| Literature DB >> 34806059 |
Xiaoqian Zhu1,2, Xiang Ao3,4,5, Zidi Qin3,4, Yanpeng Chang2,6, Yang Liu3,4, Qing He3,4, Jianping Li1.
Abstract
The great losses caused by financial fraud have attracted continuous attention from academia, industry, and regulatory agencies. More concerning, the ongoing coronavirus pandemic (COVID-19) unexpectedly shocks the global financial system and accelerates the use of digital financial services, which brings new challenges in effective financial fraud detection. This paper provides a comprehensive overview of intelligent financial fraud detection practices. We analyze the new features of fraud risk caused by the pandemic and review the development of data types used in fraud detection practices from quantitative tabular data to various unstructured data. The evolution of methods in financial fraud detection is summarized, and the emerging Graph Neural Network methods in the post-pandemic era are discussed in particular. Finally, some of the key challenges and potential directions are proposed to provide inspiring information on intelligent financial fraud detection in the future.Entities:
Keywords: COVID-19 pandemic; artificial intelligence; financial fraud detection
Year: 2021 PMID: 34806059 PMCID: PMC8581570 DOI: 10.1016/j.xinn.2021.100176
Source DB: PubMed Journal: Innovation (Camb) ISSN: 2666-6758
Figure 1The classification of financial fraud types
Types and examples of data used for fraud detection
| Data type | Examples | Research |
|---|---|---|
| Structured | Quantitative numbers | Viaene et al. diagnose automobile insurance claims fraud by using indicators including claimant, insured driver, and lost wages. |
| Semi-structured | Interview | Law analyzes the organizational factors of corporate fraud through interviewing chief financial officers. |
| Business process | Jans et al. mine procurement processes to predict internal transaction fraud in companies. | |
| Database system | The Securities and Exchange Commission requires corporations to submit reports in the eXtensible Business Reporting Language (XBRL) language, which provides public and formatted data for fraud detection. | |
| Unstructured | Text | Xiong et al. mine individual opinions on social media to detect corporate disclosure fraud. |
| Audio | Hobson et al. analyze the vocal and linguistic cues elicited from speech to detect misreporting. | |
| Video | Muddy Waters Research analyzes multiple information including store traffic videos to expose Luckin Coffee of fabricating financial numbers. | |
| Telemetry data | The China Securities Regulatory Commission detects Dalian Zhangzidao Fishery Group’s financial fraud by using the BeiDou Navigation Satellite System. |
Financial fraud detection practices discussed in the section “survey of methods”
| Fraud type | Data type | Algorithm | XAI | Research | |
|---|---|---|---|---|---|
| Credit fraud | Customer level | Structured | Expert system | ● | Brause et al., |
| SVM | ● | Dheepa et al. | |||
| RF | ● | Noghani et al. | |||
| CNN | ∗ | Fu et al. | |||
| Semi-structured | Naive bayes | ● | Panigrahi et al. | ||
| CNN | ∗ | Zheng et al. | |||
| Unstructured | FNN, Att. | 〇 | HACUD | ||
| LSTM, Att. | 〇 | MAHINDER | |||
| GNN | ∗ | PC-GNN | |||
| GNN, Att. | 〇 | AMG-DP, | |||
| GNN, LSTM, Att. | ∗ | TemGNN | |||
| Money laundering | Business level | Unstructured | Graph AD | ● | FlowScope |
| Supervised network analysis | ● | Savage et al. | |||
| GNN | ∗ | Weber et al. | |||
| Loan fraud | Customer level | Unstructured | GNN, GRU, Att. | ∗ | DGANN |
| GNN, LSTM, Att. | ∗ | ST-GNN | |||
| Financial statement fraud | Business level | Structured | Naive bayes | ● | Deng |
| SVM | ● | Ravisankar et al. | |||
| RF, GBT, Rule ensembles | ● | Whiting et al. | |||
| FNN | ∗ | Green and Choi, | |||
| Insurance fraud | Customer level | Structured | LR | ● | Artís et al., |
| GBT | ● | Guelman | |||
| Unstructured | GNN | ∗ | Liang et al. | ||
| E-commerce transaction fraud | Customer level | Semi-structured | LSTM | ∗ | Jurgovsky et al. |
| GRU | ∗ | Branco et al. | |||
| Unstructured | RNN | ∗ | CLUE | ||
| LSTM, Att. | 〇 | LIC Tree-LSTM | |||
| FNN, Att., FM | 〇 | HEN | |||
| FNN, Att., FM | ∗ | NHFM, | |||
| Others | Structured | Expert system | ● | Quinlan et al., | |
| Unstructured | Graph AD | ● | Li et al. | ||
| GNN | ∗ | CARE-GNN | |||
| GNN, Att. | ∗ | Player2Vec, | |||
AD, anomaly detection; Att., attention; XAI, explainable artificial intelligence; ● represents non-deep method and is generally considered to be interpretable; 〇 represents the method claims to be interpretable; ∗ indicates that it is hard to evaluate.