Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach 1

This study examines the application of cluster analysis in the accounting domain, particularly discrepancy detection in audit. Cluster analysis groups data so that points within a single group or cluster are similar to one another and distinct from points in other clusters. Clustering has been shown to be a good candidate for anomaly detection. The purpose of this study is to examine the use of clustering technology to automate fraud filtering during an audit. We use cluster analysis to help auditors focus their efforts when evaluating group life insurance claims. Claims with similar characteristics have been grouped together and small-population clusters have been flagged for further investigation. Some dominant characteristics of those clusters which have been flagged are large beneficiary payment, large interest payment amounts, and long lag between submission and payment.

[1]  Alexander Hinneburg Visualizing Clustering Results , 2009, Encyclopedia of Database Systems.

[2]  P. Brockett,et al.  Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .

[3]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[4]  M. Vasarhelyi THE CONTINUOUS AUDIT OF ONLINE SYSTEMS , 1991 .

[5]  Ashutosh Deshmukh,et al.  A rule-based fuzzy reasoning system for assessing the risk of management fraud , 1998, Intell. Syst. Account. Finance Manag..

[6]  R. Layton,et al.  Dimensions of Consumer Information Seeking Behavior , 1981 .

[7]  Aidong Zhang,et al.  FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.

[8]  Aidong Zhang,et al.  WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases , 1998, VLDB.

[9]  James V. Rauff Data Mining: A Tutorial-Based Primer , 2005 .

[10]  Sudipto Guha,et al.  ROCK: A Robust Clustering Algorithm for Categorical Attributes , 2000, Inf. Syst..

[11]  M. V. Velzen,et al.  Self-organizing maps , 2007 .

[12]  W. Anderson,et al.  Bank Selection Decisions and Market Segmentation , 1976 .

[13]  Daling Wang,et al.  CD-Trees: An Efficient Index Structure for Outlier Detection , 2004, WAIM.

[14]  Joseph V. Carcello,et al.  A Decision Aid for Assessing the Likelihood of Fraudulent Financial Reporting , 2000 .

[15]  Mark I. Hwang,et al.  A fuzzy neural network for assessing the risk of fraudulent financial reporting , 2003 .

[16]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[17]  Charles M. Schaninger,et al.  The Complementary use of Multivariate Procedures to Investigate Nonlinear and Interactive Relationships between Personality and Product Usage , 1980 .

[18]  Kenneth O. Cogger,et al.  Neural network detection of management fraud using published financial data , 1998, Intell. Syst. Account. Finance Manag..

[19]  Miklos A. Vasarhelyi,et al.  A Thought Leadership Paper for the Institute of Chartered Accountants in Australia , 2010 .

[20]  M. Venkatesan,et al.  Concept Evaluation & Market Segmentation , 1978 .

[21]  Rajendra P. Srivastava,et al.  Detection of Management Fraud: A Neural Network Approach , 1995 .

[22]  Roger J. Calantone,et al.  The Stability of Benefit Segments , 1978 .

[23]  Vipin Kumar,et al.  Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.

[24]  Vipin Kumar,et al.  Finding Topics in Collections of Documents: A Shared Nearest Neighbor Approach , 2003, Clustering and Information Retrieval.

[25]  Ashutosh Deshmukh,et al.  A rule based fuzzy reasoning system for assessing the risk of management fraud , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[26]  Miklos A. Vasarhelyi,et al.  Continuous Assurance for the Now Economy , 2010 .

[27]  Jay C. Thibodeau,et al.  Applying Digital Analysis Using Benford's Law to Detect Fraud: The Dangers of Type I Errors , 2005 .

[28]  M.M. Deris,et al.  A Comparative Study for Outlier Detection Techniques in Data Mining , 2006, 2006 IEEE Conference on Cybernetics and Intelligent Systems.

[29]  Sam Kash Kachigan Multivariate statistical analysis: A conceptual introduction , 1982 .

[30]  Sudipto Guha,et al.  ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).

[31]  Alexander S. Szalay,et al.  Very Fast Outlier Detection in Large Multidimensional Data Sets , 2002, DMKD.

[32]  Giuseppe Lieto,et al.  Cluster Analysis for Anomaly Detection , 2008, CISIS.

[33]  B. Green,et al.  Assessing the risk of management fraud through neural network technology , 1997 .

[34]  Zengyou He,et al.  Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..

[35]  Douglas M. Hawkins Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.

[36]  Khaled Labib,et al.  NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .

[37]  D. Sexton,et al.  A Cluster Analytic Approach to Market Response Functions , 1974 .

[38]  Girish N. Punj,et al.  Cluster Analysis in Marketing Research: Review and Suggestions for Application , 1983 .

[39]  Shawn Ostermann,et al.  Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.

[40]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[41]  Mei-Chih Chen,et al.  An Empirical Study for the Detection of Corporate Financial Anomaly Using Outlier Mining Techniques , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[42]  Ying Liu,et al.  Cluster-based outlier detection , 2009, Ann. Oper. Res..

[43]  Rajendra P. Srivastava,et al.  Detection of management fraud: a neural network approach , 1995, Proceedings the 11th Conference on Artificial Intelligence for Applications.

[44]  Ian Davidson,et al.  Visualizing Clustering Results , 2002, SDM.