Goode et al., 2011 - Google Patents
Detecting complex account fraud in the enterprise: The role of technical and non-technical controlsGoode et al., 2011
- Document ID
- 12673181311577750860
- Author
- Goode S
- Lacey D
- Publication year
- Publication venue
- Decision Support Systems
External Links
Snippet
Complex fraud, involving heightened offender knowledge of organizational processes, can be especially damaging to the firm. Much research has focused on technical, quantitative detection methods. This paper uses multidimensional scaling of empirical fraud event data …
- 238000001514 detection method 0 abstract description 49
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/042—Payment circuits characterized in that the payment protocol involves at least one cheque
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Goode et al. | Detecting complex account fraud in the enterprise: The role of technical and non-technical controls | |
Suh et al. | The effects of reducing opportunity and fraud risk factors on the occurrence of occupational fraud in financial institutions | |
Leukfeldt et al. | Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime | |
Holt et al. | Exploring stolen data markets online: products and market forces | |
Levi et al. | The implications of economic cybercrime for policing | |
Zaiss et al. | Identity threat assessment and prediction | |
National Research Council et al. | Protecting individual privacy in the struggle against terrorists: A framework for program assessment | |
Ahmad et al. | The impact of digitalization on occupational fraud opportunity in telecommunication industry: a strategic review | |
Murthy et al. | Does openness increase vulnerability to digital frauds? Observing social media digital footprints to analyse risk and legal factors for banks | |
Jian et al. | Organized cyber-racketeering: Exploring the role of internet technology in organized cybercrime syndicates using a grounded theory approach | |
Hu et al. | Do commonly recommended preventive actions deter identity theft victimization? Findings from NCVS identity theft surveys | |
Marjanov et al. | SoK: Digging into the Digital Underworld of Stolen Data Markets | |
Bekkers et al. | Police Investigations Into Financial-Economic Cybercriminal Networks: The Experiences and Perceptions of Dutch Law Enforcement | |
Gombár | Analysis of respondents' opinions and attitudes toward the security of payment systems | |
Archer et al. | Identity theft and fraud: Evaluating and managing risk | |
Rightley et al. | Revisiting the Computer Crime Index-Revised (CCI-R): Assessing Individual Differences and Cyber-deviant Behavior Two Decades Later | |
Indriyani et al. | Truecaller's Spam Call and SMS Blocking Solution for Surveillance on Social Media | |
Zeng et al. | Organizational and organized cybercrime | |
Vanhee et al. | Individual residence and identity theft: how residential characteristics shape exposure and risk of offline and online identity theft victimization | |
Cole et al. | Do offenders [fraudsters]‘collaborate and listen’? A quantitative analysis of fraudsters’ decision-making processes on active cybercrime marketplaces | |
van Hardeveld et al. | Expert perspectives on the evolution of carders, cryptomarkets and operational security | |
Bekee et al. | Intelligent agent-based fraud detection and Prevention model for financial Institutions | |
Routh | The potential of technological innovation to reduce fraud and increase trust in the Indian banking system | |
Jamieson et al. | Developing a Conceptual Framework for Identity Fraud Profiling. | |
Ochuko | E-banking operational risk assessment. A soft computing approach in the context of the Nigerian banking industry. |