Dissertations / Theses on the topic 'Fraudulent detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 dissertations / theses for your research on the topic 'Fraudulent detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jóhannsson, Jökull. "Detecting fraudulent users using behaviour analysis." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224196.
Full textMed den ökande användningen av strömmande media ökar också möjligheterna till missbruk av dessa platformar samt bedrägeri. Ett typiskt fall av bedrägeri är att använda automatiserade program för att strömma media, och därigenom generera intäkter samt att öka en artist popularitet. Med den växande ekonomin kring strömmande media växer också incitamentet till bedrägeriförsök. Denna studies fokus är att finna användarmönster och använda denna kunskap för att träna modeller som kan upptäcka bedrägeriförsök. The maskininlärningsalgoritmer som undersökts är Logistic Regression, Support Vector Machines, Random Forest och Artificiella Neurala Nätverk. Denna studie jämför effektiviteten och precisionen av dessa algoritmer, som tränats på obalanserad data som innehåller olika procentandelar av bedrägeriförsök. Modellerna som genererats av de olika algoritmerna har sedan utvärderas med hjälp av Precision Recall Area Under the Curve (PR AUC) och F1-score. Resultaten av studien visar på liknande prestanda mellan modellerna som genererats av de utvärderade algoritmerna. Detta gäller både när de tränats på balanserad såväl som obalanserad data. Resultaten visar också att Random Forestbaserade modeller genererar bättre resultat för alla dataset som testats i detta experiment.
Orive, Múgica Iker. "Technical identifiers of fraudulent web pages, a systematic literature review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19048.
Full textHays, Jerry B. "An Investigation of Management Accountants Intention to Report Fraudulent Accounting Activity: Applying the Theory of Planned Behavior." NSUWorks, 2013. http://nsuworks.nova.edu/hsbe_etd/40.
Full textRowson, David. "The problem with fraudulent solicitors : issues of trust, investigation and the self-regulation of the legal profession." Thesis, Teesside University, 2009. http://hdl.handle.net/10149/112684.
Full textGleichmann, Tobias [Verfasser], Michael [Akademischer Betreuer] Grüning, and Jörg R. [Gutachter] Werner. "The detection of fraudulent financial statements using textual and financial data / Tobias Gleichmann ; Gutachter: Jörg R. Werner ; Betreuer: Michael Grüning." Ilmenau : TU Ilmenau, 2020. http://d-nb.info/1221063383/34.
Full textAndrée, Anton. "Catch the fraudster : The development of a machine learning based fraud filter." Thesis, Uppsala universitet, Avdelningen för systemteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-424464.
Full textCeglia, Cesarina. "A comparison of parametric and non-parametric methods for detecting fraudulent automobile insurance claims." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10147317.
Full textFraudulent automobile insurance claims are not only a loss for insurance companies, but also for their policyholders. In order for insurance companies to prevent significant loss from false claims, they must raise their premiums for the policyholders. The goal of this research is to develop a decision making algorithm to determine whether a claim is classified as fraudulent based on the observed characteristics of a claim, which can in turn help prevent future loss. The data includes 923 cases of false claims, 14,497 cases of true claims and 33 describing variables from the years 1994 to 1996. To achieve the goal of this research, parametric and nonparametric methods are used to determine what variables play a major role in detecting fraudulent claims. These methods include logistic regression, the LASSO (least absolute shrinkage and selection operator) method, and Random Forests. This research concluded that a non-parametric Random Forests model classified fraudulent claims with the highest accuracy and best balance between sensitivity and specificity. Variable selection and importance are also implemented to improve the performance at which fraudulent claims are accurately classified.
Yin, Zi-Hau, and 鄞子豪. "A Hybrid Structure for Fraudulent Financial Statement Detection." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/28936497643396192421.
Full text中國文化大學
會計學系
102
The study proposed a novel mechanism for fraudulent financial statement detection. The mechanism consists of two essential parts: one is ensemble feature selection strategy and the other is decision tree. The ensemble feature selection strategy is performed by two techniques, namely t-test and logistic regression. Both of them were used to determine the essential features. After determine the essential features, the selected features were fed into decision tree to construct the forecasting model. The 198 research samples ranged from 2000 to 2010 were considered in this study. According to our research finding, the union ensemble strategy outperforms than other ensemble strategies. In addition, the study also examines the effectiveness of corporate governance indictors. The results indicated that the corporate governance indicators can improve the forecasting performance of the introduced model.
Chiang, Wen-Yu, and 江玟諭. "Fraudulent Financial Statement Detection Using Data Mining Techniques." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/jqy453.
Full text國立臺灣大學
會計學研究所
107
This study attempts to apply data mining techniques on detection of fraudulent financial statements, and investigate whether textual information has information gain for fraudulent financial statements detection. Considering the characteristics of fraud, this study uses Random Forest as data mining techniques to build fraud detection model. Structured variables are selected based on fraud triangle, and textual information is extracted from letter to shareholders and operation review in annual report. The result shows that Random Forest achieved higher classification accuracy than traditional regression model, and the text in annual report has no explicit information gain for distinguishing fraudulent and non-fraudulent companies. However, it is worth noting that the importance of uncertain words in annual report ranks 13 among 83 variables. This implies that tentative words in annual report may be regarded as an important indicator to fraudulent financial statement occurrence.
Su, Jian-Jia, and 蘇健嘉. "Modeling Real-Time Call Behaviors for Fraudulent Phone Call Detection." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/r4zqka.
Full text國立臺灣大學
資訊工程學研究所
107
The main purpose of this thesis is to propose a model that can detect whether a phone number is a fraud in real-time. There are two problems in detecting fraud. Some methods can only apply at the same time interval as training data. On the other hand, a model that can apply to a new phone number have low precision. We propose a modularized call representation and detection model. By two-phases training, our model can generate call representations and uses the call representations to detect fraud. In the first phase, call behavior prediction training allows model generating call representation containing rich information. We then train a simple classifier to detect fraud based on the call representation. Our model outperforms the random baseline and beats baseline model which lacking the call behavior module. As for future work, multi phone number modeling can be used to detect complex fraud because Some fraud is cooperating between several phone numbers.
Che-WeiHuang and 黃哲緯. "Novel Graph Mining Approaches for Efficient Fraudulent Phone Call Detection." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/08204046648308668670.
Full textLi, Chih-Wei, and 李志偉. "A Face Detection Scheme with Mask Detection to Prevent Fraudulent Use of ATM Cards in ATM." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/41782807109049126493.
Full text中原大學
電機工程研究所
105
Abstract In this thesis, we propose a face detection scheme with mask detection to prevent fraudulent use of ATM cards to increase safety for application of ATM. The purpose of our scheme is to solve the following problem. In ATM application, criminal''s face information can''t be recorded, because they usually use someone''s ATM card and deliberately cover their face. First, we open webcam to capture a live video and detect the user''s face portion by training cascading classifier for human face with Viola-Jones algorithm. Second, the user''s face image is transformed grayscale from RGB space. The grayscales image are blurred and sharpened to get images of face edge and facial features. These images are combined to detect if it is a mask image. Finally, we judge the threshold to accurately distinguish whether the face wearing a mask. In this thesis, the results of our research are as follows: 1. Reduce misjudgment : The mask detection solves the misjudgment of face detection. 2. Increase security of personal property : The detection system prevent lost cards from being used by others.
CHIEN, KUO-TUNG, and 簡國棟. "Using Ontology-based Data Mining Methods for the Detection of Fraudulent Financial Statements." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/08829189827871099340.
Full text國立中正大學
會計與資訊科技研究所碩士在職專班
104
Financial statement fraud causes the society to suffer losses. The research is combining data mining techniques and ontology to provide relevance information for decision makers. The results will be great help to accountants and auditors for detecting financial statement fraud. In this study, the samples that conform to the definition of financial statement fraud companies are selected from Class-Action Litigation or Arbitration Ongoing Cases in Securities and Futures Investors Protection Center, The Judicial Yuan Of The Republic of China Law and Regulations Retrieving System, and news media. This study collect 31 companies who have involved in financial statements fraud, as well as 93 companies who have not during 2002-2016 as paired samples (1:3). Our analysis procedures are: First, using financial variables that previous studies had used to measure financial statements fraud as initial ontology of financial statement fraud; Second, followed by a decision tree data mining algorithms and randomforest data mining algorithms the important variables are selected; Third, we use decision tree, artificial neural network, and support vector machines of data mining algorithms to assess the accuracy of classification; Fourth, we establish criteria based on the decision tree to judge whether the enterprise faced financial statement fraud; At last, we build ontology knowledge of financial statement fraud. The proposed early warning model for financial statement fraud with ontology knowledge will provide convinced pattern and typologies of financial statement fraud.
"A Model Framework to Estimate the Fraud Probability of Acquiring Merchants." Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.29798.
Full textDissertation/Thesis
Doctoral Dissertation Business Administration 2015
"Understanding, Analyzing and Predicting Online User Behavior." Doctoral diss., 2019. http://hdl.handle.net/2286/R.I.53601.
Full textDissertation/Thesis
Doctoral Dissertation Business Administration 2019
ANDERLOVÁ, Markéta. "Kreativní účetnictví, přístupy k jeho identifikaci a využívání z pozice managementu." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-317638.
Full textChen, Tien Hui, and 甄典蕙. "Building Fraudulent Financial Statement Detecting Model: Evidence from China Listed Companies." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/f82cs6.
Full text國立政治大學
會計學系
104
Due to the severe impacts caused by fraudulent financial reporting, securities regulatory commissions in most countries put much emphasis on maintaining the order of the capital markets and protecting the investors’ interests. In order to realize the factors of financial statement fraud, especially for China listed companies, and build the detecting model for the financial statements users, I select some listed companies punished by the government during the period 2007-2014 as the samples in this dissertation. Then, I use logistic regression model to test which variables are significant to fraudulent financial reporting, and the results show that the discretionary revenue and Z"-Score do not have impact on it. On the contrary, the percentage of independent directors, pressure from avoiding being “ST”, inventory turnover, accounts receivable turnover, and percentage of income from main operation are significantly relevant to fraudulent financial reporting. Moreover, when including these significant variables in the detecting model, the accuracy of the model can up to 53.31 percent.
盧俊光. "A study of pattern and detective action of new fraudulence." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/u648mw.
Full textAraújo, João Bosco de. "Etiologia criminal na gestão de contratos terceirizados." Master's thesis, 2017. http://hdl.handle.net/10284/6088.
Full textIn the contemporary world, economic crimes and financial fraud take on different forms, characteristics and modalities. Globalization and dynamic technological development have made sophisticated and complex crimes and frauds as they weaken internal defenses and controls because of the rapidity with which organizational changes occur and contribute to the elevation of vulnerabilities and risks in the management of outsourced contracts. Crimes and fraud committed during the term of contracts, whether private or public, show conflicts of interest, misconduct, opportunism and contempt for the ethical values made by managers who should control commercial agreements, bids, supplier selections and / or products, Revealing a predatory fraud profile. The fragile or limited capacity of the internal preventive controls and the evident manipulation of the three lines of defense in all segments and sizes of business unfortunately ratify the increase of cases of fraud and economic crimes. In this context, this research sought to identify risks inherent in the contracts and characteristics of the fraud profile responsible for annulling controls and manipulating lines of defense in contract management, establishing the causal link between criminal practice and exposure to contractual risks. Based on this purpose, specific research was carried out on the types of contracts impacted, characteristics of fraudster profiles and identification of the main protectionist measures implemented to mitigate fraud and economic contractual crimes. Finally, it is expected that this Dissertation will contribute to the awareness of entrepreneurs, managers and, especially, auditors, about the importance of disseminating to the actors involved in the management of outsourced contracts methodologies and tools related to the detection, prevention, monitoring and Risk treatment in line with specific compliance rules for the inherent contractual risks that can preserve the company’s image, protect investments, guarantee operations and business continuity.
Hsieh, Tung-chi, and 謝東旂. "Using Service Oriented Architecture for Constructing Rule-Based Expert Systems – A Study on Credit Card Fraudulent Application Detecting System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/43533136412908958623.
Full text世新大學
資訊管理學研究所(含碩專班)
97
The trend of liberalization and internationalization on global financial market brings in booming development in credit market. In order to achieve high volume in issuing credit cards and be a leading role in the credit market, bank employees who issue credit cards trend to adopt more flexible standards when evaluating applicants’ qualifications. These situations may accelerate the ratio of fraudulent applications and the existence of ghost accounts. Therefore, how to detect and prevent fraud case at the time of approval to reduce the risk of issuing credit cards becomes vital to banks. The Rule-Based Expert Systems utilizes the technique of information system to construct an automatically evaluating system, to either assist with or replace the evaluation executed by professional workers. Through the strength of the Rule-Based Expert Systems to offset the weakness of manpower, it will effectively reduce the risk of issuing credit cards and achieve a better result of evaluation. At the same time, when applying the Service Oriented Architecture , we can utilize its characteristics of Loosely Coupled and Process Centric to help the issuing banks effectively integrate their internal business resources with the stages of its growth and present its competitive strength in today’s versatile and challenging business environments. In this thesis, I will utilize Web service as a tool and apply Service Oriented Architecture to construct Rule-Based Expert Systems and design “Credit Card Fraudulent Application Detecting System” to assist banks and satisfy its various needs in modern business environments.