Results for '419 fraud'

90 found
Order:
  1. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Establishing the particularities of cybercrime in Nigeria: theoretical and qualitative treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. A FRAUD PREVENTION POLICY: ITS RELEVANCE AND IMPLICATION AT A UNIVERSITY OF TECHNOLOGY IN SOUTH AFRICA.Amelia Rorwana, Robertson K. Tengeh & Tichaona B. Musikavanhu - 2015 - Journal of Governance and Regulation 4 (3):212-221.
    Using research grants administrators and their clients (academic researchers) as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT) in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Data frauds, health risks, and the growing question of ethics during the COVID-19 pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  10. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. In support of fraud trials without a jury.Sally Serena Ramage - 2005 - The Criminal Lawyer 156 (156):1-176.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this. Today the UK still does not support fraud trials without a jury, even though fraud in the UK today is the highest amount of fraud globally. The longer version of this paper is submitted here since it has become urgent that UK fraud trials be examined (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Making matters of fraud: Sociomaterial technology in the case of Hwang and Schatten.Buhm Soon Park - 2020 - History of Science 58 (4):393-416.
    This paper revisits the “Hwang case,” which shook Korean society and the world of stem cell research in 2005 with the fraudulent claim of creating patient-specific embryonic stem cells. My goal is to overcome a human-centered, Korea-oriented narrative, by illustrating how materials can have an integral role in the construction and judgment of fraud. To this end, I pay attention to Woo Suk Hwang’s lab at Seoul National University as a whole, including human and nonhuman agents, that functioned as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Is there ever an obligation to commit welfare fraud?Stephen D’Arcy - 2008 - Journal of Value Inquiry 42 (3):377-387.
    All things considered, there are many public assistance recipients for whom there are compelling moral reasons to engage in welfare fraud. For many people, failure to defraud the welfare system, should they find themselves in a position to do so with impunity, would constitute a serious moral offense. This conclusion seems to fly in the face of prevailing notions of common sense. But this is misleading, since it is at the same time implied by principles that are widely embraced, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  75
    Lecturers’ and Students’ Perception on Role of Social Support and Psychological First Aid in Assisting Financial Fraud Victims in South-East, Nigeria.Princess Chidinma Nwangwu & Ngozi Mary Eze - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):325-339.
    The study ascertained the perception of lecturers and students on the role of social support and psychological first aid in assisting financial fraud victims in South East Nigeria. The study adopted a descriptive survey design. The study was carried out in three Universities in the South East, Nigeria: the University of Nigeria, Nsukka; Nnamdi Azikiwe University, Awka; and Michael Okpara University of Agriculture, Umudike. The population comprises of 135 students and 52 lecturers in Home Economics programme of the three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  87
    A Critical Analysis of Falsification as Fraud.La Shun L. Carroll - 2024 - Ethics in Progress 15 (1):174-206.
    This paper critically evaluates the classification of research-related fraudulent activities, with an emphasis on the specific misconduct falsification. The analysis begins by interrogating the assumption that all acts of fraud in research are intentional, suggesting that some instances may inadvertently arise during the course of scholarly activities. Misconducts like fabrication and falsification are categorized as fraudulent primarily due to their generation during research activities and their direct contribution to the distortion of scientific knowledge. Plagiarism, while deceptive, does not necessarily (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Quote- and Citation Fraud at the UiO, Chapter 2; with 'The learning of value' and the connection to mob-bullying in our schools (by Dr. Kai Sørfjord) 2016.Kai Soerfjord - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  18. Quote- and Citation fraud at the University of Oslo (UiO), Chapter 2.Kai Soerfjord - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  19. Principlist Pandemics: On Fraud Ethical Guidelines and the Importance of Transparency.Jonathan Lewis & Udo Schuklenk - 2022 - In Michael Boylan (ed.), Ethical Public Health Policy Within Pandemics: Models of Civil Administration Following the Covid-19, Ebola, Sars, Hiv and Spanish Flue Pandemics. Springer. pp. 131-148.
    The COVID-19 pandemic has coincided with the proliferation of ethical guidance documents to assist public health authorities, health care providers, practitioners and staff with responding to ethical challenges posed by the pandemic. Like ethical guidelines relating to infectious disease that have preceded them, what unites many COVID-19 guidance documents is their dependency on an under-developed approach to bioethical principlism, a normative framework that attempts to guide actions based on a list of prima facie, unranked ethical principles. By situating them in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Cumulative Advantage and the Incentive to Commit Fraud in Science.Remco Heesen - 2024 - British Journal for the Philosophy of Science 75 (3):561-586.
    This paper investigates how the credit incentive to engage in questionable research practices interacts with cumulative advantage, the process whereby high-status academics more easily increase their status than low-status academics. I use a mathematical model to highlight two dynamics that have not yet received much attention. First, due to cumulative advantage, questionable research practices may pay off over the course of an academic career even if they are not attractive at the level of individual publications. Second, because of the role (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Voodoo science: the road from foolishness to fraud.Luciano Floridi - 1996 - In Paul Boghossian (ed.), What the Sokal Hoax Ought to Teach Us.
    This article is a review of R.L Park's Voodoo Science: The Road from Foolishness to Fraud.
    Download  
     
    Export citation  
     
    Bookmark  
  22. “Paintings Can Be Forged, But Not Feeling”: Vietnamese Art—Market, Fraud, and Value.Quan-Hoang Vuong, Manh-Tung Ho, Hong-Kong T. Nguyen, Thu-Trang Vuong & Ho Manh Toan - 2018 - Arts 7 (4):62.
    A work of Vietnamese art crossed a million-dollar mark in the international art market in early 2017. The event was reluctantly seen as a sign of maturity from the Vietnamese art amidst the many existing problems. Even though the Vietnamese media has discussed the issues enthusiastically, there is a lack of literature from the Vietnamese academics examining the subject, and even rarer in from the market perspective. This paper aims to contribute an insightful perspective on the Vietnamese art market, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. How to Discriminate between Experts and Frauds: Some Problems for Socratic Peirastic.Jyl Gentzler - 1995 - History of Philosophy Quarterly 12 (3):227 - 246.
    It has often been noted that Socratic cross-examination is problematic as a method of inquiry, i.e., as a method for 'acquiring' knowledge. Rarely has it been noticed that there are problems with cross-examination when used for the purposes of 'testing' for knowledge. In the 'Charmides', Socrates commits himself to the following principle: In order to discriminate between the person who knows and the person who does not know the subject matter covered by a particular discipline (technê), one must have mastered (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  24. ‘Duped Fathers’, ‘Cuckoo Children’, and the Problem of Basing Fatherhood on Biology: A Philosophical Analysis.Daniela Cutas & Anna Smajdor - 2020 - In Daniela Cutas & Anna Smajdor (eds.), Assistierte Reproduktion mit Hilfe Dritter. Medizin - Ethik - Psychologie - Recht. Berlin, Heidelberg:
    Who is a child’s father? Is it the man who raised her, or the one whose genes she carries—or both? We look at the view that men who have raised children they falsely believed to be ‘their own’ have been victims of a form of fraud or are ‘false fathers’. We consider the question of who has been harmed in such cases, and in what the harm consists. We use conceptual analysis, a philosophical method of investigating the use of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. (2 other versions)Disclosure and Consent to Medical Research Participation.Danielle Bromwich & Joseph Millum - 2013 - Journal of Moral Philosophy 10 (4):195-219.
    Most regulations and guidelines require that potential research participants be told a great deal of information during the consent process. Many of these documents, and most of the scholars who consider the consent process, assume that all this information must be disclosed because it must all be understood. However, a wide range of studies surveying apparently competent participants in clinical trials around the world show that many do not understand key aspects of what they have been told. The standard view (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  26. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  27. Predicting Audit Risk Using Neural Networks: An In-depth Analysis.Dana O. Abu-Mehsen, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):48-56.
    Abstract: This research paper presents a novel approach to predict audit risks using a neural network model. The dataset used for this study was obtained from Kaggle and comprises 774 samples with 18 features, including Sector_score, PARA_A, SCORE_A, PARA_B, SCORE_B, TOTAL, numbers, marks, Money_Value, District, Loss, Loss_SCORE, History, History_score, score, and Risk. The proposed neural network architecture consists of three layers, including one input layer, one hidden layer, and one output layer. The neural network model was trained and validated, achieving (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Good Faith as a Normative Foundation of Policing.Luke William Hunt - 2023 - Criminal Law and Philosophy 17 (3):1-17.
    The use of deception and dishonesty is widely accepted as a fact of life in policing. This paper thus defends a counterintuitive claim: Good faith is a normative foundation for the police as a political institution. Good faith is a core value of contracts, and policing is contractual in nature both broadly (as a matter of social contract theory) and narrowly (in regard to concrete encounters between law enforcement officers and the public). Given the centrality of good faith to policing, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The Violation Imperative.La Shun L. Carroll - 2022 - Eliva Press.
    Allegations of fraud involving falsification as research misconduct may result in severe consequences for those convicted. The focus of this article is the Public Health Service’s (PHS) definition of falsification . A well-articulated revised definition is required for veritable instances of falsification as misconduct to be consistently identified and potentially offer a framework for elucidation. A philosophical critique of the explicit definition is undertaken to determine what comprises falsification at its core, which could substantially reduce the number of allegations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Police Deception and Dishonesty – The Logic of Lying.Luke William Hunt - 2024 - New York: Oxford University Press.
    Cooperative relations steeped in honesty and good faith are a necessity for any viable society. This is especially relevant to the police institution because the police are entrusted to promote justice and security. Despite the necessity of societal honesty and good faith, the police institution has embraced deception, dishonesty, and bad faith as tools of the trade for providing security. In fact, it seems that providing security is impossible without using deception and dishonesty during interrogations, undercover operations, pretextual detentions, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Case analysis: Enron; Ethics, social responsibility, and ethical accounting as inferior goods?Rashid Muhammad Mustafa - 2020 - Journal of Economics Library 7 (2):98-105.
    In 2001 soon after the Asian Crises of 1997-1998, the DotcomBubble, 9/11, the Enron crises triggered a fraud crisis in Wall Street that impacted the market to the core. Since then scandals such as the Lehman Brothers and WorldCom in 2007-2008 and the Great Recession have surpassed it, Enron still remains one of the most important cases of fraudulent accounting. In 2000’s even though the financial industry had become highly regulated, deregulation of the energy industry allowed companies to place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Abduction − the context of discovery + underdetermination = inference to the best explanation.Mousa Mohammadian - 2021 - Synthese 198 (5):4205-4228.
    The relationship between Peircean abduction and the modern notion of Inference to the Best Explanation is a matter of dispute. Some philosophers, such as Harman :88–95, 1965) and Lipton, claim that abduction and IBE are virtually the same. Others, however, hold that they are quite different :503, 1998; Minnameier in Erkenntnis 60:75–105, 2004) and there is no link between them :419–442, 2009). In this paper, I argue that neither of these views is correct. I show that abduction and IBE have (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Continuing The Distance Learning Modality of Graduate Studies in Post-Covid Philippines: A Survey.Jayrome Nuñez, Louie P. Gula, Evaflor Alindan, John Clinton Colcol, Aristonie Sangco, Jairoh Taracina, Sammy Dolba, Al John Escobañez, Kevin Sumayang, Mark Anthony Jamisal & Francis Jim Tuscano - 2023 - FDLA Journal 7 (1):1-17.
    Getting a graduate education is one of the most important parts of a professional in a field. It allows them to climb higher in the professional rankings or even get higher pay for their academic work. All graduate students are adults and self-directed due to their past experiences in work or practice. However, when the pandemic hit the world, these self-directed learners were not spared from shutting of schools. In the Philippines, most graduate schools deliver their lessons through the traditional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Direitos naturais e contratualismo em Locke.Marta Nunes da Costa & Jaimir Conte - 2015 - In Itamar Luís Gelain (ed.), Uma introdução à filosofia do direito.
    Capítulo de livro publicado em "Uma introdução à filosofia do direito" Itamar Luís Gelain (Org.) .- Ijuí: Ed. Unijuí, 2015. - 368 p. - (Coleção direito, política e cidadania; 37). . ISBN 978-85-419-0 I 75-8.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Exploratory hypothesis tests can be more compelling than confirmatory hypothesis tests.Mark Rubin & Chris Donkin - 2022 - Philosophical Psychology.
    Preregistration has been proposed as a useful method for making a publicly verifiable distinction between confirmatory hypothesis tests, which involve planned tests of ante hoc hypotheses, and exploratory hypothesis tests, which involve unplanned tests of post hoc hypotheses. This distinction is thought to be important because it has been proposed that confirmatory hypothesis tests provide more compelling results (less uncertain, less tentative, less open to bias) than exploratory hypothesis tests. In this article, we challenge this proposition and argue that there (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. Consumer Boycotts as Instruments for Structural Change.Valentin Beck - 2018 - Journal of Applied Philosophy 36 (4):543-559.
    Consumer boycotts have become a frequent form of social protest in the digital age. The corporate malpractices motivating them are varied, including environmental pollution, lack of minimum labour standards, severe mistreatment of animals, lobbying and misinformation campaigns, collaboration or complicity with illegitimate political regimes, and systematic tax evasion and tax fraud. In this article, I argue that organised consumer boycotts should be regarded as a legitimate and purposeful instrument for structural change, provided they conform to a number of normative (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  37. (1 other version)Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  38. The Law and Ethics of K Street.Daniel T. Ostas - 2007 - Business Ethics Quarterly 17 (1):33-63.
    This article explores the law and ethics of lobbying. The legal discussion examines disclosure regulations, employment restrictions,bribery laws, and anti-fraud provisions as each applies to the lobbying context. The analysis demonstrates that given the social value placed on the First Amendment, federal law generally affords lobbyists wide latitude in determining who, what, when, where, and how to lobby.The article then turns to ethics. Lobbying involves deliberate attempts to effect changes in the law. An argument is advanced that because law (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  39. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐fraud, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  40. Not What I Agreed To: Content and Consent.Emily C. R. Tilton & Jonathan Ichikawa - 2021 - Ethics 132 (1):127–154.
    Deception sometimes results in nonconsensual sex. A recent body of literature diagnoses such violations as invalidating consent: the agreement is not morally transformative, which is why the sexual contact is a rights violation. We pursue a different explanation for the wrongs in question: there is valid consent, but it is not consent to the sex act that happened. Semantic conventions play a key role in distinguishing deceptions that result in nonconsensual sex (like stealth condom removal) from those that don’t (like (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. Justice and the Law.Thaddeus Metz - 2004 - In Christopher Roederer & Darrel Moellendorf (eds.), Jurisprudence. Lansdowne [South Africa]: Kluwer Academic Publishers. pp. 382-411.
    This chapter discusses major theories of domestic justice in the context of South African Constitutional, statutory and case law. It begins by considering when it is permissible for legislators to restrict civil liberty. South Africa's Parliament has criminalised prostitution, liquor sales on Sundays and marijuana use, actions that few liberals would say should be illegal. However, South African law permits abortion, gambling and homosexual relationships, which many conservatives would criminalise. Is there any deep inconsistency here? Should South Africa become more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Objectivity for the research worker.Noah van Dongen & Michał Sikorski - 2021 - European Journal for Philosophy of Science 11 (3):1-25.
    In the last decade, many problematic cases of scientific conduct have been diagnosed; some of which involve outright fraud others are more subtle. These and similar problems can be interpreted as caused by lack of scientific objectivity. The current philosophical theories of objectivity do not provide scientists with conceptualizations that can be effectively put into practice in remedying these issues. We propose a novel way of thinking about objectivity for individual scientists; a negative and dynamic approach.We provide a philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Ethics of Artificial Intelligence.Stefan Buijsman, Michael Klenk & Jeroen van den Hoven - forthcoming - In Nathalie Smuha (ed.), Cambridge Handbook on the Law, Ethics and Policy of AI. Cambridge University Press.
    Artificial Intelligence (AI) is increasingly adopted in society, creating numerous opportunities but at the same time posing ethical challenges. Many of these are familiar, such as issues of fairness, responsibility and privacy, but are presented in a new and challenging guise due to our limited ability to steer and predict the outputs of AI systems. This chapter first introduces these ethical challenges, stressing that overviews of values are a good starting point but frequently fail to suffice due to the context (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Conductas no éticas en la investigación científica: prevalencia, causas asociadas y estrategias de prevención. Una revisión sistemática.Sandra Reyes-Carrillo & Daniel Eudave-Muñoz - 2022 - Revista Innovaciones Educativas 24 (SI):105-125.
    El plagio ha sido objeto de investigaciones desde hace algunos años; sin embargo, ha sido estudiado principalmente en el alumnado de diferentes niveles educativos, aun cuando es una práctica que se manifiesta también en la investigación científica. Por ello, este artículo parte de responder: ¿Cuál es la prevalencia del plagio entre investigadores? ¿Cuáles son las principales causas asociadas a su comisión? ¿Qué estrategias se emplean para prevenirlo? Se realizó una revisión sistemática de literatura. Un total de 25 documentos fueron evaluados, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Gatekeeping in Science: Lessons from the Case of Psychology and Neuro-Linguistic Programming.Katherine Dormandy & Bruce Grimley - 2024 - Social Epistemology 38 (3):392-412.
    Gatekeeping, or determining membership of your group, is crucial to science: the moniker ‘scientific’ is a stamp of epistemic quality or even authority. But gatekeeping in science is fraught with dangers. Gatekeepers must exclude bad science, science fraud and pseudoscience, while including the disagreeing viewpoints on which science thrives. This is a difficult tightrope, not least because gatekeeping is a human matter and can be influenced by biases such as groupthink. After spelling out these general tensions around gatekeeping in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Political Bald-Faced Lies are Performative Utterances.Susanna Melkonian-Altshuler - 2024 - In Adam C. Podlaskowski & Drew Johnson (eds.), Truth 20/20: How a Global Pandemic Shaped Truth Research. Synthese Library. pp. 211-231.
    Sometimes, political bald-faced lies pass for truth. That is, certain groups of people behave according to them – behave as if the political bald-faced lies were true. How can this phenomenon be explained? I argue that to explain it we need to take political bald-faced lies to be performative utterances whose goal is to bring about a worldly state of affairs just in virtue of making the utterance. When the former US-President tweeted ‘we won the election’, people stormed Capitol Hill (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. How Abstract Liberty Relates to Private Property: a One-Page Outline.J. C. Lester - manuscript
    Libertarianism—and classical liberalism generally—entails (or presupposes) a specific, but implicit, conception of liberty. Imagine two lists of property-rights: one list is all those that currently appear to be libertarian (self-ownership, property acquired by use of natural resources, property acquired by consensual exchange, etc.); the other list is all those that currently appear not to be libertarian (aggressively imposed slavery, property acquired by theft or fraud, property acquired by coerced transfers due to welfare claims, etc.). What determines into which list (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Giving Credit When Credit Is Due.Edward Song - 2011 - International Journal of Applied Philosophy 25 (1):1-13.
    Issues of academic authorship pose few problems for philosophers or those in the humanities, yet raise a host of issues for medical researchers, engineers and scientists, where multiple authors is the norm and journal articles sometimes list hundreds of authors. At issue here are abstract questions about desert, as well as practical problems regarding the distribution of goods attached to authorship—tenure, prestige, research grants, etc. This paper defends a version of the author/contributor model, where the specific contributions of authors are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. For whose benefit? Fear and loathing in the welfare state.Arianna Bove - 2014 - Journal of Political Marketing 13 (1-2):108-126.
    This article contributes to the debate on the relationship between marketing and propaganda through an analysis of social marketing as a mode of governing in permanent campaigning. The working hypothesis is that social marketing operations are agitational rather than propagandistic. The conceptual approach stems from a comparison of propaganda and marketing with Fordist and post-Fordist modes of production and governance. The research into the role of agitation involves an empirical study of the UK government campaign against benefit fraud, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 90