ELEMENTS OF MULTIVARIATION ANALYSIS OF CRIME ON SCARCE MEETINGS
DOI:
https://doi.org/10.5937/Keywords:
Method, crime, control, analysis, factors and variables of crome, implicit knowledge, application, causes of crimeAbstract
Crime represents a harmful occurrence that is specific for each culture and socioeconomic formation. Due to this it is no surprise that there is an interst for crime in different areas of social sciences and life. Since crime is a burning topic of numerious scientific and expert analyses or researches, it can be concluded that it is an old mutual problem of all countries, old and new ones. It doesn’t depend only on the sociopolitical order, but economic development and characteristical social factors and circumstances that exist in respective countries as well.
Suprisingly large diversity of causes and circumstances that lead to the occurrence of crime demands a different approach to its research. It is possible and consists of the application of multivariate analysis, since it allows for many different ways of observing crime and taking more efficient actions aimed at its prevention and enabling of normal functioning and development of state and society.
Application of multivariation analysis in crime, is based on consideration of indirect (implicit) knowledge as a method applied on a sample that consists of data from fourty seven US countries. Depending on their individuality, different crime rates were determined for each federal state. The mentioned sample was used to answer a simple question through multivariation analysis: would its application discover hidden causes of crime rates, which aren’t visible from the data contained in the selected sample? In order to achieve the set goal, factor analysis was used as well the method of inverse factoral (segmentation) sample analysis. Discovering such hidden samples of crime would be a very important way of achieving total control on it. Since full control of crime represents a very modern way in contemporary approach to fighting rime in the world, it is obvious that control is impossible without considering such hidden factors (causes and conditions) which favour occurrence of criminal behavior, which can be shown by multivariation analysis based on the aforementioned sample.
Downloads
References
Enron Financial Statements as of Decembar 31,2000.
Pullam and Deborah Reš.omon. 2002. How Three Unlikely Sleuths Exposed Fraud at World-Com, Wall Street Journal. (30), 1.
SEC, Accounting and Auditing Enforcment Release No. 1706, January 27, 2003.
Porter, B., & A. Cameron. 1987. Company fraud—what price the auditor? Accountant’s Journal, 44–47.
Fanning, K., & K. Cogger. 1998. Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1), 21–24.
Cullinan, P. G., & G. S. Sutton. 2002. Defrauding the public interest: a critical examination of reengineered audit processes and the likelihood of detecting fraud. Critical Perspectives on Accounting, 13(3), 297–310.
Abbot, J. L., Y. Park, & S. Parker. 2000. The effects of audit committee activity and independence on corporate fraud. Managerial Finance, 26(11), 55–67.
Fanning, K., & K. Cogger. 1998. Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1), 21–24.
Spathis, C. 2002. Detecting false financial statements using published data: some evidence from Greece. Managerial Auditing Journal, 17(4), 179–191.
Bell, T., & J. Carcello. 2000. A decision aid for assessing the likelihood of fraudulent financial reporting. Auditing: A Journal of Practice & Theory, 9(1), 169–178. Bell 1996.
Green, B. P., & J. H. Choi. 1997. Assessing the risk of management fraud through neural- network technology. Auditing: A Journal of Practice and Theory, 16(1), 14–28.
Summers, S. L., & J. T. Sweeney. 1998. Fraudulent misstated financial statements and insider trading: an empirical analysis. The Accounting Review, 73(1), 131–146.
Eining, M. M., D. R. Jones, & J. K. Loebbecke. 1997. Reliance on decision aids: an examination of auditors’ assessment of management fraud. Auditing: A Journal of Practice and Theory, 16(2), 1–19.
Spathis, C., M. Doumpos, & C. Zopounidis, 2003. Using client performance measures to identify pre-engagement factors associated with qualified audit reports in Greece. The International Journal of Accounting, 38(3), 267–284.
Efstathios, K., S. Charalambos, & M. Yannis. 2007. Data Mining techniques for the detection of fraudulent financial statements, Expert System with Application (32), 995-1003;
Green, B. P., & J. H. Choi. 1997. Assessing the risk of management fraud through neural-network technology. Auditing: A Journal of Practice and Theory, 16(1), 8–28.
Stice, J. 1991. Using financial and market information to identify pre- engagement market factors associated with lawsuits against auditors. The Accounting Review, 66(3), 516–533.
Persons, O. 1995. Using financial statement data to identify factors associated with fraudulent financial reporting. Journal of Applied Business Research, 11(3), 38–46.
Rebeeca C. Wu. 1997. Neural Network Models: "Fonudantion and application to an audit decision problem Annals of Operations Research (75), 291-301.
Cherkassky V., & F. M . Mulier. 2007. Learning from Data: Concepts, Theory, and Methods, 2nd edition, John Wiley - IEEE Press.
Witten I. H., E. Frank. 2005. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, Morgan Kaufmann Publishers, 265-320.
Kohavi R. 1995. A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection, in Proc. of International Joint Conference on Artificial Intelligence.
Witten I. H., & E. Frank. 2005. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, Morgan Kaufmann Publishers, 265- 320.
Breiman L., J.H. Friedman, R.A. Olshen, & C.J. Stone. 1984. Classification and Regresssion Trees, Wadsworth, Belmont, 1984.
Quinlan J. R. 1996. Bagging, Boosting and C4.5, in Proc. of AAAI-96 Fourteenth national Conference on Artificial Intelligence, Portland, OR, AAAI Press, Menlo Park, CA.
Platt J. C. 1998. Sequential minimal optimization: A fast algorithm for training support vector machines, Technical Report MSR-TR-98-8, Microsoft Research.
Chang, C.C., & C.J. Lin. 2001. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
Maindonald J., & J. Braun. 2007. Data Analysis and Graphics Using R, 2nd Edition, Cambridge University Press, Cambridge.
Breiman L. 2001. Random Forests, Machine Learning, (45), 5–32.
