2009
DOI: 10.4192/1577-8517-v9_1
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR² Framework

Abstract: Abstract. Fraud is a million dollar business and it is increasing every year. Both internal and external fraud present a substantial cost to our economy worldwide. A review of the academic literature learns that the academic community only addresses external fraud and how to detect this type of fraud. Little or no effort to our knowledge has been put in investigating how to prevent ánd to detect internal fraud, which we call 'internal fraud risk reduction'. Taking together the urge for research in internal fra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 36 publications
0
17
0
Order By: Relevance
“…Descriptive process mining requires manual decision-making over the final list of suspicious transactions (Jans et al, 2009).…”
Section: Resultsmentioning
confidence: 99%
“…Descriptive process mining requires manual decision-making over the final list of suspicious transactions (Jans et al, 2009).…”
Section: Resultsmentioning
confidence: 99%
“…The numbers of fraud cases are shocking, with over one-third of all frauds detected indirectly by 'chance' (Jans, Lybaert, & Vanhoof, 2009). ACFE (2012) asserts that initially most frauds are detected through tips as compared to other methods.…”
Section: Fraud Detection Using Benford's Lawmentioning
confidence: 99%
“…The assignment of the Audit Innovation Award [22] for the effective integration of process mining techniques in the internal auditing procedure and the rise of commercial products on the basis of process mining both underline the present deficits and the future benefits of detective process analysis tools in business risk management. In [27], Jans et al integrated process oriented data mining into their IFR 2 framework for fraud risk reduction whereas in [26] they explicitly included process mining (and discovery) techniques within the internal auditing of a procurement cycle in a financial institution. Besides introductory proposals highlighting the general use of process mining for auditing/security purposes [40,42], there is little academic work addressing the intersection of security analyzes within (internal and external) audits and process discovery.…”
Section: Introductionmentioning
confidence: 99%