Results for 'Advance fee fraud '

981 found
Order:
  1. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  2. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. The Law and Ethics of K Street.Daniel T. Ostas - 2007 - Business Ethics Quarterly 17 (1):33-63.
    This article explores the law and ethics of lobbying. The legal discussion examines disclosure regulations, employment restrictions,bribery laws, and anti-fraud provisions as each applies to the lobbying context. The analysis demonstrates that given the social value placed on the First Amendment, federal law generally affords lobbyists wide latitude in determining who, what, when, where, and how to lobby.The article then turns to ethics. Lobbying involves deliberate attempts to effect changes in the law. An argument is advanced that because law (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  4. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. How to Identify Norms, Laws and Regulations That Facilitate Illicit Financial Flows and Related Financial Crimes.Tiago Cardao-Pito - forthcoming - Journal of Money Laundering Control.
    Purpose: Illicit financial flows are targeted by the United Nations’ (UN) Sustainable Development Goals (SDGs). However, these illicit flows are not entirely understood. Furthermore, they can benefit from economic norms, laws, and regulations that lack mechanisms to detect and penalize them. This paper investigates whether a recent test, the embezzler test, can be used to identify regulatory architectures that facilitate illicit financial flows and related financial crimes. -/- Design/methodology/approach: To develop a more advanced version of the embezzler test in terms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Globalization or Localization – factors to be considered by architects in their architectural practices.Sharifah Fairuz Syed Fadzil, Wong Teik Aun, Racheal Poh & Khor Wei Min - 2019 - African Journal of Hospitality, Tourism and Leisure 8 (6).
    This research explores the effects of globalization to the Malaysian architectural practice in the current situation. The research explores three issues, firstly what are the reasons local architects are taking projects locally (localization) only, and, secondly, what are the factors which motivate local architects to venture into international projects (termed as globalization). It also explores, thirdly, what are the factors which influence foreign architects coming to Malaysia to practice. Research was qualitative in nature using semi-structured interviews. The interviews were transcribed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Banking Relationship Ties to Firm Performance: Evidence from Food and Beverage Firms in Vietnam.Le Thanh Tam, Nguyen Phuong Ngan, Nguyen Trong Trung & Cao Phuong Minh - 2020 - Journal of Economics and Business 3 (2):602-616.
    This paper is aimed at analyzing the effects of banking relationship on performance of Vietnamese firms in Food and Beverage (F&B), one of the highest potential sectors. Panel data of 170 observations covers 34 F&B firms listed in the Vietnam stock exchanges in the period 2014-2018. The fixed effect model (FEM) is applied. The key findings are: First, short-term loan financing, leverage, and fixed asset ratios all negatively impacted on F&B firm performance, while firm size and net profit margin had (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Review of Listening Into the Heart of Things-on MDMA and LSD by Samuel Widmer (1989).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 573-575.
    This is an early volume from a much respected psychedelic psychotherapist. He has written several other books since this one but until recently none of his books were on Amazon and still you can only find a German edition and a Spanish one (from 1993) but no English one (except a couple used copies). This is sad since these drugs have enormous therapeutic potential but afaik government suppression still prevents their use. The most interesting and readable parts are the case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Media History of Print.Fee Haase - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  10. German Poetry and Philosophy.Fee Haase - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  11. The Discourse as Communicative Structure.Fee Haase - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  12. Art anthology.Fee-Alexandra Haase - manuscript
    This is an anthology of writings about art, art history, esthetics, and art theory from the 18th to 20th century.
    Download  
     
    Export citation  
     
    Bookmark  
  13. A History of English Literature.Fee-Alexandra Haase - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  14.  40
    Assessing Cybercrime Syndicates: Understanding ‘Black Axe’ Confraternity and Cybercriminal Networks in Business Email Compromise (BEC) Scams.Suleman Lazarus - 2024 - Public Sector Counter Fraud Journal 1 (14):24-26.
    Cybercrime is a global threat affecting both public and private sectors. Business email compromise (BEC) is one of the most advanced and lucrative forms of cybercrime, exploiting vulnerabilities in corporate email systems to facilitate unauthorised financial transactions. Organisations worldwide suffer substantial losses from these attacks. This article explores the connection between Black Axe and BEC scams, providing insights into how public sector organisations can better combat these sophisticated criminal networks.
    Download  
     
    Export citation  
     
    Bookmark  
  15. The South African Student/Worker Uprisings in Light of Just War Theory.Thaddeus Metz - 2016 - In Susan Booysen (ed.), Fees Must Fall: Student Revolt, Decolonisation and Governance in South Africa. Wits University Press. pp. 292-308.
    I critically examine the South African university student and worker protests of 2015/2016 in light of moral principles governing the use of force that are largely uncontested in both the contemporary Western and African philosophies of just war, violence and threats. Amongst these principles are: “discrimination”, according to which force should be directed not towards innocent bystanders but instead should target those particularly responsible for injustice; “likely success”, meaning that, instead of being counter-productive, the use of force must be reasonably (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Cryptographic Methods with a Pli Cachete: Towards the Computational Assurance of Integrity.Thatcher Collins - 2020 - In Gerhard R. Joubert Ian Foster (ed.), Advances in Parallel Computing. Amsterdam: IOS Press. pp. 10.
    Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secure sketches, and Benford's Law when combined with the historical practice of a Pli Cacheté where scientific discoveries were archived with a 3rd party to later prove the date of discovery. Including the distinct systems of preregistation and data provenance tracking becomes the starting point for the creation of a complete ontology of scientific documentation. The ultimate goals in such a system--ideally mandated--would rule out several forms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the disparity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. A FRAUD PREVENTION POLICY: ITS RELEVANCE AND IMPLICATION AT A UNIVERSITY OF TECHNOLOGY IN SOUTH AFRICA.Amelia Rorwana, Robertson K. Tengeh & Tichaona B. Musikavanhu - 2015 - Journal of Governance and Regulation 4 (3):212-221.
    Using research grants administrators and their clients (academic researchers) as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT) in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  76
    Advance Care Planning: What Gives Prior Wishes Normative Force?Nancy S. Jecker - 2016 - Asian Bioethics Review 8 (3):195-210.
    The conventional wisdom about advance care planning holds that the normative force of my prior wishes is simply that they are mine. It is their connection to me that matters. This paper challenges conventional thinking. I propose that the normative force of prior wishes does not depend exclusively on personal identity. Instead, it sometimes depends on a special relationship that exists between a prior, capacitated person and a now incapacitated person. I consider what normative guidance governs persons who stand (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Carbon Fee Fail-Safe and Safeguard.P. Olcott - manuscript
    The fail-safe makes sure the fee is high enough to meet carbon emission reduction targets. The safeguard keeps the fee from getting any higher than needed. -/- One of the ways that we could account for the unpredictability of the price elasticity of demand for carbon would be to provide a fail-safe mechanism to ensure that we definitely stay on the carbon reduction schedule. If we keep Energy Innovation Act (HR 763) essentially as it is and scale up the annual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Advance Directives: The Principle of Determining Authenticity.Matilda Carter - 2022 - Hastings Center Report 52 (1):32-41.
    Hastings Center Report, Volume 52, Issue 1, Page 32-41, January/February 2022.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. All (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Data frauds, health risks, and the growing question of ethics during the COVID-19 pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  27. In support of fraud trials without a jury.Sally Serena Ramage - 2005 - The Criminal Lawyer 156 (156):1-176.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this. Today the UK still does not support fraud trials without a jury, even though fraud in the UK today is the highest amount of fraud globally. The longer version of this paper is submitted here since it has become urgent that UK fraud trials be examined (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Animals, advance directives, and prudence: Should we let the cheerfully demented die?David Limbaugh - 2016 - Ethics, Medicine and Public Health 2 (4):481-489.
    A high level of confidence in the identity of individuals is required to let them die as ordered by an advance directive. Thus, if we are animalists, then we should lack the confidence required to apply lethal advance directives to the cheerfully demented, or so I argue. In short, there is consensus among animalists that the best way to avoid serious objections to their account is to adopt an ontology that denies the existence of brains, hands, tables, chairs, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Making matters of fraud: Sociomaterial technology in the case of Hwang and Schatten.Buhm Soon Park - 2020 - History of Science 58 (4):393-416.
    This paper revisits the “Hwang case,” which shook Korean society and the world of stem cell research in 2005 with the fraudulent claim of creating patient-specific embryonic stem cells. My goal is to overcome a human-centered, Korea-oriented narrative, by illustrating how materials can have an integral role in the construction and judgment of fraud. To this end, I pay attention to Woo Suk Hwang’s lab at Seoul National University as a whole, including human and nonhuman agents, that functioned as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Is there ever an obligation to commit welfare fraud?Stephen D’Arcy - 2008 - Journal of Value Inquiry 42 (3):377-387.
    All things considered, there are many public assistance recipients for whom there are compelling moral reasons to engage in welfare fraud. For many people, failure to defraud the welfare system, should they find themselves in a position to do so with impunity, would constitute a serious moral offense. This conclusion seems to fly in the face of prevailing notions of common sense. But this is misleading, since it is at the same time implied by principles that are widely embraced, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Advance Directives and Transformative Experience: Resilience in the Face of Change.Govind C. Persad - 2020 - American Journal of Bioethics 20 (8):69-71.
    In this commentary, I critique three aspects of Emily Walsh's proposal to reduce the moral and legal weight of advance directives: (1) the ambiguity of its initial thesis, (2) its views about the ethics and legality of clinical practice, and (3) its interpretation and application of Ronald Dworkin’s account of advance directives and L.A. Paul's view on transformative experience. I also consider what Walsh’s proposal would mean for people facing the prospect of dementia. I conclude that our reasons (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Advance Research Directives in Germany: A Proposal for a Disclosure Standard.Matthé Scholten - 2018 - GeroPsych: The Journal of Gerontopsychology and Geriatric Psychiatry 31 (2):77-86.
    The fourth amendment to the German Medicinal Products Act (Arzneimittelgesetz) states that nontherapeutic research in incompetent populations is permissible under the condition that potential research participants expressly declare their wish to participate in scientific research in an advance research directive. This article explores the implementation of advance research directives in Germany against the background of the international legal and ethical framework for biomedical research. In particular, it addresses a practical problem that arises from the disclosure requirement for (...) research directives. We show that, if the disclosure standard for advance research directives is set at a token level, nontherapeutic research in incompetent populations becomes practically impossible. To resolve this issue, we suggest the disclosure standard be set at a type level. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  75
    Lecturers’ and Students’ Perception on Role of Social Support and Psychological First Aid in Assisting Financial Fraud Victims in South-East, Nigeria.Princess Chidinma Nwangwu & Ngozi Mary Eze - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (1):325-339.
    The study ascertained the perception of lecturers and students on the role of social support and psychological first aid in assisting financial fraud victims in South East Nigeria. The study adopted a descriptive survey design. The study was carried out in three Universities in the South East, Nigeria: the University of Nigeria, Nsukka; Nnamdi Azikiwe University, Awka; and Michael Okpara University of Agriculture, Umudike. The population comprises of 135 students and 52 lecturers in Home Economics programme of the three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Methodological Advances in Experimental Philosophy.Eugen Fischer & Mark Curtis (eds.) - 2019 - London: Bloomsbury Press.
    Until recently, experimental philosophy has been associated with the questionnaire-based study of intuitions; however, experimental philosophers now adapt a wide range of empirical methods for new philosophical purposes. New methods include paradigms for behavioural experiments from across the social sciences as well as computational methods from the digital humanities that can process large bodies of text and evidence. This book offers an accessible overview of these exciting innovations. The volume brings together established and emerging research leaders from several areas of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  35. Advanced Modalizing Problems.Mark Jago - 2016 - Mind 125 (499):627-642.
    I present an internal problem for David Lewis’s genuine modal realism. My aim is to show that his analysis of modality is inconsistent with his metaphysics. I consider several ways of modifying the Lewisian analysis of modality, but argue that none are successful. I argue that the problem also affects theories related to genuine modal realism, including the stage theory of persistence and modal fictionalism.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  36. Making Carbon fee just steep enough to meet emission reduction targets.P. Olcott - manuscript
    One of the ways that we could account for the unpredictability of the price elasticity of demand for carbon would be to provide a fail-safe mechanism to ensure that we definitely stay on the carbon reduction schedule. If we kept Energy Innovation Act (HR 763) essentially as it is and scale up the annual carbon fee increase by Number-of-Years-Behind-Schedule * 0.15.
    Download  
     
    Export citation  
     
    Bookmark  
  37. Advance directives, autonomy and unintended death.Jim Stone - 1994 - Bioethics 8 (3):223–246.
    Advance directives typically have two defects. First, most advance directives fail to enable people to effectively avoid unwanted medical intervention. Second, most of them have the potential of ending your life in ways you never intended, years before you had to die.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Authority without identity: defending advance directives via posthumous rights over one’s body.Govind Persad - 2019 - Journal of Medical Ethics 45 (4):249-256.
    This paper takes a novel approach to the active bioethical debate over whether advance medical directives have moral authority in dementia cases. Many have assumed that advance directives would lack moral authority if dementia truly produced a complete discontinuity in personal identity, such that the predementia individual is a separate individual from the postdementia individual. I argue that even if dementia were to undermine personal identity, the continuity of the body and the predementia individual’s rights over that body (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Advance Requests for Medically-Assisted Dying.L. W. Sumner - manuscript
    When medical assistance in dying (MAiD) was legalized in Canada in June 2016, the question of allowing decisionally capable persons to make advance requests in anticipation of later incapacity was reserved for further consideration during the mandatory parliamentary review originally scheduled to begin in June 2020 (but since delayed by COVID-19). In its current form the legislation does not permit such requests, since it stipulates that at the time at which the procedure is to be administered the patient must (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  87
    A Critical Analysis of Falsification as Fraud.La Shun L. Carroll - 2024 - Ethics in Progress 15 (1):174-206.
    This paper critically evaluates the classification of research-related fraudulent activities, with an emphasis on the specific misconduct falsification. The analysis begins by interrogating the assumption that all acts of fraud in research are intentional, suggesting that some instances may inadvertently arise during the course of scholarly activities. Misconducts like fabrication and falsification are categorized as fraudulent primarily due to their generation during research activities and their direct contribution to the distortion of scientific knowledge. Plagiarism, while deceptive, does not necessarily (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Advancements in AI for Medical Imaging: Transforming Diagnosis and Treatment.Zakaria K. D. Alkayyali, Ashraf M. H. Taha, Qasem M. M. Zarandah, Bassem S. Abunasser, Alaa M. Barhoom & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research(Ijaer) 8 (8):8-15.
    Abstract: The integration of Artificial Intelligence (AI) into medical imaging represents a transformative shift in healthcare, offering significant improvements in diagnostic accuracy, efficiency, and patient outcomes. This paper explores the application of AI technologies in the analysis of medical images, focusing on techniques such as convolutional neural networks (CNNs) and deep learning models. We discuss how these technologies are applied to various imaging modalities, including X-rays, MRIs, and CT scans, to enhance disease detection, image segmentation, and diagnostic support. Additionally, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Quote- and Citation Fraud at the UiO, Chapter 2; with 'The learning of value' and the connection to mob-bullying in our schools (by Dr. Kai Sørfjord) 2016.Kai Soerfjord - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  44. Principlist Pandemics: On Fraud Ethical Guidelines and the Importance of Transparency.Jonathan Lewis & Udo Schuklenk - 2022 - In Michael Boylan (ed.), Ethical Public Health Policy Within Pandemics: Models of Civil Administration Following the Covid-19, Ebola, Sars, Hiv and Spanish Flue Pandemics. Springer. pp. 131-148.
    The COVID-19 pandemic has coincided with the proliferation of ethical guidance documents to assist public health authorities, health care providers, practitioners and staff with responding to ethical challenges posed by the pandemic. Like ethical guidelines relating to infectious disease that have preceded them, what unites many COVID-19 guidance documents is their dependency on an under-developed approach to bioethical principlism, a normative framework that attempts to guide actions based on a list of prima facie, unranked ethical principles. By situating them in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Quote- and Citation fraud at the University of Oslo (UiO), Chapter 2.Kai Soerfjord - manuscript
    Download  
     
    Export citation  
     
    Bookmark  
  46. Bioinformatics advances in saliva diagnostics.Ji-Ye Ai, Barry Smith & David T. W. Wong - 2012 - International Journal of Oral Science 4 (2):85--87.
    There is a need recognized by the National Institute of Dental & Craniofacial Research and the National Cancer Institute to advance basic, translational and clinical saliva research. The goal of the Salivaomics Knowledge Base (SKB) is to create a data management system and web resource constructed to support human salivaomics research. To maximize the utility of the SKB for retrieval, integration and analysis of data, we have developed the Saliva Ontology and SDxMart. This article reviews the informatics advances in (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Cumulative Advantage and the Incentive to Commit Fraud in Science.Remco Heesen - 2024 - British Journal for the Philosophy of Science 75 (3):561-586.
    This paper investigates how the credit incentive to engage in questionable research practices interacts with cumulative advantage, the process whereby high-status academics more easily increase their status than low-status academics. I use a mathematical model to highlight two dynamics that have not yet received much attention. First, due to cumulative advantage, questionable research practices may pay off over the course of an academic career even if they are not attractive at the level of individual publications. Second, because of the role (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  82
    Advancements in microbial-mediated radioactive waste bioremediation: A review.Chuck Chuan Ng - 2024 - Journal of Environmental Radioactivity 280 (December 2024):107530.
    The global production of radioactive wastes is expected to increase in the coming years as more countries have resorted to adopting nuclear power to decrease their reliance on fossil-fuel-generated energy. Discoveries of remediation methods that can remove radionuclides from radioactive wastes, including those discharged to the environment, are therefore vital to reduce risks-upon-exposure radionuclides posed to humans and wildlife. Among various remediation approaches available, microbe-mediated radionuclide remediation have limited reviews regarding their advances. This review provides an overview of the sources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Advancing the debate on the consequences of misinformation: clarifying why it’s not (just) about false beliefs.Maarten van Doorn - 2023 - Inquiry: An Interdisciplinary Journal of Philosophy 1.
    The debate on whether and why misinformation is bad primarily focuses on the spread of false beliefs as its main harm. From the assumption that misinformation primarily causes harm through the spread of false beliefs as a starting point, it has been contended that the problem of misinformation has been exaggerated. Its tendency to generate false beliefs appears to be limited. However, the near-exclusive focus on whether or not misinformation dupes people with false beliefs neglects other epistemic harms associated with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond. Second volume.Takaaki Fujita & Florentin Smarandache - 2024
    The second volume of “Advancing Uncertain Combinatorics through Graphization, Hyperization, and Uncertainization: Fuzzy, Neutrosophic, Soft, Rough, and Beyond” presents a deep exploration of the progress in uncertain combinatorics through innovative methodologies like graphization, hyperization, and uncertainization. This volume integrates foundational concepts from fuzzy, neutrosophic, soft, and rough set theory, among others, to further advance the field. Combinatorics and set theory, two central pillars of mathematics, focus on counting, arrangement, and the study of collections under defined rules. Combinatorics excels in (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 981