A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits

This paper explores the application of data mining techniques to fraud detection in the audit of financial statements and proposes a taxonomy to support and guide future research. Currently, the application of data mining to auditing is at an early stage of development and researchers take a scatter-shot approach, investigating patterns in financial statement disclosures, text in annual reports and MD&As, and the nature of journal entries without appropriate guidance being drawn from lessons in known fraud patterns. To develop structure to research in data mining, we create a taxonomy that combines research on patterns of observed fraud schemes with an appreciation of areas that benefit from productive application of data mining. We encapsulate traditional views of data mining that operates primarily on quantitative data, such as financial statement and journal entry data. In addition, we draw on other forms of data mining, notably text and email mining.

[1]  Johan L. Perols Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms , 2011 .

[2]  Bart Baesens,et al.  Comprehensive rule-based compliance checking and risk management with process mining , 2013, Decis. Support Syst..

[3]  Miklos A. Vasarhelyi,et al.  The case for process mining in auditing: Sources of value added and areas of application , 2013, Int. J. Account. Inf. Syst..

[4]  Michael W. Berry,et al.  Text mining : applications and theory , 2010 .

[5]  Judea Pearl,et al.  Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[6]  Roger S. Debreceny,et al.  Data mining journal entries for fraud detection: An exploratory study , 2010, Int. J. Account. Inf. Syst..

[7]  Akhil Kumar,et al.  Conceptual model for online auditing , 2011, Decis. Support Syst..

[8]  Andreas Christmann,et al.  Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.

[9]  Allen C. Johnston,et al.  Social network analysis in accounting information systems research , 2013, Int. J. Account. Inf. Syst..

[10]  Surya B. Yadav,et al.  A computational model for financial reporting fraud detection , 2011, Decis. Support Syst..

[11]  Pavel Berkhin,et al.  A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.

[12]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[13]  David Coderre Computer Aided Fraud Prevention and Detection: A Step by Step Guide , 2009 .

[14]  Alessandro Colantonio,et al.  A new role mining framework to elicit business roles and to mitigate enterprise risk , 2011, Decis. Support Syst..

[15]  Philip I. Elsas,et al.  Response to discussions on "X-raying segregation of duties: Support to illuminate an enterprise's immunity to solo-fraud" , 2008, Int. J. Account. Inf. Syst..

[16]  Argyris Argyrou,et al.  Auditing Journal Entries Using Self-Organizing Map , 2012, AMCIS.

[17]  Catherine Blake,et al.  Text mining , 2011, Annu. Rev. Inf. Sci. Technol..

[18]  Kate A. Smith Neural Networks for Prediction and Classification , 2005 .

[19]  Li Zhang,et al.  The AICPA Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards (ADS) Initiative , 2012, J. Inf. Syst..

[20]  Mehran Sahami,et al.  Text Mining: Classification, Clustering, and Applications , 2009 .

[21]  Kevin C. Moffitt,et al.  Identification of fraudulent financial statements using linguistic credibility analysis , 2011, Decis. Support Syst..

[22]  Surajit Chaudhuri,et al.  An overview of data warehousing and OLAP technology , 1997, SGMD.

[23]  John Scott What is social network analysis , 2010 .

[24]  Claudio Conversano,et al.  Decision Tree Induction , 2009, Encyclopedia of Data Warehousing and Mining.

[25]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[26]  Steven A. Mccornack Information manipulation theory , 1992 .

[27]  Miklos A. Vasarhelyi,et al.  Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens , 2006, Int. J. Account. Inf. Syst..

[28]  Kurt Fanning,et al.  Neural Network Detection of Management Fraud Using Published Financial Data , 1998 .

[29]  Koen Vanhoof,et al.  Internal Fraud Risk Reduction - Results of a Data Mining Case Study , 2010, ICEIS.

[30]  Earl Cox,et al.  Fuzzy Modeling And Genetic Algorithms For Data Mining And Exploration , 2005 .

[31]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[32]  Tong Zhang,et al.  Fundamentals of Predictive Text Mining , 2010, Texts in Computer Science.

[33]  Taek Mu Kwon,et al.  The Efficacy of Red Flags in Predicting the SEC's Targets: An Artificial Neural Networks Approach , 2000 .

[34]  Dursun Delen,et al.  A holistic framework for knowledge discovery and management , 2009, CACM.

[35]  Brenton Lessley,et al.  Detection of Financial Statement Fraud Using Evolutionary Algorithms , 2012 .

[36]  Guoqiang Peter Zhang,et al.  Neural networks for classification: a survey , 2000, IEEE Trans. Syst. Man Cybern. Part C.

[37]  Roger S. Debreceny,et al.  Data Mining of Electronic Mail and Auditing: A Research Agenda , 2011, J. Inf. Syst..

[38]  Wil M. P. van der Aalst,et al.  Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .

[39]  Vadlamani Ravi,et al.  Detection of financial statement fraud and feature selection using data mining techniques , 2011, Decis. Support Syst..

[40]  B. Green,et al.  Assessing the risk of management fraud through neural network technology , 1997 .

[41]  Siddhartha Bhattacharyya,et al.  Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..