You are on page 1of 1

References

Felson, C. a. (1979). Routine Activity Theory. Retrieved from


https://www.sciencedirect.com/topics/social-sciences/routine-activity-theory?
fbclid=IwAR1daFAb0IzM5jDqBM1T05gmhEocNxw0lPdtZT9fYNwc6FjeD3ggb
eGAQ5M
Gottfredson, M. (2017, 7 27). Self-Control Theory and Crime. Retrieved from
https://oxfordre.com/criminology/display/10.1093/acrefore/9780190264079.001.0
001/acrefore-9780190264079-e-252
GRIFFIN, J. M. (2023, 2 27). Did FinTech Lenders Facilitate PPP Fraud? Retrieved
from https://doi.org/10.1111/jofi.13209
Hongliang Chen, C. E. (2017, 1 2). Computers in Human Behavior. Retrieved from
Securing online privacy: An empirical test on Internet scam.
Jerzy Błaszczyński, A. T. (2021, 1). Expert Systems with Applications. Retrieved from
Auto loan fraud detection using dominance-based rough set approach versus
machine learning methods.
Langenderfer, J. (2001, 5 25). Consumer vulnerability to scams, swindles, and fraud: A
new theory of visceral influences on persuasion.
Leo, M. (2019). Machine Learning in Banking Risk Management: A Literature Review.
Retrieved from https://doi.org/10.3390/risks7010029

You might also like