Numerous and frequently-updated resource results are available from this WorldCat. Please choose whether or not you want other users to be able to see on your profile that this library is a favorite of yours. Finding libraries that hold this item You may have already requested this item.
|Published (Last):||18 January 2007|
|PDF File Size:||14.97 Mb|
|ePub File Size:||16.49 Mb|
|Price:||Free* [*Free Regsitration Required]|
Fraud detection tools. Directory of Open Access Journals Sweden. Full Text Available This article aims to introduce to readers the topic of fraud management — detection of fraudulent behaviour. The article is divided into two parts. The first part presents what is meant by fraud and fraudulent behaviour. In the second part a case study dealing with fraudulent behaviour detection in the procurement area is introduced. Security, Fraud Detection. Fraud detection based on audit trails.
Automatic alerts like credit-card alerts based on suspicious patterns. A prescription fraud detection model. Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly.
We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of The proposed model has the potential advantages including on-line risk prediction for prescription fraud , off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets.
We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. All rights reserved. One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud : a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered.
They circumvent internal controls in place to prevent this kind of fraud , such as a goods receipt, e. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud , but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.
Unsupervised learning for robust bitcoin fraud detection. Full Text Available The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud.
Anomaly detection plays a pivotal role in data mining since most outlying Most of the research in this direction has used the numbers quantitative information i. In this study we propose a text mining approach for detecting financial statement frau Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. Keywords: Call data, fraud Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually.
Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures.
In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software.
Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Wine fraud. Lars HolmbergFaculty of Law, University of Copenhagen, Copenhagen, DenmarkAbstract: Wine fraud may take several forms, of which two are discussed here: consumption fraud aimed at the wine market in general, and collector fraud aimed at the very top of the wine market.
Examples of wine fraud past and present are given, and a suggestion about the extent of contemporary consumer fraud in Europe is provided. Technological possibilities for future detection and prevention of both forms of wine fra Full Text Available Lars HolmbergFaculty of Law, University of Copenhagen, Copenhagen, DenmarkAbstract: Wine fraud may take several forms, of which two are discussed here: consumption fraud aimed at the wine market in general, and collector fraud aimed at the very top of the wine market.
Technological possibilities for future detection and prevention of both forms of wine fraud are discussed. Keywords: adulteration, counterfeit, detection. Accounting Fraud : an estimation of detection probability. Full Text Available Financial statement fraud FSF is costly for investors and can damage the credibility of the audit profession.
To prevent and detect fraud , it is helpful to know its causes. The binary choice models e. Using a sample of companies accused of fraud by the Securities and Exchange Commission SEC, we estimated a logit model that corrects the problems arising from undetected frauds in U. To avoid multicollinearity problems, we extracted seven factors from 28 variables using the principal factors method.
Our results indicate that only 1. Of the six significant variables included in the traditional, uncorrected logit model, three were found to be actually non-significant in the corrected model. The likelihood of FSF is 5. Responsibility for preventing and detecting fraud rest with management entities. Although the auditor is not and cannot be held responsible for preventing fraud and errors, in yourwork, he can have a positive role in preventing fraud and errors by deterring their occurrence.
Theauditor should plan and perform the audit with an attitude of professional skepticism, recognizingthat condition or events may be found that indicate that fraud or error may exist. Based on the audit risk assessment, aud Full Text Available This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining.
A matching algorithm is also proposed to find to which pattern legal or fraud the incoming transaction of a particular customer is closer and a decision is made accordingly. In order to handle the anonymous nature of the data, no preference is given to any of the attributes and each attribute is considered equally for finding the patterns.
The performance evaluation of the proposed model is done on UCSD Data Mining Contest Dataset anonymous and imbalanced and it is found that the proposed model has very high fraud detection rate, balanced classification rate, Matthews correlation coefficient, and very less false alarm rate than other state-of-the-art classifiers.
Fraud Miner: a novel credit card fraud detection model based on frequent itemset mining. This paper proposes an intelligent credit card fraud detection model for detecting fraud from highly imbalanced and anonymous credit card transaction datasets. AICPA standard aids in detecting risk factors for fraud. American Institute of Certified Public Accountants. SAS No. But while SAS No.
Accordingly, financial managers should discuss thoroughly with auditors the scope and focus of an audit as a means to further their compliance efforts. With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection FAFD has become an emerging topic of great importance for academic, research and industries. The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud , collective known as forensic accounting.
Data mining techniques are providing great aid in financial accounting fraud detection , since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection.
The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field. The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data.
Modeling fraud detection and the incorporation of forensic specialists in the audit process. Financial statement audits are still comparatively poor in fraud detection.
Forensic specialists can play a significant role in increasing audit quality. In this paper, based on prior academic research, I develop a model of fraud detection and the incorporation of forensic specialists in the audit The intention of the model is to identify the reasons why the audit is weak in fraud detection and to provide the analytical framework to assess whether the incorporation of forensic specialists can help to improve it.
The results show that such specialists can potentially improve the fraud Overall, even though fraud detection is one of the main topics in research there are very few studies done on the subject of how auditors co-operate with forensic specialists.
Thus, the paper concludes with suggestions for further With an increase in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection has become an emerging topics of great importance for academics, research and industries.
Financial fraud is a deliberate act that is contrary to law, rule or policy with intent to obtain unauthorized financial benefit and intentional misstatements or omission of amounts by deceiving users of financial statements, especially investors and creditors.
Data mining tec Neural fraud detection in credit card operations. This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities.
Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.
Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems.
We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds ; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology. The approach to classification and prediction tasks for detection of unauthorized transactions is considered.
Full Text Available Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one.
Accounting Regulation in Europe
Auditoría : un enfoque integral
principios de auditoria (14ta ed) whittington . pany