{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:05:06Z","timestamp":1726059906646},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811516986"},{"type":"electronic","value":"9789811516993"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1699-3_15","type":"book-chapter","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T06:23:22Z","timestamp":1574403802000},"page":"183-195","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Curtailing the Tax Leakages by Nabbing Return Defaulters in Taxation System"],"prefix":"10.1007","author":[{"given":"Priya","family":"Mehta","sequence":"first","affiliation":[]},{"given":"Jithin","family":"Mathews","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"K.","family":"Suryamukhi","sequence":"additional","affiliation":[]},{"given":"Ch Sobhan","family":"Babu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,23]]},"reference":[{"key":"15_CR1","first-page":"264","volume":"7","author":"S Dani","year":"2016","unstructured":"Dani, S.: A research paper on an impact of goods and service tax(GST) on Indian economy. Bus. Econ. J. 7, 264 (2016). ISSN: 2151\u20136219","journal-title":"Bus. Econ. J."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Bahnsen, A.C., Aouada, D., Ottersten, B.: Example-dependent cost-sensitive logistic regression for credit scoring. In: 2014 13th International Conference on Machine Learning and Applications, pp. 263\u2013269. IEEE, December 2014. ISBN: 978-1-4799-7415-3","DOI":"10.1109\/ICMLA.2014.48"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-57454-7_17","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"N G\u00fcnnemann","year":"2017","unstructured":"G\u00fcnnemann, N., Pfeffer, J.: Cost matters: a new example-dependent cost-sensitive logistic regression model. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 210\u2013222. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57454-7_17"},{"key":"15_CR4","unstructured":"Scott, C.: Surrogate losses and regret bounds for cost-sensitive classification with example-dependent costs. In: ICML (2011)"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.dss.2018.02.001","volume":"108","author":"J Lismont","year":"2018","unstructured":"Lismont, J., Cardinaels, E., Bruynseels, L., Groote, S.D., Lemahieu, W., Vanthienen, J.: Predicting tax avoidance by means of social network analytics. Decis. Support Syst. 108, 13\u201324 (2018)","journal-title":"Decis. Support Syst."},{"key":"15_CR6","unstructured":"Bianchi, P., Falsetta, D., Minutti-Meza, M., Weisbrod, E. H.: Professional networks and client tax avoidance: evidence from the Italian statutory audit regime (2016). https:\/\/ssrn.com\/abstract=2601570"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Vlasselaer, V.V., Akoglu, L., Eliassi-Rad, T., Snoeck, M., Baesens, B.: Guilt-by-constellation: fraud detection by suspicious clique memberships. In: 48th Hawaii International Conference on System Sciences HICSS, pp. 918\u2013927. IEEE, January 2015. ISBN: 978-1-4799-7367-5. https:\/\/doi.org\/10.1109\/HICSS.2015.114","DOI":"10.1109\/HICSS.2015.114"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Sahin, Y., Duman, E.: Detecting credit card fraud by ANN and logistic regression. In: 2011 International Symposium on Innovations in Intelligent Systems and Applications. IEEE, June 2011. ISBN: 978-1-61284-919-5","DOI":"10.1109\/INISTA.2011.5946108"},{"key":"15_CR9","first-page":"1","volume":"1","author":"JH Wilson","year":"2009","unstructured":"Wilson, J.H.: An analytical approach to detecting insurance fraud using logistic regression. J. Financ. Account. 1, 1 (2009)","journal-title":"J. Financ. Account."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/08982112.2011.553761","volume":"23","author":"F Meulen van der","year":"2011","unstructured":"van der Meulen, F., Vermaat, T., Willems, P.: Case study: an application of logistic regression in a six sigma project in health care. Qual. Eng. 23, 113\u2013124 (2011)","journal-title":"Qual. Eng."},{"key":"15_CR11","unstructured":"Ling, C.X., Sheng, V.S.: Cost-sensitive learning and the class imbalance problem. In: Encyclopedia of Machine Learning. Springer, Heidelberg, January 2008"},{"key":"15_CR12","first-page":"52","volume":"41","author":"MJ Nigrini","year":"1997","unstructured":"Nigrini, M.J., Mittermaier, L.J.: The use of Benford\u2019s law as an aid in analytical procedures. Audit. J. pract. Theory 41, 52 (1997)","journal-title":"Audit. J. pract. Theory"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"129","DOI":"10.5296\/jsss.v2i1.6395","volume":"1","author":"A Asllani","year":"2014","unstructured":"Asllani, A., Naco, M.: Using Benford\u2019s law for fraud detection in accounting practices. J. Soc. Sci. Stud. 1, 129\u2013143 (2014)","journal-title":"J. Soc. Sci. Stud."},{"issue":"1","key":"15_CR14","first-page":"17","volume":"5","author":"C Durtschi","year":"2004","unstructured":"Durtschi, C., Hillison, W.: Pacini, C: The effective use of Benford\u2019s law to assist in detecting fraud in accounting data. J. Forensic Account. 5(1), 17\u201334 (2004)","journal-title":"J. Forensic Account."},{"key":"15_CR15","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1080\/10618600.1996.10474713","volume":"5","author":"R Ihaka","year":"1996","unstructured":"Ihaka, R., Gentleman, R.: R: a language for data analysis and graphics. J. Comput. Graph. Stat. 5, 299\u2013314 (1996)","journal-title":"J. Comput. Graph. Stat."},{"volume-title":"Generalized Additive Models: An Introduction With R","year":"2006","key":"15_CR16","unstructured":"Wood, S.N. (ed.): Generalized Additive Models: An Introduction With R. Chapman and Hall\/CRC Press, Boca Raton (2006)"}],"container-title":["Communications in Computer and Information Science","Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1699-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T14:51:56Z","timestamp":1722091916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1699-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811516986","9789811516993"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1699-3_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AusDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Adelaide, SA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ausdm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nugget.unisa.edu.au\/AusDM2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}