Publications-Theses
Article View/Open
Publication Export
-
Google ScholarTM
NCCU Library
Citation Infomation
Related Publications in TAIR
題名 適用於財務舞弊偵測之決策支援系統的對偶方法
A dual approach for decision support in financial fraud detection作者 黃馨瑩
Huang, Shin Ying貢獻者 蔡瑞煌
Tsaih, Rua Huan
黃馨瑩
Huang, Shin Ying關鍵詞 增長層級式自我組織映射網路
非監督式類神經網路
分類
財務舞弊偵測
財務報表舞弊
Growing Hierarchical Self-Organizing Map
Unsupervised Neural Networks
Classification
Financial Fraud Detection
Fraudulent Financial Reporting日期 2011 上傳時間 30-Oct-2012 11:21:09 (UTC+8) 摘要 增長層級式自我組織映射網路(GHSOM)屬於一種非監督式類神經網路,為自我組織映射網路(SOM)的延伸,擅長於對樣本分群,以輔助分析樣本族群裡的共同特徵,並且可以透過族群間存在的空間關係假設來建立分類器,進而辨別出異常的資料。因此本研究提出一個創新的對偶方法(即為一個建立決策支援系統架構的方法)分別對舞弊與非舞弊樣本分群,首先兩類別之群組會被配對,即辨識某一特定無弊群體的非舞弊群體對照組,針對這些配對族群,套用基於不同空間假設所設立的分類規則以檢測舞弊與非舞弊群體中是否有存在某種程度的空間關係,此外並對於舞弊樣本的分群結果加入特徵萃取機制。分類績效最好的分類規則會被用來偵測受測樣本是否有舞弊的嫌疑,萃取機制的結果則會用來標示有舞弊嫌疑之受測樣本的舞弊行為特徵以及相關的輸入變數,以做為後續的決策輔助。更明確地說,本研究分別透過非舞弊樣本與舞弊樣本建立一個非舞弊GHSOM樹以及舞弊GHSOM樹,且針對每一對GHSOM群組建立分類規則,其相應的非舞弊/舞弊為中心規則會適應性地依循決策者的風險偏好最佳化調整規則界線,整體而言較優的規則會被決定為分類規則。非舞弊為中心的規則象徵絕大多數的舞弊樣本傾向分布於非舞弊樣本的周圍,而舞弊為中心的規則象徵絕大多數的非舞弊樣本傾向分布於舞弊樣本的周圍。此外本研究加入了一個特徵萃取機制來發掘舞弊樣本分群結果中各群組之樣本資料的共同特質,其包含輸入變數的特徵以及舞弊行為模式,這些資訊將能輔助決策者(如資本提供者)評估受測樣本的誠實性,輔助決策者從分析結果裡做出更進一步的分析來達到審慎的信用決策。本研究將所提出的方法套用至財報舞弊領域(屬於財務舞弊偵測的子領域)進行實證,實驗結果證實樣本之間存在特定的空間關係,且相較於其他方法如SVM、SOM+LDA和GHSOM+LDA皆具有更佳的分類績效。因此顯示本研究所提出的機制可輔助驗證財務相關數據的可靠性。此外,根據SOM的特質,即任何受測樣本歸類到某特定族群時,該族群訓練樣本的舞弊行為特徵將可以代表此受測樣本的特徵推論。這樣的原則可以用來協助判斷受測樣本的可靠性,並可供持續累積成一個舞弊知識庫,做為進一步分析以及制定相關信用決策的參考。本研究所提出之基於對偶方法的決策支援系統架構可以被套用到其他使用財務數據為資料來源的財務舞弊偵測情境中,作為輔助決策的基礎。
The Growing Hierarchical Self-Organizing Map (GHSOM) is extended from the Self-Organizing Map (SOM). The GHSOM’s unsupervised learning nature such as the adaptive group size as well as the hierarchy structure renders its availability to discover the statistical salient features from the clustered groups, and could be used to set up a classifier for distinguishing abnormal data from regular ones based on spatial relationships between them.Therefore, this study utilizes the advantage of the GHSOM and pioneers a novel dual approach (i.e., a proposal of a DSS architecture) with two GHSOMs, which starts from identifying the counterparts within the clustered groups. Then, the classification rules are formed based on a certain spatial hypothesis, and a feature extraction mechanism is applied to extract features from the fraud clustered groups. The dominant classification rule is adapted to identify suspected samples, and the results of feature extraction mechanism are used to pinpoint their relevant input variables and potential fraud activities for further decision aid.Specifically, for the financial fraud detection (FFD) domain, a non-fraud (fraud) GHSOM tree is constructed via clustering the non-fraud (fraud) samples, and a non-fraud-central (fraud-central) rule is then tuned via inputting all the training samples to determine the optimal discrimination boundary within each leaf node of the non-fraud (fraud) GHSOM tree. The optimization renders an adjustable and effective rule for classifying fraud and non-fraud samples. Following the implementation of the DSS architecture based on the proposed dual approach, the decision makers can objectively set their weightings of type I and type II errors. The classification rule that dominates another is adopted for analyzing samples. The dominance of the non-fraud-central rule leads to an implication that most of fraud samples cluster around the non-fraud counterpart, meanwhile the dominance of fraud-central rule leads to an implication that most of non-fraud samples cluster around the fraud counterpart.Besides, a feature extraction mechanism is developed to uncover the regularity of input variables and fraud categories based on the training samples of each leaf node of a fraud GHSOM tree. The feature extraction mechanism involves extracting the variable features and fraud patterns to explore the characteristics of fraud samples within the same leaf node. Thus can help decision makers such as the capital providers evaluate the integrity of the investigated samples, and facilitate further analysis to reach prudent credit decisions.The experimental results of detecting fraudulent financial reporting (FFR), a sub-field of FFD, confirm the spatial relationship among fraud and non-fraud samples. The outcomes given by the implemented DSS architecture based on the proposed dual approach have better classification performance than the SVM, SOM+LDA, GHSOM+LDA, SOM, BPNN and DT methods, and therefore show its applicability to evaluate the reliability of the financial numbers based decisions. Besides, following the SOM theories, the extracted relevant input variables and the fraud categories from the GHSOM are applicable to all samples classified into the same leaf nodes. This principle makes that the extracted pre-warning signal can be applied to assess the reliability of the investigated samples and to form a knowledge base for further analysis to reach a prudent decision. The DSS architecture based on the proposed dual approach could be applied to other FFD scenarios that rely on financial numbers as a basis for decision making.參考文獻 Aas, K., and Eikvil, L. (1999). Text categorization: A survey, Technical Report, 941, Norwegian Computing Center.Agyemang, M., Barker, K., and Alhajj, R. (2006). A comprehensive survey of numeric and symbolic outlier mining techniques, Intelligent Data Analysis, 10(6), 521–538.Altman, E.I. (1968). Financial ratios, discriminant analysis and the prediction of corporate bankruptcy, Journal of Finance, 23(4), 589–609.American Institute of Certified Public Accountants (AICPA) (2002). Statement on Auditing Standards No. 99: Consideration of Fraud in a Financial Statement Audit [Electronic Version]. http://www.aicpa.org/download/members/div/auditstd/AU-00316.PDF.Antonio, S.A., David, M.G., Emilio, S.O. Alberto, P., Rafael, M.B., and Antonio, S. L. (2008). Web mining based on Growing Hierarchical Self-Organizing Maps: Analysis of a real citizen web portal, Expert Systems with Applications, 34(4), 2988–2994.Association of Certified Fraud Examiners (ACFE) (1998). 1998 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.Association of Certified Fraud Examiners (ACFE). (2008). 2008 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.Basens, B., Setiono, B., Mues, C., and Vanthienen, J. (2003). Using neural network rule extraction and decision tables for credit-risk evaluation, Management Science, (49:3), 312–319.Beasley, M.S., Carcello, J.V., and Hermanson, D.R. (1999). Fraudulent financial reporting: 1987–1997: An analysis of U.S. public companies, COSO, New York.Bell, T. B., and Carcello, J. V. (2000). A decision aid for assessing the likelihood of fraudulent financial reporting, Auditing: A Journal of Practice & Theor, (19:1), 169–184.Bond, C. F., and DePaulo, B. M. (2006). Accuracy of deception judgments, Personality and Social Psychology Review, 10(3), 214–234.Boser, B. E., Guyon, I., and Vapnik, V. (1992). A training algorithm for optimal margin classifiers, Proceedings of the Fifth Annual Workshop on Computational Learning Theory, ACM Press, 144–152.Budayan, C. (2008). Strategic group analysis: Strategic perspective, differentiation and performance in construction, Doctoral dissertation, Middle East Technical University.Budayan, C., Dikmen, I., and Birgonul, M. T. (2009). Comparing the performance of traditional cluster analysis, self-organizing maps and fuzzy C-means method for strategic grouping, Expert Systems with Applications, 36(9), 11772–11781.Canbas, S., Cabuk, A., and Kilic, S.B. (2005). Prediction of commercial bank failure via multivariate statistical analysis of financial structures: The Turkish case, European Journal of Operational Research, 166, 528–546.Carlos, S. C. (1996). Self organizing neural networks for financial diagnosis, Decision Support System, 17, 227–2386.Claessens, S., Djankov, S., and Lang, L. H. P. (2000). The separation of ownership and control in East Asian Corporations, Journal of Financial Economics, 58(1-2), 81–112.Cortes, C., and Vapnik, V. (1995). Support-vector network, Machine Learning, 20, 273–297.Daskalaki, S., Kopanas, I., Goudara, M., and Avouris, N. (2003). Data mining for decision support on customer insolvency in telecommunications business, European Journal of Operational Research, 145, 239–255.Dechow, P. M., Ge, W., Larson, C. R., Sloan, R. G., and Investors, B. G. (2007). Predicting material accounting manipulations, AAA 2007 Financial Accounting and Reporting Section (FARS) [Electronic Version]. http://ssrn.com/abstract=997483.Dechow, P.M., Sloan, R.G., and Sweeney, A.P. (1996). Cause and consequences of earnings manipulation: an analysis of firms subject to enforcement actions by the SEC," Contemporary Accounting Research, 13(1), 1–36.Desai, V. S., Crook, J. N., and Overstreet, J. (1996). A comparison of neural networks and linear scoring models in the credit union environment, European Journal of Operational Research, 95, 24–37.Dittenbach, M., Merkl, D., and Rauber, A. (2000). The Growing hierarchical self-organizing map, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks- IJCNN 2000.Dittenbach, M., Rauber, A., and Merkl, D. (2002). Uncovering hierarchical structure in data using the growing hierarchical self-organizing map, Neurocomputing, 48(1-4), 199–216.Eklund, T. (2002). Assessing the feasibility of self organizing maps for data mining financial information, ECIS 2002, Gdansk, Poland.Elliot, R., and Willingham, J. (1980). Management fraud: detection and deterrence, Petrocelli, New York, NY.Fanning, K.M., and Cogger, K.O. (1998). Neural network detection of management fraud using published financial data, International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1), 21–41.Farber, D. B. (2005). Restoring trust after fraud: does corporate governance matter?, Accounting Review, 80(2), 539–561.Fukunaga, K. (1990). Introduction to Statistical Pattern Recognition, 2nd Edition, Academic Press, London.Granzow, M., Berrar, D., Dubitzky, W., Schuster, A., Azuaje, F. J., and Eils, R. (2001). Tumor classification by gene expression profiling: Comparison and validation of five clustering methods, SIGBIO Newsletter, 21(1), 16–22.Green, P., and Choi, J. H. (1997). Assessing the risk of management fraud through neural network technology, Auditing: A Journal of Practice & Theory, 16(1), 14–28.Guo, Y., Hu, J., and Peng, Y. (2011). Research on CBR system based on data mining, Applied Soft Computing, 11(8), 5006–5014.Hoogs, B., Kiehl, T., Lacomb, C., and Senturk, D. (2007). A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud, Intelligent Systems in Accounting Finance and Management, (15:1/2), 41–56.Hsu, K. Y. (2008). Exploring financial reporting fraud, M.A. Thesis, National Chengchi University, Department of Management Information System.Hsu, S. H., Hsieh, J. P. A., Chih, T. C., and Hsu, K. C. (2009). A two-stage architecture for stock price forecasting by integrating self-organizing map and support vector regression, Expert Systems with Applications, 36(4), 7947–7951.Hsu, C. W., Chang, C. C., and Lin, C. J. (2010). A practical guide to support vector classification, Technical Report, National Taiwan University.Huang, S. Y., Tsaih, R. H., and Lin, W. Y. (2012). Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting, Industrial Management & Data Systems, 112(2), 224–244.Huang, S. Y., and Tsaih, R. H. (2012). The Prediction Approach with Growing Hierarchical Self-Organizing Map, Proceedings of the International Joint Conference on Neural Networks (IJCNN), 838-844.Huang, S. Y., and Tsaih, R. H., Fang, Y. (2012). The Dual Approach for Decision Making, The 2012 Decision Sciences Institute Annual Meeting (DSI), San Francisco, USA.Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., and Felix, W. F. (2010). Identification of fraudulent financial statements using linguistic credibility analysis, Decision Support Systems, 50(3), 585–594.Jain, A., Murty, M., and Flynn, P. (1999). Data clustering: a review. ACM Computing Surveys, 31(3), 264–323.Jiang, J. (1999). Image compression with neural networks - a survey, Signal Process Image Communication, 14(9-7), 737–760.Jolliffe, I. T. (1986). Principal Component Analysis, Springer, New York.Jolliffe, I. T. (2002). Principal Component Analysis, second edition, New York: Springer-Verlag New York, Inc.Kaiser, H. F. (1960). The application of electronic computers to factor analysis, Educational and Psychological Measurement, 20, 141–151.Khan A.U., Sharma, T. K., and Sharma, S. (2009). Classification of Stocks Using Self Organizing Map, International Journal of Soft Computing Applications, 4, 19–24.Klein M, and Methlie, L. B. (1995). Knowledge-Based Decision Support Systems with Applications in Business, 2nd edn, Wiley.Kirkos, E., Spathis, C., and Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements, Expert Systems with Applications, 32(4), 995–1003.Kohonen, T. (1982). Self-organized formation of topologically correct feature maps, Biological Cybernetics, (43), 59–69.Kohonen, T. (1989), Self Organization and Associative Memory, 3rd ed. Springer, Berlin.Kohonen, T. (1995), Self-Organizing Maps, Springer, Berlin.KPMG Peat Marwick (1998), Fraud Survey, KPMG peat Marwick, Montvale, NJ.La Porta, R., Lopez-de-Silanes, F., Shleifer, A., and Vishny, R. (1999). Corporate ownership around the world, Journal of Finance, 54(2), 471–517.Lee, G., T. K. Sung, and Chang, N. (1999). Dynamics of modeling in data mining: interpretive approach to bankruptcy prediction, Journal of Management Information Systems, 16, 63–85.Lee, T. S., Chiu, C. C., Chou, Y. C., and Lu, C. J. (2006). Mining the customer credit using classification and regression tree and multivariate adaptive regression splines, Computational Statistics & Data Analysis, 50, 1113–1130.Lee, T. S., and Yeh, Y. H. (2004). Corporate governance and financial distress: evidence from Taiwan, Corporate Governance: An International Review, 12(3), 378–388.Li, S. (2000). The development of a hybrid intelligent system for developing marketing strategy, Expert Systems with Applications, 27, 395–409.Liu, Y., Yeh, R. H. ,and He, R. (2006). Sea surface temperature patterns on the West Florida Shelf using the Growing Hierarchical Self-Organizing Maps, J. Atmos. Oceanic Technology, 23(2), 325–338.Loebbecke, J. K., Eining, M. M., and Willingham, J. J. (1989). Auditors’ experience with material irregularities: frequency, nature, and detectability, Auditing, 9(1), 1–28.Lu, C. J., and Wang, Y. W. (2010). Combining independent component analysis and growing hierarchical self-organizing maps with support vector regression in product demand forecasting, International Journal of Production Economics, 128(2), 603–613.Mangiameli, P., Chen, S. K., and West, D. (1996). A comparison of SOM neural network and hierarchical clustering methods, European Journal of Operational Research, 93(2), 402–417.Maron, M. E. (1961). Automatic indexing: An experimental inquiry, Journal of the ACM, 8, 404–417.Martín-Guerrero, J.D., Palomares, A., Balaguer-Ballester, E., Soria-Olivas, E., Gómez- Sanchis, J., and Soriano-Asensi, A. (2006). Studying the feasibility of a recommender in a citizen web portal based on user modeling and clustering algorithms, Expert Systems with Applications, 30(2), 299–312.Matsatsinis, N. F., Doumpos, M., and Zopounidis, C. (1997), Knowledge acquisition and representation for expert systems in the field of financial analysis, Expert Systems with Applications, 12, pp. 247–262.Mohanty, R. P., and Deshmukh, S. G. (1997). Evolution of an expert system for human resource planning in a petroleum company, Production Economics, 51, 251–261.Newman, D. P., Patterson, E. and Smith, R. (2001). The influence of potentially fraudulent reports on audit risk assessment and planning. Auditing: A Journal of Practice & Theory, 76(1), 59–80.Ngai, E. W, Yong, H. U., Wong, Y. H., Chen, Y., and Sun, X. (2010). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature, Decision Support Systems =, 50(3), 559–569.Nguyen M. N., Shi, D., and Quek, C. (2008). A nature inspired Ying-Yang approach for intelligent decision support in bank solvency analysis, Expert Systems with Applications, 34(4), 2576–2587Min, J. H., and Lee, Y. C. (2005). Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters, Expert Systems with Applications, 28, 603–614.Oja, E. (1992). Principal components, minor components, and linear neural networks, Neural Networks, 5(6), 927–935.Pagano, R. R. (2001). Understanding Statistics in the Behavioral Sciences, Sixth ed., Wadsworth/Thomson Learning, California.Quinlan, J. R. (1986), Induction of Decision Trees, Machine Learning, 1, 81–106.Quinlan, J. R. (1993), C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers.Quinlan, J. R. (1996), Bagging, boosting, and C4.5., Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96), pp. 725-730.Rasmussen, E. (1992), Information retrieval: data structures and algorithms. Prentice-Hall, Inc.Pearson, K. (1901), On Lines and Planes of Closest Fit to Systems of Points in Space, Philosophical Magazine, 2(6), 559–572.Persons, O. S. (1995), Using financial statement data to identify factors associated with fraudulent financial reporting, Journal of Applied Business Research, 11(3), 38–46.Pinson, S. (1992), A Multi-Expert Architecture for Credit Risk Assessment: The CREDEX system, IN: D.E. O`Lerary and P.R. Watkins (Eds), Expert Systems in finance, 37–64.Rauber, Merkl, A., D., and Dittenbach, M. (2002). The Growing hierarchical self-organizing map: exploratory analysis of high-dimensional data, IEEE Transactions on Neural Networks, 13(6), 1331–1341.Richardson, A. J., Risien, C., and Shillington, F. A. (2003). Using self organizing maps to identify patterns in satellite imagery, Prog. Oceanogr, 59, 223–239.Ringnér, M. (2008), What is principal component analysis?, Nature Biotechnology, 26, 303–304.Risien, C. M., Reason, C. J. C., Shillington, F. A., and Chelton, D. B. (2004). Variability in satellite winds over the Benguela upwelling system during 1999– 2000, J. Geophys. Res., 109, C03010, doi:10.1029/2003JC001880.Rumelhart, D. E., and Zipser, D. (1985). Feature discovery by competitive learning, Cognitive Science, 9, 75–112.Rumelhart, D. E., Hinton, G. E., and Williams, R. J. (1986). Learning representations by back-propagating errors, Nature, 323, 533–536.Schweighofer, E., Rauber, A., and Dittenbach, M. (2001). Automatic text representation classification and labeling in European law, International Conference on Artificial Intelligence and Law (ICAIL). ACM Press.Serrano, C. (1996). Self Organizing Neural Networks for Financial Diagnosis, Decision Support Systems, 17, 227–238.Shaw, P. J. A. (2003). Multivariate statistics for the Environmental Sciences, Hodder-Arnold.Shih, J. Y., Chang, Y. J., and Chen, W. H. (2008). Using GHSOM to construct legal maps for Taiwan’s securities and futures markets, Expert Systems with Applications, 34(2), 850–858.Shin, H. W., and Sohn, S. Y. (2004). Segmentation of stock trading customers according to potential value, Expert Systems with Applications, 27(1), 27–33.Shin, K. S., Lee, T. S., and Kim, H. J. (2005). An application of support vector machines in bankruptcy prediction model, Expert Systems with Applications, 28, 127–135.Shin, K. S., and Lee, Y. J. (2002). A genetic algorithm application in bankruptcy prediction modeling, Expert Systems with Applications, 23, 321–328.Stice, J. D. (1991). Using financial and market information to identify pre-engagement factors associated with lawsuits against auditors, Accounting Review, 66(3), 516–533.Summers, S. L., and Sweeney, J. T. (1998). Fraudulently misstated financial statements and insider trading: An empirical analysis, Accounting Review, 73(1), 131–146.Tabachnick, B. G., and Fidell, L. S. (2001). Using multivariate statistics, 4th Edition, Boston: Allyn & Bacon.Tsai, C. F. (2009). Feature selection in bankruptcy prediction, Knowledge-Based Systems, 22(2), 120–127.Tsaih, R. H., Lin, W. Y., and Huang, S. Y. (2009), Exploring Fraudulent Financial Reporting with GHSOM, Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), Lecture Notes in Computer Science, 5477, 31–41.Turban, E. (1993), Decision Support and Expert Systems: Management Support Systems, 3rd eds, Macmillan.Turk, M. A., and Pentland, A. P. (1991). Eigenfaces for recognition, Journal of Cognitive Neuroscience, 3(1), 71–86.Vapnik, V. N. (1995), The nature of statistical learning theory, Springer.Virdhagriswaran, S., and Dakin, G. (2006). Camouflaged fraud detection in domains with complex relationships, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 941–947.Weisenborn, D., and Norris, D. (1997). Red flags of management fraud, National Public Accountant, 42(2), 29–33.Wen, W., Wang, W. K., and Wang, T. H. (2005). A hybrid knowledge-based decision support system for enterprise mergers and acquisitions, Expert Systems with Applications, 28, 569–582.Wen, W., Chen, Y. H., and Pao, H. H. (2008). A mobile knowledge management decision support system for automatically conducting an electronic business, Knowledge-Based Systems, 21(7), 540–550.Yeh, Y., T. Lee, and Woidtke, T. (2001). Family control and corporate governance: Evidence from Taiwan, International Review of Finance, 2(1-2), 21–48.Zhang, J., and Dai, D. (2009). An adaptive spatial clustering method for automatic brain MR image segmentation, Progress in Natural Science, 19(10), 1373–1382.Zopounidis, C., Doumpos, M., and Matsatsinis, N. F. (1997). On the use of knowledge-based decision support systems in financial management: a survey, Decision Support Systems, 20, 259–277. 描述 博士
國立政治大學
資訊管理研究所
96356511
100資料來源 http://thesis.lib.nccu.edu.tw/record/#G0096356511 資料類型 thesis dc.contributor.advisor 蔡瑞煌 zh_TW dc.contributor.advisor Tsaih, Rua Huan en_US dc.contributor.author (Authors) 黃馨瑩 zh_TW dc.contributor.author (Authors) Huang, Shin Ying en_US dc.creator (作者) 黃馨瑩 zh_TW dc.creator (作者) Huang, Shin Ying en_US dc.date (日期) 2011 en_US dc.date.accessioned 30-Oct-2012 11:21:09 (UTC+8) - dc.date.available 30-Oct-2012 11:21:09 (UTC+8) - dc.date.issued (上傳時間) 30-Oct-2012 11:21:09 (UTC+8) - dc.identifier (Other Identifiers) G0096356511 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/54555 - dc.description (描述) 博士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊管理研究所 zh_TW dc.description (描述) 96356511 zh_TW dc.description (描述) 100 zh_TW dc.description.abstract (摘要) 增長層級式自我組織映射網路(GHSOM)屬於一種非監督式類神經網路,為自我組織映射網路(SOM)的延伸,擅長於對樣本分群,以輔助分析樣本族群裡的共同特徵,並且可以透過族群間存在的空間關係假設來建立分類器,進而辨別出異常的資料。因此本研究提出一個創新的對偶方法(即為一個建立決策支援系統架構的方法)分別對舞弊與非舞弊樣本分群,首先兩類別之群組會被配對,即辨識某一特定無弊群體的非舞弊群體對照組,針對這些配對族群,套用基於不同空間假設所設立的分類規則以檢測舞弊與非舞弊群體中是否有存在某種程度的空間關係,此外並對於舞弊樣本的分群結果加入特徵萃取機制。分類績效最好的分類規則會被用來偵測受測樣本是否有舞弊的嫌疑,萃取機制的結果則會用來標示有舞弊嫌疑之受測樣本的舞弊行為特徵以及相關的輸入變數,以做為後續的決策輔助。更明確地說,本研究分別透過非舞弊樣本與舞弊樣本建立一個非舞弊GHSOM樹以及舞弊GHSOM樹,且針對每一對GHSOM群組建立分類規則,其相應的非舞弊/舞弊為中心規則會適應性地依循決策者的風險偏好最佳化調整規則界線,整體而言較優的規則會被決定為分類規則。非舞弊為中心的規則象徵絕大多數的舞弊樣本傾向分布於非舞弊樣本的周圍,而舞弊為中心的規則象徵絕大多數的非舞弊樣本傾向分布於舞弊樣本的周圍。此外本研究加入了一個特徵萃取機制來發掘舞弊樣本分群結果中各群組之樣本資料的共同特質,其包含輸入變數的特徵以及舞弊行為模式,這些資訊將能輔助決策者(如資本提供者)評估受測樣本的誠實性,輔助決策者從分析結果裡做出更進一步的分析來達到審慎的信用決策。本研究將所提出的方法套用至財報舞弊領域(屬於財務舞弊偵測的子領域)進行實證,實驗結果證實樣本之間存在特定的空間關係,且相較於其他方法如SVM、SOM+LDA和GHSOM+LDA皆具有更佳的分類績效。因此顯示本研究所提出的機制可輔助驗證財務相關數據的可靠性。此外,根據SOM的特質,即任何受測樣本歸類到某特定族群時,該族群訓練樣本的舞弊行為特徵將可以代表此受測樣本的特徵推論。這樣的原則可以用來協助判斷受測樣本的可靠性,並可供持續累積成一個舞弊知識庫,做為進一步分析以及制定相關信用決策的參考。本研究所提出之基於對偶方法的決策支援系統架構可以被套用到其他使用財務數據為資料來源的財務舞弊偵測情境中,作為輔助決策的基礎。 zh_TW dc.description.abstract (摘要) The Growing Hierarchical Self-Organizing Map (GHSOM) is extended from the Self-Organizing Map (SOM). The GHSOM’s unsupervised learning nature such as the adaptive group size as well as the hierarchy structure renders its availability to discover the statistical salient features from the clustered groups, and could be used to set up a classifier for distinguishing abnormal data from regular ones based on spatial relationships between them.Therefore, this study utilizes the advantage of the GHSOM and pioneers a novel dual approach (i.e., a proposal of a DSS architecture) with two GHSOMs, which starts from identifying the counterparts within the clustered groups. Then, the classification rules are formed based on a certain spatial hypothesis, and a feature extraction mechanism is applied to extract features from the fraud clustered groups. The dominant classification rule is adapted to identify suspected samples, and the results of feature extraction mechanism are used to pinpoint their relevant input variables and potential fraud activities for further decision aid.Specifically, for the financial fraud detection (FFD) domain, a non-fraud (fraud) GHSOM tree is constructed via clustering the non-fraud (fraud) samples, and a non-fraud-central (fraud-central) rule is then tuned via inputting all the training samples to determine the optimal discrimination boundary within each leaf node of the non-fraud (fraud) GHSOM tree. The optimization renders an adjustable and effective rule for classifying fraud and non-fraud samples. Following the implementation of the DSS architecture based on the proposed dual approach, the decision makers can objectively set their weightings of type I and type II errors. The classification rule that dominates another is adopted for analyzing samples. The dominance of the non-fraud-central rule leads to an implication that most of fraud samples cluster around the non-fraud counterpart, meanwhile the dominance of fraud-central rule leads to an implication that most of non-fraud samples cluster around the fraud counterpart.Besides, a feature extraction mechanism is developed to uncover the regularity of input variables and fraud categories based on the training samples of each leaf node of a fraud GHSOM tree. The feature extraction mechanism involves extracting the variable features and fraud patterns to explore the characteristics of fraud samples within the same leaf node. Thus can help decision makers such as the capital providers evaluate the integrity of the investigated samples, and facilitate further analysis to reach prudent credit decisions.The experimental results of detecting fraudulent financial reporting (FFR), a sub-field of FFD, confirm the spatial relationship among fraud and non-fraud samples. The outcomes given by the implemented DSS architecture based on the proposed dual approach have better classification performance than the SVM, SOM+LDA, GHSOM+LDA, SOM, BPNN and DT methods, and therefore show its applicability to evaluate the reliability of the financial numbers based decisions. Besides, following the SOM theories, the extracted relevant input variables and the fraud categories from the GHSOM are applicable to all samples classified into the same leaf nodes. This principle makes that the extracted pre-warning signal can be applied to assess the reliability of the investigated samples and to form a knowledge base for further analysis to reach a prudent decision. The DSS architecture based on the proposed dual approach could be applied to other FFD scenarios that rely on financial numbers as a basis for decision making. en_US dc.description.tableofcontents Abstract 11. Introduction 52. Literature review 92.1 DSS 92.2 Clustering methods and the GHSOM 102.2.1 Clustering methods and the SOM 102.2.2 GHSOM 142.3 PCA 172.4 FFR 212.5 Summary 273. The proposed dual approach 293.1 Training phase 303.1.1 Sampling module 313.1.2 Variable-selecting module 313.1.3 Clustering module 323.2 Modeling phase 323.2.1 Statistic-gathering module 333.2.2 Rule-forming module 353.2.3 Feature-extracting module 373.2.4 Pattern-extracting module 393.3 Analyzing phase 393.3.1 Group-finding module 403.3.2 Classifying module 403.4 Decision support phase 413.4.1 Feature-retrieving module 413.4.2 Decision-supporting module 424. The FFR experiment and results 454.1 Training phase – sampling module 454.2 Training phase – variable-selecting module 494.3 Training phase – clustering module 614.4 Modeling phase – statistic-gathering, rule-forming module 644.5 Modeling phase – feature-extracting module 704.6 Modeling phase – pattern-extracting module 774.7 Analyzing phase – group-finding, classifying module 814.8 Decision support phase – feature-retrieving module 824.8.1 Retrieve from pattern-extracting module 824.8.2 Retrieve from feature-extracting module 844.9 Analyzing phase – decision-supporting module 855. Methods comparison 885.1 SVM 885.2 SOM+LDA 895.3 GHSOM+LDA 905.4 SOM 925.5 BPNN 935.6 DT 955.7 Discussion of the experimental results 986. Discussions and implications 996.1 The decision support in FFD 1006.2 The research implications 1016.3 The FFR managerial implications 1037. Conclusion 105Reference 108Appendix 117 zh_TW dc.language.iso en_US - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0096356511 en_US dc.subject (關鍵詞) 增長層級式自我組織映射網路 zh_TW dc.subject (關鍵詞) 非監督式類神經網路 zh_TW dc.subject (關鍵詞) 分類 zh_TW dc.subject (關鍵詞) 財務舞弊偵測 zh_TW dc.subject (關鍵詞) 財務報表舞弊 zh_TW dc.subject (關鍵詞) Growing Hierarchical Self-Organizing Map en_US dc.subject (關鍵詞) Unsupervised Neural Networks en_US dc.subject (關鍵詞) Classification en_US dc.subject (關鍵詞) Financial Fraud Detection en_US dc.subject (關鍵詞) Fraudulent Financial Reporting en_US dc.title (題名) 適用於財務舞弊偵測之決策支援系統的對偶方法 zh_TW dc.title (題名) A dual approach for decision support in financial fraud detection en_US dc.type (資料類型) thesis en dc.relation.reference (參考文獻) Aas, K., and Eikvil, L. (1999). Text categorization: A survey, Technical Report, 941, Norwegian Computing Center.Agyemang, M., Barker, K., and Alhajj, R. (2006). A comprehensive survey of numeric and symbolic outlier mining techniques, Intelligent Data Analysis, 10(6), 521–538.Altman, E.I. (1968). Financial ratios, discriminant analysis and the prediction of corporate bankruptcy, Journal of Finance, 23(4), 589–609.American Institute of Certified Public Accountants (AICPA) (2002). Statement on Auditing Standards No. 99: Consideration of Fraud in a Financial Statement Audit [Electronic Version]. http://www.aicpa.org/download/members/div/auditstd/AU-00316.PDF.Antonio, S.A., David, M.G., Emilio, S.O. Alberto, P., Rafael, M.B., and Antonio, S. L. (2008). Web mining based on Growing Hierarchical Self-Organizing Maps: Analysis of a real citizen web portal, Expert Systems with Applications, 34(4), 2988–2994.Association of Certified Fraud Examiners (ACFE) (1998). 1998 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.Association of Certified Fraud Examiners (ACFE). (2008). 2008 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.Basens, B., Setiono, B., Mues, C., and Vanthienen, J. (2003). Using neural network rule extraction and decision tables for credit-risk evaluation, Management Science, (49:3), 312–319.Beasley, M.S., Carcello, J.V., and Hermanson, D.R. (1999). Fraudulent financial reporting: 1987–1997: An analysis of U.S. public companies, COSO, New York.Bell, T. B., and Carcello, J. V. (2000). A decision aid for assessing the likelihood of fraudulent financial reporting, Auditing: A Journal of Practice & Theor, (19:1), 169–184.Bond, C. F., and DePaulo, B. M. (2006). Accuracy of deception judgments, Personality and Social Psychology Review, 10(3), 214–234.Boser, B. E., Guyon, I., and Vapnik, V. (1992). A training algorithm for optimal margin classifiers, Proceedings of the Fifth Annual Workshop on Computational Learning Theory, ACM Press, 144–152.Budayan, C. (2008). Strategic group analysis: Strategic perspective, differentiation and performance in construction, Doctoral dissertation, Middle East Technical University.Budayan, C., Dikmen, I., and Birgonul, M. T. (2009). Comparing the performance of traditional cluster analysis, self-organizing maps and fuzzy C-means method for strategic grouping, Expert Systems with Applications, 36(9), 11772–11781.Canbas, S., Cabuk, A., and Kilic, S.B. (2005). Prediction of commercial bank failure via multivariate statistical analysis of financial structures: The Turkish case, European Journal of Operational Research, 166, 528–546.Carlos, S. C. (1996). Self organizing neural networks for financial diagnosis, Decision Support System, 17, 227–2386.Claessens, S., Djankov, S., and Lang, L. H. P. (2000). The separation of ownership and control in East Asian Corporations, Journal of Financial Economics, 58(1-2), 81–112.Cortes, C., and Vapnik, V. (1995). Support-vector network, Machine Learning, 20, 273–297.Daskalaki, S., Kopanas, I., Goudara, M., and Avouris, N. (2003). Data mining for decision support on customer insolvency in telecommunications business, European Journal of Operational Research, 145, 239–255.Dechow, P. M., Ge, W., Larson, C. R., Sloan, R. G., and Investors, B. G. (2007). Predicting material accounting manipulations, AAA 2007 Financial Accounting and Reporting Section (FARS) [Electronic Version]. http://ssrn.com/abstract=997483.Dechow, P.M., Sloan, R.G., and Sweeney, A.P. (1996). Cause and consequences of earnings manipulation: an analysis of firms subject to enforcement actions by the SEC," Contemporary Accounting Research, 13(1), 1–36.Desai, V. S., Crook, J. N., and Overstreet, J. (1996). A comparison of neural networks and linear scoring models in the credit union environment, European Journal of Operational Research, 95, 24–37.Dittenbach, M., Merkl, D., and Rauber, A. (2000). The Growing hierarchical self-organizing map, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks- IJCNN 2000.Dittenbach, M., Rauber, A., and Merkl, D. (2002). Uncovering hierarchical structure in data using the growing hierarchical self-organizing map, Neurocomputing, 48(1-4), 199–216.Eklund, T. (2002). Assessing the feasibility of self organizing maps for data mining financial information, ECIS 2002, Gdansk, Poland.Elliot, R., and Willingham, J. (1980). Management fraud: detection and deterrence, Petrocelli, New York, NY.Fanning, K.M., and Cogger, K.O. (1998). Neural network detection of management fraud using published financial data, International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1), 21–41.Farber, D. B. (2005). Restoring trust after fraud: does corporate governance matter?, Accounting Review, 80(2), 539–561.Fukunaga, K. (1990). Introduction to Statistical Pattern Recognition, 2nd Edition, Academic Press, London.Granzow, M., Berrar, D., Dubitzky, W., Schuster, A., Azuaje, F. J., and Eils, R. (2001). Tumor classification by gene expression profiling: Comparison and validation of five clustering methods, SIGBIO Newsletter, 21(1), 16–22.Green, P., and Choi, J. H. (1997). Assessing the risk of management fraud through neural network technology, Auditing: A Journal of Practice & Theory, 16(1), 14–28.Guo, Y., Hu, J., and Peng, Y. (2011). Research on CBR system based on data mining, Applied Soft Computing, 11(8), 5006–5014.Hoogs, B., Kiehl, T., Lacomb, C., and Senturk, D. (2007). A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud, Intelligent Systems in Accounting Finance and Management, (15:1/2), 41–56.Hsu, K. Y. (2008). Exploring financial reporting fraud, M.A. Thesis, National Chengchi University, Department of Management Information System.Hsu, S. H., Hsieh, J. P. A., Chih, T. C., and Hsu, K. C. (2009). A two-stage architecture for stock price forecasting by integrating self-organizing map and support vector regression, Expert Systems with Applications, 36(4), 7947–7951.Hsu, C. W., Chang, C. C., and Lin, C. J. (2010). A practical guide to support vector classification, Technical Report, National Taiwan University.Huang, S. Y., Tsaih, R. H., and Lin, W. Y. (2012). Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting, Industrial Management & Data Systems, 112(2), 224–244.Huang, S. Y., and Tsaih, R. H. (2012). The Prediction Approach with Growing Hierarchical Self-Organizing Map, Proceedings of the International Joint Conference on Neural Networks (IJCNN), 838-844.Huang, S. Y., and Tsaih, R. H., Fang, Y. (2012). The Dual Approach for Decision Making, The 2012 Decision Sciences Institute Annual Meeting (DSI), San Francisco, USA.Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., and Felix, W. F. (2010). Identification of fraudulent financial statements using linguistic credibility analysis, Decision Support Systems, 50(3), 585–594.Jain, A., Murty, M., and Flynn, P. (1999). Data clustering: a review. ACM Computing Surveys, 31(3), 264–323.Jiang, J. (1999). Image compression with neural networks - a survey, Signal Process Image Communication, 14(9-7), 737–760.Jolliffe, I. T. (1986). Principal Component Analysis, Springer, New York.Jolliffe, I. T. (2002). Principal Component Analysis, second edition, New York: Springer-Verlag New York, Inc.Kaiser, H. F. (1960). The application of electronic computers to factor analysis, Educational and Psychological Measurement, 20, 141–151.Khan A.U., Sharma, T. K., and Sharma, S. (2009). Classification of Stocks Using Self Organizing Map, International Journal of Soft Computing Applications, 4, 19–24.Klein M, and Methlie, L. B. (1995). Knowledge-Based Decision Support Systems with Applications in Business, 2nd edn, Wiley.Kirkos, E., Spathis, C., and Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements, Expert Systems with Applications, 32(4), 995–1003.Kohonen, T. (1982). Self-organized formation of topologically correct feature maps, Biological Cybernetics, (43), 59–69.Kohonen, T. (1989), Self Organization and Associative Memory, 3rd ed. Springer, Berlin.Kohonen, T. (1995), Self-Organizing Maps, Springer, Berlin.KPMG Peat Marwick (1998), Fraud Survey, KPMG peat Marwick, Montvale, NJ.La Porta, R., Lopez-de-Silanes, F., Shleifer, A., and Vishny, R. (1999). Corporate ownership around the world, Journal of Finance, 54(2), 471–517.Lee, G., T. K. Sung, and Chang, N. (1999). Dynamics of modeling in data mining: interpretive approach to bankruptcy prediction, Journal of Management Information Systems, 16, 63–85.Lee, T. S., Chiu, C. C., Chou, Y. C., and Lu, C. J. (2006). Mining the customer credit using classification and regression tree and multivariate adaptive regression splines, Computational Statistics & Data Analysis, 50, 1113–1130.Lee, T. S., and Yeh, Y. H. (2004). Corporate governance and financial distress: evidence from Taiwan, Corporate Governance: An International Review, 12(3), 378–388.Li, S. (2000). The development of a hybrid intelligent system for developing marketing strategy, Expert Systems with Applications, 27, 395–409.Liu, Y., Yeh, R. H. ,and He, R. (2006). Sea surface temperature patterns on the West Florida Shelf using the Growing Hierarchical Self-Organizing Maps, J. Atmos. Oceanic Technology, 23(2), 325–338.Loebbecke, J. K., Eining, M. M., and Willingham, J. J. (1989). Auditors’ experience with material irregularities: frequency, nature, and detectability, Auditing, 9(1), 1–28.Lu, C. J., and Wang, Y. W. (2010). Combining independent component analysis and growing hierarchical self-organizing maps with support vector regression in product demand forecasting, International Journal of Production Economics, 128(2), 603–613.Mangiameli, P., Chen, S. K., and West, D. (1996). A comparison of SOM neural network and hierarchical clustering methods, European Journal of Operational Research, 93(2), 402–417.Maron, M. E. (1961). Automatic indexing: An experimental inquiry, Journal of the ACM, 8, 404–417.Martín-Guerrero, J.D., Palomares, A., Balaguer-Ballester, E., Soria-Olivas, E., Gómez- Sanchis, J., and Soriano-Asensi, A. (2006). Studying the feasibility of a recommender in a citizen web portal based on user modeling and clustering algorithms, Expert Systems with Applications, 30(2), 299–312.Matsatsinis, N. F., Doumpos, M., and Zopounidis, C. (1997), Knowledge acquisition and representation for expert systems in the field of financial analysis, Expert Systems with Applications, 12, pp. 247–262.Mohanty, R. P., and Deshmukh, S. G. (1997). Evolution of an expert system for human resource planning in a petroleum company, Production Economics, 51, 251–261.Newman, D. P., Patterson, E. and Smith, R. (2001). The influence of potentially fraudulent reports on audit risk assessment and planning. Auditing: A Journal of Practice & Theory, 76(1), 59–80.Ngai, E. W, Yong, H. U., Wong, Y. H., Chen, Y., and Sun, X. (2010). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature, Decision Support Systems =, 50(3), 559–569.Nguyen M. N., Shi, D., and Quek, C. (2008). A nature inspired Ying-Yang approach for intelligent decision support in bank solvency analysis, Expert Systems with Applications, 34(4), 2576–2587Min, J. H., and Lee, Y. C. (2005). Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters, Expert Systems with Applications, 28, 603–614.Oja, E. (1992). Principal components, minor components, and linear neural networks, Neural Networks, 5(6), 927–935.Pagano, R. R. (2001). Understanding Statistics in the Behavioral Sciences, Sixth ed., Wadsworth/Thomson Learning, California.Quinlan, J. R. (1986), Induction of Decision Trees, Machine Learning, 1, 81–106.Quinlan, J. R. (1993), C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers.Quinlan, J. R. (1996), Bagging, boosting, and C4.5., Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96), pp. 725-730.Rasmussen, E. (1992), Information retrieval: data structures and algorithms. Prentice-Hall, Inc.Pearson, K. (1901), On Lines and Planes of Closest Fit to Systems of Points in Space, Philosophical Magazine, 2(6), 559–572.Persons, O. S. (1995), Using financial statement data to identify factors associated with fraudulent financial reporting, Journal of Applied Business Research, 11(3), 38–46.Pinson, S. (1992), A Multi-Expert Architecture for Credit Risk Assessment: The CREDEX system, IN: D.E. O`Lerary and P.R. Watkins (Eds), Expert Systems in finance, 37–64.Rauber, Merkl, A., D., and Dittenbach, M. (2002). The Growing hierarchical self-organizing map: exploratory analysis of high-dimensional data, IEEE Transactions on Neural Networks, 13(6), 1331–1341.Richardson, A. J., Risien, C., and Shillington, F. A. (2003). Using self organizing maps to identify patterns in satellite imagery, Prog. Oceanogr, 59, 223–239.Ringnér, M. (2008), What is principal component analysis?, Nature Biotechnology, 26, 303–304.Risien, C. M., Reason, C. J. C., Shillington, F. A., and Chelton, D. B. (2004). Variability in satellite winds over the Benguela upwelling system during 1999– 2000, J. Geophys. Res., 109, C03010, doi:10.1029/2003JC001880.Rumelhart, D. E., and Zipser, D. (1985). Feature discovery by competitive learning, Cognitive Science, 9, 75–112.Rumelhart, D. E., Hinton, G. E., and Williams, R. J. (1986). Learning representations by back-propagating errors, Nature, 323, 533–536.Schweighofer, E., Rauber, A., and Dittenbach, M. (2001). Automatic text representation classification and labeling in European law, International Conference on Artificial Intelligence and Law (ICAIL). ACM Press.Serrano, C. (1996). Self Organizing Neural Networks for Financial Diagnosis, Decision Support Systems, 17, 227–238.Shaw, P. J. A. (2003). Multivariate statistics for the Environmental Sciences, Hodder-Arnold.Shih, J. Y., Chang, Y. J., and Chen, W. H. (2008). Using GHSOM to construct legal maps for Taiwan’s securities and futures markets, Expert Systems with Applications, 34(2), 850–858.Shin, H. W., and Sohn, S. Y. (2004). Segmentation of stock trading customers according to potential value, Expert Systems with Applications, 27(1), 27–33.Shin, K. S., Lee, T. S., and Kim, H. J. (2005). An application of support vector machines in bankruptcy prediction model, Expert Systems with Applications, 28, 127–135.Shin, K. S., and Lee, Y. J. (2002). A genetic algorithm application in bankruptcy prediction modeling, Expert Systems with Applications, 23, 321–328.Stice, J. D. (1991). Using financial and market information to identify pre-engagement factors associated with lawsuits against auditors, Accounting Review, 66(3), 516–533.Summers, S. L., and Sweeney, J. T. (1998). Fraudulently misstated financial statements and insider trading: An empirical analysis, Accounting Review, 73(1), 131–146.Tabachnick, B. G., and Fidell, L. S. (2001). Using multivariate statistics, 4th Edition, Boston: Allyn & Bacon.Tsai, C. F. (2009). Feature selection in bankruptcy prediction, Knowledge-Based Systems, 22(2), 120–127.Tsaih, R. H., Lin, W. Y., and Huang, S. Y. (2009), Exploring Fraudulent Financial Reporting with GHSOM, Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), Lecture Notes in Computer Science, 5477, 31–41.Turban, E. (1993), Decision Support and Expert Systems: Management Support Systems, 3rd eds, Macmillan.Turk, M. A., and Pentland, A. P. (1991). Eigenfaces for recognition, Journal of Cognitive Neuroscience, 3(1), 71–86.Vapnik, V. N. (1995), The nature of statistical learning theory, Springer.Virdhagriswaran, S., and Dakin, G. (2006). Camouflaged fraud detection in domains with complex relationships, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 941–947.Weisenborn, D., and Norris, D. (1997). Red flags of management fraud, National Public Accountant, 42(2), 29–33.Wen, W., Wang, W. K., and Wang, T. H. (2005). A hybrid knowledge-based decision support system for enterprise mergers and acquisitions, Expert Systems with Applications, 28, 569–582.Wen, W., Chen, Y. H., and Pao, H. H. (2008). A mobile knowledge management decision support system for automatically conducting an electronic business, Knowledge-Based Systems, 21(7), 540–550.Yeh, Y., T. Lee, and Woidtke, T. (2001). Family control and corporate governance: Evidence from Taiwan, International Review of Finance, 2(1-2), 21–48.Zhang, J., and Dai, D. (2009). An adaptive spatial clustering method for automatic brain MR image segmentation, Progress in Natural Science, 19(10), 1373–1382.Zopounidis, C., Doumpos, M., and Matsatsinis, N. F. (1997). On the use of knowledge-based decision support systems in financial management: a survey, Decision Support Systems, 20, 259–277. zh_TW