{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:00:12Z","timestamp":1775851212026,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BINUS UNIVERSITY","award":["123456"],"award-info":[{"award-number":["123456"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,27]]},"DOI":"10.1145\/3472349.3472359","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T19:40:46Z","timestamp":1633462846000},"page":"75-82","source":"Crossref","is-referenced-by-count":6,"title":["Theory and Factors Influencing Fraud in Financial Statements: A Systematic Literature Review"],"prefix":"10.1145","author":[{"given":"Gatot","family":"Soepriyanto","sequence":"first","affiliation":[{"name":"Bina Nusantara University,Jakarta,Indonesia 11480, Indonesia"}]},{"given":"Meiryani","family":"Meiryani","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,Jakarta,Indonesia 11480, Indonesia"}]},{"given":"Mohamad Ikhsan","family":"Modjo","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,Jakarta,Indonesia 11480, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481674.2481688"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-2019-1"},{"key":"e_1_3_2_1_3_1","volume-title":"Detecting Financial Statement Frauds in Malaysia: Comparing the Abilities of Beneish and Dechow Models. Asian Journal of Accounting and Governance, 57 - 65","author":"Aghghaleh S. F.","year":"2016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.19030\/jabr.v31i4.9330"},{"key":"e_1_3_2_1_5_1","first-page":"243","article-title":"Disclosure of corporate governance structure and the likelihood of fraudulent financial reporting","volume":"145","author":"Asyiqin W. A.","year":"2014","journal-title":"Elsevier"},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"81","article-title":"Measuring The Potential for Financial Reporting Fraud In a Highly Regulated Industry","volume":"24","author":"Awang Y.","year":"2016","journal-title":"The International Journal of Accounting and Businiess Society"},{"key":"e_1_3_2_1_7_1","unstructured":"Beasley M. S. Carcello J. V. & Hermanson D. R. (n.d.). Fraudulent Financial Reporting: 1987-1997 An Analysis of U.S Public Companies. Beasley M. S. Carcello J. V. & Hermanson D. R. (n.d.). Fraudulent Financial Reporting: 1987-1997 An Analysis of U.S Public Companies."},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"441","article-title":"Fraudulent Financial Reporting: Consideration of Industry Traits and Corporate Governance Mechanisms","volume":"14","author":"Beasley M. S.","year":"2000","journal-title":"American Accounting Association"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2000.19.1.169"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"DNA barcode authentication reveals highly fraudulent Cod commerce in Porto Alegre","volume":"2","author":"Calegari B. B.","year":"2019","journal-title":"Brazil. Elsevier"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2308\/aud.2004.23.2.55"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/02686900410537775"},{"issue":"89","key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Detection of fraudulent financial statements using the hybrid data mining approach","volume":"5","author":"Chen S.","year":"2016","journal-title":"SpringerPlus"},{"key":"e_1_3_2_1_14_1","volume-title":"Support Vector Machine, and Decision Tree for Forecasting Fraudulent Financial Statements","author":"Chen S.","year":"2014"},{"key":"e_1_3_2_1_15_1","first-page":"61","article-title":"Accountability in financial reporting: detecting fraudulent firms","volume":"145","author":"Dalnial H.","year":"2014","journal-title":"Elsevier"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.12720\/joams.2.1.17-22"},{"key":"e_1_3_2_1_17_1","volume-title":"Fraudulent Financial Reporting and Technological Capability in the Infrormation Technology Sectoor: A Resource-Based Perspective. CrossMark","author":"Fung M. K.","year":"2016"},{"key":"e_1_3_2_1_18_1","first-page":"585","article-title":"Identification of fraudulent financial statements using linguistic credibility analysis","volume":"50","author":"Humpherys S. L.","year":"2011","journal-title":"Elsevier"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5296\/ijafr.v7i2.12174"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Johansson E. & Carey P. (2015 May 08). Detecting Fraud: The Role of the Anonymous Reporting Channel. CrossMark. Johansson E. & Carey P. (2015 May 08). Detecting Fraud: The Role of the Anonymous Reporting Channel. CrossMark.","DOI":"10.1007\/s10551-015-2673-6"},{"key":"e_1_3_2_1_21_1","first-page":"321","article-title":"The Model of Fraud Detection in Financial Statements by Means of Financial Ratios","volume":"213","author":"Kanapickiene R.","year":"2015","journal-title":"Elsevier"},{"key":"e_1_3_2_1_22_1","first-page":"995","article-title":"Data Mining techniques for the detection of fraudulent financial statements","volume":"32","author":"Kirkos E.","year":"2007","journal-title":"Elsevier"},{"key":"e_1_3_2_1_23_1","first-page":"7","article-title":"Systematic literature reviews in software engineering \u2013 A systematic","volume":"51","author":"Kitchenham B.","year":"2008","journal-title":"Elsevier"},{"issue":"2","key":"e_1_3_2_1_24_1","first-page":"104","article-title":"Forecasting Fraudulent Financial Statements using Data Mining","volume":"3","author":"Kotsiantis S.","year":"2006","journal-title":"International Journal of Computational Intelligence"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/02686900310495151"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3846\/cibmee.2019.029"},{"issue":"2","key":"e_1_3_2_1_27_1","first-page":"61","article-title":"Fraud Risk Factor Of The Fraud Triangle Assessing The likelihood of Fraudulent Financial Reporting","volume":"7","author":"Lou Y. I.","year":"2009","journal-title":"Journal of Business & Economics Research"},{"key":"e_1_3_2_1_28_1","first-page":"1","author":"Lui X. K.","year":"2013","journal-title":"Managers' Unethical Fraudulent Financial Reporting: the Effect of Control Strength and Control Framing."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","DOI":"10.1016\/j.matpr.2020.09.613","volume-title":"Selection of most significant variables to detect fraud in financial statements","author":"Maka K.","year":"2020"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/ARJ-02-2018-0024"},{"issue":"9","key":"e_1_3_2_1_31_1","first-page":"2626","article-title":"The Influence of Business Process and Risk Management on The Quality of Accounting Information System","volume":"96","author":"Meiryani","year":"2018","journal-title":"Journal of Theoretical and Applied Information Technology."},{"key":"e_1_3_2_1_32_1","first-page":"254","volume":"167","author":"Misra S.","year":"2020","journal-title":"Elsevier"},{"issue":"1","key":"e_1_3_2_1_33_1","first-page":"43","volume":"10","author":"Mohamed Zawawi S. H.","year":"2011","journal-title":"Determinants of Behavioral Intention of Fraudulent Financial Reporting: Using The Theory of Reasoned Action."},{"key":"e_1_3_2_1_34_1","first-page":"749","article-title":"Sell-side security analysts: Re-reporting of Enron corporation fraudulent financial data","volume":"62","author":"Munawer Z.","year":"2012","journal-title":"Elsevier"},{"key":"e_1_3_2_1_35_1","first-page":"190","article-title":"Empirical Research on External Auditors' Detection of Financial Statement Fraud","volume":"19","author":"Nieschwietz R. J.","year":"2000","journal-title":"Journal of Accounting Literature"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2014.07.002"},{"key":"e_1_3_2_1_37_1","unstructured":"Onza G. D. & Lamboglia R. (n.d.). The relation between the corporate governance characteristics and financial statement frauds: an empiricla analysis of Italian listed companies. 1-21. Onza G. D. & Lamboglia R. (n.d.). The relation between the corporate governance characteristics and financial statement frauds: an empiricla analysis of Italian listed companies. 1-21."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Persons D. S. (n.d.). Using Financial Statement Data to Identify Factors Assosciated with Fraudulent Financial Report. Journal of Applied Business Research 11(3) 38 - 46. Persons D. S. (n.d.). Using Financial Statement Data to Identify Factors Assosciated with Fraudulent Financial Report. Journal of Applied Business Research 11(3) 38 - 46.","DOI":"10.19030\/jabr.v11i3.5858"},{"issue":"4","key":"e_1_3_2_1_39_1","first-page":"755","article-title":"Detecting and Predicting Accounting irregularities: A Comparison of Commercial and Academic Risk Measures","volume":"25","author":"Price III, R. A.","year":"2011","journal-title":"American Accounting Association"},{"key":"e_1_3_2_1_40_1","first-page":"277","article-title":"Causes, consequences, and deterence of financial statement fraud","volume":"16","author":"Rezaee Z.","year":"2005","journal-title":"Elsevier"},{"key":"e_1_3_2_1_41_1","first-page":"167","article-title":"PCAOB Sanction and Client Stock Market Reactions : Evidence from the case of Ernst and Young Indonesia","volume":"2020","author":"Soepriyanto Gatot","year":"2020","journal-title":"Pertanika Journal of Social Sciences and Humanities"},{"key":"e_1_3_2_1_42_1","first-page":"29","article-title":"Figure massaging practices in Malaysian firms: are they fraudulent","volume":"145","author":"Sulaiman S.","year":"2014","journal-title":"Elsevier"},{"issue":"1","key":"e_1_3_2_1_43_1","first-page":"131","article-title":"Fraudulently Misstated Financial Statements and Insider Trading: An Empirical Analysis","volume":"73","author":"Summers S. L.","year":"1998","journal-title":"The Accounting Review"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/1476127011421534"},{"key":"e_1_3_2_1_45_1","first-page":"31","author":"Tsaih R. H.","year":"2009","journal-title":"Exploring Fraudulent Financial Reporting with GHSOM."},{"key":"e_1_3_2_1_46_1","first-page":"3037","article-title":"Application of machine learning models and artificial intelligence to analyze annual financial statements to identify companies with unfair corporate culture","volume":"176","author":"Wyrobek J.","year":"2020","journal-title":"Elsevier"},{"key":"e_1_3_2_1_47_1","first-page":"693","volume":"39","author":"Zager L.","year":"2016","journal-title":"Elsevier"},{"issue":"02","key":"e_1_3_2_1_48_1","first-page":"2403","article-title":"The Appropriateness of Fraud Triangle and Diamond Models in Assessing The Likelihood of Fraudulent Financial Statements- An Empirical Study on Firms Listed in The Egyptian Stock Exchange","volume":"02","author":"Zaki N. M.","year":"2017","journal-title":"International Journal of Social Science and Economic Research"},{"key":"e_1_3_2_1_49_1","first-page":"570","article-title":"Detecting evolutionary financial statement fraud","volume":"50","author":"Zhou W.","year":"2010","journal-title":"Elsevier"}],"event":{"name":"ICEMC '21: 2021 The 6th International Conference on E-business and Mobile Commerce","location":"Seoul Republic of Korea","acronym":"ICEMC '21"},"container-title":["2021 The 6th International Conference on E-business and Mobile Commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472349.3472359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472349.3472359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:10Z","timestamp":1750193290000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472349.3472359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":49,"alternative-id":["10.1145\/3472349.3472359","10.1145\/3472349"],"URL":"https:\/\/doi.org\/10.1145\/3472349.3472359","relation":{},"subject":[],"published":{"date-parts":[[2021,5,27]]}}}