[go: up one dir, main page]

Goode et al., 2011 - Google Patents

Detecting complex account fraud in the enterprise: The role of technical and non-technical controls

Goode et al., 2011

Document ID
12673181311577750860
Author
Goode S
Lacey D
Publication year
Publication venue
Decision Support Systems

External Links

Snippet

Complex fraud, involving heightened offender knowledge of organizational processes, can be especially damaging to the firm. Much research has focused on technical, quantitative detection methods. This paper uses multidimensional scaling of empirical fraud event data …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/042Payment circuits characterized in that the payment protocol involves at least one cheque

Similar Documents

Publication Publication Date Title
Goode et al. Detecting complex account fraud in the enterprise: The role of technical and non-technical controls
Suh et al. The effects of reducing opportunity and fraud risk factors on the occurrence of occupational fraud in financial institutions
Leukfeldt et al. Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime
Holt et al. Exploring stolen data markets online: products and market forces
Levi et al. The implications of economic cybercrime for policing
Zaiss et al. Identity threat assessment and prediction
National Research Council et al. Protecting individual privacy in the struggle against terrorists: A framework for program assessment
Ahmad et al. The impact of digitalization on occupational fraud opportunity in telecommunication industry: a strategic review
Murthy et al. Does openness increase vulnerability to digital frauds? Observing social media digital footprints to analyse risk and legal factors for banks
Jian et al. Organized cyber-racketeering: Exploring the role of internet technology in organized cybercrime syndicates using a grounded theory approach
Hu et al. Do commonly recommended preventive actions deter identity theft victimization? Findings from NCVS identity theft surveys
Marjanov et al. SoK: Digging into the Digital Underworld of Stolen Data Markets
Bekkers et al. Police Investigations Into Financial-Economic Cybercriminal Networks: The Experiences and Perceptions of Dutch Law Enforcement
Gombár Analysis of respondents' opinions and attitudes toward the security of payment systems
Archer et al. Identity theft and fraud: Evaluating and managing risk
Rightley et al. Revisiting the Computer Crime Index-Revised (CCI-R): Assessing Individual Differences and Cyber-deviant Behavior Two Decades Later
Indriyani et al. Truecaller's Spam Call and SMS Blocking Solution for Surveillance on Social Media
Zeng et al. Organizational and organized cybercrime
Vanhee et al. Individual residence and identity theft: how residential characteristics shape exposure and risk of offline and online identity theft victimization
Cole et al. Do offenders [fraudsters]‘collaborate and listen’? A quantitative analysis of fraudsters’ decision-making processes on active cybercrime marketplaces
van Hardeveld et al. Expert perspectives on the evolution of carders, cryptomarkets and operational security
Bekee et al. Intelligent agent-based fraud detection and Prevention model for financial Institutions
Routh The potential of technological innovation to reduce fraud and increase trust in the Indian banking system
Jamieson et al. Developing a Conceptual Framework for Identity Fraud Profiling.
Ochuko E-banking operational risk assessment. A soft computing approach in the context of the Nigerian banking industry.