Skip to main content

A State of the Art Survey of Fraud Detection Technology

  • Chapter
  • First Online:
Insider Threats in Cyber Security

Part of the book series: Advances in Information Security ((ADIS,volume 49))

Abstract

With the introduction of IT to conductbusiness we accepted the loss of a human control step.For this reason, the introductionof newIT systemswas accompanied by the development of the authorization concept. But since, in reality, there is no such thing as 100 per cent security; auditors are commissioned to examine all transactions for misconduct. Since the data exists in digital form already, it makes sense to use computer-based processes to analyse it. Such processes allow the auditor to carry out extensive checks within an acceptable timeframe and with reasonable effort. Once the algorithm has been defined, it only takes sufficient computing power to evaluate larger quantities of data. This contribution presents the state of the art for IT-based data analysis processes that can be used to identify fraudulent activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ACFE: Report to the nation. URL http://www.acfe.com/resources/ publications.asp?copy=rttn. Accessed on 09/21/2007.

  2. ACL. URL http://www.acl.com. Accessed on 09/20/2007.

  3. Bay, S., Kumaraswamy, K., Anderle, M.G., Kumar, R., Steier, D.M.: Large scale detection of irregularities in accounting data. In: ICDM, pp. 75-86. IEEE Computer Society (2006)

    Google Scholar 

  4. Caseware: IDEA. URL http://www.caseware-idea.com. Accessed on 09/20/2007.

  5. Coderre, D.G.: Fraud Detection: A Revealing Look at Fraud, 2 edn. Ekaros Analytical (2004)

    Google Scholar 

  6. Coderre, D.G.: CAATTs and Other BEASTs for Auditors, 3 edn. Ekaros Analytical (2005)

    Google Scholar 

  7. Coderre, D.G.: Fraud Analysis Techniques Using ACL. Wiley (2009)

    Google Scholar 

  8. Economist: Secrets of the digital detectives. URL http://www.economist.com/ displayStory.cfm?story_id=7 904281. Accessed on 09/21/2007.

  9. Insurance Services Offices. URL http://www.iso.com. Accessed on 09/20/2007.

  10. Lanza, R.B.: Payables Test Set for ACL. Ekaros Analytical (2003)

    Google Scholar 

  11. NetMap Analytics. URL http://www.netmap.com.au. Accessed on 09/20/2007.

  12. SAP: GRC Access Control. URL http://www.sap.com/solutions/grc/ accessandauthorization/index.epx. Accessed on 09/21/2007.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ulrich Flegel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Flegel, U., Vayssière, J., Bitz, G. (2010). A State of the Art Survey of Fraud Detection Technology. In: Probst, C., Hunker, J., Gollmann, D., Bishop, M. (eds) Insider Threats in Cyber Security. Advances in Information Security, vol 49. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-7133-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-7133-3_4

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-7132-6

  • Online ISBN: 978-1-4419-7133-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics