ABSTRACT
This paper presents an attributed graph-based approach to an intricate data mining problem of revealing affiliated, interdependent entities that might be at risk of being tempted into fraudulent transfer pricing. We formalize the notions of controlled transactions and interdependent parties in terms of graph theory. We investigate the use of clustering and rule induction techniques to identify candidate groups (hot spots) of suspect entities. Further, we find entities that require special attention with respect to transfer pricing audits using network analysis and visualization techniques in IBM i2 Analyst's Notebook.
- 2015-16 Worldwide Transfer Pricing Reference Guide, EY Report, http://www.ey.com/GL/en/Services/Tax/International-Tax/Transfer-Pricing-and-Tax-Effective-Supply-Chain-Management/Worldwide-Transfer-Pricing-Reference-Guide---Country-list (April 7, 2015)Google Scholar
- Barson, P., Davey, N., Field, S. D. H., Frank R. J., and McAskie, G. 1996. The Detection of Fraud in Mobile Phone Networks, Neural Network World, Vol 6, No 4.Google Scholar
- Brause, R., Langsdorf, T. and Hepp, M. 1999. Neural Data Mining for Credit Card Fraud Detection. In Proc. of 11th IEEE International Conference on Tools with Artificial Intelligence. Google ScholarDigital Library
- Brockett, P., Derrig, R., Golden, L., Levine, A. and Alpert, M. 2002. Fraud Classification using Principal Component Analysis of RIDITs. Journal of Risk and Insurance 69(3): pp.341--371.Google ScholarCross Ref
- Chen, R., Chiu, M., Huang, Y. and Chen, L. 2004. Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines. In Proc. of IDEAL, pp.800--806 (2004)Google Scholar
- Cox, E. 1995. A Fuzzy System for Detecting Anomalous Behaviors in Healthcare Provider Claims. In Intelligent Systems for Finance and Business, Goonatilake, S. & Treleaven, P., Eds, pp.111--134.Google Scholar
- Eden, L. and Smith, L.M. 2011. The Ethics of Transfer Pricing, In AOS Workshop on Fraud in Accounting, Organizations and Society, Imperial College, London, UK, April 1-2,Google Scholar
- Fanning, K. and Cogger, K. 1998. Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management 7, pp.21--41.Google ScholarCross Ref
- Gao, Z. and Ye, M. 2007. A framework for data mining-based anti-money laundering research, Journal of Money Laundering Control 2, Vol. 10, pp.170--179. DOI= http://www.emeraldinsight.com/doi/abs/10.1108/13685200710746875Google ScholarCross Ref
- Ghosh, Reilly, D.L. 1994. Credit Card Fraud Detection with a Neural-Network. In Proceedings of the International Conference on System Science, pp.621--630.Google ScholarCross Ref
- Global Transfer Pricing Review, KPMG Report, https://home.kpmg.com/xx/en/home/insights/2013/04/kpmg-global-transfer-pricing-review.html (April 7, 2015)Google Scholar
- Green, B. and Choi, J. 1997. Assessing the risk of management fraud through neural network technology. Auditing: A Journal of Practice & Theory, Vol. 16, No. 1, Spring.Google Scholar
- He H., Wang, J., Graco, W., and Hawkins, S. 1997. Application of Neural Networks to Detection of Medical Fraud. Expert Systems with Applications, 13, pp.329--336.Google ScholarCross Ref
- Huang, Z. 1998. Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Mining and Knowledge Discovery 2(3), pp.283--304. Google ScholarDigital Library
- Knyazeva, M., Tselykh, A.N., Tselykh, A.A., and Popkova, E. 2015. Graph-based data mining approach to preventing financial fraud: a case study. In Proceedings of the 8th International Conference on Security of Information and Networks (SIN '15): pp. 109--113. DOI= http://dx.doi.org/10.1145/2799979.2800002 Google ScholarCross Ref
- Levi, M. and Reuter, P. 2006. Money laundering. Crime and Justice, 34, pp. 289--375.Google ScholarCross Ref
- Lin, J., Hwang, M., and Becker, J. 2003. A fuzzy neural network for assessing the risk of fraudulent financial reporting. Managerial Auditing Journal 18 (8), pp.657--665.Google ScholarCross Ref
- Maes, S., Tuyls, K., Vanschoenwinkel, B., and Manderick, B. 2002. Credit card fraud detection using bayesian and neural networks. In Proc. of the 1st International NAISO Congress on Neuro Fuzzy Technologies, January 6-19.Google Scholar
- Pak, S. and J. Zdanowicz. 2005. Pilot Study for US Congress -- Analysis of the U.S. Merchandise Trade Data Base: The Detection of Abnormal Transfer Pricing and The Collection of Under-payments of U.S. Income Taxes.Google Scholar
- Williams, G. 1999. Evolutionary Hot Spots Methodology Data Mining: An Architecture for Exploring for Interesting Discoveries, In Proceedings of the 3rd Pacific-Asia Conference in Knowledge Discovery and Data Mining, Beijing, China. Google ScholarDigital Library
- Williams, G. J. and Huang, Z. 1997. Mining the Knowledge mine: The Hot Spots Methodology for Mining Large Real World Databases, In Proceedings of the 10th Australian Joint Conference on Artificial Intelligence Google ScholarDigital Library
Recommendations
A graph-based data mining approach to preventing financial fraud: a case study
SIN '15: Proceedings of the 8th International Conference on Security of Information and NetworksIn this paper, we present a graph-based approach to a data mining problem of exploring and revealing domain groups of users prone to committing financial fraud. Data mining in financial applications refers to extracting and organizing knowledge from ...
Attributed graph mining in the presence of automorphism
Attributed directed graphs are directed graphs in which nodes are associated with sets of attributes. Many data from the real world can be naturally represented by this type of structure, but few algorithms are able to directly handle these complex ...
Data mining for credit card fraud: A comparative study
Credit card fraud is a serious and growing problem. While predictive models for credit card fraud detection are in active use in practice, reported studies on the use of data mining approaches for credit card fraud detection are relatively few, possibly ...
Comments