defrauding

Results 1 - 2 of 2Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
    
IBM
Published By: SAS     Published Date: Jul 14, 2015
Case studies of organized crime rings defrauding federal subsidy programs.
Tags : 
fraud, detection, prevention, cost savings, efficiency
    
SAS
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept