Search results

1 – 10 of over 4000
Article
Publication date: 9 March 2020

Wanting Lu and Xiaokang Zhao

The purpose of this paper is to start with the background of the construction of the M-score model, find the variables that can represent the fraud characteristics of Chinese…

Abstract

Purpose

The purpose of this paper is to start with the background of the construction of the M-score model, find the variables that can represent the fraud characteristics of Chinese companies, and use the data of Chinese A-share listed companies to modify the M-score model.

Design/methodology/approach

In this paper, the fraud behavior of Chinese enterprises that M-score cannot detect is summarized as the basis of adding variables. Then, based on the data of Chinese listed companies, a modified M-score model including nine variables is constructed by the logistic regression method based on Wald.

Findings

Based on the original 8 variables of M-score, this paper adds 10 new variables that can represent the fraud characteristics of Chinese listed companies, and finally, constructs a modified M-score model with 9 variables. Results indicated that indexes such as gross profit margin, fixed assets depreciation rate, equity concentration and audit opinion can characterize the financial fraud of Chinese listed companies.

Practical implications

The modified M-score model based on the characteristics of Chinese enterprises’ fraud is more suitable for Chinese market, which can help investors avoid fraud risks, protect their own rights and interests and reduce losses.

Originality/value

Starting from the background of the model, this paper looks for variables that can characterize the characteristics of fraud in Chinese listed companies. Then, subdivides the research samples into specific fiscal years in which fraud occurs, so that the modified M-score model can be more suitable for the Chinese market.

Details

Journal of Financial Crime, vol. 28 no. 2
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 8 February 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking…

Abstract

Purpose

This paper aims to focus on the different types of insider-led cyber frauds that gained mainstream attention in recent large-scale fraud events involving prominent Indian banking institutions. In addition to identifying and classifying cyber fraud, the study maps them on a severity scale for optimal mitigation planning.

Design/methodology/approach

The methodology used for identification and classification is an analysis of a detailed literature review, a focus group discussion with risk and vigilance officers and cyber cell experts, as well as secondary data of cyber fraud losses. Through machine learning-based random forest, the authors predicted the future of insider-led cyber frauds in the Indian banking business and prioritized and predicted the same. The projected future reveals the dominance of a few specific cyber frauds, which will make it easier to develop a fraud mitigation model based on a victim-centric approach.

Findings

The paper concludes with a conceptual framework that can be used to ensure a sustainable cyber fraud mitigation ecosystem within the scope of the study. By using the findings of this research, policymakers and fraud investigators will be able to create a more robust environment for banks through timely detection of cyber fraud and prevent it appropriately before it happens.

Research limitations/implications

The study focuses on fraud, risk and mitigation from a victim-centric perspective and does not address it from the fraudster’s perspective. Data availability was a challenge. Banks are recommended to compile data that can be used for analysis both by themselves and other policymakers.

Practical implications

The structured, sustainable cyber fraud mitigation suggested in the study will provide an agile, quick, proactive, stakeholder-specific plan that helps to safeguard banks, employees, regulatory authorities, customers and the economy. It saves resources, cost and time for bank authorities and policymakers. The mitigation measures will also help improve the reputational status of the Indian banking business and prolong the banks’ sustenance.

Originality/value

The innovative cyber fraud mitigation approach contributes to the sustainability of a bank’s ecosystem quickly, proactively and effectively.

Article
Publication date: 12 August 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…

1043

Abstract

Purpose

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.

Design/methodology/approach

The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.

Findings

Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.

Research limitations/implications

Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).

Practical implications

Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.

Originality/value

The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.

Details

Aslib Journal of Information Management, vol. 75 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 7 July 2020

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fikadu Zerihun

The purpose of this study is to develop an innovative approach of combating economic crime using the forensic accounting techniques.

3083

Abstract

Purpose

The purpose of this study is to develop an innovative approach of combating economic crime using the forensic accounting techniques.

Design/methodology/approach

The approach considered the identification of the effective forensic accounting techniques from the available literature and also explored the anti-economic crime policy, capable of assisting in the combating of economic crime. This brought about the development of two conceptual models, which incorporate all the requirements for the implementation of forensic accounting and the integration of forensic accounting technique into the organizational control system for effective fraud mitigation.

Findings

The analysis of the literature review indicated that one of the drawbacks, which has continue to mitigate the implementation of forensic accounting as a tool for combating fraud is lack of a suitable framework. This was the major focal point of this work, which produced two simplified conceptual models suitable for effective fraud mitigation.

Research limitations/implications

This study is limited to the development of conceptual models for fraud mitigation only.

Practical implications

The simplified model can easily be adopted into the structure of an organization to provide a sustainable solution to mitigate fraud occurrences.

Originality/value

The novelty of this study lies in the development of two simplified conceptual models. The first model addressed the incorporation of forensic accounting into the organization structure while the second captured the detailed investigation and comprehensive data analysis processes of uncovering fraud. The development of conceptual models with all these peculiarities for fraud mitigation has not been widely reported by the existing literature.

Details

Journal of Financial Crime, vol. 27 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 October 2007

A.C. Venter

The high occurrence of procurement fraud requires the management of an enterprise, the risk manager of the enterprise and the internal auditor to address procurement fraud risks…

2331

Abstract

The high occurrence of procurement fraud requires the management of an enterprise, the risk manager of the enterprise and the internal auditor to address procurement fraud risks effectively within the enterprise risk management concept. The purpose of the article is to explain a procurement fraud risk management process which will serve as a comprehensive framework for enterprise risk managers and for internal auditors to limit the enterprise’s exposure to procurement fraud as far as possible. The study by Venter (2005) on which the article is based proposes a procurement fraud risk matrix which can be used to manage fraud risks within the procurement function efficiently. This matrix is based on the Committee of Supporting Organizations of the Treadway Commission’s (COSO’s) Enterprise Risk Management ‐Integrated Framework which is specifically applied to address the procurement fraud risk problem.

Details

Meditari Accountancy Research, vol. 15 no. 2
Type: Research Article
ISSN: 1022-2529

Keywords

Article
Publication date: 30 October 2018

Jiali Tang and Khondkar E. Karim

This paper aims to discuss the application of Big Data analytics to the brainstorming session in the current auditing standards.

6902

Abstract

Purpose

This paper aims to discuss the application of Big Data analytics to the brainstorming session in the current auditing standards.

Design/methodology/approach

The authors review the literature related to fraud, brainstorming sessions and Big Data, and propose a model that auditors can follow during the brainstorming sessions by applying Big Data analytics at different steps.

Findings

The existing audit practice aimed at identifying the fraud risk factors needs enhancement, due to the inefficient use of unstructured data. The brainstorming session provides a useful setting for such concern as it draws on collective wisdom and encourages idea generation. The integration of Big Data analytics into brainstorming can broaden the information size, strengthen the results from analytical procedures and facilitate auditors’ communication. In the model proposed, an audit team can use Big Data tools at every step of the brainstorming process, including initial data collection, data integration, fraud indicator identification, group meetings, conclusions and documentation.

Originality/value

The proposed model can both address the current issues contained in brainstorming (e.g. low-quality discussions and production blocking) and improve the overall effectiveness of fraud detection.

Details

Managerial Auditing Journal, vol. 34 no. 3
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 11 May 2020

Vipin Khattri, Sandeep Kumar Nayak and Deepak Kumar Singh

Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper…

Abstract

Purpose

Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper education and awareness can only thrive when concrete fraud detection techniques are being suggested together with potential mitigation possibilities. The purpose of this research study is tendering in the same direction with a suitable plan of action in developing the authentication strength metric to give weightage marks for authentication techniques.

Design/methodology/approach

In this research study, a qualitative in-depth exploration approach is being adapted for a better description, interpretation, conceptualization for attaining exhaustive insights into specific notions. A concrete method of observation is being adopted to study various time boxed reports on plastic card fraud and its possible impacts. Content and narrative analysis are being followed to interpret more qualitative and less quantitative story about existing fraud detection techniques. Moreover, an authentication strength metric is being developed on the basis of time, cost and human interactions.

Findings

The archived data narrated in various published research articles represent the local and global environment and the need for plastic card money. It gives the breathing sense and capabilities in the marketplace. The authentication strength metric gives a supporting hand for more solidification of the authentication technique with respect to the time, cost and human ease.

Practical implications

The research study is well controlled and sufficient interpretive. The empirical representation of authentication technique and fraud detection technique identification and suggestive mitigation gives this research study an implication view for the imbibing research youths. An application and metric based pathway of this research study provides a smoother way to tackle futuristic issues and challenges.

Originality/value

This research study represents comprehensive knowledge about the causes of the notion of plastic card fraud. The authentication strength metric represents the novelty of a research study which produced on the basis of rigorous documentary and classified research analysis. The creativity of the research study is rendering the profound and thoughtful reflection of the novel dimension in the same domain.

Article
Publication date: 2 July 2018

Vipin Khattri and Deepak Kumar Singh

This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online…

1075

Abstract

Purpose

This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction.

Design/methodology/approach

This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction.

Findings

There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud.

Research limitations/implications

This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system.

Practical implications

This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system.

Originality/value

This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.

Details

Journal of Financial Crime, vol. 25 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Article
Publication date: 22 December 2022

Oluwatoyin Esther Akinbowale, Heinz Eckart Klingelhöfer and Mulatu Fekadu Zerihun

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The…

Abstract

Purpose

This study aims to investigate the feasibility of employing a multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation. The formulated objectives are the minimisation of the total allocation cost of the anti-fraud capacities and the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots.

Design/methodology/approach

From the literature survey conducted and primary qualitative data gathered from the 17 licenced banks in South Africa on fraud investigators, the suggested fraud investigators are the organisation’s finance department, the internal audit committee, the external risk manager, accountants and forensic accountants. These five human resource capacities were considered for the formulation of the multi-objectives integer programming (MOIP) model. The MOIP model is employed for the optimisation of the employed capacities for cyberfraud mitigation to ensure the effective allocation and utilisation of human resources. Thus, the MOIP model is validated by a genetic algorithm (GA) solver to obtain the Pareto-optimum solution without the violation of the identified constraints.

Findings

The formulated objective functions are optimised simultaneously. The Pareto front for the two objectives of the MOIP model comprises the set of optimal solutions, which are not dominated by any other feasible solution. These are the feasible choices, which indicate the suitability of the MOIP to achieve the set objectives.

Practical implications

The results obtained indicate the feasibility of simultaneously achieving the minimisation of the total allocation cost of the anti-fraud capacities, or the maximisation of the forensic accounting capacities in all cyberfraud incident prone spots – or the trade-off between them, if they cannot be reached simultaneously. This study recommends the use of an iterative MOIP framework for decision-makers which may aid decision-making with respect to the allocation and utilisation of human resources.

Originality/value

The originality of this work lies in the development of multi-objectives integer-programming model for effective allocation of resources for cyberfraud mitigation.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 February 2018

Adrian Gepp, Martina K. Linnenluecke, Terrence J. O’Neill and Tom Smith

This paper analyses the use of big data techniques in auditing, and finds that the practice is not as widespread as it is in other related fields. We first introduce contemporary…

2923

Abstract

This paper analyses the use of big data techniques in auditing, and finds that the practice is not as widespread as it is in other related fields. We first introduce contemporary big data techniques to promote understanding of their potential application. Next, we review existing research on big data in accounting and finance. In addition to auditing, our analysis shows that existing research extends across three other genealogies: financial distress modelling, financial fraud modelling, and stock market prediction and quantitative modelling. Auditing is lagging behind the other research streams in the use of valuable big data techniques. A possible explanation is that auditors are reluctant to use techniques that are far ahead of those adopted by their clients, but we refute this argument. We call for more research and a greater alignment to practice. We also outline future opportunities for auditing in the context of real-time information and in collaborative platforms and peer-to-peer marketplaces.

Details

Journal of Accounting Literature, vol. 40 no. 1
Type: Research Article
ISSN: 0737-4607

Keywords

1 – 10 of over 4000