Detection of Fraudulent Financial Statements Using The Hybrid Data Mining Approach
Detection of Fraudulent Financial Statements Using The Hybrid Data Mining Approach
DOI 10.1186/s40064-016-1707-6
*Correspondence:
[email protected] Abstract
Department of Accounting The purpose of this study is to construct a valid and rigorous fraudulent financial state-
Information, National Taipei
University of Business, ment detection model. The research objects are companies which experienced both
No. 321, Sec. 1, Jinan Rd., fraudulent and non-fraudulent financial statements between the years 2002 and 2013.
ZhongZheng District, In the first stage, two decision tree algorithms, including the classification and regres-
Taipei 100, Taiwan
sion trees (CART) and the Chi squared automatic interaction detector (CHAID) are
applied in the selection of major variables. The second stage combines CART, CHAID,
Bayesian belief network, support vector machine and artificial neural network in order
to construct fraudulent financial statement detection models. According to the results,
the detection performance of the CHAID–CART model is the most effective, with an
overall accuracy of 87.97 % (the FFS detection accuracy is 92.69 %).
Keywords: Fraudulent financial statements, Decision tree CART, Decision tree CHAID,
Bayesian belief network, Support vector machine, Artificial neural network
Background
Financial statements are a company’s basic documents that reflect its financial status
(Beaver 1966; Ravisankar et al. 2011). The financial statement is the main basis for deci-
sion -making on the part of a vast number of investors, creditors and other persons in
need of accounting information, as well as a concrete expression of business perfor-
mance, financial status and the social responsibility of listed companies and OTC com-
panies. However, in recent years, cases of fraudulent financial statements have become
increasingly serious (Wells 1997; Spathis et al. 2002; Kirkos et al. 2007; Yeh et al. 2010;
Humpherys et al. 2011; Kamarudin et al. 2012). Since the Asian Financial Crisis in 1997,
there have been many cases of fraudulent financial statements in Taiwan and the United
States. Examples include the Enron case in 2001, the WorldCom case in 2003 in the
United States, and the ABIT Computer, Procomp, Infodisc and Summit Technology
cases in 2004 in Taiwan. Given these incidents, it has become important to be able to
detect fraudulent behavior prior to its occurrence.
Data mining is a key tool for dealing with complex data analysis and classification. It
identifies valuable events that are hidden in large amounts of data for analysis, and sum-
marizes the data in a structured model to provide a reference for decision-making. Data
mining has many different functions, such as classification, association, clustering and
© 2016 Chen. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://
creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided
you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate
if changes were made.
Chen SpringerPlus (2016)5:89 Page 2 of 16
forecasting (Seifert 2004). The classification function is used most frequently. The classi-
fication results can be used as the basis for decision-making and for prediction purposes.
Fraudulent financial statements can be viewed as a typical classification problem
(Kirkos et al. 2007). The classification problem involves performing computation using
the variable characteristics of some known classification data, in order to obtain clas-
sification-related classification rules. Subsequently, the unknown classification data are
inputted into the rules in order to obtain the final classification results. Regarding the
issue of fraudulent financial statements, much of the past research has proposed the
use of the data mining method because of its superiority in terms of forecasting after
inputting large amounts of data for machine learning, as well as its accuracy in terms
of classification and forecasting, which is far higher than that of conventional regres-
sion analysis. For example, artificial neural network (ANN), decision tree (DT), Bayesian
belief network (BBN), and support vector machine (SVM) methods have been applied in
order to detect fraudulent financial statements.
It is therefore urgent that we establish an effective and accurate fraudulent financial
statement detection model, because conventional statistical models experience great
disadvantages in detecting fraudulent financial statements due to their relatively high
error rate. Some scholars have proposed using data mining techniques in order to judge
concerns about business operational continuity and thereby reduce judgment errors.
However, prior studies are neither sufficient nor complete. For example, most use only
1–2 statistical methods, without model comparison, Furthermore, most use a one-stage
statistical treatment in order to establish the detection model, which is not prudent. The
main purpose of this study is to propose a better model to detect potentially fraudulent
financial statements, so that the losses incurred by investors and caused by auditors can
be reduced. Compared with previous literature, this study adopts: (1) a two-stage statis-
tical treatment; (2) five data mining techniques to create the detection model for com-
parison of model accuracy; (3) tenfold cross validation which is thought to be prudent
and is commonly used in the academic field. In short, this study is not only prudent, but
is also innovative and makes significant contributions to the literature. This study selects
the major variables by applying the DT techniques of the Chi squared automatic interac-
tion detector (CHAID) and classification and regression trees (CART). Moreover, this
study establishes classification models for comparison by combining CART, CHAID,
BBN, SVM, and ANN data mining techniques.
(Humpherys et al. 2011). The US Association of Certified Fraud Examiners (ACFE) clas-
sifies fraud into six types: (1) providing false financial information; (2) misuse or misap-
propriation of corporate assets; (3) improper support or loans; (4) improperly acquiring
assets or income; (5) improper circumvention of costs or fees; and (6) improper manipu-
lation of financing by executives or board members. The Taiwan Accounting Research
and Development Foundation released the Auditing Standards No. 43 communiqué
in 2006, in which fraud was defined as the management, control unit or one or more
employees deliberately using deception and other methods to acquire improper or illegal
benefits. Therefore, it could be concluded that the four elements of fraud are: (1) serious
erroneous expressions of the nature of transactions, (2) knowingly violating rules, (3) the
victim accepting a misstatement as fact; and (4) damage due to financial losses caused by
the above three situations. Misstatement fraud relating to financial statement auditing
includes financial report fraud and misappropriation of assets. Financial reporting fraud
refers to untrue financial statements which aim to deceive users. The US Security and
Exchange Commission (SEC) state that financial statements should “provide a compre-
hensive overview of the company’s business and financial condition and include audited
financial statements”.
Fraudulent financial statements are intentional and illegal acts that result in mislead-
ing financial statements or misleading financial disclosure (Beasley 1996; Rezaee 2005;
Ravisankar et al. 2011). Stakeholders are adversely affected by misleading financial
reports (Elliot and Willingham 1980). Most prior studies use conventional statistical
multivariate analysis, notably logistic regression analysis (Beasley 1996; Summers and
Sweeney 1998; Bell and Carcello 2000; Spathis et al. 2002; Sharma 2004; Uzun et al. 2004;
Chen et al. 2006; Humpherys et al. 2011). Conventional statistical methods require com-
pliance with the limitations of specific hypotheses, for example, the avoidance of collin-
earity of independent variables and the distribution of data (Chiu et al. 2002). However,
according to Chen (2005), regarding variables, empirical financial variables often can-
not comply with relevant statistical conditions, such as normal distribution. Therefore,
the machine learning method, which requires no statistical hypotheses of data combina-
tions, has emerged and been used by scholars as a classifier. The empirical results sug-
gest that the machine learning method has a positive classification effect.
(1993), Fanning and Cogger (1998), Koh (2004), Chen et al. (2006), Kirkos et al. (2007),
Ravisankar et al. (2011), and Zhou and Kapoor (2011). The judgment accuracy rates of
using data mining techniques to detect fraudulent financial statements vary, and the
construction of the model is neither complete nor perfect. As stated above, most studies
only use 1–2 data mining techniques, without offering model comparison; and most use
one-stage statistical treatment to establish the detection model, which is not prudent.
Prior studies point out that using data mining techniques to detect fraudulent finan-
cial statements is superior to adopting a conventional regression analysis in terms of
accuracy. This study proposes using a two-stage fraudulent financial statement detection
model using the DT CART and CHAID algorithms in variable selection in order to iden-
tify influential variables. Next, this study applies CART, CHAID, BBN, SVM and ANN in
order to construct the fraud detection model and conducts a pairwise comparison of the
testing groups of each model in terms of classification accuracy, Type I errors, and Type
II errors to identify the model with the optimal accuracy.
Methods
This study utilizes several data mining techniques: DT, BBN, SVM, and ANN.
Decision tree
DT is the simplest inductive learning method (Arminger et al. 1997). As a data min-
ing technique, it is able to handle continuous and non-continuous variables (DT concept
diagram is shown as Fig. 1). The decision-making processes of the judgment tree method
are as follows: (1) draw tree diagram; (2) mark various status probabilities and income
and loss values on the probability branch; (3) calculate the expectancy value of each plan
and mark it on the corresponding status node of that plan; (4) trim the branches, com-
pare the expectancy value of each plan and mark it on the plan branch and trim the
small expectancy value; (5) the remaining plan is the best one. Establishing the tree dia-
gram and summarizing the rules primarily depends on classified and known facts. These
rules are mutually exclusive, and the generated DT can make out-of-sample predictions.
The most commonly used DT algorithms include CART, CHAID and C5.0 (Viaene et al.
2005). C5.0 (Quinlan 1993) is developed from ID3 (Quinlan 1986a, b). Since ID3 has
limitations in terms of use and cannot process continuous numerical data, Quinlan
improved it and developed C5.0 to enable it to process continuous and non-continuous
values. The difference between CHAID and CART, C5.0 is that CHAID is only limited
to the processing of category variables, in case of continuous variables, an interval must
Root Node
Branches
Leaf Node Leaf Node
be used to convert it into other variables. Another difference relates to trimming; CART,
C5.0 is the first method to mechanically use data training excessively and then trim, but
CHAID is used to stop the spreading of branches before excessive mechanical use.
DT C5.0 is primarily divided into two parts. The first is the classification criteria. The
DT is constructed based on the computation of the gain ratio. The information gained
from Eq. (1) is used to compute the data set profits before and after the test. As in Eq. (2),
it is defined as the subtraction of the pre-test information from post-test information.
Entropy in Eq. (1) is used in order to compute the impurity of the computation data set,
herein referred to as the chaos degree. When the degree of chaos of the data set reaches
the highest level, the value will be 1. Therefore, when the chaos degree of the post-test
data set is lower, the information gain will be greater and is more beneficial to the con-
struction of the DT.
Information Gain(S, A)
Gain Ratio(S, A) = (1)
Entropy(S, A)
|Sv |
Gain(S, A) = Entropy(S) − Entropy(Sv ) (2)
|S|
v∈values(A)
Values (A) is the set of all possible values of attribute A, Sv is the subset of values v of
attribute A in S. The first item of this equity is the entropy of the original set; and the sec-
ond item is the expectancy value of S after classification with A. The expected entropy
described in the second item is the weighted sum of each subset, and the weighted value
is the proportion |Sv|/|S| of samples belonging to Sv in the original sample S.
The second part is the pruning criteria, which uses error based pruning (EBP) to carry
out the appropriate pruning of the DT and thereby improve the classification accuracy
rate. EBP is from pessimistic error pruning (PEP), both are proposed by Quinlan. The
most important feature of EBP is its ability to make judgments according to the error
rate. It computes the error rate of each node and determines the nodes that cause a rise
in the error rate of the DT before engaging in appropriate pruning of these nodes to
improve the accuracy rate of the DT.
shown as Fig. 2). These decision-making variables are connected in the same direction to
form the parent-offspring relationship. The nodes represent the decision-making vari-
ables and the arrows represent the dependency relationship between various variables.
These variables can be discrete or continuous (Tang et al. 2007). If the arrow direction
is from A to B, this means that B originates from A, and that A is the parent node and B
is the offspring node. The arrows represent the causal relationship and strength. If each
node x contains different parent nodes (Parents(x)), then the conditional probability of
getting all parent nodes and node x is as shown in Eq. (3), hence the conditional prob-
ability table for node x can thus be developed. The probability combinations of n attrib-
utes (x1 , x2 , . . . , xn ) are as shown in Eq. (4)
P(x|Parents(x) ) (3)
n
P(x) = P(x1 , x2 , . . . , xn ) P(xi |Pai ) (4)
i=1
Linear divisibility
Let the training set be (x1 , y1 ), . . . , (xl , yl ), x ∈ Rn , y ∈ {1, −1}, in which x is the input var-
iable, and the data will classify a super-plane into two categories, one is 1, and the other
is −1. If such data can be distinguished correctly, and the nearest vector of each classifi-
cation is at a maximum distance from the super plane, then the super plane is most suit-
able for divisibility. We express the super plane with the following formula:
Parent
X1 Node
X2 X3 X4 Nodes
Xn Nodes
yi (w, x) + b ≥ 1, i = 1, . . . , l (5)
The maximum spacing of the two nearest vectors of Eq. (5) is as shown in Eq. (6):
The maximum distance (6) can be expressed as minimum �(w) = 21 �w�2 , Lagrange
relaxation is used to calculate the super plane most suitable for divisibility, as in Eq. (7):
l
1 ∗
w∗ = b∗ = −
ai yi xi w , xr + xs (7)
2
i=1
where xr, xs are any support vectors that each classification can meet
αr , αs > 0, yr = −1, ys = 1. We acquire the clear hard classifier, as in Eq. (8):
f (x) = sgn w∗ , x + b
(8)
If the condition of incapable or complete classification is not considered, the soft clas-
sifier is as shown in Eq. (9):
� ∗ � −1: z < −1
f (x) = h w , x + b where h(z) = z: − 1 ≤ z ≤ 1
+1: z > 1
(9)
Linear non‑divisibility
Vapnik (1995) imports the concept of the cost function as related to wrong classifica-
tions in order to calculate the super plane most suitable for divisibility, which can be
expressed as Eq. (10):
Chen SpringerPlus (2016)5:89 Page 8 of 16
l
1
min�(w, ξ ) = �w�2 + C ξi
2
i=1
s.t. yi [(w, x) + b] ≥ 1 − ξi , i = 1, . . . , l. (10)
where ξ ≥ 0
where ξi is the error item of wrong classification, C is a given parameter value, and
Lagrange relaxation can be obtained, as in Eq. (11) (Ribeiro et al. 1989; Larsson et al.
1996):
l l l
1
�(w, ξ ) = �w�2 + C ξi − αi yi wT xi + b − 1 + ξi − βi ξi (11)
2
i=1 i=1 i=1
Hidden Layer
Input Layer
Output Layer
Outputs
Inputs
X1 W1j
X2 W2j Yj
Pj
W3j
X3
Wnj
.…
Xn
Fig. 5 ANN neural cell
in each training model differ. Finally, the weights of forecast variables generated by the
neural network are also different, but the error will meet a minimal value, so the neural
network is a deduction acquired through a trial-and-error method, and its purpose is to
minimize errors in the model forecast results. For the same data, the weighs trained are
not equal, and so the essence of a neural network is to emphasize the training model.
Therefore, there will be no judgment formula for the result of the neural network model,
rather only the judgment result is obtained.
Variable definition
The dependent variable is used to classify companies into normal companies, repre-
sented by 0, and fraudulent companies, represented by 1. This study uses 30 independent
variables including 23 financial variables and seven non-financial variables. The research
variables and definitions are shown in Table 1.
Research design
Previous research is susceptible to the following disadvantages: (1) Most only use 1–2
statistical methods without model comparison; (2) Most only use one-stage statistical
treatment to establish the detection model, which is not prudent. Therefore, a two-stage
statistical treatment is used in this research (data mining techniques are used), and the
tenfold cross validation generally thought to be prudent in the academic field is also
used. The accuracy of the model is also compared in order to establish a relatively pru-
dent “Fraudulent Financial Statements” detection model. This study selects 30 variables
that can affect fraudulent financial statements from the literature and applies the DT
CART and CHAID algorithm in variable selection in order to identify influential vari-
ables. Next, CART, CHAID, BBN, SVM and ANN are applied in order to establish fraud
warning models, and a pairwise comparison of the testing groups is conducted in terms
of detection accuracy, Type I errors, and Type II errors. The research design and proce-
dure are shown in Fig. 6.
Variable selection
Since this study selects relatively more variables, DT is applied in order to identify the
important and representative variables. In this study, SPSS Clementine is used as the soft-
ware for DT variable selection, and CART and CHAID are used for variable selection.
CHAID CART
assets ratio, X11 operating expenses ratio, X12 debt ratio, X14 quick ratio, X16 cash flow
ratio, and X21 returns on assets before tax, interest, and depreciation. The sequence of
variables by degree of importance is X12, X16, X14, X02, X21 and X11.
CART models
As shown in Table 4, the fraudulent financial statement detection accuracy and overall
accuracy of the CART–CART model were the highest at 88.59 and 83.19 %, respectively.
This study also discloses each model’s Type I and Type II errors, as shown in Table 5.
Type I errors indicate fraudulent financial statements that have been mistakenly labeled
as not being fraudulent. Type II errors indicate fraudulent financial statements which
have been classified as fraudulent financial statements. Logically, a Type I error is a
major mistake. Therefore, in addition to comparison with the accuracy of the testing
group, the model’s Type I error rate is also considered. The CART–CART model has the
lowest Type I error rate at 11.41 % and an overall error rate of 16.81 %.
CHAID models
As shown in Table 6, the fraudulent financial statement detection accuracy and overall
accuracy of the CHAID–CART model are the highest at 92.69 and 87.97 %, respectively.
Each model’s Type I and Type II errors are shown in Table 7. The CHAID–ANN model
has the lowest Type I error rate at 7.31 %; the Type II error rate is 16.76 %, and the over-
all error rate is 12.03 %.
Statistical test
In terms of statistical tests, this study employs the t-test and the Wilcoxon rank-sum
test. The t-test and the Wilcoxon rank-sum test of the various models, including CART–
CART, CART–CHAID, CHAID–CHAID, CHAID–CART, CART–BBN, CART–SVM,
CART–ANN, CHAID–BBN, CHAID–SVM, and CHAID–ANN, all reveal statistically
significant levels (significant at P < 0.01), as shown in Table 8 (the t-test) and Table 9 (the
Wilcoxon rank-sum test).
Conclusions
A company’s financial statement is the key basis for all investor judgments, and is the last
line of defense for investor interests. If management attempts to withhold information,
even when independent CPAs, investment banking and securities analysts are involved,
investors can experience significant losses. The most well-known scandal is the Enron
bankruptcy case. Top management intentionally misled investors so as to profit by one
billion USD. This caused bankruptcy for many investors and employees, and impacted
the accounting and business community heavily.
The Enron case caused investors to lose confidence in financial statements and led to
the establishment of the Sarbanes–Oxley Act (1992), which mandates that companies
form auditing committees headed by independent directors. The Enron case resulted in
the reform of accounting standards and the reconstruction of regulatory mechanisms.
In fact, unusual signs in financial statements often occur before the outbreak of a scan-
dal. For example, signs of revenue situations, cash flow conditions and the ratio of liabili-
ties and assets can all exist. Irrationalities can be found in financial statements from a
few quarters to 1 year before the event. Fraudulent financial statements may look highly
presentable, and many investors may be cheated. However, it is better to prevent fraud,
protect investors from being cheated, and ensure that criminals are punished. Whether
legal norms and supervision requirements are stringent enough and whether or not cor-
porate governance can prevent intentional and deliberate acts of stealing company assets
by manipulating financial statements are therefore issues that need to be addressed.
An increasing number of cases of fraudulent financial statements are able to damage
companies and result in major losses for investors. People pay a heavy price to compen-
sate for this damage. Therefore, establishing an effective fraudulent financial statement
detection model is considerably important.
This study aims to provide a non-conventional analysis method by using multiple data
mining techniques, including: the DT, BBN, SVM and ANN in order to construct a more
accurate fraudulent financial statement detection model. In the first stage, this study
applies the DTs of CART and CHAID to select the important variables. CART, CHAID,
BBN, SVM and ANN are then combined in order to construct a classification model for
comparison. According to the research results, the detection performance (overall accu-
racy) of the CHAID–CART model is the best at 87.97 % (the FFS detection accuracy
is 92.69 %). It also has the lowest Type I error rate of 7.31 %. The sequences for overall
accuracy are 83.19 % for the CART–CART model, 82.40 % for the CHAID–ANN model,
81.01 % for the CHAID–BNN model, 80.70 % for the CART–CHAID model, 79.05 %
for the CHAID–SVM model, 75.28 % for the CHAID–CHAID model, 75.20 % for the
CART–BNN model, 75.00 % for the CART–ANN model, and 74.68 % for the CART–
SVM model.
Based on the empirical results of this study, the accuracy of the DT CHAID, combined
with CART, in detecting fraudulent financial statements, is relatively high. It can there-
fore be used as a tool to help auditors in the detection of fraudulent financial statements.
The research findings can provide a reference for investors, shareholders, company man-
agers, credit rating institutions, auditors, CPAs (certified public accountants), securities
analysts, financial regulatory authorities, and relevant academic institutions.
Acknowledgements
The author thanks the editor-in-chief, editors, and the anonymous reviewers of SpringerPlus, for their insightful com-
ments, which helped to improve the quality of this paper.
Competing interests
The author declare that no competing interests.
References
Arminger G, Enache D, Bonne T (1997) Analyzing credit risk data: a comparison of logistic discrimination classification
tree analysis and feed forward networks. Comput Stat 12(2):293–310
Beasley M (1996) An empirical analysis of the relation between the board of director composition and financial state-
ment fraud. Account Rev 71(4):443–466
Beasley MS, Carcello JV, Hermanson DR (1999) Fraudulent financial reporting 1987-1997: an analysis of U.S. public compa-
nies. The Committee of Sponsoring Organizations of the Treadway Commission (COSO), New York
Beaver WH (1966) Financial ratios as predictors of failure. J Account Res 4:71–111
Bell T, Carcello J (2000) A decision aid for assessing the likelihood of fraudulent financial reporting. Audit A J Pract Theory
9(1):169–178
Chen SpringerPlus (2016)5:89 Page 16 of 16
Breiman L, Friedman JH, Olshen RA, Stone CI (1984) Classification and regression trees. Wadsworth Publishing Co.,
Belmont
Chen CH (2005) Application of grey forecast theory and logit equation in financial crisis warning model from the pre-
event control viewpoint. Commer Manag Q 6(4):655–676
Chen G, Firth M, Gao DN, Rui OM (2006) Ownership structure, corporate governance, and fraud: evidence from China. J
Corp Financ 12(3):424–448
Chiu CC, Lee TS, Chou YC, Lu CJ (2002) Application of integrated identification analysis and ANN in data mining. J Chin
Inst Ind Eng 19(2):9–22
Coats PK, Fant LF (1993) A neural network approach to forecasting financial distress. J Bus Forecast 10:9–12
Elliot R, Willingham J (1980) Management fraud: detection and deterrence. Petrocelli, New York
Fanning K, Cogger K (1998) Neural network detection of management fraud using published financial data. Int J Intell
Syst Account Financ Manag 7(1):21–24
Hansen JV, McDonald JB, Stice JD (1992) Artificial intelligence and generalized qualitative-response models: an empirical
test on two audit decision-making domains. Decis Sci 23(3):708–723
Humpherys SL, Moffitt KC, Burns MB, Burgoon JK, Felix WF (2011) Identification of fraudulent financial statements using
linguistic credibility analysis. Decis Support Syst 50:585–594
Kamarudin KA, Ismail WAW, Mustapha WAHW (2012) Aggressive financial reporting and corporate fraud. Procedia Soc
Behav Sci 65:638–643
Kirkos S, Spathis C, Manolopoulos Y (2007) Data mining techniques for the detection of fraudulent financial statements.
Expert Syst Appl 32(4):995–1003
Koh HC (2004) Going concern prediction using data mining techniques. Manag Audit J 19:462–476
Kotsiantis S, Koumanakos E, Tzelepis D, Tampakas V (2006) Forecasting fraudulent financial statements using data mim-
ing. World Enformatika Soc 12:283–288
Larsson T, Patriksson M, Strömberg AB (1996) Conditional subgradient optimization—theory and applications. Eur J Oper
Res 88(2):382–403
McCulloch WS, Pitts WH (1943) A logical calculus of the ideas immanent in nervous activity. Bull Math Biophys 5:115–133
Newton AC, Stewart GB, Diaz A, Golicher D, Pullin AS (2007) Bayesian belief networks as a tool for evidence-based conser-
vation management. J Nat Conserv 15(2):144–160
Nguyen MN, Shi D, Quek C (2008) A nature inspired Ying–Yang approach for intelligent decision support in bank solvency
analysis. Expert Syst Appl 34:2576–2587
Pai PF, Hsu MF, Wang MC (2011) A support vector machine-based model for detecting top management fraud. Knowl
Based Syst 24:314–321
Pearl J (1986) Fusion, propagation, and structuring in belief networks. Artif Intell 29(3):241–288
Quinlan JR (1986a) C4.5: programs for machine learning. Morgan Kaufmann Publishers, Burlington
Quinlan JR (1986b) C5.0: programs for machine learning. Morgan Kaufmann Publishers, Burlington
Quinlan JR (1993) C4.5: Programs for machine learning. Morgan Kaufmann Publishers, Burlington
Ravisankar P, Ravi V, Rao GR, Bose I (2011) Detection of financial statement fraud and feature selection using data mining
techniques. Decis Support Syst 50:491–500
Rezaee Z (2005) Causes, consequences, and deterrence of financial statement fraud. Crit Perspect Account 16(3):277–298
Ribeiro CC, Minoux M, Penna MC (1989) An optimal column-generation-with-ranking algorithm for very large scale set
partitioning problems in traffic assignment. Eur J Oper Res 41(2):232–239
Salehi M, Fard FZ (2013) Data mining approach to prediction of going concern using classification and regression tree
(CART). Glob J Manag Bus Res 13(3):24–30
Seifert JW (2004) Data mining and the search for security: challenges for connecting the dots and databases. Gov Inf Q
21(4):461–480
Sharma VD (2004) Board of director characteristics, institutional ownership, and fraud: evidence from Australia. Audit A J
Pract Theory 23(2):105–117
Shin KS, Lee TS, Kim HJ (2005) An application of support vector machines in bankruptcy prediction model. Expert Syst
Appl 28:127–135
Spathis C, Doumpos M, Zopounidis C (2002) Detecting false financial statements: a comparative study using multicriteria
analysis and multivariate statistical techniques. Eur Account Rev 11(3):509–535
Stamelos I, Angelis L, Dimou P, Sakellaris E (2003) On the use of bayesian belief networks for the prediction of software
productivity. Inf Softw Technol 45(1):51–60
Summers SL, Sweeney JT (1998) Fraudulently misstated financial statements and insider trading: an empirical analysis.
Account Rev 73:131–146
Tang A, Nicholson A, Jin Y, Han J (2007) Using bayesian belief networks for change impact analysis in architecture design.
J Syst Softw 80(1):127–148
Uzun H, Szewczyk SH, Varma R (2004) Board composition and corporate fraud. Financ Anal J 60(3):33–43
Vapnik V (1995) The nature of statistical learning theory. Springer, Berlin
Viaene S, Dedene G, Derrig R (2005) Auto claim fraud detection using Bayesian learning neural networks. Expert Syst
Appl 29:653–666
Wells JT (1997) Occupational fraud and abuse. Obsidian Book Publishing, Nottingham
Yeh CC, Chi DJ, Hsu MF (2010) A hybrid approach of DEA, rough set and support vector machines for business failure
prediction. Expert Syst Appl 37:1535–1541
Zhou W, Kapoor G (2011) Detecting evolutionary financial statement fraud. Decis Support Syst 50:570–575