29 research outputs found

    ์†Œ์…œ ๋„คํŠธ์›Œํฌ์™€ ์ด์ปค๋จธ์Šค ํ”Œ๋žซํผ์—์„œ์˜ ์ž ์žฌ ๋„คํŠธ์›Œํฌ ๋งˆ์ด๋‹

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2023. 2. ๊ถŒํƒœ๊ฒฝ.์›น ๊ธฐ๋ฐ˜ ์„œ๋น„์Šค์˜ ํญ๋ฐœ์ ์ธ ๋ฐœ๋‹ฌ๋กœ ์‚ฌ์šฉ์ž๋“ค์€ ์˜จ๋ผ์ธ ์ƒ์—์„œ ํญ๋„“๊ฒŒ ์—ฐ๊ฒฐ๋˜๊ณ  ์žˆ๋‹ค. ์˜จ๋ผ์ธ ํ”Œ๋žซํผ ์ƒ์—์„œ, ์‚ฌ์šฉ์ž๋“ค์€ ์„œ๋กœ์—๊ฒŒ ์˜ํ–ฅ์„ ์ฃผ๊ณ ๋ฐ›์œผ๋ฉฐ ์˜์‚ฌ ๊ฒฐ์ •์— ๊ทธ๋“ค์˜ ๊ฒฝํ—˜๊ณผ ์˜๊ฒฌ์„ ๋ฐ˜์˜ํ•˜๋Š” ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€ํ‘œ์ ์ธ ์˜จ๋ผ์ธ ํ”Œ๋žซํผ์ธ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค์™€ ์ด์ปค๋จธ์Šค ํ”Œ๋žซํผ์—์„œ์˜ ์‚ฌ์šฉ์ž ํ–‰๋™์— ๋Œ€ํ•ด ์—ฐ๊ตฌํ•˜์˜€๋‹ค. ์˜จ๋ผ์ธ ํ”Œ๋žซํผ์—์„œ์˜ ์‚ฌ์šฉ์ž ํ–‰๋™์€ ์‚ฌ์šฉ์ž์™€ ํ”Œ๋žซํผ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„์˜ ๊ด€๊ณ„๋กœ ํ‘œํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ๊ตฌ๋งค๋Š” ์‚ฌ์šฉ์ž์™€ ์ƒํ’ˆ ๊ฐ„์˜ ๊ด€๊ณ„๋กœ, ์‚ฌ์šฉ์ž์˜ ์ฒดํฌ์ธ์€ ์‚ฌ์šฉ์ž์™€ ์žฅ์†Œ ๊ฐ„์˜ ๊ด€๊ณ„๋กœ ๋‚˜ํƒ€๋‚ด์ง„๋‹ค. ์—ฌ๊ธฐ์— ํ–‰๋™์˜ ์‹œ๊ฐ„๊ณผ ๋ ˆ์ดํŒ…, ํƒœ๊ทธ ๋“ฑ์˜ ์ •๋ณด๊ฐ€ ํฌํ•จ๋  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋‘ ํ”Œ๋žซํผ์—์„œ ์ •์˜๋œ ์‚ฌ์šฉ์ž์˜ ํ–‰๋™ ๊ทธ๋ž˜ํ”„์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์ž ์žฌ ๋„คํŠธ์›Œํฌ๋ฅผ ํŒŒ์•…ํ•˜๋Š” ์—ฐ๊ตฌ๋ฅผ ์ œ์‹œํ•œ๋‹ค. ์œ„์น˜ ๊ธฐ๋ฐ˜์˜ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค์˜ ๊ฒฝ์šฐ ํŠน์ • ์žฅ์†Œ์— ๋ฐฉ๋ฌธํ•˜๋Š” ์ฒดํฌ์ธ ํ˜•์‹์œผ๋กœ ๋งŽ์€ ํฌ์ŠคํŠธ๊ฐ€ ๋งŒ๋“ค์–ด์ง€๋Š”๋ฐ, ์‚ฌ์šฉ์ž์˜ ์žฅ์†Œ ๋ฐฉ๋ฌธ์€ ์‚ฌ์šฉ์ž ๊ฐ„์— ์‚ฌ์ „์— ์กด์žฌํ•˜๋Š” ์นœ๊ตฌ ๊ด€๊ณ„์— ์˜ํ•ด ์˜ํ–ฅ์„ ํฌ๊ฒŒ ๋ฐ›๋Š”๋‹ค. ์‚ฌ์šฉ์ž ํ™œ๋™ ๋„คํŠธ์›Œํฌ์˜ ์ €๋ณ€์— ์ž ์žฌ๋œ ์‚ฌ์šฉ์ž ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ํŒŒ์•…ํ•˜๋Š” ๊ฒƒ์€ ํ™œ๋™ ์˜ˆ์ธก์— ๋„์›€์ด ๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ์œ„ํ•ด ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋น„์ง€๋„ํ•™์Šต ๊ธฐ๋ฐ˜์œผ๋กœ ํ™œ๋™ ๋„คํŠธ์›Œํฌ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž ๊ฐ„ ์‚ฌํšŒ์  ๊ด€๊ณ„๋ฅผ ์ถ”์ถœํ•˜๋Š” ์—ฐ๊ตฌ๋ฅผ ์ œ์•ˆํ•˜์˜€๋‹ค. ๊ธฐ์กด์— ์—ฐ๊ตฌ๋˜์—ˆ๋˜ ๋ฐฉ๋ฒ•๋“ค์€ ๋‘ ์‚ฌ์šฉ์ž๊ฐ€ ๋™์‹œ์— ๋ฐฉ๋ฌธํ•˜๋Š” ํ–‰์œ„์ธ co-visitation์„ ์ค‘์ ์ ์œผ๋กœ ๊ณ ๋ คํ•˜์—ฌ ์‚ฌ์šฉ์ž ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ์˜ˆ์ธกํ•˜๊ฑฐ๋‚˜, ๋„คํŠธ์›Œํฌ ์ž„๋ฒ ๋”ฉ ๋˜๋Š” ๊ทธ๋ž˜ํ”„ ์‹ ๊ฒฝ๋ง(GNN)์„ ์‚ฌ์šฉํ•˜์—ฌ ํ‘œํ˜„ ํ•™์Šต์„ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ์ ‘๊ทผ ๋ฐฉ์‹์€ ์ฃผ๊ธฐ์ ์ธ ๋ฐฉ๋ฌธ์ด๋‚˜ ์žฅ๊ฑฐ๋ฆฌ ์ด๋™ ๋“ฑ์œผ๋กœ ๋Œ€ํ‘œ๋˜๋Š” ์‚ฌ์šฉ์ž์˜ ํ–‰๋™ ํŒจํ„ด์„ ์ž˜ ํฌ์ฐฉํ•˜์ง€ ๋ชปํ•œ๋‹ค. ํ–‰๋™ ํŒจํ„ด์„ ๋” ์ž˜ ํ•™์Šตํ•˜๊ธฐ ์œ„ํ•ด, ANES๋Š” ์‚ฌ์šฉ์ž ์ปจํ…์ŠคํŠธ ๋‚ด์—์„œ ์‚ฌ์šฉ์ž์™€ ๊ด€์‹ฌ ์ง€์ (POI) ๊ฐ„์˜ ์ธก๋ฉด(Aspect) ์ง€ํ–ฅ ๊ด€๊ณ„๋ฅผ ํ•™์Šตํ•œ๋‹ค. ANES๋Š” User-POI ์ด๋ถ„ ๊ทธ๋ž˜ํ”„์˜ ๊ตฌ์กฐ์—์„œ ์‚ฌ์šฉ์ž์˜ ํ–‰๋™์„ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ์ธก๋ฉด์œผ๋กœ ๋‚˜๋ˆ„๊ณ , ๊ฐ๊ฐ์˜ ๊ด€๊ณ„๋ฅผ ๊ณ ๋ คํ•˜์—ฌ ํ–‰๋™ ํŒจํ„ด์„ ์ถ”์ถœํ•˜๋Š” ์ตœ์ดˆ์˜ ๋น„์ง€๋„ํ•™์Šต ๊ธฐ๋ฐ˜ ์ ‘๊ทผ ๋ฐฉ์‹์ด๋‹ค. ์‹ค์ œ LBSN ๋ฐ์ดํ„ฐ์—์„œ ์ˆ˜ํ–‰๋œ ๊ด‘๋ฒ”์œ„ํ•œ ์‹คํ—˜์—์„œ, ANES๋Š” ๊ธฐ์กด์— ์ œ์•ˆ๋˜์—ˆ๋˜ ๊ธฐ๋ฒ•๋“ค๋ณด๋‹ค ๋†’์€ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ค€๋‹ค. ์œ„์น˜ ๊ธฐ๋ฐ˜ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์™€๋Š” ๋‹ค๋ฅด๊ฒŒ, ์ด์ปค๋จธ์Šค์˜ ๋ฆฌ๋ทฐ ์‹œ์Šคํ…œ์—์„œ๋Š” ์‚ฌ์šฉ์ž๋“ค์ด ๋Šฅ๋™์ ์ธ ํŒ”๋กœ์šฐ/ํŒ”๋กœ์ž‰ ๋“ฑ์˜ ํ–‰์œ„๋ฅผ ์ˆ˜ํ–‰ํ•˜์ง€ ์•Š๊ณ ๋„ ํ”Œ๋žซํผ์— ์˜ํ•ด ์„œ๋กœ์˜ ์ •๋ณด๋ฅผ ์ฃผ๊ณ ๋ฐ›๊ณ  ์˜ํ–ฅ๋ ฅ์„ ํ–‰์‚ฌํ•˜๊ฒŒ ๋œ๋‹ค. ์ด์™€ ๊ฐ™์€ ์‚ฌ์šฉ์ž๋“ค์˜ ํ–‰๋™ ํŠน์„ฑ์€ ๋ฆฌ๋ทฐ ์ŠคํŒธ์— ์˜ํ•ด ์‰ฝ๊ฒŒ ์•…์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. ๋ฆฌ๋ทฐ ์ŠคํŒธ์€ ์‹ค์ œ ์‚ฌ์šฉ์ž์˜ ์˜๊ฒฌ์„ ์ˆจ๊ธฐ๊ณ  ํ‰์ ์„ ์กฐ์ž‘ํ•˜์—ฌ ์ž˜๋ชป๋œ ์ •๋ณด๋ฅผ ์ „๋‹ฌํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ์ด๋ฃจ์–ด์ง„๋‹ค. ๋‚˜๋Š” ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ์ž ๋ฆฌ๋ทฐ ๋ฐ์ดํ„ฐ์—์„œ ์‚ฌ์šฉ์ž ๊ฐ„ ์‚ฌ์ „ ๊ณต๋ชจ์„ฑ(Collusiveness)์˜ ๊ฐ€๋Šฅ์„ฑ์„ ์ฐพ๊ณ , ์ด๋ฅผ ์ŠคํŒธ ํƒ์ง€์— ํ™œ์šฉํ•œ ๋ฐฉ๋ฒ•์ธ SC-Com์„ ์ œ์•ˆํ•œ๋‹ค. SC-Com์€ ํ–‰๋™์˜ ๊ณต๋ชจ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž ๊ฐ„ ๊ณต๋ชจ ์ ์ˆ˜๋ฅผ ๊ณ„์‚ฐํ•˜๊ณ  ํ•ด๋‹น ์ ์ˆ˜๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ „์ฒด ์‚ฌ์šฉ์ž๋ฅผ ์œ ์‚ฌํ•œ ์‚ฌ์šฉ์ž๋“ค์˜ ์ปค๋ฎค๋‹ˆํ‹ฐ๋กœ ๋ถ„๋ฅ˜ํ•œ๋‹ค. ๊ทธ ํ›„ ์ŠคํŒธ ์œ ์ €์™€ ์ผ๋ฐ˜ ์œ ์ €๋ฅผ ๊ตฌ๋ณ„ํ•˜๋Š” ๋ฐ์— ์ค‘์š”ํ•œ ๊ทธ๋ž˜ํ”„ ๊ธฐ๋ฐ˜์˜ ํŠน์ง•์„ ์ถ”์ถœํ•˜์—ฌ ๊ฐ๋… ํ•™์Šต ๊ธฐ๋ฐ˜์˜ ๋ถ„๋ฅ˜๊ธฐ์˜ ์ž…๋ ฅ ๋ฐ์ดํ„ฐ๋กœ ํ™œ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. SC-Com์€ ๊ณต๋ชจ์„ฑ์„ ๊ฐ–๋Š” ์ŠคํŒธ ์œ ์ €์˜ ์ง‘ํ•ฉ์„ ํšจ๊ณผ์ ์œผ๋กœ ํƒ์ง€ํ•œ๋‹ค. ์‹ค์ œ ๋ฐ์ดํ„ฐ์…‹์„ ์ด์šฉํ•œ ์‹คํ—˜์—์„œ, SC-Com์€ ๊ธฐ์กด ๋…ผ๋ฌธ๋“ค ๋Œ€๋น„ ์ŠคํŒธ ํƒ์ง€์— ๋›ฐ์–ด๋‚œ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ฃผ์—ˆ๋‹ค. ์œ„ ๋…ผ๋ฌธ์—์„œ ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด ์—ฐ๊ตฌ๋œ ์•”์‹œ์  ์—ฐ๊ฒฐ๋ง ํƒ์ง€ ๋ชจ๋ธ์€ ๋ ˆ์ด๋ธ”์ด ์—†๋Š” ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด์„œ๋„ ์‚ฌ์ „์— ์—ฐ๊ฒฐ๋˜์—ˆ์„ ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์€ ์‚ฌ์šฉ์ž๋“ค์„ ์˜ˆ์ธกํ•˜๋ฏ€๋กœ, ์‹ค์‹œ๊ฐ„ ์œ„์น˜ ๋ฐ์ดํ„ฐ๋‚˜, ์•ฑ ์‚ฌ์šฉ ๋ฐ์ดํ„ฐ ๋“ฑ์˜ ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ์—์„œ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์œ ์šฉํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜์—ฌ ๊ด‘๊ณ  ์ถ”์ฒœ ์‹œ์Šคํ…œ์ด๋‚˜, ์•…์„ฑ ์œ ์ € ํƒ์ง€ ๋“ฑ์˜ ๋ถ„์•ผ์—์„œ ๊ธฐ์—ฌํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€ํ•œ๋‹ค.Following the exploding usage on online services, people are connected with each other more broadly and widely. In online platforms, people influence each other, and have tendency to reflect their opinions in decision-making. Social Network Services (SNSs) and E-commerce are typical example of online platforms. User behaviors in online platforms can be defined as relation between user and platform components. A user's purchase is a relationship between a user and a product, and a user's check-in is a relationship between a user and a place. Here, information such as action time, rating, tag, etc. may be included. In many studies, platform user behavior is represented in graph form. At this time, the elements constituting the nodes of the graph are composed of objects such as users and products and places within the platform, and the interaction between the platform elements and the user can be expressed as two nodes being connected. In this study, I present studies to identify potential networks that affect the user's behavior graph defined on the two platforms. In ANES, I focus on representation learning for social link inference based on user trajectory data. While traditional methods predict relations between users by considering hand-crafted features, recent studies first perform representation learning using network/node embedding or graph neural networks (GNNs) for downstream tasks such as node classification and link prediction. However, those approaches fail to capture behavioral patterns of individuals ingrained in periodical visits or long-distance movements. To better learn behavioral patterns, this paper proposes a novel scheme called ANES (Aspect-oriented Network Embedding for Social link inference). ANES learns aspect-oriented relations between users and Point-of-Interests (POIs) within their contexts. ANES is the first approach that extracts the complex behavioral pattern of users from both trajectory data and the structure of User-POI bipartite graphs. Extensive experiments on several real-world datasets show that ANES outperforms state-of-the-art baselines. In contrast to active social networks, people are connected to other users regardless of their intentions in some platforms, such as online shopping websites and restaurant review sites. They do not have any information about each other in advance, and they only have a common point which is that they have visited or have planned to visit same place or purchase a product. Interestingly, users have tendency to be influenced by the review data on their purchase intentions. Unfortunately, this instinct is easily exploited by opinion spammers. In SC-Com, I focus on opinion spam detection in online shopping services. In many cases, my decision-making process is closely related to online reviews. However, there have been threats of opinion spams by hired reviewers increasingly, which aim to mislead potential customers by hiding genuine consumers opinions. Opinion spams should be filed up collectively to falsify true information. Fortunately, I propose the way to spot the possibility to detect them from their collusiveness. In this paper, I propose SC-Com, an optimized collusive community detection framework. It constructs the graph of reviewers from the collusiveness of behavior and divides a graph by communities based on their mutual suspiciousness. After that, I extract community-based and temporal abnormality features which are critical to discriminate spammers from other genuine users. I show that my method detects collusive opinion spam reviewers effectively and precisely from their collective behavioral patterns. In the real-world dataset, my approach showed prominent performance while only considering primary data such as time and ratings. These implicit network inference models studied on various data in this thesis predicts users who are likely to be pre-connected to unlabeled data, so it is expected to contribute to areas such as advertising recommendation systems and malicious user detection by providing useful information.Chapter 1 Introduction 1 Chapter 2 Social link Inference in Location-based check-in data 5 2.1 Background 5 2.2 Related Work 12 2.3 Location-based Social Network Service Data 15 2.4 Aspect-wise Graph Decomposition 18 2.5 Aspect-wise Graph learning 19 2.6 Inferring Social Relation from User Representation 21 2.7 Performance Analysis 23 2.8 Discussion and Implications 26 2.9 Summary 34 Chapter 3 Detecting collusiveness from reviews in Online platforms and its application 35 3.1 Background 35 3.2 Related Work 39 3.3 Online Review Data 43 3.4 Collusive Graph Projection 44 3.5 Reviewer Community Detection 47 3.6 Review Community feature extraction and spammer detection 51 3.7 Performance Analysis 53 3.8 Discussion and Implications 55 3.9 Summary 62 Chapter 4 Conclusion 63๋ฐ•

    Spam Reviews Detection in the Time of COVID-19 Pandemic: Background, Definitions, Methods and Literature Analysis

    Get PDF
    This work has been partially funded by projects PID2020-113462RB-I00 (ANIMALICOS), granted by Ministerio Espanol de Economia y Competitividad; projects P18-RT-4830 and A-TIC-608-UGR20 granted by Junta de Andalucia, and project B-TIC-402-UGR18 (FEDER and Junta de Andalucia).During the recent COVID-19 pandemic, people were forced to stay at home to protect their own and othersโ€™ lives. As a result, remote technology is being considered more in all aspects of life. One important example of this is online reviews, where the number of reviews increased promptly in the last two years according to Statista and Rize reports. People started to depend more on these reviews as a result of the mandatory physical distance employed in all countries. With no one speaking to about products and services feedback. Reading and posting online reviews becomes an important part of discussion and decision-making, especially for individuals and organizations. However, the growth of online reviews usage also provoked an increase in spam reviews. Spam reviews can be identified as fraud, malicious and fake reviews written for the purpose of profit or publicity. A number of spam detection methods have been proposed to solve this problem. As part of this study, we outline the concepts and detection methods of spam reviews, along with their implications in the environment of online reviews. The study addresses all the spam reviews detection studies for the years 2020 and 2021. In other words, we analyze and examine all works presented during the COVID-19 situation. Then, highlight the differences between the works before and after the pandemic in terms of reviews behavior and research findings. Furthermore, nine different detection approaches have been classified in order to investigate their specific advantages, limitations, and ways to improve their performance. Additionally, a literature analysis, discussion, and future directions were also presented.Spanish Government PID2020-113462RB-I00Junta de Andalucia P18-RT-4830 A-TIC-608-UGR20 B-TIC-402-UGR18European Commission B-TIC-402-UGR1

    Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters

    Full text link
    Graph Neural Networks (GNNs) have been widely applied to fraud detection problems in recent years, revealing the suspiciousness of nodes by aggregating their neighborhood information via different relations. However, few prior works have noticed the camouflage behavior of fraudsters, which could hamper the performance of GNN-based fraud detectors during the aggregation process. In this paper, we introduce two types of camouflages based on recent empirical studies, i.e., the feature camouflage and the relation camouflage. Existing GNNs have not addressed these two camouflages, which results in their poor performance in fraud detection problems. Alternatively, we propose a new model named CAmouflage-REsistant GNN (CARE-GNN), to enhance the GNN aggregation process with three unique modules against camouflages. Concretely, we first devise a label-aware similarity measure to find informative neighboring nodes. Then, we leverage reinforcement learning (RL) to find the optimal amounts of neighbors to be selected. Finally, the selected neighbors across different relations are aggregated together. Comprehensive experiments on two real-world fraud datasets demonstrate the effectiveness of the RL algorithm. The proposed CARE-GNN also outperforms state-of-the-art GNNs and GNN-based fraud detectors. We integrate all GNN-based fraud detectors as an opensource toolbox: https://github.com/safe-graph/DGFraud. The CARE-GNN code and datasets are available at https://github.com/YingtongDou/CARE-GNN.Comment: Accepted by CIKM 202

    Public procurement fraud in Malaysia: A political economy approach

    Get PDF
    This study investigates the practice of public procurement fraud in Malaysia. The aim of this research is to understand the nature and extent of the persistence of procurement fraud in the Malaysian public sector. Fraud in public procurement results in large losses of public funds which are needed by the government for delivering public services in order to build public infrastructure and facilities for healthcare and education, poverty eradication, security, defense and economic growth. A primarily qualitative methodology is employed in this study using the political economy approach in order to understand this social phenomenon. First, documentary analysis helps identifying some possible factors for the existence of fraud in public procurement in Malaysia. Then, qualitative data from semi-structured interviews are obtained using the Snowball Sampling Method (SSM). The interviews with 40 stakeholders (regulators, professionals, politicians, academics and media actors) reveal their โ€žhiddenโ€Ÿ voices so as to understand public procurement fraud in Malaysia. Nevertheless, this study does not aim to make generalizations and reach concrete conclusions about this issue, but instead seeks to understand why public procurement fraud persists in Malaysia through an analysis of the subjective narratives of the stakeholders. This research identifies several possible factors explaining why fraud in Malaysian public procurement continues to exist: (1) the prevailing power of political and economic forces, (2) complexities in the check and balance system, (3) deficiencies in procurement practices, (4) constraints on the civil servants, and (5) characteristics of the Malaysian society. The findings contribute to the body of knowledge by focusing on an unexplored area of the institutional arrangements between the state and businesses in Malaysia. The institutional arrangements between state and private sector appear to be legitimate, but they have the potential to conceal fraudulent practices, thus making fraud possible. Given the sensitive nature of the subject matter of this research and the fact that fraud by its nature is often concealed, it is possible that the findings have only revealed the โ€žtip of the icebergโ€Ÿ of public procurement fraud in Malaysia

    Delivering the recommendations of the Fraud Review 2006 and the paradox of police leadership

    Get PDF
    The purpose of this context statement is to investigate those factors which either contributed towards or impeded delivery of key recommendations from the Fraud Review, Attorney General (2006). These public works comprise three independent but intrinsically linked projects; the National Fraud Reporting Centre (NFRC), National Fraud Intelligence Bureau (NFIB) and the Economic Crime Academy (ECA). Critical analysis shows how the success of each project influenced and contributed directly to the next project. Examination is made of how, without vision and the continuity of leadership, these public works would either not exist today or would have failed to be as successful as they are. Reflection upon this, together with analyses of individual and organisational leadership styles, stimulated two unavoidable and fundamental questions to be raised: What does the Police Service now stand for? Is the current model of police leadership fit for purpose? Critical analysis of the role of police leadership in the delivery of these public works led to a further, specific question: Is the police response to fraud appropriate? This is because police responses to fraud often appear to be in conflict with Peelian Principles, ACPO (2012) and are more biased towards serving the criminal justice system rather than delivering social justice through interventions that are morally and ethically grounded. On commencement of this context statement the intention was for it to be read by like-minded leaders and visionaries, those who do not fit the norm or stereotype of a typical police manager; as the context statement evolved so too has the intended readership. Throughout reflective assessment and consideration of police leadership and todayโ€™s performance culture, it became increasingly apparent that this subject should be core reading for police leaders of the future. However, on completion of the context statement, it is apparent that readership audience should extend beyond the Police Service and the policy makers within government and the Ministry of Justice. The real audience should be the public we serve, those with whose consent we police. Therefore, it seems logical that public should be the ultimate critical assessors of this contribution, together with the effectiveness and appropriateness of the current and ongoing culture of police leadership and the response to fraud

    Managerโ€™s and citizenโ€™s perspective of positive and negative risks for small probabilities

    Get PDF
    So far โ€žriskโ€Ÿ has been mostly defined as the expected value of a loss, mathematically PL, being P the probability of an adverse event and L the loss incurred as a consequence of the event. The so called risk matrix is based on this definition. Also for favorable events one usually refers to the expected gain PG, being G the gain incurred as a consequence of the positive event. These โ€œmeasuresโ€ are generally violated in practice. The case of insurances (on the side of losses, negative risk) and the case of lotteries (on the side of gains, positive risk) are the most obvious. In these cases a single person is available to pay a higher price than that stated by the mathematical expected value, according to (more or less theoretically justified) measures. The higher the risk, the higher the unfair accepted price. The definition of risk as expected value is justified in a long term โ€œmanagerโ€Ÿsโ€ perspective, in which it is conceivable to distribute the effects of an adverse event on a large number of subjects or a large number of recurrences. In other words, this definition is mostly justified on frequentist terms. Moreover, according to this definition, in two extreme situations (high-probability/low-consequence and low-probability/high-consequence), the estimated risk is low. This logic is against the principles of sustainability and continuous improvement, which should impose instead both a continuous search for lower probabilities of adverse events (higher and higher reliability) and a continuous search for lower impact of adverse events (in accordance with the fail-safe principle). In this work a different definition of risk is proposed, which stems from the idea of safeguard: (1Risk)=(1P)(1L). According to this definition, the risk levels can be considered low only when both the probability of the adverse event and the loss are small. Such perspective, in which the calculation of safeguard is privileged to the calculation of risk, would possibly avoid exposing the Society to catastrophic consequences, sometimes due to wrong or oversimplified use of probabilistic models. Therefore, it can be seen as the citizenโ€Ÿs perspective to the definition of risk
    corecore