Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,132,784 papers from all fields of science
Search
Sign In
Create Free Account
Computer fraud
Known as:
Computer Fraud Case Studies
Computer fraud is the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system. In the United States…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Computer Fraud and Abuse Act
Computer virus
Cybercrime
DarkMarket
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Biometric Identification Machine Failure and Electoral Fraud in a Competitive Democracy 1
M. Golden
,
Eric Kramon
,
George Ofosu
,
Luke Sonnet
2015
Corpus ID: 85511376
We study election fraud in a competitive but not fully consolidated multiparty democracy. Results from a randomized field…
Expand
Review
2014
Review
2014
China Needs Forensic Accounting Education
Z. Rezaee
,
Michael Ha
,
D. Lo
2014
Corpus ID: 167623720
White-collar crime causes the most economic harm to the finance world. It is the white collar criminals who steal our pensions…
Expand
2013
2013
International Vote Buying
Natalie J. Lockwood
2013
Corpus ID: 149490826
This Article examines the widely practiced—and widely ignored—phenomenon of “international vote buying” among states, that is…
Expand
Review
2013
Review
2013
Security review: the past year
Steve Mansfield-Devine
2013
Corpus ID: 60559740
2012
2012
Android malware and mitigations
Steve Mansfield-Devine
Network Security
2012
Corpus ID: 13685282
2012
2012
A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters ( Locations And Time )
V. Rajeswari
,
V. Murali
,
A. Anil
2012
Corpus ID: 15755630
We are moving towards an era where location information will be necessary for access control. The use of location information can…
Expand
2012
2012
Making Voters Count: Evidence from Field Experiments about the Efficacy of Domestic Election Observation
Fredrik M. Sjoberg
2012
Corpus ID: 16360533
Elections are important because they hold the promise of empowering voters to hold leaders accountable. The sad reality, however…
Expand
2011
2011
Violence and Social Unrest: Implications of the Reconstruction Amendments for African Americans in the Post Civil War South, 1863-1877
A. B. Cross
2011
Corpus ID: 152683032
Freedom, citizenship, and 1nanhood suffrage became rights promised by the 13th, 14th, and 15th Amendments to the Untied States…
Expand
2007
2007
An efficient technique for enhancing forensic capabilities of Ext2 file system
M. S. Barik
,
Gaurav Gupta
,
S. Sinha
,
Alok Mishra
,
C. Mazumdar
Digital Investigation. The International Journal…
2007
Corpus ID: 2690209
Review
1991
Review
1991
Technical Approaches to Thwart Computer Fraud
J. Vandewalle
,
R. Govaerts
,
B. Preneel
Computer Security and Industrial Cryptography
1991
Corpus ID: 13493597
In our modern society the data protection and computer security needs can often best be met by classical and/or public key…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required