Login | Register

A DATA WAREHOUSE DESIGN FOR THE DETECTION OF FRAUD IN THE SUPPLY CHAIN BY USING THE BENFORD’S LAW

Title:

A DATA WAREHOUSE DESIGN FOR THE DETECTION OF FRAUD IN THE SUPPLY CHAIN BY USING THE BENFORD’S LAW

Kraus, Cornelia and Valverde, Raul (2014) A DATA WAREHOUSE DESIGN FOR THE DETECTION OF FRAUD IN THE SUPPLY CHAIN BY USING THE BENFORD’S LAW. American Journal of Applied Sciences, 11 (9). pp. 1507-1518. ISSN 1546-9239

[thumbnail of ajassp.2014.1507.1518.pdf]
Preview
Text (application/pdf)
ajassp.2014.1507.1518.pdf
868kB

Official URL: http://thescipub.com/abstract/10.3844/ajassp.2014....

Abstract

Large data volumes and the inability to analyse them enables fraudulent activities to go unnoticed in supply chain management processes such as procurement, warehouse management and inventory management. This fraud increases the cost of the supply chain management and a fraud detection mechanism is necessary to reduce the risk of fraud in this business area. This study was carried out in order to develop a data warehouse design that supports forensic analytics by using the Benford’s law in order to detect fraud. The approach relies on a generic and re-usable store procedure for data analytics. The data warehouse was tested with two datasets collected from an operational supply chain database from the inventory management and warranty claims processes. The results of the research showed that the supply chain data analyzed obeys to Benford’s theory and that parameterized stored procedures with Dynamic SQL provide an excellent tool to analyze data in the supply chain for possible fraud detection. The implications of the results of the study are that the Benford’s law can be used to detect fraud in the supply chain with the help of parameterized stored procedures and a data ware house, this can ease the workload of the fraud analyst in the supply chain function. Although the research only used data from the inventory management and warranty claim processes, the proposed store procedures can be extended to any process in the supply chain making the results generalizable to the supply chain management process.

Divisions:Concordia University > John Molson School of Business > Decision Sciences and Management Information Systems
Item Type:Article
Refereed:Yes
Authors:Kraus, Cornelia and Valverde, Raul
Journal or Publication:American Journal of Applied Sciences
Date:7 July 2014
Funders:
  • Concordia Open Access Author Fund
Digital Object Identifier (DOI):10.3844/ajassp.2014.1507.1518
Keywords:Supply Chain Fraud, Supply Chain Management Systems, Benford’s law, Fraud Detection, Data Mining for Fraud, Accounting Information Systems
ID Code:978742
Deposited By: Raul Valverde
Deposited On:23 Jul 2014 15:07
Last Modified:18 Jan 2018 17:47

References:

Benford, F., 1938. The law of anomalous numbers. Proc. Am. Philosophical Society, 4: 551-572.

Durtschi, C., W. Hillison and C. Pacini, 2004. The effective use of Benford’s law to assist in detecting fraud in accounting data. J. Forensic Account., 5: 17-34.

Geyer, A. and J. Marti, 2012, Applying Benford's law to volcanology. Geology, 40: 327-330. DOI: 10.1130/G32787.1
Hand, D., H. Mannila and P. Smyth, 2001. Principles of Data Mining. 1st Edn., MIT Press, Cambridge, ISBN-10: 026208290X, pp: 546.

Hesketh, D., 2010. Weaknesses in the supply chain: Who packed the box. World Customs J., 4: 3-20.
Hoffman, W., 2008. Fighting supply-chain fraud. Traffic World.

Hu, D., 2009. Exploratory study on computer forensics technology. Proceedings of the 2nd International Conference on Computer and Electrical Engineering, Dec. 28-30, IEEE Xplore Press, Dubai, pp: 608-611. DOI: 10.1109/ICCEE.2009.258

Kroll Advisory, 2012. Global fraud report. Kroll Consulting, USA, Fall.

Massa, D. and R. Valverde, 2014. A fraud detection system based on anomaly intrusion detection systems for e-commerce applications. Comput. Inform. Sci., 7: 117-140. DOI: 10.5539/cis.v7n2p117

Mayne, M., 2010. Elementary, my dear Watson? For IT Security Professionals, SC Magazine.

Mishra, J.S., S. Panda and A.K. Mishra, 2013. A novel approach for credit card fraud detection targeting the Indian market. Int. J. Comput. Sci., 10: 172-179.

Nigrini, 1996. A taxpayer compliance application of Benford’s Law. J. Am. Taxat. Assoc., 18: 72-91

Nigrini, M. J.,Mittermaier, L. J. 1997. The use of Benford's law as an aid in analytical procedures. Auditing, 16: 52-67.

Nigrini, M.J. 1999. 'I've Got Your Number'. J. Accountancy, 187: 79-83.

Nigrini, M., 2012. Benford’s Law: Applications for Forensic Accounting, Auditing and Fraud Detection. 1st Edn., John Wiley and Sons, Hoboken, New Jersey, ISBN-10: 1118152859, pp: 330.

Nirkhi, S.M., R.V. Dharaskar and V.M. Thakre, 2012. Data mining: A prospective approach for digital forensics. Int. J. Data Min. Knowl. Manage. Process, 2: 41-48.

Özera, G. and B. Babacanb, 2013. Benford's Law and Digital Analysis: Application on Turkish Banking Sector. Bus. Econom. Res. J., 4: 29-41.

Stephens, J. and R. Valverde, 2013. Security of e-procurement transactions in supply chain reengineering. Comput. Inform. Sci., 6: 1-20. DOI: 10.5539/cis.v6n3p1

Tödter, K.H., 2009. Benford’s law as an indicator of fraud in economics. German Econom. Rev., 10: 339-351. DOI: 10.1111/j.1468-0475.2009.00475.x
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top