{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:21:54Z","timestamp":1743031314202,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319479545"},{"type":"electronic","value":"9783319479552"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47955-2_16","type":"book-chapter","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T15:04:10Z","timestamp":1476371050000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Fraud Symptoms in the Retail Industry"],"prefix":"10.1007","author":[{"given":"Rita P.","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Gama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,14]]},"reference":[{"key":"16_CR1","unstructured":"Skalak, S.: Global economic crime survey. Technical report, PwC (2014)"},{"key":"16_CR2","unstructured":"Jans, M., Lybaert, N., Vanhoof, K: Data mining for fraud detection: toward an improvement on internal control systems? In: 30th Annual Congress European Accounting Association (EAA 2007)"},{"key":"16_CR3","volume-title":"Computer-Aided Fraud Prevention & Detection","author":"D Coderre","year":"2009","unstructured":"Coderre, D.: Computer-Aided Fraud Prevention & Detection. Wiley, Hoboken (2009)"},{"key":"16_CR4","doi-asserted-by":"publisher","DOI":"10.1201\/b10328","volume-title":"Data Mining with R: Learning with Case Studies","author":"L Torgo","year":"2010","unstructured":"Torgo, L.: Data Mining with R: Learning with Case Studies, 1st edn. Chapman & Hall\/CRC, Boca Raton (2010)","edition":"1"},{"key":"16_CR5","unstructured":"Bates, A.: Fraud risk management: developing a strategy for prevention,detection, and response, Technical report, KPMG Advisory Forensic (2006)"},{"key":"16_CR6","unstructured":"Stulb, D., Remnitz, D.: Big risks require big data thinking: global forensic data analytics survey 2014. Technical report, EY (2014)"},{"issue":"3","key":"16_CR7","first-page":"307","volume":"9","author":"K Singh","year":"2012","unstructured":"Singh, K., Upadhyaya, S.: Outlier detection: applications and techniques. Int. J. Comput. Sci. Issues 9(3), 307\u2013323 (2012)","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"16_CR8","unstructured":"Kristin, R.N., Matkovsky, I.P.: Using data mining techniques for fraud detection. Technical report, SAS Institute Inc. and Federal Data Corporation (1999)"},{"key":"16_CR9","unstructured":"Phua, C., Lee, V.C.S., Smith-Miles, K., Gayler, R.W.: A comprehensive survey of data mining-based fraud detection research. CoRR abs\/1009.6119 (2010)"},{"key":"16_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers. Monographs on Applied Probability and Statistics","author":"D Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Monographs on Applied Probability and Statistics. Chapman & Hall, New York (1980)"},{"issue":"3","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"issue":"9","key":"16_CR12","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng. 26(9), 2250\u20132267 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR13","unstructured":"Anglia Ruskin University: NuMBerS: numerical methods for biosciences students. http:\/\/web.anglia.ac.uk\/numbers\/. Accessed 02 May 2016"},{"key":"16_CR14","volume-title":"Corporate Fraud Handbook: Prevention and Detection","author":"JT Wells","year":"2007","unstructured":"Wells, J.T.: Corporate Fraud Handbook: Prevention and Detection, 2nd edn. Wiley, Hoboken (2007)","edition":"2"},{"key":"16_CR15","unstructured":"Gama, J., Carvalho, A., Faceli, K., Lorena, C., Oliveira, M.: Extra\u00e7\u00e3o de Conhecimento de Dados - Data Mining, 1st edn. Silabo (2012)"},{"key":"16_CR16","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Chapman & Hall, New York (1984)"},{"key":"16_CR17","unstructured":"Therneau, T., Atkinson, B., Ripley, B.: rpart: Recursive Partitioning and Regression Trees. R package version 4.1-10 (2015)"},{"key":"16_CR18","unstructured":"R Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna (2016)"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence - IBERAMIA 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47955-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:57:42Z","timestamp":1710262662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47955-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319479545","9783319479552"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47955-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"14 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBERAMIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ibero-American Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Jos\u00e9","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Costa Rica","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iberamia2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}