政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/54555
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51576010      Online Users : 841
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大典藏 > College of Commerce > Department of MIS > Theses >  Item 140.119/54555
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/54555


    Title: 適用於財務舞弊偵測之決策支援系統的對偶方法
    A dual approach for decision support in financial fraud detection
    Authors: 黃馨瑩
    Huang, Shin Ying
    Contributors: 蔡瑞煌
    Tsaih, Rua Huan
    黃馨瑩
    Huang, Shin Ying
    Keywords: 增長層級式自我組織映射網路
    非監督式類神經網路
    分類
    財務舞弊偵測
    財務報表舞弊
    Growing Hierarchical Self-Organizing Map
    Unsupervised Neural Networks
    Classification
    Financial Fraud Detection
    Fraudulent Financial Reporting
    Date: 2011
    Issue Date: 2012-10-30 11:21:09 (UTC+8)
    Abstract: 增長層級式自我組織映射網路(GHSOM)屬於一種非監督式類神經網路,為自我組織映射網路(SOM)的延伸,擅長於對樣本分群,以輔助分析樣本族群裡的共同特徵,並且可以透過族群間存在的空間關係假設來建立分類器,進而辨別出異常的資料。
    因此本研究提出一個創新的對偶方法(即為一個建立決策支援系統架構的方法)分別對舞弊與非舞弊樣本分群,首先兩類別之群組會被配對,即辨識某一特定無弊群體的非舞弊群體對照組,針對這些配對族群,套用基於不同空間假設所設立的分類規則以檢測舞弊與非舞弊群體中是否有存在某種程度的空間關係,此外並對於舞弊樣本的分群結果加入特徵萃取機制。分類績效最好的分類規則會被用來偵測受測樣本是否有舞弊的嫌疑,萃取機制的結果則會用來標示有舞弊嫌疑之受測樣本的舞弊行為特徵以及相關的輸入變數,以做為後續的決策輔助。
    更明確地說,本研究分別透過非舞弊樣本與舞弊樣本建立一個非舞弊GHSOM樹以及舞弊GHSOM樹,且針對每一對GHSOM群組建立分類規則,其相應的非舞弊/舞弊為中心規則會適應性地依循決策者的風險偏好最佳化調整規則界線,整體而言較優的規則會被決定為分類規則。非舞弊為中心的規則象徵絕大多數的舞弊樣本傾向分布於非舞弊樣本的周圍,而舞弊為中心的規則象徵絕大多數的非舞弊樣本傾向分布於舞弊樣本的周圍。
    此外本研究加入了一個特徵萃取機制來發掘舞弊樣本分群結果中各群組之樣本資料的共同特質,其包含輸入變數的特徵以及舞弊行為模式,這些資訊將能輔助決策者(如資本提供者)評估受測樣本的誠實性,輔助決策者從分析結果裡做出更進一步的分析來達到審慎的信用決策。
    本研究將所提出的方法套用至財報舞弊領域(屬於財務舞弊偵測的子領域)進行實證,實驗結果證實樣本之間存在特定的空間關係,且相較於其他方法如SVM、SOM+LDA和GHSOM+LDA皆具有更佳的分類績效。因此顯示本研究所提出的機制可輔助驗證財務相關數據的可靠性。此外,根據SOM的特質,即任何受測樣本歸類到某特定族群時,該族群訓練樣本的舞弊行為特徵將可以代表此受測樣本的特徵推論。這樣的原則可以用來協助判斷受測樣本的可靠性,並可供持續累積成一個舞弊知識庫,做為進一步分析以及制定相關信用決策的參考。本研究所提出之基於對偶方法的決策支援系統架構可以被套用到其他使用財務數據為資料來源的財務舞弊偵測情境中,作為輔助決策的基礎。
    The Growing Hierarchical Self-Organizing Map (GHSOM) is extended from the Self-Organizing Map (SOM). The GHSOM’s unsupervised learning nature such as the adaptive group size as well as the hierarchy structure renders its availability to discover the statistical salient features from the clustered groups, and could be used to set up a classifier for distinguishing abnormal data from regular ones based on spatial relationships between them.
    Therefore, this study utilizes the advantage of the GHSOM and pioneers a novel dual approach (i.e., a proposal of a DSS architecture) with two GHSOMs, which starts from identifying the counterparts within the clustered groups. Then, the classification rules are formed based on a certain spatial hypothesis, and a feature extraction mechanism is applied to extract features from the fraud clustered groups. The dominant classification rule is adapted to identify suspected samples, and the results of feature extraction mechanism are used to pinpoint their relevant input variables and potential fraud activities for further decision aid.
    Specifically, for the financial fraud detection (FFD) domain, a non-fraud (fraud) GHSOM tree is constructed via clustering the non-fraud (fraud) samples, and a non-fraud-central (fraud-central) rule is then tuned via inputting all the training samples to determine the optimal discrimination boundary within each leaf node of the non-fraud (fraud) GHSOM tree. The optimization renders an adjustable and effective rule for classifying fraud and non-fraud samples. Following the implementation of the DSS architecture based on the proposed dual approach, the decision makers can objectively set their weightings of type I and type II errors. The classification rule that dominates another is adopted for analyzing samples. The dominance of the non-fraud-central rule leads to an implication that most of fraud samples cluster around the non-fraud counterpart, meanwhile the dominance of fraud-central rule leads to an implication that most of non-fraud samples cluster around the fraud counterpart.
    Besides, a feature extraction mechanism is developed to uncover the regularity of input variables and fraud categories based on the training samples of each leaf node of a fraud GHSOM tree. The feature extraction mechanism involves extracting the variable features and fraud patterns to explore the characteristics of fraud samples within the same leaf node. Thus can help decision makers such as the capital providers evaluate the integrity of the investigated samples, and facilitate further analysis to reach prudent credit decisions.
    The experimental results of detecting fraudulent financial reporting (FFR), a sub-field of FFD, confirm the spatial relationship among fraud and non-fraud samples. The outcomes given by the implemented DSS architecture based on the proposed dual approach have better classification performance than the SVM, SOM+LDA, GHSOM+LDA, SOM, BPNN and DT methods, and therefore show its applicability to evaluate the reliability of the financial numbers based decisions. Besides, following the SOM theories, the extracted relevant input variables and the fraud categories from the GHSOM are applicable to all samples classified into the same leaf nodes. This principle makes that the extracted pre-warning signal can be applied to assess the reliability of the investigated samples and to form a knowledge base for further analysis to reach a prudent decision. The DSS architecture based on the proposed dual approach could be applied to other FFD scenarios that rely on financial numbers as a basis for decision making.
    Reference: Aas, K., and Eikvil, L. (1999). Text categorization: A survey, Technical Report, 941, Norwegian Computing Center.
    Agyemang, M., Barker, K., and Alhajj, R. (2006). A comprehensive survey of numeric and symbolic outlier mining techniques, Intelligent Data Analysis, 10(6), 521–538.
    Altman, E.I. (1968). Financial ratios, discriminant analysis and the prediction of corporate bankruptcy, Journal of Finance, 23(4), 589–609.
    American Institute of Certified Public Accountants (AICPA) (2002). Statement on Auditing Standards No. 99: Consideration of Fraud in a Financial Statement Audit [Electronic Version]. http://www.aicpa.org/download/members/div/auditstd/AU-00316.PDF.
    Antonio, S.A., David, M.G., Emilio, S.O. Alberto, P., Rafael, M.B., and Antonio, S. L. (2008). Web mining based on Growing Hierarchical Self-Organizing Maps: Analysis of a real citizen web portal, Expert Systems with Applications, 34(4), 2988–2994.
    Association of Certified Fraud Examiners (ACFE) (1998). 1998 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.
    Association of Certified Fraud Examiners (ACFE). (2008). 2008 Report to the nation on occupational fraud and abuse, ACFE, Austin, TX.
    Basens, B., Setiono, B., Mues, C., and Vanthienen, J. (2003). Using neural network rule extraction and decision tables for credit-risk evaluation, Management Science, (49:3), 312–319.
    Beasley, M.S., Carcello, J.V., and Hermanson, D.R. (1999). Fraudulent financial reporting: 1987–1997: An analysis of U.S. public companies, COSO, New York.
    Bell, T. B., and Carcello, J. V. (2000). A decision aid for assessing the likelihood of fraudulent financial reporting, Auditing: A Journal of Practice & Theor, (19:1), 169–184.
    Bond, C. F., and DePaulo, B. M. (2006). Accuracy of deception judgments, Personality and Social Psychology Review, 10(3), 214–234.
    Boser, B. E., Guyon, I., and Vapnik, V. (1992). A training algorithm for optimal margin classifiers, Proceedings of the Fifth Annual Workshop on Computational Learning Theory, ACM Press, 144–152.
    Budayan, C. (2008). Strategic group analysis: Strategic perspective, differentiation and performance in construction, Doctoral dissertation, Middle East Technical University.
    Budayan, C., Dikmen, I., and Birgonul, M. T. (2009). Comparing the performance of traditional cluster analysis, self-organizing maps and fuzzy C-means method for strategic grouping, Expert Systems with Applications, 36(9), 11772–11781.
    Canbas, S., Cabuk, A., and Kilic, S.B. (2005). Prediction of commercial bank failure via multivariate statistical analysis of financial structures: The Turkish case, European Journal of Operational Research, 166, 528–546.
    Carlos, S. C. (1996). Self organizing neural networks for financial diagnosis, Decision Support System, 17, 227–2386.
    Claessens, S., Djankov, S., and Lang, L. H. P. (2000). The separation of ownership and control in East Asian Corporations, Journal of Financial Economics, 58(1-2), 81–112.
    Cortes, C., and Vapnik, V. (1995). Support-vector network, Machine Learning, 20, 273–297.
    Daskalaki, S., Kopanas, I., Goudara, M., and Avouris, N. (2003). Data mining for decision support on customer insolvency in telecommunications business, European Journal of Operational Research, 145, 239–255.
    Dechow, P. M., Ge, W., Larson, C. R., Sloan, R. G., and Investors, B. G. (2007). Predicting material accounting manipulations, AAA 2007 Financial Accounting and Reporting Section (FARS) [Electronic Version]. http://ssrn.com/abstract=997483.
    Dechow, P.M., Sloan, R.G., and Sweeney, A.P. (1996). Cause and consequences of earnings manipulation: an analysis of firms subject to enforcement actions by the SEC," Contemporary Accounting Research, 13(1), 1–36.
    Desai, V. S., Crook, J. N., and Overstreet, J. (1996). A comparison of neural networks and linear scoring models in the credit union environment, European Journal of Operational Research, 95, 24–37.
    Dittenbach, M., Merkl, D., and Rauber, A. (2000). The Growing hierarchical self-organizing map, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks- IJCNN 2000.
    Dittenbach, M., Rauber, A., and Merkl, D. (2002). Uncovering hierarchical structure in data using the growing hierarchical self-organizing map, Neurocomputing, 48(1-4), 199–216.
    Eklund, T. (2002). Assessing the feasibility of self organizing maps for data mining financial information, ECIS 2002, Gdansk, Poland.
    Elliot, R., and Willingham, J. (1980). Management fraud: detection and deterrence, Petrocelli, New York, NY.
    Fanning, K.M., and Cogger, K.O. (1998). Neural network detection of management fraud using published financial data, International Journal of Intelligent Systems in Accounting, Finance & Management, 7(1), 21–41.
    Farber, D. B. (2005). Restoring trust after fraud: does corporate governance matter?, Accounting Review, 80(2), 539–561.
    Fukunaga, K. (1990). Introduction to Statistical Pattern Recognition, 2nd Edition, Academic Press, London.
    Granzow, M., Berrar, D., Dubitzky, W., Schuster, A., Azuaje, F. J., and Eils, R. (2001). Tumor classification by gene expression profiling: Comparison and validation of five clustering methods, SIGBIO Newsletter, 21(1), 16–22.
    Green, P., and Choi, J. H. (1997). Assessing the risk of management fraud through neural network technology, Auditing: A Journal of Practice & Theory, 16(1), 14–28.
    Guo, Y., Hu, J., and Peng, Y. (2011). Research on CBR system based on data mining, Applied Soft Computing, 11(8), 5006–5014.
    Hoogs, B., Kiehl, T., Lacomb, C., and Senturk, D. (2007). A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud, Intelligent Systems in Accounting Finance and Management, (15:1/2), 41–56.
    Hsu, K. Y. (2008). Exploring financial reporting fraud, M.A. Thesis, National Chengchi University, Department of Management Information System.
    Hsu, S. H., Hsieh, J. P. A., Chih, T. C., and Hsu, K. C. (2009). A two-stage architecture for stock price forecasting by integrating self-organizing map and support vector regression, Expert Systems with Applications, 36(4), 7947–7951.
    Hsu, C. W., Chang, C. C., and Lin, C. J. (2010). A practical guide to support vector classification, Technical Report, National Taiwan University.
    Huang, S. Y., Tsaih, R. H., and Lin, W. Y. (2012). Unsupervised Neural Networks Approach for Understanding Fraudulent Financial Reporting, Industrial Management & Data Systems, 112(2), 224–244.
    Huang, S. Y., and Tsaih, R. H. (2012). The Prediction Approach with Growing Hierarchical Self-Organizing Map, Proceedings of the International Joint Conference on Neural Networks (IJCNN), 838-844.
    Huang, S. Y., and Tsaih, R. H., Fang, Y. (2012). The Dual Approach for Decision Making, The 2012 Decision Sciences Institute Annual Meeting (DSI), San Francisco, USA.
    Humpherys, S. L., Moffitt, K. C., Burns, M. B., Burgoon, J. K., and Felix, W. F. (2010). Identification of fraudulent financial statements using linguistic credibility analysis, Decision Support Systems, 50(3), 585–594.
    Jain, A., Murty, M., and Flynn, P. (1999). Data clustering: a review. ACM Computing Surveys, 31(3), 264–323.
    Jiang, J. (1999). Image compression with neural networks - a survey, Signal Process Image Communication, 14(9-7), 737–760.
    Jolliffe, I. T. (1986). Principal Component Analysis, Springer, New York.
    Jolliffe, I. T. (2002). Principal Component Analysis, second edition, New York: Springer-Verlag New York, Inc.
    Kaiser, H. F. (1960). The application of electronic computers to factor analysis, Educational and Psychological Measurement, 20, 141–151.
    Khan A.U., Sharma, T. K., and Sharma, S. (2009). Classification of Stocks Using Self Organizing Map, International Journal of Soft Computing Applications, 4, 19–24.
    Klein M, and Methlie, L. B. (1995). Knowledge-Based Decision Support Systems with Applications in Business, 2nd edn, Wiley.
    Kirkos, E., Spathis, C., and Manolopoulos, Y. (2007). Data mining techniques for the detection of fraudulent financial statements, Expert Systems with Applications, 32(4), 995–1003.
    Kohonen, T. (1982). Self-organized formation of topologically correct feature maps, Biological Cybernetics, (43), 59–69.
    Kohonen, T. (1989), Self Organization and Associative Memory, 3rd ed. Springer, Berlin.
    Kohonen, T. (1995), Self-Organizing Maps, Springer, Berlin.
    KPMG Peat Marwick (1998), Fraud Survey, KPMG peat Marwick, Montvale, NJ.
    La Porta, R., Lopez-de-Silanes, F., Shleifer, A., and Vishny, R. (1999). Corporate ownership around the world, Journal of Finance, 54(2), 471–517.
    Lee, G., T. K. Sung, and Chang, N. (1999). Dynamics of modeling in data mining: interpretive approach to bankruptcy prediction, Journal of Management Information Systems, 16, 63–85.
    Lee, T. S., Chiu, C. C., Chou, Y. C., and Lu, C. J. (2006). Mining the customer credit using classification and regression tree and multivariate adaptive regression splines, Computational Statistics & Data Analysis, 50, 1113–1130.
    Lee, T. S., and Yeh, Y. H. (2004). Corporate governance and financial distress: evidence from Taiwan, Corporate Governance: An International Review, 12(3), 378–388.
    Li, S. (2000). The development of a hybrid intelligent system for developing marketing strategy, Expert Systems with Applications, 27, 395–409.
    Liu, Y., Yeh, R. H. ,and He, R. (2006). Sea surface temperature patterns on the West Florida Shelf using the Growing Hierarchical Self-Organizing Maps, J. Atmos. Oceanic Technology, 23(2), 325–338.
    Loebbecke, J. K., Eining, M. M., and Willingham, J. J. (1989). Auditors’ experience with material irregularities: frequency, nature, and detectability, Auditing, 9(1), 1–28.
    Lu, C. J., and Wang, Y. W. (2010). Combining independent component analysis and growing hierarchical self-organizing maps with support vector regression in product demand forecasting, International Journal of Production Economics, 128(2), 603–613.
    Mangiameli, P., Chen, S. K., and West, D. (1996). A comparison of SOM neural network and hierarchical clustering methods, European Journal of Operational Research, 93(2), 402–417.
    Maron, M. E. (1961). Automatic indexing: An experimental inquiry, Journal of the ACM, 8, 404–417.
    Martín-Guerrero, J.D., Palomares, A., Balaguer-Ballester, E., Soria-Olivas, E., Gómez- Sanchis, J., and Soriano-Asensi, A. (2006). Studying the feasibility of a recommender in a citizen web portal based on user modeling and clustering algorithms, Expert Systems with Applications, 30(2), 299–312.
    Matsatsinis, N. F., Doumpos, M., and Zopounidis, C. (1997), Knowledge acquisition and representation for expert systems in the field of financial analysis, Expert Systems with Applications, 12, pp. 247–262.
    Mohanty, R. P., and Deshmukh, S. G. (1997). Evolution of an expert system for human resource planning in a petroleum company, Production Economics, 51, 251–261.
    Newman, D. P., Patterson, E. and Smith, R. (2001). The influence of potentially fraudulent reports on audit risk assessment and planning. Auditing: A Journal of Practice & Theory, 76(1), 59–80.
    Ngai, E. W, Yong, H. U., Wong, Y. H., Chen, Y., and Sun, X. (2010). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature, Decision Support Systems =, 50(3), 559–569.
    Nguyen M. N., Shi, D., and Quek, C. (2008). A nature inspired Ying-Yang approach for intelligent decision support in bank solvency analysis, Expert Systems with Applications, 34(4), 2576–2587
    Min, J. H., and Lee, Y. C. (2005). Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters, Expert Systems with Applications, 28, 603–614.
    Oja, E. (1992). Principal components, minor components, and linear neural networks, Neural Networks, 5(6), 927–935.
    Pagano, R. R. (2001). Understanding Statistics in the Behavioral Sciences, Sixth ed., Wadsworth/Thomson Learning, California.
    Quinlan, J. R. (1986), Induction of Decision Trees, Machine Learning, 1, 81–106.
    Quinlan, J. R. (1993), C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers.
    Quinlan, J. R. (1996), Bagging, boosting, and C4.5., Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96), pp. 725-730.
    Rasmussen, E. (1992), Information retrieval: data structures and algorithms. Prentice-Hall, Inc.
    Pearson, K. (1901), On Lines and Planes of Closest Fit to Systems of Points in Space, Philosophical Magazine, 2(6), 559–572.
    Persons, O. S. (1995), Using financial statement data to identify factors associated with fraudulent financial reporting, Journal of Applied Business Research, 11(3), 38–46.
    Pinson, S. (1992), A Multi-Expert Architecture for Credit Risk Assessment: The CREDEX system, IN: D.E. O`Lerary and P.R. Watkins (Eds), Expert Systems in finance, 37–64.
    Rauber, Merkl, A., D., and Dittenbach, M. (2002). The Growing hierarchical self-organizing map: exploratory analysis of high-dimensional data, IEEE Transactions on Neural Networks, 13(6), 1331–1341.
    Richardson, A. J., Risien, C., and Shillington, F. A. (2003). Using self organizing maps to identify patterns in satellite imagery, Prog. Oceanogr, 59, 223–239.
    Ringnér, M. (2008), What is principal component analysis?, Nature Biotechnology, 26, 303–304.
    Risien, C. M., Reason, C. J. C., Shillington, F. A., and Chelton, D. B. (2004). Variability in satellite winds over the Benguela upwelling system during 1999– 2000, J. Geophys. Res., 109, C03010, doi:10.1029/2003JC001880.
    Rumelhart, D. E., and Zipser, D. (1985). Feature discovery by competitive learning, Cognitive Science, 9, 75–112.
    Rumelhart, D. E., Hinton, G. E., and Williams, R. J. (1986). Learning representations by back-propagating errors, Nature, 323, 533–536.
    Schweighofer, E., Rauber, A., and Dittenbach, M. (2001). Automatic text representation classification and labeling in European law, International Conference on Artificial Intelligence and Law (ICAIL). ACM Press.
    Serrano, C. (1996). Self Organizing Neural Networks for Financial Diagnosis, Decision Support Systems, 17, 227–238.
    Shaw, P. J. A. (2003). Multivariate statistics for the Environmental Sciences, Hodder-Arnold.
    Shih, J. Y., Chang, Y. J., and Chen, W. H. (2008). Using GHSOM to construct legal maps for Taiwan’s securities and futures markets, Expert Systems with Applications, 34(2), 850–858.
    Shin, H. W., and Sohn, S. Y. (2004). Segmentation of stock trading customers according to potential value, Expert Systems with Applications, 27(1), 27–33.
    Shin, K. S., Lee, T. S., and Kim, H. J. (2005). An application of support vector machines in bankruptcy prediction model, Expert Systems with Applications, 28, 127–135.
    Shin, K. S., and Lee, Y. J. (2002). A genetic algorithm application in bankruptcy prediction modeling, Expert Systems with Applications, 23, 321–328.
    Stice, J. D. (1991). Using financial and market information to identify pre-engagement factors associated with lawsuits against auditors, Accounting Review, 66(3), 516–533.
    Summers, S. L., and Sweeney, J. T. (1998). Fraudulently misstated financial statements and insider trading: An empirical analysis, Accounting Review, 73(1), 131–146.
    Tabachnick, B. G., and Fidell, L. S. (2001). Using multivariate statistics, 4th Edition, Boston: Allyn & Bacon.
    Tsai, C. F. (2009). Feature selection in bankruptcy prediction, Knowledge-Based Systems, 22(2), 120–127.
    Tsaih, R. H., Lin, W. Y., and Huang, S. Y. (2009), Exploring Fraudulent Financial Reporting with GHSOM, Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), Lecture Notes in Computer Science, 5477, 31–41.
    Turban, E. (1993), Decision Support and Expert Systems: Management Support Systems, 3rd eds, Macmillan.
    Turk, M. A., and Pentland, A. P. (1991). Eigenfaces for recognition, Journal of Cognitive Neuroscience, 3(1), 71–86.
    Vapnik, V. N. (1995), The nature of statistical learning theory, Springer.
    Virdhagriswaran, S., and Dakin, G. (2006). Camouflaged fraud detection in domains with complex relationships, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, 941–947.
    Weisenborn, D., and Norris, D. (1997). Red flags of management fraud, National Public Accountant, 42(2), 29–33.
    Wen, W., Wang, W. K., and Wang, T. H. (2005). A hybrid knowledge-based decision support system for enterprise mergers and acquisitions, Expert Systems with Applications, 28, 569–582.
    Wen, W., Chen, Y. H., and Pao, H. H. (2008). A mobile knowledge management decision support system for automatically conducting an electronic business, Knowledge-Based Systems, 21(7), 540–550.
    Yeh, Y., T. Lee, and Woidtke, T. (2001). Family control and corporate governance: Evidence from Taiwan, International Review of Finance, 2(1-2), 21–48.
    Zhang, J., and Dai, D. (2009). An adaptive spatial clustering method for automatic brain MR image segmentation, Progress in Natural Science, 19(10), 1373–1382.
    Zopounidis, C., Doumpos, M., and Matsatsinis, N. F. (1997). On the use of knowledge-based decision support systems in financial management: a survey, Decision Support Systems, 20, 259–277.
    Description: 博士
    國立政治大學
    資訊管理研究所
    96356511
    100
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0096356511
    Data Type: thesis
    Appears in Collections:[Department of MIS] Theses

    Files in This Item:

    File SizeFormat
    651101.pdf1006KbAdobe PDF2792View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback