Skip to main content

Fraud Detection in Financial Statements Using Evolutionary Computation Based Rule Miners

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8947))

Abstract

In this paper, we propose new rule based classifiers based on Firefly (FF) and Threshold Accepting (TA) Algorithms viz., Improved Firefly Miner, Threshold Accepting Miner, Hybridized Firefly-Threshold Accepting (FFTA) based Miner for classifying a company as fraudulent or non fraudulent with respect to their financial statements. We apply t-statistic based feature selection and investigate its impact on the results. FFTA and TA miners turned to be statistically similar. Both algorithms outperformed standard decision tree both in terms of sensitivity and the length of rules.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. http://www.accounting-degree.org/scandals/. Accessed 10 June 2014

  2. http://en.wikipedia.org/wiki/Accounting_scandals. Accessed 10 June 2014

  3. http://en.wikipedia.org/wiki/Satyam_scandal. Accessed 10 June 2014

  4. Kirkos, E., Spathis, C., Manolopoulos, Y.: Data mining techniques for the detection of fraudulent financial statement. Expert Syst. Appl. 32, 995–1003 (2007)

    Article  Google Scholar 

  5. Spathis, C., Doumpos, M., Zopounidis, C.: Detecting falsified financial statements: a comparative study using multi criteria analysis and multivariate statistical techniques. Eur. Acc. Rev. 11(3), 509–535 (2002)

    Article  Google Scholar 

  6. Cecchini, M., Aytug, H., Koehler, G.J., Pathak, P.: Detecting management fraud in public companies. http://warrington.ufl.edu/isom/docs/papers/DetectingManagementFraudInPublicCompanies.pdf

  7. Huang, S.-M., Yen, D.C., Yang, L.-W., Hua, J.-S.: An investigation of Zipf’s Law for fraud detection. Decis. Support Syst. 46(1), 70–83 (2008)

    Article  Google Scholar 

  8. Sohl, J.E., Venkatachalam, A.R.: A neural network approach to forecasting model selection. Inf. Manage. 29(6), 297–303 (1995)

    Article  Google Scholar 

  9. Cerullo, M.J., Cerullo, V.: Using neural networks to predict financial reporting fraud: part 1. Comput. Fraud Secur. 5, 14–17 (1999)

    Google Scholar 

  10. Calderon, T.G., Cheh, J.J.: A roadmap for future neural networks research in auditing and risk assessment. Int. J. Acc. Inf. Syst. 3(4), 203–236 (2002)

    Article  Google Scholar 

  11. Koskivaara, E.: Different pre-processing models for financial accounts when using neural networks for auditing. In: Proceedings of the 8th European Conference on Information Systems, vol. 1, pp. 326–3328. Vienna, Austria (2000)

    Google Scholar 

  12. Koskivaara, E.: Artificial neural networks in auditing: state of the art. ICFAI J. Audit Pract. 1(4), 12–33 (2004)

    Google Scholar 

  13. Busta, B., Weinberg, R.: Using Benford’s law and neural networks as a review procedure. Manage. Auditing J. 13(6), 356–366 (1998)

    Article  Google Scholar 

  14. Feroz, E.H., Kwon, T.M., Pastena, V., Park, K.J.: The efficacy of red flags in predicting the SEC’s targets: an artificial neural networks approach. Int. J. Intell. Syst. Acc. Finan. Manage. 9(3), 145–157 (2000)

    Article  Google Scholar 

  15. Brooks, R.C.: Neural networks: a new technology. CPA J. http://www.nysscpa.org/cpajournal/old/15328449.htm1994

  16. Fanning, K.M., Cogger, K.O.: Neural network detection of management fraud using published financial data. Int. J. Intell. Syst. Acc. Finan. Manage. 7(1), 21–41 (1998)

    Article  Google Scholar 

  17. Ramamoorti, S., Bailey Jr., A.D., Traver, R.O.: Risk assessment in internal auditing: a neural network approach. Int. J. Intell. Syst. Acc. Finan. Manage. 8(3), 159–180 (1999)

    Article  Google Scholar 

  18. Zhang, G., Patuwo, B.E., Hu, M.Y.: Forecasting with artificial neural networks: the state of the art. Int. J. Forecast. 14(1), 35–62 (1998)

    Article  Google Scholar 

  19. Aamodt, A., Plaza, E.: Case-based reasoning: foundational issues, methodological variations, and system approaches. Artif. Intell. Commun. 7(1), 39–59 (1994)

    Google Scholar 

  20. Kotsiantis, S., Koumanakos, E., Tzelepis, D., Tampakas, V.: Forecasting fraudulent financial statements using data mining. Int. J. Comput. Intell. 3(2), 104–110 (2006)

    Google Scholar 

  21. Deshmukh, L.Talluru: A rule-based fuzzy reasoning system for assessing the risk of management fraud. Int. J. Intell. Syst. Acc. Finan. Manage. 7(4), 223–241 (1998)

    Article  Google Scholar 

  22. Pacheco, R., Martins, A., Barcia, R.M., Khator, S.: A hybrid intelligent system applied to financial statement analysis. In: Proceedings of the 5th IEEE Conference on Fuzzy Systems, vol. 2, pp. 1007–10128. New Orleans, USA (1996)

    Google Scholar 

  23. Magnusson, C., Arppe, A., Eklund, T., Back, B., Vanharanta, H., Visa, A.: The language of quarterly reports as an indicator of change in the company’s financial status. Inf. Manage. 42(4), 561–574 (2005)

    Google Scholar 

  24. Kim, Y.: Toward a successful CRM: variable selection, sampling, and ensemble. Decis. Support Syst. 41(2), 542–553 (2006)

    Article  Google Scholar 

  25. Mahfoud, S., Mani, G.: Financial forecasting using genetic algorithms. Appl. Artif. Intell. 10, 543–565 (1996)

    Article  Google Scholar 

  26. Shin, K.-S., Lee, Y.-J.: A genetic algorithm application in bankruptcy prediction modeling. Expert Syst. Appl. 23(3), 321–328 (2002)

    Article  Google Scholar 

  27. Parpinelli, R.S., Lopes, H.S., Frietas, A.A.: Data mining with an ant colony optimization algorithm. IEEE Trans. Evol. Comput. 6(4), 321–332 (2002)

    Article  Google Scholar 

  28. Kim, M.-J., Han, I.: The discovery of experts’ decision rules from qualitative bankruptcy data using genetic algorithms. Expert Syst. Appl. 25, 637–646 (2003)

    Article  Google Scholar 

  29. Sousa, T., Neves, A., Silva, A.: A particle swarm data miner. In: 11th Portuguese Conference on Artificial Intelligence, Workshop on Artificial Life and Evolutionary Algorithms, pp. 43–53 (2003)

    Google Scholar 

  30. Liu, Y., Qin, Z., Shi, Z., Chen, J.: Rule discovery with particle swarm optimization. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol. 3309, pp. 291–296. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  31. Ji, J., Zhang, N., Liu, C., Zhong, N.: An ant colony optimization algorithm for learning classification rules. In: Proceedings of IEEE/WIC, pp. 1034–1037 (2006)

    Google Scholar 

  32. Zhao, X., Zeng, J., Gao, Y., Yang, Y.: Particle swarm algorithm for classification rules generation. In: Proceedings of the Intelligent Systems Design and Applications, IEEE, pp. 957–962 (2006)

    Google Scholar 

  33. Holden, N., Frietas, A.A.: A hybrid PSO/ACO algorithm for classification. In: Proceedings of Genetic and Evolutionary Computation conference, pp. 2745–2750 (2007)

    Google Scholar 

  34. Su, H., Yang, Y., Zha, L.: Classification rule discovery with DE/QDE algorithm. Expert Syst. Appl. 37(2), 1216–1222 (2010)

    Article  Google Scholar 

  35. Ravisankar, P., Ravi, V., Raghava Rao, G., Bose, I.: Detection of financial statement fraud and feature selection using data mining techniques. Dec. Support Syst. 50, 491–500 (2010)

    Article  Google Scholar 

  36. Naveen, N., Ravi, V., Raghavendra Rao, C., Sarath, K.N.V.D.: Rule extraction using firefly optimization: application to banking. In: IEEM (2012)

    Google Scholar 

  37. Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks (Perth, Australia), IEEE Service Center, Piscataway, NJ (1995)

    Google Scholar 

  38. Dueck, G., Scheuer, T.: Threshold accepting: a general purpose optimization algorithm appearing superior to simulated annealing. J. Comput. Phys. 90, 161–175 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  39. Yang, X.-S.: Firefly algorithms for multimodal optimization. In: Watanabe, O., Zeugmann, T. (eds.) SAGA 2009. LNCS, vol. 5792, pp. 169–178. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  40. Yang, X.-S.: Firefly algorithm, stochastic test functions and design optimization. Int. J. Bio-Inspired Comput. 2(2), 78–84 (2010)

    Article  Google Scholar 

  41. Neucom. http://www.aut.ac.nz/research/research-institutes/kedri/research-centres/centre-for-data-mining-and-decision-support-systems/neucom-project-homepage#download

  42. Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1, 81–106 (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vadlamani Ravi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pradeep, G., Ravi, V., Nandan, K., Deekshatulu, B.L., Bose, I., Aditya, A. (2015). Fraud Detection in Financial Statements Using Evolutionary Computation Based Rule Miners. In: Panigrahi, B., Suganthan, P., Das, S. (eds) Swarm, Evolutionary, and Memetic Computing. SEMCCO 2014. Lecture Notes in Computer Science(), vol 8947. Springer, Cham. https://doi.org/10.1007/978-3-319-20294-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20294-5_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20293-8

  • Online ISBN: 978-3-319-20294-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics