Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (78)

Search Parameters:
Keywords = fraud vulnerability

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 1052 KB  
Article
Performance Evaluation of NIST-Standardized Post-Quantum and Symmetric Ciphers for Mitigating Deepfakes
by Mohammad Alkhatib
Cryptography 2026, 10(2), 15; https://doi.org/10.3390/cryptography10020015 - 26 Feb 2026
Viewed by 277
Abstract
Deepfake technology can produce highly realistic manipulated media which pose as significant cybersecurity threats, including fraud, misinformation, and privacy violations. This research proposes a deepfake prevention approach based on symmetric and asymmetric ciphers. Post-quantum asymmetric ciphers were utilized to perform digital signature operations, [...] Read more.
Deepfake technology can produce highly realistic manipulated media which pose as significant cybersecurity threats, including fraud, misinformation, and privacy violations. This research proposes a deepfake prevention approach based on symmetric and asymmetric ciphers. Post-quantum asymmetric ciphers were utilized to perform digital signature operations, which offer essential security services, including integrity, authentication, and non-repudiation. Symmetric ciphers were also employed to provide confidentiality and authentication. Unlike classical ciphers that are vulnerable to quantum attacks, this study adopts quantum-resilient ciphers to offer long-term security. The proposed approach enables entities to digitally sign media content before public release on other platforms. End users can subsequently verify the authenticity of content using the public keys of the media creators. To identify the most efficient ciphers to perform cryptography operations required for deepfake prevention, the study explores the implementation of quantum-resilient symmetric and asymmetric ciphers standardized by NIST, including Dilithium, Falcon, SPHINCS+, and Ascon-80pq. Additionally, this research provides comprehensive comparisons between the various classical and post-quantum ciphers in both categories: symmetric and asymmetric. Experimental results revealed that Dilithium-5 and Falcon-512 algorithms outperform other post-quantum ciphers, with a time delay of 2.50 and 251 ms, respectively, for digital signature operations. The Falcon-512 algorithm also demonstrates superior resource efficiency, making it a cost-effective choice for digital signature operations. With respect to symmetric ciphers, Ascon-80pq achieved the lowest time consumption, taking just 0.015 ms to perform encryption and decryption operations. Also, it is a significant option for constrained devices, since it consumes fewer resources compared to standard symmetric ciphers, such as AES. Through comprehensive evaluations and comparisons of various symmetric and asymmetric ciphers, this study serves as a blueprint to identify the most efficient ciphers to perform the cryptography operations necessary for deepfake prevention. Full article
Show Figures

Figure 1

32 pages, 2876 KB  
Article
CCNETS: A Modular Causal Learning Framework for Pattern Recognition in Imbalanced Datasets
by Hanbeot Park, Yunjeong Cho and Hunhee Kim
Appl. Sci. 2026, 16(4), 1998; https://doi.org/10.3390/app16041998 - 17 Feb 2026
Viewed by 230
Abstract
Handling class imbalance remains a central challenge in machine learning, particularly in pattern recognition tasks where identifying rare but critical anomalies is of paramount importance. Traditional generative models often decouple data synthesis from classification, leading to a distribution mismatch that limits their practical [...] Read more.
Handling class imbalance remains a central challenge in machine learning, particularly in pattern recognition tasks where identifying rare but critical anomalies is of paramount importance. Traditional generative models often decouple data synthesis from classification, leading to a distribution mismatch that limits their practical benefit. To address these shortcomings, we introduce Causal Cooperative Networks (CCNETS), a modular framework that establishes a functional causal link between generation, inference, and reconstruction. CCNETS is composed of three specialized cooperative modules: an Explainer for latent feature abstraction, a Reasoner for probabilistic label prediction, and a Producer for context-aware data synthesis. These components interact through a dynamic causal feedback loop, where classification outcomes directly guide targeted sample synthesis to adaptively reinforce vulnerable decision boundaries. A key innovation, our proposed Zoint mechanism, enables the adaptive fusion of latent and observable features, enhancing semantic richness and decision-making robustness under uncertainty. We evaluated CCNETS on two distinct real-world datasets: Credit Card Fraud Detection dataset, characterized by extreme imbalance (fraud rate < 0.2%), and the AI4I 2020 Predictive Maintenance dataset (failure rate < 4%). Across comprehensive experimental setups, CCNETS consistently outperformed baseline methods, achieving superior F1-scores, and AUPRC. Furthermore, data synthesized by CCNETS demonstrated enhanced generalization and learning stability under limited data conditions. These results establish CCNETS as a scalable, interpretable, and hybrid soft computing framework that effectively aligns synthetic data with classifier objectives, advancing robust imbalanced learning. Full article
(This article belongs to the Special Issue Machine Learning and Its Application for Anomaly Detection)
Show Figures

Figure 1

32 pages, 1189 KB  
Review
Honey Fraud as a Moving Analytical Target: Omics-Informed Authentication Within a Multi-Layer Analytical Framework
by Dagmar Schoder
Foods 2026, 15(4), 712; https://doi.org/10.3390/foods15040712 - 14 Feb 2026
Viewed by 527
Abstract
Honey fraud represents a persistent and analytically challenging form of food adulteration, driven by globalised supply chains, strong economic incentives and asymmetries in regulatory oversight and analytical capacity. Conventional physicochemical, spectroscopic and isotopic methods provide legally robust tools for routine control, yet increasingly [...] Read more.
Honey fraud represents a persistent and analytically challenging form of food adulteration, driven by globalised supply chains, strong economic incentives and asymmetries in regulatory oversight and analytical capacity. Conventional physicochemical, spectroscopic and isotopic methods provide legally robust tools for routine control, yet increasingly struggle to detect sophisticated adulteration strategies that are compositionally optimised to mimic authentic honey profiles. These challenges are amplified in a global context, where heterogeneous enforcement landscapes and fragmented analytical infrastructures create exploitable vulnerabilities across international trade networks. This narrative review synthesises current knowledge on honey fraud typologies and critically evaluates established analytical approaches alongside emerging omics-based authentication strategies, including genomics, metabolomics, proteomics and microbiome profiling. Omics-based approaches extend authenticity assessment beyond single-marker paradigms by capturing multidimensional biological and compositional signatures, thereby improving sensitivity to subtle and system-aware fraud (i.e., adulteration strategies that adapt to prevailing analytical detection methods and regulatory thresholds) strategies. To maintain evidentiary clarity, this review explicitly distinguishes between analytically demonstrated vulnerabilities, technically feasible adulteration scenarios and fraud practices documented in regulatory or enforcement contexts. Advanced technology-driven strategies are therefore discussed as potential system-level risks rather than confirmed large-scale honey fraud cases. This differentiation not only safeguards evidentiary precision but also highlights the structural limits of purely analytical solutions. Beyond analytical performance, honey authentication is framed as a systemic challenge embedded in global food systems. This review highlights the need for integrated, data-driven and scalable authentication frameworks that align analytical innovation with reference harmonisation, governance structures and international regulatory cooperation to support resilient and globally robust honey authenticity control. Full article
Show Figures

Figure 1

33 pages, 3090 KB  
Article
Vulnerability to Counterfeit Currency Fraud in Bulgaria: Public Competency Assessment in Identifying Genuine Lev Banknotes Before the Euro Cash Changeover
by Georgi Georgiev, Ivan Georgiev, Katina Kisyova and Slavi Georgiev
Soc. Sci. 2026, 15(2), 104; https://doi.org/10.3390/socsci15020104 - 9 Feb 2026
Viewed by 314
Abstract
This article examines vulnerability to counterfeit currency fraud in Bulgaria by assessing citizens’ competence in recognizing genuine banknotes of the national currency (BGN) prior to the introduction of euro banknotes in 2026. Counterfeit banknotes represent a form of economic crime in which individual [...] Read more.
This article examines vulnerability to counterfeit currency fraud in Bulgaria by assessing citizens’ competence in recognizing genuine banknotes of the national currency (BGN) prior to the introduction of euro banknotes in 2026. Counterfeit banknotes represent a form of economic crime in which individual victims’ losses are closely tied to their ability to authenticate cash in everyday transactions. Drawing on level-1 security features and guidelines of the Bulgarian National Bank, we developed a structured questionnaire to operationalize knowledge of key authenticity checks (hologram, intaglio printing, watermark, security thread, see-through register). The survey was administered online and on paper over a 20-day period (22 August–11 September 2025) and completed by 371 respondents from across the country. Using descriptive statistics tools, we identify three distinct groups: (i) highly competent respondents who reliably distinguish genuine from counterfeit banknotes; (ii) individuals with high self-reported confidence but inconsistent performance; and (iii) a particularly vulnerable group with low knowledge of security features, limited awareness of official guidance and low self-confidence. Vulnerability is significantly associated with lower education, residence in smaller settlements, lack of prior exposure to counterfeit banknotes and absence of contact with institutional information campaigns. The findings have direct implications for crime prevention and criminal justice policy: they provide an evidence base for targeted public awareness initiatives and risk-based allocation of resources aimed at protecting high-risk groups from currency-related fraud in the context of the monetary transition. Full article
(This article belongs to the Section Crime and Justice)
Show Figures

Figure 1

28 pages, 2317 KB  
Article
Enhancing the Sustainability of Food Supply Chains: Insights from Inspectors and Official Controls in Greece
by Christos Roukos, Dimitrios Kafetzopoulos, Alexandra Pavloudi, Fotios Chatzitheodoridis and Achilleas Kontogeorgos
Sustainability 2026, 18(2), 1101; https://doi.org/10.3390/su18021101 - 21 Jan 2026
Viewed by 277
Abstract
Food fraud represents a growing global challenge with significant implications for public health, market integrity, sustainability, and consumer trust. Beyond economic losses, fraudulent practices undermine the environmental and social sustainability of food systems by distorting markets, misusing natural resources, and weakening incentives for [...] Read more.
Food fraud represents a growing global challenge with significant implications for public health, market integrity, sustainability, and consumer trust. Beyond economic losses, fraudulent practices undermine the environmental and social sustainability of food systems by distorting markets, misusing natural resources, and weakening incentives for authentic and responsible production. Despite the establishment of harmonized frameworks of the European Union for official controls, the increasing complexity of food supply chains has exposed persistent gaps in fraud detection, particularly for high-value products such as those with PDO (Protected Designation of Origin) and PGI (Protected Geographical Ιndication) Certification. This study investigates the perceptions, attitudes, and experiences of frontline inspectors in Greece to assess current challenges and opportunities for strengthening official food fraud controls. Data were collected through a structured questionnaire, validated by experts and administered nationwide, involving 122 participants representing all major national food inspection authorities. Statistical analysis revealed significant institutional differences in perceptions of fraud prevalence, with mislabeling of origin, misleading organic claims, ingredient substitution, and documentation irregularities identified as the most common fraudulent practices. Olive oil, honey, meat, and dairy emerged as the most vulnerable product categories. Inspectors reported relying primarily on consumer complaints and institutional databases as key tools for identifying fraud risks. Food fraud was perceived to contribute strongly to losses in consumer trust in food safety and product authenticity, as well as to the erosion of sustainable production models that depend on transparency, fair competition, and responsible resource use. Overall, the findings highlight detection gaps, uneven resources across authorities, and the need for improved coordination and capacity-building to support more efficient, transparent, and sustainability-oriented food fraud control in Greece. Full article
Show Figures

Figure 1

34 pages, 4013 KB  
Article
Machine Learning-Based Cyber Fraud Detection: A Comparative Study of Resampling Methods for Imbalanced Credit Card Data
by Eyad Btoush, Thaeer Kobbaey, Hatem Tamimi and Xujuan Zhou
Appl. Sci. 2026, 16(2), 850; https://doi.org/10.3390/app16020850 - 14 Jan 2026
Viewed by 635
Abstract
The prevalence of online transactions and extensive adoption of credit card payments have contributed to the escalation of credit card cyber fraud in modern society. These trends are propelled by technological advancements, which provide fraudulent actors with more opportunities. Fraudsters exploit victims’ financial [...] Read more.
The prevalence of online transactions and extensive adoption of credit card payments have contributed to the escalation of credit card cyber fraud in modern society. These trends are propelled by technological advancements, which provide fraudulent actors with more opportunities. Fraudsters exploit victims’ financial vulnerabilities by obtaining illegal access to sensitive credit card information through deceptive means, such as phishing, fraudulent phone calls, and fraudulent SMS messages. This study predicts and detects potential instances of cyber fraud in credit card transactions by employing Machine Learning (ML) techniques, including Decision Tree (DT); Random Forest (RF); Logistic Regression (LR); Support Vector Machine (SVM); K-Nearest Neighbors (KNN); XGBoost; CatBoost; and sampling techniques such as Tomek Link, Synthetic Minority oversampling technique (SMOTE), Edited Nearest Neighbor (ENN), Tomek+ENN, and SMOTE+ENN. To determine the performance of the algorithms in terms of accuracy, precision, recall, F1 score, and ROC-AUC for credit card cyber fraud detection, we conducted a comparative analysis of the extant ML techniques. Full article
Show Figures

Figure 1

28 pages, 4873 KB  
Article
MOX Sensors for Authenticity Assessment and Adulteration Detection in Extra Virgin Olive Oil (EVOO)
by Elisabetta Poeta, Estefanía Núñez-Carmona, Veronica Sberveglieri, Alejandro Bernal, Jesús Lozano and Ramiro Sánchez
Sensors 2026, 26(1), 275; https://doi.org/10.3390/s26010275 - 1 Jan 2026
Viewed by 697
Abstract
Food fraud, particularly in the olive oil sector, represents a pressing concern within the agri-food industry, with implications for consumer trust and product authenticity. Certified products like Protected Designation of Origin (PDO) Extra Virgin Olive Oil (EVOO) are premium products that undergo strict [...] Read more.
Food fraud, particularly in the olive oil sector, represents a pressing concern within the agri-food industry, with implications for consumer trust and product authenticity. Certified products like Protected Designation of Origin (PDO) Extra Virgin Olive Oil (EVOO) are premium products that undergo strict quality controls, must comply with specific production regulations, and generally have a higher market price. These characteristics make them particularly vulnerable to economically motivated adulteration. In this study, the adulteration of PDO EVOO with Olive Pomace Oil (POO) and Olive Oil (OO) was investigated through a combined analytical approach. A traditional technique, gas chromatography–mass spectrometry (GC-MS) combined with solid-phase microextraction (SPME), was employed alongside an innovative method based on an electronic nose equipped with metal oxide semiconductor (MOX) sensors. GC-MS analysis enabled the identification of characteristic volatile compounds, providing a detailed chemical fingerprint of the different oil samples. Concurrently, the MOX sensor array successfully detected variations in the volatile profiles released by the adulterated oils, demonstrating its potential as a rapid and cost-effective screening tool. The complementary use of both techniques highlighted the reliability of MOX sensors in differentiating authentic PDO EVOO from adulterated samples and underscored their applicability in routine quality control and fraud prevention strategies. Full article
(This article belongs to the Special Issue Electrochemical Sensors in the Food Industry: 2nd Edition)
Show Figures

Graphical abstract

20 pages, 2159 KB  
Article
1H-NMR Analysis of Wine Metabolites: Method Development and Validation
by Guillaume Leleu, Rémi Butelle, Daniel Jacob, Lou-Ann Kurkiewicz, Jean-Claude Boulet, Catherine Deborde, Matthieu Dubernet, Laetitia Gaillard, Antoine Galvan, Karen Gaudin, Alexandra Gossé, Markus Herderich, Annick Moing, Sophie Rosset, Flynn Watson, Gregory Da Costa and Tristan Richard
Molecules 2026, 31(1), 65; https://doi.org/10.3390/molecules31010065 - 24 Dec 2025
Viewed by 705
Abstract
Wine, as a high-value product, is vulnerable to counterfeiting. To tackle increasingly sophisticated fraud, innovative analytical approaches are required. However, they must undergo rigorous validation. Proton nuclear magnetic resonance spectroscopy (1H-NMR) is intrinsically quantitative, reproducible, and fast, making it a promising [...] Read more.
Wine, as a high-value product, is vulnerable to counterfeiting. To tackle increasingly sophisticated fraud, innovative analytical approaches are required. However, they must undergo rigorous validation. Proton nuclear magnetic resonance spectroscopy (1H-NMR) is intrinsically quantitative, reproducible, and fast, making it a promising tool for official control. This study presents the development and validation of a standardised and fully automated workflow for the quantification of 20 oenologically relevant compounds, including organic acids, sugars, alcohols, esters, phenolics, and an alkaloid. The method combines optimised sample preparation, external quantification standards, spectrometer calibration, and a dedicated R package (RnmrQuant1D) for fully automated spectral processing, enabling high-throughput and operator-independent analysis. Validation was performed under intermediate precision according to OIV metrological standards, evaluating accuracy, precision, robustness, limits of quantification, and measurement uncertainty. The results demonstrated excellent linearity, trueness, and reproducibility, matching the targeted analytical performance. Measurement uncertainties were estimated both by conventional linear modelling and by a dynamic approach better suited to detection limits. The workflow is easy to implement, requires minimal sample consumption, and substantially reduces operator bias. Beyond validating a robust method, this study provides a framework for harmonised, transferable 1H-NMR workflows that could support large-scale databases, integration with chemometric models, and ultimately, 1H-NMR’s recognition as a relevant method for wine authentication and quality control. This work fills a crucial gap in wine analysis by uniting practical application and rigorous methods, enabling broader adoption in control laboratories worldwide. Full article
(This article belongs to the Special Issue 30th Anniversary of Molecules—Recent Advances in Food Chemistry)
Show Figures

Figure 1

62 pages, 2147 KB  
Review
Blockchain-Based Certification in Fisheries: A Survey of Technologies and Methodologies
by Isaac Olayemi Olaleye, Oluwafemi Olowojuni, Asoro Ojevwe Blessing and Jesús Rodríguez-Molina
IoT 2026, 7(1), 1; https://doi.org/10.3390/iot7010001 - 22 Dec 2025
Viewed by 1038
Abstract
The integrity of certification processes in the agrifood and fishing industries is essential for combating fraud, ensuring food safety, and meeting rising consumer expectations for transparency and sustainability. Yet, current certification systems remain fragmented, and they are vulnerable to tampering and highly dependent [...] Read more.
The integrity of certification processes in the agrifood and fishing industries is essential for combating fraud, ensuring food safety, and meeting rising consumer expectations for transparency and sustainability. Yet, current certification systems remain fragmented, and they are vulnerable to tampering and highly dependent on manual or centralized procedures. This study addresses these gaps by providing a comprehensive survey that systematically classifies blockchain-based certification technologies and methodologies applied to the fisheries sector. The survey examines how the blockchain enhances trust through immutable record-keeping, smart contracts, and decentralized verification mechanisms, ensuring authenticity and accountability across the supply chain. Special attention is given to case studies and implementations that focus on ensuring food safety, verifying sustainability claims, and fostering consumer trust through transparent labeling. Furthermore, the paper identifies technological barriers, such as scalability and interoperability, and puts forward a collection of functional and non-functional requirements for holistic blockchain implementation. By providing a detailed overview of current trends and gaps, this study aims to guide researchers, industry stakeholders, and policymakers in adopting and optimizing blockchain technologies for certification. The findings highlight the potential of blockchain to innovate certification systems, easing the way for more resilient, sustainable, and consumer-centric agrifood and fishing industries. Full article
Show Figures

Figure 1

19 pages, 27291 KB  
Article
Robust Financial Fraud Detection via Causal Intervention and Multi-View Contrastive Learning on Dynamic Hypergraphs
by Xiong Luo
Mathematics 2025, 13(24), 4018; https://doi.org/10.3390/math13244018 - 17 Dec 2025
Viewed by 643
Abstract
Financial fraud detection is critical to modern economic security, yet remains challenging due to collusive group behavior, temporal drift, and severe class imbalance. Most existing graph neural network (GNN) detectors rely on pairwise edges and correlation-driven learning, which limits their ability to represent [...] Read more.
Financial fraud detection is critical to modern economic security, yet remains challenging due to collusive group behavior, temporal drift, and severe class imbalance. Most existing graph neural network (GNN) detectors rely on pairwise edges and correlation-driven learning, which limits their ability to represent high-order group interactions and makes them vulnerable to spurious environmental cues (e.g., hubs or temporal bursts) that correlate with labels but are not necessarily causal. We propose Causal-DHG, a dynamic hypergraph framework that integrates hypergraph modeling, causal intervention, and multi-view contrastive learning. First, we construct label-agnostic hyperedges from publicly available metadata to capture high-order group structures. Second, a Multi-Head Spatio-Temporal Hypergraph Attention encoder models group-wise dependencies and their temporal evolution. Third, a Causal Disentanglement Module decomposes representations into causal and environment-related factors using HSIC regularization, and a dictionary-based backdoor adjustment approximates the interventional prediction P(Ydo(C)) to suppress spurious correlations. Finally, we employ self-supervised multi-view contrastive learning with mild hypergraph augmentations to leverage unlabeled data and stabilize training. Experiments on YelpChi, Amazon, and DGraph-Fin show consistent gains in AUC/F1 over strong baselines such as CARE-GNN and PC-GNN, together with improved robustness under feature and structural perturbations. Full article
Show Figures

Figure 1

25 pages, 3207 KB  
Article
A Privacy-Preserving Approach to Health Insurance Fraud Detection Using Vertical Federated Learning
by Raghi K R, Arjun Paramarthalingam, Harini Kanthan and Mahalakshmi Karthiban
Sensors 2025, 25(23), 7354; https://doi.org/10.3390/s25237354 - 3 Dec 2025
Viewed by 1081
Abstract
In fraud detection, centralized approaches often face challenges related to data protection, security, and potential data breaches. Such methods require sensitive healthcare and insurance data to be pooled in one location, which increases vulnerability to misuse. This paper introduces FraudNetX, a privacy-preserving fraud [...] Read more.
In fraud detection, centralized approaches often face challenges related to data protection, security, and potential data breaches. Such methods require sensitive healthcare and insurance data to be pooled in one location, which increases vulnerability to misuse. This paper introduces FraudNetX, a privacy-preserving fraud detection framework, by utilizing Vertical Federated Learning (VFL) to address centralized system limitations. VFL enables models to be trained collaboratively while ensuring data privacy and security through quantifiable Differential Privacy (DP) guarantees (ε = 1.0, δ = 1 × 105). FraudNetX implements a noise injection based on Differential Privacy (DP) with Gaussian noise (s = 1.2) in the process of training the model to guarantee confidentiality of the personal data. This research entails two partner organizations, which are a hospital and an insurance company, in an actual VFL configuration. The model is trained on 10 communication rounds in this federated setup, and the local optimization of each client is followed by the global aggregation step. Hospitals and insurers can learn fraud patterns without sharing their data. The proposed FraudNetX is a hybrid architecture which is composed of Feedforward Neural Networks (FFNNs) and transformer encoders. An adaptive weighting strategy has been applied to handle category imbalance concern and enhance recall of a few categories which are hard to detect, especially in fraud involving minorities, balancing the recall performance. The framework also includes a decision model that uses hospital data and claim behavior to classify each claim as legitimate, under review, or fraudulent. The experimental evaluation on the real-world dataset demonstrates that FraudNetX enhances the accuracy and F1-score of fraud detection (accuracy = 99.91%, F1 = 99.94%, ROC-AUC = 0.98) but does not violate data privacy. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 425 KB  
Article
Predictors of Digital Fraud: Evidence from Thailand
by Tanpat Kraiwanit, Pongsakorn Limna, Rattaphong Sonsuphap and Veraphong Chutipat
J. Risk Financial Manag. 2025, 18(12), 671; https://doi.org/10.3390/jrfm18120671 - 26 Nov 2025
Viewed by 1835
Abstract
This study examined the complex interplay of demographic characteristics, behavioral patterns, and technological factors that contribute to digital fraud victimization within the context of a developing economy, focusing specifically on Thailand. Utilizing data collected from 1200 respondents and applying binary logistic regression analysis, [...] Read more.
This study examined the complex interplay of demographic characteristics, behavioral patterns, and technological factors that contribute to digital fraud victimization within the context of a developing economy, focusing specifically on Thailand. Utilizing data collected from 1200 respondents and applying binary logistic regression analysis, the research identified key predictors of fraud exposure, including age, income, student status, use of portable devices, and social media engagement. A paradoxical finding emerged: stronger perceived digital security was associated with higher fraud risk, indicating that overconfidence in platform safeguards may unintentionally increase vulnerability. Interestingly, users’ perceptions of digital security—such as confidence in identity verification and password protocols—were positively associated with fraud victimization, indicating potential cognitive biases and overconfidence in digital environments. The findings revealed a high prevalence of fraud experiences among participants, highlighting the gap between perceived and actual digital safety. These results emphasized the urgent need for user-centered fraud prevention measures, enhanced digital literacy, and targeted public awareness campaigns. The study contributes to the broader understanding of cybersecurity challenges in emerging markets and offers policy-relevant insights for strengthening digital financial resilience. Full article
(This article belongs to the Section Risk)
Show Figures

Figure 1

42 pages, 3449 KB  
Article
Blockchain–AI–Geolocation Integrated Architecture for Mobile Identity and OTP Verification
by Gajasin Gamage Damith Sulochana and Dilshan Indraraj De Silva
Future Internet 2025, 17(12), 534; https://doi.org/10.3390/fi17120534 - 23 Nov 2025
Viewed by 1245
Abstract
One-Time Passwords (OTPs) are a core component of multi-factor authentication in banking, e-commerce, and digital platforms. However, conventional delivery channels such as SMS and email are increasingly vulnerable to SIM-swap fraud, phishing, spoofing, and session hijacking. This study proposes an end-to-end mobile authentication [...] Read more.
One-Time Passwords (OTPs) are a core component of multi-factor authentication in banking, e-commerce, and digital platforms. However, conventional delivery channels such as SMS and email are increasingly vulnerable to SIM-swap fraud, phishing, spoofing, and session hijacking. This study proposes an end-to-end mobile authentication architecture that integrates a permissioned Hyperledger Fabric blockchain for tamper-evident identity management, an AI-driven risk engine for behavioral and SIM-swap anomaly detection, Zero-Knowledge Proofs (ZKPs) for privacy-preserving verification, and geolocation-bound OTP validation for contextual assurance. Hyperledger Fabric is selected for its permissioned governance, configurable endorsement policies, and deterministic chaincode execution, which together support regulatory compliance and high throughput without the overhead of cryptocurrency. The system is implemented as a set of modular microservices that combine encrypted off-chain storage with on-chain hash references and smart-contract–enforced policies for geofencing and privacy protection. Experimental results show sub-0.5 s total verification latency (including ZKP overhead), approximately 850 transactions per second throughput under an OR-endorsement policy, and an F1-score of 0.88 for SIM-swap detection. Collectively, these findings demonstrate a scalable, privacy-centric, and interoperable solution that strengthens OTP-based authentication while preserving user confidentiality, operational transparency, and regulatory compliance across mobile network operators. Full article
(This article belongs to the Special Issue Advances in Wireless and Mobile Networking—2nd Edition)
Show Figures

Graphical abstract

33 pages, 607 KB  
Article
Assessing the Drivers of Financial Vulnerability and Fraud in Brazil: The Critical Role of Financial Planning over Literacy
by Benjamin Miranda Tabak, Débora H. Cardoso and Cristiano C. Silva
Sustainability 2025, 17(20), 9219; https://doi.org/10.3390/su17209219 - 17 Oct 2025
Cited by 3 | Viewed by 1484
Abstract
This paper introduces and validates a comprehensive instrument designed to measure financial literacy, its underlying determinants, and to assess how factors such as planning affect financial vulnerability and fraud in Brazil. This work represents a crucial step toward achieving several Sustainable Development Goals [...] Read more.
This paper introduces and validates a comprehensive instrument designed to measure financial literacy, its underlying determinants, and to assess how factors such as planning affect financial vulnerability and fraud in Brazil. This work represents a crucial step toward achieving several Sustainable Development Goals (SDGs). The study utilizes a two-fold methodology. First, Confirmatory Factor Analysis (CFA) is used to validate a six-component model consisting of Financial Literacy, Vulnerability, Fraud, Cognitive Reflection, Crypto Literacy, and Planning. This analysis is followed by the development and interpretation of a Random Forest model, which was identified as the best-performing predictor in a comparison of seven machine learning algorithms. The CFA results showed that Financial Planning has a stronger negative correlation with Financial Vulnerability (−0.642) and Fraud (−0.375) than Financial Literacy does. This evidence was further supported by the machine learning analysis; analyses using both SHAP and LIME identified Financial Planning as the strongest predictor of financial vulnerability and fraud. The analysis further showed significant social inequalities in the developed models and identified the gender variable (female) as an important predictor of enhanced financial vulnerability. Converging evidence from both CFA and machine learning confirms that sound planning practices are more important than financial knowledge in reducing financial distress. Our findings provide a solid foundation for the development of inclusive public policy that promotes behavioral change, aiming to reduce systemic inequalities (SDG 10) and achieve sustainable economic stability (SDG 8), thereby supporting social goals and the Sustainable Development Goals. Full article
Show Figures

Figure 1

17 pages, 275 KB  
Article
Digital Finance Adoption in Brazil: An Exploratory Analysis on Financial Apps and Digital Financial Literacy
by Natali Morgana Cassola, Kalinca Léia Becker, Kelmara Mendes Vieira, Maria Fernanda da Silveira Feldmann, Mariana Rodrigues Chaves, Iasmin Camile Berndt and Anna Febe Machado Arruda
J. Risk Financial Manag. 2025, 18(10), 560; https://doi.org/10.3390/jrfm18100560 - 3 Oct 2025
Cited by 2 | Viewed by 2141
Abstract
Digital transformation has fundamentally altered how individuals manage their finances. The expansion of financial technologies and the digitalization of banking services underscore the need for digital financial literacy, defined as the ability to safely use financial applications and make informed decisions within virtual [...] Read more.
Digital transformation has fundamentally altered how individuals manage their finances. The expansion of financial technologies and the digitalization of banking services underscore the need for digital financial literacy, defined as the ability to safely use financial applications and make informed decisions within virtual environments. This study examined the perceptions of financial application use across age groups and their corresponding level of digital financial literacy. This exploratory study used a convenience sample of 41 semi-structured interviews conducted in 2025. The data were analyzed using content analysis and descriptive statistics. The findings indicated that most participants prioritized digital apps over traditional channels and expressed confidence in their use, although concerns about data security remained. Participants identified key advantages, including convenience, efficiency, and centralized access, yet few used apps for financial planning. Most respondents demonstrated an intermediate level of digital knowledge, with limited proficiency in executing complex financial tasks. Perceptions revealed both optimism and apprehension: while participants valued the practicality of digital tools, they also recognized risks such as fraud, exclusion of vulnerable groups, and technological dependence. The limited and non-representative sample limits generalization, suggesting the need for broader surveys. Enhanced public policies promoting digital financial education in Brazil are recommended. Full article
(This article belongs to the Special Issue The New Horizons of Global Financial Literacy)
Back to TopTop