, and legal inadequacies. Data was collected through structured questionnaires and interviews and analyzed using SPSS software. Results reveal that while ICT has mitigated some forms of fraud, systemic issues continue to hinder its full potential. The study concludes with recommendations for enhancing the application of ICT in Nigeria’s electoral process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ICT" title="ICT">ICT</a>, <a href="https://publications.waset.org/abstracts/search?q=electoral%20fraud" title=" electoral fraud"> electoral fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=election%20process" title=" election process"> election process</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20instability" title=" political instability"> political instability</a> </p> <a href="https://publications.waset.org/abstracts/192207/the-role-of-information-and-communication-technology-in-curbing-electoral-malpractices-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192207.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">26</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">348</span> AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shanshan%20Zhu">Shanshan Zhu</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Nasim"> Mohammad Nasim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AI-driven%20fraud%20detection" title="AI-driven fraud detection">AI-driven fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20security" title=" financial security"> financial security</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection" title=" anomaly detection"> anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20fraud%20detection" title=" real-time fraud detection"> real-time fraud detection</a> </p> <a href="https://publications.waset.org/abstracts/189032/ai-powered-models-for-real-time-fraud-detection-in-financial-transactions-to-improve-financial-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189032.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">42</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">347</span> Surprise Fraudsters Before They Surprise You: A South African Telecommunications Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anson%C3%A9%20Human">Ansoné Human</a>, <a href="https://publications.waset.org/abstracts/search?q=Nantes%20Kirsten"> Nantes Kirsten</a>, <a href="https://publications.waset.org/abstracts/search?q=Tanja%20Verster"> Tanja Verster</a>, <a href="https://publications.waset.org/abstracts/search?q=Willem%20D.%20Schutte"> Willem D. Schutte</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every year the telecommunications industry suffers huge losses due to fraud. Mobile fraud, or generally, telecommunications fraud is the utilisation of telecommunication products or services to acquire money illegally from or failing to pay a telecommunication company. A South African telecommunication operator developed two internal fraud scorecards to mitigate future risks of application fraud events. The scorecards aim to predict the likelihood of an application being fraudulent and surprise fraudsters before they surprise the telecommunication operator by identifying fraud at the time of application. The scorecards are utilised in the vetting process to evaluate the applicant in terms of the fraud risk the applicant would present to the telecommunication operator. Telecommunication providers can utilise these scorecards to profile customers, as well as isolate fraudulent and/or high-risk applicants. We provide the complete methodology utilised in the development of the scorecards. Furthermore, a Determination and Discrimination (DD) ratio is provided in the methodology to select the most influential variables from a group of related variables. Throughout the development of these scorecards, the following was revealed regarding fraudulent cases and fraudster behaviour within the telecommunications industry: Fraudsters typically target high-value handsets. Furthermore, debit order dates scheduled for the end of the month have the highest fraud probability. The fraudsters target specific stores. Applicants who acquire an expensive package and receive a medium-income, as well as applicants who obtain an expensive package and receive a high income, have higher fraud percentages. If one month prior to application, the status of an account is already in arrears (two months or more), the applicant has a high probability of fraud. The applicants with the highest average spend on calls have a higher probability of fraud. If the amount collected changes from month to month, the likelihood of fraud is higher. Lastly, young and middle-aged applicants have an increased probability of being targeted by fraudsters than other ages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application%20fraud%20scorecard" title="application fraud scorecard">application fraud scorecard</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20modeling" title=" predictive modeling"> predictive modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=regression" title=" regression"> regression</a>, <a href="https://publications.waset.org/abstracts/search?q=telecommunications" title=" telecommunications"> telecommunications</a> </p> <a href="https://publications.waset.org/abstracts/148124/surprise-fraudsters-before-they-surprise-you-a-south-african-telecommunications-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">346</span> Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hilya%20Mudrika%20Arini">Hilya Mudrika Arini</a>, <a href="https://publications.waset.org/abstracts/search?q=Nur%20Aini%20Masruroh"> Nur Aini Masruroh</a>, <a href="https://publications.waset.org/abstracts/search?q=Budi%20Hartono"> Budi Hartono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20network" title="Bayesian network">Bayesian network</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20analysis" title=" decision analysis"> decision analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security%20system" title=" national security system"> national security system</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20mining" title=" text mining"> text mining</a> </p> <a href="https://publications.waset.org/abstracts/1453/development-of-terrorist-threat-prediction-model-in-indonesia-by-using-bayesian-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">345</span> Advanced Machine Learning Algorithm for Credit Card Fraud Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Kaur">Manpreet Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automated%20fraud%20detection" title="automated fraud detection">automated fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=isolation%20forest%20method" title=" isolation forest method"> isolation forest method</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20outlier%20factor" title=" local outlier factor"> local outlier factor</a>, <a href="https://publications.waset.org/abstracts/search?q=ML%20algorithm" title=" ML algorithm"> ML algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=credit%20card" title=" credit card"> credit card</a> </p> <a href="https://publications.waset.org/abstracts/167417/advanced-machine-learning-algorithm-for-credit-card-fraud-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167417.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">344</span> Customer Experiences and Perspectives on Mobile Money Service Fraud: A Case Study of the University of Education, Winneba</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mavis%20Ofosuah%20Asante">Mavis Ofosuah Asante</a>, <a href="https://publications.waset.org/abstracts/search?q=Abena%20Abokoma%20Asemanyi"> Abena Abokoma Asemanyi</a>, <a href="https://publications.waset.org/abstracts/search?q=Belinda%20Osei-mensah"> Belinda Osei-mensah</a>, <a href="https://publications.waset.org/abstracts/search?q=Stephen%20Osei%20Akyiaw"> Stephen Osei Akyiaw</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study examined mobile money service fraud experiences and perspectives on control practices at University of Education, Winneba. The objectives of the study included to examine the forms of MoMo fraud strategies experienced by customers of MoMo on UEW Campus, to examine and classify the main perpetrators of the MoMo fraud among UEW students as well as the framework for fraud detection put together by the Telco’s and consumers on UEW Campus. The study adopted the case study research design. The purposive sampling technique was used to select the UEW Campus. Using the convenience sampling technique, five respondents were sampled for the study. The outcome of the in-depth interviews conducted revealed Mobile money fraud was committed in various forms, such as anonymous calls and text messages from scammers, fraudsters calling to deceive subscribers that they are to deliver goods from abroad or from a close relative under false pretexts. Finally, fraudsters sending false cash-out messages to merchants for authorization of which the physical cash is issued by the merchant to the fraudster without the equivalent e-cash. Mobile money fraud has been perpetuated in diverse forms such as mobile money network systems fraud, false promotion fraud, and reversal of erroneous transactions, fortuitous scams, and mobile money agents' fraud. Finally, the frameworks that have been used to detect mobile money fraud include the display of national identifies cards for the transaction, digital identification systems, the use of firewall to protect mobile money accounts, effective information technology architecture for mobile money services, reporting of mobile money fraud to telecoms and the sanctioning of mobile money fraudsters. The study suggested there should be public education and awareness creation on the activities of mobile money fraudsters in Ghana by telecommunication companies in conjunction with the National Communications Authority and the Bank of Ghana. The study, therefore, concluded that the menace of mobile money fraud threatens the integrity of the mobile money financial services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20money" title="mobile money">mobile money</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud" title=" fraud"> fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=telecommunication" title=" telecommunication"> telecommunication</a>, <a href="https://publications.waset.org/abstracts/search?q=merchant" title=" merchant"> merchant</a> </p> <a href="https://publications.waset.org/abstracts/172229/customer-experiences-and-perspectives-on-mobile-money-service-fraud-a-case-study-of-the-university-of-education-winneba" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172229.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">79</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">343</span> Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saima%20Nazir">Saima Nazir</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustansar%20Ali%20Ghazanfar"> Mustansar Ali Ghazanfar</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanay%20Muhammad%20Umar%20Saeed"> Sanay Muhammad Umar Saeed</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Awais%20Azam"> Muhammad Awais Azam</a>, <a href="https://publications.waset.org/abstracts/search?q=Saad%20Ali%20Alahmari"> Saad Ali Alahmari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=counter%20terrorism" title=" counter terrorism"> counter terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=SVM" title=" SVM"> SVM</a> </p> <a href="https://publications.waset.org/abstracts/59817/data-analysis-to-uncover-terrorist-attacks-using-data-mining-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59817.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">342</span> The Fight against Terrorist Radicalization: A French Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Julia%20Burchett">Julia Burchett</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20law" title="criminal law">criminal law</a>, <a href="https://publications.waset.org/abstracts/search?q=France" title=" France"> France</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamental%20freedoms" title=" fundamental freedoms"> fundamental freedoms</a>, <a href="https://publications.waset.org/abstracts/search?q=radicalization" title=" radicalization"> radicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a> </p> <a href="https://publications.waset.org/abstracts/74451/the-fight-against-terrorist-radicalization-a-french-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74451.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">430</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">341</span> A Comparative Study on Occupational Fraud and Prosecution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michelle%20Odudu">Michelle Odudu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ghana and Nigeria are known for their high levels of Occupational Fraud in public offices. The governments of both countries have emphasised their commitment to reducing the losses caused to the state by pledging their allegiance to the counter-fraud agencies to help tackle Occupational Fraud. Yet it seems that the prosecution of such cases is ineffective as high-profile fraudsters can operate with immunity and their cases remain unprosecuted. This research project was based on in-depth examinations of 50 occupational fraud cases involving high-profile individuals in both countries. In doing so, it established the characteristics of those who were prosecuted; the extent to which prosecutions were effectively managed; the barriers to effective prosecutions; and the similarities or differences between the occurrences in both countries. The aim of the project is to examine the practice of and barriers to prosecution of large-scale occupational fraud of those in senior public positions in Ghana and Nigeria. The study drew on the experiences of stakeholders such as defence and prosecution barristers, academics, and fraud analysts via semi-structured interviews and questionnaires. 13 interviews were conducted in Ghana and in Nigeria, where respondents were recruited using a snowball approach. Questionnaires were physically distributed: 20 of the staff at EOCO and 10 to NGO staff in Ghana; 6 and 5 came back, respectively. The empirical data collected suggests that there is no lack of will on the agencies’ part to at least commence proceedings. However, various impediments hamper a successful completion of prosecution. Challenges were more evident in Nigeria, where agencies are less effective at retrieving stolen assets and changing social norms. This is further compounded by several cultural and political factors, which create limitations leaving many cases ‘still pending’. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative" title="comparative">comparative</a>, <a href="https://publications.waset.org/abstracts/search?q=prosecution" title=" prosecution"> prosecution</a>, <a href="https://publications.waset.org/abstracts/search?q=punishment" title=" punishment"> punishment</a>, <a href="https://publications.waset.org/abstracts/search?q=international" title=" international"> international</a>, <a href="https://publications.waset.org/abstracts/search?q=whitecollar" title=" whitecollar"> whitecollar</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud" title=" fraud"> fraud</a> </p> <a href="https://publications.waset.org/abstracts/153285/a-comparative-study-on-occupational-fraud-and-prosecution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153285.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">340</span> Impact of Internal Control on Fraud Detection and Prevention: A Survey of Selected Organisations in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amos%20Olusola%20Akinola">Amos Olusola Akinola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to evaluate the internal control system on fraud prevention in Nigerian business organizations. A survey research was undertaken in five organizations from the banking and manufacturing sectors in Nigeria using the simple random sampling technique and primary data was obtained with the aid structured questionnaire drawn on five likert’s scale. Four Hypotheses were formulated and tested using the T-test Statistics, Correlation and Regression Analysis at 95% confidence interval. It was discovered that internal control has a significant positive relationship with fraud prevention and that a weak internal control system permits fraudulent activities among staff. Based on the findings, it was recommended that organizations should continually and methodically review and evaluate the components of its internal control system whether activities are working as planned or not and that every organization should have pre-determined guidelines for conducting its operations and ensures compliance with these set guidelines while proactive steps should be taken to establish the independence of the internal audit by making the audit reportable to the governing council of an organization and not the chief executive officer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internal%20control" title="internal control">internal control</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20system" title=" internal system"> internal system</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20audit" title=" internal audit"> internal audit</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20prevention" title=" fraud prevention"> fraud prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20detection" title=" fraud detection"> fraud detection</a> </p> <a href="https://publications.waset.org/abstracts/40751/impact-of-internal-control-on-fraud-detection-and-prevention-a-survey-of-selected-organisations-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">339</span> Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neha%20Ahirwar">Neha Ahirwar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=efficient%20credit%20card%20fraud%20detection" title="efficient credit card fraud detection">efficient credit card fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression" title=" logistic regression"> logistic regression</a>, <a href="https://publications.waset.org/abstracts/search?q=XGBoost" title=" XGBoost"> XGBoost</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20tree" title=" decision tree"> decision tree</a> </p> <a href="https://publications.waset.org/abstracts/179778/efficient-credit-card-fraud-detection-based-on-multiple-ml-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179778.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">338</span> Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Papathanasiou%20Anastasios">Papathanasiou Anastasios</a>, <a href="https://publications.waset.org/abstracts/search?q=Liontos%20George"> Liontos George</a>, <a href="https://publications.waset.org/abstracts/search?q=Liagkou%20Vasiliki"> Liagkou Vasiliki</a>, <a href="https://publications.waset.org/abstracts/search?q=Glavas%20Euripides"> Glavas Euripides</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20email%20compromise" title="business email compromise">business email compromise</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20legislation" title=" European legislation"> European legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=investment%20fraud" title=" investment fraud"> investment fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=NIS" title=" NIS"> NIS</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20sales%20fraud" title=" online sales fraud"> online sales fraud</a>, <a href="https://publications.waset.org/abstracts/search?q=romance%20scams" title=" romance scams"> romance scams</a> </p> <a href="https://publications.waset.org/abstracts/170347/cyberfraud-schemes-modus-operandi-tools-and-techniques-and-the-role-of-european-legislation-as-a-defense-strategy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170347.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=12">12</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=13">13</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=terrorist%20fraud&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10