Fraud

Results: 23320



#Item
871

SOLUTION BRIEF ThreatMetrix Web Cloud-Based Defense Against Fraud, Malware and Data Breaches NTRODUCTION

Add to Reading List

Source URL: www.threatmetrix.com

Language: English - Date: 2016-03-08 12:57:37
    872

    Fraud Vulnerabilities in SiteKey Security at Bank of America Jim Youll <> CTO, Challenge/Response, LLC Cambridge, MA Review draft to Bank of America/RSA: June 26, 2006

    Add to Reading List

    Source URL: www.cr-labs.com

    Language: English - Date: 2006-07-18 00:00:00
      873

      DCVx2 The ultimate solution to CNP fraud Fully transparent to the cardholder, immediately acceptable by all online merchants

      Add to Reading List

      Source URL: www.nidsecurity.com

      Language: English - Date: 2016-03-23 04:08:51
        874

        Graph Analytics for Real-time Scoring of Cross-channel Transactional Fraud Ian Molloy1 , Suresh Chari1 , Ulrich Finkler1 , Mark Wiggerman2 , Coen Jonker2 , Ted Habeck1 , Youngja Park1 , Frank Jordens2 , and Ron van Schai

        Add to Reading List

        Source URL: fc16.ifca.ai

        Language: English - Date: 2016-02-08 20:23:33
          875Electoral fraud / Politics / Law / Political corruption / Voter ID laws in the United States / Voter ID laws / Voter turnout / Electronic voting / Voter suppression / Voter impersonation / Voter suppression in the United States

          Voter Identification Laws and the Suppression of Minority Votes Zoltan Hajnal, UCSD1 Nazita Lajevardi, UCSD Lindsay Nielson, UCSD Abstract

          Add to Reading List

          Source URL: pages.ucsd.edu

          Language: English - Date: 2015-03-05 18:50:07
          876Marketing / Economy / Business / Pharmaceutical marketing / Pricing strategies / Pharmaceutical industry / Pricing / Product lining / Product marketing / Pharmaceutical industry in China / Pharmaceutical fraud

          A Marketing Mix Model for Pharmaceutical Industry – A Pakistani Perspective Irfan Sattar and Azra Maqsood SZABIST Karachi, Pakistan. Abstract: This study attempts to create a model, which explain the

          Add to Reading List

          Source URL: jisr.szabist.edu.pk

          Language: English
          877

          Preventing Fraud, Waste, and Abuse THEC/TSAC staff members are

          Add to Reading List

          Source URL: www.tn.gov

          Language: English - Date: 2016-02-18 12:22:41
            878Knowledge engineering / Semantic Web / Social information processing / Fraud / Identity theft / Ontology / Online identity / Identity / Social web / Social network / Social search / Identity management

            Identifying Individuals using Identity Features and Social Information Matthew Rowe Web Intelligence Technologies Lab Department of Computer Science University of Sheffield, UK

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2008-04-27 08:09:44
            879Payment systems / Strong authentication / Mobile payment / 3-D Secure / Payment card / Smart card / Contactless payment / Biometrics / Credit card fraud / Alternative payments

            2014 A N N U A L R E P O R T OF THE OBSERVATORY FOR PAYMENT CARD SECURITY bservatoire

            Add to Reading List

            Source URL: observatoire.banque-france.fr

            Language: English - Date: 2015-10-16 07:17:01
            880Fraud / Crime / Healthcare reform in the United States / Health fraud / Medicare fraud / Medicare / Health care / Property law / United States National Health Care Act

            Don’t become a victim of fraud EMPOWERING SENIORS TO PREVENT HEALTHCARE FRAUD Beware of

            Add to Reading List

            Source URL: www.servicelink.nh.gov

            Language: English - Date: 2015-06-26 09:07:07
            UPDATE