A Framework for Web Based Detection of Journal Entries Frauds using Data Mining Algorithm

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-51 Number-1
Year of Publication : 2017
Authors : Awodele O., Akinjobi J., Akinsola J. E. T.
DOI :  10.14445/22312803/IJCTT-V51P101

MLA

Awodele O., Akinjobi J., Akinsola J. E. T. "A Framework for Web Based Detection of Journal Entries Frauds using Data Mining Algorithm". International Journal of Computer Trends and Technology (IJCTT) V51(1):1-9, September 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Fraud detection has been a major challenge in the financial industry. The fraud menace has made a lot of organization lost billions of naira especially in multi-divisional and multi-branch enterprises. Hence, there is a need for pragmatic approach to proffer solution to this challenge. The methodological approach used in this work involves the development of framework which includes the remote extraction of financial Journal Entries (JE) from each branch location of multi-divisional multi-branch enterprises and integrated into an SQL Server database using a standard data format through SQL Server Management Studio. The extracted data is thereafter used to build a central data warehouse that is transmitted to the auditors at the corporate headquarters of the enterprise using web applications tools through Internet. A Decision Tree data mining algorithm constructed is applied by the auditors at the corporate headquarters on the data warehouse to detect possible financial JE fraud. The tasks are guided by the concept of a three tier client/server architecture in which the data extraction and data warehouse construction tasks constitute a data/backend tier, the transmission of the data warehouse through the web services constitutes the application/ middle tier while the decision tree data mining algorithm application for fraud detection through a user interface program of Active Server Pages (ASP.NET) constitute a presentation tier. Therefore, supervised predictive machine learning was employed in this study because the classes for fraud detection are user defined, they are ensured to conform to the classification hierarchy of the Journal Entries (JE). The use of training data improves the ability to differentiate between classes with similar journal profiles using the methods that are more reliable and produce more accurate results.

References
[1] Anwaar, A., Junaid, Q., Raihan, R., Arjuna, S., Andrej, Z. & Jon C. (2016). Big data for development: applications and techniques. Big Data Analytics, 1 / 2, 1- 24. ISSN: 2058-6345. doi: 10.1186/s41044-016-0002-4
[2] Aral, K.D., Güvenir, H.A., Sabuncuog, T., & Akar, A.R. (2011). A prescription fraud detection model. An Elsvier journal publication
[3] Argyrou, A. (2013). Auditing Journal Entries Using Extreme Value Theory. Proceedings of the 21st European Conference on Information Systems. 22, 00101 Helsinki, Finland,
[4] Argyrou, A. (2013). Developing Quantitative Models for Auditing Journal Entries. A PhD Theisis, Hanken School of Economics.
[5] Ashutosh, K. D., Animesh, K. D., Vipul, A. & Yogeshver, K (2012). “Knowledge Discovery with a Subset-Superset Approach for Mining Heterogeneous Data with Dynamic Support”, Conseg-2012.
[6] Bay, S., Kumaraswamy, K., Anderle, M.G., Kumar, R., & Steier, D.M2012). Large Scale Detection of Irregularities in Accounting Data. Center for Advanced Research, PricewaterhouseCoopers
[7] Brown, M. (2012). Data mining techniques. Retrieved from website: https://www.ibm.com/developerworks/library/ba-data-mining-techniques
[8] Center for Audit Quality (CAQ) (2008). Practice Aid for Testing Journal Entries and Other Adjustments Pursuant to AU Section 316. A publication of the Center for Audit Quality.
[9] Chaudhuri, S., & Dayal, U. An Overview of Data Warehousing and OLAP Technology.Microsoft Research, Redmond Hewlett-Packard Labs, Palo Alto.
[10] Chintalapati S., Jyotsna G. (2013). Application of Data Mining Techniques for Financial Accounting Fraud Detection Scheme, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 11.
[11] Chorba, R. W., & Bommer, M. R. W. (1983).Methodology for the Construction of a Data Warehouse. Cordova, Argentina.
[12] Debreceny, R.S. & Gray, G.L. (2010). Data Mining Journal Entries for Fraud Detection: A Pilot Study
[13] Elkan, C. (2001). Magical Thinking in Data Mining: Lessons from COIL Challenge 2000. Proc. of SIGKDD01, 426-431.
[14] Ghanbari, M. K. & Einakian, M. (2014). Using “Data Mining” to Detect Frauds of Internal Audits. Proceedings of 9th International Business and Social Science Research Conference, Dubai, UAE, ISBN: 978-1-922069-41-2
[15] Han, J., & Kamber, M. (2000). Data Mining: Concepts and Techniques. Book published inSimon Fraser University
[16] Hastie, T., Tibshirani, R. & Friedman, J. H (2001). The elements of statistical learning. Data mining, inference, and prediction, 2001, New York: Springer Verlag.
[17] Inmon, W. H. (2005). Building the Data Warehouse (4th ed.). Indianapolis, IN: Wiley Publishing, Inc.
[18] Joseph, M. V. (2013). Significance of Data Warehousing and Data Mining in Business Applications. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-1.
[19] Kai, L. & Peng, L. (2013). "A Selective Fuzzy Clustering Ensemble Algorithm", International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013, pp.1-6.
[20] Kimball, R. (2006). The data warehouse toolkit. John Wiley & Sons.
[21] Kirkos, E., Spathis, C., &Manolopoulos,Y. (2007). Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32, 995-1003.
[22] Kotsiantis, S. B. (2007). Supervised Machine Learning: A Review of Classification Techniques. Informatica 31 (2007). Pp. 249 – 268. Retrieved from IJS website: http://wen.ijs.si/ojs-2.4.3/index.php/informatica/article/download/148/140.
[23] Landset, S., Khoshgoftaar, T. M., Richter, A. N. & Hasanin, T. (2015). A survey of open source tools for machine learning with big data in the Hadoop ecosystem. Journal of Big Data (2015) 2 / 24. 1 – 36, doi: 10.1186/s40537-015-0032-1. Retrieved from: https://journalofbigdata.springeropen.com/articles/10.1186/s40537-015-0032-1. Springer Open Journal, Springer Press
[24] Leskovec, J., Rajaraman, A. & Ullman, D. J. (2014). Mining of Massive Datasets. Retrieved from website: http://i.stanford.edu/~ullman/mmds/book.pdf
[25] Mohammad, A. A., Dusit, N., Shaowei, L., Hwee-Pink, T. & Zhu, H. (2016). Mobile Big Data Analytics Using Deep Learning and Apache Spark. Mobile big data analytics using deep learning and apache spark. IEEE Network. 30 / 3, 22-29. Research Collection School of Information Systems. ISS: N0890-8044. Identifier: 10.1109/MNET.2016.7474340I. Retrieved from website: http://ink.library.smu.edu.sg/sis_research/3422. Available at: http://doi.org/10.1109/MNET.2016.7474340. Institute of Electrical and Electronics Engineers (IEEE) Press
[26] Osisanwo F.Y., Akinsola J.E.T., Awodele O., Hinmikaiye J. O., Olakanmi O.,Akinjobi J. (2017). Supervised Machine Learning Algorithms: Classification and Comparison. International Journal of Computer Trends and Technology (IJCTT) – Volume 48 Number 3 June 2017 ISSN: 2231-2803 http://www.ijcttjournal.org. Pp. 128 - 138
[27] Ott, J., MacLeod, A., & Fan, K. Mar. (n.d). Computer-assisted Audit Techniques: Value of Data Mining for Corporate Auditors
[28] Ponniah, P. (2001). Data Warehousing Fundamentals: A Comprehensive Guide for IT Professionals. Canada: John Wiley & Sons, Inc.
[29] Preeti, K & Hitesh, G. (2012). “Finding Frequent Pattern with Transaction and Occurrences based on Density Minimum Support Distribution”, International Journal of Advanced Computer Research (IJACR), Volume-2, Number-3, Issue-5 September-2012.
[30] Sarka D., (2013). Fraud Detection with the SQL Server Suite Parts1-4. A blog entry posted in SQL Server Blogs, Training
[31] Sarka, D. (2012). Data Mining with SQL Server. SolidQ. Retrieved from http://www.solidq.com/squ/courses/Pages/Data-Mining-with-SQL-Server-2012.aspx
[32] Saxena, G. &Agarwal, B. B. (2014). Data Warehouse Designing: Dimensional Modelling and E-R Modelling. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 9
[33] Sharma, A., & Panigrahi, P.K. (2012).A Review of Financial Accounting Fraud Detection based on Data Mining Techniques. International Journal of Computer Applications (0975 – 8887) Volume 39.
[34] SQL Server Management Studio Express Microsoft.com (2011); Wikipedia, the free encyclopedia.com.)
[35] Teeter, R. A., Vasarhelyi, M. A., Alles, M. G. (2011).The Remote Audit. Journal of Emerging Technologies in Accounting Volume 7 Issue 1, pp. 73-88.
[36] Turban, E., Aronson, J. E., Liang, T. P., & Sharda, R. (2007). Decision Support and Business Intelligence Systems, Eighth edition, Pearson Education, 2007.

Keywords
Data Mining, Data Warehouse, Decision Tree, Journal Entries, Machine Learning, Web Services.