Fuzzy MADM Approach for Rating of Process-Based Fraud

被引:16
作者
Huda, Solichul [1 ]
Sarno, Riyanarto [2 ]
Ahmad, Tohari [2 ]
机构
[1] Univ Dian Nuswantoro, Fac Comp Sci, Informat Engn Dept, Jalan Nakula 1 5-11, Semarang, Indonesia
[2] Inst Teknol Sepuluh Nopember ITS Surabaya, Dept Informat, Sukolilo 60111, Surabaya, Indonesia
关键词
fraud detection; fuzzy MADM; PBF rating; process-based fraud; process deviation; weighting attributes;
D O I
10.5614/itbj.ict.res.appl.2015.9.2.1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Process-Based Fraud (PBF) is fraud enabled by process deviations that occur in business processes. Several studies have proposed PBF detection methods; however, false decisions are still often made because of cases with low deviation. Low deviation is caused by ambiguity in determining fraud attribute values and low frequency of occurrence. This paper proposes a method of detecting PBF with low deviation in order to correctly detect fraudulent cases. Firstly, the fraudulence attributes are established, then a fuzzy approach is utilized to weigh the importance of the fraud attributes. Further, multi-attribute decision making (MADM) is employed to obtain a PBF rating according to attribute values and attribute importance weights. Finally, a decision is made whether the deviation is fraudulent or not, based on the PBF rating. Experimental validation showed that the accuracy and false discovery rate of the method were 0.98 and 0.17, respectively.
引用
收藏
页码:111 / 128
页数:18
相关论文
共 22 条
[1]  
Accorsi R., 2012, SAC, P1709
[2]  
Amara Ines., 2013, INT J ACAD RES ACCOU, V3, P44, DOI [10.6007/IJARAFMS/v3-i3/34, DOI 10.6007/IJARAFMS/V3-I3/34]
[3]  
[Anonymous], [No title captured]
[4]  
Barreiros M. P., 2010, 2010 IEEE International Conference on Industrial Engineering & Engineering Management (IE&EM 2010), P320, DOI 10.1109/IEEM.2010.5674473
[5]  
Chae M., 2007, P 40 ANN HAW INT C S, p155a
[6]  
Chiu CC, 2004, 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, P177
[7]  
Dewandono D. R., 2013, THESIS
[8]  
Huda Solichul, 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT), P84, DOI 10.1109/ICoICT.2014.6914045
[9]   The case for process mining in auditing: Sources of value added and areas of application [J].
Jans, Mieke ;
Alles, Michael ;
Vasarhelyi, Miklos .
INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2013, 14 (01) :1-20
[10]   A business process mining application for internal transaction fraud mitigation [J].
Jans, Mieke ;
van der Werf, Jan Martijn ;
Lybaert, Nadine ;
Vanhoof, Koen .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (10) :13351-13359