Results for 'Fraud'

26 found
Order:
  1.  39
    Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case Study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. In Support of Fraud Trials Without a Jury.Sally Ramage - 2005 - The Criminal Lawyer 156:2-52.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  45
    Quote- and Citation fraud at the University of Oslo (UiO), Chapter 2.Kai Soerfjord - manuscript
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  4.  40
    Quote- and Citation Fraud at the UiO, Chapter 2; with 'The Learning of Value' and the Connection to Mob-Bullying in Our Schools (by Dr. Kai Sørfjord) 2016.Kai Soerfjord - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  5. Disclosure and Consent to Medical Research Participation.Danielle Bromwich & Joseph Millum - 2013 - Journal of Moral Philosophy 10 (4):195-219.
    Most regulations and guidelines require that potential research participants be told a great deal of information during the consent process. Many of these documents, and most of the scholars who consider the consent process, assume that all this information must be disclosed because it must all be understood. However, a wide range of studies surveying apparently competent participants in clinical trials around the world show that many do not understand key aspects of what they have been told. The standard view (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6.  7
    Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip Hop Artists.Dr Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  27
    Case Analysis: Enron; Ethics, Social Responsibility, and Ethical Accounting as Inferior Goods?Rashid Muhammad Mustafa - 2020 - Journal of Economics Library 7 (2):98-105.
    In 2001 soon after the Asian Crises of 1997-1998, the DotcomBubble, 9/11, the Enron crises triggered a fraud crisis in Wall Street that impacted the market to the core. Since then scandals such as the Lehman Brothers and WorldCom in 2007-2008 and the Great Recession have surpassed it, Enron still remains one of the most important cases of fraudulent accounting. In 2000’s even though the financial industry had become highly regulated, deregulation of the energy industry allowed companies to place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. BELLE- LORD MANSFIELD'S GREAT-NIECE.Sally Ramage - forthcoming - Criminal Law News (85).
    This is the review of a book by Paula Byrne on Lord Mansfield's great-niece whom he raised as his own daughter. Lord Mansfield was the Lord Chief Justice of England in the Eighteenth Century. The child was brought to him as an infant and grew up to become what we would today term his paralegal clerk in his Library at Kenwood House. His great-niece was the child of a black slave and his sister's son, Sir John Lindsay. This is also (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  9. Sex By Deception.Berit Brogaard - forthcoming - In John M. Doris & Manuel Vargas (eds.), Oxford Handbook of Moral Psychology. Oxford: Oxford University Press.
    In this paper I will use sex by deception as a case study for highlighting some of the most tricky concepts around sexuality and moral psychology, including rape, consensual sex, sexual rights, sexual autonomy, sexual individuality, and disrespectful sex. I begin with a discussion of morally wrong sex as rooted in the breach of five sexual liberty rights that are derived from our fundamental human liberty rights: sexual self-possession, sexual autonomy, sexual individuality, sexual dignity and sexual privacy. I then argue (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  29
    A review on a peer review.Andrej Poleev - 2016 - Enzymes 14.
    The peer review is an opportunity to perform an unlawful censorship which ensures that no apostate notion ever get published in mainstream journals. Or such peer review censorship is an opportunity to steal any content and to claim afterward the priority of the first publication. And last but not least, the peer review is an academic tool to promote the mainstream pseudoscience.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  11.  47
    Establishing the Particularities of Cybercrime in Nigeria: Theoretical and Qualitative Treatments.Dr Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  76
    Cryptographic Methods with a Pli Cachete: Towards the Computational Assurance of Integrity.Thatcher Collins - 2020 - In Gerhard R. Joubert Ian Foster (ed.), Advances in Parallel Computing. Amsterdam: IOS Press. pp. 10.
    Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secure sketches, and Benford's Law when combined with the historical practice of a Pli Cacheté where scientific discoveries were archived with a 3rd party to later prove the date of discovery. Including the distinct systems of preregistation and data provenance tracking becomes the starting point for the creation of a complete ontology of scientific documentation. The ultimate goals in such a system--ideally mandated--would rule out several forms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  49
    Theories of Whistleblowing.Emanuela Ceva & Michele Bocchiola - 2020 - Philosophy Compass 15 (1).
    Whistleblowing” has entered the scholarly and the public debate as a way of describing the exposure by the member of an organization of episodes of corruption, fraud, or general abuses of power within the organization. We offer a critical survey of the main normative theories of whistleblowing in the current debate in political philosophy, with the illustrative aid of one of the epitomic figures of a whistleblower of our time: Edward Snowden. After conceptually separating whistleblowing from other forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Sublimation and Affirmation in Nietzsche's Psychology.Joseph Swenson - 2014 - Journal of Nietzsche Studies 45 (2):196.
    Nietzsche informs his readers frequently and seemingly with great confidence that his most original contributions to philosophy are best understood in the context of his development of a radically new kind of psychology. In his most enthusiastic moments, he even suggests that the originality of his thinking reveals not just a very, very good psychologist at work in his writing but also something more like the invention or inauguration of the field of psychology itself. It is this inaugural sense of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Peer Review System: A Golden Standard for Publications Process.Shamima Parvin Lasker - 2018 - Bangladesh Journal of Bioethics 9 (1):13-23.
    Peer review process helps in evaluating and validating of research that is published in the journals. U.S. Office of Research Integrity reported that data fraudulence was found to be involved in 94% cases of misconduct from 228 identified articles between 1994–2012. If fraud in published article are significantly as high as reported, the question arise in mind, were these articles peer reviewed? Another report said that the reviewers failed to detect 16 cases of fabricated article of Jan Hendrick Schon. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Law and Ethics of K Street.Daniel T. Ostas - 2007 - Business Ethics Quarterly 17 (1):33-63.
    This article explores the law and ethics of lobbying. The legal discussion examines disclosure regulations, employment restrictions,bribery laws, and anti-fraud provisions as each applies to the lobbying context. The analysis demonstrates that given the social value placed on the First Amendment, federal law generally affords lobbyists wide latitude in determining who, what, when, where, and how to lobby.The article then turns to ethics. Lobbying involves deliberate attempts to effect changes in the law. An argument is advanced that because law (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  17. For Whose Benefit? Fear and Loathing in the Welfare State.Arianna Bove - 2014 - Journal of Political Marketing 13 (1-2):108-126.
    This article contributes to the debate on the relationship between marketing and propaganda through an analysis of social marketing as a mode of governing in permanent campaigning. The working hypothesis is that social marketing operations are agitational rather than propagandistic. The conceptual approach stems from a comparison of propaganda and marketing with Fordist and post-Fordist modes of production and governance. The research into the role of agitation involves an empirical study of the UK government campaign against benefit fraud, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  36
    Consumer Boycotts as Instruments for Structural Change.Valentin Beck - 2019 - Journal of Applied Philosophy 36 (4):543-559.
    Consumer boycotts have become a frequent form of social protest in the digital age. The corporate malpractices motivating them are varied, including environmental pollution, lack of minimum labour standards, severe mistreatment of animals, lobbying and misinformation campaigns, collaboration or complicity with illegitimate political regimes, and systematic tax evasion and tax fraud. In this article, I argue that organised consumer boycotts should be regarded as a legitimate and purposeful instrument for structural change, provided they conform to a number of normative (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. The Ethics of Transactions in an Unjust World.J. Millum - 2016 - In K. Zeiler & E. Malmqvist (eds.), Bioethics and Border Crossing: Perspectives on Giving, Selling and Sharing Bodies. Routledge: Oxon. pp. 185-196.
    In this paper I examine the ethics of benefit-sharing agreements between victims and beneficiaries of injustice in the context of trans-national bodily giving, selling, and sharing. Some obligations are the same no matter who the parties to a transaction are. Prohibitions on threats, fraud and harm apply universally and their application to transactions in unjust contexts is not disputed. I identify three sources of obligations that are affected by unjust background conditions. First, power disparities may illegitimately influence transactions in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  83
    Fraudulent Advertising: A Mere Speech Act or a Type of Theft?Pavel Slutskiy - unknown - Libertarian Papers 8.
    Libertarian philosophy asserts that only the initiation of physical force against persons or property, or the threat thereof, is inherently illegitimate. A corollary to this assertion is that all forms of speech, including fraudulent advertising, are not invasive and therefore should be considered legitimate. On the other hand, fraudulent advertising can be viewed as implicit theft under the theory of contract: if a seller accepts money knowing that his product does not have some of its advertised characteristics, he acquires the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  23
    Pandemic Economic Crisis: Essence, Reasons, Comparative Characteristics, Opportunities.Igor Britchenko & Maksym Bezpartochnyi - 2020 - In M. Bezpartochnyi (ed.), New trends in the economic systems management in the context of modern global challenges.
    Before pandemic the world economy had a pre-crisis situation which was characterized by unprecedented imbalances in the global financial and economic system, the lack of growth in world GDP, which posed a real threat to the world economic order. Almost all global analysts predicted a global economic crisis at the end of 2019. For the first time since time immemorial, bank interest rates in all countries have dropped to unprecedented low levels. Often interest rates were 0% or even negative. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Survey of Business Intelligence Solutions in Banking Industry and Big Data Applications.Elaheh Radmehr & Mohammad Bazmara - 2017 - International Journal of Mechatronics, Electrical and Computer Technology 7 (23):3280-3298.
    Nowadays, the economic and social nature of contemporary business organizations chiefly banks binds them to face with the sheer volume of data and information and the key to commercial success in this area is the proper use of data for making better, faster and flawless decisions. To achieve this goal organizations requires strong and effective tools to enable them in automating task analysis, decision-making, strategy formulation and risk prediction to prevent bankruptcy and fraud .Business Intelligence is a set of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Terroryzm jako zakłócona komunikacja. Koncepcja rozumu komunikacyjnego Jurgena Habermasa a możliwość dialogu po 11 września.Mikołaj Raczyński - 2017 - Dialogi Polityczne 22:137-149.
    The purpose of the text is to point out the fragments of Jurgen Habermas’ thoughts about terrorism, which can be considered as a disturbed communication. Habermas orders to get rid of all serious atavisms, including terrorism. In his view, it is necessary to return to the understanding of politics as a communicational exchange aimed at reaching a rational settlement. In this approach, politics is difficult to distinguish from communication in everyday interactions. In both instances lying, manipulation and fraud cannot (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  25.  95
    Review of Listening Into the Heart of Things-on MDMA and LSD by Samuel Widmer (1989).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Henderson,NV, USA: Michael Starks. pp. 573-575.
    This is an early volume from a much respected psychedelic psychotherapist. He has written several other books since this one but until recently none of his books were on Amazon and still you can only find a German edition and a Spanish one (from 1993) but no English one (except a couple used copies). This is sad since these drugs have enormous therapeutic potential but afaik government suppression still prevents their use. The most interesting and readable parts are the case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  15
    An Unattractive Hypothesis – RCTs' Descent to Non-Science.Clifford Miller - 2011 - International Journal of Person Centered Medicine 1 (4):841-842.
    Eyal Shahar’s essay review [1] of James Penston’s remarkable book [2] seems more inspired playful academic provocation than review or essay, expressing dramatic views of impossible validity. The account given of modern biostatistical causation reveals the slide from science into the intellectual confusion and non-science RCTs have created: “…. the purpose of medical research is to estimate the magnitude of the effect of a causal contrast, for example the probability ratio of a binary outcome …” But Shahar’s world is simultaneously (...)
    Download  
     
    Export citation  
     
    Bookmark