Abstract
With the introduction of IT to conductbusiness we accepted the loss of a human control step.For this reason, the introductionof newIT systemswas accompanied by the development of the authorization concept. But since, in reality, there is no such thing as 100 per cent security; auditors are commissioned to examine all transactions for misconduct. Since the data exists in digital form already, it makes sense to use computer-based processes to analyse it. Such processes allow the auditor to carry out extensive checks within an acceptable timeframe and with reasonable effort. Once the algorithm has been defined, it only takes sufficient computing power to evaluate larger quantities of data. This contribution presents the state of the art for IT-based data analysis processes that can be used to identify fraudulent activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ACFE: Report to the nation. URL http://www.acfe.com/resources/ publications.asp?copy=rttn. Accessed on 09/21/2007.
ACL. URL http://www.acl.com. Accessed on 09/20/2007.
Bay, S., Kumaraswamy, K., Anderle, M.G., Kumar, R., Steier, D.M.: Large scale detection of irregularities in accounting data. In: ICDM, pp. 75-86. IEEE Computer Society (2006)
Caseware: IDEA. URL http://www.caseware-idea.com. Accessed on 09/20/2007.
Coderre, D.G.: Fraud Detection: A Revealing Look at Fraud, 2 edn. Ekaros Analytical (2004)
Coderre, D.G.: CAATTs and Other BEASTs for Auditors, 3 edn. Ekaros Analytical (2005)
Coderre, D.G.: Fraud Analysis Techniques Using ACL. Wiley (2009)
Economist: Secrets of the digital detectives. URL http://www.economist.com/ displayStory.cfm?story_id=7 904281. Accessed on 09/21/2007.
Insurance Services Offices. URL http://www.iso.com. Accessed on 09/20/2007.
Lanza, R.B.: Payables Test Set for ACL. Ekaros Analytical (2003)
NetMap Analytics. URL http://www.netmap.com.au. Accessed on 09/20/2007.
SAP: GRC Access Control. URL http://www.sap.com/solutions/grc/ accessandauthorization/index.epx. Accessed on 09/21/2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Flegel, U., Vayssière, J., Bitz, G. (2010). A State of the Art Survey of Fraud Detection Technology. In: Probst, C., Hunker, J., Gollmann, D., Bishop, M. (eds) Insider Threats in Cyber Security. Advances in Information Security, vol 49. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-7133-3_4
Download citation
DOI: https://doi.org/10.1007/978-1-4419-7133-3_4
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-7132-6
Online ISBN: 978-1-4419-7133-3
eBook Packages: Computer ScienceComputer Science (R0)