• citations in SCIndeks: [1]
  • citations in CrossRef:[1]
  • citations in Google Scholar:[]
  • visits in previous 30 days:2
  • full-text downloads in 30 days:1


article: 8 from 11  
Back back to result list
2017, vol. 3, iss. 2, pp. 18-36
Elements of multivariation analysis of crime on scarce meetings
aSequester Employment, Beograd
bFondacija Podrži život, Beograd
cVisoka škola modernog biznisa, Beograd, Beograd
dJohn Naisbitt University, Faculty of Management, Zaječar,,,
Keywords: Method; crime; control; analysis; factors and variables of crime; implicit knowledge; application; causes of crime
Crime represents a harmful occurrence that is specific for each culture and socioeconomic formation. Due to this it is no surprise that there is an interest for crime in different areas of social sciences and life. Since crime is a burning topic of numerious scientific and expert analyses or researches, it can be concluded that it is an old mutual problem of all countries, old and new ones. It doesn't depend only on the sociopolitical order, but economic development and characteristical social factors and circumstances that exist in respective countries as well. Surprisingly large diversity of causes and circumstances that lead to the occurrence of crime demands a different approach to its research. It is possible and consists of the application of multivariate analysis, since it allows for many different ways of observing crime and taking more efficient actions aimed at its prevention and enabling of normal functioning and development of state and society. Application of multivariation analysis in crime, is based on consideration of indirect (implicit) knowledge as a method applied on a sample that consists of data from forty seven US countries. Depending on their individuality, different crime rates were determined for each federal state. The mentioned sample was used to answer a simple question through multivariation analysis: would its application discover hidden causes of crime rates, which aren't visible from the data contained in the selected sample? In order to achieve the set goal, factor analysis was used as well the method of inverse factoral (segmentation) sample analysis. Discovering such hidden samples of crime would be a very important way of achieving total control on it. Since full control of crime represents a very modern way in contemporary approach to fighting rime in the world, it is obvious that control is impossible without considering such hidden factors (causes and conditions) which favour occurrence of criminal behavior, which can be shown by multivariation analysis based on the aforementioned sample.
For this article there is a related paper (correction, retraction, or comment) which is available here.
*** (2000) Enron financial statements as of Decembar 31
Abbott, L.J., Park, Y., Parker, S. (2000) The effects of audit committee activity and independence on corporate fraud. Managerial Finance, 26(11): 55-68
Bell, T.B., Carcello, J.V. (2000) A Decision Aid for Assessing the Likelihood of Fraudulent Financial Reporting. Auditing: A Journal of Practice & Theory, 19(1): 169-184
Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J. (1984) Classification and regression trees. Belmont: Wadsworth
Breiman, L. (2001) Machine Learning, 45(1): 5-32
Chang, C.C., Lin, C.J. (2001) LIBSVM: A library for support vector machines.
Cherkassky, V., Mulier, F.M. (2007) Learning from data: Concepts, theory, and methods. John Wiley, 2nd edition
Cullinan, C.P., Sutton, S.G. (2002) Defrauding the public interest: A critical examination of reengineered audit processes and the likelihood of detecting fraud. Critical Perspectives on Accounting, 13(3): 297-310
Eining, M.M., Jones, D.R., Loebbecke, J.K. (1997) Reliance on decision aids: An examination of auditors' assessment of management fraud. Auditing: A Journal of Practice and Theory, 16(2), 1-19
Fanning, K.M., Cogger, K.O. (1998) Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1): 21-41
Green, B.P., Choi.J.H. (1997) Assessing the risk of management fraud through neural-network technology. Auditing: A Journal of Practice and Theory, 16(1); 8-28
Green, B.P., Choi.J.H. (1997) Assessing the risk of management fraud through neural-network technology. Auditing: A Journal of Practice and Theory, 16(1); 14-28
Kirkos, E., Spathis, C., Manolopoulos, Y. (2007) Data Mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 32(4): 995-1003
Kohavi, R. (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. in: Proc. of International Joint Conference on Artificial Intelligence
Maindonald, J., Braun, J. (2007) Data analysis and graphics using R. Cambridge: Cambridge University Press, 2nd Edition
Persons, O.S. (2011) Using Financial Statement Data To Identify Factors Associated With Fraudulent Financial Reporting. Journal of Applied Business Research (JABR), 11(3): 38
Platt, J.C. (1998) Sequential minimal optimization: A fast algorithm for training support vector machines. Microsoft Research, Technical Report MSR-TR-98-8
Porter, B., Cameron, A. (1987) Company fraud-what price the auditor?. Accountant's Journal, 44-47
Pullam,, Reš.omon.Deborah (2002) How Three Unlikely Sleuths Exposed Fraud at World-Com. Wall Street Journal, 30); 1
Quinlan, J.R. (1996) Bagging, boosting and C4.5. in: AAAI-96 Fourteenth national Conference on Artificial Intelligence, Portland, OR, AAAI Press, Menlo Park, CA, Proc. of
SEC (2003) Accounting and auditing enforcement release. No. 1706, January 27
Spathis, C.T. (2002) Detecting false financial statements using published data: some evidence from Greece. Managerial Auditing Journal, 17(4): 179-191
Spathis, C., Doumpos, M., Zopounidis, C. (2003) Using client performance measures to identify pre-engagement factors associated with qualified audit reports in Greece. International Journal of Accounting, 38(3): 267-284
Stice, J. (1991) Using financial and market information to identify pre-engagement market factors associated with lawsuits against auditors. Accounting Review, 66(3); 516-533
Summers, S.L., Sweeney.J.T. (1998) Fraudulent misstated financial statements and insider trading: an empirical analysis. Accounting Review, 73(1); 131-146
Witten, I.H., Frank, E. (2005) Data mining: Practical machine learning tools and techniques with java implementations. San Francisco, CA, itd: Morgan Kaufmann
Wu, R.C. (1997) Neural Network Models: 'Fonudantion and application to an audit decision problem. Annals of Operations Research, 75: 291-301


article language: Serbian
document type: Review Paper
DOI: 10.5937/Oditor1702018J
published in SCIndeks: 13/07/2018