The integration of forensic accounting and big data technology frameworks for internal fraud mitigation in the banking industry

OE Akinbowale, P Mashigo… - Cogent Business & …, 2023 - Taylor & Francis
The purpose of this study is to investigate the integration of forensic accounting and big data
technology frameworks in relation to the mitigation of internal fraud risk in the banking …

Survey and benchmark of anomaly detection in business processes

W Guan, J Cao, H Zhao, Y Gu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Effective management of business processes is crucial for organizational success. However,
despite meticulous design and implementation, anomalies are inevitable and can result in …

Grasped: A gru-ae network based multi-perspective business process anomaly detection model

W Guan, J Cao, Y Gu, S Qian - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
In process-aware information systems (PAISs), anomalies are ubiquitous, having a number
of different underlying causes, such as software malfunctions or operator errors. The …

Fraud detection on event log of bank financial credit business process using Hidden Markov Model algorithm

D Rahmawati, R Sarno, C Fatichah… - 2017 3rd International …, 2017 - ieeexplore.ieee.org
Criminal cases of banks have risen by 55% in 2016. One of the reasons is the fraud in
business processes cannot be detected early. Responding to that issue, this research …

GAMA: A multi-graph-based anomaly detection framework for business processes via graph neural networks

W Guan, J Cao, Y Gu, S Qian - Information Systems, 2024 - Elsevier
Anomalies in business processes are inevitable for various reasons such as system failures
and operator errors. Detecting anomalies is important for the management and optimization …

[PDF][PDF] Graph-based algorithms for discovering a process model containing invisible tasks

R Sarno, KR Sungkono, R Johanes… - International Journal of …, 2019 - inass.org
An event log records the business processes of a company. Modeling event logs aim to help
users in analyzing business processes. One of the problems in modeling event logs …

Coupled hidden Markov model for process discovery of non-free choice and invisible prime tasks

R Sarno, KR Sungkono - Procedia Computer Science, 2017 - Elsevier
With increasing numbers and complexity of processes stored in the event log on a system, a
solution to analyze these processes more easily is a formation of the process model. There …

[PDF][PDF] Modified Alpha++ algorithm for discovering the hybrid of non-free choice and invisible task of business processes

L Hakim, R Sarno, KR Sungkono - International Journal of …, 2019 - researchgate.net
Process discovery is a concern in analyzing business processes. Process discovery
methods handle many aspects, eg a hybrid of non-free choice and invisible task. A hybrid of …

Understanding and mitigating cyberfraud in Africa

OE Akinbowale, MP Mashigo, P Zerihun - 2024 - library.oapen.org
The book covers the overview of cyberfraud and the associated global statistics. It
demonstrates practicable techniques that financial institutions can employ to make effective …

Detecting the “Split-Cases” Workaround in event logs

Y Dubinsky, P Soffer - … on Business Process Modeling, Development and …, 2021 - Springer
Workarounds are frequently observed in business processes, where employees
intentionally bypass or deviate from procedures and business rules embedded in process …