Results for 'Fraudulent claimant'

63 found
Order:
  1. Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation.Sally Serena Ramage - 2010 - Current Criminal Law 2 (3):2-7.
    Criminal offences and regulatory breaches in using social networking evidence in personal injury litigation Pages 2-7 Current Criminal Law ISSN 1758-8405 Volume 2 Issue 3 March 2010 Author SALLY RAMAGE WIPO 900614 UK TM 2401827 USA TM 3,440.910 Orchid ID 0000-0002-8854-4293 Sally Ramage, BA (Hons), MBA, LLM, MPhil, MCIJ, MCMI, DA., ASLS, BAWP. Publisher & Managing Editor, Criminal Lawyer series [1980-2022](ISSN 2049-8047); Current Criminal Law series [2008-2022] (ISSN 1758-8405) and Criminal Law News series [2008-2022] (ISSN 1758-8421). Sweet & Maxwell (Thomson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Fraudulent Advertising: A Mere Speech Act or a Type of Theft?Pavel Slutskiy - unknown - Libertarian Papers 8.
    Libertarian philosophy asserts that only the initiation of physical force against persons or property, or the threat thereof, is inherently illegitimate. A corollary to this assertion is that all forms of speech, including fraudulent advertising, are not invasive and therefore should be considered legitimate. On the other hand, fraudulent advertising can be viewed as implicit theft under the theory of contract: if a seller accepts money knowing that his product does not have some of its advertised characteristics, he (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  4. Police Interrogation and Fraudulent Epistemic Environments.Luke William Hunt - 2025 - Journal of Public Policy:1-23.
    The police are required to establish probable cause before engaging in custodial interrogation. Much custodial interrogation relies on a fraudulent epistemic environment (FEE) in which the police knowingly use deception and dishonesty to gain an advantage over a suspect regarding a material issue, injuring the interests of the suspect. Probable cause, then, is a sort of evidentiary and epistemic standard that legally justifies the police’s use of deceptive and dishonest custodial interrogation tactics that are on par with fraud. However, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Blame as participant anger: Extending moral claimant competence to young children and nonhuman animals.Dorna Behdadi - 2024 - Philosophical Psychology:1-24.
    Following the social conception of moral agency, this paper claims that many beings commonly exempted from moral responsibility, like young children, adults with late-stage dementia, and nonhuman animals, may nevertheless qualify as participants in moral responsibility practices. Blame and other moral responsibility responses are understood according to the communicative emotion account of the reactive attitudes. To blame someone means having an emotion episode that acts as a vehicle for conveying a particular moral content. Therefore, moral agency is argued to be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Anger, moral address and claimant injustice.Alessandra Tanesini - 2021 - In Maria Silvia Vaccarezza & Nancy Snow, Virtues, Democracy, and Online Media: Ethical and Epistemic Issues. Routledge. pp. 134-148.
    Download  
     
    Export citation  
     
    Bookmark  
  7. The use of confidentiality and anonymity protections as a cover for fraudulent fieldwork data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Don't Feed the Liars! On Fraudulent Memoirs, and Why They're Bad.Joshua Landy - 2022 - Philosophy and Literature 46 (1):137-161.
    Some infamous memoirs have turned out to be chock-full of fibs. Should we care? Why not say—as many have—that all autobiography is fiction, that accurate memory is impossible, that we start lying as soon as we start narrating, and that it doesn’t matter anyway, since made-up stories are just as good as true ones? Because, well, every part of that is misleading. First, we don’t misremember absolutely everything; second, we have other sources to draw on; third, story form affects only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Fraud Detection and Analysis for Insurance Claim using Machine Learning.S. Ramasamy - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-13.
    Fraudulent activities in insurance claims have become a significant challenge for the insurance industry, leading to substantial financial losses annually. This project, titled "Fraud Detection and Analysis for Insurance Claim using Machine Learning" aims to develop a robust and an efficient system to identify and analyze fraudulent claims. The system leverages machine learning techniques to analyze patterns, anomalies, and inconsistencies in claim data, enabling early detection of potentially fraudulent activities.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Social Constraints On Moral Address.Vanessa Carbonell - 2017 - Philosophy and Phenomenological Research 98 (1):167-189.
    The moral community is a social community, and as such it is vulnerable to social problems and pathologies. In this essay I identify a particular way in which participation in the moral community can be constrained by social factors. I argue that features of the social world—including power imbalances, oppression, intergroup conflict, communication barriers, and stereotyping—can make it nearly impossible for some members of the moral community to hold others responsible for wrongdoing. Specifically, social circumstances prevent some marginalized people from (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  11. Predicting Audit Risk Using Neural Networks: An In-depth Analysis.Dana O. Abu-Mehsen, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):48-56.
    Abstract: This research paper presents a novel approach to predict audit risks using a neural network model. The dataset used for this study was obtained from Kaggle and comprises 774 samples with 18 features, including Sector_score, PARA_A, SCORE_A, PARA_B, SCORE_B, TOTAL, numbers, marks, Money_Value, District, Loss, Loss_SCORE, History, History_score, score, and Risk. The proposed neural network architecture consists of three layers, including one input layer, one hidden layer, and one output layer. The neural network model was trained and validated, achieving (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  12. The Concept of the Simulacrum: Deleuze and the Overturning of Platonism.Daniel W. Smith - 2005 - Continental Philosophy Review 38 (1-2):89-123.
    This article examines Gilles Deleuze’s concept of the simulacrum, which Deleuze formulated in the context of his reading of Nietzsche’s project of “overturning Platonism.” The essential Platonic distinction, Deleuze argues, is more profound than the speculative distinction between model and copy, original and image. The deeper, practical distinction moves between two kinds of images or eidolon, for which the Platonic Idea is meant to provide a concrete criterion of selection “Copies” or icons (eikones) are well-grounded claimants to the transcendent Idea, (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  13. Responding to historical injustices: Collective inheritance and the moral irrelevance of group identity.Santiago Truccone-Borgogno - 2024 - European Journal of Political Theory 23 (I):65-84.
    I argue that changes in the numerical identity of groups do not necessarily speak in favour of the supersession of some historical injustice. I contend that the correlativity between the perpetrator and the victim of injustices is not broken when the identity of groups changes. I develop this argument by considering indigenous people's claims in Argentina for the injustices suffered during the Conquest of the Desert. I argue that present claimants do not need to be part of the same entity (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Beyond a pejorative understanding of conflict of interest.Bryn Williams-Jones - 2011 - American Journal of Bioethics 11 (1):1 - 2.
    In seeking to clarify the concept of conflict of interest (COI) in debates about physician–industry relationships, Howard Brody (2011) highlights the extent to which the prob- lem turns on a common pejorative understanding of COI. Whether it is the academic or public policy “pharmapologists” or “pharmascolds” talking about COI, there is often a straightforward and overly simplistic correlation made: that is, a conflict of interest—by definition—leads to fraudulent or corrupt behavior. The same type of reasoning is com- monly found (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  16. Trauma in Court: Medico-Legal Dialectics in the Late Nineteenth-Century German Discourse on Nervous Injuries.José Brunner - 2003 - Theoretical Inquiries in Law 4 (2).
    This paper discusses a dialectic whereby the law not only influenced medical thinking in late nineteenth-century Germany, but also underwent medicalization of its own initiative. At the end of the 1880s, social legislation was crucial in initiating the German discourse on traumatic nervous disorders. By employing doctors as medical experts in court, the law also created a new experiential realm for doctors, altering their behavior toward patients and shifting their focus from therapy to investigation. However, in the wake of their (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Personal responsibility: why it matters.Alexander Brown - 2009 - New York: Continuum.
    Introduction -- What is personal responsibility? -- Ordinary language -- Common conceptions -- What do philosophers mean by responsibility? -- Personally responsible for what? -- What do philosophers think? part I -- Causes -- Capacity -- Control -- Choice versus brute luck -- Second-order attitudes -- Equality of opportunity -- Deservingness -- Reasonableness -- Reciprocity -- Equal shares -- Combining criteria -- What do philosophers think? part II -- Utility -- Self-respect -- Autonomy -- Human flourishing -- Natural duties and (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  18. Professionalism in Science: Competence, Autonomy, and Service.Hugh Desmond - 2020 - Science and Engineering Ethics 26 (3):1287-1313.
    Some of the most significant policy responses to cases of fraudulent and questionable conduct by scientists have been to strengthen professionalism among scientists, whether by codes of conduct, integrity boards, or mandatory research integrity training programs. Yet there has been little systematic discussion about what professionalism in scientific research should mean. In this paper I draw on the sociology of the professions and on data comparing codes of conduct in science to those in the professions, in order to examine (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  19. Selling "The Reason Game".Susan T. Gardner - 2015 - Teaching Ethics 15 (1):129-136.
    There is a clear distinction between genuine and fraudulent reasoning. Being seduced by the latter can result in horrific consequences. This paper explores how we can arm ourselves, and others with the ability to recognize the difference between genuine and pseudo-reasoning, with the motivation to maintain an unbending commitment to follow the “impersonal” “norm-driven” rules of reason even in situations in which “non-reasonable” strategies appear to support short-term bests interests, and with the confidence that genuine reasoning is the best (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. Tracking Inferences Is not Enough: The Given as Tie-Breaker.Marc Champagne - 2016 - Logos and Episteme 7 (2):129-135.
    Most inferentialists hope to bypass givenness by tracking the conditionals claimants are implicitly committed to. I argue that this approach is underdetermined because one can always construct parallel trees of conditionals. I illustrate this using the Müller-Lyer illusion and touching a table. In the former case, the lines are either even or uneven; in the latter case, a moving hand will either sweep through or be halted. For each possibility, we can rationally foresee consequents. However, I argue that, until and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. The Ethics of Reparations Policies.Alasia Nuti & Jennifer Page - 2019 - In Andrei Poama & Annabelle Lever, Routledge Handbook of Ethics and Public Policy. Routledge. pp. 332-343.
    We identify the ethics of reparations policies as its own distinct field of inquiry, and consider several neglected ethical issues that arise in the process of devising reparations programmes. The problem of political instrumentalization has to do with the fact that reparations can be a way for the governments to bolster their legitimacy rather than achieve justice. The problem of exclusion refers to individuals with seemingly valid claims being turned away. Finally, the problem of inclusion has to do with including (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Birds of a feather flock together: The Nigerian cyber fraudsters (yahoo boys) and hip hop artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  23. How Should Claims For Religious Exemptions Be Weighed?Billingham Paul - 2017 - Oxford Journal of Law and Religion 6 (1):1-23.
    Many philosophers and jurists believe that individuals should sometimes be granted religiouslygrounded exemptions from laws or rules. To determine whether an exemption is merited in a particular case, the religious claim must be weighed against the countervailing values that favour the uniform application of the law or rule. This paper develops and applies a framework for assessing the weight of religious claims to exemption, across two dimensions. First, the importance of the burdened religious practice, which is determined by its level (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  24. The 2003 U.S. Invasion of Iraq: Militarism in the Service of Geopolitics.Edmund Byrne - 2005 - In Byrne Edmund, Justice and Violence: Political Violence, Pacifism and Cultural Transformation. Aldershot. pp. 193-216.
    Not the publicly asserted reasons (humanitarianism and self-defense) but cooptation of oil reserves was the objective behind the US invasion of Iraq in 2003. This underlying motive utterly fails to satisfy just war jus ad bellum conditions. This prioritization of petroleum is well documented and is consistent with decades old US policy towards the Middle East, especially as codified by Anthony Cordesman in 1998 and US DoD's Strategic Assessment 1999 and then adopted by Bush II. This fraudulent use of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  35
    The Role of AI in Automated Threat Hunting.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-10.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Fairness and the Strengths of Agents' Claims.Nathaniel Sharadin - 2016 - Utilitas 28 (3):347-360.
    John Broome has proposed a theory of fairness according to which fairness requires that agents’ claims to goods be satisfied in proportion to the relative strength of those claims. In the case of competing claims for a single indivisible good, Broome argues that what fairness requires is the use of a weighted lottery as a surrogate to satisfying the competing claims: the relative chance of each claimant's winning the lottery should be set to the relative strength of each (...)'s claim. In this journal, James Kirkpatrick and Nick Eastwood have objected that the use of weighted lotteries in the case of indivisible goods is unacceptable. In this article, I explain why Kirkpatrick and Eastwood's objection misses its mark. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  27. Peer Review system: A Golden standard for publications process.Shamima Parvin Lasker - 2018 - Bangladesh Journal of Bioethics 9 (1):13-23.
    Peer review process helps in evaluating and validating of research that is published in the journals. U.S. Office of Research Integrity reported that data fraudulence was found to be involved in 94% cases of misconduct from 228 identified articles between 1994–2012. If fraud in published article are significantly as high as reported, the question arise in mind, were these articles peer reviewed? Another report said that the reviewers failed to detect 16 cases of fabricated article of Jan Hendrick Schon. Superficial (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Should we perform kidney transplants on foreign nationals?Marie-Chantal Fortin & Bryn Williams-Jones - 2014 - Journal of Medical Ethics 40 (12):821-826.
    In Canada, there are currently no guidelines at either the federal or provincial level regarding the provision of kidney transplantation services to foreign nationals (FN). Renal transplant centres have, in the past, agreed to put refugee claimants and other FNs on the renal transplant waiting list, in part, because these patients (refugee claimants) had health insurance through the Interim Federal Health Programme to cover the costs of medication and hospital care. However, severe cuts recently made to this programme have forced (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. What is Justiciability?Damian Williams - forthcoming - Forthcoming.
    Justiciability sets the boundaries of judicial review and the rule of law. A justiciable issue is that which is appropriate within a judicial forum. That is, where an "independent and impartial body" can remedy rights violations of identifiable claimants, the issue before it is justiciable. If it falls beyond what is judicially determinable, it is 'non-justiciable'. The principle is not fixed, as it does not permanently set the boundaries of that which is appropriate for judicial determination. Rather, it evolves "from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Playing with Cards: Discrimination Claims and the Charge of Bad Faith.David Schraub - 2016 - Social Theory and Practice 42 (2):285-303.
    A common response to claims of bias, harassment, or discrimination is to say that these claims are made in bad faith. Claimants are supposedly not motivated by a credible or even sincere belief that unfair or unequal treatment has occurred, but simply seek to illicitly gain public sympathy or private reward. Characterizing discrimination claims as systematically made in bad faith enables them to be screened and dismissed prior to engaging with them on their merits. This retort preserves the dominant group’s (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Beyond Objective and Subjective: Assessing the Legitimacy of Religious Claims to Accommodation.Daniel Weinstock - 2011 - Les Ateliers de L’Ethique 6 (2):155-175.
    There are at present two ways in which to evaluate religiously-based claims to accommodation in the legal context. The first, objective approach holds that these claims should be grounded in « facts of the matter » about the religions in question. The second, subjective approach, is grounded in an appreciation by the courts of the sincerity of the claimant. The first approach has the advantage of accounting for the difference between two constitutional principles : freedom of conscience on the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various types (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Humor, common sense and the future of metaphysics in the Prolegomena.Melissa Merritt - 2021 - In Peter Thielke, Kant's Prolegomena: A Critical Guide. New York, NY: Cambridge University Press.
    Kant’s _Prolegomena_ is a piece of philosophical advertising: it exists to convince the open-minded “future teacher” of metaphysics that the true critical philosophy — i.e., the first _Critique_ — provides the only viable solution to the problem of metaphysics (i.e. its failure to make any genuine progress). To be effective, a piece of advertising needs to know its audience. This chapter argues that Kant takes his reader to have some default sympathies for the common-sense challenge to metaphysics originating from Thomas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Humor, Common Sense and the Future of Metaphysics in the Prolegomena.Melissa Merritt - 2021 - In Peter Thielke, Kant's Prolegomena: A Critical Guide. New York, NY: Cambridge University Press. pp. 9-26.
    Kant’s Prolegomena is a piece of philosophical advertising: it exists to convince the open-minded “future teacher” of metaphysics that the true critical philosophy — i.e., the Critique — provides the only viable solution to the problem of metaphysics (i.e. its failure to make any genuine progress). To be effective, a piece of advertising needs to know its audience. This chapter argues that Kant takes his reader to have some default sympathies for the common-sense challenge to metaphysics originating from Thomas Reid (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Fake Profile Detection on Social Networking Websites using Machine Learning.R. T. Subhalakshmi - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-18.
    With the increasing popularity of social networking websites, the problem of fake profiles has become a significant concern. Fake profiles, often created by malicious actors for fraudulent purposes, pose threats to user privacy, security, and trustworthiness of online platforms. This project proposes a machine learning-based approach to detect fake profiles on social networking websites. By analyzing various features such as user activity patterns, profile attributes, and network connections, the model identifies potential fake profiles with high accuracy. The system employs (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Democratic freedom of expression.Ricardo Restrepo - 2013 - Open Journal of Philosophy 3 (3):380-390.
    This paper suggests the democratic direction in which the right of freedom of expression should be conceived and applied. In the first two sections it suggests some counter-examples to, and diagnoses of, the libertarian and liberal conceptions of freedom of expression, taking Scanlon (1972) and Scanlon (1979), respectively, to be their chief proponents. The paper suggests that these conceptions cannot take into account clear examples, like fraudulent propaganda, which should not be legal. The democratic conception takes it to heart (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Internet and Advertisement.Khaled Moustafa - 2016 - Science and Engineering Ethics 22 (1):293-296.
    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Appiah and the racism in his work -part 1.Dapo Ladimeji - 2019 - African Century Journal 2019 (March):1-12.
    This article’s (Part1 of a series) main focus is on a logical analysis of Appiah’s main argument that Alexander Crummell was a racist. However to show that the implicit fraudulent scholarship involved in nature of the argument is specifically racist we need to put his claimed logical argument in the context of other claims that Appiah makes in order to show that there is a pattern of fraudulent scholarship with a specifically anti African anti- Afro American animus. A (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Making matters of fraud: Sociomaterial technology in the case of Hwang and Schatten.Buhm Soon Park - 2020 - History of Science 58 (4):393-416.
    This paper revisits the “Hwang case,” which shook Korean society and the world of stem cell research in 2005 with the fraudulent claim of creating patient-specific embryonic stem cells. My goal is to overcome a human-centered, Korea-oriented narrative, by illustrating how materials can have an integral role in the construction and judgment of fraud. To this end, I pay attention to Woo Suk Hwang’s lab at Seoul National University as a whole, including human and nonhuman agents, that functioned as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Healthcare hazards and its impact on health insurance business- An overview during COVID-19.R. Latha - 2020 - Journal of Xi'an University of Architecture and Technology 12 (4):61-73.
    The present article is presenting the ‘Healthcare Hazards and Its Impact on Health Insurance Business – An Overview during COVID-19’. The present paper studied the health insurance, health insurance plans in India, Indian market size, health care industry, government actions for the COVID-19, and healthcare business in India, private health insurance in India, hazardous of the healthcare industry and health insurances, and Indian healthcare issues in 2019. The author has concluded that all insurance policies are levied higher taxes by the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. How to Move From Romanticism to Post-Romanticism: Schelling, Heine, Hegel.Terry Pinkard - 2010 - European Romantic Review 21 (3):391-407.
    Kant’s conception of nature’s having a “purposiveness without a purpose” was quickly picked by the Romantics and made into a theory of art as revealing the otherwise hidden unity of nature and freedom. Other responses (such as Hegel’s) turned instead to Kant’s concept of judgment and used this to develop a theory that, instead of the Romantics’ conception of the non-discursive manifestation of the absolute, argued for the discursively articulable realization of conceptual truths. Although Hegel did not argue for the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  16
    The Role of Artificial Intelligence in Enhancing Automated Threat Hunting 1Mr.Sidharth Sharma.Sharma Sidharth - 2016 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-6.
    An increasing number of enterprises are using artificial intelligence (AI) to improve their cyber security and threat intelligence. AI is a type of AI that generates new data independently of preexisting data or expert knowledge. One emerging cyberthreat to systems that has been increasing is adversarial attacks. By generating fictitious accounts and transactions, adversarial attacks can interfere with and take advantage of decentralized apps that operate on the Ethereum network. Because fraudulent materials (such as accounts and transactions) used as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Al-Makhtoobah: A Master Piece of Syed Ehtisham Ahmad Nadvi.Abu Nazat Sayful Haque - 2013 - Pratidhwani the Echo.
    Al-Makhtoobah (The fiancé), a social-realistic drama that can be claimed as the first drama to make a mark in Indian Arabic literature published in 2009 by Syed Ehtisham Ahmad Nadvi, depicts generally a vivid picture of Indian Muslim society and some unwelcomed marital issues especially, in the form of dialogue. Al-Makhtoobah, is a tragedy in manners turning round the pertinacious attempts of a young girl to pass her life with her drunkard irresponsible husband. Before marriage, her rich parents were in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. What's in a Name? Legal Fictions and Philosophical Fictionalism.Luft Constantin - 2024 - Law and Literature 2:1-22.
    This paper uses analytic philosophy to prevent merely verbal disputes about the concept of fiction within discussions on fictiones iuris. It provides a survey of potentially fruitful connections between legal fictions and fictionalism. More specifically, I will argue that by enriching current accounts of legal fictions in legal theory with insights from (1) the philosophy of language on fictional speech and from (2) contemporary metaphysics on philosophical fictionalism, it seems natural to explore the position that talk involving fictiones iuris is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Paintings Can Be Forged, But Not Feeling.Toan Manh Ho - 2018 - Arts 7:62.
    A work of Vietnamese art crossed the million-dollar mark in the international art market in early 2017. The event was reluctantly seen as a sign of maturity for Vietnamese art amidst many problems. Even though the media in Vietnam has discussed the problems enthusiastically, there is a lack of literature from Vietnamese academics on the subject, especially from the market perspective. This paper aims to contribute an insightful perspective on the Vietnamese art market through the lens of art frauds. Thirty-five (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. A Critical Analysis of Falsification as Fraud.La Shun L. Carroll - 2024 - Ethics in Progress 15 (1):174-206.
    This paper critically evaluates the classification of research-related fraudulent activities, with an emphasis on the specific misconduct falsification. The analysis begins by interrogating the assumption that all acts of fraud in research are intentional, suggesting that some instances may inadvertently arise during the course of scholarly activities. Misconducts like fabrication and falsification are categorized as fraudulent primarily due to their generation during research activities and their direct contribution to the distortion of scientific knowledge. Plagiarism, while deceptive, does not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  45
    Credit Card Fraud Detection _System using Machine Learning (13th edition).Sree C. Uma - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 13 (12):1758-1760. Translated by Sree C Uma.
    Credit card fraud has become a significant challenge in the financial sector. The use of machine learning techniques has shown promising results in detecting fraudulent transactions efficiently. This paper discusses the implementation of a credit card fraud detection system using various machine learning algorithms, including Logistic Regression, Decision Trees, Random Forest, and Neural Networks. We evaluate the performance of these models based on accuracy, precision, recall, and F1-score.
    Download  
     
    Export citation  
     
    Bookmark  
  50.  45
    Online Voting System_ using Machine Learning (13th edition).Shubham T. Borsare Vaishnavi D. Patil - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):1129-1131. Translated by Shubham T. Borsare Vaishnavi D. Patil.
    The increasing demand for secure and efficient voting systems has led to the exploration of online voting solutions. Traditional voting methods are often vulnerable to fraud, inefficiencies, and logistical challenges. This paper presents an online voting system that leverages machine learning techniques to enhance security, accuracy, and accessibility. The system employs facial recognition for voter authentication, anomaly detection to prevent fraudulent activities, and natural language processing (NLP) for user interaction. Experimental results indicate that the proposed model provides a reliable, (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 63