Document Type : Original Research Manuscripts
Accounting, West Tehran Branch, Islamic Azad University, Tehran, Iran.
Department of Accounting, West Tehran Branch, Islamic Azad University, Tehran, Iran.
The purpose of this research is to use data mining to detect accounting fraud in the database of stock exchange member companies. The combination of discrete and continuous data has increased the necessity of using data mining and machine learning methods in the field of fraud detection. This research is applied in terms of purpose and descriptive in terms of method. The document review method was used to collect information in the field of literature and research background. The prepared questionnaire includes 7 main indicators consisting of 48 questions for each of the variables. This questionnaire was made available by the researcher to 400 accountants of companies admitted to the Tehran Stock Exchange by sampling method. In order to fit the model, the structural equation method was used in SMARTPLS software. In the data mining section, all IB1, IBK, LWL, KSTAR, and KNN algorithms were used to simulate the proposed model in Rapidminer software. Effectiveness of internal control, compensation system, asymmetry of information, compliance with accounting rules, management ethics, and ethical principles are effective and meaningful on accounting fraud. In evaluating parameters and according to the graphs, the K-STAR algorithm has better performance than other algorithms. The proposed data mining model for financial fraud detection showed that since the amount of data creation in financial companies is increasing day by day with the development of technology, it is possible to provide early detection of fraud by reviewing and analyzing the data.
- Abdallah, A., Maarof, M. A., & Zainal, A. (2016). Fraud detection system: A survey. Journal of Network and Computer Applications, 68, 90-113. http://dx.doi.org/10.1016/j.jnca.2016.04.007, 2016.
- Ahmed, M., Mahmood, A. N., & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems, 55, 278-288.
- Akila, S., & Reddy, U. S. (2018). Cost-sensitive Risk Induced Bayesian Inference Bagging (RIBIB) for credit card fraud detection. Journal of computational science, 27, 247-254.https://doi.org/10.1016/j.jocs.2018.06.009.
- Bermúdez, L., Pérez, J. M., Ayuso, M., Gómez, E., & Vazquez, F. J. (2008). A Bayesian dichotomous model with asymmetric link for fraud in insurance. Insurance: Mathematics and Economics, 42(2), 779-786. https://doi.org/10.1016/j.insmatheco.2007.08.002
- Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision support systems, 50(3), 602-613. https://doi.org/10.1016/j.dss.2010.08.008
- Bose, I., & Wang, J. (2007). Data mining for detection of financial statement fraud in Chinese Companies. In International joint Conference on e-Commerce, e-Administration, e-Society, and e-Education. International Business Academics Consortium (IBAC) and Knowledge Association of Taiwan (KAT).
- Brandek, S., Mohammadi, F. (2018). The effect of weak internal control on the asymmetric behavior of general, administrative and sales costs. Accounting and Management Perspective Quarterly. (2) 17, 38-53. [in Persian]
- Cecchini, M., Aytug, H., Koehler, G. J., & Pathak, P. (2010). Making words work: Using financial text as a predictor of financial events. Decision support systems, 50(1), 164-175. https://doi.org/10.1016/j.dss.2010.07.012
- Chen, H., Ai, H., Yang, Z., Yang, W., Ye, Z., & Dong, D. (2020, September). An Improved XGBoost Model Based on Spark for Credit Card Fraud Prediction. In 2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS) (pp. 1-6). IEEE. https://doi.org/10.1109/IDAACS-SWS50031.2020.9297058
- Didimo, W., Liotta, G., & Montecchiani, F. (2014). Network visualization for financial crime detection. Journal of Visual Languages & Computing, 25(4), 433-451. https://doi.org/10.1016/j.jvlc.2014.01.002
- Donyaee, H., Hossini, S. E., & Mohamadi, N. (2019). Identifying of Influential Factors on Money Laundering in Sports. Sport Management Studies, 11(55), 17-34.
- Fanai, H., & Abbasimehr, H. (2023). A novel combined approach based on deep Autoencoder and deep classifiers for credit card fraud detection. Expert Systems with Applications, 119562. https://doi.org/10.1016/ j.eswa.2023.119562
- Forough, J., & Momtazi, S. (2021). Ensemble of deep sequential models for credit card fraud detection. Applied Soft Computing, 99, 106883.https://doi.org/10.1016/j.asoc.2020.106883
- Glancy, F. H., & Yadav, S. B. (2011). A computational model for financial reporting fraud detection. Decision Support Systems, 50(3), 595-601. https://doi.org/10.1016/j.dss. 2010.08.010
- Halvaiee, N. S., & Akbari, M. K. (2014). A novel model for credit card fraud detection using Artificial Immune Systems. Applied soft computing, 24, 40-49. https://doi.org/10.1016/j.asoc.2014.06.042
- Herawati, N. (2015). Application of Beneish M-Score models and data mining to detect financial fraud. Procedia-Social and Behavioral Sciences, 211, 924-930. https://doi.org/10.1016/j.sbspro.2015.11.122
- Huang, S. Y. (2013). Fraud detection model by using support vector machine techniques. International Journal of Digital Content Technology and its Applications, 7(2), 32. https://doi.org/10.4156/jdcta.vol7.issue2.5
- Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., & Felix, W. F. (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems, 50(3), 585-594. org/10.1016/j.dss.2010.08.009
- Kewei, X., Peng, B., Jiang, Y., & Lu, T. (2021, January). A hybrid deep learning model for online fraud detection. In 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 431-434). IEEE. https://doi.org/10.1109/ICCECE51280.2021.9342110
- Khalilpour, M., Kamyabi, Y., Nabavi Chashmi, A. (2018). The effect of ethical approaches of accountants on the quality of accounting information with the moderating role of company size and financial leverage. Financial accounting and audit research. 11(43), 118-91. [in Persian].
- Kirkos, E., Spathis, C., & Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert systems with applications, 32(4), 995-1003. org/10.1016/j.eswa.2006.02.016
- Liang, Z., Pan, D. & Xu, R. (2019). Knowledge representation framework of accounting event in corpus-based financial report text. Cluster Comput22 (4), 9335–9346. https://doi.org/10.1007/s10586-018-2153-8
- Lodi, G., Aniello, L., Di Luna, G. A., & Baldoni, R. (2014). An event-based platform for collaborative threats detection and monitoring. Information Systems, 39, 175-195. https://doi.org/10.1016/j.is.2013.07.005
- Ofori-Dwumfuo, G. O., & Gyimah, E. (2013). Business intelligence as an ICT tool for financial crime detection in Ghana. Research Journal of Information Technology, 5(3), 62-71. https://doi.org/10.19026/rjit.5.5789
- Olszewski, D. (2014). Fraud detection using self-organizing map visualizing the user profiles. Knowledge-Based Systems, 70, 324-334. https://doi.org/10.1016/j.knosys.2014.07.008
- Pargmann, J., Riebenbauer, E., Flick-Holtsch, D. et al.(2023). Digitalisation in accounting: a systematic literature review of activities and implications for competences. Empirical Res Voc Ed Train 15, 1. https://doi.org/10.1186/s40461-023-00141-1
- Rai, A. K., & Dwivedi, R. K. (2020, July). Fraud detection in credit card data using unsupervised machine learning based scheme. In 2020 international conference on electronics and sustainable communication systems (ICESC) (pp. 421-426). IEEE. https://doi.org/10.1007/978-981-15-6318-8_31.
- Ravisankar, P., Ravi, V., Rao, G. R., & Bose, I. (2011). Detection of financial statement fraud and feature selection using data mining techniques. Decision support systems, 50(2), 491-500. org/10.1016/j.dss.2010.11.006
- Sundarkumar, G. G., & Ravi, V. (2015). A novel hybrid undersampling method for mining unbalanced datasets in banking and insurance. Engineering Applications of Artificial Intelligence, 37, 368-377. https://doi.org/10.1016/j.engappai.2014.09.019
- Wahid, A., Msahli, M., Bifet, A., & Memmi, G. (2023). NFA: A neural factorization autoencoder based online telephony fraud detection. Digital Communications and Networks.org/10.1016/j.dcan.2023.03.002
- West, J., & Bhattacharya, M. (2016). Intelligent financial fraud detection: a comprehensive review. Computers & security, 57, 47-66. https://doi.org/10.1016/j.cose.2015.09.005
- Wieder, B., & Ossimitz, M. L. (2015). The impact of Business Intelligence on the quality of decision making–a mediation model. Procedia Computer Science, 64, 1163-1171. https://doi.org/10.1016/j.procs.2015.08.599
- Xie, Z., Chiu, D.K.W. & Ho, K.K.W. (2023) The Role of Social Media as Aids for Accounting Education and Knowledge Sharing: Learning Effectiveness and Knowledge Management Perspectives in Mainland China. J Knowl Econ. org/10.1007/s13132-023-01262-4
- Yang, Z., Yin, C., Jin, C., Ning, J., & Zhou, J. (2021, May). Lightweight delegated authentication with identity fraud detection for cyber-physical systems. In Proceedings of the 7th ACM on Cyber-Physical System Security Workshop (pp. 17-28). https://doi.org/10.1145/3457339.3457984
- Yue, D., Wu, X., Wang, Y., Li, Y., & Chu, C. H. (2007, September). A review of data mining-based financial fraud detection research. In 2007 International Conference on Wireless Communications, Networking and Mobile Computing (pp. 5519-5522). Ieee. https://doi.org/10.1109/WICOM.2007.1352
- Zhang, X., Han, Y., Xu, W., & Wang, Q. (2021). HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Information Sciences, 557, 302-316. https://doi.org/10.1016/j.ins.2019.05.023
- Zhu, X., Vanden Broucke, S., Zhu, G., Vanthienen, J., & Baesens, B. (2016). Enabling flexible location-aware business process modeling and execution. Decision Support Systems, 83, 1-9. https://doi.org/10.1016/j.dss.2015.12.003