iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ fraud
جزئیات خدمات ترجمه در ترجمه تخصصی
تخصصی
security
security
Kaspersky
blue
blue sky law
US
firms
firms
firms
US
J. Account. Public Policy 31 (2012) 399–431
based model to examine the emergent dynamic characteristics of fraud
Public Law and Legal Theory Research Paper Series
3.5. Alternative management and control structures
FRAUD DETECTION IN COMMUNICATIONS NETWORKS USING NEURAL AND
Journal of Business Research 65 (2012) 1790–1799
A.L. Smith et al. / International Journal of Accounting Information Systems 13 (2012) 334–356 339
Expert Systems with Applications 38 (2011) 1039–1052
Expert Systems with Applications 31 (2006) 337–344
Expert Systems with Applications 31 (2006) 337–344
Expert Systems with Applications 31 (2006) 337–344
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
International Journal of Soft Computing and Engineering (IJSCE)
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
The Emerald Research Register for this journal is available at The current issue and full text archive of this journal is available at
Created in Master PDF Editor - Demo Version
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
7th INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015
7th INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015
Accounting, Organizations and Society 37 (2012) 41–53
W H I T E PA P E R
A business process mining application for internal transaction fraud mitigation
CHAPTER
CHAPTER
CHAPTER
Financial Statement Fraud Founded in 1807, John Wiley & Sons is the oldest independent publishing com-
Financial Statement Fraud Founded in 1807, John Wiley & Sons is the oldest independent publishing com-
C01 06/30/2010 11:17:5 Page 1
C02 06/30/2010 12:12:13 Page 39
C03 06/30/2010 11:43:43 Page 71
C04 06/30/2010 12:0:55 Page 95
C05 07/02/2010 19:9:54 Page 113
C06 06/30/2010 23:54:12 Page 131
C07 06/30/2010 13:18:33 Page 145
C08 06/30/2010 14:15:53 Page 157
C09 06/30/2010 23:58:31 Page 175
C10 06/30/2010 14:48:30 Page 195
C11 07/01/2010 0:2:5 Page 213
C12 06/30/2010 15:8:2 Page 225
C13 06/30/2010 15:22:21 Page 239
C17 06/30/2010 15:50:58 Page 291
CHAPTER 3 Systems Development and Documentation Techniques INTRODUCTION Questions to
2013 IEEE 13th International Conference on Data Mining Workshops 2013 IEEE 13th International Conference on Data Mining Workshops
CHAPTER 3 Systems Development and Documentation Techniques INTRODUCTION Questions to
Internet searches were performed to locate additional cases and tosupplement
Internet searches were performed to locate additional cases and tosupplement
Understanding investor perceptions of financial statement fraud and their use
Available online at www.sciencedirect.com
Data mining and knowledge discovery in databases have been attracting
Fraud can be seen in all insurance types including health
Available online at www.sciencedirect.com
Expert Systems With Applications 51 (2016) 134–142
Expert Systems With Applications 51 (2016) 134–142
Expert Systems With Applications 51 (2016) 134–142
Every year billions of Euros are lost worldwide due to
Decision Support Systems 50 (2011) 491–500
Expert Systems With Applications 51 (2016) 134–142
WHAT IS FRAUD? 3
A. Correa Bahnsen et al./Expert Systems With Applications 51 (2016) 134–142 135
Closing VAT GAP
International Journal of Information Management 32 (2012) 501–503
Infor mation Systems
ETHICS AND FRAUD
ETHICS AND FRAUD
As laid down in the Standards, the suspect of fraud shall betaken into consideration in the whole process of auditing (Fig. 1). This study focuses on the second step: the planning of audit.
computers & security 57 (2016) 47–66
Internet searches were performed to locate additional cases and tosupplement
IPPF – Practice Guide
IPPF – Practice Guide
AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM
AUCTION SHILL DETECTION FRAMEWORK BASED ON SVM
Classification for Fraud Detection with Social
Decision Support Systems 50 (2011) 595–601
Decision Support Systems 50 (2011) 595–601
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
بخش عمومی Fraud Risk Assessments
طوفان مغزی مقاله 2 Brainstorming refers to a group of
خلاقیت espite improved audit standards issued by the American Institute of Certified Public
مقاله اول Detection of financial reporting fraud is difficult for
Relevance of Forensic Accounting 3
ARonaldMcDonaldHouseCharitiesNorthAustralia QualifiedOpinion We haveaudited the special purpose financial report of
ARonaldMcDonaldHouseCharitiesNorthAustralia QualifiedOpinion We haveaudited the special purpose financial report of