You are on page 1of 5

ITI 220 [Section 09] [F15] [10/14/15] [Jeremy Gonzalo] [ICP Annotated Bibliography]

My IT professional client is Keith Lee, a Technology consultant for the Finance & Risk
department at Thomson-Reuters. Keiths information need is research to be done on utilizing
technology to minimize financial risk in regards to fraud, looking at the types of fraud and the
many different ways that financial institutions can fight financial crimes like fraud. For search
strategies, I basically got half of my sources from the Academic Search Premier using the
Boolean query fraud detection AND technology, and the other half on Google and Bing
using the search queries fraud detection and financial crime detection techniques, being sure
to grab reputable sources from banking websites, for example. I definitely can say that I
succeeded in successfully finding what I needed to in this exercise, in finding 10 reputable
sources to give to my IT sources, whilst fulfilling the set requirements.

Cao, L., Chen, J., Li, J., Ou, Y., & Wei, W. (2013). Effective detection of sophisticated online
banking fraud on extremely imbalanced data. World Wide Web, 16(4), 449-475. Retrieved
from Academic Search Premier Database
The authors Wei, Li, Cao, Ou, and Chen are all professors from the Advanced Analytics Institute
of the University of Technology Sydney in Sydney, Australia. The work is sponsored by the
Australian Research Council Discovery grant and Linkage grant. In this article, this group
provides a set of solutions and techniques to combat online fraud. They talk about a specific
algorithm that uses data mining techniques that distinguish fraudulent from genuine behavior,
which is tested on large-scale online banking data. It is later stated in the article that the proposed
system is actually better than what currently is used as a fraud detection system in banks.
This article may be two years old, but it gives a relatively balanced view (after all, it is proposing
the use of their system over the traditional one), provides a bibliography of sources at the end of
the work, and is published by a reputable journal, World Wide Web, which is, as stated in its
website, is a peer-reviewed journal. This is very relevant for the IT professionals information
need, because it discusses a new and efficient way to combat online fraud (in the financial field).

ITI 220 [Section 09] [F15] [10/14/15] [Jeremy Gonzalo] [ICP Annotated Bibliography]
Cela-Daz, F., Kern, D., Ming, Y., Nair, S., Sudjianto, A., & Zhang, A. (2010). Statistical
methods for fighting financial crimes. Technometrics, 52(1), 5-19. Retrieved from
Academic Search Premier Database
All of the authors excluding Ming Yuan are all reputable banking executives around North
Carolina, and Ming Yuan is an adjujnct professor in George Institute of Technologys Stewart
School of Industrial & Systems Engineering. This article in Taylor & Francis Groups
Technometrics journal, which is a reputable journal, published quarterly since 1959 by the
American Society for Quality and the American Statistical Association. In this article, the group
of authors provides information on fraud and money laundering and discusses the traditional
statistical techniques that were applied to combat these financial crimes as well as the more
recent techniques that are used for the same purpose.
This is a three-year-old article, but nonetheless provides a balanced, informative set of data, has a
bibliography of sources at the end, and is published by a long standing and reputable scholarly
journal, Technometrics. This is very relevant for my IT professionals information need because
it discusses and gives information on the types of financial crimes, including fraud, that his
department is tailored around, and shows some of the new and traditional ways to combat these
crimes.
Danni, L. (2014, August 5). Three Common Types of Banking Fraud and Ways to Protect
Yourself. Square 1 Bank. Retrieved from https://www.square1bank.com/three-commontypes-of-banking-fraud-and-ways-to-protect-yourself
Author Laura Danni holds a BS in International Business from the State University Of New
York, Buffalo, and is a part of the Global Treasury Management team at Square 1 Bank. This
article, written on Square 1 Banks website, is a very basic article that details ways one can fall
victim to bank fraud and details the ways a simple consumer can avoid banker fraud.
This article is a fairly new article and gives very solid, basic information. This does not have a
bibliography in the end, but is, as stated on their website, a leading provider of banking and
financial services to entrepreneurs and their investors in technology and life science industries,
so it can be inferred that they are a reputable organization. This may not have any technological
information on how to detect fraud, but it is still good information nonetheless, since it does, in
fact, show the ways one can fall victim to bank fraud and give general consumer tips to avoid it,
so in that sense, it is relevant to my IT professionals information need.
Government Finance Officers Association (n.d.) Bank account fraud prevention. Retrieved from
http://www.gfoa.org/bank-account-fraud-prevention
This article does not have an author, but is on the GFOA (Government Finance Officers
Association) website. This article details the ways and measures to prevent bank account fraud,
but also details some of the tools that the banking industry developed to combat such fraud from
happening.

ITI 220 [Section 09] [F15] [10/14/15] [Jeremy Gonzalo] [ICP Annotated Bibliography]
Now the website itself is not exactly a journal article like most of mine, and there isnt even a
date on it. Also, its important to note that it isnt a .gov, yet a .org, so it may be a little sketchy.
However, this is a longstanding organization thats been around since 1906 that represents public
finance officials in the US and Canada. This article gives fairly unbiased information and being a
long standing body that specializes in things such as consulting adds to its credibility. This
definitely has relevance to my professionals information need since it provides information
about fraud prevention tools used by the banking industry and recommended ways that
governments would use to protect themselves from fraud.
Joyner, E. (2011). Detecting and preventing fraud in financial institutions. Enterprisewide Fraud
Management. Retrieved from
http://support.sas.com/resources/papers/proceedings11/029-2011.pdf
This article, written by Ellen Joyner from the SAS Institution Inc. in Cary, North Carolina,
details the ways financial institutions would detect and prevent fraud. There are a few scenarios
presented in the article, with data and the many challenges presented by financial crime, and in
its conclusion, details a best-practice fraud management approach to combat fraud.
This article has no bibliography, but we are provided with multiple footnotes throughout the
article, so sources are still covered either way. This article, like many of my other ones from the
web, may seem to be outdated, but the information still holds true and is still important to this
day. This is very relevant to my clients information need, as the information provided gives a
different approach to combat fraud.
Kirkos, E., Manolopoulos, Y., & Spathis, C. (2007). Data mining techniques for the detection of
fraudulent financial statements. Expert Systems With Applications, 32(4), 995-1003.
Retrieved from Academic Search Premier Database
Each of the authors comes from a different department, Kirkos from the Department of
Accounting, Spathis from the Department of Economics (Division of Business Administration),
and Manolopoulos from the Department of Informatics, with Kirkos from the Technological
Educational Institution of Thessaloniki and the remaining two from the Aristotle University of
Thessaloniki in Greece. This article, written in Elseviers Expert Systems with Applications
journal, looks into data mining classification techniques that would detect firms or individuals
that issue what is called fraudulent financial statements. The study discusses the use of three
different networks and their usage in the identification of fraudulent financial statements.
This is actually a fairly old article, but gives information that is still relevant today. There is a
bibliography in the end of the article, and is written in a reputable journal. The concept of Data
mining to fish out fraudulent data is very important and definitely relevant to my clients
information need. Any sort of technique to help detect fraud is very important and relevant to
that information need.
Lai, W., & Shenggang, Y. (2010). Detecting money laundering using filtering techniques: a
multiple-criteria index. Journal Of Economic Policy Reform, 13(2), 159-178. Retrieved
from Academic Search Premier Database

ITI 220 [Section 09] [F15] [10/14/15] [Jeremy Gonzalo] [ICP Annotated Bibliography]

Shenggang Yang and Lai Wei are both from the College of Finance in Hunan University, located
in Changsha, China. This article, written in the Journal of Economic Policy Reform, talks
extensively about the financial crime known as money laundering, and talks about an approach
to detect money laundering, using three different detection measures. They find out then that
their index successfully discovered possible fraud in the data they inputted.
This is also not exactly the newest article; with it being published in June 2010. However, I can
confidently say that this set of data does not seem to show any bias. It shows a good, informative
group of data, and Im provided with a bibliography towards the end of the article to show any
sort of research done on the subject. This is also very relevant to my IT clients information need,
since money laundering, along with fraud, is a fairly prevalent crime in the financial sector that
needs to be addressed. This gives good information that would definitely help formulate this
research to be done on combatting financial crime with technology.
Millar, P. (2010, August 16). Tips and techniques for detecting and preventing fraud. Corporate
Compliance Insights. Retrieved from http://corporatecomplianceinsights.com/7-stepspreventing-detecting-fraud/
Peter Millar is a featured author for Corporate Compliance Insights as well as the Director of
Technology Application at ACL. This article, written for Corporate Compliance Insights, gives
tips to businesses and professionals to guard themselves and set up their own measures to
prevent fraud. This also lists frauds and ways to discover these frauds.
The authors credibility is in his job title, with experience in the evolution of analytic solutions
for audit departments in industry and government. The date, although is 5 years old, doesnt
matter as much since this article mainly talks about a topic that is fairly static and has importance
up to this date. This is another article that shows its relevance in listing different types of frauds
and how institutions discover them, while providing tips on how to guard themselves from fraud.
Olszewski, D. (2014). Fraud detection using self-organizing map visualizing the user profiles.
Knowledge-Based Systems, 70, 324-334. Retrieved from Academic Search Premier
Database
Dominik Olszewski is part of the faculty of electrical engineering in the Warsaw University of
technology in Poland. This article was written in the Knowledge-Based Systems journal, and
talks about a fraud detection method, centered around a visualization technique called the SelfOrganizing Map. This article talks about this Self-Organizing Map and it is found out that this
proposed approach to detecting fraud is effective.
This is a fairly new article, published and made available on July 2014. It is a very interesting
article with good data and unbiased, balanced writing, with a lot of good examples and visual
cues to help understand the data. There is a reference list at the end of the paper. This is
definitely relevant to my IT Clients information need, since it gives a new approach and concept
in fighting fraud with technology in this day and age.

ITI 220 [Section 09] [F15] [10/14/15] [Jeremy Gonzalo] [ICP Annotated Bibliography]
Winfrey, G. (2014, July 29). How to detect fraud using data analysis (infographic). Retrieved
from http://www.inc.com/graham-winfrey/how-to-detect-fraud-using-data-analysis.html
This article, written by Graham Winfrey, who used to write for reputable businesses Business
Insider and MSNBC, is an infographic that explains what fraud does to the economy and other
costs of fraud. This also explains the most effective data analysis techniques used to detect fraud,
including visualization, outlier detection, continuous monitoring, and anomaly detection.
This article is very recent. It is the only source that I have that isnt completely an article, but
rather, an infographic. Sources are provided at the end of the infographic, although not formally,
but still gives a lot of good examples and very simple visuals to help the reader understand the
material. This is definitely relevant to my IT Clients information need, with it showing the data
analytic techniques people and companies use to detect fraud.

You might also like