Data mining approach to internal fraud in a project-based organization

被引:7
作者
Bach, Mirjana Pejic [1 ]
Dumicic, Ksenija [2 ]
Zmuk, Berislav [3 ]
Curlin, Tamara [4 ]
Zoroja, Jovana [4 ]
机构
[1] Univ Zagreb, Fac Econ & Business, Syst Dynam Modelling Managerial Simulat Games & D, Dept Informat, Zagreb, Croatia
[2] Univ Zagreb, Fac Econ & Business, Stat Sampling Business Stat Stat Res Methods & SQ, Zagreb, Croatia
[3] Univ Zagreb, Fac Econ & Business, Dept Stat, Zagreb, Croatia
[4] Univ Zagreb, Fac Econ & Business, Dept Informat, Zagreb, Croatia
来源
IJISPM-INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS AND PROJECT MANAGEMENT | 2020年 / 8卷 / 02期
关键词
project-based organization; internal control; fraud; data mining; CHAID; association and link analysis; ASSOCIATION RULES;
D O I
10.12821/ijispm080204
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Data mining is an efficient methodology for uncovering and extracting information from large databases, which is widely used in different areas, e.g., customer relation management, financial fraud detection, healthcare management, and manufacturing. Data mining has been successfully used in various fraud detection and prevention areas, such as credit card fraud, taxation fraud, and fund transfer fraud. However, there are insufficient researches about the usage of data mining for fraud related to internal control. In order to increase awareness of data mining usefulness in internal control, we developed a case study in a project-based organization. We analyze the dataset about working-hour claims for projects, using two data mining techniques: chi-square automatic interaction detection (CHAID) decision tree and link analysis, in order to describe characteristics of fraudulent working-hour claims and to develop a model for automatic detection of potentially fraudulent ones. Results indicate that the following characteristics of the suspected working-hours claim were the most significant: sector of the customer, origin and level of expertise of the consultant, and cost of the consulting services. Our research contributes to the area of internal control supported by data mining, with the goal to prevent fraudulent working-hour claims in project-based organizations.
引用
收藏
页码:81 / 101
页数:21
相关论文
共 43 条
[21]   Integrated Project Delivery Implementation Challenges in the Construction Industry [J].
Kahvandi, Zahra ;
Saghatforoush, Ehsan ;
ZareRavasan, Ahad ;
Preece, Christopher .
CIVIL ENGINEERING JOURNAL-TEHRAN, 2019, 5 (08) :1672-1683
[22]  
Kantardzic M., 2011, Data mining: concepts, models, meth
[23]  
Koh H.C., 2004, MANAG AUDIT J, V19, P462, DOI DOI 10.1108/02686900410524436
[24]  
Kranacher M.-J., 2019, Forensic Accounting and Fraud Examination, V2nd
[25]   On selecting interestingness measures for association rules: User oriented description and multiple criteria decision aid [J].
Lenca, Philippe ;
Meyer, Patrick ;
Vaillant, Benoit ;
Lallich, Stephane .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2008, 184 (02) :610-626
[26]  
Leskovec Jure., 2019, MINING MASSIVE DATA
[27]  
Leung C.K. S., 2019, Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, P15, DOI [10.4018/978-1-5225-7598-6.ch002, DOI 10.4018/978-1-5225-7598-6.CH099]
[28]   A Taxonomy of Sequential Pattern Mining Algorithms [J].
Mabroukeh, Nizar R. ;
Ezeife, C. I. .
ACM COMPUTING SURVEYS, 2010, 43 (01)
[29]   Fraud Analysis Approaches in the Age of Big Data - A Review of State of the Art [J].
Makki, Sara ;
Haque, Rafiqul ;
Taher, Yehia ;
Assaghir, Zainab ;
Ditzler, Gregory ;
Hacid, Mohand-Said ;
Zeineddine, Hassan .
2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, :243-250
[30]   Opportunities for Task-Level Research within the Audit Process [J].
Messier, William, Jr. .
INTERNATIONAL JOURNAL OF AUDITING, 2010, 14 (03) :320-328