2011
DOI: 10.1016/j.dss.2010.08.018
|View full text |Cite
|
Sign up to set email alerts
|

Detecting complex account fraud in the enterprise: The role of technical and non-technical controls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 58 publications
0
11
0
Order By: Relevance
“…Corporations may also be reluctant to admit that they have a fraud or security problem within their operations. Managers may not wish to open their corporation to enquiry or analysis by outside groups, including academic researchers, lest it affect their reputation in the market [17]. It is rare for external auditors to be granted access to raw, unsanitized data.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Corporations may also be reluctant to admit that they have a fraud or security problem within their operations. Managers may not wish to open their corporation to enquiry or analysis by outside groups, including academic researchers, lest it affect their reputation in the market [17]. It is rare for external auditors to be granted access to raw, unsanitized data.…”
Section: Resultsmentioning
confidence: 99%
“…FS and FE are dissimilar methods used to alleviate the curse of dimensionality problem [17]. Both methods can simplify the detection model as well as increase the processing speed of calculation, leading to better response time.…”
Section: Resultsmentioning
confidence: 99%
“…Moreover, results of research into a large telecommunication company imply that technical checks detect a mere one third of cases of frauds. More complex frauds are detected by a number of technical and social-technical checks both from the inside and outside of companies (Goode and Lacey, 2011). The main methods (strategies) with respect to creative accounting and accounting frauds were selected for an analysis of the impact of creative accounting techniques by the M-score CFEBT model.…”
Section: Methodsmentioning
confidence: 99%
“…Organizations that achieve a greater balance between technical and non-technical controls achieve greater compliance with regulatory requirements and more effective risk management (Goode & Lacey, 2011;Kwon & Johnson, 2013). Technical controls are well suited to prevent and detect known threats, but are less effective against new or complex threats (Goode & Lacey, 2011). Non-technical controls can be used to gather the data necessary to develop technical controls to mitigate risk from new or complex threats, thereby reducing costs (Goode & Lacey, 2011).…”
Section: Iss Managementmentioning
confidence: 99%
“…Technical controls are well suited to prevent and detect known threats, but are less effective against new or complex threats (Goode & Lacey, 2011). Non-technical controls can be used to gather the data necessary to develop technical controls to mitigate risk from new or complex threats, thereby reducing costs (Goode & Lacey, 2011).…”
Section: Iss Managementmentioning
confidence: 99%