Document Type : Original Research Manuscripts

Authors

1 Accounting, West Tehran Branch, Islamic Azad University, Tehran, Iran.

2 Department of Accounting, West Tehran Branch, Islamic Azad University, Tehran, Iran.

Abstract

The purpose of this research is to use data mining to detect accounting fraud in the database of stock exchange member companies. The combination of discrete and continuous data has increased the necessity of using data mining and machine learning methods in the field of fraud detection. This research is applied in terms of purpose and descriptive in terms of method. The document review method was used to collect information in the field of literature and research background. The prepared questionnaire includes 7 main indicators consisting of 48 questions for each of the variables. This questionnaire was made available by the researcher to 400 accountants of companies admitted to the Tehran Stock Exchange by sampling method. In order to fit the model, the structural equation method was used in SMARTPLS software. In the data mining section, all IB1, IBK, LWL, KSTAR, and KNN algorithms were used to simulate the proposed model in Rapidminer software. Effectiveness of internal control, compensation system, asymmetry of information, compliance with accounting rules, management ethics, and ethical principles are effective and meaningful on accounting fraud. In evaluating parameters and according to the graphs, the K-STAR algorithm has better performance than other algorithms. The proposed data mining model for financial fraud detection showed that since the amount of data creation in financial companies is increasing day by day with the development of technology, it is possible to provide early detection of fraud by reviewing and analyzing the data.

Keywords

Main Subjects

  1. Abdallah, A., Maarof, M. A., & Zainal, A. (2016). Fraud detection system: A survey. Journal of Network and Computer Applications, 68, 90-113. http://dx.doi.org/10.1016/j.jnca.2016.04.007, 2016.
  2. Ahmed, M., Mahmood, A. N., & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems, 55, 278-288.
  3. https://doi.org/10.1016/j.future.2015.01.001
  4. Akila, S., & Reddy, U. S. (2018). Cost-sensitive Risk Induced Bayesian Inference Bagging (RIBIB) for credit card fraud detection. Journal of computational science, 27, 247-254.https://doi.org/10.1016/j.jocs.2018.06.009.
  5. Bermúdez, L., Pérez, J. M., Ayuso, M., Gómez, E., & Vazquez, F. J. (2008). A Bayesian dichotomous model with asymmetric link for fraud in insurance. Insurance: Mathematics and Economics, 42(2), 779-786. https://doi.org/10.1016/j.insmatheco.2007.08.002
  6. Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision support systems, 50(3), 602-613. https://doi.org/10.1016/j.dss.2010.08.008
  7. Bose, I., & Wang, J. (2007). Data mining for detection of financial statement fraud in Chinese Companies. In International joint Conference on e-Commerce, e-Administration, e-Society, and e-Education. International Business Academics Consortium (IBAC) and Knowledge Association of Taiwan (KAT).
  8. Brandek, S., Mohammadi, F. (2018). The effect of weak internal control on the asymmetric behavior of general, administrative and sales costs. Accounting and Management Perspective Quarterly. (2) 17, 38-53. [in Persian]
  9. Cecchini, M., Aytug, H., Koehler, G. J., & Pathak, P. (2010). Making words work: Using financial text as a predictor of financial events. Decision support systems, 50(1), 164-175. https://doi.org/10.1016/j.dss.2010.07.012
  10. Chen, H., Ai, H., Yang, Z., Yang, W., Ye, Z., & Dong, D. (2020, September). An Improved XGBoost Model Based on Spark for Credit Card Fraud Prediction. In 2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS) (pp. 1-6). IEEE. https://doi.org/10.1109/IDAACS-SWS50031.2020.9297058
  11. Didimo, W., Liotta, G., & Montecchiani, F. (2014). Network visualization for financial crime detection. Journal of Visual Languages & Computing, 25(4), 433-451. https://doi.org/10.1016/j.jvlc.2014.01.002
  12. Donyaee, H., Hossini, S. E., & Mohamadi, N. (2019). Identifying of Influential Factors on Money Laundering in Sports. Sport Management Studies, 11(55), 17-34.
  13. Fanai, H., & Abbasimehr, H. (2023). A novel combined approach based on deep Autoencoder and deep classifiers for credit card fraud detection. Expert Systems with Applications, 119562. https://doi.org/10.1016/ j.eswa.2023.119562
  14. Forough, J., & Momtazi, S. (2021). Ensemble of deep sequential models for credit card fraud detection. Applied Soft Computing, 99, 106883.https://doi.org/10.1016/j.asoc.2020.106883
  15. Glancy, F. H., & Yadav, S. B. (2011). A computational model for financial reporting fraud detection. Decision Support Systems, 50(3), 595-601. https://doi.org/10.1016/j.dss. 2010.08.010
  16. Halvaiee, N. S., & Akbari, M. K. (2014). A novel model for credit card fraud detection using Artificial Immune Systems. Applied soft computing, 24, 40-49. https://doi.org/10.1016/j.asoc.2014.06.042
  17. Herawati, N. (2015). Application of Beneish M-Score models and data mining to detect financial fraud. Procedia-Social and Behavioral Sciences, 211, 924-930. https://doi.org/10.1016/j.sbspro.2015.11.122
  18. Huang, S. Y. (2013). Fraud detection model by using support vector machine techniques. International Journal of Digital Content Technology and its Applications, 7(2), 32. https://doi.org/10.4156/jdcta.vol7.issue2.5
  19. Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., & Felix, W. F. (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems, 50(3), 585-594. org/10.1016/j.dss.2010.08.009
  20. Kewei, X., Peng, B., Jiang, Y., & Lu, T. (2021, January). A hybrid deep learning model for online fraud detection. In 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 431-434). IEEE. https://doi.org/10.1109/ICCECE51280.2021.9342110
  21. Khalilpour, M., Kamyabi, Y., Nabavi Chashmi, A. (2018). The effect of ethical approaches of accountants on the quality of accounting information with the moderating role of company size and financial leverage. Financial accounting and audit research. 11(43), 118-91. [in Persian].
  22. Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications, 32(4), 995-1003. org/10.1016/j.eswa.2006.02.016
  23. Liang, Z., Pan, D. & Xu, R. (2019). Knowledge representation framework of accounting event in corpus-based financial report text. Cluster Comput22 (4), 9335–9346. https://doi.org/10.1007/s10586-018-2153-8
  24. Lodi, G., Aniello, L., Di Luna, G. A., & Baldoni, R. (2014). An event-based platform for collaborative threats detection and monitoring. Information Systems, 39, 175-195. https://doi.org/10.1016/j.is.2013.07.005
  25. Ofori-Dwumfuo, G. O., & Gyimah, E. (2013). Business intelligence as an ICT tool for financial crime detection in Ghana. Research Journal of Information Technology, 5(3), 62-71. https://doi.org/10.19026/rjit.5.5789
  26. Olszewski, D. (2014). Fraud detection using self-organizing map visualizing the user profiles. Knowledge-Based Systems, 70, 324-334. https://doi.org/10.1016/j.knosys.2014.07.008
  27. Pargmann, J., Riebenbauer, E., Flick-Holtsch, D. et al.(2023). Digitalisation in accounting: a systematic literature review of activities and implications for competences. Empirical Res Voc Ed Train 15, 1. https://doi.org/10.1186/s40461-023-00141-1
  28. Rai, A. K., & Dwivedi, R. K. (2020, July). Fraud detection in credit card data using unsupervised machine learning based scheme. In 2020 international conference on electronics and sustainable communication systems (ICESC) (pp. 421-426). IEEE. https://doi.org/10.1007/978-981-15-6318-8_31.
  29. Ravisankar, P., Ravi, V., Rao, G. R., & Bose, I. (2011). Detection of financial statement fraud and feature selection using data mining techniques. Decision support systems, 50(2), 491-500. org/10.1016/j.dss.2010.11.006
  30. Sundarkumar, G. G., & Ravi, V. (2015). A novel hybrid undersampling method for mining unbalanced datasets in banking and insurance. Engineering Applications of Artificial Intelligence, 37, 368-377. https://doi.org/10.1016/j.engappai.2014.09.019
  31. Wahid, A., Msahli, M., Bifet, A., & Memmi, G. (2023). NFA: A neural factorization autoencoder based online telephony fraud detection. Digital Communications and Networks.org/10.1016/j.dcan.2023.03.002
  32. West, J., & Bhattacharya, M. (2016). Intelligent financial fraud detection: a comprehensive review. Computers & security, 57, 47-66. https://doi.org/10.1016/j.cose.2015.09.005
  33. Wieder, B., & Ossimitz, M. L. (2015). The impact of Business Intelligence on the quality of decision making–a mediation model. Procedia Computer Science, 64, 1163-1171. https://doi.org/10.1016/j.procs.2015.08.599
  34. Xie, Z., Chiu, D.K.W. & Ho, K.K.W. (2023) The Role of Social Media as Aids for Accounting Education and Knowledge Sharing: Learning Effectiveness and Knowledge Management Perspectives in Mainland China. J Knowl Econ. org/10.1007/s13132-023-01262-4
  35. Yang, Z., Yin, C., Jin, C., Ning, J., & Zhou, J. (2021, May). Lightweight delegated authentication with identity fraud detection for cyber-physical systems. In Proceedings of the 7th ACM on Cyber-Physical System Security Workshop (pp. 17-28). https://doi.org/10.1145/3457339.3457984
  36. Yue, D., Wu, X., Wang, Y., Li, Y., & Chu, C. H. (2007, September). A review of data mining-based financial fraud detection research. In 2007 International Conference on Wireless Communications, Networking and Mobile Computing (pp. 5519-5522). Ieee. https://doi.org/10.1109/WICOM.2007.1352
  37. Zhang, X., Han, Y., Xu, W., & Wang, Q. (2021). HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Information Sciences, 557, 302-316. https://doi.org/10.1016/j.ins.2019.05.023
  38. Zhu, X., Vanden Broucke, S., Zhu, G., Vanthienen, J., & Baesens, B. (2016). Enabling flexible location-aware business process modeling and execution. Decision Support Systems, 83, 1-9. https://doi.org/10.1016/j.dss.2015.12.003