Open Access Open Access  Restricted Access Subscription or Fee Access

Fraud Find: Cash Related Intimidation Acknowledgment Inevitably Tom’s Investigating Progressing Down Human Direct

M. Divya, P. Suganya

Abstract


Cash related intimidation may be customarily tended to by those usage about illegal completions the spot they camwood intercellular from arranging manager until help delegates, occupying under a terrible conduct advocating from affirming speculation. There would various procedures made will dissect, perceive and maintain a strategic distance from this direct, constantly The bigger part significant those deception triangle speculation related with the incredible budgetary Review model. Something along those lines Comparably as with acknowledge out this appraisal, An assessment of the related meets wants in the present framing may have been done, should set up our phenomenally character or structure. In this unprecedented condition, this paper shows misdirecting Find, a related structure that awards should remember and plot A party of people inside A monetary collusion who submit compulsion, upheld by the squeeze triangle theory. Squeeze uncover meets wants in the technique of reliable Review that will a chance to be liable for social event information of overseers recognizable to client's fittings. It depends once semantic methods related through the get-together from declaring enunciations made by those customers under appraisal to later being continued forward a record to later evaluation. This proposal animates helping for the field of forefront security, in the decline of cases about budgetary cheating.


Keywords


Bank Duplicity, Triangle about Pressure, Human Factor, Mankind's Quick.

Full Text:

PDF

References


N. B. Omar and H. F. M. Din, “Fraud diamond risk indicator: An assessment of its importance and usage,” in 2010 International Conference on Science and Social Research (CSSR 2010). IEEE, dec 2010.

S. Hoyer, H. Zakhariya, T. Sandner, and M. H. Breitner, “Fraud prediction and the human factor: An approach to include human behavior in an automated fraud audit,” in 2012 45th Hawaii International Conference on System Sciences. IEEE, Jan 2012.

M. Kandias, A. Mylonas, N. Virvilis, M. Theoharidou, and D. Gritzalis, “An insider threat prediction model,” in Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2010, pp. 26–37.

P. K. Panigrahi, “A framework for discovering internal financial fraud using analytics,” in 2011 International Conference on Communication Systems and Network Technologies, June 2011, pp. 323–327.

D. Yue, X. Wu, Y. Wang, Y. Li, and C. H. Chu, “A review of data mining-based financial fraud detection research,” in 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Sept 2007, pp. 5519– 5522.

M. Ahmed and A. N. Mahmood, “A novel approach for outlier detection and clustering improvement,” in 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA), June 2013, pp. 577–582.

A. Vikram, S. Chennuru, H. R. Rao, and S. Upadhyaya, “A solution architecture for financial institutions to handle illegal activities: a neural networks approach,” in 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, Jan 2004, pp. 181–190.

H. Li and M. L. Wong, “Financial fraud detection by using grammar-based multi-objective genetic programming with ensemble learning,” in 2015 IEEE Congress on Evolutionary Computation (CEC), May 2015, pp. 1113–1120.

K. Panigrahi, “A framework for discovering internal financial fraud using analytics,” in 2011 International Conference on Communication Systems and Network Technologies. IEEE, jun 2011.

D. Al-Jumeily, A. Hussain, MacDermott, H. Tawfik, G. Seeckts, and J. Lunn, “The development of fraud detection systems for detection of potentially fraudulent applications,” in 2015 International Conference on Developments of ESystems Engineering (DeSE), Dec 2015, pp. 7–13.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.