{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T01:27:02Z","timestamp":1776907622290,"version":"3.51.2"},"reference-count":77,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T00:00:00Z","timestamp":1632960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012511","name":"Escuela Polit\u00e9cnica Nacional","doi-asserted-by":"publisher","award":["PII-DETRI-2021-02"],"award-info":[{"award-number":["PII-DETRI-2021-02"]}],"id":[{"id":"10.13039\/501100012511","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Fraud entails deception in order to obtain illegal gains; thus, it is mainly evidenced within financial institutions and is a matter of general interest. The problem is particularly complex, since perpetrators of fraud could belong to any position, from top managers to payroll employees. Fraud detection has traditionally been performed by auditors, who mainly employ manual techniques. These could take too long to process fraud-related evidence. Data mining, machine learning, and, as of recently, deep learning strategies are being used to automate this type of processing. Many related techniques have been developed to analyze, detect, and prevent fraud-related behavior, with the fraud triangle associated with the classic auditing model being one of the most important of these. This work aims to review current work related to fraud detection that uses the fraud triangle in addition to machine learning and deep learning techniques. We used the Kitchenham methodology to analyze the research works related to fraud detection from the last decade. This review provides evidence that fraud is an area of active investigation. Several works related to fraud detection using machine learning techniques were identified without the evidence that they incorporated the fraud triangle as a method for more efficient analysis.<\/jats:p>","DOI":"10.3390\/computers10100121","type":"journal-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T10:22:42Z","timestamp":1632997362000},"page":"121","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4077-4858","authenticated-orcid":false,"given":"Marco","family":"S\u00e1nchez-Aguayo","sequence":"first","affiliation":[{"name":"Departamento de Inform\u00e1tica y Ciencias de la Computaci\u00f3n, Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-253, Quito 170517, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6405-2067","authenticated-orcid":false,"given":"Luis","family":"Urquiza-Aguiar","sequence":"additional","affiliation":[{"name":"Departamento de Electr\u00f3nica, Telecomunicaciones y Redes de Informaci\u00f3n, Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-253, Quito 170517, Ecuador"}]},{"given":"Jos\u00e9","family":"Estrada-Jim\u00e9nez","sequence":"additional","affiliation":[{"name":"Departamento de Electr\u00f3nica, Telecomunicaciones y Redes de Informaci\u00f3n, Escuela Polit\u00e9cnica Nacional, Ladr\u00f3n de Guevara E11-253, Quito 170517, Ecuador"}]}],"member":"1968","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"ref_1","first-page":"143","article-title":"A novel dynamic approach to identifying suspicious customers in money transactions","volume":"17","author":"Shaikh","year":"2020","journal-title":"Int. J. Bus. Intell. Data Min."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Panigrahi, P.K. (2011, January 3\u20135). A framework for discovering internal financial fraud using analytics. Proceedings of the 2011 International Conference on Communication Systems and Network Technologies, Katra, India.","DOI":"10.1109\/CSNT.2011.74"},{"key":"ref_3","unstructured":"Silowash, G., Cappelli, D., Moore, A., Trzeciak, R., Shimeall, T., and Flynn, L. (2012). Common Sense Guide to Prevention and Detection of Insider Threats, Carnegie Mellon University CyLab. [4th ed.]."},{"key":"ref_4","first-page":"1","article-title":"Detecting asset misappropriation: A framework for external auditors","volume":"10","author":"Kassem","year":"2014","journal-title":"Int. J. Account. Audit. Perform. Eval."},{"key":"ref_5","unstructured":"Sayal, K., and Singh, G. (2020). What Role Does Human Behaviour Play in Corporate Frauds?. Econ. Political Wkly., 55, Available online: https:\/\/www.epw.in\/engage\/article\/what-role-does-human-behaviour-play-corporate."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"76","DOI":"10.13189\/ujaf.2019.070302","article-title":"An overview of instruments and tools to detect fraudulent financial statements","volume":"7","author":"Gabrielli","year":"2019","journal-title":"Univ. J. Account. Financ."},{"key":"ref_7","unstructured":"Dimitrijevi\u0107, D., and Kalini\u0107, Z. (2017). Software Tools Usage in Fraud Detection and Prevention in Governmental and External Audit Organizations in the Republic of Serbia1. Knowledge\u2013Economy\u2013Society, Cracow University of Economics."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Vynokurova, O., Peleshko, D., Bondarenko, O., Ilyasov, V., Serzhantov, V., and Peleshko, M. (2020, January 21\u201325). Hybrid Machine Learning System for Solving Fraud Detection Tasks. Proceedings of the 2020 IEEE Third International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine.","DOI":"10.1109\/DSMP47368.2020.9204244"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Lebichot, B., Paldino, G.M., Bontempi, G., Siblini, W., He, L., and Oble, F. (2020, January 6\u20139). Incremental learning strategies for credit cards fraud detection: Extended abstract. Proceedings of the 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), Sydney, Australia.","DOI":"10.1109\/DSAA49011.2020.00116"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Saia, R. (2017, January 21\u201323). A Discrete Wavelet Transform Approach to Fraud Detection. Proceedings of the International Conference on Network and System Security, Helsinki, Finland.","DOI":"10.1007\/978-3-319-64701-2_34"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Vynokurova, O., Peleshko, D., Zhernova, P., Perova, I., and Kovalenko, A. (2021, January 25\u201329). Solving Fraud Detection Tasks Based on Wavelet-Neuro Autoencoder. Proceedings of the International Scientific Conference \u201cIntellectual Systems of Decision Making and Problem of Computational Intelligence\u201d, Zalizniy Port, Ukraine.","DOI":"10.1007\/978-3-030-54215-3_34"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"71364","DOI":"10.1109\/ACCESS.2020.2987337","article-title":"Taxonomy of Fraud Detection Metrics for Business Processes","volume":"8","author":"Omair","year":"2020","journal-title":"IEEE Access"},{"key":"ref_13","first-page":"570","article-title":"Multi-Dimensional Fraud Detection Metrics in Business Processes and their Application","volume":"11","author":"Omair","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_14","first-page":"1","article-title":"The Fraud Factors","volume":"2","author":"Ruankaew","year":"2013","journal-title":"Int. J. Manag. Adm. Sci. (IJMAS)"},{"key":"ref_15","first-page":"38","article-title":"Fraud triangle theory and fraud diamond theory. Understanding the convergent and divergent for future research","volume":"1","author":"Mansor","year":"2015","journal-title":"Int. J. Acad. Res. Account. Financ. Manag. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1111\/jlse.12068","article-title":"Applying the fraud triangle to higher education: Ethical implications","volume":"35","author":"Burke","year":"2018","journal-title":"J. Legal Stud. Educ."},{"key":"ref_17","first-page":"54","article-title":"Fraud Triangle Theory: Calling for New Factors","volume":"7","author":"Awang","year":"2020","journal-title":"Editor. Board"},{"key":"ref_18","first-page":"38","article-title":"The fraud diamond: Considering the four elements of fraud","volume":"74","author":"Wolfe","year":"2004","journal-title":"CPA J."},{"key":"ref_19","first-page":"474","article-title":"Beyond the fraud diamond","volume":"7","author":"Ruankaew","year":"2016","journal-title":"Int. J. Bus. Manag. Econ. Res. (IJBMER)"},{"key":"ref_20","first-page":"73","article-title":"Analysis of fraud triangle, fraud diamond and fraud pentagon theory to detecting corporate fraud in Indonesia","volume":"3","author":"Christian","year":"2019","journal-title":"Int. J. Bus. Manag. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/j.eswa.2006.02.016","article-title":"Data Mining techniques for the detection of fraudulent financial statements","volume":"32","author":"Manolopoulos","year":"2007","journal-title":"Expert Syst. Appl."},{"key":"ref_22","first-page":"407","article-title":"Fraud detection in financial statement using data mining technique and performance analysis","volume":"9","author":"Meenatkshi","year":"2016","journal-title":"JCTA"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"100402","DOI":"10.1016\/j.cosrev.2021.100402","article-title":"Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019","volume":"40","author":"Magalingam","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Deng, W., Huang, Z., Zhang, J., and Xu, J. (2021, January 15\u201317). A Data Mining Based System For Transaction Fraud Detection. Proceedings of the 2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China.","DOI":"10.1109\/ICCECE51280.2021.9342376"},{"key":"ref_25","unstructured":"Phua, C., Lee, V., Smith, K., and Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"03002","DOI":"10.1051\/matecconf\/201818903002","article-title":"A state of the art survey of data mining-based fraud detection and credit scoring","volume":"Volume 189","author":"Zhou","year":"2018","journal-title":"MATEC Web of Conferences"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Gupta, S., and Mehta, S.K. (2021). Data Mining-based Financial Statement Fraud Detection: Systematic Literature Review and Meta-analysis to Estimate Data Sample Mapping of Fraudulent Companies Against Non-fraudulent Companies. Glob. Bus. Rev.","DOI":"10.1177\/0972150920984857"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.dss.2010.08.006","article-title":"The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature","volume":"50","author":"Ngai","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yue, D., Wu, X., Wang, Y., Li, Y., and Chu, C.H. (2007, January 21\u201325). A review of data mining-based financial fraud detection research. Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China.","DOI":"10.1109\/WICOM.2007.1352"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Sasirekha, M., Thaseen, I.S., and Banu, J.S. (2012). An Integrated Intrusion Detection System for Credit Card Fraud Detection. Advances in Computing and Information Technology, Springer.","DOI":"10.1007\/978-3-642-31513-8_6"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2005.6","article-title":"Evidence-based software engineering for practitioners","volume":"22","author":"Dyba","year":"2005","journal-title":"IEEE Softw."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1425","DOI":"10.1016\/j.jss.2006.09.046","article-title":"Experiences using systematic review guidelines","volume":"80","author":"Staples","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_33","unstructured":"Kitchenham, B., and Charters, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, Kitchenham. Available online: https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.117.471&rep=rep1&type=pdf."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"38","DOI":"10.12968\/bjon.2008.17.1.28059","article-title":"Undertaking a literature review: A step-by-step approach","volume":"17","author":"Cronin","year":"2008","journal-title":"Br. J. Nurs."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/j.infsof.2010.12.010","article-title":"Identifying relevant studies in software engineering","volume":"53","author":"Zhang","year":"2011","journal-title":"Inf. Softw. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2015.01.012","article-title":"A systematic literature review on Enterprise Architecture Implementation Methodologies","volume":"62","author":"Rouhani","year":"2015","journal-title":"Inf. Softw. Technol."},{"key":"ref_37","unstructured":"Li, Y., Peng, R., and Wang, B. (2017, January 9\u201310). Challenges in Context-Aware Requirements Modeling: A Systematic Literature Review. Proceedings of the Asia Pacific Requirements Engeneering Conference, Melaka, Malaysia."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Hoyer, S., Zakhariya, H., Sandner, T., and Breitner, M.H. (2012, January 4\u20137). Fraud prediction and the human factor: An approach to include human behavior in an automated fraud audit. Proceedings of the 2012 45th Hawaii International Conference on System Sciences, Maui, HI, USA.","DOI":"10.1109\/HICSS.2012.289"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, M., Torres, J., Zambrano, P., and Flores, P. (2018, January 8\u201310). FraudFind: Financial fraud detection by analyzing human behavior. Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2018.8301739"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1177\/0971685816650579","article-title":"Behavioural red flags of fraud\u2014A qualitative assessment","volume":"22","author":"Sandhu","year":"2016","journal-title":"J. Hum. Values"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"150","DOI":"10.15388\/Ekon.2013.0.2336","article-title":"Transformational research of the fraud triangle","volume":"92","year":"2013","journal-title":"Ekonomika"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"331","DOI":"10.5267\/j.ac.2020.11.020","article-title":"Effect of attitudes, subjective norms and behavioral controls on the intention and corrupt behavior in public procurement: Fraud triangle and the planned behavior in management accounting","volume":"7","author":"Zulaikha","year":"2021","journal-title":"Accounting"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Omar, N.B., and Din, H.F.M. (2010, January 5\u20137). Fraud diamond risk indicator: An assessment of its importance and usage. Proceedings of the 2010 International Conference on Science and Social Research (CSSR 2010), Kuala Lumpur, Malaysia.","DOI":"10.1109\/CSSR.2010.5773853"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"022057","DOI":"10.1088\/1757-899X\/981\/2\/022057","article-title":"Fiscal Scam Illuminating Through Analyzing Human Behaviour","volume":"Volume 981","author":"Sravanthi","year":"2020","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Wang, S. (2010, January 11\u201312). A comprehensive survey of data mining-based accounting-fraud detection research. Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation, Changsha, China.","DOI":"10.1109\/ICICTA.2010.831"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Yao, J., Zhang, J., and Wang, L. (2018, January 26\u201328). A financial statement fraud detection model based on hybrid data mining methods. Proceedings of the 2018 International Conference on Artificial Intelligence and Big Data (ICAIBD), Chengdu, China.","DOI":"10.1109\/ICAIBD.2018.8396167"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Jayabrabu, R., Saravanan, V., and Tamilselvi, J.J. (2014, January 6\u20138). A framework for fraud detection system in automated data mining using intelligent agent for better decision making process. Proceedings of the 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, India.","DOI":"10.1109\/ICGCCEE.2014.6922411"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Ahmed, M., and Mahmood, A.N. (2013, January 19\u201321). A novel approach for outlier detection and clustering improvement. Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA), Melbourne, Australia.","DOI":"10.1109\/ICIEA.2013.6566435"},{"key":"ref_49","first-page":"370","article-title":"A review on data mining techniques to detect insider fraud in banks","volume":"4","author":"Kumar","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Vikram, A., Chennuru, S., Rao, H.R., and Upadhyaya, S. (2004, January 5\u20138). A solution architecture for financial institutions to handle illegal activities: A neural networks approach. Proceedings of the 37th Annual Hawaii International Conference on System Science, Big Island, HI, USA.","DOI":"10.1109\/HICSS.2004.1265433"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Mishra, A. (2021, September 01). Fraud Detection: A Study of AdaBoost Classifier and K-Means Clustering. Available online: https:\/\/www.researchsquare.com\/article\/rs-247874\/latest.pdf.","DOI":"10.21203\/rs.3.rs-247874\/v1"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Rizki, A.A., Surjandari, I., and Wayasti, R.A. (2017, January 25\u201326). Data mining application to detect financial fraud in Indonesia\u2019s public companies. Proceedings of the 2017 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia.","DOI":"10.1109\/ICSITech.2017.8257111"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.eswa.2016.06.016","article-title":"Detecting financial misstatements with fraud intention using multi-class cost-sensitive learning","volume":"62","author":"Kim","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.dss.2010.11.006","article-title":"Detection of financial statement fraud and feature selection using data mining techniques","volume":"50","author":"Ravisankar","year":"2011","journal-title":"Decis. Support Syst."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Seemakurthi, P., Zhang, S., and Qi, Y. (2015, January 24). Detection of fraudulent financial reports with machine learning techniques. Proceedings of the 2015 Systems and Information Engineering Design Symposium, Charlottesville, VA, USA.","DOI":"10.1109\/SIEDS.2015.7117005"},{"key":"ref_56","first-page":"315","article-title":"Enron Corpus Fraud Detection","volume":"8","author":"Mohanty","year":"2019","journal-title":"Int. J. Recent Technol. Eng. (IJRTE)"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Li, H., and Wong, M.L. (2015, January 25\u201328). Financial fraud detection by using Grammar-based multi-objective genetic programming with ensemble learning. Proceedings of the 2015 IEEE Congress on Evolutionary Computation (CEC), Sendai, Japan.","DOI":"10.1109\/CEC.2015.7257014"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"132","DOI":"10.18201\/ijisae.2017531428","article-title":"Fraud detection on financial statements using data mining techniques","volume":"5","author":"Sorkun","year":"2017","journal-title":"Intell. Syst. Appl. Eng."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"El Bouchti, A., Chakroun, A., Abbar, H., and Okar, C. (2017, January 16\u201318). Fraud detection in banking using deep reinforcement learning. Proceedings of the 2017 Seventh International Conference on Innovative Computing Technology (INTECH), Luton, UK.","DOI":"10.1109\/INTECH.2017.8102446"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Mardani, S., Akbari, M.K., and Sharifian, S. (2014, January 27\u201329). Fraud detection in process aware information systems using MapReduce. Proceedings of the 2014 6th Conference on Information and Knowledge Technology (IKT), Shahrood, Iran.","DOI":"10.1109\/IKT.2014.7030339"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Mallika, R. (2017). Fraud Detection Using Supervised Learning Algorithms. Int. J. Adv. Res. Comput. Commun. Eng., 6.","DOI":"10.17148\/IJARCCE.2017.6602"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Save, P., Tiwarekar, P., Jain, K.N., and Mahyavanshi, N. (2017). A novel idea for credit card fraud detection using decision tree. Int. J. Comput. Appl., 161.","DOI":"10.5120\/ijca2017913413"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1016\/j.dss.2008.11.013","article-title":"Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem","volume":"46","author":"Holton","year":"2009","journal-title":"Decis. Support Syst."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.accinf.2009.12.004","article-title":"Internal fraud risk reduction: Results of a data mining case study","volume":"11","author":"Jans","year":"2010","journal-title":"Int. J. Account. Inf. Syst."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Heryadi, Y., and Warnars, H.L.H.S. (2017, January 20\u201322). Learning temporal representation of transaction amount for fraudulent transaction recognition using CNN, Stacked LSTM, and CNN-LSTM. Proceedings of the 2017 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom), Phuket, Thailand.","DOI":"10.1109\/CYBERNETICSCOM.2017.8311689"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Yaram, S. (2016, January 23\u201325). Machine learning algorithms for document clustering and fraud detection. Proceedings of the 2016 International Conference on Data Science and Engineering (ICDSE), Cochin, India.","DOI":"10.1109\/ICDSE.2016.7823950"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"John, S.N., Anele, C., Kennedy, O.O., Olajide, F., and Kennedy, C.G. (2016, January 15\u201317). Realtime fraud detection in the banking sector using data mining techniques\/algorithm. Proceedings of the 2016 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA.","DOI":"10.1109\/CSCI.2016.0224"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"West, J., and Bhattacharya, M. (2015, January 19\u201321). Some Experimental Issues in Financial Fraud Detection: An Investigation. Proceedings of the 2015 IEEE International Conference on Smart City\/SocialCom\/SustainCom (SmartCity), Chengdu, China.","DOI":"10.1109\/SmartCity.2015.227"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/j.knosys.2015.08.011","article-title":"Detecting the financial statement fraud: The analysis of the differences between data mining techniques and experts\u2019 judgments","volume":"89","author":"Lin","year":"2015","journal-title":"Knowl.-Based Syst."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Mekonnen, S., Padayachee, K., and Meshesha, M. (2015, January 4\u20136). A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond. Proceedings of the 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT), Louisville, KY, USA.","DOI":"10.1109\/GOCICT.2015.20"},{"key":"ref_71","unstructured":"Asuncion, A., and Newman, D. (2007). UCI Machine Learning Repository, School of Information and Computer Science, University of California. Available online: http:\/\/www.ics.uci.edu\/~mlearn\/MLReposit-ory.html."},{"key":"ref_72","unstructured":"ENRON (2021, September 01). (This Dataset Contains 517,431 Emails with 3500 Folders from 151 Users). Available online: https:\/\/www.cs.cmu.edu\/~enron\/."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"26893","DOI":"10.1109\/ACCESS.2020.2971604","article-title":"A Systematic Literature Review of Fraud Detection Metrics in Business Processes","volume":"8","author":"Omair","year":"2020","journal-title":"IEEE Access"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","article-title":"Fraud detection: A systematic literature review of graph-based anomaly detection approaches","volume":"133","author":"Pourhabibi","year":"2020","journal-title":"Decis. Support Syst."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1108\/JFC-12-2018-0136","article-title":"Testing the fraud triangle: A systematic review","volume":"27","author":"Homer","year":"2019","journal-title":"J. Financ. Crime"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Dyb\u00e5, T., and Dings\u00f8yr, T. (2008, January 5\u20137). Strength of Evidence in Systematic Reviews in Software Engineering. Proceedings of the Second ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, Bari, Italy.","DOI":"10.1145\/1414004.1414034"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.infsof.2008.01.006","article-title":"Empirical studies of agile software development: A systematic review","volume":"50","year":"2008","journal-title":"Inf. Softw. Technol."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/10\/121\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:07:39Z","timestamp":1760166459000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/10\/121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,30]]},"references-count":77,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["computers10100121"],"URL":"https:\/\/doi.org\/10.3390\/computers10100121","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,30]]}}}