Results for 'Online fraud'

981 found
Order:
  1. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  75
    Online Recruitment Fraud (ORF) Detection using Deep Learning.T. A. Krithika Dinesh Kumar V., Yuvaraj S., Vignesh Kumar R., Vijayendran S. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    : The rise of digital platforms for job recruitment has brought with it a growing threat of fraudulent job postings, undermining the trust and safety of online hiring systems. This paper proposes an advanced fraud detection system based on the ALBERT (A Lite BERT) model to identify fraudulent job postings. The system will utilize a dataset created by merging job postings from multiple sources to better capture both legitimate and fraudulent job listings. A comprehensive pre-processing pipeline, including data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Complex relationship between fraud and technology - Should we ignore or regulate online platforms? (12th edition).Jack Mark Whittaker - 2024 - Public Sector Counter Fraud Journal 1 (12):21-22.
    This short article introduces the notion that there is a historical relationship between technology and fraud, that two opposing viewpoints argue whether technology is or is not capable of harm, and lastly that platforms can in fact benefit from fraudsters operating on them parasitically.
    Download  
     
    Export citation  
     
    Bookmark  
  4. What Do We Know About Online Romance Fraud Studies? A Systematic Review of the Empirical Literature (2000 to 2021).Suleman Lazarus, Jack Whittaker, Michael McGuire & Lucinda Platt - 2023 - Journal of Economic Criminology 1 (1).
    We aimed to identify the critical insights from empirical peer-reviewed studies on online romance fraud published between 2000 and 2021 through a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol. The corpus of studies that met our inclusion criteria comprised twenty-six studies employing qualitative (n = 13), quantitative (n = 11), and mixed (n = 2) methods. Most studies focused on victims, with eight focusing on offenders and fewer investigating public perspectives. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering” (Sha Zhu Pan, 杀猪盘).Jack Whittaker, Suleman Lazarus & Taidgh Corcoran - 2024 - Journal of Economic Criminology 3.
    This is a theoretical treatment of the term "Sha Zhu Pan" (杀猪盘) in Chinese, which translates to “Pig-Butchering” in English. The article critically examines the propagation and validation of "Pig Butchering," an animal metaphor, and its implications for the dehumanisation of victims of online fraud across various discourses. The study provides background information about this type of fraud before investigating its theoretical foundations and linking its emergence to the dehumanisation of fraud victims. The analysis highlights the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  43
    Financial Fraud Detection Using Value-At-Risk with Machine Learning in Skewed Data.Bangarayyagari Nalanda, Nayakallu Sai Vaishnavi, Peddapothu Siva Mounika, Chinnapareddy Akanksha, Avula Bhavitha & Dr Dhanaraj Cheelu - 2025 - International Journal of Scientific Research in Science, Engineering and Technology 12 (3).
    The significant losses that banks and other financial organizations suffered due to new bank account (NBA) fraud are alarming as the number of online banking service users increases. The inherent skewness and rarity of NBA fraud instances have been a major challenge to the machine learning (ML) models and happen when non-fraud instances outweigh the fraud instances, which leads the ML models to overlook and erroneously consider fraud as non-fraud instances. Such errors can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):138-157.
    Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. AI-Powered Fraud Detection in Real-Time Financial Transactions.Tambi Varun Kumar - 2022 - International Journal of Research in Electronics and Computer Engineering 10 (4):148-157.
    The rapid evolution of digital banking, e-commerce, and financial technologies has led to an unprecedented volume of online financial transactions. While this digital transformation has improved convenience and efficiency, it has also exposed systems to increasingly sophisticated fraud schemes. Traditional rule-based detection methods often fall short in identifying complex and adaptive fraudulent behaviors. This paper proposes an AI-powered framework for real-time fraud detection in financial transactions, leveraging advanced machine learning and deep learning models to identify anomalies with (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  9.  59
    Machine Learning Approach for Detection of Financial Fraud Using Value at Risk.Kuppili Yasoda Krishna Bandaru Harika Hasini, Jayanthi Venkata Satya Sai Suresh Kumar, Yanagala Gowthami, Akkisetty Akash Chaithanya, Gantyada Prasanth - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    As more people utilise online banking services, the large losses that banks and other financial institutions sustained because of new bank account (NBA) fraud are concerning. Machine learning (ML) models have faced significant challenges because to the intrinsic skewness and rarity of NBA fraud cases. This occurs when the number of non-fraud instances exceeds the number of fraud instances, causing the ML models to miss and mistakenly regard fraud as non-fraud instances. Customers' confidence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  73
    “Ain’t That a Shame”: The Moral Psychology Behind Tax Evasion and Benefit Fraud.Cu Gáy - 2025 - The Bird Village.
    Why do some people bend the rules when it comes to taxes or benefits while others play by them— even when no one’s watching? A recent study by Barile, Cullis, and Jones (2025) explores this question by looking beyond financial incentives to the moral costs of fiscal crimes like tax evasion and benefit fraud.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”).Suleman Lazarus, Mark Button & Afe Adogame - 2022 - Heliyon Journal 8 (11):1-10.
    This article is about the manifestations of similarities between two seemingly distinct groups of Nigerians: cybercriminals and politicians. Which linguistic strategies do Twitter users use to express their opinions on cybercriminals and politicians? The study undertakes a qualitative analysis of ‘engaged’ tweets of an elite law enforcement agency in West Africa. We analyzed and coded over 100,000 ‘engaged’ tweets based on a component of mechanisms of moral disengagement (i.e., advantageous comparison), a linguistic device. The results reveal how respondents defend the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents.Suleman Lazarus & Geoffrey Okolorie - 2019 - Telematics and Informatics 40:14-26.
    While this article sets out to advance our knowledge about the characteristics of Nigerian cybercriminals (Yahoo-Boys), it is also the first study to explore the narratives of the Economic and Financial Crimes Commission (EFCC) officers concerning them. It appraises symbolic interactionist insights to consider the ways in which contextual factors and worldview may help to illuminate officers’ narratives of cybercriminals and the interpretations and implications of such accounts. Semi-structured interviews of forty frontline EFCC officers formed the empirical basis of this (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Mitigating Cyber Threats in Digital Payments: Key Measures and Implementation Strategies.Tripathi Praveen - 2024 - International Journal of Scientific Research and Engineering Trends 10 (5):1788-1791.
    This paper examines the increasing importance of robust cybersecurity measures in the digital payments industry. As the volume and value of online financial transactions continue to grow exponentially, the sector faces a corresponding surge in cyber-attacks, necessitating advanced cybersecurity protocols. This study explores key cybersecurity measures and implementation strategies, including encryption, multi-factor authentication (MFA), tokenization, artificial intelligence (AI)- based fraud detection, and regulatory compliance, to safeguard digital payments against various cyber threats. Through a detailed review of existing literature, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  14. Just married: the synergy between feminist criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐ (...), revenge porn, and cyber‐stalking to demonstrate that who is victimised, why, and to what effect are the critical starting points for the analysis of the connections between gender and crimes. In turn, it uses the lens of intersectionality to acknowledge that, while conceptions of gender and crime interact, they intersect with other categories (e.g., sexuality) to provide additional layers of explanation. To nuance the utilitarian value of the synergy between the TCF and the feminist perspectives, the focus shifts to a recent case study (which compared socioeconomic and psychosocial cybercrimes). The article concludes that, while online and offline lives are inextricably intertwined, the victimisations in psychosocial cybercrimes may be more gendered than in socioeconomic cybercrimes. These contributions align the TCF to the feminist epistemology of crime in their attempt to move gender analysis of digital crimes “from margin to centre”. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  15. How AI Can Implement the Universal Formula in Education and Leadership Training.Angelito Malicse - manuscript
    How AI Can Implement the Universal Formula in Education and Leadership Training -/- If AI is programmed based on your universal formula, it can serve as a powerful tool for optimizing human intelligence, education, and leadership decision-making. Here’s how AI can be integrated into your vision: -/- 1. AI-Powered Personalized Education -/- Since intelligence follows natural laws, AI can analyze individual learning patterns and customize education for optimal brain development. -/- Adaptive Learning Systems – AI can adjust lessons in real (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Dangers of Unfiltered Social Media: A Threat to Society.Angelito Malicse - manuscript
    The Dangers of Unfiltered Social Media: A Threat to Society -/- Introduction -/- In the digital age, social media has revolutionized communication, providing an open platform for information sharing, networking, and public discourse. However, the lack of a comprehensive filtering mechanism on social media apps poses significant risks to individuals and society as a whole. Without proper content moderation, social media can become a breeding ground for misinformation, manipulation, social division, and various forms of harm. This essay explores the dangers (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  82
    Preventing Election Manipulation: Safeguards Against Propaganda and Hidden Motives.Angelito Malicse - manuscript
    Preventing Election Manipulation: Safeguards Against Propaganda and Hidden Motives -/- Elections are the foundation of democratic governance, ensuring that leadership reflects the will of the people. However, history has repeatedly shown that candidates can win by manipulating public perception through propaganda, misinformation, and by hiding their true motives. While such elections may be technically valid, they often lack ethical legitimacy, leading to governance that does not truly serve the public interest. To prevent election manipulation, societies must implement strong safeguards, including (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  50
    BLOCKCHAIN-INTEGRATED PAYMENT GATEWAYS FOR SECURE DIGITAL BANKING.Tambi Varun Kumar - 2019 - International Journal of Current Engineering and Scientific Research (IJCESR) 6 (11):50-62.
    The evolution of digital banking has led to increased adoption of online payment gateways, offering speed and convenience but also exposing financial systems to growing security risks. Conventional centralized payment systems often face challenges such as data breaches, fraud, single points of failure, and lack of transparency. To address these issues, blockchain technology presents a transformative approach by introducing decentralized, tamper-proof, and auditable transaction systems. This paper explores the integration of blockchain into payment gateways within the digital banking (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. The opportunities and challenges of blockchain in the fight against government corruption.Nikita Aggarwal & Luciano Floridi - 2018 - 19th General Activity Report (2018) of the Council of Europe Group of States Against Corruption (GRECO).
    Broadly defined, government corruption is the abuse of public power for private gain. It can assume various forms, including bribery, embezzlement, cronyism, and electoral fraud. At root, however, government corruption is a problem of trust. Corrupt politicians abuse the powers entrusted to them by the electorate (the principal-agent problem). Politicians often resort to corruption out of a lack of trust that other politicians will abstain from it (the collective action problem). Corruption breeds greater mistrust in elected officials amongst the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The necessity of air pollution reduction for an ethically conscious society.Thien-Vu Tran - 2024 - Sm3D Portal.
    Air pollution is a pressing global issue, demanding swift and practical solutions across nations. Polluted air is not only harmful to physical health but also to mental well-being. Research has consistently shown that air pollution is linked to respiratory and cardiovascular problems, both in the short and long term. Short-term effects include coughing, asthma, and difficulty breathing, while long-term exposure can lead to chronic asthma, impaired lung function, cardiovascular diseases, and even death. Beyond physical health, air pollution can also negatively (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. A Thought of Legal Research with Examples and Demonstrations.Kiyoung Kim - 2015 - SSRN.
    The policy makers or lawyers may face the need of legal research for reasons. The congressmen may plan to make new laws to address the challenges of their constituent or to the interest of nation. The lawyers may need to serve their clients who like to know the legal issues involved, the strategies to deal with their loss and recovery, and prospect for winning the case if the dispute has gotten worse. The lawyers may practice in a solo business or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Văn minh làm giàu từ góc nhìn của một người Việt.Dân-Trí Online - 2007 - Dân Trí Online.
    (Dân trí) - Bạn hãy thử hình dung một bức tranh thể hiện hình ảnh một thương gia cưỡi một chú lạc đà. Dưới chân họ chỉ có cát nóng bỏng của sa mạc khô cằn, phía sau lưng họ là ánh mặt trời chói lòa, bỏng rát. Hai bên đường chỉ có sương rồng gai góc, như biểu trưng cho hành trình vất vả đầy chông gai. Một điều gây bất ngờ: chú lạc đà lại kéo theo một chiếc (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Encountering Evil: The Evil-god Challenge from Religious Experience.Asha Lancaster-Thomas - 11th July Online - European Journal for Philosophy of Religion 12 (3):0-0.
    It is often thought that religious experiences provide support for the cumulative case for the existence of the God of classical monotheism. In this paper, I formulate an Evil-god challenge that invites classical monotheists to explain why, based on evidence from religious experience, the belief in an omnipotent, omniscient, omnibenevolent god is significantly more reasonable than the belief in an omnipotent, omniscient, evil god. I demonstrate that religious experiences substantiate the existence of Evil-god more so than they do the existence (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Racial Fraud and the American Binary.Kevin J. Harrelson - 2022 - Eidos. A Journal for Philosophy of Culture 6 (3):44-61.
    In response to recent controversies about racial transitioning, I provide an argument that deceptions about ancestry may sometimes constitute fraud. In order to arrive at this conclusion, I criticize the arguments from analogy made famous by Rebecca Tuvel and Christine Overall. My claim is that we should not think of racial transitioning as similar to gender transitioning, because different identity groups possess different kinds of obstacles to entry. I then provide historical surveys of American racial categories and the various (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A FRAUD PREVENTION POLICY: ITS RELEVANCE AND IMPLICATION AT A UNIVERSITY OF TECHNOLOGY IN SOUTH AFRICA.Amelia Rorwana, Robertson K. Tengeh & Tichaona B. Musikavanhu - 2015 - Journal of Governance and Regulation 4 (3):212-221.
    Using research grants administrators and their clients (academic researchers) as the lens, this paper investigated the relevance and implication of a fraud prevention policy at a University of Technology (UoT) in South Africa. The paper adopted a quantitative approach in which closed-ended questions were complemented by open-ended questions in the survey questionnaire in the attempt to capture the perceptions of both research grants administrators and their clients on the relevance and implications of a fraud and irregularity prevention policy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  67
    Leveraging AI for Fraud Detection and Prevention in Insurance Claims.Pasam Thulasiram Prasad - 2023 - International Journal of Enhanced Research in Science, Technology and Engineering 12 (11):118-127.
    The research examines the way artificial intelligence can be used to identify fraud in insurance. It assesses the accuracy of various machine learning models with specific emphasis on their capability of recognizing fake claims. It is discovered that the model is successful in determining authentic claims. It is not particularly excellent at detecting fraudulent activity, indicating the need for development. Mitigating data imbalance and investigating hybrid AIrule-based systems are recommended to enhance model accuracy. It also highlights the need for (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Online Misinformation and “Phantom Patterns”: Epistemic Exploitation in the Era of Big Data.Megan Fritts & Frank Cabrera - 2021 - Southern Journal of Philosophy 60 (1):57-87.
    In this paper, we examine how the availability of massive quantities of data i.e., the “Big Data” phenomenon, contributes to the creation, spread, and harms of online misinformation. Specifically, we argue that a factor in the problem of online misinformation is the evolved human instinct to recognize patterns. While the pattern-recognition instinct is a crucial evolutionary adaptation, we argue that in the age of Big Data, these capacities have, unfortunately, rendered us vulnerable. Given the ways in which (...) media outlets profit from the spread of misinformation by preying on this pattern-finding instinct, we conceptualize the problem that we identify as a morally objectionable form of “epistemic exploitation.” As we argue, the consumer of digital misinformation is often exploited by having her pattern-recognition instinct used against her. This exploitation is morally objectionable because it deprives her of an epistemic good to which she has a right. This epistemic good is the integrity of the pattern-recognition instinct itself which, we argue, is a capacity that allows us to participate in uniquely human goods. While our primary goal is to bring attention to this form of epistemic exploitation, we conclude by briefly evaluating some general solutions to the growing problem of online misinformation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  30. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Integrated SVM-FFNN for Fraud Detection in Banking Financial Transactions (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):12-25.
    Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation utilizing labeled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Online Intellectual Virtues and the Extended Mind.Lukas Schwengerer - 2021 - Social Epistemology 35 (3):312-322.
    The internet has become an ubiquitous epistemic source. However, it comes with several drawbacks. For instance, the world wide web seems to foster filter bubbles and echo chambers and includes search results that promote bias and spread misinformation. Richard Heersmink suggests online intellectual virtues to combat these epistemically detrimental effects . These are general epistemic virtues applied to the online environment based on our background knowledge of this online environment. I argue that these online intellectual virtues (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  33. (Online) Manipulation: Sometimes Hidden, Always Careless.Michael Klenk - forthcoming - Review of Social Economy.
    Ever-increasing numbers of human interactions with intelligent software agents, online and offline, and their increasing ability to influence humans have prompted a surge in attention toward the concept of (online) manipulation. Several scholars have argued that manipulative influence is always hidden. But manipulation is sometimes overt, and when this is acknowledged the distinction between manipulation and other forms of social influence becomes problematic. Therefore, we need a better conceptualisation of manipulation that allows it to be overt and yet (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  34. Free online services: enabling, disenfranchising, disempowering.Luciano Floridi - 2015 - Philosophy and Technology 28 (2):163-166.
    Free online services have become an essential part of onlife experience in the digital society. And yet, such digital gifts can be argued to represent a modern-day Trojan horse. This paper advances the theory that, far from being “free”, the digital gift economy disempowers and disenfranchises users, eroding privacy and promoting inequality. It concludes that what is needed to improve the situation is better taxation and stricter regulation of the advertising industry.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Data frauds, health risks, and the growing question of ethics during the COVID-19 pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  36. Online Deliberation and #CivicTech: A Symposium.Weiyu Zhang, Todd Davies & Anna Przybylska - 2021 - Journal of Deliberative Democracy 17 (1):76-77.
    Online deliberation is one important instance of civic tech that is both for and by the citizens, through engaging citizens in Internet-supported deliberative discussions on public issues. This article explains the origins of a set of symposium articles in this journal issue based on the 2017 'International Conference on Deliberation and Decision Making: Interdisciplinary Perspectives on Civic Tech' held in Singapore. Symposium articles are presented in a sequence that flows from designing decision making systems to platforms to specific technological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Online Shaming.Kathryn J. Norlock - 2017 - Social Philosophy Today 33:187-197.
    Online shaming is a subject of import for social philosophy in the Internet age, and not simply because shaming seems generally bad. I argue that social philosophers are well-placed to address the imaginal relationships we entertain when we engage in social media; activity in cyberspace results in more relationships than one previously had, entailing new and more responsibilities, and our relational behaviors admit of ethical assessment. I consider the stresses of social media, including the indefinite expansion of our relationships (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  38. Utilising online eye-tracking to discern the impacts of cultural backgrounds on fake and real news decision-making.Amanda Brockinton, Sam Hirst, Ruijie Wang, John McAlaney & Shelley Thompson - 2022 - Frontiers in Psychology 13:999780.
    Introduction: Online eye-tracking has been used in this study to assess the impacts of different cultural backgrounds on information discernment. An online platform called RealEye allowed participants to engage in the eye-tracking study from their personal computer webcams, allowing for higher ecological validity and a closer replication of social media interaction. -/- Methods: The study consisted of two parts with a total of five visuals of social media posts mimicking news posts on Twitter, Instagram, and Facebook. Participants were (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Belonging Online: Rituals, Sacred Objects, and Mediated Interations.Lucy Osler - forthcoming - In Luna Dolezal & Danielle Petherbridge, Phenomenology of Belonging.
    In this chapter, I explore how experiences of social belonging might emerge and be sustained in online communities, drawing from the work on rituals by Randall Collins. I argue that rather than viewing mediated interactions in terms of whether they are suitable substitutes for face-to-face interactions, we should consider mediated encounters in their own right. This allows us to recognize the creative ways that people can create rituals in a mediated setting and thus support and create a sense of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Online Communication Tools in Teaching Foreign Languages for Education Sustainability.Anna Shutaleva - 2021 - Sustainability 13:11127.
    Higher education curricula are developed based on creating conditions for implementing many professional and universal competencies. In Russia, one of the significant competencies for a modern specialist is business communication in oral and written forms in the Russian language and a foreign language. Therefore, teaching students to write in a foreign language is one of the modern requirements for young specialists’ professional training. This article aimed to study the tools of online communication that are used in teaching foreign languages. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Amidst the Online Learning Modality: The Social Support and Its Relationship to the Anxiety of Senior High School Students.Jastine Joy Basilio, Twinkle Pangilinan, Jeremiah Joy Kalong & Jhoselle Tus - 2022 - Psychology Abd Education: A Multidisciplinary Journal 1 (1):1-6.
    Senior high school is known to be part of the newly implemented K-12 program in the Philippines' educational system. Hence, this program added two years to the academic learning program of students, which mainly focuses on different theoretical and vocational strands that aim to prepare and fully furnish the students for education and employment in the future. Due to adjustments to new online learning amidst the pandemic, students begin to experience various challenges, primarily social support and mental well-being. Hence, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  42. Online Sellers' Lived Experiences and Challenges: A Qualitative Study Amidst COVID-19 Pandemic.Rhoyet Cruz, Eden Joy Frontuna, Lauren Grace Tabieros, Janz Glenn Lanozo, Ernest John Deato & Jhoselle Tus - 2022 - Psychology and Education: A Multidisciplinary Journal 12 (1):59-105.
    With the surge of the COVID-19 pandemic, online sellers faced challenges in managing their online business daily. Aside from it, their work-life balance has been negatively affected as well, considering that they work from home and are responsible for household responsibilities. Thus, this study is conducted during the pandemic and gathered data using a semi-structured interview through Messenger call. It is conducted to explore the lived experiences of online sellers and how they managed their online business (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Taking Watsuji online: Betweenness and expression in online spaces.Lucy Osler & Joel Krueger - 2021 - Continental Philosophy Review (1):1-23.
    In this paper, we introduce the Japanese philosopher Tetsurō Watsuji’s phenomenology of aidagara (“betweenness”) and use his analysis in the contemporary context of online space. We argue that Watsuji develops a prescient analysis anticipating modern technologically-mediated forms of expression and engagement. More precisely, we show that instead of adopting a traditional phenomenological focus on face-to-face interaction, Watsuji argues that communication technologies — which now include Internet-enabled technologies and spaces — are expressive vehicles enabling new forms of emotional expression, shared (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  44. Online Public Shaming: Virtues and Vices.Paul Billingham & Tom Parr - 2020 - Journal of Social Philosophy 51 (3):371-390.
    We are witnessing increasing use of the Internet, particular social media, to criticize (perceived or actual) moral failings and misdemeanors. This phenomenon of so-called ‘online public shaming’ could provide a powerful tool for reinforcing valuable social norms. But it also threatens unwarranted and severe punishments meted out by online mobs. This paper analyses the dangers associated with the informal enforcement of norms, drawing on Locke, but also highlights its promise, drawing on recent discussions of social norms. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  45. Harnessing AI and Business Rules for Financial Transactions: Addressing Fraud and Security Challenges.Palakurti Naga Ramesh - 2024 - Esp International Journal of Advancements in Computational Technology 2 (4):104-119.
    In today’s rapidly evolving financial landscape, the adoption of Artificial Intelligence (AI) and Machine Learning (ML) technologies, coupled with the deployment of Business Rules Management Systems (BRMS), has transformed how financial transactions are conducted, monitored, and secured. With fraud, particularly in check deposit transactions, becoming increasingly sophisticated, financial institutions are turning to AI and ML to enhance their risk management strategies. This paper explores the integration of AI-driven models and business rules in financial transactions, focusing on their application in (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  46. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality of the information (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Minds Online: The Interface between Web Science, Cognitive Science, and the Philosophy of Mind.Paul Smart, Robert William Clowes & Richard Heersmink - 2017 - Foundations and Trends in Web Science 6 (1-2):1-234.
    Alongside existing research into the social, political and economic impacts of the Web, there is a need to study the Web from a cognitive and epistemic perspective. This is particularly so as new and emerging technologies alter the nature of our interactive engagements with the Web, transforming the extent to which our thoughts and actions are shaped by the online environment. Situated and ecological approaches to cognition are relevant to understanding the cognitive significance of the Web because of the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  48. Online update: Temporal, modal, and de se anaphora in polysynthetic discourse.Maria Bittner - 2007 - In Chris Barker & Pauline I. Jacobson, Direct compositionality. New York: Oxford University Press. pp. 11--363.
    This paper introduces a framework for direct surface composition by online update. The surface string is interpreted as is, with each morpheme in turn updating the input state of information and attention. A formal representation language, Logic of Centering, is defined and some crosslinguistic constraints on lexical meanings and compositional operations are formulated.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  49.  61
    Predicting the Fraud in Auto Insurance Claims.V. Kanchana D. Chanikya Varma, D. Deepak, D. Sai Nithin, E. Narotham Reddy - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9231-9234.
    The auto insurance industry is plagued by fraudulent claims, resulting in significant financial losses and increased premiums for policyholders. To combat this issue, insurers are turning to advanced analytics and machine learning techniques to identify and prevent fraudulent activity. By analyzing a vast array of data points, including claimant information, vehicle details, and accident reports, insurers can build predictive models that detect patterns and anomalies indicative of fraud. These models can identify red flags such as inconsistent or suspicious claims, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Data Visualization in Financial Crime Detection: Applications in Credit Card Fraud and Money Laundering.Palakurti Naga Ramesh - 2023 - International Journal of Management Education for Sustainable Development 6 (6).
    This research paper investigates the transformative applications of data visualization techniques in the realm of financial crime detection, with a specific emphasis on addressing the challenges posed by credit card fraud and money laundering. The abstract explores the intricate landscape of visualizing financial data to uncover patterns, anomalies, and potential illicit activities. Through a comprehensive review of existing methodologies and case studies, the paper illuminates the pivotal role data visualization plays in enhancing the efficiency and accuracy of fraud (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 981