Skip to main content

Artificial Intelligence Techniques to Detect and Prevent Corruption in Procurement: A Systematic Literature Review

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1194))

Abstract

Transparency International estimates that the costs of corruption in public procurement reach between 20 and 25% of the contract value, sometimes reaching 40–50%. In this study, we analyzed differentness kinds of corruption like (bribery, collusion embezzlement, misappropriation, fraud, abuse of discretion, favoritism, nepotism), and six types of Artificial Intelligence techniques (classification, regression, clustering, prediction, outlier detection, and visualization). The methodology proposed by Torres-Carrion was used, and four research questions were raised, which allow knowing the types of research carried out, the characteristics of the organizations in which the investigations are carried out, the technological tools, and data mining methodologies and techniques. The search was done in the Scopus and Web of Science databases, getting 102 articles published between 2015 and 2019. The primary data mining techniques used are logistic models, neural networks, Bayesian networks, supported vector machines, and decision trees.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Báez Gómez, J.E.: Relación entre el Índice de Control de la Corrupción y algunas variables sociales, económicas e institucionales. Nómadas. Rev. Crítica Ciencias Soc. y Jurídicas 38 (2013)

    Google Scholar 

  2. Volosin, N.A.: Datos abiertos, corrupción y compras públicas (2015)

    Google Scholar 

  3. Padhi, S.S., Mohapatra, P.K.J.: Detection of collusion in government procurement auctions. J. Purch. Supply Manag. 17, 207–221 (2011)

    Google Scholar 

  4. Martin, R.: A review of the literature of the followership since 2008: the importance of relationships and emotional intelligence. SAGE Open 5, 2158244015608421 (2015)

    Google Scholar 

  5. Adewumi, A.O., Akinyelu, A.A.: A survey of machine-learning and nature-inspired based credit card fraud detection techniques. Int. J. Syst. Assur. Eng. Manag. 8, 937–953 (2017)

    Google Scholar 

  6. Ngai, E.W.T., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50, 559–569 (2011)

    Google Scholar 

  7. Torres-Carrion, P.V., Gonzalez-Gonzalez, C.S., Aciar, S., Rodriguez-Morales, G.: Methodology for systematic literature review applied to engineering and education. IEEE Global Engineering Education Conference EDUCON, pp. 1364–1373, April 2018

    Google Scholar 

  8. Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering – a systematic literature review. Inf. Softw. Technol. 51, 7–15 (2009)

    Google Scholar 

  9. Moher, D., et al.: PRISMA-P: preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P). Syst. Rev. 1–9 (2015)

    Google Scholar 

  10. Auriol, E., Straub, S., Flochel, T.: Public procurement and rent-seeking: the case of paraguay. World Dev. 77, 395–407 (2016)

    Google Scholar 

  11. Lei, M., Yin, Z., Li, S., Li, H.: Detecting the collusive bidding behavior in below average bid auction. In: ICNC-FSKD 2017 - 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, pp. 1720–1727 (2018)

    Google Scholar 

  12. Hernández Sampieri, R., Fernández Collado, C., Baptista Lucio, M.: Metodología de la Investigación (2010)

    Google Scholar 

  13. Kose, I., Gokturk, M., Kilic, K.: An interactive machine-learning-based electronic fraud and abuse detection system in healthcare insurance. Appl. Soft Comput. J. 36, 283–299 (2015)

    Google Scholar 

  14. Charles Andoh, E., Ofosu-Hene, D.: Causes, effects and deterrence of insurance fraud: evidence from Ghana. J. Financ. Crime Iss. 5, 39–44 (2016)

    Google Scholar 

  15. Huang, S.Y., Lin, C.C., Chiu, A.A., Yen, D.C.: Fraud detection using fraud triangle risk factors. Inf. Syst. Front. 19, 1343–1356 (2017)

    Google Scholar 

  16. Seck, A.: Heterogeneous bribe payments and firms’ performance in developing countries. J. African Bus. 21, 1–20 (2019)

    Google Scholar 

  17. Baader, G., Krcmar, H.: Reducing false positives in fraud detection: combining the red flag approach with process mining. Int. J. Account. Inf. Syst. 31, 1–16 (2018)

    Google Scholar 

  18. Choi, D., Lee, K.: An artificial intelligence approach to financial fraud detection under IoT environment: a survey and implementation. Secur. Commun. Netw. 2018 (2018)

    Google Scholar 

  19. Sadaoui, S., Wang, X.: A dynamic stage-based fraud monitoring framework of multiple live auctions. Appl. Intell. 46, 197–213 (2017)

    Google Scholar 

  20. Yeh, C.C., Chi, D.J., Lin, T.Y., Chiu, S.H.: A hybrid detecting fraudulent financial statements model using rough set theory and support vector machines. Cybern. Syst. 47, 261–276 (2016)

    Google Scholar 

  21. Ouenniche, J., Uvalle Perez, O.J., Ettouhami, A.: A new EDAS-based in-sample-out-of-sample classifier for risk-class prediction. Manag. Decis. 57, 314–323 (2019)

    Google Scholar 

  22. Zakaryazad, A., Duman, E.: A profit-driven Artificial Neural Network (ANN) with applications to fraud detection and direct marketing. Neurocomputing 175, 121–131 (2014)

    Google Scholar 

  23. Darwish, S.M.: An intelligent credit card fraud detection approach based on semantic fusion of two classifiers. Soft. Comput. 24, 1243–1253 (2019)

    Google Scholar 

  24. Kehler, E., Paciello, J., Pane, J.: Anomaly detection in public procurements using the open contracting data standard (2019)

    Google Scholar 

  25. Van Vlasselaer, V., et al.: APATE: a novel approach for automated credit card transaction fraud detection using network-based extensions. Decis. Support Syst. 75, 38–48 (2015)

    Google Scholar 

  26. Zareapoor, M., Shamsolmoali, P.: Application of credit card fraud detection: based on bagging ensemble classifier. Procedia Comput. Sci. 48, 679–685 (2015)

    Google Scholar 

  27. Ngoc, B.H., Hai, D.B., Chinh, T.H.: Assessment of the should be effects of corruption perception index on foreign direct investment in ASEAN countries by spatial regression method. In: Anh, Ly H., Dong, L.S., Kreinovich, V., Thach, N.N. (eds.) ECONVN 2018. SCI, vol. 760, pp. 421–429. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73150-6_33

    Chapter  Google Scholar 

  28. Burböck, B., Macek, A., Podhovnik, E., Zirgoi, C.: Asymmetric influence of corruption distance on FDI. J. Financ. Crime (2018)

    Google Scholar 

  29. Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: a decision support system for online banking fraud analysis and investigation. Comput. Secur. 53, 175–186 (2015)

    Google Scholar 

  30. Dhurandhar, A., Graves, B., Ravi, R., Maniachari, G., Ettl, M.: Big data system for analyzing risky procurement entities. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1741–1750 August 2015

    Google Scholar 

  31. Hooi, B., et al.: BIRDNEST: Bayesian inference for ratings-fraud detection. In: 16th SIAM International Conference on Data Mining 2016, SDM 2016, pp. 495–503 (2016)

    Google Scholar 

  32. Snyder, P., Kanich, C.: Characterizing fraud and its ramifications in affiliate marketing networks. J. Cybersecur. 2, 71–81 (2016)

    Google Scholar 

  33. Moalosi, M., Hlomani, H., Phefo, O.S.D.: Combating credit card fraud with online behavioural targeting and device fingerprinting. Int. J. Electron. Secur. Digit, Forensics (2019)

    Google Scholar 

  34. Anh, N.N., Minh, N.N., Tran-Nam, B.: Corruption and economic growth, with a focus on Vietnam. Crime, Law Soc. Change 45, 307–324 (2016)

    Google Scholar 

  35. Ferwerda, J., Deleanu, I., Unger, B.: Corruption in public procurement: finding the right indicators. Eur. J. Crim. Policy Res. 23, 245–267 (2017)

    Google Scholar 

  36. Amanze, B.C., Onukwugha, C.G.: Credit card fraud detection system in nigeria banks using adaptive data mining and intelligent agents: A review. Int. J. Sci. Technol. Res. 7, 175–184 (2018)

    Google Scholar 

  37. Zanin, M., Romance, M., Moral, S., Criado, R.: Credit card fraud detection through parenclitic network analysis. Complexity 2018 (2018)

    Google Scholar 

  38. Randhawa, K., Loo, C.K., Seera, M., Lim, C.P., Nandi, A.K.: Credit card fraud detection using AdaBoost and majority voting. IEEE Access 6, 14277–14284 (2018)

    Google Scholar 

  39. Ausloos, M., Cerqueti, R., Mir, T.A.: Data science for assessing possible tax income manipulation: the case of Italy. Chaos, Solitons Fractals 104, 238–256 (2017)

    Google Scholar 

  40. Helmy, T.H., Zaki, M., Salah, T., Badran, K.: Design of a monitor for detecting money laundering and terrorist financing. J. Theor. Appl. Inf. Technol. 85, 425–436 (2016)

    Google Scholar 

  41. Rahimikia, E., Mohammadi, S., Rahmani, T., Ghazanfari, M.: Detecting corporate tax evasion using a hybrid intelligent system: a case study of Iran. Int. J. Account. Inf. Syst. 25, 1–17 (2017)

    Google Scholar 

  42. Van Erven, G.C.G., Carvalho, R.N., De Holanda, M.T., Ralha, C.: Graph database: a case study for detecting fraud in acquisition of Brazilian Government (Banco de Dados em Grafo: Um Estudo de Caso em Detecção de Fraudes no Governo Brasileiro). In: Iberian Conference on Information Systems and Technologies CISTI, pp. 1–6 (2017)

    Google Scholar 

  43. Wacker, J., Ferreira, R.P., Ladeira, M.: Detecting fake suppliers using deep image features (2018)

    Google Scholar 

  44. Kim, Y.J., Baik, B., Cho, S.: Detecting financial misstatements with fraud intention using multi-class cost-sensitive learning. Expert Syst. Appl. 62, 32–43 (2016)

    Google Scholar 

  45. Dutta, I., Dutta, S., Raahemi, B.: Detecting financial restatements using data mining techniques. Expert Syst. Appl. 90, 374–393 (2017)

    Google Scholar 

  46. Grace, E., Rai, A., Redmiles, E., Ghani, R.: Detecting fraud, corruption, and collusion in international development contracts: the design of a proof-of-concept automated system (2016)

    Google Scholar 

  47. Gómez, J.A., Arévalo, J., Paredes, R., Nin, J.: End-to-end neural network architecture for fraud scoring in card payments. Pattern Recognit. Lett. 105, 175–181 (2018)

    Google Scholar 

  48. Chen, Y.J., Wu, C.H., Chen, Y.M., Li, H.Y., Chen, H.K.: Enhancement of fraud detection for narratives in annual reports. Int. J. Account. Inf. Syst. 26, 32–45 (2017)

    Google Scholar 

  49. Wang, Q., Xu, W., Huang, X., Yang, K.: Enhancing intraday stock price manipulation detection by leveraging recurrent neural networks with ensemble learning. Neurocomputing 347, 46–58 (2019)

    Google Scholar 

  50. Tan, M., Lee, W.-L.: Evaluation and improvement of procurement process with data analytics. Int. J. Adv. Comput. Sci. Appl. 6, 70–80 (2015)

    Google Scholar 

  51. Correa Bahnsen, A., Aouada, D., Stojanovic, A., Ottersten, B.: Feature engineering strategies for credit card fraud detection. Expert Syst. Appl. 51, 134–142 (2016)

    Google Scholar 

  52. Li, H., Wong, M.-L.: Financial fraud detection by using grammar-based multi-objective genetic programming with ensemble learning (2015)

    Google Scholar 

  53. Throckmorton, C.S., Mayew, W.J., Venkatachalam, M., Collins, L.M.: Financial fraud detection using vocal, linguistic and financial cues. Decis. Support Syst. 74, 78–87 (2015)

    Google Scholar 

  54. Arief, H.A.A., Saptawati, G.A.P., Asnar, Y.D.W.: Fraud detection based-on data mining on Indonesian E-Procurement System (SPSE). In: Proceedings of 2016 International Conference on Data and Software Engineering, ICoDSE 2016 (2017)

    Google Scholar 

  55. Vimala Devi, J., Kavitha, K.S.: Fraud detection in credit card transactions by using classification algorithms. In: International Conference on Current Trends in Computer, Electrical, Electronics and Communication, CTCEEC 2017, pp. 125–131 (2018)

    Google Scholar 

  56. Zhou, H., Chai, H.F., Qiu, M.L.: Fraud detection within bankcard enrollment on mobile device based payment using machine learning. Front. Inf. Technol. Electron. Eng. 19, 1537–1545 (2018)

    Google Scholar 

  57. Hooda, N., Bawa, S., Rana, P.S.: Fraudulent firm classification: a case study of an external audit. Appl. Artif. Intell. 32, 48–64 (2018)

    Google Scholar 

  58. Fu, Y., Liu, G., Papadimitriou, S., Xiong, H., Li, X., Chen, G.: Fused latent models for assessing product return propensity in online commerce. Decis. Support Syst. 91, 77–88 (2016)

    Google Scholar 

  59. Demiriz, A., Ekizoǧlu, B.: Fuzzy rule-based analysis of spatio-temporal ATM usage data for fraud detection and prevention1. J. Intell. Fuzzy Syst. 31, 805–813 (2016)

    Google Scholar 

  60. Chimonaki, C., Papadakis, S., Vergos, K., Shahgholian, A.: Identification of financial statement fraud in Greece by using computational intelligence techniques. In: Mehandjiev, N., Saadouni, B. (eds.) FinanceCom 2018. LNBIP, vol. 345, pp. 39–51. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-19037-8_3

    Chapter  Google Scholar 

  61. Correa, M.A.O.S., Galindo Leal, A.: Identification of overpricing in the purchase of medication by the Federal Government of Brazil, using text mining and clustering based on ontoiogy (2018)

    Google Scholar 

  62. Alzaidi, A.A.: Impact of use of big data in decision making in banking sector of Saudi Arabia. Int. J. Comput. Sci. Netw. Secur. 18, 72–80 (2018)

    Google Scholar 

  63. Kasa, N., Dahbura, A., Ravoori, C., Adams, S.: Improving credit card fraud detection by profiling and clustering accounts (2019)

    Google Scholar 

  64. Chen, Y.-J., Wu, C.-H.: On big data-based fraud detection method for financial statements of business groups (2017)

    Google Scholar 

  65. Weng, H., et al.: Online e-commerce fraud: a large-scale detection and analysis (2018)

    Google Scholar 

  66. Torres, C.F., Schütte, J., State, R.: Osiris: hunting for integer bugs in ethereum smart contracts (2018)

    Google Scholar 

  67. Lismont, J.: Predicting tax avoidance by means of social network analytics. Decis. Support Syst. 108, 13–24 (2018)

    Google Scholar 

  68. Zhang, H., Wang, L.: Prescription fraud detection through statistic modeling (2018)

    Google Scholar 

  69. Martínez-Plumed, F., Casamayor, J.C., Ferri, C., Gómez, J.A., Vendrell Vidal, E.: SALER: a data science solution to detect and prevent corruption in public administration. In: Alzate, C., et al. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11329, pp. 103–117. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-13453-2_9

    Chapter  Google Scholar 

  70. Carcillo, F., Dal Pozzolo, A., Le Borgne, Y.A., Caelen, O., Mazzer, Y., Bontempi, G.: SCARFF: a scalable framework for streaming credit card fraud detection with spark. Inf. Fusion. 41, 182–194 (2018)

    Google Scholar 

  71. Carminati, M., Polino, M., Continella, A., Lanzi, A., Maggi, F., Zanero, S.: Security evaluation of a banking fraud analysis system. ACM Trans. Priv. Secur. 21, 1–31 (2018)

    Google Scholar 

  72. Robinson, W.N., Aria, A.: Sequential fraud detection for prepaid cards using hidden Markov model divergence. Expert Syst. Appl. 91, 235–251 (2018)

    Google Scholar 

  73. Ekin, T., Ieva, F., Ruggeri, F., Soyer, R.: Statistical medical fraud assessment: exposition to an emerging field. Int. Stat. Rev. 86, 379–402 (2018)

    MathSciNet  Google Scholar 

  74. Fauzan, A.C., Sarno, R., Ariyani, N.F.: Structure-based ontology matching of business process model for fraud detection. In: ICTS 2017, pp. 221–225 (2018)

    Google Scholar 

  75. Saghehei, E., Memariani, A.: Suspicious behavior detection in debit card transactions using data mining: a comparative study using hybrid models. Inf. Resour. Manag. J. 28, 1–14 (2015)

    Google Scholar 

  76. El-kaime, H., Hanoune, M., Eddaoui, A.: The data mining: a solution for credit card fraud detection in banking. In: Mizera-Pietraszko, J., Pichappan, P., Mohamed, L. (eds.) RTIS 2017. AISC, vol. 756, pp. 332–341. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-91337-7_31

    Chapter  Google Scholar 

  77. Schlenther, B.O.: Addressing illicit financial flows in Africa: how broad is the whole of government approach supposed to be? J. Financ. Crime (2016)

    Google Scholar 

  78. Sadaf, R., Oláh, J., Popp, J., Máté, D.: An investigation of the influence of theworldwide governance and competitiveness on accounting fraud cases: a cross-country perspective. Sustain 10, 1–11 (2018)

    Google Scholar 

  79. Wang, H., Chen, H.M.: Deterring bidder collusion: auction design complements antitrust policy. J. Compet. Law Econ. 12, 31–68 (2016)

    Google Scholar 

  80. Wahid, A., Rao, A.C.S.: A distance-based outlier detection using particle swarm optimization technique. In: Fong, S., Akashe, S., Mahalle, Parikshit N. (eds.) Information and Communication Technology for Competitive Strategies. LNNS, vol. 40, pp. 633–643. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0586-3_62

    Chapter  Google Scholar 

  81. Coma-Puig, B., Carmona, J.: A quality control method for fraud detection on utility customers without an active contract. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, pp. 495–498 (2018)

    Google Scholar 

  82. Fazekas, M., Cingolani, L.: Breaking the cycle? How (not) to use political finance regulations to counter public procurement corruption. Slav. East Eur. Rev. 95, 76–116 (2017)

    Google Scholar 

  83. Lehne, J., Shapiro, J.N., Vanden Eynde, O.: Building connections: political corruption and road construction in India. J. Dev. Econ. 131, 62–78 (2018)

    Google Scholar 

  84. Cieślik, A., Goczek, Ł.: Control of corruption, international investment, and economic growth – Evidence from panel data. World Dev. 103, 323–335 (2018)

    Google Scholar 

  85. Lourenço, I.C., Rathke, A., Santana, V., Branco, M.C.: Corruption and earnings management in developed and emerging countries. Corp. Gov. 18, 35–51 (2018)

    Google Scholar 

  86. van Erven, G.C.G., Holanda, M., Carvalho, Rommel N.: Detecting evidence of fraud in the brazilian government using graph databases. In: Rocha, Á., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST 2017. AISC, vol. 570, pp. 464–473. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56538-5_47

    Chapter  Google Scholar 

  87. Rad, M.S., Shahbahrami, A.: Detecting high risk taxpayers using data mining techniques. In: 2016 2nd International Conference of Signal Processing and Intelligent Systems ICSPIS 2016, pp. 14–15 (2017)

    Google Scholar 

  88. Monirzadeh, Z., Habibzadeh, M., Farajian, N.: Detection of violations in Credit Cards of Banks and financial institutions based on artificial neural network and Metaheuristic optimization algorithm. Int. J. Adv. Comput. Sci. Appl. 9, 176–182 (2018)

    Google Scholar 

  89. Bramoullé, Y., Goyal, S.: Favoritism. J. Dev. Econ. 122, 16–27 (2016)

    Google Scholar 

  90. Saxena, A., Sharma, N., Saxena, K., Parikh, Satyen M.: Financial data mining: appropriate selection of tools, techniques and algorithms. In: Deshpande, A.V., Unal, A., Passi, K., Singh, D., Nayak, M., Patel, B., Pathan, S. (eds.) SmartCom 2017. CCIS, vol. 876, pp. 244–251. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-1423-0_27

    Chapter  Google Scholar 

  91. Bogdanov, D., Jõemets, M., Siim, S., Vaht, M.: How the Estonian tax and customs board evaluated a tax fraud detection system based on secure multi-party computation. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 227–234. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_14

    Chapter  Google Scholar 

  92. Kültür, Y., Çağlayan, M.U.: Hybrid approaches for detecting credit card fraud. Expert Syst. 34, 1–13 (2017)

    Google Scholar 

  93. Indrajani, Prabowo, H., Meyliana: Learning fraud detection from big data in online banking transactions: a systematic literature review. J. Telecommun. Electron. Comput. Eng. 8, 127–131 (2016)

    Google Scholar 

  94. Hutchings, A.: Leaving on a jet plane: the trade in fraudulently obtained airline tickets. Crime Law Soc. Change 70, 461–487 (2018)

    Google Scholar 

  95. Saia, R., Boratto, L., Carta, S.: Multiple behavioral models: a divide and conquer strategy to fraud detection in financial data streams (2015)

    Google Scholar 

  96. Lee, P.S., Owda, M., Crockett, K.: Novel methods for resolving false positives during the detection of fraudulent activities on stock market financial discussion boards. Int. J. Adv. Comput. Sci. Appl. 9, 1–10 (2018)

    Google Scholar 

  97. Fazekas, M.: Red tape, bribery and government favouritism: evidence from Europe. Crime Law Soc. Change 68, 403–429 (2017)

    Google Scholar 

  98. Yaseen, M., et al.: Secure sensors data acquisition and communication protection in eHealthcare: review on the state of the art. Telemat. Inform. 35, 702–726 (2018)

    Google Scholar 

  99. Jetter, M., Parmeter, C.F.: Sorting through global corruption determinants: institutions and education matter – Not culture. World Dev. 109, 279–294 (2018)

    Google Scholar 

  100. Jagger, P., Shively, G.: Taxes and Bribes in Uganda. J. Dev. Stud. 51, 66–79 (2015)

    Google Scholar 

  101. Williams, M.J.: The political economy of unfinished development projects: corruption, clientelism, or collective choice? Am. Polit. Sci. Rev. 114, 705–723 (2017)

    Google Scholar 

  102. Kussainov, D.S.: The problems of qualification of illegal alienation of ownership of residential premises. Asian Soc. Sci. 11, 188 (2015)

    Google Scholar 

  103. Ahmed, M., Mahmood, A.N., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278–288 (2016)

    Google Scholar 

  104. Moro, S., Cortez, P., Rita, P.: Business intelligence in banking: a literature analysis from 2002 to 2013 using text mining and latent Dirichlet allocation. Expert Syst. Appl. 42, 1314–1324 (2015)

    Google Scholar 

  105. Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., Bontempi, G.: Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE Trans. Neural Netw. Learn. Syst. 29, 3784–3797 (2018)

    Google Scholar 

  106. Kumar, P., Iqbal, F.: Credit card fraud identification using machine learning approaches (2019)

    Google Scholar 

  107. Mahmoudi, N., Duman, E.: Detecting credit card fraud by modified fisher discriminant analysis. Expert Syst. Appl. 42, 2510–2516 (2015)

    Google Scholar 

  108. Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90–113 (2016)

    Google Scholar 

  109. Rajak, I., Mathai, K.J.: Intelligent fraudulent detection system based SVM and optimized by danger theory. In: IEEE International Conference on Computer, Communication and Control IC4 2015, pp. 2–5 (2016)

    Google Scholar 

  110. Xu, J.J., Lu, Y., Chau, M.: P2P lending fraud detection: a big data approach. In: Chau, M., Wang, G.A., Chen, H. (eds.) PAISI 2015. LNCS, vol. 9074, pp. 71–81. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18455-5_5

    Chapter  Google Scholar 

  111. Hajek, P., Henriques, R.: Mining corporate annual reports for intelligent detection of financial statement fraud – a comparative study of machine learning methods. Knowl.-Based Syst. 128, 139–152 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yeferson Torres Berru , Vivian Félix López Batista or Pablo Torres-Carrión .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Torres Berru, Y., López Batista, V.F., Torres-Carrión, P., Jimenez, M.G. (2020). Artificial Intelligence Techniques to Detect and Prevent Corruption in Procurement: A Systematic Literature Review. In: Botto-Tobar, M., Zambrano Vizuete, M., Torres-Carrión, P., Montes León, S., Pizarro Vásquez, G., Durakovic, B. (eds) Applied Technologies. ICAT 2019. Communications in Computer and Information Science, vol 1194. Springer, Cham. https://doi.org/10.1007/978-3-030-42520-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-42520-3_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-42519-7

  • Online ISBN: 978-3-030-42520-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics