Mostrando 641 - 660 Resultados de 1,278 Para Buscar '"fraude"', tiempo de consulta: 0.17s Limitar resultados
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645
  6. 646
  7. 647
  8. 648
  9. 649
  10. 650
  11. 651
  12. 652
    “…Geographic food fraud – misrepresenting the geographic origin of a food item, is very difficult to detect, and therefore this type of fraud tends to go undetected. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 653
    por Androulidakis, Iosif I
    Publicado 2016
    “…Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. …”
    Enlace del recurso
    Enlace del recurso
  14. 654
    por Nguyen, Thang Xuan
    Publicado 2023
    “…An increasing number of financial frauds and corruption have been made public in Vietnam as a result of a vigorous anti-corruption drive in the country. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 655
    por Oh, Sangkyo, Lee, Kyungho
    Publicado 2014
    “…Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  16. 656
    “…Dental professionals have a major role to play in keeping accurate dental records and providing all necessary information so that legal authorities may recognize mal practice, negligence, fraud or abuse, and identity of unknown individuals. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 657
    “…We outline and provide examples for at least four important ways in which this potential disruption of traditional global health funding mechanisms could occur: universal access to financing through direct transactions without third parties; novel new multilateral financing mechanisms; increased security and reduced fraud and corruption; and the opportunity for open markets for healthcare data that drive discovery and innovation. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 658
    “…Interest in source gelatin authentication is based on religious and cultural beliefs, food fraud prevention and health issues. Seven gelatin authentication methods that have been developed include: nucleic acid based, immunochemical, electrophoretic analysis, spectroscopic, mass-spectrometric, chromatographic-chemometric and chemisorption methods. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 659
    por Hutchings, Alice
    Publicado 2018
    “…Compromised credit cards used to be the main method to purchase tickets illegitimately. However, as fraud detection systems improved, offenders displaced to other methods, including compromised loyalty point accounts, phishing, and compromised business accounts. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  20. 660
Herramientas de búsqueda: RSS