Skip Nav Destination
Close Modal
Update search
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Issue Section
Date
Availability
1-2 of 2
Keywords: anomaly detection
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Integrating Process Mining and Machine Learning for Advanced Internal Control Evaluation in Auditing
Journal:
Journal of Information Systems
Journal of Information Systems 1–21.
Published: 19 August 2024
..., control risk assessment, and anomaly detection. It utilizes process mining to uncover transactions that deviate from normative process flows, assesses the underlying associated controls with these deviations, and applies machine learning algorithms to supply a quantitative measure at a transactional level...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2014) 28 (1): 145–165.
Published: 01 June 2014
.... In this regard, this study proposes and tests three fraud detection models at different phases that are intended to detect anomalous wire transfers in transitory accounts of a major bank. The rest of the paper proceeds as follows. A literature review on anomaly detection in prior research is described...