Browse > Article
http://dx.doi.org/10.13088/jiis.2014.20.3.093

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products  

Kim, Dongsung (Dept. of Business Administration, Graduate School, Hanyang University)
Kim, Kitae (Dept. of Business Administration, Graduate School, Hanyang University)
Kim, Jongwoo (School of Business, Hanyang University)
Park, Steve (IPCS Consulting)
Publication Information
Journal of Intelligence and Information Systems / v.20, no.3, 2014 , pp. 93-108 More about this Journal
Abstract
To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.
Keywords
Fraud Detection; Outlier Detection; Auction Exception Products;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Abbasi, A., C. Albrecht, A. Vance, and J. Hansen, "MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud," MIS Quarterly, Vol.36, No.4(2012), 1293-1340.
2 Fawcett, T. and F. Provost, "Adaptive fraud detection." Data mining and knowledge discovery, Vol.1, No.3(1997), 291-316.   DOI   ScienceOn
3 Bierstaker, J. L., R. G. Brody, and C. Pacini, "Accountants' perceptions regarding fraud detection and prevention methods," Managerial Auditing Journal, Vol.21, Issue.5(2006), 520-535.   DOI   ScienceOn
4 Chau, D. H. and C. Faloutsos, "Fraud detection in electronic auction," Proceedings of the European Web Mining Forum at ECML/PKDD, (2005), 87-97.
5 Durtschi, C., W. Hillison, and C. Pacini, "The effective use of Benford's law to assist in detecting fraud in accounting data," Journal of forensic accounting, Vol.5, No.1(2004), 17-34.
6 Ghosh, S. and D. L. Reilly, "Credit card fraud detection with a neural-network." Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences, Vol. 3(1994), 621-630.
7 Kou, Y., C. T. Lu, S. Sirwongwattana, and Y. P. Huang, "Survey of Fraud Detection Techniques," Proceedings of the 2004 IEEE international conference on Networking, sensing and control, Vol.2(2004), 749-754.
8 Gwon. S. G. and C. H. Kim, "Current Status and Improvement Works of Unlisted Trading System [written in Korean]," Proceedings of Winter Conference on Korea Food Marketing Association, Vol.2011(2012), 37-65.
9 Ham, S. O. and J. S. Hong, "A Study on the Fraud Detection of Industrial Accident Compensation Insurance," Proceedings of Fall Conference on The Korean Operations Research and Management Science Society, (2008), 342-345.
10 Hong, C. H., S. M. Ahn, and K. W. Wee, "Detection of Stock Price Manipulation: A data Mining Approach," Journal of Intelligence and Information Systems, Vol.12, No.4(2006), 15-37.
11 Lee, H. K., S. B. Han, and W. C. Jhee, "Illegal Cash Accommodation Detection Modeling Using Ensemble Size Reduction," Journal of Intelligence and Information Systems, Vol.16, No.1(2010), 93-116.   과학기술학회마을
12 Lee, J. W., D. H. Lee, and I. S. Kim, "Method of Detecting SmiShing using SVM," Journal of Security Engineering, Vol.10, No.6(2013), 655-668.   DOI
13 Li, S. H., D. C. Yen, W. H. Lu, and C. Wang, "Identifying the Signs of Fraudulent Accounts Using Data Mining Tech," Computers in Human Behavior, Vol.28, Issue 3(2012), 1002-1013.   DOI   ScienceOn
14 Lee, J. W., I. A. Choi, W. C. Ji, H. Y. Park, and H. J. Shin, "A Quantitative Measure Integrating the Diverse Degree of Anomaly for Hospital Bill," Proceedings of the Conference on Korean Institute of Industrial Engineers, (2008), 342-345.
15 Lee, M. G. and S. J. Chang, "The Necessity for Education to Deter Accounting Fraud and the Directions of Accounting Fraud Education," The Korean Institute of Certified Accountants, Vol.54, No.2(2012) 41-75.
16 Lee, M. J., "Big Data and the Utilization of Public Data," Internet and Information Security, Vol.2, No.2(2011), 47-64.
17 Linoff, G. S. and M. J. A. Berry, Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management, Third Edition, Wiley Publishing, Inc., Indiana, 2011.
18 Raj, S. B. E. and A. A. Portia, "Analysis on Credit Card Fraud Detection Methods," Proceedings of 2011 International Conference on Computing, Communication and Electrical Technology, (2011), 152-156.
19 Ramamoorti, S., "The psychology and sociology of fraud: Integrating the behavioral sciences component into fraud and forensic accounting curricula." Issues in Accounting Education, Vol.23, No.4(2008), 521-533.   DOI   ScienceOn
20 Singleton, T. W. and A. J. Singleton. Fraud auditing and forensic accounting, 4th ed., John Wiley & Sons, New Jersey, 2010.
21 Whiting, D. G., J. V. Hansen, J. B. McDonald, and C. Albrecht, "Machine Learning Methods for Detecting Patterns of Management Fraud," Computational Intelligence, Vol.28, No.4(2012), 505-527.   DOI   ScienceOn
22 Wi, T. S. and S. K. Kwon, "Reorganization of the Agricultural Wholesale Market," Korean Journal of Food Marketing Economics, Vol.26, No.3(2009), 75-93.