{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T15:27:52Z","timestamp":1774625272278,"version":"3.50.1"},"reference-count":140,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T00:00:00Z","timestamp":1753142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T00:00:00Z","timestamp":1753142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The scientific literature dedicated to the detection of fraud in public procurement is vast, with several studies reporting the use of different methodologies to detect corruption. However, the literature still lacks a comprehensive study of the types of fraud being investigated and how data-driven techniques are being used to address this problem. This article aims to provide a better overview of how these techniques are used to detect corruption in public procurement. We systematically searched academic databases with the goal of finding papers that used data-driven techniques to predict or identify fraud in public procurement. We also performed a snowballing procedure to complement the database search with additional papers. 93 works were added to our study after screening and evaluation of more than 6000 papers. Relevant information was extracted from these papers to answer the research question defined during the planning phase. The results showed that most works use machine learning models to detect collusion and statistical analysis to detect instances of favoritism. Despite the promising results, there are some gaps that still need to be addressed. There is a lack of papers that employ the proposed methodologies in real-life systems to detect new cases of corruption. Another gap found is the lack of public available datasets, hindering the replication and dissemination of the proposed methodologies. The findings of our study contribute to a more comprehensive understanding of fraud detection in public procurement, pointing to areas for improvement and offering insights to researchers and institutions seeking to improve their processes.<\/jats:p>","DOI":"10.1140\/epjds\/s13688-025-00569-3","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T12:34:10Z","timestamp":1753187650000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detection of fraud in public procurement using data-driven methods: a systematic mapping study"],"prefix":"10.1140","volume":"14","author":[{"given":"Everton","family":"Schneider dos Santos","sequence":"first","affiliation":[]},{"given":"Matheus","family":"Machado dos Santos","sequence":"additional","affiliation":[]},{"given":"M\u00e1rcio","family":"Castro","sequence":"additional","affiliation":[]},{"given":"J\u00f4nata","family":"Tyska Carvalho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,22]]},"reference":[{"key":"569_CR1","doi-asserted-by":"crossref","unstructured":"Alford LC, Hansen SC, Hermis JM (2023) Predicting federal contractor misconduct. J Forensic Account Res: 1\u201329","DOI":"10.2308\/JFAR-2021-011"},{"key":"569_CR2","volume-title":"The probabilistic method","author":"N Alon","year":"2015","unstructured":"Alon N, Spencer JH (2015) The probabilistic method. Wiley, New York"},{"key":"569_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105807","volume":"49","author":"J Amthauer","year":"2023","unstructured":"Amthauer J, Flei\u00df J, Guggi F, et al. (2023) Ready or not? A systematic review of case studies using data-driven approaches to detect real-world antitrust violations. Comput Law Secur Rev 49:105807","journal-title":"Comput Law Secur Rev"},{"issue":"3","key":"569_CR4","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1111\/joie.12233","volume":"68","author":"D Barrus","year":"2020","unstructured":"Barrus D, Scott F (2020) Single bidders and tacit collusion in highway procurement auctions. J Ind Econ 68(3):483\u2013522","journal-title":"J Ind Econ"},{"issue":"3","key":"569_CR5","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1111\/gove.12432","volume":"33","author":"M Bauhr","year":"2020","unstructured":"Bauhr M, Czibik \u00c1, de Fine\u00a0Licht J, et al. (2020) Lights on the shadows of public procurement: transparency as an antidote to corruption. Governance 33(3):495\u2013523","journal-title":"Governance"},{"issue":"3","key":"569_CR6","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1177\/1087724X231185053","volume":"29","author":"P Bolcha","year":"2024","unstructured":"Bolcha P, Voz\u00e1rov\u00e1 P, Fanta M (2024) Transparency meets efficiency: the case of public procurement in the Czech Republic. Public Works Manag Policy 29(3):296\u2013331","journal-title":"Public Works Manag Policy"},{"issue":"1","key":"569_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3616396","volume":"5","author":"MA Brand\u00e3o","year":"2024","unstructured":"Brand\u00e3o MA, Reis AP, Mendes BM, et al. (2024) Plus: a semi-automated pipeline for fraud detection in public bids. Digit Gov Res Pract 5(1):1\u201316","journal-title":"Digit Gov Res Pract"},{"key":"569_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.5753\/wcge.2023.230254","volume-title":"Anais do XI Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC","author":"CS Braz","year":"2023","unstructured":"Braz CS, Mendes BM, Oliveira GP, et al. (2023) An\u00e1lise de irregularidades em licita\u00e7\u00f5es p\u00fablicas com foco em empresas de pequeno porte. In: Anais do XI Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC, pp\u00a094\u2013105"},{"key":"569_CR9","doi-asserted-by":"crossref","unstructured":"Brito\u00a0Ramalhoa HM, Cavalcanti\u00a0de Almeidaa AT, Alves\u00a0Fragaa A (2020) Detec\u00e7\u00e3o de casos suspeitos de conluio em licita\u00e7\u00f5es p\u00fablicas: uma aplica\u00e7\u00e3o do algoritmo a priori de aprendizado de m\u00e1quina para o estado da para\u00edba. Teor Pr\u00e1t Adm 10(2)","DOI":"10.21714\/2238-104X2020v10i2-51526"},{"issue":"1","key":"569_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/admsci11010013","volume":"11","author":"M Busu","year":"2021","unstructured":"Busu M, Busu C (2021) Detecting bid-rigging in public procurement. A cluster analysis approach. Adm Sci 11(1):13","journal-title":"Adm Sci"},{"key":"569_CR11","volume-title":"Big data: principles and paradigms","author":"R Buyya","year":"2016","unstructured":"Buyya R, Calheiros RN, Dastjerdi AV (2016) Big data: principles and paradigms, 1st edn. Morgan Kaufmann Publishers Inc., San Francisco","edition":"1"},{"key":"569_CR12","doi-asserted-by":"crossref","unstructured":"Carbone C, Calderoni F, Jofre M (2024) Bid-rigging in public procurement: cartel strategies and bidding patterns. Crime Law Soc Change: 1\u201333","DOI":"10.1007\/s10611-024-10142-0"},{"key":"569_CR13","doi-asserted-by":"publisher","first-page":"10219","DOI":"10.1109\/ACCESS.2022.3144425","volume":"10","author":"Y Chabchoub","year":"2022","unstructured":"Chabchoub Y, Togbe MU, Boly A, et al. (2022) An in-depth study and improvement of isolation forest. IEEE Access 10:10219\u201310237","journal-title":"IEEE Access"},{"key":"569_CR14","first-page":"37","volume-title":"Brazilian workshop on Social Network Analysis and Mining (BraSNAM), SBC","author":"LL Costa","year":"2022","unstructured":"Costa LL, Reis AP, Bacha CA, et al. (2022) Alertas de fraude em licita\u00e7\u00f5es: Uma abordagem baseada em redes sociais. In: Brazilian workshop on Social Network Analysis and Mining (BraSNAM), SBC, pp\u00a037\u201348"},{"key":"569_CR15","doi-asserted-by":"publisher","first-page":"4147","DOI":"10.1109\/BigData59044.2023.10386755","volume-title":"2023 IEEE international conference on big data (BigData)","author":"E Cruz","year":"2023","unstructured":"Cruz E, Ramirez N, Parra E, et al. (2023) Detecting anomalous suppliers in electronic procurement systems using gaan. In: 2023 IEEE international conference on big data (BigData). IEEE, pp\u00a04147\u20134155"},{"key":"569_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5753\/wcge.2022.222704","volume-title":"Anais do X Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC","author":"AK da Silva Pereira","year":"2022","unstructured":"da Silva Pereira AK, Vita YM, da Silva Felix G, et al. (2022) Usando redes complexas na identifica\u00e7\u00e3o de empresas fraudulentas em licita\u00e7\u00f5es p\u00fablicas. In: Anais do X Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC, pp\u00a013\u201324"},{"key":"569_CR17","doi-asserted-by":"crossref","unstructured":"Dahbi KY, Chiadmi D, Lamharhar H (2023) Knowledge graph based representation to extract value from open government data. Int J Adv Comput Sci Appl 14(3)","DOI":"10.14569\/IJACSA.2023.0140329"},{"issue":"3","key":"569_CR18","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1111\/ajps.12574","volume":"65","author":"C Dahlstr\u00f6m","year":"2021","unstructured":"Dahlstr\u00f6m C, Fazekas M, Lewis DE (2021) Partisan procurement: contracting with the United States federal government, 2003\u20132015. Am J Polit Sci 65(3):652\u2013669","journal-title":"Am J Polit Sci"},{"issue":"4","key":"569_CR19","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s10610-019-09416-4","volume":"26","author":"E D\u00e1vid-Barrett","year":"2020","unstructured":"D\u00e1vid-Barrett E, Fazekas M (2020) Grand corruption and government change: an analysis of partisan favoritism in public procurement. Eur J Crim Policy Res 26(4):411\u2013430","journal-title":"Eur J Crim Policy Res"},{"key":"569_CR20","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s12116-020-09315-4","volume":"55","author":"E D\u00e1vid-Barrett","year":"2020","unstructured":"D\u00e1vid-Barrett E, Fazekas M, Hellmann O, et al. (2020) Controlling corruption in development aid: new evidence from contract-level data. Stud Comp Int Dev 55:481\u2013515","journal-title":"Stud Comp Int Dev"},{"issue":"1","key":"569_CR21","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10101-023-00306-4","volume":"25","author":"DB Davis","year":"2024","unstructured":"Davis DB, Mendoza RU, Yap JK (2024) Corruption risk and political dynasties: exploring the links using public procurement data in the Philippines. Econ Gov 25(1):81\u2013109","journal-title":"Econ Gov"},{"issue":"2","key":"569_CR22","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s00168-020-01018-x","volume":"66","author":"RC de Andrade Lima","year":"2021","unstructured":"de Andrade Lima RC, Resende GM (2021) Using the Moran\u2019s I to detect bid rigging in Brazilian procurement auctions. Ann Reg Sci 66(2):237\u2013254","journal-title":"Ann Reg Sci"},{"key":"569_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.econlet.2023.111393","volume":"233","author":"A De Leverano","year":"2023","unstructured":"De Leverano A (2023) Clustered bids in first-price auctions: collusion or competition? Econ Lett 233:111393","journal-title":"Econ Lett"},{"issue":"1","key":"569_CR24","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-022-00325-x","volume":"11","author":"F Decarolis","year":"2022","unstructured":"Decarolis F, Giorgiantonio C (2022) Corruption red flags in public procurement: new evidence from Italian calls for tenders. EPJ Data Sci 11(1):16","journal-title":"EPJ Data Sci"},{"key":"569_CR25","first-page":"57","volume-title":"Convegno della Societ\u00e0 Italiana di Statistica","author":"S Del Sarto","year":"2021","unstructured":"Del Sarto S, Coppola P, Tro\u00eca M (2021) A latent Markov approach for clustering contracting authorities over time using public procurement red flags. In: Convegno della Societ\u00e0 Italiana di Statistica. Springer, Berlin, pp\u00a057\u201374"},{"issue":"5","key":"569_CR26","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)ME.1943-5479.0000958","volume":"37","author":"A Erfani","year":"2021","unstructured":"Erfani A, Zhang K, Cui Q (2021) Tab bid irregularity: data-driven model and its application. J Manag Eng 37(5):04021055","journal-title":"J Manag Eng"},{"issue":"2","key":"569_CR27","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1093\/jopart\/muac026","volume":"33","author":"M Fazekas","year":"2023","unstructured":"Fazekas M, Ferrali R, Wachs J (2023) Agency independence, campaign contributions, and favoritism in us federal government contracting. J Public Adm Res Theory 33(2):262\u2013278","journal-title":"J Public Adm Res Theory"},{"key":"569_CR28","doi-asserted-by":"crossref","unstructured":"Fazekas M, Hellmann O (2023) Elections and corruption: incentives to steal or incentives to invest? Stud Comp Int Dev: 1\u201324","DOI":"10.1007\/s12116-023-09412-0"},{"issue":"1","key":"569_CR29","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S0007123417000461","volume":"50","author":"M Fazekas","year":"2020","unstructured":"Fazekas M, Kocsis G (2020) Uncovering high-level corruption: cross-national objective corruption risk indicators using public procurement data. Br J Polit Sci 50(1):155\u2013164","journal-title":"Br J Polit Sci"},{"issue":"4","key":"569_CR30","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1111\/gove.12648","volume":"35","author":"M Fazekas","year":"2022","unstructured":"Fazekas M, Sberna S, Vannucci A (2022) The extra-legal governance of corruption: tracing the organization of corruption in public procurement. Governance 35(4):1139\u20131161","journal-title":"Governance"},{"issue":"2","key":"569_CR31","first-page":"153","volume":"8","author":"M Fazekas","year":"2020","unstructured":"Fazekas M, Wachs J (2020) Corruption and the network structure of public contracting markets across government change. Polit Gov 8(2):153\u2013166","journal-title":"Polit Gov"},{"key":"569_CR32","doi-asserted-by":"publisher","first-page":"108","DOI":"10.5753\/wcge.2020.11262","volume-title":"Anais do VIII Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC","author":"B Figueiredo","year":"2020","unstructured":"Figueiredo B, Nakamura F, Felix G, et al. (2020) Usando an\u00e1lises sociais na identifica\u00e7\u00e3o de n\u00f3s relevantes em um cen\u00e1rio multi-redes: Opera\u00e7\u00e3o licitante fantasma, um estudo de caso. In: Anais do VIII Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC, pp\u00a0108\u2013119"},{"issue":"1","key":"569_CR33","first-page":"3","volume":"15","author":"\u00c9S Florentino","year":"2022","unstructured":"Florentino \u00c9S, Goldschmidt RR, Cavalcanti MC (2022) Identificando suspeitos de crimes por meio de intera\u00e7\u00f5es impl\u00edcitas no youtube. iSys-Braz J Inf Syst 15(1):3\u201314","journal-title":"iSys-Braz J Inf Syst"},{"key":"569_CR34","first-page":"1","volume-title":"2023 IEEE seventh Ecuador Technical Chapters Meeting (ECTM)","author":"M Fortuny","year":"2023","unstructured":"Fortuny M, Sandoval R, Riofr\u00edo D, et al. (2023) Building a graph database for electronic inverse auction: Ecuador\u2019s case study. In: 2023 IEEE seventh Ecuador Technical Chapters Meeting (ECTM). IEEE, pp\u00a01\u20137"},{"issue":"1","key":"569_CR35","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.ijforecast.2020.06.006","volume":"37","author":"J Gallego","year":"2021","unstructured":"Gallego J, Rivero G, Mart\u00ednez J (2021) Preventing rather than punishing: an early warning model of malfeasance in public procurement. Int J Forecast 37(1):360\u2013377","journal-title":"Int J Forecast"},{"issue":"2","key":"569_CR36","first-page":"180","volume":"17","author":"EV Gilenko","year":"2023","unstructured":"Gilenko EV, Ivanov AE, Golubeva AA, et al. (2023) Suppliers\u2019 collusion in public procurement: ex-ante determinants in zero initial contract price decrease auctions (the case of Russian healthcare). Int J Procure Manag 17(2):180\u2013203","journal-title":"Int J Procure Manag"},{"key":"569_CR37","doi-asserted-by":"crossref","unstructured":"Gnaldi M, Del Sarto S (2023) Validating corruption risk measures: a key step to monitoring sdg progress. Soc Indic Res: 1\u201327","DOI":"10.1007\/s11205-023-03238-y"},{"key":"569_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejpoleco.2021.102170","volume":"75","author":"AG Gnip","year":"2022","unstructured":"Gnip AG (2022) All you need is political love? Assessing the effects of partisan favouritism in Croatia\u2019s public procurement. Eur J Polit Econ 75:102170","journal-title":"Eur J Polit Econ"},{"key":"569_CR39","first-page":"378","volume-title":"Anais do XXXVIII Simp\u00f3sio Brasileiro de Bancos de Dados, SBC","author":"LD Gomide","year":"2023","unstructured":"Gomide LD, dos Santos GB, Costa LL, et al. (2023) Minera\u00e7\u00e3o de dados sobre despesas p\u00fablicas de munic\u00edpios mineiros para gerar alertas de fraudes. In: Anais do XXXVIII Simp\u00f3sio Brasileiro de Bancos de Dados, SBC, pp\u00a0378\u2013383"},{"key":"569_CR40","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press, Cambridge. http:\/\/www.deeplearningbook.org"},{"key":"569_CR41","first-page":"316","volume-title":"International conference on mathematical optimization theory and operations research","author":"N Goryunova","year":"2021","unstructured":"Goryunova N, Baklanov A, Ianovski E (2021) Detecting corruption in single-bidder auctions via positive-unlabelled learning. In: International conference on mathematical optimization theory and operations research. Springer, Berlin, pp\u00a0316\u2013326"},{"key":"569_CR42","first-page":"185","volume-title":"International conference on machine learning, optimization, and data science","author":"N Goryunova","year":"2021","unstructured":"Goryunova N, Baklanov A, Ianovski E (2021) A noisy-labels approach to detecting uncompetitive auctions. In: International conference on machine learning, optimization, and data science. Springer, Berlin, pp\u00a0185\u2013200"},{"key":"569_CR43","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.socnet.2018.08.001","volume":"56","author":"R Grassi","year":"2019","unstructured":"Grassi R, Calderoni F, Bianchi M, et al. (2019) Betweenness to assess leaders in criminal networks: new evidence using the dual projection approach. Soc Netw 56:23\u201332","journal-title":"Soc Netw"},{"key":"569_CR44","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/CYBERNIGERIA51635.2021.9428793","volume-title":"2020 IEEE 2nd international conference on cyberspac (CYBER Nigeria)","author":"M Hamisu","year":"2021","unstructured":"Hamisu M, Mansour A (2021) Detecting advance fee fraud using nlp bag of word model. In: 2020 IEEE 2nd international conference on cyberspac (CYBER Nigeria), pp\u00a094\u201397"},{"key":"569_CR45","volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"T Hastie","year":"2017","unstructured":"Hastie T, Tibshirani R, Friedman J (2017) The elements of statistical learning: data mining, inference, and prediction"},{"key":"569_CR46","doi-asserted-by":"crossref","unstructured":"Herrera\u00a0Murillo DJ, Valerio-Ure\u00f1a G, Silva Atencio G, et al (2023) Information technologies for countering corruption: analysis of the Costa Rican public procurement system. Rev Bras Adm P\u00fablica 57(1)","DOI":"10.1590\/0034-761220220126"},{"key":"569_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin M, Sulaiman MN (2015) A review on evaluation metrics for data classification evaluations. Int J Data Min Knowl Manag Process 5:1\u201311. https:\/\/doi.org\/10.5121\/ijdkp.2015.5201","journal-title":"Int J Data Min Knowl Manag Process"},{"key":"569_CR48","doi-asserted-by":"publisher","first-page":"19161","DOI":"10.1109\/ACCESS.2018.2816564","volume":"6","author":"D Huang","year":"2018","unstructured":"Huang D, Mu D, Yang L, et al. (2018) Codetect: financial fraud detection with anomaly feature detection. IEEE Access 6:19161\u201319174","journal-title":"IEEE Access"},{"key":"569_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijindorg.2023.102946","volume":"89","author":"M Huber","year":"2023","unstructured":"Huber M, Imhof D (2023) Flagging cartel participants with deep learning based on convolutional neural networks. Int J Ind Organ 89:102946","journal-title":"Int J Ind Organ"},{"issue":"3","key":"569_CR50","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1111\/rssa.12811","volume":"185","author":"M Huber","year":"2022","unstructured":"Huber M, Imhof D, Ishii R (2022) Transnational machine learning with screens for flagging bid-rigging cartels. J R Stat Soc, Ser A, Stat Soc 185(3):1074\u20131114","journal-title":"J R Stat Soc, Ser A, Stat Soc"},{"key":"569_CR51","volume-title":"Fundamentals of applied probability and random processes","author":"O Ibe","year":"2014","unstructured":"Ibe O (2014) Fundamentals of applied probability and random processes. Academic Press, San Diego"},{"key":"569_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.irle.2021.106016","volume":"68","author":"D Imhof","year":"2021","unstructured":"Imhof D, Wallimann H (2021) Detecting bid-rigging coalitions in different countries and auction formats. Int Rev Law Econ 68:106016","journal-title":"Int Rev Law Econ"},{"issue":"3","key":"569_CR53","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1111\/itor.13323","volume":"31","author":"R Interian","year":"2024","unstructured":"Interian R, Carpanese I, Mello B, et al. (2024) Red flag algorithms for Brazilian electronic invoices: outlier detection and price risk classification. Int Trans Oper Res 31(3):1533\u20131553","journal-title":"Int Trans Oper Res"},{"key":"569_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-092367-3.50016-2","volume-title":"Exploratory and multivariate data analysis","author":"M Jambu","year":"1991","unstructured":"Jambu M (1991) Exploratory and multivariate data analysis. Elsevier, Amsterdam"},{"key":"569_CR55","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-031-38747-0_3","volume-title":"An introduction to statistical learning: with applications in python","author":"G James","year":"2023","unstructured":"James G, Witten D, Hastie T, et al. (2023) Linear regression. In: An introduction to statistical learning: with applications in python. Springer, Berlin, pp\u00a069\u2013134"},{"key":"569_CR56","first-page":"11951","volume-title":"Global encyclopedia of public administration, public policy, and governance","author":"D Jancsics","year":"2023","unstructured":"Jancsics D (2023) Shell companies and government corruption. In: Global encyclopedia of public administration, public policy, and governance. Springer, Berlin, pp\u00a011951\u201311956"},{"issue":"5","key":"569_CR57","first-page":"5311","volume":"35","author":"Y Jiang","year":"2022","unstructured":"Jiang Y, Liu G, Wu J, et al. (2022) Telecom fraud detection via Hawkes-enhanced sequence model. IEEE Trans Knowl Data Eng 35(5):5311\u20135324","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"569_CR58","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5753\/wcge.2023.229519","volume-title":"Anais do XI Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC","author":"DPG J\u00fanior","year":"2023","unstructured":"J\u00fanior DPG, de Sousa\u00a0Filho GF, Luc\u00eddio\u00a0dos Anjos FC (2023) Classifica\u00e7\u00e3o de fraudes em licita\u00e7\u00f5es p\u00fablicas atrav\u00e9s do agrupamento de empresas em conluios. In: Anais do XI Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico, SBC, pp\u00a013\u201324"},{"key":"569_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.asieco.2022.101554","volume":"84","author":"S Kang","year":"2023","unstructured":"Kang S, Kim D, Kim G (2023) Corporate entertainment expenses and corruption in public procurement. J Asian Econ 84:101554","journal-title":"J Asian Econ"},{"key":"569_CR60","volume-title":"Malware diffusion models for modern complex networks: theory and applications","author":"V Karyotis","year":"2016","unstructured":"Karyotis V, Khouzani MHR (2016) Malware diffusion models for modern complex networks: theory and applications, 1st edn. Morgan Kaufmann Publishers Inc., San Francisco","edition":"1"},{"issue":"5","key":"569_CR61","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1086\/718913","volume":"130","author":"K Kawai","year":"2022","unstructured":"Kawai K, Nakabayashi J (2022) Detecting large-scale collusion in procurement auctions. J Polit Econ 130(5):1364\u20131411","journal-title":"J Polit Econ"},{"issue":"1","key":"569_CR62","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1093\/restud\/rdac013","volume":"90","author":"K Kawai","year":"2023","unstructured":"Kawai K, Nakabayashi J, Ortner J, et al. (2023) Using bid rotation and incumbency to detect collusion: a regression discontinuity approach. Rev Econ Stud 90(1):376\u2013403","journal-title":"Rev Econ Stud"},{"key":"569_CR63","unstructured":"Keele S, et al (2007) Guidelines for performing systematic literature reviews in software engineering"},{"issue":"1","key":"569_CR64","doi-asserted-by":"publisher","first-page":"39","DOI":"10.15388\/Ekon.2011.0.957","volume":"90","author":"D Klima\u0161auskien\u0117","year":"2011","unstructured":"Klima\u0161auskien\u0117 D, Giedraitis V (2011) Fighting cartels: an application of economic theory and the effects of leniency policies. Ekonomika 90(1):39\u201352","journal-title":"Ekonomika"},{"key":"569_CR65","volume-title":"Data science: concepts and practice","author":"V Kotu","year":"2018","unstructured":"Kotu V, Deshpande B (2018) Data science: concepts and practice. Morgan Kaufmann, San Mateo"},{"key":"569_CR66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92333-8","volume-title":"Fraud and corruption major types, prevention, and control: major types, prevention, and control","author":"P Kratcoski","year":"2018","unstructured":"Kratcoski P, Edelbacher M (2018) Fraud and corruption major types, prevention, and control: major types, prevention, and control. https:\/\/doi.org\/10.1007\/978-3-319-92333-8"},{"key":"569_CR67","first-page":"11","volume-title":"Proc., 9th int. conf. on construction engineering and project management","author":"C Le","year":"2022","unstructured":"Le C, Nguyen T, Le T (2022) Detecting red-flag bidding patterns in low-bid procurement for highway projects with pattern mining. In: Proc., 9th int. conf. on construction engineering and project management. Korea Institute of Construction Engineering and Management, Seoul, pp\u00a011\u201317"},{"issue":"7553","key":"569_CR68","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"issue":"1","key":"569_CR69","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-023-00533-y","volume":"8","author":"CY Liew","year":"2023","unstructured":"Liew CY, Labadin J, Kok WC, et al. (2023) A methodology framework for bipartite network modeling. Appl Netw Sci 8(1):6","journal-title":"Appl Netw Sci"},{"key":"569_CR70","doi-asserted-by":"publisher","first-page":"1580","DOI":"10.18653\/v1\/2020.findings-emnlp.143","volume-title":"Findings of the Association for Computational Linguistics: EMNLP 2020","author":"M Lima","year":"2020","unstructured":"Lima M, Silva R, de Souza Mendes FL, et al. (2020) Inferring about fraudulent collusion risk on Brazilian public works contracts in official texts using a bi-lstm approach. In: Findings of the Association for Computational Linguistics: EMNLP 2020, pp\u00a01580\u20131588"},{"key":"569_CR71","first-page":"01","volume-title":"2023 International Joint Conference on Neural Networks (IJCNN)","author":"W Lima","year":"2023","unstructured":"Lima W, Lira R, Paiva A, et al. (2023) Methodology for automatic extraction of red flags in public procurement. In: 2023 International Joint Conference on Neural Networks (IJCNN). IEEE, pp\u00a001\u201307"},{"key":"569_CR72","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejpoleco.2021.102141","volume":"73","author":"M Lisciandra","year":"2022","unstructured":"Lisciandra M, Milani R, Millemaci E (2022) A corruption risk indicator for public procurement. Eur J Polit Econ 73:102141","journal-title":"Eur J Polit Econ"},{"issue":"2","key":"569_CR73","doi-asserted-by":"publisher","first-page":"135","DOI":"10.37808\/pfm.21.2.3","volume":"21","author":"RJ Lofaro","year":"2023","unstructured":"Lofaro RJ, Boykin EA, McCue CP, et al. (2023) Year-end spending spikes and single bid procedures: an analysis of public procurement in the European economic area. Public Financ Manag 21(2):135\u2013166","journal-title":"Public Financ Manag"},{"key":"569_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-021-00418-y","volume":"6","author":"MS Lyra","year":"2021","unstructured":"Lyra MS, Curado A, Dam\u00e1sio B, et al. (2021) Characterization of the firm\u2013firm public procurement co-bidding network from the state of Cear\u00e1 (Brazil) municipalities. Appl Netw Sci 6:1\u201310","journal-title":"Appl Netw Sci"},{"issue":"1","key":"569_CR75","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-022-00523-6","volume":"7","author":"MS Lyra","year":"2022","unstructured":"Lyra MS, Dam\u00e1sio B, Pinheiro FL, et al. (2022) Fraud, corruption, and collusion in public procurement activities, a systematic literature review on data-driven methods. Appl Netw Sci 7(1):83","journal-title":"Appl Netw Sci"},{"key":"569_CR76","series-title":"Proceedings of the tenth international conference on complex networks and their applications COMPLEX NETWORKS 2021 10","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-030-93409-5_11","volume-title":"Complex networks & their applications X: volume 1","author":"MS Lyra","year":"2022","unstructured":"Lyra MS, Pinheiro FL, Bacao F (2022) Public procurement fraud detection: a review using network analysis. In: Complex networks & their applications X: volume 1. Proceedings of the tenth international conference on complex networks and their applications COMPLEX NETWORKS 2021 10. Springer, Berlin, pp\u00a0116\u2013129"},{"key":"569_CR77","doi-asserted-by":"crossref","unstructured":"Maia P, Meira W Jr, Cerqueira B, et al (2020) Auditing government purchases with a multicriteria anomaly detection strategy. J Data Inf Manag 11(1)","DOI":"10.5753\/jidm.2020.2029"},{"key":"569_CR78","volume-title":"Proceedings of the 15th International Multi-conference on Complexity, Informatics and Cybernetics: IMCIC 2024","author":"MLS Mart\u00edn","year":"2024","unstructured":"Mart\u00edn MLS, Benitez DRN, Coronel JMP, et al. (2024) Quantifying the risk of complaints in public procurement tenders in Paraguay using machine learning. In: Proceedings of the 15th International Multi-conference on Complexity, Informatics and Cybernetics: IMCIC 2024"},{"key":"569_CR79","first-page":"420","volume-title":"Anais do XXXVIII Simp\u00f3sio Brasileiro de Bancos de Dados, SBC","author":"BM Mendes","year":"2023","unstructured":"Mendes BM, Braz CS, Costa LL, et al. (2023) Impacto de doa\u00e7oes eleitorais no faturamento de empresas: Um estudo nas elei\u00e7oes municipais em minas gerais. In: Anais do XXXVIII Simp\u00f3sio Brasileiro de Bancos de Dados, SBC, pp\u00a0420\u2013425"},{"key":"569_CR80","doi-asserted-by":"publisher","DOI":"10.3389\/fbinf.2024.1457619","volume":"4","author":"C Miller","year":"2024","unstructured":"Miller C, Portlock T, Nyaga DM, et al. (2024) A review of model evaluation metrics for machine learning in genetics and genomics. Front Bioinform 4:1457619","journal-title":"Front Bioinform"},{"key":"569_CR81","first-page":"200","volume-title":"Data","author":"N Modrusan","year":"2020","unstructured":"Modrusan N, Rabuzin K, Mrsic L (2020) Improving public sector efficiency using advanced text mining in the procurement process. In: Data, pp\u00a0200\u2013206"},{"key":"569_CR82","doi-asserted-by":"crossref","unstructured":"Mokeeva T, Yurko K (2023) Using digital tools in government procurement analysis: detecting suspicious purchases with control indicators. Int J Technol 14(8)","DOI":"10.14716\/ijtech.v14i8.6851"},{"key":"569_CR83","volume-title":"Introduction to linear regression analysis","author":"DC Montgomery","year":"2021","unstructured":"Montgomery DC, Peck EA, Vining GG (2021) Introduction to linear regression analysis. Wiley, New York"},{"key":"569_CR84","first-page":"1","volume-title":"Companion proceedings of the 23rd international conference on knowledge engineering and knowledge management, CEUR-WS","author":"R Nai","year":"2022","unstructured":"Nai R, Sulis E, Meo R, et al. (2022) Public procurement fraud detection and artificial intelligence techniques: a literature review. In: Companion proceedings of the 23rd international conference on knowledge engineering and knowledge management, CEUR-WS, pp\u00a01\u201313"},{"key":"569_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-014-0007-7","volume":"2","author":"MM Najafabadi","year":"2015","unstructured":"Najafabadi MM, Villanustre F, Khoshgoftaar TM, et al. (2015) Deep learning applications and challenges in big data analytics. J Big Data 2:1\u201321","journal-title":"J Big Data"},{"key":"569_CR86","volume-title":"Revis\u00e3o sistem\u00e1tica da literatura em engenharia de software: teoria e pr\u00e1tica","author":"EY Nakagawa","year":"2017","unstructured":"Nakagawa EY, Scannavino KRF, Fabbri SCPF, et al. (2017) Revis\u00e3o sistem\u00e1tica da literatura em engenharia de software: teoria e pr\u00e1tica. Elsevier, Brasil"},{"key":"569_CR87","doi-asserted-by":"crossref","unstructured":"Nicol\u00e1s-Carlock J, Luna-Pla I (2023) Organized crime behavior of shell-company networks in procurement: prevention insights for policy and reform. Trends Organ Crime: 1\u201317","DOI":"10.1007\/s12117-023-09499-w"},{"key":"569_CR88","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2021.667471","volume":"9","author":"JR Nicol\u00e1s-Carlock","year":"2021","unstructured":"Nicol\u00e1s-Carlock JR, Luna-Pla I (2021) Conspiracy of corporate networks in corruption scandals. Front Phys 9:667471","journal-title":"Front Phys"},{"key":"569_CR89","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/ICEDEG48599.2020.9096674","volume-title":"2020 seventh International Conference on eDemocracy & eGovernment (ICEDEG)","author":"MEK Niessen","year":"2020","unstructured":"Niessen MEK, Paciello JM, Fernandez JIP (2020) Anomaly detection in public procurements using the open contracting data standard. In: 2020 seventh International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, pp\u00a0127\u2013134"},{"issue":"3","key":"569_CR90","first-page":"315","volume":"19","author":"ABd Oliveira","year":"2024","unstructured":"Oliveira ABd, Silva PVJdG (2024) Governance in public procurement: accounting analysis of public acquisitions in Brazil during the covid-19 pandemic. Int J Procure Manag 19(3):315\u2013335","journal-title":"Int J Procure Manag"},{"key":"569_CR91","first-page":"1","volume-title":"Anais do XII Brazilian workshop on social network analysis and mining, SBC","author":"GP Oliveira","year":"2023","unstructured":"Oliveira GP, Mendes BM, Braz CS, et al. (2023) Ranqueamento de licita\u00e7oes publicas a partir de alertas de fraude. In: Anais do XII Brazilian workshop on social network analysis and mining, SBC, pp\u00a01\u201312"},{"key":"569_CR92","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1145\/3539637.3558230","volume-title":"Proceedings of the Brazilian symposium on multimedia and the web","author":"GP Oliveira","year":"2022","unstructured":"Oliveira GP, Reis AP, Freitas FA, et al. (2022) Detecting inconsistencies in public bids: an automated and data-based approach. In: Proceedings of the Brazilian symposium on multimedia and the web, pp\u00a0182\u2013190"},{"issue":"8","key":"569_CR93","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1111\/risa.13693","volume":"42","author":"M \u00d3skarsd\u00f3ttir","year":"2022","unstructured":"\u00d3skarsd\u00f3ttir M, Ahmed W, Antonio K, et al. (2022) Social network analytics for supervised fraud detection in insurance. Risk Anal 42(8):1872\u20131890","journal-title":"Risk Anal"},{"key":"569_CR94","doi-asserted-by":"crossref","unstructured":"Page MJ, McKenzie JE, Bossuyt PM, et al (2021) The prisma 2020 statement: an updated guideline for reporting systematic reviews. BMJ 372","DOI":"10.1136\/bmj.n71"},{"key":"569_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1\u201318","journal-title":"Inf Softw Technol"},{"key":"569_CR96","first-page":"69","volume-title":"Joint European conference on machine learning and knowledge discovery in databases","author":"L Potin","year":"2023","unstructured":"Potin L, Figueiredo R, Labatut V, et al. (2023) Pattern mining for anomaly detection in graphs: application to fraud in public procurement. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, Berlin, pp\u00a069\u201387"},{"key":"569_CR97","doi-asserted-by":"crossref","unstructured":"Pulido NR, Poveda AC, Carvajal JEM (2020) Corruption and institutions: an analysis for the Colombian case. Heliyon 6(9)","DOI":"10.1016\/j.heliyon.2020.e04874"},{"key":"569_CR98","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/ICOIACT50329.2020.9331959","volume-title":"2020 3rd International Conference on Information and Communications Technology (ICOIACT)","author":"A Purwanto","year":"2020","unstructured":"Purwanto A, Emanuel AWR (2020) Data analysis for corruption indications on procurement of goods and services. In: 2020 3rd International Conference on Information and Communications Technology (ICOIACT). IEEE, pp\u00a056\u201360"},{"issue":"1","key":"569_CR99","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56706-x","volume":"14","author":"O Rainio","year":"2024","unstructured":"Rainio O, Teuho J, Kl\u00e9n R (2024) Evaluation metrics and statistical tests for machine learning. Sci Rep 14(1):6086","journal-title":"Sci Rep"},{"key":"569_CR100","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.104047","volume":"133","author":"MJG Rodr\u00edguez","year":"2022","unstructured":"Rodr\u00edguez MJG, Rodr\u00edguez-Montequ\u00edn V, Ballesteros-P\u00e9rez P, et al. (2022) Collusion detection in public procurement auctions with machine learning algorithms. Autom Constr 133:104047","journal-title":"Autom Constr"},{"issue":"86","key":"569_CR101","first-page":"1","volume":"27","author":"A Sampaio","year":"2022","unstructured":"Sampaio A, Figueiredo P, Loiola E (2022) Compras p\u00fablicas no brasil: Ind\u00edcios de fraudes usando a lei de newcomb-benford. Cad Gest P\u00fablica e Cid 27(86):1\u201320","journal-title":"Cad Gest P\u00fablica e Cid"},{"issue":"9","key":"569_CR102","doi-asserted-by":"publisher","DOI":"10.3390\/su16093698","volume":"16","author":"MR Sanda","year":"2024","unstructured":"Sanda MR, Siminic\u0103 MI, Avram CD, et al. (2024) Ghosts in the machine: how big data analytics can be used to strengthen online public procurement accountability. Sustainability 16(9):3698","journal-title":"Sustainability"},{"issue":"2","key":"569_CR103","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1504\/EJIM.2024.135944","volume":"22","author":"IP Sanz","year":"2024","unstructured":"Sanz IP, Iturriaga FJL, Blanco-Alc\u00e1ntara D (2024) A neural network approach for predicting corruption in public procurement. Eur J Int Manag 22(2):175\u2013197","journal-title":"Eur J Int Manag"},{"key":"569_CR104","volume-title":"Practical business statistics","author":"AF Siegel","year":"2016","unstructured":"Siegel AF (2016) Practical business statistics. Academic Press, San Diego"},{"issue":"2","key":"569_CR105","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/TEM.2021.3049129","volume":"70","author":"R Signor","year":"2021","unstructured":"Signor R, Ballesteros-P\u00e9rez P, Love PE (2021) Collusion detection in infrastructure procurement: a modified order statistic method for uncapped auctions. IEEE Trans Eng Manag 70(2):464\u2013477","journal-title":"IEEE Trans Eng Manag"},{"issue":"6","key":"569_CR106","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1080\/01446193.2023.2287475","volume":"42","author":"R Signor","year":"2024","unstructured":"Signor R, Love PE, Ballesteros-P\u00e9rez P (2024) Detecting bid rigging in public auctions for procuring infrastructure projects: formulating the reference scenario for decision-making. Constr Manag Econ 42(6):545\u2013563","journal-title":"Constr Manag Econ"},{"issue":"1","key":"569_CR107","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CO.1943-7862.0001737","volume":"146","author":"R Signor","year":"2020","unstructured":"Signor R, Love PE, Belarmino AT, et al. (2020) Detection of collusive tenders in infrastructure projects: learning from operation car wash. J Constr Eng Manage 146(1):05019015","journal-title":"J Constr Eng Manage"},{"issue":"2","key":"569_CR108","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)IS.1943-555X.0000543","volume":"26","author":"R Signor","year":"2020","unstructured":"Signor R, Love PE, Oliveira Jr A, et al. (2020) Public infrastructure procurement: detecting collusion in capped first-priced auctions. J Infrastruct Syst 26(2):05020002","journal-title":"J Infrastruct Syst"},{"issue":"3","key":"569_CR109","first-page":"113","volume":"11","author":"R Signor","year":"2020","unstructured":"Signor R, Oliveira A Jr, Lopes AO, et al. (2020) Detec\u00e7\u00e3o e materializa\u00e7\u00e3o de conluio em licita\u00e7\u00f5es de obras p\u00fablicas. Rev Bras Ci\u00eanc Polic 11(3):113\u2013180","journal-title":"Rev Bras Ci\u00eanc Polic"},{"key":"569_CR110","doi-asserted-by":"publisher","first-page":"118","DOI":"10.5753\/wcge.2023.230608","volume-title":"Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico (WCGE), SBC","author":"MO Silva","year":"2023","unstructured":"Silva MO, Costa LL, Bezerra G, et al. (2023) An\u00e1lise de sobrepre\u00e7o em itens de licita\u00e7\u00f5es p\u00fablicas. In: Workshop de Computa\u00e7\u00e3o Aplicada em Governo Eletr\u00f4nico (WCGE), SBC, pp\u00a0118\u2013129"},{"key":"569_CR111","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijindorg.2023.102931","volume":"88","author":"D Silveira","year":"2023","unstructured":"Silveira D, de Moraes LB, Fiuza EP, et al. (2023) Who are you? Cartel detection using unlabeled data. Int J Ind Organ 88:102931","journal-title":"Int J Ind Organ"},{"key":"569_CR112","doi-asserted-by":"crossref","unstructured":"Silverio-Murillo A, Prudencio D, Balmori-de-la Miyar JR (2024) The effect of the covid-19 pandemic on risk of corruption. Public Organ Rev: 1\u201321","DOI":"10.1007\/s11115-024-00765-1"},{"key":"569_CR113","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-319-54978-1_63","volume-title":"Information technology-new generations: 14th international conference on information technology","author":"G Spadon","year":"2018","unstructured":"Spadon G, Scabora LC, Araujo MV, et al. (2018) Complex-network tools to understand the behavior of criminality in urban areas. In: Information technology-new generations: 14th international conference on information technology. Springer, Berlin, pp\u00a0493\u2013500"},{"key":"569_CR114","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/PDGC.2018.8745785","volume-title":"2018 fifth international conference on Parallel, Distributed and Grid Computing (PDGC)","author":"S Srivastava","year":"2018","unstructured":"Srivastava S, Singh AK (2018) Graph based analysis of Panama papers. In: 2018 fifth international conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, pp\u00a0822\u2013827"},{"key":"569_CR115","first-page":"548","volume-title":"Proceedings of SAI intelligent systems conference","author":"BKO Tas","year":"2022","unstructured":"Tas BKO (2022) Weak supervision can help detecting corruption in public procurement. In: Proceedings of SAI intelligent systems conference. Springer, Berlin, pp\u00a0548\u2013555"},{"issue":"2","key":"569_CR116","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-025-00364-0","volume":"8","author":"AS Toledo","year":"2025","unstructured":"Toledo AS, Carpi LC, Atman AP, et al. (2025) Outlier mining in criminal networks: the role of machine learning and outlier detection models. J Comput Soc Sci 8(2):36","journal-title":"J Comput Soc Sci"},{"key":"569_CR117","first-page":"254","volume-title":"Proceedings, part II 1","author":"Y Torres Berru","year":"2020","unstructured":"Torres Berru Y, L\u00f3pez\u00a0Batista VF, Torres-Carri\u00f3n P, et al. (2020) Artificial intelligence techniques to detect and prevent corruption in procurement: a systematic literature review. In: Proceedings, part II 1, Applied Technologies: First International Conference, ICAT 2019, Quito, Ecuador, December 3\u20135, 2019. Springer, Berlin, pp\u00a0254\u2013268"},{"issue":"22","key":"569_CR118","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10222873","volume":"10","author":"Y Torres-Berru","year":"2021","unstructured":"Torres-Berru Y, L\u00f3pez\u00a0Batista VF (2021) Data mining to identify anomalies in public procurement rating parameters. Electronics 10(22):2873","journal-title":"Electronics"},{"key":"569_CR119","doi-asserted-by":"crossref","unstructured":"Torres-Berru Y, Lopez-Batista VF, Zhingre LC (2023) A data mining approach to detecting bias and favoritism in public procurement. Intell Autom Soft Comput 36(3)","DOI":"10.32604\/iasc.2023.035367"},{"issue":"5","key":"569_CR120","first-page":"1","volume":"5","author":"M Tranmer","year":"2008","unstructured":"Tranmer M, Elliot M (2008) Multiple linear regression. Cathie Marsh Cent Census Surv Res (CCSR) 5(5):1\u20135","journal-title":"Cathie Marsh Cent Census Surv Res (CCSR)"},{"issue":"2","key":"569_CR121","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1111\/jori.12415","volume":"90","author":"M Tumminello","year":"2023","unstructured":"Tumminello M, Consiglio A, Vassallo P, et al. (2023) Insurance fraud detection: a statistically validated network approach. J Risk Insur 90(2):381\u2013419","journal-title":"J Risk Insur"},{"key":"569_CR122","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1145\/2808797.2810058","volume-title":"2015 IEEE\/ACM international conference on Advances in Social Networks Analysis and Mining (ASONAM)","author":"V Van Vlasselaer","year":"2015","unstructured":"Van Vlasselaer V, Eliassi-Rad T, Akoglu L, et al. (2015) Afraid: fraud detection via active inference in time-evolving social networks. In: 2015 IEEE\/ACM international conference on Advances in Social Networks Analysis and Mining (ASONAM), pp\u00a0659\u2013666. https:\/\/doi.org\/10.1145\/2808797.2810058"},{"key":"569_CR123","unstructured":"Vaswani A (2017) Attention is all you need. Adv Neural Inf Process Syst"},{"issue":"1","key":"569_CR124","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-53625-9","volume":"14","author":"I Villamil","year":"2024","unstructured":"Villamil I, Kert\u00e9sz J, Fazekas M (2024) Collusion risk in corporate networks. Sci Rep 14(1):3161","journal-title":"Sci Rep"},{"issue":"1","key":"569_CR125","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.jce.2019.09.002","volume":"48","author":"V Vukovi\u0107","year":"2020","unstructured":"Vukovi\u0107 V (2020) Corruption and re-election: how much can politicians steal before getting punished? J Comp Econ 48(1):124\u2013143","journal-title":"J Comp Econ"},{"key":"569_CR126","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s41060-019-00204-1","volume":"12","author":"J Wachs","year":"2021","unstructured":"Wachs J, Fazekas M, Kert\u00e9sz J (2021) Corruption risk in contracting markets: a network science perspective. Int J Data Sci Anal 12:45\u201360","journal-title":"Int J Data Sci Anal"},{"issue":"4","key":"569_CR127","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s10614-022-10315-w","volume":"62","author":"H Wallimann","year":"2023","unstructured":"Wallimann H, Imhof D, Huber M (2023) A machine learning approach for flagging incomplete bid-rigging cartels. Comput Econ 62(4):1669\u20131720","journal-title":"Comput Econ"},{"key":"569_CR128","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.tranpol.2023.09.010","volume":"143","author":"H Wallimann","year":"2023","unstructured":"Wallimann H, Sticher S (2023) On suspicious tracks: machine-learning based approaches to detect cartels in railway-infrastructure procurement. Transp Policy 143:121\u2013131","journal-title":"Transp Policy"},{"issue":"1","key":"569_CR129","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s12205-022-2400-7","volume":"27","author":"B Wang","year":"2023","unstructured":"Wang B, Zhu J, Xie J, et al. (2023) Collusion suspicion among bidders of construction supervision projects in China: based on bidding big data and complex networks. KSCE J Civ Eng 27(1):13\u201326","journal-title":"KSCE J Civ Eng"},{"issue":"2","key":"569_CR130","doi-asserted-by":"publisher","DOI":"10.3390\/land11020280","volume":"11","author":"X Wang","year":"2022","unstructured":"Wang X, Long W, Sang M, et al. (2022) Towards sustainable urbanization: exploring the influence paths of the urban environment on bidders\u2019 collusive willingness. Land 11(2):280","journal-title":"Land"},{"issue":"6","key":"569_CR131","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)ME.1943-5479.0000981","volume":"37","author":"X Wang","year":"2021","unstructured":"Wang X, Ye K, Chen M, et al. (2021) A conceptual framework for the inclusion of exogenous factors into collusive bidding price decisions. J Manag Eng 37(6):04021071","journal-title":"J Manag Eng"},{"issue":"1","key":"569_CR132","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/rfe.1157","volume":"41","author":"Z Wei","year":"2023","unstructured":"Wei Z, Zhu Y (2023) Public corruption and the allocation of government contracts. Rev Financ Econ 41(1):3\u201322","journal-title":"Rev Financ Econ"},{"key":"569_CR133","doi-asserted-by":"publisher","DOI":"10.1002\/0471704091","volume-title":"Applied linear regression","author":"S Weisberg","year":"2005","unstructured":"Weisberg S (2005) Applied linear regression"},{"issue":"6","key":"569_CR134","doi-asserted-by":"publisher","first-page":"3276","DOI":"10.1111\/itor.12968","volume":"28","author":"A Westerski","year":"2021","unstructured":"Westerski A, Kanagasabai R, Shaham E, et al. (2021) Explainable anomaly detection for procurement fraud identification\u2014lessons from practical deployments. Int Trans Oper Res 28(6):3276\u20133302","journal-title":"Int Trans Oper Res"},{"issue":"1","key":"569_CR135","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s11127-023-01102-8","volume":"197","author":"E Wittberg","year":"2023","unstructured":"Wittberg E, Fazekas M (2023) Firm performance, imperfect competition, and corruption risks in procurement: evidence from Swedish municipalities. Public Choice 197(1):227\u2013251","journal-title":"Public Choice"},{"key":"569_CR136","first-page":"1","volume-title":"Proceedings of the 18th international conference on evaluation and assessment in software engineering","author":"C Wohlin","year":"2014","unstructured":"Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp\u00a01\u201310"},{"issue":"8","key":"569_CR137","doi-asserted-by":"publisher","DOI":"10.3390\/buildings11080363","volume":"11","author":"L Xiao","year":"2021","unstructured":"Xiao L, Ye K, Zhou J, et al. (2021) A social network-based examination on bid riggers\u2019 relationships in the construction industry: a case study of China. Buildings 11(8):363","journal-title":"Buildings"},{"issue":"10","key":"569_CR138","doi-asserted-by":"publisher","first-page":"12113","DOI":"10.1109\/TPAMI.2023.3275156","volume":"45","author":"P Xu","year":"2023","unstructured":"Xu P, Zhu X, Clifton DA (2023) Multimodal learning with transformers: a survey. IEEE Trans Pattern Anal Mach Intell 45(10):12113\u201312132","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"569_CR139","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6612848","volume":"2020","author":"J Zhu","year":"2020","unstructured":"Zhu J, Wang B, Li L, et al. (2020) Bidder network community division and collusion suspicion analysis in Chinese construction projects. Adv Civ Eng 2020(1):6612848","journal-title":"Adv Civ Eng"},{"issue":"4","key":"569_CR140","doi-asserted-by":"publisher","first-page":"273","DOI":"10.2478\/danb-2021-0018","volume":"12","author":"D Zigo","year":"2021","unstructured":"Zigo D, Vincent F (2021) \u201cBeneficial owners\u201d policy: comparison of its efficacy in the West with prospects for curbing corruption in China. Danube 12(4):273\u2013292","journal-title":"Danube"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-025-00569-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-025-00569-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-025-00569-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T18:38:55Z","timestamp":1757270335000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-025-00569-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,22]]},"references-count":140,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["569"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-025-00569-3","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,22]]},"assertion":[{"value":"25 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"52"}}