Works about INTERNET fraud
Results: 500
E-CON.
- Published in:
- 2022
- By:
- Publication type:
- Short Story
Politics and the financial crisis.
- Published in:
- Pacific Journalism Review: Te Koakoa, 2009, v. 15, n. 1, p. 186, doi. 10.24135/pjr.v15i1.971
- By:
- Publication type:
- Article
Student and Non-Student Perceptions and Awareness of Identity Theft.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2008, v. 50, n. 2, p. 153, doi. 10.3138/cjccj.50.2.153
- By:
- Publication type:
- Article
Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2004, v. 46, n. 5, p. 597, doi. 10.3138/cjccj.46.5.597
- By:
- Publication type:
- Article
A semi-supervised Anti-Fraud model based on integrated XGBoost and BiGRU with self-attention network: an application to internet loan fraud detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 56939, doi. 10.1007/s11042-023-17681-z
- By:
- Publication type:
- Article
Gender identification of short text author using conceptual vectorization.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 11, p. 17097, doi. 10.1007/s11042-022-14141-y
- By:
- Publication type:
- Article
Machine Learning Predictions as Regression Covariates.
- Published in:
- Political Analysis, 2021, v. 29, n. 4, p. 467, doi. 10.1017/pan.2020.38
- By:
- Publication type:
- Article
THE NIGERIAN SCAM 2.0 How an improved online scam trick made an unsuspecting Dutch man over 20,000 euros poorer.
- Published in:
- Studies in Oral Folk Literature / Estudis de Literatura Oral Popular, 2022, n. 11, p. 47, doi. 10.17345/elop202247-60
- By:
- Publication type:
- Article
Building a Phishing Program: Why Haven't You Started Yet?
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 28
- By:
- Publication type:
- Article
TAKEN FOR A RIDE on the INFORMATION HIGHWAY.
- Published in:
- Inside MS, 2002, v. 20, n. 4, p. 48
- By:
- Publication type:
- Article
VIRTUÁLNÍ DĚTSKÁ PORNOGRAFIE.
- Published in:
- Acta Universitatis Carolinae Iuridica, 2012, n. 4, p. 75
- By:
- Publication type:
- Article
PHISHING A PROBLÉMY S JEHO TRESTNĚPRÁVNÍ KVALIFIKACÍ V TEORII A PRAXI.
- Published in:
- Acta Universitatis Carolinae Iuridica, 2012, n. 4, p. 57
- By:
- Publication type:
- Article
The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain.
- Published in:
- European Journal on Criminal Policy & Research, 2020, v. 26, n. 3, p. 293, doi. 10.1007/s10610-020-09439-2
- By:
- Publication type:
- Article
Digital Realism and the Governance of Spam as Cybercrime.
- Published in:
- European Journal on Criminal Policy & Research, 2004, v. 10, n. 4, p. 309, doi. 10.1007/s10610-005-0554-8
- By:
- Publication type:
- Article
Processes And Patterns of Online Reaction Against Online Fraud (Ponzi Schemes) Victimization - 'Çiftlik Bank' Case in Türkiye.
- Published in:
- Itobiad: Journal of the Human & Social Science Researches / İnsan ve Toplum Bilimleri Araştırmaları Dergisi, 2023, v. 12, n. 2, p. 585, doi. 10.15869/itobiad.1226305
- By:
- Publication type:
- Article
Cultural aspects of internet usage: A preliminary inquiry.
- Published in:
- Educational Technology Research & Development, 1998, v. 46, n. 3, p. 109, doi. 10.1007/BF02299767
- By:
- Publication type:
- Article
The Department of Justice's Civil Cyber-Fraud Initiative and Its Impact on the False Claims Act.
- Published in:
- Defense Counsel Journal, 2024, v. 91, n. 1, p. 1
- By:
- Publication type:
- Article
The Department of Justice’s Civil Cyber-Fraud Initiative and Its Impact on the False Claims Act.
- Published in:
- Defense Counsel Journal, 2023, v. 90, n. 1, p. 1
- By:
- Publication type:
- Article
THE ONLINE ROMANCE SCAM: A COMPLEX TWO-LAYER SCAM.
- Published in:
- Journal of Psychological & Educational Research, 2016, v. 24, n. 2, p. 144
- By:
- Publication type:
- Article
A lightweight and proactive rule-based incremental construction approach to detect phishing scam.
- Published in:
- Information Technology & Management, 2022, v. 23, n. 4, p. 271, doi. 10.1007/s10799-021-00351-7
- By:
- Publication type:
- Article
A comparison of fraud cues and classification methods for fake escrow website detection.
- Published in:
- Information Technology & Management, 2009, v. 10, n. 2/3, p. 83, doi. 10.1007/s10799-009-0059-0
- By:
- Publication type:
- Article
Cyber Crime - Law & Enforcement in India.
- Published in:
- International Transactions in Applied Sciences, 2011, v. 3, n. 1, p. 111
- By:
- Publication type:
- Article
Securing online transactions: Unveiling anomalies through graph-based machine learning in fraud detection.
- Published in:
- Mathematics in Engineering, Science & Aerospace (MESA), 2024, v. 15, n. 3, p. 961
- By:
- Publication type:
- Article
Spam nation: The inside story of organized cybercrime.
- Published in:
- Scientific Annals of the 'Al. I. Cuza' University, Iasi. Sociology & Social Work / Analele Stiintifice ale Universitatii 'Al. I. Cuza' Iasi Sociologie si Asistenta Sociala, 2022, v. 15, n. 2, p. 164, doi. 10.47743/asas-2022-2-706
- By:
- Publication type:
- Article
MALWARE FOR MOBILE DEVICES AND THEIR SECURITY.
- Published in:
- Fiability & Durability / Fiabilitate si Durabilitate, 2018, n. 1, p. 267
- By:
- Publication type:
- Article
Adolescent Internet False Identify, Victimization and Deviance.
- Published in:
- Crime & Criminal Justice International / Fànzuì yǔ Xíngshì Sīfǎ Yánji, 2014, v. 22, n. 7, p. 72
- By:
- Publication type:
- Article
Identity Theft and Fraud.
- Published in:
- Journal of the CPA Practitioner, 2012, v. 4, n. 4, p. 10
- By:
- Publication type:
- Article
From the Editor's Desk….
- Published in:
- Journal of the CPA Practitioner, 2012, v. 4, n. 4, p. 3
- Publication type:
- Article
Investigating the Role of Perceived Risk, Perceived Security and Perceived Trust on Smart m-Banking Application Using SEM.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 13, p. 9908, doi. 10.3390/su15139908
- By:
- Publication type:
- Article
Sequential Pattern Mining Approach for Personalized Fraudulent Transaction Detection in Online Banking.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 15, p. 9791, doi. 10.3390/su14159791
- By:
- Publication type:
- Article
Can TripAdvisor reviews be trusted?
- Published in:
- Travel Law Quarterly, 2014, v. 6, n. 3, p. 257
- By:
- Publication type:
- Article
HACKING HOME LAND.
- Published in:
- Harvard Political Review, 2012, v. 39, n. 4, p. 11
- By:
- Publication type:
- Article
Lawyers' identities being used for fake websites and solicitations.
- Published in:
- Advocate (05154987), 2012, v. 55, n. 11/12, p. 14
- Publication type:
- Article
Obstacles and Solutions to Internet Jurisdiction A Comparative Analysis of the EU and US laws.
- Published in:
- Journal of International Commercial Law & Technology, 2008, v. 3, n. 4, p. 233
- By:
- Publication type:
- Article
SECURITY.
- Published in:
- Teaching Science: The Journal of the Australian Science Teachers Association, 2010, p. 16
- Publication type:
- Article
Fake news, eleições e comportamento.
- Published in:
- Direito, Estado e Sociedade, 2022, n. 60, p. 120, doi. 10.17808/des.0.1320
- By:
- Publication type:
- Article
T Risk Tolerance, Perceived Usefulness, and Intention to Subscribe to Digital Unit Trust.
- Published in:
- Asia-Pacific Management Accounting Journal, 2024, v. 19, n. 2, p. 251, doi. 10.24191/apmaj.v19i2-13
- By:
- Publication type:
- Article
Flying in Cyberspace: Policing Global Travel Fraud.
- Published in:
- Policing: A Journal of Policy & Practice, 2021, v. 15, n. 1, p. 103, doi. 10.1093/police/pay063
- By:
- Publication type:
- Article
Offline and Local: The Hidden Face of Cybercrime.
- Published in:
- Policing: A Journal of Policy & Practice, 2021, v. 15, n. 1, p. 4, doi. 10.1093/police/pax042
- By:
- Publication type:
- Article
Improving the Police Response to Online Fraud.
- Published in:
- Policing: A Journal of Policy & Practice, 2015, v. 9, n. 2, p. 119, doi. 10.1093/police/pau044
- By:
- Publication type:
- Article
Dijitalleşme Sürecinde Yaşlı Bireylerin Karşılaştığı Zorluklar ve Çözüm Önerileri.
- Published in:
- Electronic Journal of Social Sciences, 2024, v. 23, n. 92, p. 1773, doi. 10.17755/esosder.1537052
- By:
- Publication type:
- Article
Proverbs 4:10-19 and the growing spate of Internet fraud amongst Nigerian youths.
- Published in:
- Hervormde Teologiese Studies, 2021, v. 77, n. 4, p. 1, doi. 10.4102/hts.v77i4.6776
- By:
- Publication type:
- Article
Chihuahua Promises and the Notorious Economy of Fake Pets in Cameroon.
- Published in:
- Journal of African Cultural Studies, 2021, v. 33, n. 3, p. 387, doi. 10.1080/13696815.2021.1949967
- By:
- Publication type:
- Article
Internet Usage and Digital Citizenship during the Covid-19 Pandemic.
- Published in:
- Journal of Faculty of Educational Sciences, 2023, v. 56, n. 2, p. 495, doi. 10.30964/auebfd.1148787
- By:
- Publication type:
- Article
Scams, Cons, Frauds, and Deceptions.
- Published in:
- Victims & Offenders, 2023, v. 18, n. 7, p. 1185, doi. 10.1080/15564886.2023.2263756
- By:
- Publication type:
- Article
"I Have Only Checked after the Event": Consumer Approaches to Safe Online Shopping.
- Published in:
- Victims & Offenders, 2023, v. 18, n. 7, p. 1259, doi. 10.1080/15564886.2022.2130486
- By:
- Publication type:
- Article
"If U Don't Pay they will Share the Pics": Exploring Sextortion in the Context of Romance Fraud.
- Published in:
- Victims & Offenders, 2023, v. 18, n. 7, p. 1194, doi. 10.1080/15564886.2022.2075064
- By:
- Publication type:
- Article
Convergence of Traditional and Online Property Crime Victimization in a City with Little Offline Crime.
- Published in:
- Victims & Offenders, 2022, v. 17, n. 6, p. 813, doi. 10.1080/15564886.2022.2036659
- By:
- Publication type:
- Article
Co-Branding: The Effects of E-Tailer and Delivery Carrier Familiarity on Price and E-Tailer Perceptions.
- Published in:
- Journal of Marketing Theory & Practice, 2011, v. 19, n. 1, p. 97, doi. 10.2753/MTP1069-6679190106
- By:
- Publication type:
- Article
THE NEVER-WAS-NEUTRAL NET AND WHY INFORMED END USERS CAN END THE NET NEUTRALITY DEBATES.
- Published in:
- Berkeley Technology Law Journal, 2007, v. 22, n. 4, p. 1565
- By:
- Publication type:
- Article