Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Journal: 

Issue Info: 
  • Year: 

    2022
  • Volume: 

    2
  • Issue: 

    3
  • Pages: 

    20-41
Measures: 
  • Citations: 

    0
  • Views: 

    1137
  • Downloads: 

    223
Abstract: 

Bank fraud is one of the most threatening problems that any human society is facing due to its destructive effects. This refers to the intentional use of false information to defraud another person or organization of money or assets. The banking industry has used law-based systems for decades to detect fraud and humanly investigate transactions. Law-based systems include algorithms that perform various types of detection operations that are manually written by fraud experts. These systems require manual adjustment of scenarios, which challenge the implicit recognition of trading correlations that point to fraud. Given the inherent weaknesses of the law-based fraud detection approach in banks and the limited data used on commonly supervised machine learning algorithms, there is an urgent need for new fraud detection techniques or systems that can counteract the rapid rise of fraud and money laundering. This research uses a review approach and with the aim of examining the methods of detecting bank fraud, examines the research literature and describes the relevant results.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1137

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 223 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    6
  • Issue: 

    22
  • Pages: 

    173-187
Measures: 
  • Citations: 

    0
  • Views: 

    144
  • Downloads: 

    85
Abstract: 

The recent financial scandals, the reported frauds, and the increased severity of concerns over money laundering have made banks and financial institutions actively seek to accelerate the identification of the determinants of fraud. Therefore, the primary goal of this study was to identify the risk factors influencing the likelihood of bank frauds. The present study is an applied study with regard to its goal and a descriptive survey study with regard to its method. Research data is collected using the Delphi method and questionnaires completed by 41 experts (including the computer-based 1accounting information system experts, the administration’ s experts, and the internal audit and financial examination experts in the branches of Resalat Bank in Isfahan Province) from 2016 to 2017. The resulting data is analyzed using the t-test, Kolmogorov– Smirnov test, and Kruskal– Wallis test. The research findings show that the risk factors associated with "financial instability", "liquidity", "managers’ failure to abide by the internal controls and binding standards", and "internal security threats" influence the occurrence of fraud. Considering the research findings, financial institutions and banks in Iran could prevent fraud occurrence through having a more accurate plan, providing necessary contexts for improving the awareness of all the personnel on fraud risk factors and other antifraud methods including creating a proper moral atmosphere along creating motivation for the personnel. The findings in this study could help with gaining knowledge on the weak points of the banks’ internal control systems and identifying the main risk factors in fraud occurrence.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 144

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 85 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

PRIVATE LAW

Issue Info: 
  • Year: 

    2018
  • Volume: 

    15
  • Issue: 

    1
  • Pages: 

    45-66
Measures: 
  • Citations: 

    0
  • Views: 

    1410
  • Downloads: 

    0
Abstract: 

The rule of fraud has a vital role on documentary credit. This rule considers as an exception to the principle of independence. In most cases, fraud is made in documents by the beneficiary, that the exception of fraud being properly applied; since the documentary credit has been formed of combination of several legal acts, the fraud may also occur in the underlying transaction. Despite the fact that most legal systems have accepted the exception of the fraud, but judicial procedures differ in terms of the limits and cases of applying fraud exception. In general, there are two approaches to extending or refusing the exception of the fraud in the underlying transaction: the broad approach, according to which the fraudulent acts should be extended to the fraudulent behavior of the underlying transaction and the narrow approach, supports the principle of independence and restricts the fraud to forgery or fraudulent documents. The examination of Civil cases of the Big Bank Fraud indicates that the majority of judges have followed the narrow approach.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1410

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

PRIVATE LAW

Issue Info: 
  • Year: 

    2019
  • Volume: 

    7
  • Issue: 

    27
  • Pages: 

    229-255
Measures: 
  • Citations: 

    0
  • Views: 

    674
  • Downloads: 

    0
Abstract: 

Numerous disputes have arisen from frauds and Errors in the process of documentary credit transactions. This issue has caused an obstacle in financing international trade law and Cash flow in banks. It also imposes a huge cost on the banks. International Chamber of Commerce has created a new payment Method, called Bank Payment Obligation (BPO), in order to address this problem. By introducing an electronic system through Bank Payment Obligation, International Chamber of Commerce has endeavoured to deal with ambiguous and uncovered areas of documentary credit. To assess whether this new method (BPO) would be able to offer a solution to the problem of fraud and Errors in documentary credit transactions, this article examines documentary credit by discussing relevant case law and by identifying the extent to which Bank Payment Obligation would respond to existing problems. It concludes that although Bank Payment Obligation has a number of similarities with Documentary Credit, its structure and nature in optimal conditions would be able, to a large extent to prevent fraud and Errors in international payment and reduce disputes in this field accordingly.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 674

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

AMIRI HAMZEH

Issue Info: 
  • Year: 

    2008
  • Volume: 

    17
  • Issue: 

    66/1 (BIOLOGY ISSUE)
  • Pages: 

    31-36
Measures: 
  • Citations: 

    0
  • Views: 

    948
  • Downloads: 

    0
Abstract: 

Salvia bracteata is a permanent herb belongs to Lamiaceae family which wildely grows in some regions of Lorestan province. The aerial part of this plant was collected in postflowering stage from montains of North of Alashtar in Lorestan province. The air-dried samples were subjected to hydrodistillation using by Cleavenger apparatus for 2.5h ( in yield of 0.8%).The essential oil was analyzed by GC and GC/MS. Forty-six constituents representing 91.7% of the oil were identified. The major components of the oil were a- pinene (31.9%), myrcene(8.6%), limonene(8.1%), b-pinene(6.8%).

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 948

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Title: 
Author(s): 

KHORAM ABADI A.A.S.

Journal: 

PRIVATE LAW STUDIES

Issue Info: 
  • Year: 

    2007
  • Volume: 

    37
  • Issue: 

    2
  • Pages: 

    83-112
Measures: 
  • Citations: 

    0
  • Views: 

    3803
  • Downloads: 

    0
Abstract: 

The crime of computer fraud is one of the most important computer crimes. This crime like the crime of classic fraud is one of the crimes against property. Any kind of fraud committed by computer is not called computer fraud, because the criminals use the computer as a tool for committing both classic fraud and computer fraud. The computer fraud and classic fraud are different in actus reus. Such a difference has caused that the acts ruling on classic fraud are not applicable for computer fraud.Considering the international aspect of computer crimes, some international regional and global organizations have presented definitions for the crime of computer fraud and have recommended to their members to consider them for criminalization. In Iran, computer fraud in the field of electronic interchanges has criminalized, but not in the other fields. Lack of paying attention to technical issues related to computer fraud by Iranian legislators has caused some technical problems in article 67 of electronic commercial code. The articles of draft of computer crimes act have some technical problems too and the provider of this draft could not criminalize computer fraud correctly either.Considering the international aspect of computer fraud, the Iranian legislator should use the international experiences in criminalizing crime.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3803

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2006
  • Volume: 

    22
  • Issue: 

    3 (33)
  • Pages: 

    209-215
Measures: 
  • Citations: 

    0
  • Views: 

    1000
  • Downloads: 

    0
Abstract: 

The aerial parts of Salvia bracteata were collected in two stages of plant growth (before flowering and full flowering) from Chenareh-marivan (Kurdistan province) in west of Iran .The essential oils were obtained by hydro-distillation method. The oils were analyzed by GC and GC/MS. The yields of essential oils were 0.22% before flowering stage and 0.28% full flowering stage. Before flowering stage 17 compounds and full flowering stage 19 compounds were characterized. In both of stages, b-caryophyllen and c-muurolene devoted the highest rates of the compounds. b-caryophyllen had a decreasing trend from before flowing to flowering so that it changes from 49.6% to 41.6% vs. c-muurolene so the rate of latter compound changed from 18.3% to 22.8%. In samples from Chenareh, Marivan, 17 constituents were common at two stages. (E)-b-ocimene was only before flowering stage and bornyl-acetate, d-elemene, b- bourbonene were found only at full flowering stage.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1000

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 6
Author(s): 

Journal: 

J APPL STAT

Issue Info: 
  • Year: 

    2023
  • Volume: 

    50
  • Issue: 

    10
  • Pages: 

    2209-2227
Measures: 
  • Citations: 

    1
  • Views: 

    10
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 10

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    15
  • Issue: 

    59
  • Pages: 

    83-106
Measures: 
  • Citations: 

    0
  • Views: 

    596
  • Downloads: 

    0
Abstract: 

The design of the audit program so that it can be used to adequately respond the fraud risk is one of the most important activities that auditors do in their investigations. Paying attention to the most important dimensions and risk factors of fraud can help auditors in this process. In this regard, in this research, the importance of the dimensions and risk factors of fraud in the adjustment of the audit program has been investigated. For this purpose, the fraud Pentagon model has been used. This model includes five dimensions of pressure/motivation, opportunity, rationalization, capability and arrogance. In order to conduct this research, four fraud risk factors were selected by expert opinion for each of the five fraud dimensions. A questionnaire was used to collect data. The statistical population of the study is Iranian association of certified public accountants in year 2018. After distributing and collecting questionnaires, the Fuzzy Analytical Hierarchy Process (FAHP) method was used to rank the dimensions and risk factors of fraud. The results show that opportunity dimension and fraud risk factors including significant portions of managers’ compensation being contingent upon operating results, financial position, or cash flow, ineffective information, accounting and internal controls systems, restrictions on the auditors’ investigation, level of experience and overconfidence have the highest degree of importance in modifying the audit program.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 596

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2024
  • Volume: 

    10
Measures: 
  • Views: 

    26
  • Downloads: 

    2
Abstract: 

Criminal fraud through bank transactions is one of the main concerns in the field of financial services that can be carried out by individuals or organizations. These illegal activities are challenging to identify. Machine learning algorithms and integrating different features may be able to detect hidden patterns in data, but they are unable to define the structure generated by interactions between distinct features. On the other hand, a criminal transaction may not seem suspicious at first glance due to the complexity and variety of fraud patterns. Consequently, network theory should be used to analyze card-to-card transactions. In this paper, a meta-classifier and an ensemble approach based on graphs and hidden Markov chains (GHM) are utilized to detect suspected organized fraud practices. Based on the proposed method, network features and feature vectors are first extracted from the transaction graph. Then, a hidden Markov chain is applied due to the high dependence between the values of each feature extracted at successive times and the significance of the transaction data's inherent sequential nature in detecting fraud patterns. Finally, to discriminate between legitimate and fraudulent clients, meta-classifiers using neural networks, SVMs, Naï, ve Bayes, and K-Nearest Neighbors are used and compared. There are 162, 493 transactions in the studied dataset. According to the results of the experiments, the Naï, ve Bayes meta-classifier outperformed other approaches with the highest detection accuracy.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 26

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button