Abstract
As technology advances, fraud is becoming increasingly complicated and difficult to detect, especially when individuals collude. Surveys show that the median loss from collusive fraud is much greater than fraud perpetrated by individuals. Despite its prevalence and potentially devastating effects, internal auditors often fail to consider collusion in their fraud assessment and detection efforts. This paper describes a system designed to detect collusive fraud in enterprise resource planning (ERP) systems. The fraud detection system aggregates ERP, phone and email logs to detect collusive fraud enabled via phone and email communications. The performance of the system is evaluated by applying it to the detection of six fraudulent scenarios involving collusion.
Chapter PDF
Similar content being viewed by others
References
Association of Certified Fraud Examiners, 2006 ACFE Report to the Nation on Occupational Fraud and Abuse, Austin, Texas (www.acfe.com/documents/2006RTTN.ppt), 2006.
Association of Certified Fraud Examiners, 2010 Report to the Nation on Occupational Fraud and Abuse, Austin, Texas (www.acfe.com/rttn/2010-rttn.asp), 2010.
E. Barse, H. Kvarnstrom and E. Jonsson, Synthesizing test data for fraud detection systems, Proceedings of the Nineteenth Annual Computer Security Applications Conference, pp. 384–394, 2003.
T. Bell and J. Carcello, A decision aid for assessing the likelihood of fraudulent financial reporting, Auditing: A Journal of Practice and Theory, vol. 19(1), pp. 169–184, 2000.
K. Fanning and K. Cogger, Neural network detection of management fraud using published financial data, Intelligent Systems in Accounting, Finance and Management, vol. 7(1), pp. 21–41, 1998.
D. Coderre, Computer Aided Fraud Prevention and Detection: A Step by Step Guide, John Wiley, Hoboken, New Jersey, 2009.
A. Islam, M. Corney, G. Mohay, A. Clark, S. Bracher, T. Raub and U. Flegel, Fraud detection in ERP systems using scenario matching, Proceedings of the Twenty-Fifth IFIP International Conference on Information Security, pp. 112–123, 2010.
R. Khan, M. Corney, A. Clark and G. Mohay, A role mining inspired approach to representing user behavior in ERP systems, Proceedings of the Tenth Asia Pacific Industrial Engineering and Management Systems Conference, pp. 2541–2552, 2009.
J. Kim, A. Ong and R. Overill, Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector, Proceedings of the Congress on Evolutionary Computation, vol. 1, pp. 405–412, 2003.
J. Lin, M. Hwang and J. Becker, A fuzzy neural network for assessing the risk of fraudulent financial reporting, Managerial Auditing Journal, vol. 18(8), pp. 657–665, 2003.
C. Michel and L. Me, ADeLe: An attack description language for knowledge-based intrusion detection, Proceedings of the Sixteenth IFIP International Conference on Information Security, pp. 353–368, 2001.
C. Phua, V. Lee, K. Smith and R. Gayler, A comprehensive survey of data mining based fraud detection research (arxiv.org/abs/1009.6119v1), 2010.
P. Porras and R. Kemmerer, Penetration state transition analysis: A rule-based intrusion detection approach, Proceedings of the Eighth Annual Computer Security Applications Conference, pp. 220–229, 1992.
J.-P. Pouzol and M. Ducasse, From declarative signatures to misuse IDS, Proceedings of the Fourth International Symposium on Recent Advances in Intrusion Detection, pp. 1–21, 2001.
S. Summers and J. Sweeney, Fraudulently misstated financial statements and insider trading: An empirical analysis, The Accounting Review, vol. 73(1), pp. 131–146, 1998.
J. Wells, Corporate Fraud Handbook: Prevention and Detection, John Wiley, Hoboken, New Jersey, 2007.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Islam, A. et al. (2011). Detecting Collusive Fraud in Enterprise Resource Planning Systems. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics VII. DigitalForensics 2011. IFIP Advances in Information and Communication Technology, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24212-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-24212-0_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24211-3
Online ISBN: 978-3-642-24212-0
eBook Packages: Computer ScienceComputer Science (R0)