Results for 'fraud'

45 found
Order:
  1. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case Study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  30
    Principlist Pandemics: On Fraud Ethical Guidelines and the Importance of Transparency.Jonathan Lewis & Udo Schuklenk - forthcoming - In Michael Boylan (ed.), Ethical Public Health Policy Within Pandemics. Cham: Springer.
    The COVID-19 pandemic has coincided with the proliferation of ethical guidance documents to assist public health authorities, health care providers, practitioners and staff with responding to ethical challenges posed by the pandemic. Like ethical guidelines relating to infectious disease that have preceded them, what unites many COVID-19 guidance documents is their dependency on an under-developed approach to bioethical principlism, a normative framework that attempts to guide actions based on a list of prima facie, unranked ethical principles. By situating them in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  17
    Data Frauds, Health Risks, and the Growing Question of Ethics During the COVID-19 Pandemic.Vuong Quan-Hoang, Le Tam-Tri & Nguyen Minh-Hoang - manuscript
    In this essay, we advocate that the issue of health data ethics should no longer be considered on the level of individual scientists or research labs, but rather as a problem involving all stakeholders, from publishers, funders, ethical committees to governments, for the sake of research integrity.
    Download  
     
    Export citation  
     
    Bookmark  
  4. In Support of Fraud Trials Without a Jury.Sally Ramage - 2005 - The Criminal Lawyer 156:2-52.
    The United Kingdom's Parliamentary Bill 'Fraud Trials (Without a Jury) 2007', failed. Nevertheless, fraud trials without a jury do take place and there is much evidence to support this.
    Download  
     
    Export citation  
     
    Bookmark  
  5.  75
    Quote- and Citation Fraud at the UiO, Chapter 2; with 'The Learning of Value' and the Connection to Mob-Bullying in Our Schools (by Dr. Kai Sørfjord) 2016.Kai Soerfjord - unknown
    Download  
     
    Export citation  
     
    Bookmark  
  6.  67
    Quote- and Citation fraud at the University of Oslo (UiO), Chapter 2.Kai Soerfjord - manuscript
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  7. How to Discriminate Between Experts and Frauds: Some Problems for Socratic Peirastic.Jyl Gentzler - 1995 - History of Philosophy Quarterly 12 (3):227 - 246.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  8.  31
    Voodoo Science: The Road From Foolishness to Fraud.Luciano Floridi - 2001 - In Times Literary Supplement.
    This article is a review of R.L Park's Voodoo Science: The Road from Foolishness to Fraud.
    Download  
     
    Export citation  
     
    Bookmark  
  9. Birds of a Feather Flock Together: The Nigerian Cyber Fraudsters (Yahoo Boys) and Hip Hop Artists.Suleman Lazarus - 2018 - Criminology, Criminal Justice, Law and Society 19 (2):63-80.
    This study sets out to examine the ways Nigerian cyber-fraudsters (Yahoo-Boys) are represented in hip-hop music. The empirical basis of this article is lyrics from 18 hip-hop artists, which were subjected to a directed approach to qualitative content analysis and coded based on the moral disengagement mechanisms proposed by Bandura (1999). While results revealed that the ethics of Yahoo-Boys, as expressed by musicians, embody a range of moral disengagement mechanisms, they also shed light on the motives for the Nigerian cybercriminals' (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  10. Disclosure and Consent to Medical Research Participation.Danielle Bromwich & Joseph Millum - 2013 - Journal of Moral Philosophy 10 (4):195-219.
    Most regulations and guidelines require that potential research participants be told a great deal of information during the consent process. Many of these documents, and most of the scholars who consider the consent process, assume that all this information must be disclosed because it must all be understood. However, a wide range of studies surveying apparently competent participants in clinical trials around the world show that many do not understand key aspects of what they have been told. The standard view (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  11. Case Analysis: Enron; Ethics, Social Responsibility, and Ethical Accounting as Inferior Goods?Rashid Muhammad Mustafa - 2020 - Journal of Economics Library 7 (2):98-105.
    In 2001 soon after the Asian Crises of 1997-1998, the DotcomBubble, 9/11, the Enron crises triggered a fraud crisis in Wall Street that impacted the market to the core. Since then scandals such as the Lehman Brothers and WorldCom in 2007-2008 and the Great Recession have surpassed it, Enron still remains one of the most important cases of fraudulent accounting. In 2000’s even though the financial industry had become highly regulated, deregulation of the energy industry allowed companies to place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2020 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  13. Just Married: The Synergy Between Feminist Criminology and the Tripartite Cybercrime Framework.Suleman Lazarus - 2019 - International Social Science Journal 69 (231):15-33.
    This article is a theoretical treatment of feminist epistemology of crime, which advocates the centrality of gender as a theoretical starting point for the investigating of digital crimes. It does so by exploring the synergy between the feminist perspectives and the Tripartite Cybercrime Framework (TCF) (which argues that three possible factors motivate cybercrimes – socioeconomic, psychosocial, and geopolitical) to critique mainstream criminology and the meaning of the term “cybercrime”. Additionally, the article examines gender gaps in online harassment, cyber‐bullying, cyber‐fraud, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  50
    Institutional Degeneration of Science.Jüri Eintalu - 2021 - Philosophy Study 11 (2):116-123.
    The scientificity of the research should be evaluated according to the methodology used in the study. However, these are usually the research areas or the institutions that are classified as scientific or non-scientific. Because of various reasons, it may turn out that the scientific institutions are not producing science, while the “non-scientists” are doing real science. In the extreme case, the official science system is entirely corrupt, consisting of fraudsters, while the real scientists have been expelled from academic institutions. Since (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Not What I Agreed To: Content and Consent.Emily C. R. Tilton & Jonathan Jenkins Ichikawa - 2021 - Ethics 132 (1):127–154.
    Deception sometimes results in nonconsensual sex. A recent body of literature diagnoses such violations as invalidating consent: the agreement is not morally transformative, which is why the sexual contact is a rights violation. We pursue a different explanation for the wrongs in question: there is valid consent, but it is not consent to the sex act that happened. Semantic conventions play a key role in distinguishing deceptions that result in nonconsensual sex (like stealth condom removal) from those that don’t (like (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  85
    Consumer Boycotts as Instruments for Structural Change.Valentin Beck - 2019 - Journal of Applied Philosophy 36 (4):543-559.
    Consumer boycotts have become a frequent form of social protest in the digital age. The corporate malpractices motivating them are varied, including environmental pollution, lack of minimum labour standards, severe mistreatment of animals, lobbying and misinformation campaigns, collaboration or complicity with illegitimate political regimes, and systematic tax evasion and tax fraud. In this article, I argue that organised consumer boycotts should be regarded as a legitimate and purposeful instrument for structural change, provided they conform to a number of normative (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Theories of Whistleblowing.Emanuela Ceva & Michele Bocchiola - 2019 - Philosophy Compass 15 (1).
    Whistleblowing” has entered the scholarly and the public debate as a way of describing the exposure by the member of an organization of episodes of corruption, fraud, or general abuses of power within the organization. We offer a critical survey of the main normative theories of whistleblowing in the current debate in political philosophy, with the illustrative aid of one of the epitomic figures of a whistleblower of our time: Edward Snowden. After conceptually separating whistleblowing from other forms of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. The Law and Ethics of K Street: Lobbying, the First Amendment, and the Duty to Create Just Laws.Daniel T. Ostas - 2007 - Business Ethics Quarterly 17 (1):33-63.
    This article explores the law and ethics of lobbying. The legal discussion examines disclosure regulations, employment restrictions,bribery laws, and anti-fraud provisions as each applies to the lobbying context. The analysis demonstrates that given the social value placed on the First Amendment, federal law generally affords lobbyists wide latitude in determining who, what, when, where, and how to lobby.The article then turns to ethics. Lobbying involves deliberate attempts to effect changes in the law. An argument is advanced that because law (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  19. Sublimation and Affirmation in Nietzsche's Psychology.Joseph Swenson - 2014 - Journal of Nietzsche Studies 45 (2):196.
    Nietzsche informs his readers frequently and seemingly with great confidence that his most original contributions to philosophy are best understood in the context of his development of a radically new kind of psychology. In his most enthusiastic moments, he even suggests that the originality of his thinking reveals not just a very, very good psychologist at work in his writing but also something more like the invention or inauguration of the field of psychology itself. It is this inaugural sense of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. An Epistemic Advantage of Accommodation Over Prediction.Finnur Dellsén - forthcoming - Philosophers' Imprint.
    Many philosophers have argued that a hypothesis is better confirmed by some data if the hypothesis was not specifically designed to fit the data. ‘Prediction’, they argue, is superior to ‘accommodation’. Others deny that there is any epistemic advantage to prediction, and conclude that prediction and accommodation are epistemically on a par. This paper argues that there is a respect in which accommodation is superior to prediction. Specifically, the information that the data was accommodated rather than predicted suggests that the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A review on a peer review.Andrej Poleev - 2016 - Enzymes 14.
    The peer review is an opportunity to perform an unlawful censorship which ensures that no apostate notion ever get published in mainstream journals. Or such peer review censorship is an opportunity to steal any content and to claim afterward the priority of the first publication. And last but not least, the peer review is an academic tool to promote the mainstream pseudoscience.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   2 citations  
  22. The Opportunities and Challenges of Blockchain in the Fight Against Government Corruption.Nikita Aggarwal & Luciano Floridi - 2018 - 19th General Activity Report (2018) of the Council of Europe Group of States Against Corruption (GRECO).
    Broadly defined, government corruption is the abuse of public power for private gain. It can assume various forms, including bribery, embezzlement, cronyism, and electoral fraud. At root, however, government corruption is a problem of trust. Corrupt politicians abuse the powers entrusted to them by the electorate (the principal-agent problem). Politicians often resort to corruption out of a lack of trust that other politicians will abstain from it (the collective action problem). Corruption breeds greater mistrust in elected officials amongst the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Fraudulent Advertising: A Mere Speech Act or a Type of Theft?Pavel Slutskiy - unknown - Libertarian Papers 8.
    Libertarian philosophy asserts that only the initiation of physical force against persons or property, or the threat thereof, is inherently illegitimate. A corollary to this assertion is that all forms of speech, including fraudulent advertising, are not invasive and therefore should be considered legitimate. On the other hand, fraudulent advertising can be viewed as implicit theft under the theory of contract: if a seller accepts money knowing that his product does not have some of its advertised characteristics, he acquires the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Ethics of Transactions in an Unjust World.J. Millum - 2016 - In K. Zeiler & E. Malmqvist (eds.), Bioethics and Border Crossing: Perspectives on Giving, Selling and Sharing Bodies. Routledge: Oxon. pp. 185-196.
    In this paper I examine the ethics of benefit-sharing agreements between victims and beneficiaries of injustice in the context of trans-national bodily giving, selling, and sharing. Some obligations are the same no matter who the parties to a transaction are. Prohibitions on threats, fraud and harm apply universally and their application to transactions in unjust contexts is not disputed. I identify three sources of obligations that are affected by unjust background conditions. First, power disparities may illegitimately influence transactions in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  39
    Justice and the Law.Thaddeus Metz - 2004 - In Christopher Roederer & Darrel Moellendorf (eds.), Jurisprudence. Juta. pp. 382-411.
    This chapter discusses major theories of domestic justice in the context of South African Constitutional, statutory and case law. It begins by considering when it is permissible for legislators to restrict civil liberty. South Africa's Parliament has criminalised prostitution, liquor sales on Sundays and marijuana use, actions that few liberals would say should be illegal. However, South African law permits abortion, gambling and homosexual relationships, which many conservatives would criminalise. Is there any deep inconsistency here? Should South Africa become more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  34
    Review of Helfer, Socrates and Alcibiades: Plato’s Drama of Political Ambition and Philosophy. [REVIEW]Thornton C. Lockwood - 2018 - International Philosophical Quarterly 58 (1):109-110.
    Although determination, perseverance, and high expectations appear to be laudable characteristics within our society, ambition seems to carry a hint of selfishness or self-promotion (perhaps especially at the cost of others). One can speak of the goals or aims of a team or group, but it seems more characteristic to ascribe ambition to a single individual. Etymologi-cally, ambition derives from the Latin word ambire, which can mean to strive or go around (ambo + ire), but the term also characterizes one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. For Whose Benefit? Fear and Loathing in the Welfare State.Arianna Bove - 2014 - Journal of Political Marketing 13 (1-2):108-126.
    This article contributes to the debate on the relationship between marketing and propaganda through an analysis of social marketing as a mode of governing in permanent campaigning. The working hypothesis is that social marketing operations are agitational rather than propagandistic. The conceptual approach stems from a comparison of propaganda and marketing with Fordist and post-Fordist modes of production and governance. The research into the role of agitation involves an empirical study of the UK government campaign against benefit fraud, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  31
    Ferdinando Galiani, Della moneta.Sergio Volodia Marcello Cremaschi - 2000 - In Franco Volpi (ed.), Dizionario delle opere filosofiche. Milano, Italy: Bruno Mondadori. pp. 405.
    Galiani discusses a subject much debated in the eighteenth century, namely, the nature of the currency. He also includes considerations of economic theory and political philosophy around the main motif. He supports the following theses of monetary theory: currency has the function of a sort of register of credits that every individual can have towards the warehouses of goods of which the society is supplied, and precisely in the measure of the contribution he has given to their supply; the metallic (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  29. Peer Review System: A Golden Standard for Publications Process.Shamima Parvin Lasker - 2018 - Bangladesh Journal of Bioethics 9 (1):13-23.
    Peer review process helps in evaluating and validating of research that is published in the journals. U.S. Office of Research Integrity reported that data fraudulence was found to be involved in 94% cases of misconduct from 228 identified articles between 1994–2012. If fraud in published article are significantly as high as reported, the question arise in mind, were these articles peer reviewed? Another report said that the reviewers failed to detect 16 cases of fabricated article of Jan Hendrick Schon. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  14
    Financial Gerontology.Erik Selecky & Andrzej Klimczuk - 2021 - In Danan Gu & Matthew E. Dupre (eds.), Encyclopedia of Gerontology and Population Aging. Springer Verlag. pp. 1861–1864.
    Financial gerontology can be defined as investigating relations between finances and aging. Authors such as Neal E. Cutler, Kouhei Komamura, Davis W. Gregg, Shinya Kajitani, Kei Sakata, and Colin McKenzie affirm that financial literacy is an effect of aging with concern about the issue of finances, as well as stating that it is the effect of longevity and aging on economies or the financial resilience of older people.
    Download  
     
    Export citation  
     
    Bookmark  
  31.  18
    The Use of Confidentiality and Anonymity Protections as a Cover for Fraudulent Fieldwork Data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, however, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. BELLE- LORD MANSFIELD'S GREAT-NIECE.Sally Ramage - forthcoming - Criminal Law News (85).
    This is the review of a book by Paula Byrne on Lord Mansfield's great-niece whom he raised as his own daughter. Lord Mansfield was the Lord Chief Justice of England in the Eighteenth Century. The child was brought to him as an infant and grew up to become what we would today term his paralegal clerk in his Library at Kenwood House. His great-niece was the child of a black slave and his sister's son, Sir John Lindsay. This is also (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  33. Sex By Deception.Berit Brogaard - forthcoming - In John M. Doris & Manuel Vargas (eds.), Oxford Handbook of Moral Psychology. Oxford: Oxford University Press.
    In this paper I will use sex by deception as a case study for highlighting some of the most tricky concepts around sexuality and moral psychology, including rape, consensual sex, sexual rights, sexual autonomy, sexual individuality, and disrespectful sex. I begin with a discussion of morally wrong sex as rooted in the breach of five sexual liberty rights that are derived from our fundamental human liberty rights: sexual self-possession, sexual autonomy, sexual individuality, sexual dignity and sexual privacy. I then argue (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. U.S.Justice Department Announces Global Resolution of Criminal and Civil Investigations with Opioid Manufacturer Purdue Pharma and Civil Settlement with Members of the Sackler Family.Ramage Sally - forthcoming - Criminal Law News:17-24.
    Purdue Pharma was being investigated by United States Civil and Criminal compliance agencies for many years and a conclusion has now been reached. Although successful , this author feels that such extremely serious corporate frauds must also punish senior individual executives with long jail sentences -in this case-corporate manslaughter.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Information Theory is Abused in Neuroscience.Lance Nizami - 2019 - Cybernetics and Human Knowing 26 (4):47-97.
    In 1948, Claude Shannon introduced his version of a concept that was core to Norbert Wiener's cybernetics, namely, information theory. Shannon's formalisms include a physical framework, namely a general communication system having six unique elements. Under this framework, Shannon information theory offers two particularly useful statistics, channel capacity and information transmitted. Remarkably, hundreds of neuroscience laboratories subsequently reported such numbers. But how (and why) did neuroscientists adapt a communications-engineering framework? Surprisingly, the literature offers no clear answers. To therefore first answer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. MANDELA's LEGACY FOR EDUCATIONAL TRANSFORMATION IN NIGERIA.Obongha Osam Obongha - 2018 - Journal of Rare Ideas 1 (1).
    This paper examines the idea of adopting Nelson Mandela’s educational transformation initiatives as a blue print for educational transformation in Nigeria. The work considers these initiatives in three key areas, namely, his human centered education, the critical inclusive basic education strategy which he recommended for his ANC (Transvaal) Congress in 1953 and institutionalized in South Africa, and his large-scale educational transformation initiatives using the Teachers Rationalization Initiative (TRI) respectively. The work argues that of the many challenges facing educational development in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. A Thought of Legal Research with Examples and Demonstrations.Kiyoung Kim - 2015 - SSRN.
    The policy makers or lawyers may face the need of legal research for reasons. The congressmen may plan to make new laws to address the challenges of their constituent or to the interest of nation. The lawyers may need to serve their clients who like to know the legal issues involved, the strategies to deal with their loss and recovery, and prospect for winning the case if the dispute has gotten worse. The lawyers may practice in a solo business or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Establishing the Particularities of Cybercrime in Nigeria: Theoretical and Qualitative Treatments.Suleman Lazarus - 2020 - Dissertation, University of Portsmouth
    This thesis, which is based on six peer-reviewed publications, is a theoretical and qualitative treatment of the ways in which social and contextual factors serve as a resource for understanding the particularities of ‘cybercrime’ that emanates from Nigeria. The thesis illuminates how closer attention to Nigerian society aids the understanding of Nigerian cybercriminals (known as Yahoo Boys), their actions and what constitutes ‘cybercrime’ in a Nigerian context. ‘Cybercrime’ is used in everyday parlance as a simple acronym for all forms of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Pandemic Economic Crisis: Essence, Reasons, Comparative Characteristics, Opportunities.Igor Britchenko & Maksym Bezpartochnyi - 2020 - In M. Bezpartochnyi (ed.), New trends in the economic systems management in the context of modern global challenges.
    Before pandemic the world economy had a pre-crisis situation which was characterized by unprecedented imbalances in the global financial and economic system, the lack of growth in world GDP, which posed a real threat to the world economic order. Almost all global analysts predicted a global economic crisis at the end of 2019. For the first time since time immemorial, bank interest rates in all countries have dropped to unprecedented low levels. Often interest rates were 0% or even negative. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  39
    An Unattractive Hypothesis – RCTs' Descent to Non-Science.Clifford Miller - 2011 - International Journal of Person Centered Medicine 1 (4):841-842.
    Eyal Shahar’s essay review [1] of James Penston’s remarkable book [2] seems more inspired playful academic provocation than review or essay, expressing dramatic views of impossible validity. The account given of modern biostatistical causation reveals the slide from science into the intellectual confusion and non-science RCTs have created: “…. the purpose of medical research is to estimate the magnitude of the effect of a causal contrast, for example the probability ratio of a binary outcome …” But Shahar’s world is simultaneously (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. A Survey of Business Intelligence Solutions in Banking Industry and Big Data Applications.Elaheh Radmehr & Mohammad Bazmara - 2017 - International Journal of Mechatronics, Electrical and Computer Technology 7 (23):3280-3298.
    Nowadays, the economic and social nature of contemporary business organizations chiefly banks binds them to face with the sheer volume of data and information and the key to commercial success in this area is the proper use of data for making better, faster and flawless decisions. To achieve this goal organizations requires strong and effective tools to enable them in automating task analysis, decision-making, strategy formulation and risk prediction to prevent bankruptcy and fraud .Business Intelligence is a set of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Terroryzm jako zakłócona komunikacja. Koncepcja rozumu komunikacyjnego Jurgena Habermasa a możliwość dialogu po 11 września.Mikołaj Raczyński - 2017 - Dialogi Polityczne 22:137-149.
    The purpose of the text is to point out the fragments of Jurgen Habermas’ thoughts about terrorism, which can be considered as a disturbed communication. Habermas orders to get rid of all serious atavisms, including terrorism. In his view, it is necessary to return to the understanding of politics as a communicational exchange aimed at reaching a rational settlement. In this approach, politics is difficult to distinguish from communication in everyday interactions. In both instances lying, manipulation and fraud cannot (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  44. Review of Listening Into the Heart of Things-on MDMA and LSD by Samuel Widmer (1989).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Henderson,NV, USA: Michael Starks. pp. 573-575.
    This is an early volume from a much respected psychedelic psychotherapist. He has written several other books since this one but until recently none of his books were on Amazon and still you can only find a German edition and a Spanish one (from 1993) but no English one (except a couple used copies). This is sad since these drugs have enormous therapeutic potential but afaik government suppression still prevents their use. The most interesting and readable parts are the case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Cryptographic Methods with a Pli Cachete: Towards the Computational Assurance of Integrity.Thatcher Collins - 2020 - In Gerhard R. Joubert Ian Foster (ed.), Advances in Parallel Computing. Amsterdam: IOS Press. pp. 10.
    Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secure sketches, and Benford's Law when combined with the historical practice of a Pli Cacheté where scientific discoveries were archived with a 3rd party to later prove the date of discovery. Including the distinct systems of preregistation and data provenance tracking becomes the starting point for the creation of a complete ontology of scientific documentation. The ultimate goals in such a system--ideally mandated--would rule out several forms (...)
    Download  
     
    Export citation  
     
    Bookmark