메뉴 건너뛰기




Volumn 46, Issue 4, 2009, Pages 853-864

Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem

Author keywords

Design science; Disgruntled employee; IS security; Occupational fraud; Organizational communication; Text mining

Indexed keywords

COMMUNICATION; PERSONNEL; RISK ANALYSIS; RISK ASSESSMENT; SAFETY FACTOR;

EID: 61349124807     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2008.11.013     Document Type: Article
Times cited : (97)

References (54)
  • 1
    • 61349088843 scopus 로고    scopus 로고
    • ACL Data Analysis Software Animated Presentation (Pentana Audit Software, Vancouver, BC, Canada, 2006).
    • ACL Data Analysis Software Animated Presentation (Pentana Audit Software, Vancouver, BC, Canada, 2006).
  • 4
    • 11544316378 scopus 로고    scopus 로고
    • Name, rank, and serial number? The dilemma of reference checks
    • Arnesen D.W., Fleenor C.P., and Blizinsky M. Name, rank, and serial number? The dilemma of reference checks. Business Horizons 41 4 (1998)
    • (1998) Business Horizons , vol.41 , Issue.4
    • Arnesen, D.W.1    Fleenor, C.P.2    Blizinsky, M.3
  • 6
    • 33845442788 scopus 로고    scopus 로고
    • A wavelet-based approach to preserve privacy for classification mining
    • Bapna S., and Gangopadhyay A. A wavelet-based approach to preserve privacy for classification mining. Decision Sciences 37 4 (2006)
    • (2006) Decision Sciences , vol.37 , Issue.4
    • Bapna, S.1    Gangopadhyay, A.2
  • 7
    • 61349104947 scopus 로고
    • Employee handbooks: contracts or empty promises?
    • Brady T. Employee handbooks: contracts or empty promises?. Management Review 82 6 (1993)
    • (1993) Management Review , vol.82 , Issue.6
    • Brady, T.1
  • 10
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16 1 (2005)
    • (2005) Information Systems Research , vol.16 , Issue.1
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 12
    • 0034824884 scopus 로고    scopus 로고
    • Concept decompositions for large sparse text data using clustering
    • Dhillon I.S., and Modha D.S. Concept decompositions for large sparse text data using clustering. Machine Learning 42 1 (2001)
    • (2001) Machine Learning , vol.42 , Issue.1
    • Dhillon, I.S.1    Modha, D.S.2
  • 15
    • 61349194049 scopus 로고    scopus 로고
    • Fraud Survey KPMG Forensic
    • Fraud Survey (KPMG Forensic, 2003).
    • (2003)
  • 16
    • 0005766289 scopus 로고    scopus 로고
    • Morality and computers: attitudes and differences in judgments
    • Gattiker U.E., and Kelley H. Morality and computers: attitudes and differences in judgments. Information Systems Research 10 3 (1999)
    • (1999) Information Systems Research , vol.10 , Issue.3
    • Gattiker, U.E.1    Kelley, H.2
  • 17
    • 61349126777 scopus 로고    scopus 로고
    • Global Economic Crime Survey PricewaterhouseCoopers, New York
    • Global Economic Crime Survey (PricewaterhouseCoopers, New York, 2005).
    • (2005)
  • 18
    • 32544451794 scopus 로고    scopus 로고
    • Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
    • Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems 41 3 (2006)
    • (2006) Decision Support Systems , vol.41 , Issue.3
    • Gupta, M.1    Rees, J.2    Chaturvedi, A.3    Chi, J.4
  • 21
    • 0242652022 scopus 로고    scopus 로고
    • Design science in information systems research
    • Hevner A.R., March S.T., Park J., and Ram S. Design science in information systems research. MIS Quarterly 28 1 (2004)
    • (2004) MIS Quarterly , vol.28 , Issue.1
    • Hevner, A.R.1    March, S.T.2    Park, J.3    Ram, S.4
  • 22
    • 84965629708 scopus 로고
    • Employee deviance: a response to the perceived quality of the work experience
    • Hollinger R., and Clark J. Employee deviance: a response to the perceived quality of the work experience. Work And Occupations 9 1 (1982)
    • (1982) Work And Occupations , vol.9 , Issue.1
    • Hollinger, R.1    Clark, J.2
  • 23
    • 0020985537 scopus 로고
    • Deterrence in the workplace: perceived certainty, perceived severity, and employee theft
    • Hollinger R.C., and Clark J.P. Deterrence in the workplace: perceived certainty, perceived severity, and employee theft. Social Forces 62 2 (1983)
    • (1983) Social Forces , vol.62 , Issue.2
    • Hollinger, R.C.1    Clark, J.P.2
  • 24
    • 61349113619 scopus 로고
    • Are you guilty of electronic trespassing?
    • Jacobs D.L. Are you guilty of electronic trespassing?. Management Review 83 4 (1994)
    • (1994) Management Review , vol.83 , Issue.4
    • Jacobs, D.L.1
  • 25
    • 61349189897 scopus 로고    scopus 로고
    • Kroll Inc, Economist Intelligence Unit Overview in the Kroll Global Fraud Report
    • Kroll Inc., Economist Intelligence Unit Overview in the Kroll Global Fraud Report (2008).
    • (2008)
  • 30
    • 84948481845 scopus 로고
    • An algorithm for suffix stripping
    • Porter M.F. An algorithm for suffix stripping. Program 14 3 (1980)
    • (1980) Program , vol.14 , Issue.3
    • Porter, M.F.1
  • 31
    • 61349176784 scopus 로고    scopus 로고
    • Preventing crime and violence in the workplace in workplace health, safety and security AllBusiness.com, Undated
    • Preventing crime and violence in the workplace in workplace health, safety and security (AllBusiness.com, Undated).
  • 32
    • 17744384398 scopus 로고    scopus 로고
    • Auditors' Responsibility for Fraud Detection
    • Ramos M. Auditors' Responsibility for Fraud Detection. Journal of Accountancy 195 (2003)
    • (2003) Journal of Accountancy , vol.195
    • Ramos, M.1
  • 33
    • 61349153817 scopus 로고    scopus 로고
    • Report to the nation on occupational fraud and abuse Association of Certified Fraud Examiners
    • Report to the nation on occupational fraud and abuse (Association of Certified Fraud Examiners, Austin, TX, 2006).
    • (2006)
    • Austin, T.X.1
  • 36
    • 61349093720 scopus 로고    scopus 로고
    • Sarbanes-Oxley Act, H.R. 3763, PL 107-204, 116 Stat 745, 107th Congress (2002).
    • Sarbanes-Oxley Act, H.R. 3763, PL 107-204, 116 Stat 745, 107th Congress (2002).
  • 37
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz E.E. A framework for understanding and predicting insider attacks. Computers and Security 21 (2002)
    • (2002) Computers and Security , vol.21
    • Schultz, E.E.1
  • 38
    • 61349182736 scopus 로고    scopus 로고
    • Rethinking message storage: Sarbanes-Oxley demands better archiving and retrieval of electronic communications
    • 1p
    • E. Schwartz, Rethinking message storage: Sarbanes-Oxley demands better archiving and retrieval of electronic communications, InfoWorld 26 (24) 14-14 (1p).
    • InfoWorld , vol.26 , Issue.24 , pp. 14-14
    • Schwartz, E.1
  • 40
    • 33644904044 scopus 로고    scopus 로고
    • The role of behavioral research and profiling in malicious cyber insider investigations
    • Shaw E.D. The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation 3 1 (2006)
    • (2006) Digital Investigation , vol.3 , Issue.1
    • Shaw, E.D.1
  • 42
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning modules for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: security planning modules for management decision making. MIS Quarterly 22 4 (1998)
    • (1998) MIS Quarterly , vol.22 , Issue.4
    • Straub, D.W.1    Welke, R.J.2
  • 44
    • 61349094303 scopus 로고    scopus 로고
    • The 2006 Oversight Systems Financial Executive Report on Sarbanes-Oxley (Oversight Systems, Inc., Atlanta, Georgia, 2006).
    • The 2006 Oversight Systems Financial Executive Report on Sarbanes-Oxley (Oversight Systems, Inc., Atlanta, Georgia, 2006).
  • 47
    • 33749669785 scopus 로고    scopus 로고
    • Mandate from SEC regulators: save your electronic documents
    • Varon E. Mandate from SEC regulators: save your electronic documents. CIO Magazine 16 (2003)
    • (2003) CIO Magazine , vol.16
    • Varon, E.1
  • 48
    • 0012320306 scopus 로고    scopus 로고
    • Why employees commit fraud
    • Wells J.T. Why employees commit fraud. Journal of Accountancy 191 2 (2001)
    • (2001) Journal of Accountancy , vol.191 , Issue.2
    • Wells, J.T.1
  • 49
    • 61349163859 scopus 로고    scopus 로고
    • Reading your every keystroke: protecting employee e-mail privacy
    • Wesche T.M. Reading your every keystroke: protecting employee e-mail privacy. Journal of High Technology Law 1 1 (2002)
    • (2002) Journal of High Technology Law , vol.1 , Issue.1
    • Wesche, T.M.1
  • 50
    • 0036639314 scopus 로고    scopus 로고
    • Corporate computer fraud - straight from the secret investigators
    • Wilding E., and Parker J. Corporate computer fraud - straight from the secret investigators. Computer Fraud & Security 2002 7 (2002)
    • (2002) Computer Fraud & Security , vol.2002 , Issue.7
    • Wilding, E.1    Parker, J.2
  • 51
    • 4644253314 scopus 로고    scopus 로고
    • Decomposition of fraud risk assessments and auditors' sensitivity to fraud cues
    • Wilks J., and Zimbelman M. Decomposition of fraud risk assessments and auditors' sensitivity to fraud cues. Contemporary Accounting Research 21 3 (2004)
    • (2004) Contemporary Accounting Research , vol.21 , Issue.3
    • Wilks, J.1    Zimbelman, M.2
  • 52
    • 12344260478 scopus 로고    scopus 로고
    • Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context
    • Willison R. Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context. presented at Proceedings of the 37th Hawaii International Conference on System Sciences (2004)
    • (2004) presented at Proceedings of the 37th Hawaii International Conference on System Sciences
    • Willison, R.1
  • 53
    • 61349179750 scopus 로고    scopus 로고
    • Message therapy: federal regulations require an entirely new approach to storing and searching e-mails. Noncompliance is not an option
    • Worthen B. Message therapy: federal regulations require an entirely new approach to storing and searching e-mails. Noncompliance is not an option. CIO Magazine 18 7 (2005)
    • (2005) CIO Magazine , vol.18 , Issue.7
    • Worthen, B.1
  • 54
    • 34548477450 scopus 로고    scopus 로고
    • Network externalities, layered protection and IT security risk management
    • Yue W.T., ÇakanyIldIrIm M., Ryu Y.U., and Liu D. Network externalities, layered protection and IT security risk management. Decision Support Systems 44 1 (2007)
    • (2007) Decision Support Systems , vol.44 , Issue.1
    • Yue, W.T.1    ÇakanyIldIrIm, M.2    Ryu, Y.U.3    Liu, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.