skip to main content
10.1145/2947626.2947655acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud

Published:20 July 2016Publication History

ABSTRACT

This paper presents an attributed graph-based approach to an intricate data mining problem of revealing affiliated, interdependent entities that might be at risk of being tempted into fraudulent transfer pricing. We formalize the notions of controlled transactions and interdependent parties in terms of graph theory. We investigate the use of clustering and rule induction techniques to identify candidate groups (hot spots) of suspect entities. Further, we find entities that require special attention with respect to transfer pricing audits using network analysis and visualization techniques in IBM i2 Analyst's Notebook.

References

  1. 2015-16 Worldwide Transfer Pricing Reference Guide, EY Report, http://www.ey.com/GL/en/Services/Tax/International-Tax/Transfer-Pricing-and-Tax-Effective-Supply-Chain-Management/Worldwide-Transfer-Pricing-Reference-Guide---Country-list (April 7, 2015)Google ScholarGoogle Scholar
  2. Barson, P., Davey, N., Field, S. D. H., Frank R. J., and McAskie, G. 1996. The Detection of Fraud in Mobile Phone Networks, Neural Network World, Vol 6, No 4.Google ScholarGoogle Scholar
  3. Brause, R., Langsdorf, T. and Hepp, M. 1999. Neural Data Mining for Credit Card Fraud Detection. In Proc. of 11th IEEE International Conference on Tools with Artificial Intelligence. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Brockett, P., Derrig, R., Golden, L., Levine, A. and Alpert, M. 2002. Fraud Classification using Principal Component Analysis of RIDITs. Journal of Risk and Insurance 69(3): pp.341--371.Google ScholarGoogle ScholarCross RefCross Ref
  5. Chen, R., Chiu, M., Huang, Y. and Chen, L. 2004. Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines. In Proc. of IDEAL, pp.800--806 (2004)Google ScholarGoogle Scholar
  6. Cox, E. 1995. A Fuzzy System for Detecting Anomalous Behaviors in Healthcare Provider Claims. In Intelligent Systems for Finance and Business, Goonatilake, S. & Treleaven, P., Eds, pp.111--134.Google ScholarGoogle Scholar
  7. Eden, L. and Smith, L.M. 2011. The Ethics of Transfer Pricing, In AOS Workshop on Fraud in Accounting, Organizations and Society, Imperial College, London, UK, April 1-2,Google ScholarGoogle Scholar
  8. Fanning, K. and Cogger, K. 1998. Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management 7, pp.21--41.Google ScholarGoogle ScholarCross RefCross Ref
  9. Gao, Z. and Ye, M. 2007. A framework for data mining-based anti-money laundering research, Journal of Money Laundering Control 2, Vol. 10, pp.170--179. DOI= http://www.emeraldinsight.com/doi/abs/10.1108/13685200710746875Google ScholarGoogle ScholarCross RefCross Ref
  10. Ghosh, Reilly, D.L. 1994. Credit Card Fraud Detection with a Neural-Network. In Proceedings of the International Conference on System Science, pp.621--630.Google ScholarGoogle ScholarCross RefCross Ref
  11. Global Transfer Pricing Review, KPMG Report, https://home.kpmg.com/xx/en/home/insights/2013/04/kpmg-global-transfer-pricing-review.html (April 7, 2015)Google ScholarGoogle Scholar
  12. Green, B. and Choi, J. 1997. Assessing the risk of management fraud through neural network technology. Auditing: A Journal of Practice & Theory, Vol. 16, No. 1, Spring.Google ScholarGoogle Scholar
  13. He H., Wang, J., Graco, W., and Hawkins, S. 1997. Application of Neural Networks to Detection of Medical Fraud. Expert Systems with Applications, 13, pp.329--336.Google ScholarGoogle ScholarCross RefCross Ref
  14. Huang, Z. 1998. Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Mining and Knowledge Discovery 2(3), pp.283--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Knyazeva, M., Tselykh, A.N., Tselykh, A.A., and Popkova, E. 2015. Graph-based data mining approach to preventing financial fraud: a case study. In Proceedings of the 8th International Conference on Security of Information and Networks (SIN '15): pp. 109--113. DOI= http://dx.doi.org/10.1145/2799979.2800002 Google ScholarGoogle ScholarCross RefCross Ref
  16. Levi, M. and Reuter, P. 2006. Money laundering. Crime and Justice, 34, pp. 289--375.Google ScholarGoogle ScholarCross RefCross Ref
  17. Lin, J., Hwang, M., and Becker, J. 2003. A fuzzy neural network for assessing the risk of fraudulent financial reporting. Managerial Auditing Journal 18 (8), pp.657--665.Google ScholarGoogle ScholarCross RefCross Ref
  18. Maes, S., Tuyls, K., Vanschoenwinkel, B., and Manderick, B. 2002. Credit card fraud detection using bayesian and neural networks. In Proc. of the 1st International NAISO Congress on Neuro Fuzzy Technologies, January 6-19.Google ScholarGoogle Scholar
  19. Pak, S. and J. Zdanowicz. 2005. Pilot Study for US Congress -- Analysis of the U.S. Merchandise Trade Data Base: The Detection of Abnormal Transfer Pricing and The Collection of Under-payments of U.S. Income Taxes.Google ScholarGoogle Scholar
  20. Williams, G. 1999. Evolutionary Hot Spots Methodology Data Mining: An Architecture for Exploring for Interesting Discoveries, In Proceedings of the 3rd Pacific-Asia Conference in Knowledge Discovery and Data Mining, Beijing, China. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Williams, G. J. and Huang, Z. 1997. Mining the Knowledge mine: The Hot Spots Methodology for Mining Large Real World Databases, In Proceedings of the 10th Australian Joint Conference on Artificial Intelligence Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SIN '16: Proceedings of the 9th International Conference on Security of Information and Networks
    July 2016
    186 pages
    ISBN:9781450347648
    DOI:10.1145/2947626

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 July 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper
    • Research
    • Refereed limited

    Acceptance Rates

    SIN '16 Paper Acceptance Rate12of46submissions,26%Overall Acceptance Rate102of289submissions,35%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader