Search results

1 – 10 of over 1000
Article
Publication date: 22 September 2021

A. Prakash, A. Shyam Joseph, R. Shanmugasundaram and C.S. Ravichandran

This paper aims to propose a machine learning approach-based power theft detection using Garra Rufa Fish (GRF) optimization. Here, the analyzing of power theft is an important…

Abstract

Purpose

This paper aims to propose a machine learning approach-based power theft detection using Garra Rufa Fish (GRF) optimization. Here, the analyzing of power theft is an important part to reduce the financial loss and protect the electricity from fraudulent users.

Design/methodology/approach

In this section, a new method is implemented to reduce the power theft in transmission lines and utility grids. The detection of power theft using smart meter with reliable manner can be achieved by the help of GRF algorithm.

Findings

The loss of power due to non-technical loss is small by using this proposed algorithm. It provides some benefits like increased predicting capacity, less complexity, high speed and high reliable output. The result is analyzed using MATLAB/Simulink platform. The result is compared with an existing method. According to the comparison result, the proposed method provides the good performance than existing method.

Originality/value

The proposed method gives good results of comparison than those of the other techniques and has an ability to overcome the associated problems.

Details

Journal of Engineering, Design and Technology , vol. 21 no. 5
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 21 November 2018

Kiran Ahuja and Arun Khosla

This paper aims to focus on data analytic tools and integrated data analyzing approaches used on smart energy meters (SEMs). Furthermore, while observing the diverse techniques…

Abstract

Purpose

This paper aims to focus on data analytic tools and integrated data analyzing approaches used on smart energy meters (SEMs). Furthermore, while observing the diverse techniques and frameworks of data analysis of SEM, the authors propose a novel framework for SEM by using gamification approach for enhancing the involvement of consumers to conserve energy and improve efficiency.

Design/methodology/approach

A few research strategies have been accounted for analyzing the raw data, yet at the same time, a considerable measure of work should be done in making these commercially reasonable. Data analytic tools and integrated data analyzing approaches are used on SEMs. Furthermore, while observing the diverse techniques and frameworks of data analysis of SEM, the authors propose a novel framework for SEM by using gamification approach for enhancing the involvement of consumers to conserve energy and improve efficiency. Advantages of SEM’s are additionally discussed for inspiring consumers, utilities and their respective partners.

Findings

Consumers, utilities and researchers can also take benefit of the recommended framework by planning their routine activities and enjoying rewards offered by gamification approach. Through gamification, consumers’ commitment enhances, and it changes their less manageable conduct on an intentional premise. The practical implementation of such approaches showed the improved energy efficiency as a consequence.

Details

International Journal of Energy Sector Management, vol. 13 no. 2
Type: Research Article
ISSN: 1750-6220

Keywords

Article
Publication date: 17 February 2022

Prajakta Thakare and Ravi Sankar V.

Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating…

Abstract

Purpose

Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating the conditions of the crops with the aim of determining the proper selection of pesticides. The conventional method of pest detection fails to be stable and provides limited accuracy in the prediction. This paper aims to propose an automatic pest detection module for the accurate detection of pests using the hybrid optimization controlled deep learning model.

Design/methodology/approach

The paper proposes an advanced pest detection strategy based on deep learning strategy through wireless sensor network (WSN) in the agricultural fields. Initially, the WSN consisting of number of nodes and a sink are clustered as number of clusters. Each cluster comprises a cluster head (CH) and a number of nodes, where the CH involves in the transfer of data to the sink node of the WSN and the CH is selected using the fractional ant bee colony optimization (FABC) algorithm. The routing process is executed using the protruder optimization algorithm that helps in the transfer of image data to the sink node through the optimal CH. The sink node acts as the data aggregator and the collection of image data thus obtained acts as the input database to be processed to find the type of pest in the agricultural field. The image data is pre-processed to remove the artifacts present in the image and the pre-processed image is then subjected to feature extraction process, through which the significant local directional pattern, local binary pattern, local optimal-oriented pattern (LOOP) and local ternary pattern (LTP) features are extracted. The extracted features are then fed to the deep-convolutional neural network (CNN) in such a way to detect the type of pests in the agricultural field. The weights of the deep-CNN are tuned optimally using the proposed MFGHO optimization algorithm that is developed with the combined characteristics of navigating search agents and the swarming search agents.

Findings

The analysis using insect identification from habitus image Database based on the performance metrics, such as accuracy, specificity and sensitivity, reveals the effectiveness of the proposed MFGHO-based deep-CNN in detecting the pests in crops. The analysis proves that the proposed classifier using the FABC+protruder optimization-based data aggregation strategy obtains an accuracy of 94.3482%, sensitivity of 93.3247% and the specificity of 94.5263%, which is high as compared to the existing methods.

Originality/value

The proposed MFGHO optimization-based deep-CNN is used for the detection of pest in the crop fields to ensure the better selection of proper cost-effective pesticides for the crop fields in such a way to increase the production. The proposed MFGHO algorithm is developed with the integrated characteristic features of navigating search agents and the swarming search agents in such a way to facilitate the optimal tuning of the hyperparameters in the deep-CNN classifier for the detection of pests in the crop fields.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 15 November 2022

Shefali Saluja

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases…

Abstract

Purpose

The fraud landscape for FinTech industry has increased over the past few years, certainly during the time of COVID-19, FinTech market reported rapid growth in the fraud cases (World Bank, 2020). Taking the consideration, the paper has qualitatively understood the loopholes of the FinTech industry and designed a conceptual model declaring “Identity Theft” as the major and the common fraud type in this industry. The paper is divided in two phases. The first phase discusses about the evolution of FinTech industry, the second phase discusses “Identity Theft” as the common fraud type in FinTech Industry and suggests solutions to prevent “Identity Theft” frauds. This study aims to serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention. This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Design/methodology/approach

This paper revisits the literature to understand the evolution of FinTech Industry and the types of FinTech solutions. The authors argue that traditional models must be modernised to keep up with the current trends in the rapidly increasing number and severity of fraud incidents and however introduces the conceptual model of the common fraud type in FinTech Industry. The research also develops evidences based on theoretical underpinnings to enhance the comprehension of the key fraud-causing elements.

Findings

The authors have identified the most common fraud type in the FinTech Industry which is “Identity Theft” and supports the study with profusion of literature. “Identity theft” and various types of fraud continue to outbreak customers and industries similar in 2021, leaving several to wonder what could be the scenario in 2022 and coming years ahead (IBS Inteligence, 2022). “Identify theft” has been identified as one the common fraud schemes to defraud individuals as per the Association of Certified Fraud Examiners. There is a need for many of the FinTech organisations to create preventive measures to combat such fraud scheme. The authors suggest some preventive techniques to prevent corporate frauds in the FinTech industry.

Research limitations/implications

This study identifies the evolution of FinTech industry, major evidences of Identity Thefts and some preventive suggestions to combat identity theft frauds which requires practical approach in FinTech Industry. Further, this study is based out of qualitative data, the study can be modified with statistical data and can be measured with the quantitative results.

Practical implications

This study would also help organisations and regulators raise their professional standards in relation to the global fraud scene.

Social implications

This study will serve as a guide for subsequent investigations into the FinTech sector and add to the body of knowledge regarding fraud detection and prevention.

Originality/value

This study presents evidence for the most prevalent fraud scheme in the FinTech sector and proposes that it serve as a theoretical standard for all ensuing comparison.

Details

Journal of Financial Crime, vol. 31 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 February 1998

Rocco R. Vanasco

This paper examines the role of professional associations, governmental agencies, and international accounting and auditing bodies in promulgating standards to deter and detect…

27114

Abstract

This paper examines the role of professional associations, governmental agencies, and international accounting and auditing bodies in promulgating standards to deter and detect fraud, domestically and abroad. Specifically, it focuses on the role played by the US Securities and Exchange Commission (SEC), the American Institute of Certified Public Accountants (AICPA), the Institute of Internal Auditors (IIA), the Institute of Management Accountants (IMA), the Association of Certified Fraud Examiners (ACFE), the US Government Accounting Office (GAO), and other national and foreign professional associations, in promulgating auditing standards and procedures to prevent fraud in financial statements and other white‐collar crimes. It also examines several fraud cases and the impact of management and employee fraud on the various business sectors such as insurance, banking, health care, and manufacturing, as well as the role of management, the boards of directors, the audit committees, auditors, and fraud examiners and their liability in the fraud prevention and investigation.

Details

Managerial Auditing Journal, vol. 13 no. 1
Type: Research Article
ISSN: 0268-6902

Keywords

Book part
Publication date: 15 May 2023

Satinder Singh, Sarabjeet Singh and Tanveer Kajla

Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud…

Abstract

Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud in various sectors.

Design/Methodology/Approach: The authors focus on studies conducted during 2015–2022 using keywords such as blockchain, fraud detection and financial domain for Systematic Literature Review (SLR). The SLR approach entails two databases, namely, Scopus and IEEE Xplore, to seek relevant articles covering the effectiveness of blockchain technology in controlling financial fraud.

Findings: The findings of the research explored different types of business domains using blockchains in detecting fraud. They examined their effectiveness in other sectors such as insurance, banks, online transactions, real estate, credit card usage, etc.

Practical Implications: The results of this research highlight (1) the real-life applications of blockchain technology to secure the gateway for online transactions; (2) people from diverse backgrounds with different business objectives can strongly rely on blockchains to prevent fraud.

Originality/Value: The SLR conducted in this study assists in the identification of future avenues with practical implications, making researchers aware of the work so far carried out for checking the effectiveness of blockchain; however, it does not ignore the possibility of zero to less effectiveness in some businesses which is yet to be explored.

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Keywords

Article
Publication date: 30 August 2021

Benjamin K. Ngugi, Kuo-Ting Hung and Yuanxiang John Li

Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The…

Abstract

Purpose

Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The victim is the real owner of the social security number who will have difficulties getting a tax refund, as the offender has already taken a refund for the year in question. This paper aims to investigate whether the increased use and adoption of electronic tax filing (i.e. E-Filing) technologies has inadvertently resulted in a corresponding growth in Tax Identity Theft.

Design/methodology/approach

Multiple regressions are used to analyze the data that is extracted from the Identity Theft complaint reports (maintained by the Federal Trade Commission) and the tax filing statistics (retrieved from the Internal Revenue Service).

Findings

The results indicate that E-Filing can indirectly but significantly increase Tax Identity Theft through the full mediation effects of individual Self-E-Filing and Direct Deposit adoption, after controlling for general Identity Theft, the number of Individual Tax Returns and Total Refunds.

Originality/value

The authors explore the association between the adoption of tax e-filing technologies and Tax Identity Theft. The findings suggest that the key loopholes in the Tax Identity Theft process are at the Self-E-Filing and the Direct Deposit points. Several practical recommendations for patching these loopholes are provided and discussed.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 June 2014

Firman Azhari

The purpose of this research is to explain particular implementation weaknesses of near field communication (NFC) systems done by several institutions which apply for critical…

1250

Abstract

Purpose

The purpose of this research is to explain particular implementation weaknesses of near field communication (NFC) systems done by several institutions which apply for critical purposes and provide practical solutions.

Design/methodology/approach

This research is done by literature studies of previous findings in NFC security, observations of some existing implemented systems and experimentations to provide practical solutions.

Findings

Unintentional lack of security protection of the NFC cards and tags by some card issuers make them a vulnerable target. The outcomes of this research are proposed solutions on methods to quickly detect vulnerability in NFC tags using an Android-based mobile application. Another solution involves the assembly of a detection device using the portable, low power and powerful Raspberry Pi to analyze the NFC tags or cards and NFC reader vulnerabilities.

Research limitations/implications

This research is conducted in Indonesia; therefore, the results and solutions may lack generalizability. However, the findings may occur in other countries which newly apply NFC technology.

Practical implications

System implementer should become more aware about the security issue of old NFC tags like MIFARE Classic. Price should be considered after tag security. People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology.

Social implications

People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology.

Originality/value

This research fulfills an identified need to evaluate the security aspect of a system that uses NFC as one of the main technologies. The results and solutions also provides cheap, easy and practical tools to analyze NFC security.

Details

Information Management & Computer Security, vol. 22 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Open Access
Article
Publication date: 5 February 2024

Oluwadamilola Esan, Nnamdi I. Nwulu, Love Opeyemi David and Omoseni Adepoju

This study aims to investigate the impact of the 2013 privatization of Nigeria’s energy sector on the technical performance of the Benin Electricity Distribution Company (BEDC…

Abstract

Purpose

This study aims to investigate the impact of the 2013 privatization of Nigeria’s energy sector on the technical performance of the Benin Electricity Distribution Company (BEDC) and its workforce.

Design/methodology/approach

This study used a questionnaire-based approach, and 196 participants were randomly selected. Analytical tools included standard deviation, Spearman rank correlation and regression analysis.

Findings

Before privatization, the energy sector, managed by the power holding company of Nigeria, suffered from inefficiencies in fault detection, response and billing. However, privatization improved resource utilization, replaced outdated transformers and increased operational efficiency. However, in spite of these improvements, BEDC faces challenges, including unstable voltage generation and inadequate staff welfare. This study also highlighted a lack of experience among the trained workforce in emerging electricity technologies such as the smart grid.

Research limitations/implications

This study’s focus on BEDC may limit its generalizability to other energy companies. It does not delve into energy sector privatization’s broader economic and policy implications.

Practical implications

The positive outcomes of privatization, such as improved resource utilization and infrastructure investment, emphasize the potential benefits of private ownership and management. However, voltage generation stability and staff welfare challenges call for targeted interventions. Recommendations include investing in voltage generation enhancement, smart grid infrastructure and implementing measures to enhance employee well-being through benefit plans.

Social implications

Energy sector enhancements hold positive social implications, uplifting living standards and bolstering electricity access for households and businesses.

Originality/value

This study contributes unique insights into privatization’s effects on BEDC, offering perspectives on preprivatization challenges and advancements. Practical recommendations aid BEDC and policymakers in boosting electricity distribution firms’ performance within the privatization context.

Details

International Journal of Energy Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1750-6220

Keywords

Article
Publication date: 29 November 2023

Hussain Syed Gowhor

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up…

Abstract

Purpose

This study aims to evaluate the suspicious transaction reporting (STR) as a financial intelligence tool to identify the potential strengths and limitations of STR and to come up with the criteria, which will make this tool an effective one in early detection of terrorist financing activities.

Design/methodology/approach

Considering the research aim, this research uses the funnelling method for identifying effectiveness criteria. Funnelling is a method of literature review that helps find pertinent literature by refining the search through filtering the available research (Ridley, 2008). Using this method, the researcher first applied the criteria of actionable intelligence to filter the financial intelligence tools to select the most promising and important tool (suspicious transaction reporting) for early detection of terrorist financing activities. The funnelling method was also applied to derive the effectiveness criteria from the operational features, and corresponding limitations, of the suspicious transaction reporting system. The funnelling method was also used to identify those operational features and limitations of suspicious transaction reporting that have the most direct relevance to the early detection problem of suspicious transaction reporting.

Findings

There are some operational features of STR that give rise to certain limitations that undermine its effectiveness in terms of early detection of terrorist financing activities. The limitations of STR necessitate a search for criteria that will make STR effective in early detection of terrorist financing activities. Based on the operational features and their corresponding limitations, effectiveness criteria for STR have been derived in this study. It is shown how these effectiveness criteria can remove the limitations of STR.

Research limitations/implications

The list of operational features and the corresponding limitations based on which the effectiveness criteria have been derived may not be exhaustive. There may have other operational features, and corresponding limitations that also make STR largely ineffective in the early detection of terrorist financing activities, and for which more effectiveness criteria should also be derived.

Practical implications

The limitations and the effectiveness criteria will pave the way for redesigning STR in such a way that will make it highly useful for detecting financing activities relating to imminent terrorist attacks.

Social implications

The society will experience fewer terrorist attacks that will make the society peaceful, happy and vibrant.

Originality/value

In this study, the effectiveness criteria of STR for early detection of terrorist financing activities have been derived in an innovative way by deducing them from the operational features of STR and the corresponding limitations.

Details

Journal of Financial Crime, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 10 of over 1000