CINXE.COM

INFORMATION TECHNOLOGY IN INDUSTRY

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>INFORMATION TECHNOLOGY IN INDUSTRY</title> <link rel="icon" type="image/ico" href="https://it-in-industry.com/index_files/icon.gif"/> <meta name="description" content="IT in Industry is an open access international journal publishing original papers in all areas of IT in industry." /> <meta name="keywords" content="Journal;IT;information technology;computer;health;engineering;mathematics" /> <meta name="generator" content="Open Journal Systems 2.3.7.0" /> <link rel="stylesheet" href="index_files/pkp.css" type="text/css" /> <link rel="stylesheet" href="index_files/common.css" type="text/css" /> <link rel="stylesheet" href="index_files/commons.css" type="text/css" /> <!-- Base Jquery --> <script type="text/javascript" src="https://www.google.com/jsapi"></script> <script type="text/javascript"> // Provide a local fallback if the CDN cannot be reached if (typeof google == 'undefined') { document.write(unescape("%3Cscript src='http://www.it-in-industry.org/lib/pkp/js/lib/jquery/jquery.min.js' type='text/javascript'%3E%3C/script%3E")); document.write(unescape("%3Cscript src='http://www.it-in-industry.org/lib/pkp/js/lib/jquery/plugins/jqueryUi.min.js' type='text/javascript'%3E%3C/script%3E")); } else { google.load("jquery", "1.4.2"); google.load("jqueryui", "1.8.1"); } </script> <link rel="stylesheet" href="index_files/sidebar.css" type="text/css" /> <link rel="stylesheet" href="index_files/leftSidebar.css" type="text/css" /> <link rel="stylesheet" href="index_files/rightSidebar.css" type="text/css" /> <link rel="stylesheet" href="index_files/bothSidebars.css" type="text/css" /> <link rel="stylesheet" href="index_files/journalStyleSheet.css" type="text/css" /> <script type="text/javascript" src="index_files/general.js"></script> <script type="text/javascript" src="index_files/tag-it.js"></script> <!-- Add javascript required for font sizer --> <script type="text/javascript" src="index_files/jquery.cookie.js"></script> <script type="text/javascript" src="index_files/fontController.js" ></script> <script type="text/javascript"> $(function(){ fontSize("#sizer", "body", 9, 16, 32, ""); // Initialize the font sizer }); </script> <script type="text/javascript"> // initialise plugins $(function(){ }); </script> </head> <body> <div id="container"> <div id="header"> <div id="headerTitle"> <h1> <img src="index_files/homeHeaderTitleImage_en_US.jpg" width="1080" height="161" alt="Page Header" /> </h1> </div> </div> <div id="body"> <div id="sidebar"> <div id="leftSidebar"> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/index.html" target="_self"> <img src="index_files/icon_home.jpg" alt="Home" width="154" height="120" /></a></p> </div> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/papers.html" target="_self"> <img src="index_files/icon_call_for_papers.jpg" alt="Call for Papers" width="120" height="120" /></a></p> </div> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/editors.html" target="_self"> <img src="index_files/icon_call_for_editors.jpg" alt="Call for Editors" width="120" height="120" /></a></p> </div> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/reviewers.html" target="_self"> <img src="index_files/icon_call_for_reviewers.jpg" alt="Call for Reviewers" width="120" height="120" /></a></p> </div> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/contact.html" target="_blank"> <img src="index_files/icon_contact_us.jpg" alt="Contact Us" width="120" height="120" /></a></p> </div> </div> <div id="rightSidebar"> <div class="block" id="custom"> <p><a href="http://www.latrobe.edu.au" target="_blank"> <img src="index_files/LTU_Logo.gif" alt="La Trobe University" width="115" height="35" /></a></p> </div> <div class="block" id="sidebarNavigation"> <span class="blockTitle">Journal Content</span> <span class="blockSubtitle">Search</span> <form method="post" action="http://www.it-in-industry.com/advancedResults.html"> <table> <tr> <td><input type="text" id="query" name="query" size="15" maxlength="255" value="" class="textField" /></td> </tr> <tr> <td><select name="searchField" size="1" class="selectMenu"> <option label="All" value="">All</option> <option label="Authors" value="1">Authors</option> <option label="Title" value="2">Title</option> <option label="Abstract" value="4">Abstract</option> <option label="Index terms" value="120">Index terms</option> <option label="Full Text" value="128">Full Text</option> </select></td> </tr> <tr> <td><input type="submit" value="Search" class="button" /></td> </tr> </table> </form> <br /> <span class="blockSubtitle">Browse</span> <ul> <li><a href="http://www.it-in-industry.com/archive.html">By Issue</a></li> <li><a href="http://www.it-in-industry.com/byauthors.html">By Author</a></li> <li><a href="http://www.it-in-industry.com/titles.html">By Title</a></li> </ul> </div> <div class="block" id="sidebarInformation"> <span class="blockTitle">Information</span> <ul> <li><a href="http://www.it-in-industry.com/readers.html">For Readers</a></li> <li><a href="http://www.it-in-industry.com/authors.html">For Authors</a></li> <li><a href="http://www.it-in-industry.com/librarians.html">For Librarians</a></li> </ul> </div> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/submissions.html" target="_self"> <img src="index_files/icon_paper_submission.jpg" alt="Paper Submission" width="120" height="120" /></a></p> </div> <div class="block" id="custom"> <p><a href="http://www.it-in-industry.com/editorialPolicies.html#custom-4" target="_self"> <img src="index_files/icon_special_issues.jpg" alt="Special Issues" width="120" height="120" /></a></p> </div> </div> </div> <div id="main"> <div id="navbar"> <ul class="menu"> <li id="home"><a href="http://www.it-in-industry.com/index.html">Home</a></li> <li id="about"><a href="http://www.it-in-industry.com/about.html">About</a></li> <li id="login"><a href="http://www.it-in-industry.com/login.html">Log In</a></li> <li id="register"><a href="http://www.it-in-industry.com/register.html">Register</a></li> <li id="announcements"><a href="http://www.it-in-industry.com/announcement.html">Announcements</a></li> </ul> </div> <div id="breadcrumb"> <a href="http://www.it-in-industry.com/index.html">Home</a> &gt; <a href="vol5.html" target="_parent">Vol 2 (2014)</a> &gt; <a href="32.html" class="current" target="_parent">Khan</a> </div> <div id="content"> <div id="topBar"> </div> <div id="articleTitle"><h3>Detecting Fraud Using Transaction Frequency Data</h3></div> <div id="authorString"><em>Roheena Khan, Andrew Clark, George Mohay, Suriadi Suriadi</em></div> <br /> <div id="articleAbstract"> <h4>Abstract</h4> <br /> <div>Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. In this paper, we present a fraud detection method which detects irregular frequency of transaction usage in an Enterprise Resource Planning (ERP) system. We discuss the design, development and empirical evaluation of outlier detection and distance measuring techniques to detect frequency-based anomalies within an individual user's profile, relative to other similar users. Primarily, we propose three automated techniques: a univariate method, called Boxplot which is based on the sample's median; and two multivariate methods which use Euclidean distance, for detecting transaction frequency anomalies within each transaction profile. The two multivariate approaches detect potentially fraudulent activities by identifying: (1) users where the Euclidean distance between their transaction-type set is above a certain threshold and (2) users/data points that lie far apart from other users/clusters or represent a small cluster size, using k-means clustering. The proposed methodology allows an auditor to investigate the transaction frequency anomalies and adjust the different parameters, such as the outlier threshold and the Euclidean distance threshold values to tune the number of alerts. The novelty of the proposed technique lies in its ability to automatically trigger alerts from transaction profiles, based on transaction usage performed over a period of time. Experiments were conducted using a real dataset obtained from the production client of a large organization using SAP R/3 (presently the most predominant ERP system), to run its business. The results of this empirical research demonstrate the effectiveness of the proposed approach.</div> <br /> </div> <div id="articleSubject"> <h4>Keywords</h4> <br /> <div>Anomaly Detection; Enterprise Resource Planning Systems; Fraud Detection</div> <br /> </div> <div id="articleCitations"> <h4>References</h4> <br /> <div> <p>A. G. Little and P. J. Best, "A framework for separation of duties in an SAP R/3 environment," Managerial Auditing Journal, vol. 18, no. 5, pp. 419-430, 2003.</p> <p>P. Bingi, M. K. Sharma, and J. K. Godla, "Critical issues affecting an ERP implementation," Information Systems Management, vol. 16, no. 3, pp. 7-14, 1999.</p> <p>Y. F. Musaji, Integrated Auditing of ERP Systems. New York: John Wiley and Sons, 2002.</p> <p>J. D. O'Gara, Corporate Fraud: Case Studies in Detection and Prevention. New Jersy: John Wiley and Sons, 2004.</p> <p>R. Bolton and D. Hand, "Statistical fraud detection: A review," Statistical Science, vol. 17, no. 3, pp. 235-249, 2002.</p> <p>W. S. Albrecht, C. Albrecht, and C. C. Albrecht, "Current trends in fraud and its detection," Information Security Journal: A Global Perspective, vol. 17, no. 2, pp. 2-12, 2008.</p> <p>P. J. Best, "Computer assisted auditing techniques," Queensland University of Technology, Brisbane, QLD, 2007.</p> <p>A. Clark, G. Mohay, and P. Best, "Integrated financial fraud detection in enterprise applications," Information Security Institute, Queensland University of Technology, Brisbane, QLD, 2005.</p> <p>J. T. Wells, Fraud Casebook: Lessons from the Bad Side of Business. New Jersy: John Wiley and Sons, 2007.</p> <p>R. Khan, M. Corney, A. Clark, and G. Mohay, "Transaction mining for fraud detection in ERP Systems," Industrial Engineering and Management Systems, vol. 9, no. 2, pp.141-156, 2010.</p> <p>V. Barnett and T. Lewis, Outliers in Statistical Data, 3rd ed. England: Wiley and Sons, 1994.</p> <p>E.W.T. Ngai, Y. Hu, Y.H. Wong, Y. Chen, and X. Sun, "The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature," Decision Support Systems, vol. 50, no. 3, pp.559-569, 2011.</p> <p>R. J. Bolton and D. J. Hand, "Unsupervised profiling methods for fraud detection" in Proc. Credit Scoring and Credit Control VII, London, 2001, pp. 5-7.</p> <p>T. Fawcett and F. Provost, "Adaptive fraud detection," Data Mining and Knowledge Discovery, vol. 1, no. 3, pp.291-316,1997.</p> <p>P. Flach, Machine Learning: The Art and Science of Algorithms that Make Sense of Data. Cambridge: University Press, 2012.</p> <p>R. E. Shiffler, "Maximum z scores and outliers," The American Statistician, vol. 42, no. 1, pp.79-80, 1988.</p> <p>E. Acuna and C. Rodriguez, "A meta analysis study of outlier detection methods in classification," University of Puerto Rico, Mayaguez, 2004.</p> <p>J. W. Tukey, Exploratory Data Analysis. Addison-Wesley, 1977.</p> <p>D. C. Hoaglin, F. Mosteller, and J. W. Tukey, Understanding Robust and Exploratory Data Analysis. New York: John Wiley and Sons, 2000.</p> <p>J. Han and M. Kamber, Data Mining Concepts and Techniques.Morgan Kaufmann, 3rd ed. MA: Elsevier, 2006.</p> <p>O. Maimon and L. Rokach, Data Mining and Knowledge Discovery Handbook, 2nd ed. New York: Springer, 2005.</p> <p>M. Juhola, J. Laurikkala, and E. Kentala, "Informal identification of outliers in medical data," in 5th Int. Workshop on Intelligent Data Analysis Medicine and Pharmacology, 2000.</p> <p>KPMG, "KPMG 2006 fraud survey," Australia, 2006.</p> <p>MATLAB, "K-means clustering," 2010.</p> <p>S. H. Oh and W. S. Lee, "An anomaly intrusion detection method by clustering normal user behavior," Computers and Security, vol. 22, no. 7, pp.596-612, 2003.</p> </div> <br /> </div> Full Text: <a href="http://it-in-industry.com/issue/archive/papers/28.html" class="file" target="_parent">PDF</a> <div class="separator"></div> <h3>Refbacks</h3> <ul class="plain"> <li>There are currently no refbacks.</li> </ul> <br /><br /> <a target="_new" rel="license" href="http://creativecommons.org/licenses/by/3.0/"> <img alt="Creative Commons License" style="border-width:0" src="http://i.creativecommons.org/l/by/3.0/80x15.png"/> </a> <br/> This work is licensed under a <a rel="license" target="_new" href="http://creativecommons.org/licenses/by/3.0/">Creative Commons Attribution 3.0 License</a>. <br /><br /> <p><img src="index_files/blocks_A1_Innovation.jpg" alt="IT in Innovation" width="207" height="46" /> <img src="index_files/blocks_A1_Business.jpg" alt="IT in Business" width="207" height="46" /> <img src="index_files/blocks_A1_Engineering.jpg" alt="IT in Engineering" width="207" height="46" /> <img src="index_files/blocks_A1_Health.jpg" alt="IT in Health" width="207" height="46" /> <img src="index_files/blocks_A1_Science.jpg" alt="IT in Science" width="207" height="46" /> <img src="index_files/blocks_A1_Design.jpg" alt="IT in Design" width="207" height="46" /> <img src="index_files/blocks_A1_Fashion.jpg" alt="IT in Fashion" width="207" height="46" /></p> IT in Industry (2012 - ) <a href="http://www.it-in-industry.com">http://www.it-in-industry.com</a> ISSN (Online): 2203-1731; ISSN (Print): 2204-0595 <br /> </div><!-- content --> </div><!-- main --> </div><!-- body --> </div><!-- container --> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10