• 沒有找到結果。

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

7. Conclusion

Because of the nature of competitive learning, the GHSOM, an unsupervised neural networks extended from the SOM, can work as a regularity detector that is supposed to help discover statistically salient features of the sample population (Hogan et al., 2008).

With the spatial correspondent hypotheses, this study presents a DSS architecture with four phases based on the proposed dual approach for FFD decision support, in which two GHSOMs (i.e., fraud samples are used to generate FT and non-fraud samples are used to generate NFT) are generated in the training phase. In the modeling phase, for each leaf node of FT, a feature extraction mechanism including the feature-extracting module and pattern-extracting module is developed to provide the associated fraud related features, and the extracted features will be used as a part of the evaluation for any risky investigated sample. The classification rules are formed to help identify fraud cases through applying the adaptive classification rules into each pair of fraud and non-fraud subgroups from FT and NFT. In the analyzing phase, the dominant classification rule is applied to examine the investigated samples. For the investigated samples which have been identified fraud, the relevant fraud categories and variables are retrieved and integrated in the decision support phase. All the provided information is helpful for the decision making process of FFD.

Unlike the traditional approach applying the SOM in FFD (Carlos, 1996) which uses all training samples to generate one SOM, our proposed DSS architecture takes advantage of being able to generate two GHSOMs (FT and NFT), in each of which two spatial hypotheses — for each pair of leaf nodes from FT and NFT, the fraud (or non-fraud) samples are cluster around their counterparts— are set to create the candidate classification rules. That is, using the statistic information among samples from different GHSOMs helps respectively generate the non-fraud-central and fraud-central rules. These two rules are tuned via inputting all samples to determine the optimal discrimination boundary of each candidate classification rule within each pair of leaf nodes from NFT and FT. This study derives the optimization technique that renders adjustable and effective rules for classifying fraud and non-fraud samples. The decision makers can objectively set their weightings of type I and type II errors. The candidate classification rule that dominates another is adopted as the classification rule in the following analyzing phase. The dominance of the non-fraud-central rule leads to

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

an implication that most of fraud samples cluster around the non-fraud counterpart, meanwhile the dominance of fraud-central rule leads to an implication that most of non-fraud samples cluster around the fraud counterpart.

To the best of our knowledge, this is the first work that employs the GHSOM to provide topological insights of high-dimensional inputs in addition to hierarchical features. It is worth noting that the implementation of the DSS architecture based on the proposed dual approach is beyond the traditional unsupervised learning approach for FFD through developing a more delicate classifier that can reveal the spatial relationship among fraud and non-fraud subgroups, and the proposed feature extraction mechanism provides more information to represent the potential fraud behaviors for any suspected investigated sample, as a result, support the practical FFD decision making process.

Our preliminary result on FFR experiment confirms the spatial relationship among fraud and non-fraud financial statements, and has better classification performance than the SVM, SOM+LDA, GHSOM+LDA, SOM, BPNN and DT methods. Therefore, for cases with the regularity of the proposed two topological relationships among fraud and non-fraud samples, the implemented DSS architecture based on the proposed dual approach can perform well; furthermore, compared with conventional methods for FFD, the feature extracting results also add more fraud-related characteristics for the investigated samples which are identified fraud.

The limitations of this study would be: (1) compared with other FFD scenarios, the sample size for the FFR issue is limited, (2) subjective parameter setting of the GHSOM, (3) the fraud patterns are various depend on the focused FFD scenario and the results of the pattern-extracting module need to be verified by the domain experts, and (4) the proposed DSS architecture does not evaluated or refined practically until a system prototype is actually being developed.

Future works are suggested as follows: (1) derive the theoretical justification of the rule-forming module in the modeling phase, (2) improve the discrimination boundary setting in the rule-forming module with more sensitivity via an enhanced optimization approach for developing the classification rules, or try other good classifiers, (3) use other clustering methods in the clustering module and compare the results of classifying module in terms of the classification performance and the dominate classification rule derived from which spatial hypothesis, (4) improve the

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

pattern-extracting module with systematic tools, and (5) conduct experiments on other FFD applications.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Reference

Aas, K., and Eikvil, L. (1999). Text categorization: A survey, Technical Report, 941, Norwegian Computing Center.

Agyemang, M., Barker, K., and Alhajj, R. (2006). A comprehensive survey of numeric and symbolic outlier mining techniques, Intelligent Data Analysis, 10(6), 521–538.

Altman, E.I. (1968). Financial ratios, discriminant analysis and the prediction of corporate bankruptcy, Journal of Finance, 23(4), 589–609.

American Institute of Certified Public Accountants (AICPA) (2002). Statement on Auditing Standards No. 99: Consideration of Fraud in a Financial Statement Audit [Electronic Version]. http://www.aicpa.org/download/members/div/auditstd/AU-00316.PDF.

Antonio, S.A., David, M.G., Emilio, S.O. Alberto, P., Rafael, M.B., and Antonio, S.

L. (2008). Web mining based on Growing Hierarchical Self-Organizing Maps:

Analysis of a real citizen web portal, Expert Systems with Applications, 34(4), 2988–2994.

Association of Certified Fraud Examiners (ACFE) (1998). 1998 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.

Association of Certified Fraud Examiners (ACFE). (2008). 2008 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.

Basens, B., Setiono, B., Mues, C., and Vanthienen, J. (2003). Using neural network rule extraction and decision tables for credit-risk evaluation, Management Science, (49:3), 312–319.

Beasley, M.S., Carcello, J.V., and Hermanson, D.R. (1999). Fraudulent financial reporting: 1987–1997: An analysis of U.S. public companies, COSO, New York.

Bell, T. B., and Carcello, J. V. (2000). A decision aid for assessing the likelihood of fraudulent financial reporting, Auditing: A Journal of Practice & Theor, (19:1), 169–184.

Bond, C. F., and DePaulo, B. M. (2006). Accuracy of deception judgments, Personality and Social Psychology Review, 10(3), 214–234.

Boser, B. E., Guyon, I., and Vapnik, V. (1992). A training algorithm for optimal margin classifiers, Proceedings of the Fifth Annual Workshop on Computational Learning Theory, ACM Press, 144–152.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Budayan, C. (2008). Strategic group analysis: Strategic perspective, differentiation and performance in construction, Doctoral dissertation, Middle East Technical University.

Budayan, C., Dikmen, I., and Birgonul, M. T. (2009). Comparing the performance of traditional cluster analysis, self-organizing maps and fuzzy C-means method for strategic grouping, Expert Systems with Applications, 36(9), 11772–11781.

Canbas, S., Cabuk, A., and Kilic, S.B. (2005). Prediction of commercial bank failure via multivariate statistical analysis of financial structures: The Turkish case, European Journal of Operational Research, 166, 528–546.

Carlos, S. C. (1996). Self organizing neural networks for financial diagnosis, Decision Support System, 17, 227–2386.

Claessens, S., Djankov, S., and Lang, L. H. P. (2000). The separation of ownership and control in East Asian Corporations, Journal of Financial Economics, 58(1-2), 81–112.

Cortes, C., and Vapnik, V. (1995). Support-vector network, Machine Learning, 20, 273–297.

Daskalaki, S., Kopanas, I., Goudara, M., and Avouris, N. (2003). Data mining for decision support on customer insolvency in telecommunications business, European Journal of Operational Research, 145, 239–255.

Dechow, P. M., Ge, W., Larson, C. R., Sloan, R. G., and Investors, B. G. (2007).

Predicting material accounting manipulations, AAA 2007 Financial Accounting and Reporting Section (FARS) [Electronic Version]. http://ssrn.com/abstract=997483.

Dechow, P.M., Sloan, R.G., and Sweeney, A.P. (1996). Cause and consequences of earnings manipulation: an analysis of firms subject to enforcement actions by the SEC," Contemporary Accounting Research, 13(1), 1–36.

Desai, V. S., Crook, J. N., and Overstreet, J. (1996). A comparison of neural networks and linear scoring models in the credit union environment, European Journal of Operational Research, 95, 24–37.

Dittenbach, M., Merkl, D., and Rauber, A. (2000). The Growing hierarchical self-organizing map, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks- IJCNN 2000.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Dittenbach, M., Rauber, A., and Merkl, D. (2002). Uncovering hierarchical structure in data using the growing hierarchical self-organizing map, Neurocomputing, 48(1-4), 199–216.

Eklund, T. (2002). Assessing the feasibility of self organizing maps for data mining financial information, ECIS 2002, Gdansk, Poland.

Elliot, R., and Willingham, J. (1980). Management fraud: detection and deterrence, Petrocelli, New York, NY.

Fanning, K.M., and Cogger, K.O. (1998). Neural network detection of management fraud using published financial data, International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1), 21–41.

Farber, D. B. (2005). Restoring trust after fraud: does corporate governance matter?, Accounting Review, 80(2), 539–561.

Fukunaga, K. (1990). Introduction to Statistical Pattern Recognition, 2nd Edition, Academic Press, London.

Granzow, M., Berrar, D., Dubitzky, W., Schuster, A., Azuaje, F. J., and Eils, R.

(2001). Tumor classification by gene expression profiling: Comparison and validation of five clustering methods, SIGBIO Newsletter, 21(1), 16–22.

Green, P., and Choi, J. H. (1997). Assessing the risk of management fraud through neural network technology, Auditing: A Journal of Practice & Theory, 16(1), 14–28.

Guo, Y., Hu, J., and Peng, Y. (2011). Research on CBR system based on data mining, Applied Soft Computing, 11(8), 5006–5014.

Hoogs, B., Kiehl, T., Lacomb, C., and Senturk, D. (2007). A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud, Intelligent Systems in Accounting Finance and Management, (15:1/2), 41–56.

Hsu, K. Y. (2008). Exploring financial reporting fraud, M.A. Thesis, National Chengchi University, Department of Management Information System.

Hsu, S. H., Hsieh, J. P. A., Chih, T. C., and Hsu, K. C. (2009). A two-stage architecture for stock price forecasting by integrating self-organizing map and support vector regression, Expert Systems with Applications, 36(4), 7947–7951.

Hsu, C. W., Chang, C. C., and Lin, C. J. (2010). A practical guide to support vector classification, Technical Report, National Taiwan University.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Huang, S. Y., Tsaih, R. H., and Lin, W. Y. (2012). Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting, Industrial Management

& Data Systems, 112(2), 224–244.

Huang, S. Y., and Tsaih, R. H. (2012). The Prediction Approach with Growing Hierarchical Self-Organizing Map, Proceedings of the International Joint Conference on Neural Networks (IJCNN), 838-844.

Huang, S. Y., and Tsaih, R. H., Fang, Y. (2012). The Dual Approach for Decision Making, The 2012 Decision Sciences Institute Annual Meeting (DSI), San Francisco, USA.

Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., and Felix, W. F.

(2010). Identification of fraudulent financial statements using linguistic credibility analysis, Decision Support Systems, 50(3), 585–594.

Jain, A., Murty, M., and Flynn, P. (1999). Data clustering: a review. ACM Computing Surveys, 31(3), 264–323.

Jiang, J. (1999). Image compression with neural networks - a survey, Signal Process Image Communication, 14(9-7), 737–760.

Jolliffe, I. T. (1986). Principal Component Analysis, Springer, New York.

Jolliffe, I. T. (2002). Principal Component Analysis, second edition, New York:

Springer-Verlag New York, Inc.

Kaiser, H. F. (1960). The application of electronic computers to factor analysis, Educational and Psychological Measurement, 20, 141–151.

Khan A.U., Sharma, T. K., and Sharma, S. (2009). Classification of Stocks Using Self Organizing Map, International Journal of Soft Computing Applications, 4, 19–24.

Klein M, and Methlie, L. B. (1995). Knowledge-Based Decision Support Systems with Applications in Business, 2nd edn, Wiley.

Kirkos, E., Spathis, C., and Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements, Expert Systems with Applications, 32(4), 995–1003.

Kohonen, T. (1982). Self-organized formation of topologically correct feature maps, Biological Cybernetics, (43), 59–69.

Kohonen, T. (1989), Self Organization and Associative Memory, 3rd ed. Springer, Berlin.

Kohonen, T. (1995), Self-Organizing Maps, Springer, Berlin.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

KPMG Peat Marwick (1998), Fraud Survey, KPMG peat Marwick, Montvale, NJ.

La Porta, R., Lopez-de-Silanes, F., Shleifer, A., and Vishny, R. (1999). Corporate ownership around the world, Journal of Finance, 54(2), 471–517.

Lee, G., T. K. Sung, and Chang, N. (1999). Dynamics of modeling in data mining:

interpretive approach to bankruptcy prediction, Journal of Management Information Systems, 16, 63–85.

Lee, T. S., Chiu, C. C., Chou, Y. C., and Lu, C. J. (2006). Mining the customer credit using classification and regression tree and multivariate adaptive regression splines, Computational Statistics & Data Analysis, 50, 1113–1130.

Lee, T. S., and Yeh, Y. H. (2004). Corporate governance and financial distress:

evidence from Taiwan, Corporate Governance: An International Review, 12(3), 378–388.

Li, S. (2000). The development of a hybrid intelligent system for developing marketing strategy, Expert Systems with Applications, 27, 395–409.

Liu, Y., Yeh, R. H. ,and He, R. (2006). Sea surface temperature patterns on the West Florida Shelf using the Growing Hierarchical Self-Organizing Maps, J. Atmos.

Oceanic Technology, 23(2), 325–338.

Loebbecke, J. K., Eining, M. M., and Willingham, J. J. (1989). Auditors’

experience with material irregularities: frequency, nature, and detectability, Auditing, 9(1), 1–28.

Lu, C. J., and Wang, Y. W. (2010). Combining independent component analysis and growing hierarchical self-organizing maps with support vector regression in product demand forecasting, International Journal of Production Economics, 128(2), 603–613.

Mangiameli, P., Chen, S. K., and West, D. (1996). A comparison of SOM neural network and hierarchical clustering methods, European Journal of Operational Research, 93(2), 402–417.

Maron, M. E. (1961). Automatic indexing: An experimental inquiry, Journal of the ACM, 8, 404–417.

Martín-Guerrero, J.D., Palomares, A., Balaguer-Ballester, E., Soria-Olivas, E., Gómez- Sanchis, J., and Soriano-Asensi, A. (2006). Studying the feasibility of a recommender in a citizen web portal based on user modeling and clustering algorithms, Expert Systems with Applications, 30(2), 299–312.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Matsatsinis, N. F., Doumpos, M., and Zopounidis, C. (1997), Knowledge acquisition and representation for expert systems in the field of financial analysis, Expert Systems with Applications, 12, pp. 247–262.

Mohanty, R. P., and Deshmukh, S. G. (1997). Evolution of an expert system for human resource planning in a petroleum company, Production Economics, 51, 251–261.

Newman, D. P., Patterson, E. and Smith, R. (2001). The influence of potentially fraudulent reports on audit risk assessment and planning. Auditing: A Journal of Practice & Theory, 76(1), 59–80.

Ngai, E. W, Yong, H. U., Wong, Y. H., Chen, Y., and Sun, X. (2010). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature, Decision Support Systems =, 50(3), 559–569.

Nguyen M. N., Shi, D., and Quek, C. (2008). A nature inspired Ying-Yang approach for intelligent decision support in bank solvency analysis, Expert Systems with Applications, 34(4), 2576–2587

Min, J. H., and Lee, Y. C. (2005). Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters, Expert Systems with Applications, 28, 603–614.

Oja, E. (1992). Principal components, minor components, and linear neural networks, Neural Networks, 5(6), 927–935.

Pagano, R. R. (2001). Understanding Statistics in the Behavioral Sciences, Sixth ed., Wadsworth/Thomson Learning, California.

Quinlan, J. R. (1986), Induction of Decision Trees, Machine Learning, 1, 81–106.

Quinlan, J. R. (1993), C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers.

Quinlan, J. R. (1996), Bagging, boosting, and C4.5., Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96), pp. 725-730.

Rasmussen, E. (1992), Information retrieval: data structures and algorithms.

Prentice-Hall, Inc.

Pearson, K. (1901), On Lines and Planes of Closest Fit to Systems of Points in Space, Philosophical Magazine, 2(6), 559–572.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Persons, O. S. (1995), Using financial statement data to identify factors associated with fraudulent financial reporting, Journal of Applied Business Research, 11(3), 38–46.

Pinson, S. (1992), A Multi-Expert Architecture for Credit Risk Assessment: The CREDEX system, IN: D.E. O'Lerary and P.R. Watkins (Eds), Expert Systems in finance, 37–64.

Rauber, Merkl, A., D., and Dittenbach, M. (2002). The Growing hierarchical self-organizing map: exploratory analysis of high-dimensional data, IEEE Transactions on Neural Networks, 13(6), 1331–1341.

Richardson, A. J., Risien, C., and Shillington, F. A. (2003). Using self organizing maps to identify patterns in satellite imagery, Prog. Oceanogr, 59, 223–239.

Ringnér, M. (2008), What is principal component analysis?, Nature Biotechnology, 26, 303–304.

Risien, C. M., Reason, C. J. C., Shillington, F. A., and Chelton, D. B. (2004).

Variability in satellite winds over the Benguela upwelling system during 1999– 2000, J.

Geophys. Res., 109, C03010, doi:10.1029/2003JC001880.

Rumelhart, D. E., and Zipser, D. (1985). Feature discovery by competitive learning, Cognitive Science, 9, 75–112.

Rumelhart, D. E., Hinton, G. E., and Williams, R. J. (1986). Learning representations by back-propagating errors, Nature, 323, 533–536.

Schweighofer, E., Rauber, A., and Dittenbach, M. (2001). Automatic text representation classification and labeling in European law, International Conference on Artificial Intelligence and Law (ICAIL). ACM Press.

Serrano, C. (1996). Self Organizing Neural Networks for Financial Diagnosis, Decision Support Systems, 17, 227–238.

Shaw, P. J. A. (2003). Multivariate statistics for the Environmental Sciences, Hodder-Arnold.

Shih, J. Y., Chang, Y. J., and Chen, W. H. (2008). Using GHSOM to construct legal maps for Taiwan’s securities and futures markets, Expert Systems with Applications, 34(2), 850–858.

Shin, H. W., and Sohn, S. Y. (2004). Segmentation of stock trading customers according to potential value, Expert Systems with Applications, 27(1), 27–33.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Shin, K. S., Lee, T. S., and Kim, H. J. (2005). An application of support vector machines in bankruptcy prediction model, Expert Systems with Applications, 28, 127–135.

Shin, K. S., and Lee, Y. J. (2002). A genetic algorithm application in bankruptcy prediction modeling, Expert Systems with Applications, 23, 321–328.

Stice, J. D. (1991). Using financial and market information to identify pre-engagement factors associated with lawsuits against auditors, Accounting Review, 66(3), 516–533.

Summers, S. L., and Sweeney, J. T. (1998). Fraudulently misstated financial statements and insider trading: An empirical analysis, Accounting Review, 73(1), 131–146.

Tabachnick, B. G., and Fidell, L. S. (2001). Using multivariate statistics, 4th Edition, Boston: Allyn & Bacon.

Tsai, C. F. (2009). Feature selection in bankruptcy prediction, Knowledge-Based Systems, 22(2), 120–127.

Tsaih, R. H., Lin, W. Y., and Huang, S. Y. (2009), Exploring Fraudulent Financial Reporting with GHSOM, Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), Lecture Notes in Computer Science, 5477, 31–41.

Turban, E. (1993), Decision Support and Expert Systems: Management Support Systems, 3rd eds, Macmillan.

Turk, M. A., and Pentland, A. P. (1991). Eigenfaces for recognition, Journal of Cognitive Neuroscience, 3(1), 71–86.

Vapnik, V. N. (1995), The nature of statistical learning theory, Springer.

Virdhagriswaran, S., and Dakin, G. (2006). Camouflaged fraud detection in domains with complex relationships, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 941–947.

Weisenborn, D., and Norris, D. (1997). Red flags of management fraud, National Public Accountant, 42(2), 29–33.

Wen, W., Wang, W. K., and Wang, T. H. (2005). A hybrid knowledge-based decision support system for enterprise mergers and acquisitions, Expert Systems with Applications, 28, 569–582.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Wen, W., Chen, Y. H., and Pao, H. H. (2008). A mobile knowledge management decision support system for automatically conducting an electronic business, Knowledge-Based Systems, 21(7), 540–550.

Yeh, Y., T. Lee, and Woidtke, T. (2001). Family control and corporate governance:

Evidence from Taiwan, International Review of Finance, 2(1-2), 21–48.

Zhang, J., and Dai, D. (2009). An adaptive spatial clustering method for automatic brain MR image segmentation, Progress in Natural Science, 19(10), 1373–1382.

Zopounidis, C., Doumpos, M., and Matsatsinis, N. F. (1997). On the use of knowledge-based decision support systems in financial management: a survey, Decision Support Systems, 20, 259–277.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Appendix

The overall FFR fraud categories extracted from each leaf node of FT are summarized in Table A1. The common FFR fraud categories within each leaf node are marked with * in the column.

Table A1. Common FFR fraud categories within all leaf nodes of FT.

leaf node #11 *FC1 FC2 FC3 FC4 FC5 *FC6 FC7 *FC8 FC9 FC10 (code) (year)

2505 1998 ●

2529 1998 ● ●

8716 1999 ● ●

2334 1999 ● ●

3039 2004

1601 1998 ●

1221 2002 ● ● ●

1221 2003 ● ● ●

2014 2003 ● ●

5901 1997 ● ●

5901 1998 ● ●

5901 1999 ● ●

leaf node #12-21 FC1 FC2 *FC3 FC4 FC5 FC6 FC7 FC8 FC9 FC10

5385 2001 ● ●

8713 1999 ●

1918 1998 ● ●

leaf node #12-22 *FC1 FC2 FC3 *FC4 FC5 *FC6 FC7 FC8 *FC9 FC10

2398 2001 ● ● ● ● ● ●

2398 1999 ● ● ● ● ● ●

2494 2002 ●

3001 2000 ● ●

3001 2001 ● ●

3001 1999 ● ●

5385 2000 ● ●

6145 2003 ● 6145 2004 ●

6250 2004 ● ● ●

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

1602 1994 ● ● ● ●

leaf node #12-23 FC1 *FC2 FC3 *FC4 FC5 *FC6 FC7 *FC8 *FC9 FC10

8702 1994

8702 1995

5504 2000

8710 1999

8719 1997

8701 1995

8701 1996

1602 1995

1918 1996

1918 1997

2101 1997

2613 1999

2913 1996

leaf node #12-24 *FC1 FC2 FC3 FC4 FC5 FC6 FC7 FC8 *FC9 FC10

4113 2004

leaf node #13-21 FC1 FC2 FC3 FC4 FC5 FC6 *FC7 *FC8 FC9 FC10

8712 1998

5503 2000

8719 1998

2014 2001

2014 2002

8717 1998

leaf node #13-22 FC1 FC2 FC3 FC4 FC5 *FC6 *FC7 FC8 FC9 FC10

2553 1999

8716 1998

8188 2001

8724 2000

8724 1999

2005 1999

2019 2000

2019 1999

8711 1999

leaf node #13-23 FC1 FC2 FC3 *FC4 FC5 FC6 *FC7 *FC8 FC9 FC10

8705 1998

8714 1999

8382 1998

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

8706 1998

leaf node #13-24 FC1 FC2 FC3 FC4 FC5 FC6 FC7 *FC8 *FC9 FC10

1505 1998

1505 1999

8708 1998

8708 1999

2101 1998

2101 1999

leaf node #14-21 FC1 FC2 FC3 FC4 FC5 *FC6 FC7 *FC8 *FC9 FC10

5504 1999

2328 1998

2334 1998

1505 1997

5007 1998

2614 1999

1466 1998

leaf node #14-22 *FC1 FC2 FC3 FC4 FC5 FC6 FC7 *FC8 FC9 FC10 2505 1997

2328 1997

2334 1997

2350 1997

2398 2000

2490 2001

1601 1997

1602 1996

leaf node #14-23 FC1 FC2 FC3 FC4 FC5 *FC6 *FC7 *FC8 FC9 FC10

2206 2000

1436 1997

1436 1998

2553 1998

1207 2000

1207 1998

1207 1999

2005 1998

2016 1997

2016 1998

2017 1996

2017 1998

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

2019 1998

8705 1997

8708 1997

8714 1997

8714 1998

9911 1998

9801 2000

9801 1998

9801 1999

leaf node #14-24 *FC1 FC2 FC3 *FC4 FC5 FC6 FC7 *FC8 FC9 FC10

2206 1999 ●

2350 1998 ●

2407 2002 ● ● ● ● ● ●

2407 2003 ● ● ● ● ● ●

2407 2004 ● ● ● ● ● ●

2490 2000 ● ●

2490 2002 ● ●

8295 1998 ● ●

1221 2001 ● ● ●

8723 1998 ● ● ●

2017 1997 ● ●

5007 1999 ● ●

Note: The common FFR fraud categories of each leaf node are marked with *.

Table A2 summarizes the commonly adopted FFR fraud categories of the testing samples identified as the fraud class in all leaf nodes of the FT. The code and year in the first two columns indicate the company SIC code and the year of financial statements. The common FFR fraud categories extracted from the feature-extracting module are marked in gray. The common FFR fraud categories within each leaf node are marked with * in the column.

‧ 國

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Table A2. Common FFR fraud categories of the testing samples.

leaf node #11 *FC1 FC2 FC3 FC4 FC5 FC6 FC7 *FC8 FC9 FC10

1606 2008 ● ●

2418 2006 ● ●

2418 2008 ● ●

4413 2005 ● ●

leaf node #12-22 *FC1 FC2 FC3 *FC4 FC5 FC6 FC7 FC8 FC9 FC10

3506 2003

3506 2004

6232 2006 6232 2007

6103 2008

3079 2005

5017 2003

1606 2006

leaf node #12-23 FC1 *FC2 FC3 FC4 FC5 *FC6 FC7 *FC8 FC9 FC10

3506 2002

1532 2008

5605 2002

5605 2003

5605 2004

5605 2005

leaf node #14-22 *FC1 FC2 FC3 FC4 FC5 FC6 FC7 *FC8 FC9 FC10 6232 2002

6103 2004

3350 2004

2418 2004

leaf node #14-24 *FC1 FC2 FC3 *FC4 FC5 FC6 FC7 *FC8 FC9 *FC10

6103 2005

6103 2006

2614 2008

2614 2006

2614 2007

FC1: recording fictitious revenues; FC2: recording revenues prematurely;

FC3: no description/overstated about revenues; FC4: overstating existing assets;

FC5: recording fictitious assets or assets not owned; FC6: capitalizing items that should be expensed;

FC7: understatement of expenses/liabilities; FC8: misappropriation of assets;

FC9: inappropriate disclosure; FC10: other miscellaneous techniques.

The identification performance of the FFR fraud categories are summarized in Table A3, in which the classification errors (type I error and type II error) are calculated.

Table A3. The identification performance of the FFR fraud categories.

leaf node

true predict fraud->

fraud

fraud->

non-fraudtrue predict non-fraud->

non-fraud

1,8 1,6,8 100.00% 0.00% 2,3,4,5,6 ,7,9,10

true predict fraud->

fraud

fraud->

non-fraudtrue predict non-fraud->

non-fraudtrue predict non-fraud->