Filters








7,534 Hits in 7.5 sec

Modeling the Field Value Variations and Field Interactions Simultaneously for Fraud Detection [article]

Dongbo Xi, Bowen Song, Fuzhen Zhuang, Yongchun Zhu, Shuai Chen, Tianyi Zhang, Yuan Qi, Qing He
2021 arXiv   pre-print
variations and field interactions simultaneously for fraud detection.  ...  In fact, the value variations of same field from different events and the interactions of different fields inside one event have proven to be strong indicators for fraudulent behaviors.  ...  The field value variations of each field and field interactions of each event can be regarded as modeling of users' fraud patterns. We present the fraud patterns in Figure 2 (b).  ... 
arXiv:2008.05600v2 fatcat:7tgcsxhr7be25cjteovr6rwlh4

Toward a Comprehensive Model in Internet Auction Fraud Detection

Bin Zhang, Yi Zhou, Christos Faloutsos
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
Fraud detection has become a common concern of the online auction websites. Fraudsters often manipulate reputation systems and commit nondelivery fraud.  ...  In this paper we use the loopy belief propagation algorithm and apply it to network level fraud detection, classifying fraudsters, accomplices, as well as honest users.  ...  Acknowledgement The authors thank Mr. Duen Horng Chau the data he provided as well as his advice for this project. Proceedings of the 41st Hawaii International Conference on System Sciences -2008  ... 
doi:10.1109/hicss.2008.455 dblp:conf/hicss/ZhangZF08 fatcat:dnh2geurubew7fwyrpdjybwmae

FRAUD CONFIRMATION, CLIENT SATISFACTION AND CLIENT LOYALTY

Ngurah Pandji Mertha Agung Durya
2019 International Journal of Contemporary Accounting  
The result that both partially and simultaneously, Audit Quality Attributes, Fraud Confirmation affected Client Satisfaction and Loyalty.  ...  This study also pays attention to the calculation of the coefficient of determination to give an idea of the ability of the model in explaining the phenomenon of Client Satisfaction and Client Loyalty.  ...  However, the auditor's obligation to be able to detect fraud often does not materialize. Failure to detect and find fraud effects, on the credibility of the auditor on the audit services he provides.  ... 
doi:10.25105/ijca.v1i1.5184 fatcat:qmgghgcz2bbzbkeilkiwnp4wjy

Fraud Detection in ERP Systems Using Scenario Matching [chapter]

Asadul Khandoker Islam, Malcom Corney, George Mohay, Andrew Clark, Shane Bracher, Tobias Raub, Ulrich Flegel
2010 IFIP Advances in Information and Communication Technology  
We include the description of six fraud scenarios and the process of specifying and detecting the occurrence of those scenarios in ERP user log data using the prototype software which we have developed  ...  This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems.  ...  We gratefully acknowledge the support of SAP Research. The research is supported in part by an ARC Linkage grant.  ... 
doi:10.1007/978-3-642-15257-3_11 fatcat:t4z4xryr7vcgnm3wbdsx6txwam

Empirical Evidence of Forensic Auditing and Whistleblower on Fraud Control, Organizational Performance; A Case Study of Public and Private Sectors of Pakistan

Waqar Dilshad, Muhammad Irfan, Syed Muhammad Kamran Javed, Zeenat Aftab
2020 Journal of Accounting and Finance in Emerging Economies  
The over required the require for this think about which examined the relationship between forensic and the whistle blowing of fraud control and organization performance within the public and private sector  ...  Forensic auditing should be made a field of specialization in our higher institution especially in the postgraduate school and business institutions.  ...  The coefficient table 6 includes the model (regression equation) coefficients and the p-values for each independent variable.The output shows that the interaction is significant for whistle blowing on  ... 
doi:10.26710/jafee.v6i4.1417 fatcat:firvconjjnhvbctxla7x76ot7a

Human-Computer Interaction for Security Research: The Case of EU E-Banking Systems [chapter]

Caroline Moeckel
2011 Lecture Notes in Computer Science  
field of research methods for usable security as well as threat modelling with an applied example (e-banking).  ...  System lock outs or erroneously blocked transactions, like Barclaycard's fraud detection system flagging payments for London 2012 Olympic tickets as suspicious and declining them, are incomprehensible  ... 
doi:10.1007/978-3-642-23768-3_44 fatcat:nrt7kcfrxnbmbew72ncnawzrva

The usage of technology in preventing and detecting fraud

2010 Chinese Business Review  
A particular impact has The Model of Fraud Detection Strategy, as an 8 steps model for identifying fraud, using IT to collect, define and analyze the data and anomalies that highlight indicators of fraud  ...  All the auditors are responsible for detection, determination of fraud and use of anti-fraud programs.  ...  For the IT auditor, the need for auditing, security and control will be critical in the IT field and will be the challenge of this millennium.  ... 
doi:10.17265/1537-1506/2010.09.003 fatcat:xvlcnxo5ijbpdoegwqgjr3jwru

Transaction aggregation as a strategy for credit card fraud detection

C. Whitrow, D. J. Hand, P. Juszczak, D. Weston, N. M. Adams
2008 Data mining and knowledge discovery  
The problem of preprocessing transaction data for supervised fraud classification is considered.  ...  Hence, a framework for transaction aggregation is considered and its effectiveness is evaluated against transaction-level detection, using a variety of classification methods and a realistic cost-based  ...  and other personal fraud detection.  ... 
doi:10.1007/s10618-008-0116-z fatcat:5e4z4qze4fegzilb45bt5satue

Fraud Audit Based on Visual Analysis: A Process Mining Approach

Jorge-Félix Rodríguez-Quintero, Alexander Sánchez-Díaz, Leonel Iriarte-Navarro, Alejandro Maté, Manuel Marco-Such, Juan Trujillo
2021 Applied Sciences  
approaches for fraud detection.  ...  Finally, for demonstration purposes, we present a real hotel management use case in which we detected suspected fraud behaviors, thus validating the effectiveness of the approach.  ...  for future research regarding the circumstances under which interactive data visualization might be used to detect fraud.  ... 
doi:10.3390/app11114751 fatcat:tzzv4sflb5fu7oixzgds64zi7y

FACTORS AFFECTING THE INDEPENDENCE OF GOVERNMENT AUDITORS OF BPKP REPRESENTATIVE OF EAST KALIMANTAN PROVINCE

Irwansyah Irwansyah, Fibriyani NurKhairin, NurAini NurAini
2016 Asia Pacific Fraud Journal  
The result of simultaneous hypothesis test indicates that audit experience, knowledge, job stress scale, and reward simultaneously have positive effect on the independence of the government auditors.  ...  The analysis tool used is multiple linear regression formula, while the hypothesis test is conducted using model feasibility test (F statistic test) and partial significance test (t statistic test).  ...  , and reward, simultaneously affect the independence of government auditors or not by looking at the significance level of the value of F or comparingbetween the value of F count and the value  ... 
doi:10.21532/apfj.001.16.01.02.20 fatcat:aevfzkjtbnfsrfljvv6enzpezq

Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud [chapter]

Yoram J. Meijaard, Bram C. M. Cappers, Josh G. M. Mengerink, Nicola Zannone
2020 Lecture Notes in Computer Science  
Specifically, we investigate the use of Isolation Forests for the detection of frauds before calls are initiated and compare the results to an existing industrial post-mortem anti-fraud solution.  ...  Current antifraud solutions enable the detection of IRSF afterwards by detecting deviations in the overall caller's expenses and block phone devices to prevent attack escalation.  ...  Fig. 7 . 7 Comparison of ROC curves for fraud detection using pre-call features at the variations of max depth (top) and sample size (bottom).  ... 
doi:10.1007/978-3-030-49669-2_14 fatcat:htsn7na6zrdfdcp5j22c2rilve

QA: Fraud Control for Foods and Other Biomaterials by Product Fingerprinting [chapter]

Edoardo Capuano, Saskia M. van Ruth
2012 Latest Research into Quality Control  
Acknowledgements We acknowledge Martin Alewijn, Grishja van der Veer and Pan Weijing for the work on NIR spectroscopy and milk powder and Angela Dura de Miguel, Arjen Lommen and Maikel Rozijn for the work  ...  We also acknowledge the Dutch ministry of agriculture, economic affair and innovation for the funding of this book chapter.  ...  of the obtained values for the test material with those established for the genuine material.  ... 
doi:10.5772/51109 fatcat:kh5uscxdhvgjhp3cqyxg7nw3hq

Follow the Trail: Machine Learning for Fraud Detection in Fintech Applications

Branka Stojanović, Josip Božić, Katharina Hofer-Schmitz, Kai Nahrgang, Andreas Weber, Atta Badii, Maheshkumar Sundaram, Elliot Jordan, Joel Runevic
2021 Sensors  
They target suspicious activity in financial datasets and generate models in order to anticipate future frauds.  ...  We contribute to this important issue and provide an evaluation on anomaly detection methods for this matter.  ...  Acknowledgments: The constructive feedback of the anonymous reviewers was well-received and is hereby acknowledged. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21051594 pmid:33668773 fatcat:e4d4zx7f7zg4jgddjm565zwsgu

Handheld Spectral Sensing Devices Should Not Mislead Consumers as Far as Non-Authentic Food Is Concerned: A Case Study with Adulteration of Milk Powder

Thierry Delatour, Florian Becker, Julius Krause, Roman Romero, Robin Gruna, Thomas Längle, Alexandre Panchaud
2021 Foods  
The quality of the spectra was assessed for an adequate identification of the outliers prior to a deep assessment of performance for both non-targeted (soft independent modelling of class analogy, SIMCA  ...  Here, we show that the sensors have generally difficulties in detecting adulterants at ca. 5% supplementation, and often fail in achieving adequate specificity and detection capability.  ...  Specifically, the As next step, we compared the outlying spectra to typical ones (within model limits) for gaining insight into the device-sample interaction and the potential causes for each deviation  ... 
doi:10.3390/foods11010075 pmid:35010202 pmcid:PMC8750415 fatcat:cnhir7wd45hg7bndzsbhydnjq4

Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising

Shadi Sadeghpour, Natalija Vlajic
2021 Journal of Cybersecurity and Privacy  
Finally, we provide a comprehensive overview of methods and techniques for the detection and prevention of fraudulent practices within those system—both from the scientific as well as the industry perspective  ...  We begin by introducing the main elements of an online ad platform and its different architecture and revenue models.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/jcp1040039 fatcat:hdcfm7gimvfbnk7kp2jzx2xyfi
« Previous Showing results 1 — 15 out of 7,534 results