{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T05:44:12Z","timestamp":1759815852733,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_38","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"511-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Investigating External Audit Records to Detect Fraudulent Firms Employing Various Machine Learning Methods"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4198-6569","authenticated-orcid":false,"given":"Farhana Akter","family":"Sunny","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7398-5280","authenticated-orcid":false,"given":"Md. Imran","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1007-572X","authenticated-orcid":false,"given":"Md. Shahriare","family":"Satu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4688-0619","authenticated-orcid":false,"given":"Mohammad Zoynul","family":"Abedin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"38_CR1","first-page":"1","volume":"13","author":"TA Hakami","year":"2020","unstructured":"Hakami TA, Rahmat MM, Yaacob MH, Saleh NM (2020) Fraud detection gap between auditor and fraud detection models: evidence from gulf cooperation council. Asian J Account Gov 13:1\u201313","journal-title":"Asian J Account Gov"},{"doi-asserted-by":"crossref","unstructured":"Shajalal M, Petr H, Abedin MZ (2021) Product backorder prediction with deep neural network on imbalance data. Int J Prod Res. https:\/\/doi.org\/10.1080\/00207543.2021.1901153","key":"38_CR2","DOI":"10.1080\/00207543.2021.1901153"},{"doi-asserted-by":"crossref","unstructured":"Abedin MZ, Guotai Chi, Moula FE, Azad ASMS, Khan MSU (2019) Topological applications of multilayer perceptrons and support vector machine in financial decision support systems. Int J Finan Econ 24:474\u2013507","key":"38_CR3","DOI":"10.1002\/ijfe.1675"},{"doi-asserted-by":"crossref","unstructured":"Guotai Chi, Abedin MZ, Moula FE (2017) Modeling credit approval data with neural networks: an experimental investigation and optimization. J Bus Econ Manage 18(2):224\u2013240. https:\/\/doi.org\/10.3846\/16111699.2017.1280844","key":"38_CR4","DOI":"10.3846\/16111699.2017.1280844"},{"doi-asserted-by":"crossref","unstructured":"Moula FE, Guotai Chi, Abedin MZ (2017) Credit default prediction modeling: an application of support vector machine. Risk Manag 19(2):158\u2013187","key":"38_CR5","DOI":"10.1057\/s41283-017-0016-x"},{"doi-asserted-by":"crossref","unstructured":"Gepp A, Smith T, Linnenluecke MK (2018) Big data in accounting and finance: a review of influential publications and a research agenda. J Account Lit","key":"38_CR6","DOI":"10.1016\/j.pacfin.2017.04.005"},{"unstructured":"IAASB (2016) Exploring the growing use of technology in the audit, with a focus on data analytics. International Auditing and Assurance Standards Board (IAASB). https:\/\/www.ifac.org\/publications-resources\/exploringgrowing-use-technology-audit-focus-data-analytics","key":"38_CR7"},{"doi-asserted-by":"crossref","unstructured":"Chen S (2016) Detection of fraudulent financial statements using the hybrid data mining approach. SpringerPlus: a SpringerOpen J","key":"38_CR8","DOI":"10.1186\/s40064-016-1707-6"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.procs.2019.01.007","volume":"148","author":"I Sadgali","year":"2019","unstructured":"Sadgali I, Sael N, Benabbou F (2019) Performance of machine learning techniques in the detection of financial frauds. Proc Comput Sci Elsevier 148:45\u201354","journal-title":"Proc Comput Sci Elsevier"},{"doi-asserted-by":"crossref","unstructured":"Hajek P, Henriques R (2017) Mining corporate annual reports for intelligent detection of financial statement fraud - A comparative study of machine learning methods. Elsevier, pp 139\u2013152","key":"38_CR10","DOI":"10.1016\/j.knosys.2017.05.001"},{"unstructured":"Mohammadi M, Yazdani S, Khanmohammadi M, Maham K (2020) Financial reporting fraud detection: an analysis of data mining algorithms. Int J Financ Manag Account Iran. 4","key":"38_CR11"},{"unstructured":"Amina A, Shahb B, Khattakb AM, Moreirac FJL, Alid G, Rochae A, Anwara S (2018) Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods. Int J Inf Manag Elsevier","key":"38_CR12"},{"key":"38_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9516-2","volume-title":"Data transformation in cross-project defect prediction","author":"F Zhang","year":"2017","unstructured":"Zhang F, Keivanloo I, Zou Y (2017) Data transformation in cross-project defect prediction. Springer, Empir Software Eng"},{"doi-asserted-by":"publisher","unstructured":"Satu MS, Tasnim F, Akter T, Halder S (2018) Exploring significant heart disease factors based on semi supervised learning algorithms. In: 2018 international conference on computer, communication, chemical, material and electronic engineering (IC4ME2), Rajshahi, 2018, pp 1\u20134. https:\/\/doi.org\/10.1109\/IC4ME2.2018.8465642.","key":"38_CR14","DOI":"10.1109\/IC4ME2.2018.8465642."},{"doi-asserted-by":"publisher","unstructured":"Ahammed K, Satu MS, Satu MS, Khan MI, Whaiduzzaman M (2020) Predicting infectious state of hepatitis C virus affected patient\u2019s applying machine learning methods. In: (2020) IEEE region 10 symposium (TENSYMP). Dhaka, Bangladesh, vol 2020, pp 1371\u20131374. https:\/\/doi.org\/10.1109\/TENSYMP50017.2020.9230464","key":"38_CR15","DOI":"10.1109\/TENSYMP50017.2020.9230464"},{"doi-asserted-by":"crossref","unstructured":"Hooda N, Bawa S, Rana PS (2018) Fraudulent firm classification: a case study of an external audit. J Appl Artif Intell An Int J Taylor & Francis","key":"38_CR16","DOI":"10.1080\/08839514.2018.1451032"},{"doi-asserted-by":"crossref","unstructured":"Abedin MZ, Guotai Chi, Uddin MM, Shahriare S, Imran K, Petr H (2021) Tax default prediction using feature transformation-based machine learning. IEEE Access 9:19864\u201319881. https:\/\/doi.org\/10.1109\/ACCESS.2020.3048018","key":"38_CR17","DOI":"10.1109\/ACCESS.2020.3048018"},{"key":"38_CR18","first-page":"448","volume":"477","author":"Y Li","year":"2017","unstructured":"Li Y (2017) Multi-class sentiment classification: the experimental comparisons of feature selection and machine learning algorithms. Elsevier 477:448\u2013465","journal-title":"Elsevier"},{"doi-asserted-by":"crossref","unstructured":"Thaher T, Asghar A, Mafarja HM, Dong JS, Mirjalili S (2019) Binary harris hawks optimizer for high-dimensional, low sample size feature selection. Evolutionary machine learning techniques. Algorithms for intelligent systems. Springer, Singapore, pp 251\u2013272","key":"38_CR19","DOI":"10.1007\/978-981-32-9990-0_12"},{"doi-asserted-by":"crossref","unstructured":"Tan X, Su S, Huang Z, Guo X, Zuo Z, Sun X, Li L (2019) Wireless sensor networks intrusion detection based on smote and the random forest algorithm. Sensors, vol 19","key":"38_CR20","DOI":"10.3390\/s19010203"},{"doi-asserted-by":"crossref","unstructured":"Petr H, Abedin MZ (2020) A profit function-maximizing inventory backorder prediction system using big data analytics. IEEE Access 8:58982\u201358994. https:\/\/doi.org\/10.1109\/ACCESS.2020.2983118","key":"38_CR21","DOI":"10.1109\/ACCESS.2020.2983118"},{"doi-asserted-by":"crossref","unstructured":"(1997) The problem of multicollinearity . In: Understanding regression analysis. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-0-585-25657-3_37","key":"38_CR22","DOI":"10.1007\/978-0-585-25657-3_37"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T12:51:10Z","timestamp":1674910270000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}