期刊文献+
共找到3,866篇文章
< 1 2 194 >
每页显示 20 50 100
Image Recognition Model of Fraudulent Websites Based on Image Leader Decision and Inception-V3 Transfer Learning
1
作者 Shengli Zhou Cheng Xu +3 位作者 Rui Xu Weijie Ding Chao Chen Xiaoyang Xu 《China Communications》 SCIE CSCD 2024年第1期215-227,共13页
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re... The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models. 展开更多
关键词 fraudulent website image leaders telecom fraud transfer learning
下载PDF
DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection
2
作者 Yuanyuan Ma Ang Chen +3 位作者 Cunzhi Hou Ruixia Jin Jinghui Zhang Ruixiang Li 《Computers, Materials & Continua》 SCIE EI 2024年第11期3301-3323,共23页
Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.Ho... Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification. 展开更多
关键词 fraudulent IP identification homology detection CLUSTERING genetic optimization algorithm telecom fraud identification
下载PDF
The Effects of Competence and Auditor Training on Fraud Detection Within Multinational Companies in Sub-Saharan Africa
3
作者 Ivan Djossa Tchokoté Joëlle Tsobze Tiomeguim 《Journal of Modern Accounting and Auditing》 2024年第1期1-13,共13页
The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach ... The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach was used to develop and test a research model based on three theories:agency theory,attribution theory,and cognitive dissonance theory.Responses from a panel of two hundred and nine(209)auditors who conducted a legal audit mission in a Sub-Saharan multinational were analyzed using SmartPLS 3.3.3 software.The results emphasize the crucial importance of auditors’competence and continuous training in fraud detection.However,professional skepticism and time pressure were found to be non-significant in this context.This conclusion provides essential insights for auditors,highlighting the key qualities needed to effectively address fraud detection within multinational corporations in Sub-Saharan Africa. 展开更多
关键词 fraud legal audit fraud detection MULTINATIONALS Sub-Saharan Africa
下载PDF
NFA:A neural factorization autoencoder based online telephony fraud detection
4
作者 Abdul Wahid Mounira Msahli +1 位作者 Albert Bifet Gerard Memmi 《Digital Communications and Networks》 SCIE CSCD 2024年第1期158-167,共10页
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac... The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks. 展开更多
关键词 Telecom industry Streaming anomaly detection fraud analysis Factorization machine Real-time system Security
下载PDF
Credit Card Fraud Detection Using Improved Deep Learning Models
5
作者 Sumaya S.Sulaiman Ibraheem Nadher Sarab M.Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第1期1049-1069,共21页
Fraud of credit cards is a major issue for financial organizations and individuals.As fraudulent actions become more complex,a demand for better fraud detection systems is rising.Deep learning approaches have shown pr... Fraud of credit cards is a major issue for financial organizations and individuals.As fraudulent actions become more complex,a demand for better fraud detection systems is rising.Deep learning approaches have shown promise in several fields,including detecting credit card fraud.However,the efficacy of these models is heavily dependent on the careful selection of appropriate hyperparameters.This paper introduces models that integrate deep learning models with hyperparameter tuning techniques to learn the patterns and relationships within credit card transaction data,thereby improving fraud detection.Three deep learning models:AutoEncoder(AE),Convolution Neural Network(CNN),and Long Short-Term Memory(LSTM)are proposed to investigate how hyperparameter adjustment impacts the efficacy of deep learning models used to identify credit card fraud.The experiments conducted on a European credit card fraud dataset using different hyperparameters and three deep learning models demonstrate that the proposed models achieve a tradeoff between detection rate and precision,leading these models to be effective in accurately predicting credit card fraud.The results demonstrate that LSTM significantly outperformed AE and CNN in terms of accuracy(99.2%),detection rate(93.3%),and area under the curve(96.3%).These proposed models have surpassed those of existing studies and are expected to make a significant contribution to the field of credit card fraud detection. 展开更多
关键词 Card fraud detection hyperparameter tuning deep learning autoencoder convolution neural network long short-term memory RESAMPLING
下载PDF
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
6
作者 Honghao Zhu MengChu Zhou +1 位作者 Yu Xie Aiiad Albeshri 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期377-390,共14页
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods. 展开更多
关键词 Credit card fraud detection(CCFD) dandelion algorithm(DA) feature selection normal sowing operator
下载PDF
An Anti-Fraud Policy:A Theoretical Framework for a Prosperity Tripod of Massive Data,Blockchain,and AI
7
作者 Reza G.Hamzaee Maryam Salimi 《Management Studies》 2024年第2期102-123,共22页
The authors’aspiration was to learn-and focus on policy against fraud-leading to the sustainably growing societal illnesses of dishonesty,fraud,pessimism,and divisive issues.The appropriate venue,within the currently... The authors’aspiration was to learn-and focus on policy against fraud-leading to the sustainably growing societal illnesses of dishonesty,fraud,pessimism,and divisive issues.The appropriate venue,within the currently evolving laws and regulations,is proposed to be a three-tier combination of massive data,including data accumulation,transformation,organization,stratification,estimations,data analysis,and blockchain technology,predicted to revolutionize competition and efficiency,which are further suggested to be prerequisites for a more successful creation and implementation of the third element,AI.A currently evolving prosperity tripod is hinging on the three technological legs of the massive data control/management,blockchain tech,and a rapidly growing AI.While briefly incorporating some analysis of the blockchain application,we have analytically focused on the rest-the data and AI-of what we deem to be the prospective prosperity tripod for businesses,markets,and societies,in general,despite the challenges and risks involved in each.Instead of h ypothesizing a predetermined economic model,we are proposing a data-based Vector Autoregression(VAR)methodology for the AI with an application to the fraud and anti-fraud structure and policymaking.Hopefully,the entire attempt would portend some tangible prospective contribution in an achievable positive societal change. 展开更多
关键词 fraud AI data VAR
下载PDF
Real-Time Fraud Detection Using Machine Learning
8
作者 Benjamin Borketey 《Journal of Data Analysis and Information Processing》 2024年第2期189-209,共21页
Credit card fraud remains a significant challenge, with financial losses and consumer protection at stake. This study addresses the need for practical, real-time fraud detection methodologies. Using a Kaggle credit ca... Credit card fraud remains a significant challenge, with financial losses and consumer protection at stake. This study addresses the need for practical, real-time fraud detection methodologies. Using a Kaggle credit card dataset, I tackle class imbalance using the Synthetic Minority Oversampling Technique (SMOTE) to enhance modeling efficiency. I compare several machine learning algorithms, including Logistic Regression, Linear Discriminant Analysis, K-nearest Neighbors, Classification and Regression Tree, Naive Bayes, Support Vector, Random Forest, XGBoost, and Light Gradient-Boosting Machine to classify transactions as fraud or genuine. Rigorous evaluation metrics, such as AUC, PRAUC, F1, KS, Recall, and Precision, identify the Random Forest as the best performer in detecting fraudulent activities. The Random Forest model successfully identifies approximately 92% of transactions scoring 90 and above as fraudulent, equating to a detection rate of over 70% for all fraudulent transactions in the test dataset. Moreover, the model captures more than half of the fraud in each bin of the test dataset. SHAP values provide model explainability, with the SHAP summary plot highlighting the global importance of individual features, such as “V12” and “V14”. SHAP force plots offer local interpretability, revealing the impact of specific features on individual predictions. This study demonstrates the potential of machine learning, particularly the Random Forest model, for real-time credit card fraud detection, offering a promising approach to mitigate financial losses and protect consumers. 展开更多
关键词 Credit Card fraud Detection Machine Learning SHAP Values Random Forest
下载PDF
Application Technologies and Challenges of Big Data Analytics in Anti-Money Laundering and Financial Fraud Detection
9
作者 Haoran Jiang 《Open Journal of Applied Sciences》 2024年第11期3226-3236,共11页
As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and cha... As financial criminal methods become increasingly sophisticated, traditional anti-money laundering and fraud detection approaches face significant challenges. This study focuses on the application technologies and challenges of big data analytics in anti-money laundering and financial fraud detection. The research begins by outlining the evolutionary trends of financial crimes and highlighting the new characteristics of the big data era. Subsequently, it systematically analyzes the application of big data analytics technologies in this field, including machine learning, network analysis, and real-time stream processing. Through case studies, the research demonstrates how these technologies enhance the accuracy and efficiency of anomalous transaction detection. However, the study also identifies challenges faced by big data analytics, such as data quality issues, algorithmic bias, and privacy protection concerns. To address these challenges, the research proposes solutions from both technological and managerial perspectives, including the application of privacy-preserving technologies like federated learning. Finally, the study discusses the development prospects of Regulatory Technology (RegTech), emphasizing the importance of synergy between technological innovation and regulatory policies. This research provides guidance for financial institutions and regulatory bodies in optimizing their anti-money laundering and fraud detection strategies. 展开更多
关键词 Big Data Analytics Anti-Money Laundering Financial fraud Detection Machine Learning Regulatory Technology
下载PDF
Determining of Employee Frauds in Forensic Accounting: A Research on Forensic Cases in the City of Kars in Turkey
10
作者 Duygu Anil Keskin Seyhan Goksu Ozturk 《Journal of Modern Accounting and Auditing》 2013年第6期729-738,共10页
Discovering and preventing the frauds which affect the business organizations negatively require a greater degree of specialism. Detecting a fraud in the organizations is very hard, because not only such a fraud is ex... Discovering and preventing the frauds which affect the business organizations negatively require a greater degree of specialism. Detecting a fraud in the organizations is very hard, because not only such a fraud is exercised by the people who have deep professional knowledge, but they also use some peculiar methods to hide their tricky activities. Therefore, it is obvious that it is necessary to have the fraud examiners and especially fraud auditors who should have deep professional knowledge and experience. The aim of this study is to give some general information about employee fraud, which targets the different functions of the companies, takes many forms, and reaches important levels in recent years, in qualitative point. In this study, firstly, forensic accounting is a highly dynamic area in nowadays which is related to fraud auditing and its profession, and its search area of frauds and employee frauds subjects have been reviewed. Finally, qualitative data were collected about fraud incidents which had occurred and been sent to the court in the province of Kars in Turkey. Actual case analysis method has been used in this study. The obtained data have been analyzed by using Statistical Package for the Social Sciences (SPSS) 17 statistics package program. Results of the study have been discussed and interpreted in details. 展开更多
关键词 forensic accounting M41 fraud M49 fraud detection M42 employee frauds
下载PDF
Fraud detections for online businesses:a perspective from blockchain technology 被引量:2
11
作者 Yuanfeng Cai Dan Zhu 《Financial Innovation》 2016年第1期256-265,共10页
Background:The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers.However,it is vulnerable to rating fraud.Some raters may inject unfairly high ... Background:The reputation system has been designed as an effective mechanism to reduce risks associated with online shopping for customers.However,it is vulnerable to rating fraud.Some raters may inject unfairly high or low ratings to the system so as to promote their own products or demote their competitors.Method:This study explores the rating fraud by differentiating the subjective fraud from objective fraud.Then it discusses the effectiveness of blockchain technology in objective fraud and its limitation in subjective fraud,especially the rating fraud.Lastly,it systematically analyzes the robustness of blockchain-based reputation systems in each type of rating fraud.Results:The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves.We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals:ballot-stuffing and bad-mouthing,and various attack models including constant attack,camouflage attack,whitewashing attack and sybil attack.Blockchain-based reputation systems are more robust against bad-mouthing than ballot-stuffing fraud.Conclusions:Blockchain technology provides new opportunities for redesigning the reputation system.Blockchain systems are very effective in preventing objective information fraud,such as loan application fraud,where fraudulent information is fact-based.However,their effectiveness is limited in subjective information fraud,such as rating fraud,where the ground-truth is not easily validated.Blockchain systems are effective in preventing bad mouthing and whitewashing attack,but they are limited in detecting ballot-stuffing under sybil attack,constant attacks and camouflage attack. 展开更多
关键词 Blockchain fraud detection Rating fraud Reputation systems
下载PDF
A Credit Card Fraud Detection Model Based on Multi-Feature Fusion and Generative Adversarial Network 被引量:1
12
作者 Yalong Xie Aiping Li +2 位作者 Biyin Hu Liqun Gao Hongkui Tu 《Computers, Materials & Continua》 SCIE EI 2023年第9期2707-2726,共20页
Credit Card Fraud Detection(CCFD)is an essential technology for banking institutions to control fraud risks and safeguard their reputation.Class imbalance and insufficient representation of feature data relating to cr... Credit Card Fraud Detection(CCFD)is an essential technology for banking institutions to control fraud risks and safeguard their reputation.Class imbalance and insufficient representation of feature data relating to credit card transactions are two prevalent issues in the current study field of CCFD,which significantly impact classification models’performance.To address these issues,this research proposes a novel CCFD model based on Multifeature Fusion and Generative Adversarial Networks(MFGAN).The MFGAN model consists of two modules:a multi-feature fusion module for integrating static and dynamic behavior data of cardholders into a unified highdimensional feature space,and a balance module based on the generative adversarial network to decrease the class imbalance ratio.The effectiveness of theMFGAN model is validated on two actual credit card datasets.The impacts of different class balance ratios on the performance of the four resamplingmodels are analyzed,and the contribution of the two different modules to the performance of the MFGAN model is investigated via ablation experiments.Experimental results demonstrate that the proposed model does better than state-of-the-art models in terms of recall,F1,and Area Under the Curve(AUC)metrics,which means that the MFGAN model can help banks find more fraudulent transactions and reduce fraud losses. 展开更多
关键词 Credit card fraud detection imbalanced classification feature fusion generative adversarial networks anti-fraud systems
下载PDF
Fraud Prevention Mechanisms of Malaysian Government-Linked Companies: An Assessment of Existence and Effectiveness 被引量:2
13
作者 Normah Omar Katerina Maria Abu Bakar 《Journal of Modern Accounting and Auditing》 2012年第1期15-31,共17页
Understanding the root causes of fraud and learning about the most effective fraud prevention mechanisms are critical in reducing the incidence of financial fraud. Therefore, this study solicits the views of fraud inv... Understanding the root causes of fraud and learning about the most effective fraud prevention mechanisms are critical in reducing the incidence of financial fraud. Therefore, this study solicits the views of fraud investigators on the existence and effectiveness of fraud prevention mechanisms within Government-Linked Companies (GLCs). Specifically, effective fraud prevention mechanisms (FPM) should be undertaken by five critical groups, namely the board of directors, audit committees, external auditors, internal auditors, and anti-fraud specialists. A total of 147 questionnaires were distributed to fraud investigators of all public listed GLCs in Malaysia. Out of those, a total of 45 usable responses were received, which represents an effective response rate of 30.6%. In terms of existence, the respondents ranked "management review of internal controls" and "external audits of financial statements" as the top-most FPMs. This was followed by other mechanisms such as operational audits, internal audits and internal control review/improvements by departments. Out of the 27 fraud prevention mechanisms, fraud investigators perceiyed surprise audits, fraud hotline, fraud prevention program and training, anti-fraud policy, fraud vulnerability reviews, operational audits, whistle-blowing policy, internal audit or fraud examination department, and, imposing penalty and disciplinary action as more effective than the others. Overall, this study provides important insights to practitioners and organizations in identifying fraud prevention mechanisms that are most effective. 展开更多
关键词 fraud prevention mechanism (FPM) financial fraud government-linked companies (GLCs)
下载PDF
Multimodal Fraudulent Website Identification Method Based on Heterogeneous Model Ensemble
14
作者 Shengli Zhou Linqi Ruan +1 位作者 Qingyang Xu Mincheng Chen 《China Communications》 SCIE CSCD 2023年第5期263-274,共12页
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi... The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods. 展开更多
关键词 telecom fraud crime fraudulent website data fusion deep learning
下载PDF
Forensic Accounting and Fraud: Capability and Competence Requirements in Malaysia
15
作者 Oluwatoyin Muse Johnson Popoola Ayoib Che-Ahmad Rose Shamsiah Samsudin 《Journal of Modern Accounting and Auditing》 2014年第8期825-834,共10页
The 2011 Global Economic Crime Survey instituted by PricewaterhouseCoopers (PwC) confirms the economic crime in Malaysia to be on the increase and, therefore, requires immediate attention to stem the tides. In antic... The 2011 Global Economic Crime Survey instituted by PricewaterhouseCoopers (PwC) confirms the economic crime in Malaysia to be on the increase and, therefore, requires immediate attention to stem the tides. In anticipation of the challenges occasioned due to a shift from the modified cash basis to the accrual basis of accounting, the Malaysian State's determination to move from a developing nation to a developed nation, and to be ranked among the first 10 in 2020, this paper presents the need for forensic accountant and auditor capability (i.e., mindset and skills) on forensic accountant and auditor competence (i.e., task performance fraud risk assessment (TPFRA)) in the Malaysian public sector. It also draws the attention of the users of public sector accountants and auditors to the understanding of fraud mechanisms and how to deal with fraudsters. The population of this study comprised the accountants and auditors in the office of the Accountant General and Auditor General of Malaysia. The objective of this paper is to investigate the competence requirements of accountants and auditors in the effective and efficient utilization of capability requirements, which have the potentials to usher in the best global practices in fighting fraud in the Malaysian public sector. 展开更多
关键词 forensic accounting AUDITING fraud fraud risk assessment MINDSET SKILLS MALAYSIA
下载PDF
Financial Statements Frauds: Does Their Intensity Have a Connection with Earnings Management?
16
作者 Mirella Ciaburri Fabio Fortuna +1 位作者 Barbara Sveva Magnanelli Elisa Raoli 《Journal of Modern Accounting and Auditing》 2020年第7期291-309,共19页
This study investigates the relationship between earnings management and financial statements frauds.We examine how earnings management practices;done in the two years before the fraud,impact the likelihood of fraud o... This study investigates the relationship between earnings management and financial statements frauds.We examine how earnings management practices;done in the two years before the fraud,impact the likelihood of fraud occurrence.Moreover,we introduce a new measure for the fraud intensity.Using a sample of 70 fraud and 70 no-fraud firms,we find that firms committing fraud of higher intensity have managed earnings in the two years before the fraud occurrence.This paper contributes to the literature about fraud antecedents because it is the first study measuring the relationship between earnings management and the intensity of the fraud,and it can be also useful for practitioners,because using the analysis of earnings management practices,analysts can foresee and prevent financial statements frauds. 展开更多
关键词 earnings management financial statement fraud fraud intensity restate ACCRUALS
下载PDF
Effect of personality on fraud detection: The Malaysian case
17
作者 Nahariah Jaffar Hasnah Haron +1 位作者 Takiah Mohd Iskandar Arfah Salleh 《Journal of Modern Accounting and Auditing》 2010年第8期47-54,共8页
Auditing standards require external auditors to provide reasonable assurance that the financial statements are free from material misstatements, either due to fraud or error. Inability of the external auditors to dete... Auditing standards require external auditors to provide reasonable assurance that the financial statements are free from material misstatements, either due to fraud or error. Inability of the external auditors to detect the material misstatements, particularly fraud, may expose them to litigation. The present study aims to examine the effect of personality factors (i.e., neuroticism, extraversion, conscientiousness, openness to experience and agreeableness) on the external auditors' ability to detect the likelihood of fraud. An experimental approach is adopted by sending case materials to audit partners and audit managers attached to auditing firms operating in Malaysia. The result shows that personality does not have a positive effect on the external auditors' ability to detect the likelihood of fraud. 展开更多
关键词 fraud personality factor Big-5 model detection of fraud external auditors' ability
下载PDF
Fraudulent phone call recognition method based on convolutional neural network
18
作者 Xing Jian Wang Shupeng Ding Yu 《High Technology Letters》 EI CAS 2020年第4期367-371,共5页
With increasingly rampant telephone fraud activities,the social impact and economic losses caused to China have increased dramatically.Precise,convenient,and efficient fraudulent phone call recognition has become a ch... With increasingly rampant telephone fraud activities,the social impact and economic losses caused to China have increased dramatically.Precise,convenient,and efficient fraudulent phone call recognition has become a challenge since telephone fraud became more varied and covert.To deal with this problem,many researchers have extracted some statistical features of telephone fraud behavior and proposed some machine learning algorithms on the field of fraudulent phone call recognition.In this paper,the calling detail records are utilized to construct a classifier for fraudulent phone call recognition.Meantime,a deep learning approach based on convolutional neural network(CNN)is proposed for better features learning and compared with the existing state-of-the-art machine learning algorithms.It learns phone number and call behavior features of telephone fraud,and improves the accuracy of classification.The evaluation results show that the proposed algorithm outperforms competitive algorithms. 展开更多
关键词 fraudulent phone call recognition convolutional neural network(CNN) calling detail records(CDR) deep learning(DL) telephone fraud
下载PDF
Analysis of Global System for Mobile Communication (GSM) Subscription Fraud Detection System
19
作者 E. N. Ekwonwune U. C. Chukwuebuka +1 位作者 A. E. Duroha A. N. Duru 《International Journal of Communications, Network and System Sciences》 2022年第10期167-180,共14页
This work is concerned with GSM subscription fraud detection system using some network techniques. Fraud is a hitch around the globe with huge loss of income. Fraud has an effect on the credibility and performance of ... This work is concerned with GSM subscription fraud detection system using some network techniques. Fraud is a hitch around the globe with huge loss of income. Fraud has an effect on the credibility and performance of telecommunication companies. The most difficult problem that faces the industry is the fact that fraud is dynamic, which means that whenever fraudsters feel that they will be detected, they devise other ways to circumvent security measures. In such cases, the perpetrators’ intention is to completely avoid or at least reduce the charges for using the services. Subscription fraud is one of the major types of telecommunication fraud in which a customer obtains an account without intention to pay the bill. Thus at the level of a phone number, all transactions from the number will be fraudulent. In such cases abnormal usage occurs throughout the active period of the account;which is usually used for call selling or intensive self usage. This provides a means for illegal high profit business for fraudsters requiring minimal investment and relatively low risk of getting caught. A system to prevent subscription fraud in GSM telecommunications with high impact on long distance carriers is proposed to detect fraud. The system employs adaptive flexible techniques using advanced data analysis like Artificial Neural Networks (ANN). This study aims at developing a fraud detection model occurrence in GSM Network. The paper also gives analysis of the fraud detection Systems, fraud detection and prevention, fraud prevention methods etc. Fraud affects us all and is of particular concern to those who manage large government and business organisations where the potential losses are greatest. The operation of a mobile network is complex, and fraudsters invest a lot of energy to find and exploit every weakness of the system. A typical example would be subscription fraud, where a fraudster acquires a subscription to the mobile network under a false identity;and start reselling the use of his phone to unscrupulous customers (typically for international calls to distant foreign countries) at rate less than the regular tariff. 展开更多
关键词 GSM fraud MOBILE fraud Detection Communication System Mobile Telecommunication
下载PDF
Toshiba and Luckin Coffee: A Study of the Reasons for Committing Financial Fraud
20
作者 Xinyan Jiang 《Proceedings of Business and Economic Studies》 2022年第5期169-173,共5页
Financial fraud,which has become a global issue,is a subject of discussion,surpassing time.Financial fraud significantly undermines investors’confidence and affects the health of capital markets.Hence,it is valuable ... Financial fraud,which has become a global issue,is a subject of discussion,surpassing time.Financial fraud significantly undermines investors’confidence and affects the health of capital markets.Hence,it is valuable to explore the reasons for committing financial fraud and propose solutions to this issue.This paper focuses on two financial fraud cases in recent years,Toshiba in 2015 and Luckin Coffee in 2020,analyzes and compares the reasons for the financial fraud in terms of pressure and opportunity factors,as well as proposes comprehensive suggestions for dealing with the corporate financial fraud issue. 展开更多
关键词 Financial fraud Corporate case studies fraud triangle theory
下载PDF
上一页 1 2 194 下一页 到第
使用帮助 返回顶部