Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 968712, 9 pages
http://dx.doi.org/10.1155/2014/968712
Research Article

A Hybrid Approach of Stepwise Regression, Logistic Regression, Support Vector Machine, and Decision Tree for Forecasting Fraudulent Financial Statements

1Department of Accounting Information, National Taipei University of Business, 321 Jinan Road, Section 1, Taipei 10051, Taiwan
2Department of Business Administration, National Taipei University, No. 67, Section 3, Ming-shen East Road, Taipei 10478, Taiwan

Received 13 May 2014; Revised 22 August 2014; Accepted 23 August 2014; Published 11 September 2014

Academic Editor: Shifei Ding

Copyright © 2014 Suduan Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Spathis, M. Doumpos, and C. Zopounidis, “Detecting falsified financial statements: a comparative study using multi-criteria analysis and multivariate statistical techniques,” The European Accounting Review, vol. 11, pp. 509–535, 2002. View at Google Scholar
  2. Z. Rezaee, “Causes, consequences, and deterence of financial statement fraud,” Critical Perspectives on Accounting, vol. 16, no. 3, pp. 277–298, 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Kotsiantis, E. Koumanakos, D. Tzelepis, and V. Tampakas, “Forecasting fraudulent financial statements using data mining,” Transactions on Engineering Computing and Technology, vol. 12, pp. 283–288, 2006. View at Google Scholar
  4. C.-C. Yeh, D.-J. Chi, and M.-F. Hsu, “A hybrid approach of DEA, rough set and support vector machines for business failure prediction,” Expert Systems with Applications, vol. 37, no. 2, pp. 1535–1541, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Zhou and G. Kapoor, “Detecting evolutionary financial statement fraud,” Decision Support Systems, vol. 50, no. 3, pp. 570–575, 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. S. L. Humpherys, K. C. Moffitt, M. B. Burns, J. K. Burgoon, and W. F. Felix, “Identification of fraudulent financial statements using linguistic credibility analysis,” Decision Support Systems, vol. 50, no. 3, pp. 585–594, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. K. A. Kamarudin, W. A. W. Ismail, and W. A. H. W. Mustapha, “Aggressive financial reporting and corporate fraud,” Procedia-Social Behavioral Sciences, vol. 65, pp. 638–643, 2012. View at Google Scholar
  8. P.-F. Pai, M.-F. Hsu, and M.-C. Wang, “A support vector machine-based model for detecting top management fraud,” Knowledge-Based Systems, vol. 24, no. 2, pp. 314–321, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. Accounting Research and Development Foundation, Audit the Financial Statements of the Considerations for Fraud, Accounting Research and Development Foundation, Taipei, Taiwan, 2013.
  10. S. Kirkos, C. Spathis, and Y. Manolopoulos, “Data mining techniques for the detection of fraudulent financial statements,” Expert Systems with Applications, vol. 32, no. 4, pp. 995–1003, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. T. B. Bell and J. V. Carcello, “A decision aid for assessing the likelihood of fraudulent financial reporting,” Auditing, vol. 19, pp. 169–178, 2000. View at Google Scholar · View at Scopus
  12. V. D. Sharma, “Board of director characteristics, institutional ownership, and fraud: evidence from Australia,” Auditing, vol. 23, no. 2, pp. 105–117, 2004. View at Publisher · View at Google Scholar · View at Scopus
  13. W.-H. Chen, S.-H. Hsu, and H.-P. Shen, “Application of SVM and ANN for intrusion detection,” Computers and Operations Research, vol. 32, no. 10, pp. 2617–2634, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  14. J. W. Seifert, “Data mining and the search for security: challenges for connecting the dots and databases,” Government Information Quarterly, vol. 21, no. 4, pp. 461–480, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. M. S. Beasley, “An empirical analysis of the relation between the board of director composition and financial statement fraud,” Accounting Review, vol. 71, no. 4, pp. 443–465, 1996. View at Google Scholar · View at Scopus
  16. P. Dunn, “The impact of insider power on fraudulent financial reporting,” Journal of Management, vol. 30, no. 3, pp. 397–412, 2004. View at Publisher · View at Google Scholar · View at Scopus
  17. G. Chen, “Positive research on the financial statement fraud factors of listed companies in China,” Journal of Modern Accounting and Auditing, vol. 2, pp. 25–34, 2006. View at Google Scholar
  18. Z. Huang, H. Chen, C.-J. Hsu, W.-H. Chen, and S. Wu, “Credit rating analysis with support vector machines and neural networks: a market comparative study,” Decision Support Systems, vol. 37, no. 4, pp. 543–558, 2004. View at Publisher · View at Google Scholar · View at Scopus
  19. K.-S. Shin, T. S. Lee, and H.-J. Kim, “An application of support vector machines in bankruptcy prediction model,” Expert Systems with Applications, vol. 28, no. 1, pp. 127–135, 2005. View at Publisher · View at Google Scholar · View at Scopus
  20. S. L. Summers and J. T. Sweeney, “Fraudulently misstated financial statements and insider trading: an empirical analysis,” The Accounting Review, vol. 73, no. 1, pp. 131–146, 1998. View at Google Scholar · View at Scopus
  21. G. Arminger, D. Enache, and T. Bonne, “Analyzing credit risk data: a comparison of logistic discrimination, classification tree analysis, and feedforward networks,” Computational Statistics, vol. 12, no. 2, pp. 293–310, 1997. View at Google Scholar · View at Scopus
  22. S. Viaene, G. Dedene, and R. A. Derrig, “Auto claim fraud detection using Bayesian learning neural networks,” Expert Systems with Applications, vol. 29, no. 3, pp. 653–666, 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. J. R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, 1993.
  24. P. Pudil, K. Fuka, K. Beránek, and P. Dvorák, “Potential of artificial intelligence based feature selection methods in regression models,” in Proceedings of the IEEE 3rd International Conference on Computational Intelligence and Multimedia Application, pp. 159–163, 1999.