{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:18:16Z","timestamp":1771075096471,"version":"3.50.1"},"reference-count":51,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cybernetics and Systems"],"published-print":{"date-parts":[[2016,5,18]]},"DOI":"10.1080\/01969722.2016.1158553","type":"journal-article","created":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T21:39:19Z","timestamp":1462829959000},"page":"261-276","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":22,"title":["A Hybrid Detecting Fraudulent Financial Statements Model Using Rough Set Theory and Support Vector Machines"],"prefix":"10.1080","volume":"47","author":[{"given":"Ching-Chiang","family":"Yeh","sequence":"first","affiliation":[]},{"given":"Der-Jang","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Tzu-Yu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Sheng-Hsiung","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"issue":"1","key":"CIT0001","first-page":"1","volume":"2","author":"Albrecht C. C.","year":"2001","journal-title":"Journal of Forensic Accounting"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/s0957-4174(99)00053-6"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1142\/s0219622008002958"},{"key":"CIT0004","volume-title":"Fraudulent financial reporting: 1987\u20131997 an analysis of U.S. public companies","author":"Beasley M.","year":"1999"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2000.19.1.169"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2004.23.2.55"},{"key":"CIT0007","unstructured":"Chang, C. C., and C. J. Lin. 2001. LIBSVM: A library for support vector machines. http:\/\/www.csie.edu.tw\/~cjlin\/papers\/libsvm.pdf"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcorpfin.2005.09.002"},{"issue":"10","key":"CIT0009","first-page":"4487","volume":"6","author":"Chen L. H.","year":"2010","journal-title":"International Journal of Innovative Computing Information"},{"issue":"6","key":"CIT0011","first-page":"1413","volume":"2","author":"Chi D. J.","year":"2011","journal-title":"International Journal of Research and Surveys. Part B"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.2307\/2490225"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(95)00070-4"},{"key":"CIT0014","volume-title":"Management fraud: Detection and deterrence","author":"Elliot R.","year":"1980"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1002\/(sici)1099-1174(199803)7:1<21::aid-isaf138>3.3.co;2-b"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1174(200009)9:3<145::aid-isaf185>3.0.co;2-g"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.010"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/s0925-2312(03)00375-8"},{"issue":"12","key":"CIT0019","first-page":"7131","volume":"7","author":"G\u00fcraksin G. E.","year":"2011","journal-title":"International Journal of Innovative Computing, Information & Control"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.42.7.1022"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.284"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"CIT0023","volume-title":"A practical guide to support vector classification","author":"Hsu C. W.","year":"2004"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.07.007"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.009"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1108\/02686900410509802"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/0165-4101(89)90014-1"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"issue":"2","key":"CIT0029","first-page":"104","volume":"3","author":"Kotsiantis S.","year":"2006","journal-title":"The International Journal of Computing"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.02.038"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1108\/02686900310495151"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.07.009"},{"key":"CIT0033","first-page":"1","volume":"9","author":"Loebbecke J.","year":"1989","journal-title":"Auditing: A Journal of Practice & Theory"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2004.12.008"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2010.10.003"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3534-4"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/s0377-2217(96)00382-7"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.19030\/jabr.v11i3.5858"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.006"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1142\/s0218001405004241"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1002\/j.1099-1174.1995.tb00078.x"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1080\/0963818022000000966"},{"key":"CIT0044","first-page":"131","volume":"73","author":"Summers S. L.","year":"1998","journal-title":"The Accounting Review"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2008.05.006"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1016\/s0957-4174(99)00016-0"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2006.06.007"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.09.003"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.1352"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.007"},{"key":"CIT0052","first-page":"66","volume":"13","author":"Zhu Y. S.","year":"2003","journal-title":"Computer Engineering and Application"}],"container-title":["Cybernetics and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01969722.2016.1158553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T09:10:13Z","timestamp":1481620213000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01969722.2016.1158553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":51,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,6]]},"published-print":{"date-parts":[[2016,5,18]]}},"alternative-id":["10.1080\/01969722.2016.1158553"],"URL":"https:\/\/doi.org\/10.1080\/01969722.2016.1158553","relation":{},"ISSN":["0196-9722","1087-6553"],"issn-type":[{"value":"0196-9722","type":"print"},{"value":"1087-6553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}