Responsive image
博碩士論文 etd-0602122-215405 詳細資訊
Title page for etd-0602122-215405
論文名稱
Title
文字探勘偵測財務報表詐欺
Text-based Fraud Detection on Financial Statements
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
55
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2022-06-27
繳交日期
Date of Submission
2022-07-02
關鍵字
Keywords
財務報表、詐欺、BERT、LDA、文字探勘、詐欺用字
Financial Statements, Fraud, BERT, LDA, Text Mining, Fraudulent words
統計
Statistics
本論文已被瀏覽 447 次,被下載 0
The thesis/dissertation has been browsed 447 times, has been downloaded 0 times.
中文摘要
隨著時代的演進,財務欺詐成為一個全球性問題,對公司和相關利益相關者造成嚴重的負面影響,一個普通的組織應該預計由於欺詐造成的損失佔 3% 到 6%,在某些情況下甚至高達 10%,而自 2009 年以來,欺詐造成的損失增加了 56.5%,這個情況在近二十年中變得更加嚴重,在嚴重的情況下,欺詐活動可能導致公司和相關利益相關者破產,各種業務和公司都受到欺詐的影響。
在過去的文獻中,有很多研究針對財務詐欺進行研究,而對於財務報表,已經有許多文本挖掘和計算智能方法應用於檢測財務報表欺詐,像是支持向量機、決策樹、神經網路等等,但並沒有使用BERT來進行偵測,因此本研究運用這個新興模型來檢測財務報表欺詐,此外,本研究運用Entropy impurity、TF-IDF以及LDA來歸納出針對財務報表詐欺用字的分類,讓使用者能清楚知道財務報表的詐欺出現在哪方面。
在未來研究的延伸中,可以將分析目標擴大到其它的領域,成為不同領域的詐欺判斷工具。
Abstract
As time elapsed, financial fraud has become a global problem that impacts a severe negative impact on the company and relevant stakeholders. An average organization should expect losses due to fraud to account for between 3% and 6%, in some cases are as high as 10%. Since 2009, losses owing to fraud have risen by 56.5%, and this situation has become more serious in the past two decades, in severe cases, fraudulent activities can lead to bankruptcy of companies and related stakeholders, and all kinds of businesses and companies are influenced by fraud.
In the past literature, there are many studies on financial fraud. For financial statements, there also have been many text mining and computational intelligence methods applied to detect financial statement fraud, for instance, support vector machines, decision trees, neural networks, etc., but there did not have study using BERT for detection, thus this study uses this emerging model to detect financial statement fraud. In addition, this research uses Entropy impurity, TF-IDF, and LDA to summarize the classification of words used for financial statement fraud, allowing users can clearly know where the fraud in the financial statements occurs.
In the extension of future research, the analysis target can be expanded to other fields and become a fraud judgment tool in different fields.
目次 Table of Contents
論文審定書 i
致謝 ii
摘要 iii
Abstract iv
TABLE OF CONTENTS vi
LIST OF FIGURES viii
LIST OF TABLES ix
CHAPTER 1 Introduction 1
1.1 Research background and motivation 1
1.2 Research purpose and goals 2
1.3 Organization of the research 2
CHAPTER 2 Literature Review 4
2.1 Financial fraud 4
2.2 Financial statement fraud 6
2.2.1 Fraud triangle 7
2.2.2 Five interactive factors of financial statement fraud - CRIME 9
2.2.3 Management theories of the behavioral aspects of fraud 10
2.2.4 Financial statement fraud detection methods 11
2.2.5 Case in Taiwan 12
CHAPTER 3 PROPOSED RESEARCH APPROACH 14
3.1 Data collection & preprocess 15
3.2 Fraudulent word differentiation 17
3.3 LDA fraudulent topics 20
3.4 BERT fraudulent word expansion 22
3.5 Fraudulent financial statement determination 25
CHAPTER 4 Experiments and results 27
4.1 Data analysis 27
4.2 Fraudulent words 29
4.3 Model training 35
4.4 Model validations 36
4.5 Managerial implications 38
CHAPTER 5 Conclusions 40
5.1 Concluding remarks 40
5.2 Research limitations 40
5.3 Future work 41
References 42
參考文獻 References
Albrecht, C., Albrecht, C. C., Dolan, S., and Malagueno, R. 2008. "Financial Statement Fraud: Learn from the Mistakes of the Us or Follow in the Footsteps of Its Errors1," Corporate Finance Review (12:4), p. 5.
Albrecht, S., and Albrecht, W. S. 1982. How to Detect and Prevent Business Fraud. Prentice-Hall Englewood Cliffs, NJ.
Albrecht, W., Albrecht, C. C., and Albrecht, C. O. 2004. "Fraud and Corporate Executives: Agency, Stewardship and Broken Trust,").
Anand, V., Ashforth, B. E., and Joshi, M. 2004. "Business as Usual: The Acceptance and Perpetuation of Corruption in Organizations," Academy of Management Perspectives (18:2), pp. 39-53.
Aronson, E. 1992. "The Return of the Repressed: Dissonance Theory Makes a Comeback," Psychological inquiry (3:4), pp. 303-311.
Beasley, M. S. 1996. "An Empirical Analysis of the Relation between the Board of Director Composition and Financial Statement Fraud," Accounting review), pp. 443-465.
Black, W. K. 2006. "Book Review: Control Fraud Theory V. The Protocols," Crime, Law and Social Change (45:3), p. 241.
Brief, A. P., Buttram, R. T., and Dukerich, J. M. 2001. "Collective Corruption in the Corporate World: Toward a Process Model," Groups at work: Theory and research (471:3), pp. 499-511.
Cecchini, M., Aytug, H., Koehler, G. J., and Pathak, P. 2010. "Making Words Work: Using Financial Text as a Predictor of Financial Events," Decision Support Systems (50:1), pp. 164-175.
Craja, P., Kim, A., and Lessmann, S. 2020. "Deep Learning for Detecting Financial Statement Fraud," Decision Support Systems (139), p. 113421.
Cressey, D. R. 1953. "Other People's Money; a Study of the Social Psychology of Embezzlement,").
Davis, J. H., Schoorman, F. D., and Donaldson, L. 1997. "Toward a Stewardship Theory of Management," Academy of Management review (22:1), pp. 20-47.
Dechow, P. M., Ge, W., Larson, C. R., and Sloan, R. G. 2011. "Predicting Material Accounting Misstatements," Contemporary accounting research (28:1), pp. 17-82.
Donaldson, L., and Davis, J. H. 1991. "Stewardship Theory or Agency Theory: Ceo Governance and Shareholder Returns," Australian Journal of management (16:1), pp. 49-64.
Elliott, R. K., and Willingham, J. J. 1980. Management Fraud: Detection and Deterrence. Petrocelli Books New York.
Gates, S., Prachyl, C. L., and Sullivan, C. 2016. "Using Report to the Nations on Occupational Fraud and Abuse to Stimulate Discussion of Fraud in Accounting and Business Classes," Journal of Business and Behavioral Sciences (28:1), p. 106.
Gee, J., and Button, M. 2019. "The Financial Cost of Fraud 2019: The Latest Data from around the World,").
Glancy, F. H., and Yadav, S. B. 2011. "A Computational Model for Financial Reporting Fraud Detection," Decision Support Systems (50:3), pp. 595-601.
Goel, S., Gangolly, J., Faerman, S. R., and Uzuner, O. 2010. "Can Linguistic Predictors Detect Fraudulent Financial Filings?," Journal of Emerging Technologies in Accounting (7:1), pp. 25-46.
Goldmann, P. 2010. Fraud in the Markets: Why It Happens and How to Fight It. John Wiley & Sons.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., and Kalita, J. K. 2014. "Network Attacks: Taxonomy, Tools and Systems," Journal of Network and Computer Applications (40), pp. 307-324.
Jan, C.-L. 2021. "Detection of Financial Statement Fraud Using Deep Learning for Sustainable Development of Capital Markets under Information Asymmetry," Sustainability (13:17), p. 9879.
Jensen, M. C., and Meckling, W. H. 1976. "Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure," Journal of financial economics (3:4), pp. 305-360.
Kim, M.-Y., and Goebel, R. 2010. "Detection and Normalization of Medical Terms Using Domain-Specific Term Frequency and Adaptive Ranking," Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine: IEEE, pp. 1-5.
Kirkos, E., Spathis, C., and Manolopoulos, Y. 2007. "Data Mining Techniques for the Detection of Fraudulent Financial Statements," Expert systems with applications (32:4), pp. 995-1003.
Kotsiantis, S., Koumanakos, E., Tzelepis, D., and Tampakas, V. 2006. "Forecasting Fraudulent Financial Statements Using Data Mining," International journal of computational intelligence (3:2), pp. 104-110.
Kumar, P. A. R., and Selvakumar, S. 2013. "Detection of Distributed Denial of Service Attacks Using an Ensemble of Adaptive and Hybrid Neuro-Fuzzy Systems," Computer Communications (36:3), pp. 303-319.
La Porta, R., Lopez‐de‐Silanes, F., and Shleifer, A. 1999. "Corporate Ownership around the World," The journal of finance (54:2), pp. 471-517.
Lin, C.-C., Chiu, A.-A., Huang, S. Y., and Yen, D. C. 2015. "Detecting the Financial Statement Fraud: The Analysis of the Differences between Data Mining Techniques and Experts’ Judgments," Knowledge-Based Systems (89), pp. 459-470.
Lin, T.-H. 2009. "A Cross Model Study of Corporate Financial Distress Prediction in Taiwan: Multiple Discriminant Analysis, Logit, Probit and Neural Networks Models," Neurocomputing (72:16-18), pp. 3507-3516.
Mithe, R., Indalkar, S., and Divekar, N. 2013. "Optical Character Recognition," International journal of recent technology and engineering (IJRTE) (2:1), pp. 72-75.
Olszewski, D. 2011. "Fraud Detection in Telecommunications Using Kullback-Leibler Divergence and Latent Dirichlet Allocation," International Conference on Adaptive and Natural Computing Algorithms: Springer, pp. 71-80.
Olszewski, D. 2012. "A Probabilistic Approach to Fraud Detection in Telecommunications," Knowledge-Based Systems (26), pp. 246-258.
Pai, P.-F., Hsu, M.-F., and Wang, M.-C. 2011. "A Support Vector Machine-Based Model for Detecting Top Management Fraud," Knowledge-Based Systems (24:2), pp. 314-321.
Pinder, C. C. 1998. "Motivation in Work Organizations." Upper Saddle River, NJ: Prentice Hall.
Power, M. K. 2003. "Auditing and the Production of Legitimacy," Accounting, organizations and society (28:4), pp. 379-394.
Pressman, S. 1998. "On Financial Frauds and Their Causes: Investor Overconfidence," American Journal of economics and sociology (57:4), pp. 405-421.
Purda, L., and Skillicorn, D. 2015. "Accounting Variables, Deception, and a Bag of Words: Assessing the Tools of Fraud Detection," Contemporary Accounting Research (32:3), pp. 1193-1223.
Reurink, A. 2018. "Financial Fraud: A Literature Review," Journal of Economic Surveys (32:5), pp. 1292-1325.
Rezaee, Z. 2002. Financial Statement Fraud: Prevention and Detection. John Wiley & Sons.
Rezaee, Z. 2005. "Causes, Consequences, and Deterence of Financial Statement Fraud," Critical perspectives on Accounting (16:3), pp. 277-298.
Schilit, H. 2010. Financial Shenanigans. Tata McGraw-Hill Education.
Sutherland, E. H. 1983. "White Collar Crime," in White Collar Crime. Yale University Press.
Tenbrunsel, A. E., and Messick, D. M. 2004. "Ethical Fading: The Role of Self-Deception in Unethical Behavior," Social justice research (17:2), pp. 223-236.
Tsang, J.-A. 2002. "Moral Rationalization and the Integration of Situational Factors and Psychological Processes in Immoral Behavior," Review of General Psychology (6:1), pp. 25-50.
Wang, L., and Wu, C. 2017. "Business Failure Prediction Based on Two-Stage Selective Ensemble with Manifold Learning Algorithm and Kernel-Based Fuzzy Self-Organizing Map," Knowledge-Based Systems (121), pp. 99-110.
Weaver, G. R. 2006. "Virtue in Organizations: Moral Identity as a Foundation for Moral Agency," Organization studies (27:3), pp. 341-368.
Yao, J., Zhang, J., and Wang, L. 2018. "A Financial Statement Fraud Detection Model Based on Hybrid Data Mining Methods," 2018 international conference on artificial intelligence and big data (ICAIBD): IEEE, pp. 57-61.
Zhang, B., Zhou, Y., and Faloutsos, C. 2008. "Toward a Comprehensive Model in Internet Auction Fraud Detection," Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008): IEEE, pp. 79-79.

電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:開放下載的時間 available 2025-07-02
校外 Off-campus:開放下載的時間 available 2025-07-02

您的 IP(校外) 位址是 3.145.60.166
現在時間是 2024-04-24
論文校外開放下載的時間是 2025-07-02

Your IP address is 3.145.60.166
The current date is 2024-04-24
This thesis will be available to you on 2025-07-02.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 2025-07-02

QR Code