Search results

1 – 10 of over 2000
Article
Publication date: 11 May 2020

Vipin Khattri, Sandeep Kumar Nayak and Deepak Kumar Singh

Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper…

Abstract

Purpose

Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper education and awareness can only thrive when concrete fraud detection techniques are being suggested together with potential mitigation possibilities. The purpose of this research study is tendering in the same direction with a suitable plan of action in developing the authentication strength metric to give weightage marks for authentication techniques.

Design/methodology/approach

In this research study, a qualitative in-depth exploration approach is being adapted for a better description, interpretation, conceptualization for attaining exhaustive insights into specific notions. A concrete method of observation is being adopted to study various time boxed reports on plastic card fraud and its possible impacts. Content and narrative analysis are being followed to interpret more qualitative and less quantitative story about existing fraud detection techniques. Moreover, an authentication strength metric is being developed on the basis of time, cost and human interactions.

Findings

The archived data narrated in various published research articles represent the local and global environment and the need for plastic card money. It gives the breathing sense and capabilities in the marketplace. The authentication strength metric gives a supporting hand for more solidification of the authentication technique with respect to the time, cost and human ease.

Practical implications

The research study is well controlled and sufficient interpretive. The empirical representation of authentication technique and fraud detection technique identification and suggestive mitigation gives this research study an implication view for the imbibing research youths. An application and metric based pathway of this research study provides a smoother way to tackle futuristic issues and challenges.

Originality/value

This research study represents comprehensive knowledge about the causes of the notion of plastic card fraud. The authentication strength metric represents the novelty of a research study which produced on the basis of rigorous documentary and classified research analysis. The creativity of the research study is rendering the profound and thoughtful reflection of the novel dimension in the same domain.

Article
Publication date: 2 July 2018

Vipin Khattri and Deepak Kumar Singh

This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online…

1074

Abstract

Purpose

This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction.

Design/methodology/approach

This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction.

Findings

There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud.

Research limitations/implications

This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system.

Practical implications

This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system.

Originality/value

This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.

Details

Journal of Financial Crime, vol. 25 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 6 June 2016

Sawsan Saadi Halbouni, Nada Obeid and Abeer Garbou

This paper aims to investigate the role of corporate governance and information technology in fraud prevention and detection within the United Arab Emirates (UAE).

6877

Abstract

Purpose

This paper aims to investigate the role of corporate governance and information technology in fraud prevention and detection within the United Arab Emirates (UAE).

Design/methodology/approach

This study uses a survey of financial accountants and internal and external auditors to assess their perceptions of the effectiveness of IT and corporate governance as measured in terms of the audit committee’s effectiveness, internal audit functions, external audit functions, culture of honesty and employee training programmes in preventing and detecting fraud in the UAE.

Findings

The results indicate that corporate governance has a moderate role in preventing and detecting fraud in the UAE and that IT has the same role as traditional fraud prevention and detection techniques. The results also show no significant difference between internal and external auditors in their use of technological and traditional techniques during the course of audits.

Research limitations/implications

The findings suggest that the senior management and boards of directors must better understand the importance of their oversight function. The finding that a culture of honesty has a low positive impact on fraud prevention and detection in the UAE indicates that chief executive officers and boards of directors must make more efforts to set the “tone at the top” to improve the corporate environment in terms of integrity and ethics, among other factors. Furthermore, as IT and traditional techniques provide the same function, senior management and boards of directors must be alerted to the importance of developing systematic approaches to fraud investigation that involve greater reliance on technological approaches.

Practical implications

The moderate role of corporate governance suggests that senior management and boards of directors must better understand the importance of their oversight function to meet their obligations and fiduciary responsibilities to stakeholders. Furthermore, greater adoption of IT to detect and prevent fraud contributes to developing a systematic approach to fraud investigation, capable of identifying unusual activity using effective software.

Originality/value

This study contributes to the literature on the role of corporate governance and IT in preventing and detecting fraud, particularly for Middle Eastern countries and other emerging nations. The study may provide insights to academics and practitioners in the UAE and their international counterparts.

Details

Managerial Auditing Journal, vol. 31 no. 6/7
Type: Research Article
ISSN: 0268-6902

Keywords

Book part
Publication date: 18 July 2022

Yakub Kayode Saheed, Usman Ahmad Baba and Mustafa Ayobami Raji

Purpose: This chapter aims to examine machine learning (ML) models for predicting credit card fraud (CCF).Need for the study: With the advance of technology, the world is…

Abstract

Purpose: This chapter aims to examine machine learning (ML) models for predicting credit card fraud (CCF).

Need for the study: With the advance of technology, the world is increasingly relying on credit cards rather than cash in daily life. This creates a slew of new opportunities for fraudulent individuals to abuse these cards. As of December 2020, global card losses reached $28.65billion, up 2.9% from $27.85 billion in 2018, according to the Nilson 2019 research. To safeguard the safety of credit card users, the credit card issuer should include a service that protects customers from potential risks. CCF has become a severe threat as internet buying has grown. To this goal, various studies in the field of automatic and real-time fraud detection are required. Due to their advantageous properties, the most recent ones employ a variety of ML algorithms and techniques to construct a well-fitting model to detect fraudulent transactions. When it comes to recognising credit card risk is huge and high-dimensional data, feature selection (FS) is critical for improving classification accuracy and fraud detection.

Methodology/design/approach: The objectives of this chapter are to construct a new model for credit card fraud detection (CCFD) based on principal component analysis (PCA) for FS and using supervised ML techniques such as K-nearest neighbour (KNN), ridge classifier, gradient boosting, quadratic discriminant analysis, AdaBoost, and random forest for classification of fraudulent and legitimate transactions. When compared to earlier experiments, the suggested approach demonstrates a high capacity for detecting fraudulent transactions. To be more precise, our model’s resilience is constructed by integrating the power of PCA for determining the most useful predictive features. The experimental analysis was performed on German credit card and Taiwan credit card data sets.

Findings: The experimental findings revealed that the KNN achieved an accuracy of 96.29%, recall of 100%, and precision of 96.29%, which is the best performing model on the German data set. While the ridge classifier was the best performing model on Taiwan Credit data with an accuracy of 81.75%, recall of 34.89, and precision of 66.61%.

Practical implications: The poor performance of the models on the Taiwan data revealed that it is an imbalanced credit card data set. The comparison of our proposed models with state-of-the-art credit card ML models showed that our results were competitive.

Article
Publication date: 7 June 2022

Baljinder Kaur, Kiran Sood and Simon Grima

This paper aims to determine how forensic accounting contributes to fraud detection and prevention and answer the following research questions: What are the standard techniques…

3154

Abstract

Purpose

This paper aims to determine how forensic accounting contributes to fraud detection and prevention and answer the following research questions: What are the standard techniques for fraud detection and prevention; and What are the significant challenges that hinder the application of forensic accounting in fraud prevention and detection?

Design/methodology/approach

The authors use the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) method to carry out a systematic literature review (SLR) to identify and assess the existing literature on forensic accounting.

Findings

There exists a positive correlation between forensic accounting and fraud detection and prevention. Moreover, in both the empirical and non-empirical findings, the authors note that fraud is complex, and in carrying out fraud investigations, one must be aware of its complexity.

Practical implications

Although drug counterfeiting is a sector where forensic accountants have paid less attention, it is a rapidly expanding fraud area. This paper finds that to detect fraud at an early stage, one must increase consumer understanding of basic forensic accounting techniques by implementing accurate supply chain monitoring systems and inventory management controls and conducting adequate and effective regulatory, honest and legitimate customs inspections.

Social implications

The major factors that restrict forensic accounting are a lack of awareness and education. Hence, it is essential to incorporate forensic accounting in undergraduate and post-graduate courses.

Originality/value

From the existing literature, it has been observed that very few studies have been conducted in this field using the PRISMA and SLR techniques. Also, the authors carried out a holistic study that focuses on three different areas – fraud detection, fraud prevention and the challenges in forensic accounting.

Details

Journal of Financial Regulation and Compliance, vol. 31 no. 1
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 29 August 2023

Syed Waleed Ul Hassan, Samra Kiran, Samina Gul, Ibrahim N. Khatatbeh and Bibi Zainab

This paper aims to investigate the perceptions of financial accountants and both internal and external auditors regarding the impact of corporate governance (CG) and information…

Abstract

Purpose

This paper aims to investigate the perceptions of financial accountants and both internal and external auditors regarding the impact of corporate governance (CG) and information technology (IT) on the detection and prevention of fraud within organizations.

Design/methodology/approach

Primary data were collected from 250 financial accountants, internal auditors and external auditors through questionnaires. The non-probability snowball sampling technique was used for data collection, with the sample t-test, one-way ANOVA and paired sample t-test applied for analysis.

Findings

The results indicate that robust CG practices and IT techniques significantly aid in detecting and reducing fraudulent activities by minimizing opportunities, rationalizations, pressures and capabilities of potential employees to commit fraud. Internal controls also play a significant role in reducing instances of fraud. Notably, ethical officers and ethical training were not perceived as significantly effective in preventing and detecting fraud, leading to a perception that fraudulent practices are prevalent and increasing the risk of future fraudulent activities.

Research limitations/implications

This study recommends the adoption of strong CG practices to identify potential fraud within an organization. Moreover, IT techniques should be tailored to specific needs for effective utilization. Furthermore, the government should increase awareness regarding data provision by departments, organizations and other related personnel. Future research could use secondary data from various regions to expand the literature in this field.

Originality/value

This research uniquely combines three significant factors: CG, IT and forensic accounting in fraud detection and prevention. It contributes to the enhancement of literature about fraud and its preventive and detective measures. The results of this study set the seed for future research, government policymaking and enhanced organizational practices.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 31 August 2021

Ezekiel Oluwagbemiga Oyerogba

This study investigates the perception of professionals in the field of accounting, and those associated with forensic auditing, about the knowledge and skills, experience and…

1701

Abstract

Purpose

This study investigates the perception of professionals in the field of accounting, and those associated with forensic auditing, about the knowledge and skills, experience and technique that a forensic auditor should possess to provide high-quality services in fraud detection. The study also shows the impact of forensic auditing tools on fraud detection.

Design/methodology/approach

With the use of a self-administered questionnaire, the study adopts a survey design in which 298 respondents participated. Data were subjected to descriptive statistics (ranking, mean and standard deviation), inferential statistics (binary logistic regression and ordinary least square regression).

Findings

The findings indicate that adequate knowledge of economic damage calculation and financial statement valuation is essential for forensic auditors' service. The results also reveal that forensic auditor skills and techniques is a significant predictor for fraud detection in the Nigerian public sector.

Practical implications

The paper draws attention of the federal government parastatals to the need to improve their internal control system to reduce the fraudulent practices in their parastatal. The study also draws the attention of the Nigeria University Commission and the Institute of Chartered Accountants of Nigeria on the needs for revision of the accounting curricular for the training of accounting graduates and professional accountants in Nigeria.

Social implications

The paper is of importance to other developing nation as it provides empirical evidence on the needs to do periodic forensic audits of government corporations.

Originality/value

With the persistent increase in the number of fraudulent cases, current views of those associated with forensic auditing (judiciaries, parastatals, forensic auditors and academics) on mechanisms for timely detection of fraud are needed.

Details

Journal of Accounting in Emerging Economies, vol. 11 no. 5
Type: Research Article
ISSN: 2042-1168

Keywords

Book part
Publication date: 29 January 2024

Shafeeq Ahmed Ali, Mohammad H. Allaymoun, Ahmad Yahia Mustafa Al Astal and Rehab Saleh

This chapter focuses on a case study of Kareem Exchange Company and its use of big data analysis to detect and prevent fraud and suspicious financial transactions. The chapter…

Abstract

This chapter focuses on a case study of Kareem Exchange Company and its use of big data analysis to detect and prevent fraud and suspicious financial transactions. The chapter describes the various phases of the big data analysis cycle, including discovery, data preparation, model planning, model building, operationalization, and communicating results, and how the Kareem Exchange Company team implemented each phase. This chapter emphasizes the importance of identifying the business problem, understanding the resources and stakeholders involved, and developing an initial hypothesis to guide the analysis. The case study results demonstrate the potential of big data analysis to improve fraud detection capabilities in financial institutions, leading to informed decision making and action.

Details

Digital Technology and Changing Roles in Managerial and Financial Accounting: Theoretical Knowledge and Practical Application
Type: Book
ISBN: 978-1-80455-973-4

Keywords

Article
Publication date: 27 July 2021

Anahita Farhang Ghahfarokhi, Taha Mansouri, Mohammad Reza Sadeghi Moghaddam, Nila Bahrambeik, Ramin Yavari and Mohammadreza Fani Sani

The best algorithm that was implemented on this Brazilian dataset was artificial immune system (AIS) algorithm. But the time and cost of this algorithm are high. Using asexual…

Abstract

Purpose

The best algorithm that was implemented on this Brazilian dataset was artificial immune system (AIS) algorithm. But the time and cost of this algorithm are high. Using asexual reproduction optimization (ARO) algorithm, the authors achieved better results in less time. So the authors achieved less cost in a shorter time. Their framework addressed the problems such as high costs and training time in credit card fraud detection. This simple and effective approach has achieved better results than the best techniques implemented on our dataset so far. The purpose of this paper is to detect credit card fraud using ARO.

Design/methodology/approach

In this paper, the authors used ARO algorithm to classify the bank transactions into fraud and legitimate. ARO is taken from asexual reproduction. Asexual reproduction refers to a kind of production in which one parent produces offspring identical to herself. In ARO algorithm, an individual is shown by a vector of variables. Each variable is considered as a chromosome. A binary string represents a chromosome consisted of genes. It is supposed that every generated answer exists in the environment, and because of limited resources, only the best solution can remain alive. The algorithm starts with a random individual in the answer scope. This parent reproduces the offspring named bud. Either the parent or the offspring can survive. In this competition, the one which outperforms in fitness function remains alive. If the offspring has suitable performance, it will be the next parent, and the current parent becomes obsolete. Otherwise, the offspring perishes, and the present parent survives. The algorithm recurs until the stop condition occurs.

Findings

Results showed that ARO had increased the AUC (i.e. area under a receiver operating characteristic (ROC) curve), sensitivity, precision, specificity and accuracy by 13%, 25%, 56%, 3% and 3%, in comparison with AIS, respectively. The authors achieved a high precision value indicating that if ARO detects a record as a fraud, with a high probability, it is a fraud one. Supporting a real-time fraud detection system is another vital issue. ARO outperforms AIS not only in the mentioned criteria, but also decreases the training time by 75% in comparison with the AIS, which is a significant figure.

Originality/value

In this paper, the authors implemented the ARO in credit card fraud detection. The authors compared the results with those of the AIS, which was one of the best methods ever implemented on the benchmark dataset. The chief focus of the fraud detection studies is finding the algorithms that can detect legal transactions from the fraudulent ones with high detection accuracy in the shortest time and at a low cost. That ARO meets all these demands.

Article
Publication date: 8 April 2022

Botond Benedek, Cristina Ciumas and Bálint Zsolt Nagy

The purpose of this paper is to survey the automobile insurance fraud detection literature in the past 31 years (1990–2021) and present a research agenda that addresses the…

1322

Abstract

Purpose

The purpose of this paper is to survey the automobile insurance fraud detection literature in the past 31 years (1990–2021) and present a research agenda that addresses the challenges and opportunities artificial intelligence and machine learning bring to car insurance fraud detection.

Design/methodology/approach

Content analysis methodology is used to analyze 46 peer-reviewed academic papers from 31 journals plus eight conference proceedings to identify their research themes and detect trends and changes in the automobile insurance fraud detection literature according to content characteristics.

Findings

This study found that automobile insurance fraud detection is going through a transformation, where traditional statistics-based detection methods are replaced by data mining- and artificial intelligence-based approaches. In this study, it was also noticed that cost-sensitive and hybrid approaches are the up-and-coming avenues for further research.

Practical implications

This paper’s findings not only highlight the rise and benefits of data mining- and artificial intelligence-based automobile insurance fraud detection but also highlight the deficiencies observable in this field such as the lack of cost-sensitive approaches or the absence of reliable data sets.

Originality/value

This paper offers greater insight into how artificial intelligence and data mining challenges traditional automobile insurance fraud detection models and addresses the need to develop new cost-sensitive fraud detection methods that identify new real-world data sets.

Details

Journal of Financial Regulation and Compliance, vol. 30 no. 4
Type: Research Article
ISSN: 1358-1988

Keywords

1 – 10 of over 2000