期刊文献+
共找到147篇文章
< 1 2 8 >
每页显示 20 50 100
Determining of Employee Frauds in Forensic Accounting: A Research on Forensic Cases in the City of Kars in Turkey
1
作者 Duygu Anil Keskin Seyhan Goksu Ozturk 《Journal of Modern Accounting and Auditing》 2013年第6期729-738,共10页
Discovering and preventing the frauds which affect the business organizations negatively require a greater degree of specialism. Detecting a fraud in the organizations is very hard, because not only such a fraud is ex... Discovering and preventing the frauds which affect the business organizations negatively require a greater degree of specialism. Detecting a fraud in the organizations is very hard, because not only such a fraud is exercised by the people who have deep professional knowledge, but they also use some peculiar methods to hide their tricky activities. Therefore, it is obvious that it is necessary to have the fraud examiners and especially fraud auditors who should have deep professional knowledge and experience. The aim of this study is to give some general information about employee fraud, which targets the different functions of the companies, takes many forms, and reaches important levels in recent years, in qualitative point. In this study, firstly, forensic accounting is a highly dynamic area in nowadays which is related to fraud auditing and its profession, and its search area of frauds and employee frauds subjects have been reviewed. Finally, qualitative data were collected about fraud incidents which had occurred and been sent to the court in the province of Kars in Turkey. Actual case analysis method has been used in this study. The obtained data have been analyzed by using Statistical Package for the Social Sciences (SPSS) 17 statistics package program. Results of the study have been discussed and interpreted in details. 展开更多
关键词 forensic accounting M41 FRAUD M49 fraud detection M42 employee frauds
在线阅读 下载PDF
Auditors' Role, Responsibilities, Duties, and AIS to Prevent Errors and Frauds:An Evidence From Lebanon
2
作者 Pierre Al-Khoury Roula Moubarak +2 位作者 Maria Franjieh Sarah Abboud Mansour AlShamali 《Journal of Modern Accounting and Auditing》 2015年第12期632-640,共9页
The paper is about how Lebanese auditors detect fraud in the course of their work and what they advise companies to implement in order to avoid fraudulent acts. For this purpose, various interviews were carded out fro... The paper is about how Lebanese auditors detect fraud in the course of their work and what they advise companies to implement in order to avoid fraudulent acts. For this purpose, various interviews were carded out from different experienced and well-reputed external auditors. This was also for their wide knowledge of all kinds of frauds. Data were taken from primary as well as secondary resources. The paper presents the theoretical and practical aspects. The theoretical part contains the accounting scandals, frauds, auditing processes, and auditor's responsibilities and tools for auditors to detect fraud. The practical part consists of case study analysis and detailed research processes. 展开更多
关键词 AUDITING ERRORS frauds duties of auditor auditor responsibilities
在线阅读 下载PDF
International case studies in forensic geology:fakes and frauds,homicides and environmental crime
3
作者 Alastair Ruffell Bill Schneck 《Episodes》 2017年第2期172-175,共4页
Some case studies are presented ranging from geological fakes and frauds,homicides and one environmental forensic case.Fakes may be true geological materials such as created fossils or gems and precious stones,or wher... Some case studies are presented ranging from geological fakes and frauds,homicides and one environmental forensic case.Fakes may be true geological materials such as created fossils or gems and precious stones,or where geological methods are used to analyse fakes,such as the stones or ceramics used in making archaeological or art forgeries(e.g.,mineral pigments in paintings).Fakes have also been created for reasons of academic rivalry,career advancement and religious belief.Fraud commonly involves over-stated claims of ore content associated with mining and the oil and gas industry.The range of geological fakes,the uses of geological methods in detecting fakes,and the extent of fraud in the mining sector are all extensive and sometimes incredible.The homicide is case presented to demonstrate how the types of geological investigation described in the rest of this volume may be applied.We include an environmental forensic case for similar reasons,to show that forensic geology may be applied to more than homicides and fakery. 展开更多
关键词 created fossils archaeological art forgeries egmineral pigments true geological materials geological methods FRAUD precious stonesor geological fakes forensic geology
在线阅读 下载PDF
The dark side of non‑fungible tokens: understanding risks in the NFT marketplace from a fraud triangle perspective
4
作者 Nitin Upadhyay Shalini Upadhyay 《Financial Innovation》 2025年第1期1719-1747,共29页
This study investigates the dark side of the non-fungible token(NFT)marketplace,with a focus on understanding the risks,and underlying factors driving fraud in the NFT ecosystem.Using the fraud triangle framework,this... This study investigates the dark side of the non-fungible token(NFT)marketplace,with a focus on understanding the risks,and underlying factors driving fraud in the NFT ecosystem.Using the fraud triangle framework,this study examines pressure,opportunity,and rationalization from individual and organizational perspectives.The research provides a comprehensive understanding of the contributing factors to NFT marketplace fraud by analyzing the reasons behind fraudulent actions.A conceptual framework is developed that includes ten propositions to aid in understanding the complexity of this issue.This study’s outcomes will assist policymakers in crafting efficient approaches to mitigate fraud within the NFT marketplace. 展开更多
关键词 NFT Blockchain Marketplace risks Opportunity Pressure RATIONALIZATION Emerging technology FRAUD Fraud triangle
在线阅读 下载PDF
Understanding Accounting Fraud Through the Fraud Triangle Theory:A Systematic Literature Review
5
作者 Faisal Fadly Hermawan Iskandar Muda Sambas Ade Kesuma 《Journal of Modern Accounting and Auditing》 2025年第2期48-58,共11页
This research aims to understand the causes of fraud through the approach of the Fraud Triangle Theory,which includes three main factors:pressure,opportunity,rationalization.By using the Systematic Literature Review m... This research aims to understand the causes of fraud through the approach of the Fraud Triangle Theory,which includes three main factors:pressure,opportunity,rationalization.By using the Systematic Literature Review method from various relevant international journals,it analyzed systematically to identify patterns,trends,and theoretical contributions to efforts in detecting and preventing fraud.The results of this study show that the three factors in the Fraud Triangle Theory significantly contribute to the occurrence of fraud.Opportunity as the most dominant factor is caused by weak internal control systems and lack of oversight.In addition,economic pressure,and a permissive organizational environment,as well as the rationalization processes by individuals,also increase the tendency for a person to commit fraud.These findings emphasize the need for a comprehensive approach in fraud prevention strategies,through ethical values,the establishment of an organizational culture with integrity,and the implementation of more effective internal control and oversight. 展开更多
关键词 Fraud Triangle FRAUD PRESSURE OPPORTUNITY RATIONALIZATION
在线阅读 下载PDF
Data analytics to prevent retail credit card fraud: empirical evidence from Latin America
6
作者 Leidy Tatiana Rugeles Diaz Miguel Ángel Echarte Fernández +1 位作者 Javier Jorge‑Vazquez Sergio Luis Nañez Alonso 《Financial Innovation》 2025年第1期4022-4055,共34页
Reducing the risk of fraud in credit card transactions is crucial for the competitiveness of companies,especially in Latin American countries.This study aims to establish measures for preventing and detecting fraud in... Reducing the risk of fraud in credit card transactions is crucial for the competitiveness of companies,especially in Latin American countries.This study aims to establish measures for preventing and detecting fraud in the use of credit cards in shops through analytical methods(data mining,machine learning and artificial intelligence).To achieve this objective,the study employs a predictive methodology using descriptive and exploratory statistics and frequency,frequency&monetary(RFM)classification techniques,differentiating between SMEs and large businesses via cluster analysis and supervised models.A dataset of 221,292 card records from a Latin American merchant payment gateway for the year 2022 is used.For fraud alerts,the classification model has been selected for small and medium–sized merchants,and the multilayer perceptron(MLP)neural network has been selected for large merchants.Random forest or Gini decision tree models have been selected as backup models for retraining.For the detection of punctual fraud patterns,the K-means and partitioning around medoids(PAM)models have been selected,depending on the type of trade.The results revealed that the application of the identified models would have prevented between 48 and 85%of fraud transactions,depending on the trade size.Despite the promising results,continuous updating is recommended,as fraudsters frequently implement new fraud techniques. 展开更多
关键词 Fraud prevention RISK COMPETITIVENESS Machine learning Credit cards
在线阅读 下载PDF
Methodology for Detecting Non-Technical Energy Losses Using an Ensemble of Machine Learning Algorithms
7
作者 Irbek Morgoev Roman Klyuev Angelika Morgoeva 《Computer Modeling in Engineering & Sciences》 2025年第5期1381-1399,共19页
Non-technical losses(NTL)of electric power are a serious problem for electric distribution companies.The solution determines the cost,stability,reliability,and quality of the supplied electricity.The widespread use of... Non-technical losses(NTL)of electric power are a serious problem for electric distribution companies.The solution determines the cost,stability,reliability,and quality of the supplied electricity.The widespread use of advanced metering infrastructure(AMI)and Smart Grid allows all participants in the distribution grid to store and track electricity consumption.During the research,a machine learning model is developed that allows analyzing and predicting the probability of NTL for each consumer of the distribution grid based on daily electricity consumption readings.This model is an ensemble meta-algorithm(stacking)that generalizes the algorithms of random forest,LightGBM,and a homogeneous ensemble of artificial neural networks.The best accuracy of the proposed meta-algorithm in comparison to basic classifiers is experimentally confirmed on the test sample.Such a model,due to good accuracy indicators(ROC-AUC-0.88),can be used as a methodological basis for a decision support system,the purpose of which is to form a sample of suspected NTL sources.The use of such a sample will allow the top management of electric distribution companies to increase the efficiency of raids by performers,making them targeted and accurate,which should contribute to the fight against NTL and the sustainable development of the electric power industry. 展开更多
关键词 Non-technical losses smart grid machine learning electricity theft FRAUD ensemble algorithm hybrid method forecasting classification supervised learning
在线阅读 下载PDF
Information Security, Ethics, and Integrity in LLM Agent Interaction
8
作者 Ying-Jung Chen Vijay K. Madisetti 《Journal of Information Security》 2025年第1期184-196,共13页
This study addresses security and ethical challenges in LLM-based Multi-Agent Systems, as exemplified in a blockchain fraud detection case study. Leveraging blockchain’s secure architecture, the framework involves sp... This study addresses security and ethical challenges in LLM-based Multi-Agent Systems, as exemplified in a blockchain fraud detection case study. Leveraging blockchain’s secure architecture, the framework involves specialized LLM Agents—ContractMining, Investigative, Ethics, and PerformanceMonitor, coordinated by a ManagerAgent. Baseline LLM models achieved 30% accuracy with a threshold method and 94% accuracy with a random-forest method. The Claude 3.5-powered LLM system reached an accuracy of 92%. Ethical evaluations revealed biases, highlighting the need for fairness-focused refinements. Our approach aims to develop trustworthy and reliable networks of agents capable of functioning even in adversarial environments. To our knowledge, no existing systems employ ethical LLM agents specifically designed to detect fraud, making this a novel contribution. Future work will focus on refining ethical frameworks, scaling the system, and benchmarking it against traditional methods to establish a robust, adaptable, and ethically grounded solution for blockchain fraud detection. 展开更多
关键词 Multi LLM Agents Systems Blockchain Cooperative Interactions Fraud Detection Ethics and Safety
在线阅读 下载PDF
A Hybrid Feature Selection and Clustering-Based Ensemble Learning Approach for Real-Time Fraud Detection in Financial Transactions
9
作者 Naif Almusallam Junaid Qayyum 《Computers, Materials & Continua》 2025年第11期3653-3687,共35页
This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction m... This paper proposes a novel hybrid fraud detection framework that integrates multi-stage feature selection,unsupervised clustering,and ensemble learning to improve classification performance in financial transaction monitoring systems.The framework is structured into three core layers:(1)feature selection using Recursive Feature Elimination(RFE),Principal Component Analysis(PCA),and Mutual Information(MI)to reduce dimensionality and enhance input relevance;(2)anomaly detection through unsupervised clustering using K-Means,Density-Based Spatial Clustering(DBSCAN),and Hierarchical Clustering to flag suspicious patterns in unlabeled data;and(3)final classification using a voting-based hybrid ensemble of Support Vector Machine(SVM),Random Forest(RF),and Gradient Boosting Classifier(GBC).The experimental evaluation is conducted on a synthetically generated dataset comprising one million financial transactions,with 5% labelled as fraudulent,simulating realistic fraud rates and behavioural features,including transaction time,origin,amount,and geo-location.The proposed model demonstrated a significant improvement over baseline classifiers,achieving an accuracy of 99%,a precision of 99%,a recall of 97%,and an F1-score of 99%.Compared to individual models,it yielded a 9% gain in overall detection accuracy.It reduced the false positive rate to below 3.5%,thereby minimising the operational costs associated with manually reviewing false alerts.The model’s interpretability is enhanced by the integration of Shapley Additive Explanations(SHAP)values for feature importance,supporting transparency and regulatory auditability.These results affirm the practical relevance of the proposed system for deployment in real-time fraud detection scenarios such as credit card transactions,mobile banking,and cross-border payments.The study also highlights future directions,including the deployment of lightweight models and the integration of multimodal data for scalable fraud analytics. 展开更多
关键词 Fraud detection financial transactions economic impact feature selection CLUSTERING ensemble learning
在线阅读 下载PDF
Audit Without Integrity:Ethical Failures and Fraud in High-Profile Corporate Cases
10
作者 Enda Putri Rudangta Meliala Julia +1 位作者 Iskandar Muda Erlina 《Journal of Modern Accounting and Auditing》 2025年第3期218-228,共11页
This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit... This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit reports,the study applies the Fraud Triangle framework,focusing on how weak integrity,objectivity,and professional competence have undermined public trust in the auditing profession.Using a qualitative descriptive method and the Fraud Triangle framework,which includes pressure,opportunity,and rationalization,the study analyzes cases from Indonesia(SNP Finance,Jiwasraya),China(Evergrande),and Germany(Wirecard).The analysis reveals that many audit failures observed in this study appear to stem more from ethical challenges than from technical incapability,driven by client pressure,weak internal controls,and compromised auditor independence.These cases demonstrate a recurring global pattern in which auditors neglect their responsibility to act in the public interest. 展开更多
关键词 auditor ethics internal auditor competence internal control fraud triangle audit failure professional responsibility SNP Finance Evergrande Wirecard Jiwasraya
在线阅读 下载PDF
Audit without Integrity:Ethical Failures and Fraud in High-Profile Corporate Cases
11
作者 Enda Putri Rudangta Meliala Julia +1 位作者 Iskandar Muda Erlina 《Journal of Modern Accounting and Auditing》 2025年第3期159-169,共11页
This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit... This study explores ethical violations and audit failures in various large-scale corporate fraud cases.Using a qualitative descriptive method and based on secondary data from documented fraud cases and published audit reports,the study applies the Fraud Triangle framework,focusing on how weak integrity,objectivity,and professional competence have undermined public trust in the auditing profession.Using a qualitative descriptive method and the Fraud Triangle framework,which includes pressure,opportunity,and rationalization,the study analyzes cases from Indonesia(SNP Finance,Jiwasraya),China(Evergrande),and Germany(Wirecard).The analysis reveals that many audit failures observed in this study appear to stem more from ethical challenges than from technical incapability,driven by client pressure,weak internal controls,and compromised auditor independence.These cases demonstrate a recurring global pattern in which auditors neglect their responsibility to act in the public interest. 展开更多
关键词 auditor ethics internal auditor competence internal control fraud triangle audit failure professional responsibility SNP Finance Evergrande Wirecard Jiwasraya
在线阅读 下载PDF
Credit Card Fraud Detection Method Based on RF-WGAN-TCN
12
作者 Ao Zhang Hongzhen Xu Ruxin Liu 《Computers, Materials & Continua》 2025年第12期5159-5181,共23页
Credit card fraud is one of the primary sources of operational risk in banks,and accurate prediction of fraudulent credit card transactions is essential to minimize banks’economic losses.Two key issues are faced in c... Credit card fraud is one of the primary sources of operational risk in banks,and accurate prediction of fraudulent credit card transactions is essential to minimize banks’economic losses.Two key issues are faced in credit card fraud detection research,i.e.,data category imbalance and data drift.However,the oversampling algorithm used in current research suffers from excessive noise,and the Long Short-Term Memory Network(LSTM)based temporal model suffers from gradient dispersion,which can lead to loss of model performance.To address the above problems,a credit card fraud detection method based on Random Forest-Wasserstein Generative Adversarial NetworkTemporal Convolutional Network(RF-WGAN-TCN)is proposed.First,the credit card data is preprocessed,the feature importance scores are calculated by Random Forest(RF),the features with lower importance are eliminated,and then the remaining features are standardized.Second,the Wasserstein Distance Improvement Generative Adversarial Network(GAN)is introduced to construct the Wasserstein Generative Adversarial Network(WGAN),the preprocessed data is input into the WGAN,and under the mutual game training of generator and discriminator,the fraud samples that meet the target distribution are obtained.Finally,the temporal convolutional network(TCN)is utilized to extract the long-time dependencies,and the classification results are output through the Softmax layer.Experimental results on the European cardholder dataset show that the method proposed in the paper achieves 91.96%,98.22%,and 81.95%in F1-Score,Area Under Curve(AUC),and Area Under the Precision-Recall Curve(AUPRC)metrics,respectively,and has higher prediction accuracy and classification performance compared with existing mainstream methods. 展开更多
关键词 Credit card fraud unbalanced classification random forest generative adversarial networks temporal convolutional networks
在线阅读 下载PDF
From portfolio optimization to quantum blockchain and security: a systematic review of quantum computing in finance
13
作者 Abha Satyavan Naik Esra Yeniaras +2 位作者 Gerhard Hellstern Grishma Prasad Sanjay Kumar Lalta Prasad Vishwakarma 《Financial Innovation》 2025年第1期2536-2602,共67页
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo... The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas. 展开更多
关键词 Portfolio optimization Fraud detection Derivative pricing Risk calculation Monte carlo Quantum blockchain Quantum-resistant blockchain Digital signature algorithms Post-quantum cryptography SECURITY Privacy-preserving blockchain Quantum computing
在线阅读 下载PDF
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
14
作者 Tawfeeq Shawly Ahmed A.Alsheikhy +4 位作者 Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani 《Computer Modeling in Engineering & Sciences》 2025年第3期3181-3212,共32页
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security risks.Current spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data breaches.To address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam emails.This framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual data.This approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated components.The model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the field.These findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection systems.The framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam. 展开更多
关键词 Email spam fraud light dual attention squeeze and excitation divide and conquer-generative adversarial network-squeeze and excitation-based framework security
在线阅读 下载PDF
Multimodal detection framework for financial fraud integrating LLMs and interpretable machine learning
15
作者 Hui Nie Zhao-hui Long +1 位作者 Ze-jun Fang Lu-qiong Gao 《Journal of Data and Information Science》 2025年第4期291-315,共25页
Purpose:This study aims to integrate large language models(LLMs)with interpretable machine learning methods to develop a multimodal data-driven framework for predicting corporate financial fraud,addressing the limitat... Purpose:This study aims to integrate large language models(LLMs)with interpretable machine learning methods to develop a multimodal data-driven framework for predicting corporate financial fraud,addressing the limitations of traditional approaches in long-text semantic parsing,model interpretability,and multisource data fusion,thereby providing regulatory agencies with intelligent auditing tools.Design/methodology/approach:Analyzing 5,304 Chinese listed firms’annual reports(2015-2020)from the CSMAD database,this study leverages the Doubao LLMs to generate chunked summaries and 256-dimensional semantic vectors,developing textual semantic features.It integrates 19 financial indicators,11 governance metrics,and linguistic characteristics(tone,readability)with fraud prediction models optimized through a group of Gradient Boosted Decision Tree(GBDT)algorithms.SHAP value analysis in the final model reveals the risk transmission mechanism by quantifying the marginal impacts of financial,governance,and textual features on fraud likelihood.Findings:The study found that LLMs effectively distill lengthy annual reports into semantic summaries,while GBDT algorithms(AUC>0.850)outperform the traditional Logistic Regression model in fraud detection.Multimodal fusion improved performance by 7.4%,with financial,governance,and textual features providing complementary signals.SHAP analysis revealed financial distress,governance conflicts,and narrative patterns(e.g.,tone anchoring,semantic thresholds)as key fraud indicators,highlighting managerial intent in report language.Research limitations:This study identifies three key limitations:1)lack of interpretability for semantic features,2)absence of granular fraud-type differentiation,and 3)unexplored comparative validation with other deep learning methods.Future research will address these gaps to enhance fraud detection precision and model transparency.Practical implications:The developed semantic-enhanced evaluation model provides a quantitative tool for assessing listed companies’information disclosure quality and enables practical implementation through its derivative real-time monitoring system.This advancement significantly strengthens capital market risk early warning capabilities,offering actionable insights for securities regulation.Originality/value:This study presents three key innovations:1)A novel“chunking-summarizationembedding”framework for efficient semantic compression of lengthy annual reports(30,000 words);2)Demonstration of LLMs’superior performance in financial text analysis,outperforming traditional methods by 19.3%;3)A novel“language-psychology-behavior”triad model for analyzing managerial fraud motives. 展开更多
关键词 Financial fraud detection Large language models Multimodal data fusion Interpretable machine learning Annual report
在线阅读 下载PDF
Forensic Accounting: A Checkmate for Corporate Fraud
16
作者 Lakshmi P Ganesh Menon 《Journal of Modern Accounting and Auditing》 2016年第9期453-460,共8页
Forensic accounting gained importance due to increasing number of financial frauds and scams. This new area in accounting encompasses accounting, auditing, and investigative skills, thus emerged to detect frauds. They... Forensic accounting gained importance due to increasing number of financial frauds and scams. This new area in accounting encompasses accounting, auditing, and investigative skills, thus emerged to detect frauds. They involve themselves in different areas like employee-related frauds, settlement and arbitrations, etc.. A forensic accountant has a financial sixth sense. Despite the fact that forensic accounting can bridge the gap between conventional accounting and auditing, this profession has not been able to gain the needed momentum due to some hassles. This paper tries to shed light on the theoretical concept, nature, practice, need, role of forensic accounting in preventing fraud, and the practical difficulties faced by forensic accountants. The study is based on information collected from interviewing practicing forensic accounting in India during 2011-12. The paper was able to assess the importance and rising scope of forensic accounting as a job. It also understood the practical difficulties they faced like lack of organized databases in Indian scenario which makes it difficult to access all needed information. Expectation level of the clients is very high and at times even unreasonable. This paper fulfills an identified need to study the important rising field of forensic accounting in India. 展开更多
关键词 forensic accounting accounting frauds AUDITING internal audit accounting scams
在线阅读 下载PDF
Species authentication of commercial beef jerky based on PCR-RFLP analysis of the mitochondrial 12S rRNA gene 被引量:8
17
作者 Shi-Yi Chen Yi-Ping Liu Yong-Gang Yao 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2010年第11期763-769,共7页
In this study, we determined species-specific variations by analyzing the mitochondrial 12S rRNA gene sequence variation (-440 bp) in 17 newly obtained sequences and 90 published cattle, yak, buffalo, goat, and pig ... In this study, we determined species-specific variations by analyzing the mitochondrial 12S rRNA gene sequence variation (-440 bp) in 17 newly obtained sequences and 90 published cattle, yak, buffalo, goat, and pig sequences, which represent 62 breeds and 17 geo- graphic regions. Based on the defined species-specific variations, two endonucleases, Alu I and Bfa I, were selected for species authentication using raw meat/tissue samples and the PCR-RFLP method. Goat and pig were identified using the Alu I enzyme, while cattle, yak, and buffalo were identified by digestion with Bfa I. Our approach had relatively high detection sensitivity of cattle DNA in mixed cattle and yak products, with the lowest detectable threshold equaling 20% of cattle DNA in a mixed cattle/yak sample. This method was successfully used to type commercial beef jerky products, which were produced by different companies utilizing various processing technologies. Our results show that several yak jerky products might be implicated in commercial fraud by using cattle meat instead of yak meat. 展开更多
关键词 12S rRNA gene PCR-RFLP meat species identification beefjerky commercial fraud
原文传递
打击传销违法犯罪的若干问题探讨 被引量:4
18
作者 陶菁 《云南警官学院学报》 2012年第3期81-86,共6页
传销违法犯罪组织形为营销企业,实为诈财机构,严重影响社会稳定、干扰直销行业健康发展,素有"经济邪教"之称。近年来,各地相继在打击传规犯罪中取得显著成效,但传销活动屡禁不止,有些地区甚至十分严重。必须深入剖析传销的边... 传销违法犯罪组织形为营销企业,实为诈财机构,严重影响社会稳定、干扰直销行业健康发展,素有"经济邪教"之称。近年来,各地相继在打击传规犯罪中取得显著成效,但传销活动屡禁不止,有些地区甚至十分严重。必须深入剖析传销的边界、法律规制,侦查、协作困境等问题,探讨推进执法协作机制、加强直销监管、健全法律法规等完善之道,进一步提升打击传销违法犯罪成效。 展开更多
关键词 PYRAMID Selling FINANCIAL FRAUD SUPERVISION
在线阅读 下载PDF
A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain 被引量:5
19
作者 Hangjun Zhou Guang Sun +4 位作者 Sha Fu Xiaoping Fan Wangdong Jiang Shuting Hu Lingjiao Li 《Computers, Materials & Continua》 SCIE EI 2020年第8期1091-1105,共15页
Supply Chain Finance(SCF)is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain.In recent years,with the deep integration of supply c... Supply Chain Finance(SCF)is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain.In recent years,with the deep integration of supply chain and Internet,Big Data,Artificial Intelligence,Internet of Things,Blockchain,etc.,the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes.However,with the rapid development of new technologies,the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal ones.The lack of enough capability to handle the big data volumes and mitigate the financial frauds may lead to huge losses in supply chains.In this article,a distributed approach of big data mining is proposed for financial fraud detection in a supply chain,which implements the distributed deep learning model of Convolutional Neural Network(CNN)on big data infrastructure of Apache Spark and Hadoop to speed up the processing of the large dataset in parallel and reduce the processing time significantly.By training and testing on the continually updated SCF dataset,the approach can intelligently and automatically classify the massive data samples and discover the fraudulent financing behaviors,so as to enhance the financial fraud detection with high precision and recall rates,and reduce the losses of frauds in a supply chain. 展开更多
关键词 Big data mining deep learning fraud detection supply chain Internet of Things
在线阅读 下载PDF
Similarity measure design for high dimensional data 被引量:3
20
作者 LEE Sang-hyuk YAN Sun +1 位作者 JEONG Yoon-su SHIN Seung-soo 《Journal of Central South University》 SCIE EI CAS 2014年第9期3534-3540,共7页
Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data ... Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667. 展开更多
关键词 high dimensional data similarity measure DIFFERENCE neighborhood information financial fraud
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部