{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:14:59Z","timestamp":1743221699962,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304477"},{"type":"electronic","value":"9783642304484"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30448-4_8","type":"book-chapter","created":{"date-parts":[[2012,5,25]],"date-time":"2012-05-25T15:34:21Z","timestamp":1337960061000},"page":"57-64","source":"Crossref","is-referenced-by-count":4,"title":["Forecasting Fraudulent Financial Statements with Committee of Cost-Sensitive Decision Tree Classifiers"],"prefix":"10.1007","author":[{"given":"Elias","family":"Zouboulidis","sequence":"first","affiliation":[]},{"given":"Sotiris","family":"Kotsiantis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"8_CR1","first-page":"1","volume":"2","author":"C.C. Albrecht","year":"2001","unstructured":"Albrecht, C.C., Albrecht, W.S., Dunn, J.G.: Can auditors detect fraud: a review of the research evidence. Journal of Forensic Accounting\u00a02(1), 1\u201312 (2001)","journal-title":"Journal of Forensic Accounting"},{"issue":"4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1108\/02686900210424358","volume":"17","author":"S.O. Ansah","year":"2002","unstructured":"Ansah, S.O., Moyes, G.D., Oyelere, P.B., Hay, D.: An empirical analysis of the likelihood of detecting fraud in New Zealand. Managerial Auditing Journal\u00a017(4), 192\u2013204 (2002)","journal-title":"Managerial Auditing Journal"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/S0031-3203(02)00257-1","volume":"36","author":"R. Barandela","year":"2003","unstructured":"Barandela, R., S\u00e1nchez, J.S., Garc\u00eda, V., Rangel, E.: Strategies for learning in class imbalance problems. Pattern Recognition\u00a036(3), 849\u2013851 (2003)","journal-title":"Pattern Recognition"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.2308\/aud.2000.19.1.169","volume":"9","author":"T. Bell","year":"2000","unstructured":"Bell, T., Carcello, J.: A decision aid for assessing the likelihood of fraudulent financial reporting. Auditing: A Journal of Practice & Theory\u00a09(1), 169\u2013178 (2000)","journal-title":"Auditing: A Journal of Practice & Theory"},{"key":"8_CR5","unstructured":"Bollen, L., Mertens, G., Meuwissen, R., VanRaak, J., Scelleman, C.: Classification and Analysis of Major European Business Failures. Maastricht Accounting, Auditing and Information Management Research Center (MARC) of University Maastricht and RSM (2005)"},{"issue":"3","key":"8_CR6","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging Predictors. Machine Learning\u00a024(3), 123\u2013140 (1996)","journal-title":"Machine Learning"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/S1467-0895(02)00068-4","volume":"3","author":"T.G. Calderon","year":"2002","unstructured":"Calderon, T.G., Cheh, J.J.: A roadmap for future neural networks research in auditing and risk assessment. International Journal of Accounting Information Systems\u00a03(4), 203\u2013236 (2002)","journal-title":"International Journal of Accounting Information Systems"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1093\/oxrep\/gri012","volume":"21","author":"J. Coffee","year":"2005","unstructured":"Coffee, J.: A theory of corporate scandals: Why the USA and Europe differ. Oxford Review of Economic Policy\u00a021(2), 198\u2013211 (2005)","journal-title":"Oxford Review of Economic Policy"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Deng, Q.: Application of Support Vector Machine in the Detection of Fraudulent Financial Statements. In: 4th International Conference on Computer Science & Education, pp. 1056\u20131059 (2009)","DOI":"10.1109\/ICCSE.2009.5228542"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Yue, D., Wu, X., Shen, N., Chu, C.-H.: Logistic Regression for Detecting Fraudulent Financial Statement of Listed Companies in China. In: International Conference on Artificial Intelligence and Computational Intelligence, pp. 104\u2013108 (2009)","DOI":"10.1109\/AICI.2009.421"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Domingos, P.: MetaCost: A General Method for Making Classifiers Cost-Sensitive. In: Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining, pp. 155\u2013164. ACM Press (1999)","DOI":"10.1145\/312129.312220"},{"key":"8_CR12","unstructured":"Freund, Y., Schapire, R.E.: Experiments with a New Boosting Algorithm. In: Proceedings of ICML 1996, pp. 148\u2013156 (1996)"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/isaf.284","volume":"15","author":"B. Hoogs","year":"2007","unstructured":"Hoogs, B., Kiehl, T., Lacomb, C., Senturk, D.: A Genetic Algorithm Approach to Detecting Temporal Patterns Indicative of Financial Statement Fraud. Intelligent Systems in Accounting, Finance and Management\u00a015, 41\u201356 (2007)","journal-title":"Intelligent Systems in Accounting, Finance and Management"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1016\/j.eswa.2006.02.016","volume":"32","author":"S. Kirkos","year":"2007","unstructured":"Kirkos, S., Spathis, C., Manolopoulos, Y.: Data Mining Techniques for the Detection of Fraudulent Financial Statements. Expert Systems with Applications\u00a032, 995\u20131003 (2007)","journal-title":"Expert Systems with Applications"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1108\/02686900310495151","volume":"18","author":"J.W. Lin","year":"2003","unstructured":"Lin, J.W., Hwang, M., Becker, J.K.: A Fuzzy Neural Network for Assessing the Risk of Fraudulent Financial Reporting. Managerial Auditing Journal\u00a018, 657\u2013665 (2003)","journal-title":"Managerial Auditing Journal"},{"key":"8_CR16","unstructured":"Melville, P., Mooney, R.: Constructing Diverse Classifier Ensembles using Artificial Training Examples. In: IJCAI 2003, Mexico, pp. 505\u2013510 (2003)"},{"key":"8_CR17","volume-title":"C4.5: Programs for machine learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for machine learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.dss.2010.11.006","volume":"50","author":"P. Ravisankar","year":"2011","unstructured":"Ravisankar, P., Ravi, V., Raghava, G., Bose, I.: Detection of financial statement fraud and feature selection using data mining techniques. Decision Sup. Systems\u00a050, 491\u2013500 (2011)","journal-title":"Decision Sup. Systems"},{"issue":"10","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TPAMI.2006.211","volume":"28","author":"J.J. Rodr\u00edguez","year":"2006","unstructured":"Rodr\u00edguez, J.J., Kuncheva, L.I., Alonso, C.J.: Rotation forest: A new classifier ensemble method. IEEE Trans. Pattern Anal. Machine Intell.\u00a028(10), 1619\u20131630 (2006)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"3","key":"8_CR20","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1080\/0963818022000000966","volume":"11","author":"C. Spathis","year":"2002","unstructured":"Spathis, C., Doumpos, M., Zopounidis, C.: Detecting falsified financial statements: a comparative study using multicriteria analysis and multivariate statistical techniques. The European Accounting Review\u00a011(3), 509\u2013535 (2002)","journal-title":"The European Accounting Review"},{"issue":"8","key":"8_CR21","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/34.709601","volume":"20","author":"T.K. Ho","year":"1998","unstructured":"Ho, T.K.: The Random Subspace Method for Constructing Decision Forests. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a020(8), 832\u2013844 (1998)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"8_CR22","unstructured":"Watts, R.L., Zimmerman, J.L.: Positive Accounting Theory. Prentice-Hall (1986)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Witten, I., Frank, E., Hall, M.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann (2011) ISBN 978-0-12-374856-0","DOI":"10.1016\/B978-0-12-374856-0.00001-8"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence: Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30448-4_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T21:25:35Z","timestamp":1743197135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30448-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304477","9783642304484"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30448-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}