{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:16Z","timestamp":1750220476610,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3482632.3487540","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T17:26:42Z","timestamp":1637602002000},"page":"2919-2922","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Application of Data Mining Technology in Financial Fraud Identification"],"prefix":"10.1145","author":[{"given":"Shunyu","family":"Yao","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/560407"},{"key":"e_1_3_2_1_2_1","first-page":"17","article-title":"Literature review and analysis on accounting fraud","volume":"3","author":"Dan Wu","year":"2013","journal-title":"Financial and Accounting Bulletin, no"},{"key":"e_1_3_2_1_3_1","first-page":"98","article-title":"Identification of financial reporting fraud of listed companies: An Empirical Study Based on triangle theory","volume":"2","author":"Lin Wei","year":"2011","journal-title":"Audit Research, no"},{"key":"e_1_3_2_1_4_1","first-page":"84","article-title":"Research on the identification of financial reporting fraud of listed companies based on GONE theory","volume":"8","author":"Hong Hong","year":"2012","journal-title":"Accounting Research, no"},{"key":"e_1_3_2_1_5_1","first-page":"323","article-title":"Red flagging Management Fraud","volume":"3","author":"Romney W.S","year":"1986","journal-title":"A Validation. Advances in Accounting, no"},{"volume-title":"Review of SEC Accounting and Auditing Enforcement Releases. Working paper","year":"1988","author":"Loebbeke","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"95","article-title":"Application and development path of data mining technology in financial fraud identification","volume":"21","author":"Xiaolan Sun","year":"2020","journal-title":"Fortune Today, no"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"volume-title":"Application of clustering and classification methods in financial fraud analysis of listed companies","year":"2007","author":"Jianhong Zhai","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"volume-title":"Beyond Regression: New Tools for Prediction and Analysis in the Behavioral Sciences","year":"1974","key":"e_1_3_2_1_11_1"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"14","article-title":"Assessing the risk of management fraud through neural network technology. Auditing","volume":"16","author":"Green","year":"1997","journal-title":"A Journal of Practice&Theory."},{"volume-title":"A hybrid model of financial reporting fraud identification of manufacturing listed companies","year":"2011","author":"Kang Li","key":"e_1_3_2_1_13_1"}],"event":{"name":"ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education","acronym":"ICISCAE 2021","location":"Dalian China"},"container-title":["2021 4th International Conference on Information Systems and Computer Aided Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3482632.3487540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:45Z","timestamp":1750193325000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":13,"alternative-id":["10.1145\/3482632.3487540","10.1145\/3482632"],"URL":"https:\/\/doi.org\/10.1145\/3482632.3487540","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}