Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures

Author(s):  
Rubens Alexandre De Faria ◽  
Keiko V. Ono Fonseca ◽  
Bertoldo Schneider ◽  
Sing Kiong Nguang
2021 ◽  
Vol 11 (11) ◽  
pp. 4751
Author(s):  
Jorge-Félix Rodríguez-Quintero ◽  
Alexander Sánchez-Díaz ◽  
Leonel Iriarte-Navarro ◽  
Alejandro Maté ◽  
Manuel Marco-Such ◽  
...  

Among the knowledge areas in which process mining has had an impact, the audit domain is particularly striking. Traditionally, audits seek evidence in a data sample that allows making inferences about a population. Mistakes are usually committed when generalizing the results and anomalies; therefore, they appear in unprocessed sets; however, there are some efforts to address these limitations using process-mining-based approaches for fraud detection. To the best of our knowledge, no fraud audit method exists that combines process mining techniques and visual analytics to identify relevant patterns. This paper presents a fraud audit approach based on the combination of process mining techniques and visual analytics. The main advantages are: (i) a method is included that guides the use of the visual capabilities of process mining to detect fraud data patterns during an audit; (ii) the approach can be generalized to any business domain; (iii) well-known process mining techniques are used (dotted chart, trace alignment, fuzzy miner…). The techniques were selected by a group of experts and were extended to enable filtering for contextual analysis, to handle levels of process abstraction, and to facilitate implementation in the area of fraud audits. Based on the proposed approach, we developed a software solution that is currently being used in the financial sector as well as in the telecommunications and hospitality sectors. Finally, for demonstration purposes, we present a real hotel management use case in which we detected suspected fraud behaviors, thus validating the effectiveness of the approach.


2018 ◽  
Vol 7 (2) ◽  
pp. 144
Author(s):  
Arsia Rini ◽  
Heki Aprianto

Tempat pelayanan kesehatan bertujuan untuk memberikan pelayanan kesehatan kepada masyarakat melalui lembaga institusi pelayanan kesehatan. Masyarakat di Kota Palembang mendapatkan informasi tempat pelayanan kesehatan melalui informasi masyarakat sekitar, lembaga pelayanan kesehatan dan beberapa situs internet yang ditampilkan secara terpisah. Maka sebuah website geografis diperlukan untuk menampilkan tata letak lokasi pelayanan kesehatan dan informasi lengkap tentang pelayanan kesehatan di Kota Palembang. Penelitian ini bertujuan untuk membuat sebuah pemodelan website geografis tempat pelayanan kesehatan di Kota Palembang. Pemodelan yang digunakan berbasis object oriented dengan menerapkan use case diagram dan activity diagram.


ICIT Journal ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 50-60
Author(s):  
Ilamsyah Ilamsyah ◽  
Sri Rahayu ◽  
Dewi Lisnawati

Inventory adalah aktiva yang meliputi barang-barang milik perusahaan, instansi, bidang pendidikan dan lain-lain. PT Anugrah Distributor Indonesia merupakan instansi milik perusahaan teknologi informasi yang didalamnya terdapat bagian logistik. Logistik berfungsi untuk mengelola kegiatan transaksi pembelian dan pengeluaran barang. Pengelolaan tersebut masih memanfaatkan Ms Excel. Sistem ini memakan waktu lama dalam proses pengelolaan data dan tingkat keakuratannya belum maksimal. Untuk memperoleh keakuratan data, logistik membutuhkan suatu sistem yang efisien, efektif dan valid dalam mengelola kegiatan transaksi pembelian dan pengeluaran barang. Dengan demikian dalam penelitian ini peneliti melakukan pengembangan sistem logistik yang saling terintegrasi menggunakan Unified Modelling Language (UML) yang digambarkan dengan Use Case Diagram, Activity Diagram, Sequence Diagram dan Class Diagram dan menggunakan bahasa pemprogramman PHP (Hypertext Preprocessor). Hasil akhir dari penelitian ini adalah sistem informasi inventory stok barang yang sesuai dengan kebutuhan dan memudahkan user dalam menginput dan membuat laporan persediaan barang. Sistem ini dibuat agar proses inventory dapat terkendali dengan baik, menjadi efektif dan efisien. Kata kunci: Sistem inventory, UML, PHP, Sistem Informasi


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


Author(s):  
L. Ometto ◽  
S. Challapalli ◽  
M. Polo ◽  
G. Cestari ◽  
A. Villagrossi ◽  
...  

1976 ◽  
Vol 120 (11) ◽  
pp. 337 ◽  
Author(s):  
B.L. Gel'mont ◽  
V.I. Ivanov-Omskii ◽  
I.M. Tsidil'kovskii

Sign in / Sign up

Export Citation Format

Share Document