期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于通信网络的大数据防诈模型设计和研究
1
作者 潘海军 周伟忠 +1 位作者 杨尚知 刘畅 《通信与信息技术》 2024年第5期111-114,共4页
近年来,电信网络诈骗犯罪形势十分严峻,已成为发案最多、上升最快、涉及面最广、人民群众反映最强烈的犯罪类型。基于电信通信网络,通过对公安、工信部通报诈骗号码的大数据挖掘分析,提取相似特征,利用机器学习、大数据、神经网络、遗... 近年来,电信网络诈骗犯罪形势十分严峻,已成为发案最多、上升最快、涉及面最广、人民群众反映最强烈的犯罪类型。基于电信通信网络,通过对公安、工信部通报诈骗号码的大数据挖掘分析,提取相似特征,利用机器学习、大数据、神经网络、遗传算法等开发大数据防诈模型,从数据采集、中间处理、模型生成、用户匹配、用户停机等全流程,及时关停疑似诈骗分子的号码,避免更多人蒙受诈骗,遭受损失。 展开更多
关键词 通信网络 大数据 电信 防诈模型 决策树 遗传算法
下载PDF
The usage of technology in preventing and detecting fraud
2
作者 Vjollca Karapici Ibrahimi 《Chinese Business Review》 2010年第9期22-30,共9页
Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsibl... Auditors of information systems technology (IT) play a major role in the prevention of significant fraud and investigation. Fraud is hard to detect and even more difficult to prevent. All the auditors are responsible for detection, determination of fraud and use of anti-fraud programs. With rapid developments in information, communication and technology, it is no surprise that companies grow and secure IT system, but with the development of technology was developed and fraud schemes. Detection or not the auditor of the fraud, not fulfilling his work reflects you, or not drafting of a plan audit standards and procedures, but he has to do with personal ability auditor, to analyze the findings during the audit, use of tests, the natural limitations of internal control and the fact that most of the findings of the auditor of nature are more persuasive than effective. When you conduct an audit, auditor has a professional skeptic attitude that considers the risk of circumvention of control procedures by management and recognizes that simple fact, the audit procedures that are effective in connection with the discovery of errors, are not suitable for detection and identification fraud. This requires from the auditor to establish a procedure for considering the risk of fraud, in order to detect the exact appearance not as a result of fraud. A particular impact has The Model of Fraud Detection Strategy, as an 8 steps model for identifying fraud, using IT to collect, define and analyze the data and anomalies that highlight indicators of fraud. 展开更多
关键词 FRAUD TECHNOLOGY skeptic attitude
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部