{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:44:14Z","timestamp":1769885054237,"version":"3.49.0"},"reference-count":42,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Education, Youth and Sports","award":["VEGA 2\/0029\/24"],"award-info":[{"award-number":["VEGA 2\/0029\/24"]}]},{"name":"Ministry of Education, Youth and Sports","award":["APVV-22-0115"],"award-info":[{"award-number":["APVV-22-0115"]}]},{"name":"Slovak Agency for Research and Development","award":["VEGA 2\/0029\/24"],"award-info":[{"award-number":["VEGA 2\/0029\/24"]}]},{"name":"Slovak Agency for Research and Development","award":["APVV-22-0115"],"award-info":[{"award-number":["APVV-22-0115"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Axioms"],"abstract":"<jats:p>Benford\u2019s Law describes the effect of specific first significant digit probability distribution in natural datasets. In the case of non-natural or artificial intervention within such datasets, the first digit probability distribution tends to deviate from the theoretical distribution. Thus, Benford\u2019s Law-based methods are useful in detecting unnatural changes in datasets indicating artificial manipulation of the original data. In our article, we first briefly describe the theory behind this law with an overview of Benford\u2019s Law\u2019s properties. We then focus on conformity tests for Benford\u2019s Law as methods for data change detection compared with the original dataset. In our research, the datasets were collected from electricity consumption metering devices. We provide the results of conformity with Benford\u2019s Law for affected datasets within a series of simulations with different affecting operations. We found a research gap when comparing the deviation from a theoretical first-digit probability distribution for different operations affecting the original dataset. We have made a series of simulations with different affecting operations and we tried to determine the effectiveness thresholds for each operation. As shown in the results section, different intervention operations manifest different specific thresholds of such deviations from Benford\u2019s Law\u2019s distribution.<\/jats:p>","DOI":"10.3390\/axioms14040273","type":"journal-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T06:52:56Z","timestamp":1743749576000},"page":"273","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Benford\u2019s Law Effectiveness Threshold Differences According to Affecting Operation"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1625-2723","authenticated-orcid":false,"given":"Jaroslav","family":"Petr\u00e1\u0161","sequence":"first","affiliation":[{"name":"Department of Electric Power Engineering, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice-Sever, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4995-3470","authenticated-orcid":false,"given":"Ardian","family":"Hyseni","sequence":"additional","affiliation":[{"name":"Department of Electric Power Engineering, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice-Sever, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4383-3996","authenticated-orcid":false,"given":"J\u00e1n","family":"Zbojovsk\u00fd","sequence":"additional","affiliation":[{"name":"Department of Electric Power Engineering, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice-Sever, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8375-2819","authenticated-orcid":false,"given":"Marek","family":"Pavl\u00edk","sequence":"additional","affiliation":[{"name":"Department of Electric Power Engineering, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice-Sever, Slovakia"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Petr\u00e1\u0161, J., Pavl\u00edk, M., Zbojovsk\u00fd, J., Hyseni, A., and Dudiak, J. (2023). Benford\u2019s Law in Electric Distribution Network. Mathematics, 11.","DOI":"10.3390\/math11183863"},{"key":"ref_2","unstructured":"Miller, S.J. (2015). Benford\u2019s Law. Theory and Applications, Princeton University Press."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"745","DOI":"10.3390\/stats4030044","article-title":"Some New Tests of Conformity with Benford\u2019s Law","volume":"4","author":"Cerqueti","year":"2021","journal-title":"Stats"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Lesperance, M., Reed, W.J., Stephens, M.A., Tsao, C., and Wilton, B. (2016). Assessing Conformance with Benford\u2019s Law: Goodness-Of-Fit Tests and Simultaneous Confidence Intervals. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0151235"},{"key":"ref_5","first-page":"551","article-title":"The Law of Anomalous Numbers","volume":"78","author":"Benford","year":"1938","journal-title":"Proc. Am. Philos. Soc."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1080\/00029890.1976.11994162","article-title":"The First Digit Problem","volume":"83","author":"Raimi","year":"1976","journal-title":"Am. Math. Mon."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"305","DOI":"10.2308\/aud.2009.28.2.305","article-title":"Data Diagnostics Using Second-Order Tests of Benford\u2019s Law","volume":"28","author":"Nigrini","year":"2009","journal-title":"Audit. A J. Pract. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Butgereit, L. (2021, January 5\u20136). Covid-19 New Cases Measurements and Benford\u2019s Law with Specific Focus on South Africa. Proceedings of the International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Durban, South Africa.","DOI":"10.1109\/icABCD51485.2021.9519321"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Crocetti, E., and Randi, G. (2016). Using the Benford\u2019s Law as a First Step to Assess the Quality of the Cancer Registry Data. Front. Public Health, 4.","DOI":"10.3389\/fpubh.2016.00225"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s00283-010-9182-3","article-title":"Benford\u2019s Law Strikes Back: No Simple Explanation in Sight for Mathematical Gem","volume":"33","author":"Berger","year":"2011","journal-title":"Math Intell."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"00368504211021232","DOI":"10.1177\/00368504211021232","article-title":"Can we rely on COVID-19 data? An assessment of data from over 200 countries worldwide","volume":"104","author":"Farhadi","year":"2021","journal-title":"Sci. Prog."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"109573","DOI":"10.1016\/j.econlet.2020.109573","article-title":"Benford\u2019s Law and COVID-19 Reporting","volume":"196","author":"Koch","year":"2020","journal-title":"Econ. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"022008","DOI":"10.1088\/1755-1315\/692\/2\/022008","article-title":"Evaluation and correction of electricity consumption statistics based on Benford-Zipf","volume":"692","author":"Yang","year":"2021","journal-title":"IOP Conf. Ser. Earth Environ. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/TEMC.2010.2067218","article-title":"Benford\u2019s Law and Its Application to Lightning Data","volume":"52","author":"Manoochehrnia","year":"2010","journal-title":"IEEE Trans. Electromagn. Compat."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Mansouri, E., Mostajabi, A., Schulz, W., Diendorfer, G., Rubinstein, M., and Rachidi, F. (2022). On the Use of Benford\u2019s Law to Assess the Quality of the Data Provided by Lightning Locating Systems. Atmosphere, 13.","DOI":"10.3390\/atmos13040552"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"5693","DOI":"10.1007\/s00500-016-2146-6","article-title":"Detection of content-aware image resizing based on Benford\u2019s law","volume":"21","author":"Sheng","year":"2017","journal-title":"Soft Comput."},{"key":"ref_17","first-page":"574","article-title":"A generalized Benford\u2019s law for JPEG coefficients and its applications in image forensics","volume":"9","author":"Fu","year":"2007","journal-title":"Secur. Steganography Watermarking Multimed. Contents"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.1109\/TNS.2007.903182","article-title":"Quantifying the Partial Volume Effect in PET Using Benford\u2019s Law","volume":"54","author":"Wells","year":"2007","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"101163","DOI":"10.1016\/j.joi.2021.101163","article-title":"Use of Benford\u2019s law on academic publishing networks","volume":"15","year":"2021","journal-title":"J. Informetr."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.physa.2018.08.133","article-title":"Benford\u2019s law and first letter of words","volume":"512","author":"Yan","year":"2018","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"109182","DOI":"10.1016\/j.econlet.2020.109182","article-title":"Testing firm-level data quality in China against Benford\u2019s Law","volume":"192","author":"Huang","year":"2020","journal-title":"Econ. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Parnak, A., Baleghi, Y., and Kazemitabar, J. (2020, January 23\u201324). A Novel Forgery Detection Algorithm Based on Mantissa Distribution in Digital Images. Proceedings of the 6th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS), Mashhad, Iran.","DOI":"10.1109\/ICSPIS51611.2020.9349611"},{"key":"ref_23","first-page":"2872","article-title":"Sensitivity to statistical regularities: People (largely) follow Benford\u2019s law","volume":"31","author":"Burns","year":"2009","journal-title":"Proc. Annu. Meet. Cogn. Sci. Soc."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/11-PS175","article-title":"A basic theory of Benford\u2019s Law","volume":"8","author":"Berger","year":"2011","journal-title":"Probab. Surv."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1038\/scientificamerican1269-109","article-title":"The Peculiar Distribution of First Digits","volume":"221","author":"Raimi","year":"1969","journal-title":"Sci. Am."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Nigrini, M.J., and Wells, J.T. (2012). Benford\u2019s Law: Applications for Forensic Accounting, Auditing, and Fraud Detection, Wiley.","DOI":"10.1002\/9781119203094"},{"key":"ref_27","first-page":"154","article-title":"Benford\u2019s law for integrity tests of high-volume databases: A case study of internal audit in a state-owned enterprise","volume":"27","author":"Morales","year":"2020","journal-title":"J. Econ. Financ. Adm. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"419","DOI":"10.3390\/stats4020027","article-title":"On the Mistaken Use of the Chi-Square Test in Benford\u2019s Law","volume":"4","author":"Kossovsky","year":"2021","journal-title":"Stats"},{"key":"ref_29","unstructured":"Field, A.P. (2013). Discovering Statistics Using IBM SPSS Statistics: And Sex and Drugs and Rock \u2018n\u2019 Roll, SAGE."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Pallant, J. (2020). SPSS Survival Manual: A Step by Step Guide to Data Analysis Using IBM SPSS, Routledge.","DOI":"10.4324\/9781003117452"},{"key":"ref_31","unstructured":"Howell, D.C. (2010). Statistical Methods for Psychology, Cengage Learning."},{"key":"ref_32","unstructured":"Hair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E. (2019). Multivariate Data Analysis, Cengage Learning, EMEA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, S. (2020). United Statistical Algorithms and Data Science: An Introduction to the Principles. Nonparametric Statistics, Springer. Springer Proceedings in Mathematics and Statistics.","DOI":"10.1007\/978-3-030-57306-5_33"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Greenland, S., and VanderWeele, T.J. (2015). Validity and bias in epidemiological research. Oxford Textbook of Global Public Health, Oxford University Press.","DOI":"10.1093\/med\/9780199661756.003.0116"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1108\/JAAR-05-2022-0097","article-title":"Applying Benford\u2019s law to detect accounting data manipulation in the pre-and post-financial engineering periods","volume":"24","author":"Harb","year":"2023","journal-title":"J. Appl. Account. Res."},{"key":"ref_36","first-page":"1","article-title":"Benford\u2019s Law and Macroeconomic Data Quality","volume":"9","author":"Campos","year":"2009","journal-title":"IMF Work. Pap."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"159291","DOI":"10.1109\/ACCESS.2021.3131220","article-title":"Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods","volume":"9","author":"Althobaiti","year":"2021","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wei, L., Sundararajan, A., Sarwat, A.I., Biswas, S., and Ibrahim, E. (2017). A distributed intelligent framework for electricity theft detection using Benford\u2019s law and stackelberg game. Resilience Week (RWS), IEEE.","DOI":"10.1109\/RWEEK.2017.8088640"},{"key":"ref_39","first-page":"17","article-title":"The Effective Use of Benford\u2019s Law to Assist in Detecting Fraud in Accounting Data","volume":"5","author":"Durtschi","year":"2004","journal-title":"J. Forensic. Acc."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"106258","DOI":"10.1016\/j.epsr.2020.106258","article-title":"Detection and identification of energy theft in advanced metering infrastructures","volume":"182","author":"Pereira","year":"2020","journal-title":"Electr. Power Syst. Res."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"39638","DOI":"10.1109\/ACCESS.2022.3166146","article-title":"Electricity Theft Detection in Smart Grids Based on Deep Neural Network","volume":"10","author":"Lepolesa","year":"2022","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1119\/1.16838","article-title":"Benford\u2019s law and physical constants: The distribution of initial digits","volume":"59","author":"Burke","year":"1991","journal-title":"Am. J. Phys."}],"container-title":["Axioms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2075-1680\/14\/4\/273\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:09:27Z","timestamp":1760029767000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2075-1680\/14\/4\/273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,3]]},"references-count":42,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["axioms14040273"],"URL":"https:\/\/doi.org\/10.3390\/axioms14040273","relation":{},"ISSN":["2075-1680"],"issn-type":[{"value":"2075-1680","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,3]]}}}