A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits
暂无分享,去创建一个
[1] Johan L. Perols. Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms , 2011 .
[2] Bart Baesens,et al. Comprehensive rule-based compliance checking and risk management with process mining , 2013, Decis. Support Syst..
[3] Miklos A. Vasarhelyi,et al. The case for process mining in auditing: Sources of value added and areas of application , 2013, Int. J. Account. Inf. Syst..
[4] Michael W. Berry,et al. Text mining : applications and theory , 2010 .
[5] Judea Pearl,et al. Bayesian Networks , 1998, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[6] Roger S. Debreceny,et al. Data mining journal entries for fraud detection: An exploratory study , 2010, Int. J. Account. Inf. Syst..
[7] Akhil Kumar,et al. Conceptual model for online auditing , 2011, Decis. Support Syst..
[8] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[9] Allen C. Johnston,et al. Social network analysis in accounting information systems research , 2013, Int. J. Account. Inf. Syst..
[10] Surya B. Yadav,et al. A computational model for financial reporting fraud detection , 2011, Decis. Support Syst..
[11] Pavel Berkhin,et al. A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.
[12] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[13] David Coderre. Computer Aided Fraud Prevention and Detection: A Step by Step Guide , 2009 .
[14] Alessandro Colantonio,et al. A new role mining framework to elicit business roles and to mitigate enterprise risk , 2011, Decis. Support Syst..
[15] Philip I. Elsas,et al. Response to discussions on "X-raying segregation of duties: Support to illuminate an enterprise's immunity to solo-fraud" , 2008, Int. J. Account. Inf. Syst..
[16] Argyris Argyrou,et al. Auditing Journal Entries Using Self-Organizing Map , 2012, AMCIS.
[17] Catherine Blake,et al. Text mining , 2011, Annu. Rev. Inf. Sci. Technol..
[18] Kate A. Smith. Neural Networks for Prediction and Classification , 2005 .
[19] Li Zhang,et al. The AICPA Assurance Services Executive Committee Emerging Assurance Technologies Task Force: The Audit Data Standards (ADS) Initiative , 2012, J. Inf. Syst..
[20] Mehran Sahami,et al. Text Mining: Classification, Clustering, and Applications , 2009 .
[21] Kevin C. Moffitt,et al. Identification of fraudulent financial statements using linguistic credibility analysis , 2011, Decis. Support Syst..
[22] Surajit Chaudhuri,et al. An overview of data warehousing and OLAP technology , 1997, SGMD.
[23] John Scott. What is social network analysis , 2010 .
[24] Claudio Conversano,et al. Decision Tree Induction , 2009, Encyclopedia of Data Warehousing and Mining.
[25] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[26] Steven A. Mccornack. Information manipulation theory , 1992 .
[27] Miklos A. Vasarhelyi,et al. Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens , 2006, Int. J. Account. Inf. Syst..
[28] Kurt Fanning,et al. Neural Network Detection of Management Fraud Using Published Financial Data , 1998 .
[29] Koen Vanhoof,et al. Internal Fraud Risk Reduction - Results of a Data Mining Case Study , 2010, ICEIS.
[30] Earl Cox,et al. Fuzzy Modeling And Genetic Algorithms For Data Mining And Exploration , 2005 .
[31] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[32] Tong Zhang,et al. Fundamentals of Predictive Text Mining , 2010, Texts in Computer Science.
[33] Taek Mu Kwon,et al. The Efficacy of Red Flags in Predicting the SEC's Targets: An Artificial Neural Networks Approach , 2000 .
[34] Dursun Delen,et al. A holistic framework for knowledge discovery and management , 2009, CACM.
[35] Brenton Lessley,et al. Detection of Financial Statement Fraud Using Evolutionary Algorithms , 2012 .
[36] Guoqiang Peter Zhang,et al. Neural networks for classification: a survey , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[37] Roger S. Debreceny,et al. Data Mining of Electronic Mail and Auditing: A Research Agenda , 2011, J. Inf. Syst..
[38] Wil M. P. van der Aalst,et al. Process Mining - Discovery, Conformance and Enhancement of Business Processes , 2011 .
[39] Vadlamani Ravi,et al. Detection of financial statement fraud and feature selection using data mining techniques , 2011, Decis. Support Syst..
[40] B. Green,et al. Assessing the risk of management fraud through neural network technology , 1997 .
[41] Siddhartha Bhattacharyya,et al. Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..