skip to main content
research-article

The Challenge of Quality Evaluation in Fraud Detection

Published: 07 September 2018 Publication History
First page of PDF

References

[1]
Isel Moreno-Montes de Oca, Monique Snoeck, Hajo A. Reijers, and Abel Rodríguez-Morffi. 2015. A systematic literature review of studies on business process modeling quality. Information and Software Technology 58 (2015), 187--205.
[2]
Ratbek Dzhumashev. 2014. The two-way relationship between government spending and corruption and its effects on economic growth. Contemporary Economic Policy 32, 2 (2014), 403--419.
[3]
Álvaro García-Recuero, Sérgio Esteves, and Luís Veiga. 2014. Towards quality-of-service driven consistency for big data management. International Journal of Big Data Intelligence 1, 1--2 (2014), 74--88.
[4]
Stephen L. George and Marc Buyse. 2015. Data fraud in clinical trials. Clinical Investigation 5, 2 (2015), 161.
[5]
Pola Hahlweg, Sarah Didi, Levente Kriston, Martin Härter, Yvonne Nestoriuc, and Isabelle Scholl. 2017. Process quality of decision-making in multidisciplinary cancer team meetings: A structured observational study. BMC Cancer 17, 1 (2017), 772.
[6]
Joseph M. Hellerstein, Vikram Sreekanti, Joseph E. Gonzalez, James Dalton, Akon Dey, Sreyashi Nag, Krishna Ramachandran, Sudhanshu Arora, Arka Bhattacharyya, Shirshanka Das, and others. 2017. Ground: A data context service. In 8th Conference on Innovative Data Systems Research.
[7]
Matthew Hollow. 2014. Money, morals and motives: An exploratory study into why bank managers and employees commit fraud at work. Journal of Financial Crime 21, 2 (2014), 174--190.
[8]
Steven A. Israel and Erik Blasch. 2016. Context assumptions for threat assessment systems. In Context-Enhanced Information Fusion. Springer, 99--124.
[9]
Marijn Janssen, Haiko van der Voort, and Agung Wahyudi. 2017. Factors influencing big data decision-making quality. Journal of Business Research 70 (2017), 338--345.
[10]
Andreas Lanz, Barbara Weber, and Manfred Reichert. 2014. Time patterns for process-aware information systems. Requirements Engineering 19, 2 (2014), 113--141.
[11]
Didier G. Leibovici, Julian F. Rosser, Crona Hodges, Barry Evans, Michael J. Jackson, and Chris I. Higgins. 2017. On data quality assurance and conflation entanglement in crowdsourcing for environmental studies. ISPRS International Journal of Geo-Information 6, 3 (2017), 78.
[12]
Saurabh Nagrecha, Reid A. Johnson, and Nitesh V. Chawla. 2018. FraudBuster: Reducing fraud in an auto insurance market. Big Data 6, 1 (2018), 3--12.
[13]
Association of Certified Fraud Examiners. 2018. Report to the Nations on Occupational Fraud and Abuse. Global Fraud Study. Retrieved May 12, 2018 from https://s3-us-west-2.amazonaws.com/acfepublic/2018-report-to-the-nations.pdf.
[14]
Rik Oldenkamp, Rosalie van Zelm, and Mark A. J. Huijbregts. 2016. Valuing the human health damage caused by the fraud of volkswagen. Environmental Pollution 212 (2016), 121--127.
[15]
Duc-Son Pham, Svetha Venkatesh, Mihai Lazarescu, and Saha Budhaditya. 2014. Anomaly detection in large-scale data stream networks. Data Mining and Knowledge Discovery 28, 1 (2014), 145--189.
[16]
Darren Quick and Kim-Kwang Raymond Choo. 2018. Digital forensic intelligence: Data subsets and open source intelligence (DFINT+ OSINT): A timely and cohesive mix. Future Generation Computer Systems 78 (2018), 558--567.
[17]
Marvin Rausand. 2014. Reliability of Safety-Critical Systems: Theory and Applications. John Wiley 8 Sons.
[18]
Rafael Ramos Regis Barbosa, Ramin Sadre, and Aiko Pras. 2016. Exploiting traffic periodicity in industrial control networks. International Journal of Critical Infrastructure Protection 13 (2016), 52--62.
[19]
Ian Ross. 2015. Exposing Fraud: Skills, Process and Practicalities. John Wiley 8 Sons.
[20]
Manali Sharma, Kamalika Das, Mustafa Bilgic, Bryan Matthews, David Nielsen, and Nikunj Oza. 2016. Active learning with rationales for identifying operationally significant anomalies in aviation. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 209--225.
[21]
Dallas Thornton, Michel Brinkhuis, Chintan Amrit, and Robin Aly. 2015. Categorizing and describing the types of fraud in healthcare. Procedia Computer Science 64 (2015), 713--720.
[22]
Ion-George Todoran, Laurent Lecornu, Ali Khenchaf, and Jean-Marc Le Caillec. 2015. A methodology to evaluate important dimensions of information quality in systems. Journal of Data and Information Quality 6, 2--3, Article 11 (2015), 23 pages.
[23]
Véronique Van Vlasselaer, Cristián Bravo, Olivier Caelen, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, and Bart Baesens. 2015. APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions. Decision Support Systems 75 (2015), 38--48.
[24]
Amrapali Zaveri, Anisa Rula, Andrea Maurino, Ricardo Pietrobon, Jens Lehmann, and Sören Auer. 2016. Quality assessment for linked data: A survey. Semantic Web 7, 1 (2016), 63--93.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Data and Information Quality
Journal of Data and Information Quality  Volume 10, Issue 2
Challenge Papers and Experience Paper
June 2018
31 pages
ISSN:1936-1955
EISSN:1936-1963
DOI:10.1145/3276749
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2018
Accepted: 01 May 2018
Revised: 01 May 2018
Received: 01 August 2017
Published in JDIQ Volume 10, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Quality meta-analysis
  2. context
  3. cumulative indicators
  4. fraud life cycle

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Chair of Naval Cybersecurity, funded by École Navale, IMT Atlantique, Thales and Naval Group

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 295
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media