Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Fraude
26
Derecho penal
12
Historia
5
Leyes y legislación
5
Política y gobierno
5
Delitos contra la propiedad
4
Elecciones
4
Evasión de impuestos
4
Derecho bancario
3
Fraude bancario
3
Fraude en la ciencia
3
Fraude fiscal
3
Actos jurídicos
2
Aspectos sociales
2
Auditoría
2
Contabilidad
2
Delitos contra la administración de justicia
2
Delitos económicos
2
Delitos electorales
2
Estafa
2
Fraude procesal
2
Participación política
2
Procedimiento penal
2
Prácticas corruptas
2
Actos ilícitos
1
Administración de Justicia
1
Administración y procedimiento
1
Analísis de casos
1
Aspecto social
1
Aspectos económicos
1
-
921“…Then, data analysis methods for four types of analysis tasks: association analysis, risk assessment, risk prediction, and fraud identification, are reviewed. After that, the visualization and interaction techniques are reviewed for four types of characteristic data: multidimensional, hierarchical, associative, and spatial-temporal data. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
922por Lyu, Wenjing, Ding, Min, Zhou, Ying, Jiang, Mengdan, Li, Yanru, Ding, Yanxiang, Zhang, Zhong, Wei, Xue, Zhang, Xiaoqing“…The identification of capsaicinoids can help reveal food-related fraud, thereby safeguarding consumers’ health. Here, a novel and ultrasensitive method was established with a signal amplification strategy for the detection of capsaicinoids. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
923por de Carvalho, Isabella Marques, da Silva Mutz, Yhan, Machado, Amanda Cristina Gomes, de Lima Santos, Amanda Aparecida, Magalhães, Elisângela Jaqueline, Nunes, Cleiton Antônio“…Declared blends with other vegetable oils are legal, but undeclared mixing is a common type of fraud that can affect product quality and commercialization. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
924por Schneck, Andreas“…The validity of scientific findings may be challenged by the replicability crisis (or cases of fraud), which may result not only in a loss of trust within society but may also lead to wrong or even harmful policy or medical decisions. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
925“…It is worth mentioning that datasets of this kind are often used for detecting fraud on the Internet, making an algorithm capable of considering all neighbors a useful tool for such research.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
926“…In the absence of proper regulations and due to the inherently cryptic nature of blockchain technology, it can be exploited for nefarious purposes, such as ransomware, money laundering, fraud, and more. Furthermore, both blockchain and the IoT are relatively new technologies, and the absence of well-defined governance structures can erode confidence in their use. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
927por Vickers, Andrew J“…DISCUSSION: Data sharing benefits numerous research-related activities: reproducing analyses; testing secondary hypotheses; developing and evaluating novel statistical methods; teaching; aiding design of future trials; meta-analysis; and, possibly, preventing error, fraud and selective reporting. Clinical trialists, however, sometimes appear overly concerned with being scooped and with misrepresentation of their work. …”
Publicado 2006
Enlace del recurso
Enlace del recurso
Enlace del recurso
Texto -
928por Martí, Luis, Sanchez-Pi, Nayat, Molina, José Manuel, Garcia, Ana Cristina Bicharra“…Anomaly detection has recently attracted the attention of the research community, because of its relevance in real-world applications, like intrusion detection, fraud detection, fault detection and system health monitoring, among many others. …”
Publicado 2015
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
929“…“Classical peer review” has been subject to intense criticism for slowing down the publication process, bias against specific categories of paper and author, unreliability, inability to detect errors and fraud, unethical practices, and the lack of recognition for unpaid reviewers. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
930“…It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
931por Guimarães, Carlos Frederico Marques, Mársico, Eliane Teixeira, Monteiro, Maria Lúcia Guerra, Lemos, Môsar, Mano, Sergio Borges, Conte Junior, Carlos Adam“…The moisture, protein, lipid and ash values were between 83.83–85.59, 12.51–14.52, 1.09–1.65, and 0.76–2.38 g 100 g(−1), respectively. Fraud by excessive polyphosphate addition was detected in 30% of the samples whereas Hg above the recommended limit was observed in 50% of the samples. …”
Publicado 2015
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
932por Tantillo, Giuseppina, Marchetti, Patrizia, Mottola, Anna, Terio, Valentina, Bottaro, Marilisa, Bonerba, Elisabetta, Bozzo, Giancarlo, Di Pinto, Angela“…Fish authentication is a major concern not only for the prevention of commercial fraud, but also for the assessment of safety risks deriving from the undeclared introduction of potentially dangerous toxic or allergenic substances or environmentally damaging fish where endangered species are involved. …”
Publicado 2015
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
933“…Korean native honey (KNH) is much more expensive than European honey (EH) in Korea, because KNH is a favored honey which is produced less than EH. Food fraud of KNH has drawn attention of the government office concerned, which is in need of a method to differentiate between KNH and EH which are produced by the Asiatic honeybee, Apis cerana and the European honeybee, Apis mellifera, respectively. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
934por Seaman, Kendra L., Leong, Josiah K., Wu, Charlene C., Knutson, Brian, Samanez-Larkin, Gregory R.“…Older adults are disproportionately targeted by fraud schemes that advertise unlikely but large returns (positively skewed risks). …”
Publicado 2017
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
935por Wicherts, Jelte M.“…SIMPLE SUMMARY: Several fraud cases, widespread failure to replicate or reproduce seminal findings, and pervasive error in the scientific literature have led to a crisis of confidence in the biomedical, behavioral, and social sciences. …”
Publicado 2017
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
936“…Lack of transparency and lawfulness of the processing of personal data could lead to physical, tangible, or intangible damages where processing could lead to discrimination, identity theft, or identity fraud as a result of which may be significant adverse economic or social consequences. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
937“…These malicious codes pave the way to execute many fraudulent activities including spam mail, distributed denial-of-service attacks and click fraud. While many Botnets are set up using centralized communication architecture, the peer-to-peer (P2P) Botnets can adopt a decentralized architecture using an overlay network for exchanging command and control data making their detection even more difficult. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
938“…Allowing PMI to promote IQOS as reduced exposure would amount to a legally sanctioned repeat of the ‘light’ and ‘mild’ fraud which, for conventional cigarettes, is prohibited by the US law and the WHO Framework Convention on Tobacco Control.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
939“…The method may be useful in the preliminary screening of protein-rich food samples, aimed at fraud detection and estimation of the overall level of adulteration.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
940por Paredi, Gianluca, Raboni, Samanta, Marchesani, Francesco, Ordoudi, Stella A., Tsimidou, Maria Z., Mozzarelli, Andrea“…The protein pattern of saffron was quite distinct from those of two common adulterants, such as the dried petals of Carthamus tinctorius and the dried fruits of Gardenia jasminoides indicating that proteomic analyses could be exploited for detecting possible frauds.…”
Publicado 2016
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto