期刊文献+
共找到171篇文章
< 1 2 9 >
每页显示 20 50 100
Understanding Accounting Fraud Through the Fraud Triangle Theory:A Systematic Literature Review
1
作者 Faisal Fadly Hermawan Iskandar Muda Sambas Ade Kesuma 《Journal of Modern Accounting and Auditing》 2025年第2期48-58,共11页
This research aims to understand the causes of fraud through the approach of the Fraud Triangle Theory,which includes three main factors:pressure,opportunity,rationalization.By using the Systematic Literature Review m... This research aims to understand the causes of fraud through the approach of the Fraud Triangle Theory,which includes three main factors:pressure,opportunity,rationalization.By using the Systematic Literature Review method from various relevant international journals,it analyzed systematically to identify patterns,trends,and theoretical contributions to efforts in detecting and preventing fraud.The results of this study show that the three factors in the Fraud Triangle Theory significantly contribute to the occurrence of fraud.Opportunity as the most dominant factor is caused by weak internal control systems and lack of oversight.In addition,economic pressure,and a permissive organizational environment,as well as the rationalization processes by individuals,also increase the tendency for a person to commit fraud.These findings emphasize the need for a comprehensive approach in fraud prevention strategies,through ethical values,the establishment of an organizational culture with integrity,and the implementation of more effective internal control and oversight. 展开更多
关键词 fraud Triangle fraud PRESSURE OPPORTUNITY RATIONALIZATION
在线阅读 下载PDF
A Hybrid Feature Selection and Clustering-Based Ensemble Learning Approach for Real-Time Fraud Detection in Financial Transactions
2
作者 Naif Almusallam Junaid Qayyum 《Computers, Materials & Continua》 2025年第11期3653-3687,共35页
This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m... This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics. 展开更多
关键词 fraud detection financial transactions economic impact feature selection CLUSTERING ensemble learning
在线阅读 下载PDF
Audit Without Integrity:Ethical Failures and Fraud in High-Profile Corporate Cases
3
作者 Enda Putri Rudangta Meliala Julia +1 位作者 Iskandar Muda Erlina 《Journal of Modern Accounting and Auditing》 2025年第3期218-228,共11页
This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit... This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit reports,the study applies the Fraud Triangle framework,focusing on how weak integrity,objectivity,and professional competence have undermined public trust in the auditing profession.Using a qualitative descriptive method and the Fraud Triangle framework,which includes pressure,opportunity,and rationalization,the study analyzes cases from Indonesia(SNP Finance,Jiwasraya),China(Evergrande),and Germany(Wirecard).The analysis reveals that many audit failures observed in this study appear to stem more from ethical challenges than from technical incapability,driven by client pressure,weak internal controls,and compromised auditor independence.These cases demonstrate a recurring global pattern in which auditors neglect their responsibility to act in the public interest. 展开更多
关键词 auditor ethics internal auditor competence internal control fraud triangle audit failure professional responsibility SNP Finance Evergrande Wirecard Jiwasraya
在线阅读 下载PDF
Audit without Integrity:Ethical Failures and Fraud in High-Profile Corporate Cases
4
作者 Enda Putri Rudangta Meliala Julia +1 位作者 Iskandar Muda Erlina 《Journal of Modern Accounting and Auditing》 2025年第3期159-169,共11页
This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit... This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit reports,the study applies the Fraud Triangle framework,focusing on how weak integrity,objectivity,and professional competence have undermined public trust in the auditing profession.Using a qualitative descriptive method and the Fraud Triangle framework,which includes pressure,opportunity,and rationalization,the study analyzes cases from Indonesia(SNP Finance,Jiwasraya),China(Evergrande),and Germany(Wirecard).The analysis reveals that many audit failures observed in this study appear to stem more from ethical challenges than from technical incapability,driven by client pressure,weak internal controls,and compromised auditor independence.These cases demonstrate a recurring global pattern in which auditors neglect their responsibility to act in the public interest. 展开更多
关键词 auditor ethics internal auditor competence internal control fraud triangle audit failure professional responsibility SNP Finance Evergrande Wirecard Jiwasraya
在线阅读 下载PDF
Image Recognition Model of Fraudulent Websites Based on Image Leader Decision and Inception-V3 Transfer Learning 被引量:1
5
作者 Shengli Zhou Cheng Xu +3 位作者 Rui Xu Weijie Ding Chao Chen Xiaoyang Xu 《China Communications》 SCIE CSCD 2024年第1期215-227,共13页
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re... The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models. 展开更多
关键词 fraudulent website image leaders telecom fraud transfer learning
在线阅读 下载PDF
DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection 被引量:1
6
作者 Yuanyuan Ma Ang Chen +3 位作者 Cunzhi Hou Ruixia Jin Jinghui Zhang Ruixiang Li 《Computers, Materials & Continua》 SCIE EI 2024年第11期3301-3323,共23页
Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.Ho... Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification. 展开更多
关键词 fraudulent IP identification homology detection CLUSTERING genetic optimization algorithm telecom fraud identification
在线阅读 下载PDF
An Anti-Fraud Policy:A Theoretical Framework for a Prosperity Tripod of Massive Data,Blockchain,and AI 被引量:1
7
作者 Reza G.Hamzaee Maryam Salimi 《Management Studies》 2024年第2期102-123,共22页
The authors’aspiration was to learn-and focus on policy against fraud-leading to the sustainably growing societal illnesses of dishonesty,fraud,pessimism,and divisive issues.The appropriate venue,within the currently... The authors’aspiration was to learn-and focus on policy against fraud-leading to the sustainably growing societal illnesses of dishonesty,fraud,pessimism,and divisive issues.The appropriate venue,within the currently evolving laws and regulations,is proposed to be a three-tier combination of massive data,including data accumulation,transformation,organization,stratification,estimations,data analysis,and blockchain technology,predicted to revolutionize competition and efficiency,which are further suggested to be prerequisites for a more successful creation and implementation of the third element,AI.A currently evolving prosperity tripod is hinging on the three technological legs of the massive data control/management,blockchain tech,and a rapidly growing AI.While briefly incorporating some analysis of the blockchain application,we have analytically focused on the rest-the data and AI-of what we deem to be the prospective prosperity tripod for businesses,markets,and societies,in general,despite the challenges and risks involved in each.Instead of h ypothesizing a predetermined economic model,we are proposing a data-based Vector Autoregression(VAR)methodology for the AI with an application to the fraud and anti-fraud structure and policymaking.Hopefully,the entire attempt would portend some tangible prospective contribution in an achievable positive societal change. 展开更多
关键词 fraud AI data VAR
在线阅读 下载PDF
A Performance Analysis of Machine Learning Techniques for Credit Card Fraud Detection 被引量:1
8
作者 Ayesha Aslam Adil Hussain 《Journal on Artificial Intelligence》 2024年第1期1-21,共21页
With the increased accessibility of global trade information,transaction fraud has become a major worry in global banking and commerce security.The incidence and magnitude of transaction fraud are increasing daily,res... With the increased accessibility of global trade information,transaction fraud has become a major worry in global banking and commerce security.The incidence and magnitude of transaction fraud are increasing daily,resulting in significant financial losses for both customers and financial professionals.With improvements in data mining and machine learning in computer science,the capacity to detect transaction fraud is becoming increasingly attainable.The primary goal of this research is to undertake a comparative examination of cutting-edge machine-learning algorithms developed to detect credit card fraud.The research looks at the efficacy of these machine learning algorithms using a publicly available dataset of credit card transactions performed by European cardholders in 2023,comprising around 550,000 records.The study uses this dataset to assess the performance of well-established machine learning models,measuring their accuracy,recall,and F1 score.In addition,the study includes a confusion matrix for all models to aid in evaluation and training time duration.Machin learning models,including Logistic regression,random forest,extra trees,and LGBM,achieve high accuracy and precision in the credit card fraud detection dataset,with a reported accuracy,recall,and F1 score of 1.00 for both classes. 展开更多
关键词 fraud detection credit card fraud machine learning performance analysis
在线阅读 下载PDF
A Real-Time Fraud Detection Algorithm Based on Usage Amount Forecast
9
作者 Kun Niu Zhipeng Gao +2 位作者 Kaile Xiao Nanjie Deng Haizhen Jiao 《国际计算机前沿大会会议论文集》 2016年第1期25-26,共2页
Real-time Fraud Detection has always been a challenging task, especially in financial, insurance, and telecom industries. There are mainly three methods, which are rule set, outlier detection and classification to sol... Real-time Fraud Detection has always been a challenging task, especially in financial, insurance, and telecom industries. There are mainly three methods, which are rule set, outlier detection and classification to solve the problem. But those methods have some drawbacks respectively. To overcome these limitations, we propose a new algorithm UAF (Usage Amount Forecast).Firstly, Manhattan distance is used to measure the similarity between fraudulent instances and normal ones. Secondly, UAF gives real-time score which detects the fraud early and reduces as much economic loss as possible. Experiments on various real-world datasets demonstrate the high potential of UAF for processing real-time data and predicting fraudulent users. 展开更多
关键词 REAL-TIME fraud Detection USAGE amount FORECAST TELECOM industry
在线阅读 下载PDF
NFA:A neural factorization autoencoder based online telephony fraud detection
10
作者 Abdul Wahid Mounira Msahli +1 位作者 Albert Bifet Gerard Memmi 《Digital Communications and Networks》 SCIE CSCD 2024年第1期158-167,共10页
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac... The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks. 展开更多
关键词 Telecom industry Streaming anomaly detection fraud analysis Factorization machine Real-time system Security
在线阅读 下载PDF
Credit Card Fraud Detection Using Improved Deep Learning Models
11
作者 Sumaya S.Sulaiman Ibraheem Nadher Sarab M.Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第1期1049-1069,共21页
Fraud of credit cards is a major issue for financial organizations and individuals.As fraudulent actions become more complex,a demand for better fraud detection systems is rising.Deep learning approaches have shown pr... Fraud of credit cards is a major issue for financial organizations and individuals.As fraudulent actions become more complex,a demand for better fraud detection systems is rising.Deep learning approaches have shown promise in several fields,including detecting credit card fraud.However,the efficacy of these models is heavily dependent on the careful selection of appropriate hyperparameters.This paper introduces models that integrate deep learning models with hyperparameter tuning techniques to learn the patterns and relationships within credit card transaction data,thereby improving fraud detection.Three deep learning models:AutoEncoder(AE),Convolution Neural Network(CNN),and Long Short-Term Memory(LSTM)are proposed to investigate how hyperparameter adjustment impacts the efficacy of deep learning models used to identify credit card fraud.The experiments conducted on a European credit card fraud dataset using different hyperparameters and three deep learning models demonstrate that the proposed models achieve a tradeoff between detection rate and precision,leading these models to be effective in accurately predicting credit card fraud.The results demonstrate that LSTM significantly outperformed AE and CNN in terms of accuracy(99.2%),detection rate(93.3%),and area under the curve(96.3%).These proposed models have surpassed those of existing studies and are expected to make a significant contribution to the field of credit card fraud detection. 展开更多
关键词 Card fraud detection hyperparameter tuning deep learning autoencoder convolution neural network long short-term memory RESAMPLING
在线阅读 下载PDF
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
12
作者 Honghao Zhu MengChu Zhou +1 位作者 Yu Xie Aiiad Albeshri 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期377-390,共14页
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods. 展开更多
关键词 Credit card fraud detection(CCFD) dandelion algorithm(DA) feature selection normal sowing operator
在线阅读 下载PDF
The Effects of Competence and Auditor Training on Fraud Detection Within Multinational Companies in Sub-Saharan Africa
13
作者 Ivan Djossa Tchokoté Joëlle Tsobze Tiomeguim 《Journal of Modern Accounting and Auditing》 2024年第1期1-13,共13页
The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach ... The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach was used to develop and test a research model based on three theories:agency theory,attribution theory,and cognitive dissonance theory.Responses from a panel of two hundred and nine(209)auditors who conducted a legal audit mission in a Sub-Saharan multinational were analyzed using SmartPLS 3.3.3 software.The results emphasize the crucial importance of auditors’competence and continuous training in fraud detection.However,professional skepticism and time pressure were found to be non-significant in this context.This conclusion provides essential insights for auditors,highlighting the key qualities needed to effectively address fraud detection within multinational corporations in Sub-Saharan Africa. 展开更多
关键词 fraud legal audit fraud detection MULTINATIONALS Sub-Saharan Africa
在线阅读 下载PDF
Real-Time Fraud Detection Using Machine Learning
14
作者 Benjamin Borketey 《Journal of Data Analysis and Information Processing》 2024年第2期189-209,共21页
Credit card fraud remains a significant challenge, with financial losses and consumer protection at stake. This study addresses the need for practical, real-time fraud detection methodologies. Using a Kaggle credit ca... Credit card fraud remains a significant challenge, with financial losses and consumer protection at stake. This study addresses the need for practical, real-time fraud detection methodologies. Using a Kaggle credit card dataset, I tackle class imbalance using the Synthetic Minority Oversampling Technique (SMOTE) to enhance modeling efficiency. I compare several machine learning algorithms, including Logistic Regression, Linear Discriminant Analysis, K-nearest Neighbors, Classification and Regression Tree, Naive Bayes, Support Vector, Random Forest, XGBoost, and Light Gradient-Boosting Machine to classify transactions as fraud or genuine. Rigorous evaluation metrics, such as AUC, PRAUC, F1, KS, Recall, and Precision, identify the Random Forest as the best performer in detecting fraudulent activities. The Random Forest model successfully identifies approximately 92% of transactions scoring 90 and above as fraudulent, equating to a detection rate of over 70% for all fraudulent transactions in the test dataset. Moreover, the model captures more than half of the fraud in each bin of the test dataset. SHAP values provide model explainability, with the SHAP summary plot highlighting the global importance of individual features, such as “V12” and “V14”. SHAP force plots offer local interpretability, revealing the impact of specific features on individual predictions. This study demonstrates the potential of machine learning, particularly the Random Forest model, for real-time credit card fraud detection, offering a promising approach to mitigate financial losses and protect consumers. 展开更多
关键词 Credit Card fraud Detection Machine Learning SHAP Values Random Forest
暂未订购
Application Technologies and Challenges of Big Data Analytics in Anti-Money Laundering and Financial Fraud Detection
15
作者 Haoran Jiang 《Open Journal of Applied Sciences》 2024年第11期3226-3236,共11页
As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and cha... As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and challenges of big data analytics in anti-money laundering and financial fraud detection. The research begins by outlining the evolutionary trends of financial crimes and highlighting the new characteristics of the big data era. Subsequently, it systematically analyzes the application of big data analytics technologies in this field, including machine learning, network analysis, and real-time stream processing. Through case studies, the research demonstrates how these technologies enhance the accuracy and efficiency of anomalous transaction detection. However, the study also identifies challenges faced by big data analytics, such as data quality issues, algorithmic bias, and privacy protection concerns. To address these challenges, the research proposes solutions from both technological and managerial perspectives, including the application of privacy-preserving technologies like federated learning. Finally, the study discusses the development prospects of Regulatory Technology (RegTech), emphasizing the importance of synergy between technological innovation and regulatory policies. This research provides guidance for financial institutions and regulatory bodies in optimizing their anti-money laundering and fraud detection strategies. 展开更多
关键词 Big Data Analytics Anti-Money Laundering Financial fraud Detection Machine Learning Regulatory Technology
在线阅读 下载PDF
诈骗犯罪中“案发前归还”的规范适用
16
作者 陈伟 《中国应用法学》 2025年第5期209-216,共8页
诈骗犯罪中“案发前归还”的规范适用,应结合诈骗犯罪的构成要件和处罚必要性进行综合判断。“案发前归还规则”的法理基础根植于诈骗罪中被害人“有瑕疵的处分意志”所引发的主观故意认定特殊性,应结合行为人“非法占有目的”进行规范... 诈骗犯罪中“案发前归还”的规范适用,应结合诈骗犯罪的构成要件和处罚必要性进行综合判断。“案发前归还规则”的法理基础根植于诈骗罪中被害人“有瑕疵的处分意志”所引发的主观故意认定特殊性,应结合行为人“非法占有目的”进行规范审查。司法实践不应局限于单一、形式化之“归还与否”的判断,而应综合审查归还动机、时间、方式以及行为人的整体表现,进行主客观相统一的实质判断。对“案发前”的时间节点,坚持“刑事立案前”的标准有助于维护司法明确性,契合罪责刑相适应原则,激励行为人积极修复损害法益。 展开更多
关键词 案发前归还 非法占有目的 诈骗数额 犯罪情节
在线阅读 下载PDF
被害人教义学视角下电信诈骗时空标准纠偏
17
作者 李怀胜 席子怡 《重庆邮电大学学报(社会科学版)》 2025年第4期60-70,共11页
作为当下风险社会转型期的一大重要社会议题,电信网络诈骗现象备受关注。将犯罪行为前置化预防的需求也呼吁,《刑法》适用时应相对降低电信网络诈骗及其关联犯罪行为的入罪门槛。但是,《关于办理诈骗刑事案件具体应用法律若干问题的解... 作为当下风险社会转型期的一大重要社会议题,电信网络诈骗现象备受关注。将犯罪行为前置化预防的需求也呼吁,《刑法》适用时应相对降低电信网络诈骗及其关联犯罪行为的入罪门槛。但是,《关于办理诈骗刑事案件具体应用法律若干问题的解释》第3条提出的“时空标准”在法律规范层级上只是“司法解释性质文件”,而非正式“司法解释”。相较于后者,前者属于不具有规范意义上法律效力的非正式法源,不能作为裁判依据被直接引用,最多只能作为说理依据。一方面,审判实践中不再考虑诈骗数额,直接适用“时空标准”的行为严重冲击罪刑法定原则,不仅无法解决跨境电信网络诈骗犯罪数额调查与证明难题,还消解了犯罪停止形态和正当化事由的存在空间,甚至存在扭曲诈骗罪构成要件定型性、无故跳档和量刑不均等问题。另一方面,司法实践应以“数额数量时空标准”的顺序对诈骗罪进行标准化认定。“时空标准”至多只能辅助诈骗罪第二档情节要素的认定,而不能单独作为定罪的充分要件。但是,对于作为传统财产犯罪的诈骗罪第一档入罪门槛“守门员”的“较大数额”,应优选“被害人视角”下的损失,按共同犯罪理论对诈骗数额以最密切联系原则进行累额认定。缓和的“被害人教义学”要求尊重高风险投机行为等金融纠纷中“被害人”的自我选择,弱化此时刑法父权主义的特征。 展开更多
关键词 电信网络诈骗 时空标准 罪刑法定原则 犯罪数额认定 被害人教义学
在线阅读 下载PDF
Methodology for Detecting Non-Technical Energy Losses Using an Ensemble of Machine Learning Algorithms
18
作者 Irbek Morgoev Roman Klyuev Angelika Morgoeva 《Computer Modeling in Engineering & Sciences》 2025年第5期1381-1399,共19页
Non-technical losses(NTL)of electric power are a serious problem for electric distribution companies.The solution determines the cost,stability,reliability,and quality of the supplied electricity.The widespread use of... Non-technical losses(NTL)of electric power are a serious problem for electric distribution companies.The solution determines the cost,stability,reliability,and quality of the supplied electricity.The widespread use of advanced metering infrastructure(AMI)and Smart Grid allows all participants in the distribution grid to store and track electricity consumption.During the research,a machine learning model is developed that allows analyzing and predicting the probability of NTL for each consumer of the distribution grid based on daily electricity consumption readings.This model is an ensemble meta-algorithm(stacking)that generalizes the algorithms of random forest,LightGBM,and a homogeneous ensemble of artificial neural networks.The best accuracy of the proposed meta-algorithm in comparison to basic classifiers is experimentally confirmed on the test sample.Such a model,due to good accuracy indicators(ROC-AUC-0.88),can be used as a methodological basis for a decision support system,the purpose of which is to form a sample of suspected NTL sources.The use of such a sample will allow the top management of electric distribution companies to increase the efficiency of raids by performers,making them targeted and accurate,which should contribute to the fight against NTL and the sustainable development of the electric power industry. 展开更多
关键词 Non-technical losses smart grid machine learning electricity theft fraud ensemble algorithm hybrid method forecasting classification supervised learning
在线阅读 下载PDF
Information Security, Ethics, and Integrity in LLM Agent Interaction
19
作者 Ying-Jung Chen Vijay K. Madisetti 《Journal of Information Security》 2025年第1期184-196,共13页
This study addresses security and ethical challenges in LLM-based Multi-Agent Systems, as exemplified in a blockchain fraud detection case study. Leveraging blockchain’s secure architecture, the framework involves sp... This study addresses security and ethical challenges in LLM-based Multi-Agent Systems, as exemplified in a blockchain fraud detection case study. Leveraging blockchain’s secure architecture, the framework involves specialized LLM Agents—ContractMining, Investigative, Ethics, and PerformanceMonitor, coordinated by a ManagerAgent. Baseline LLM models achieved 30% accuracy with a threshold method and 94% accuracy with a random-forest method. The Claude 3.5-powered LLM system reached an accuracy of 92%. Ethical evaluations revealed biases, highlighting the need for fairness-focused refinements. Our approach aims to develop trustworthy and reliable networks of agents capable of functioning even in adversarial environments. To our knowledge, no existing systems employ ethical LLM agents specifically designed to detect fraud, making this a novel contribution. Future work will focus on refining ethical frameworks, scaling the system, and benchmarking it against traditional methods to establish a robust, adaptable, and ethically grounded solution for blockchain fraud detection. 展开更多
关键词 Multi LLM Agents Systems Blockchain Cooperative Interactions fraud Detection Ethics and Safety
在线阅读 下载PDF
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
20
作者 Tawfeeq Shawly Ahmed A.Alsheikhy +4 位作者 Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani 《Computer Modeling in Engineering & Sciences》 2025年第3期3181-3212,共32页
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam. 展开更多
关键词 Email spam fraud light dual attention squeeze and excitation divide and conquer-generative adversarial network-squeeze and excitation-based framework security
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部