Skip to main content

Method for Implementation of Preventive Technological Tools for Control and Monitoring of Fraud and Corruption

  • 1094 Accesses

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1330)

Abstract

The purpose of this work is to present a method for the implementation of preventive technological tools like “The Fraud Explorer” for control and monitoring of fraud and corruption; The nature of this system is based on Donald Cressey’s fraud triangle and for this it uses a dictionary of words that are related to this type of wrongdoing; It is installed in each workstation silently in Windows or Linux and has a Linux server with an OpenVZ container that manages a dictionary of words and compares what users type in their working hours on the institution’s computers, in case of finding a match issues an alert that must be investigated and thus prevent illegal acts.

It is essential to resolve the gaps in the implementation of this tool, such as the legal regulations that allow this process to be carried out successfully without incurring problems of a violation of privacy, the way in which the entity should organize for the implementation and monitoring to which is presented a proposal in four phases in such a way that it provides solidity to carry out this process successfully.

Keywords

  • Fraud
  • Corruption
  • Anti-fraud tools
  • Control and monitoring
  • Fraud prevention

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-68285-9_46
  • Chapter length: 11 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-68285-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Fig. 1.

Source: Elaborated by authors.

Fig. 2.

References

  1. Cremer, G.: Corruption & Develoment Aid Confronting the Challenges, p. 169. LYNNE REINNER, Boulder (2008)

    Google Scholar 

  2. Transparency Internacional: Corruption Perceptions Index, 11 August 2019. https://www.transparency.org/research/cpi/overview. Accessed 11 Aug 2019

  3. Campos, J.E., Sanjay, P.: The Many Faces of Corruption: Tracking Vulnerabilities at the Sector Level, p. 484. The World Bank (2007)

    Google Scholar 

  4. Arellano Gault, D.: ¿Podemos reducir la corrupción en México? Límites y posibilidades de los instrumentos a nuestro acance, Segunda ed., N. C. Larios, Ed., cide, Centro de Investigación y Docencia Económicas, A.C., p. 230 (2018)

    Google Scholar 

  5. Solimano, Tanzi, V., Del Solar, F.: LAS TERMITAS DEL ESTADO Ensayos sobre corrupción, transparencia y desarrollo, Primera ed., Salesianos Impresores S.A., p. 144 (2008)

    Google Scholar 

  6. Coello, A., Martín Rodrigo, M., Bertrand, A., García, D.R., Josep, J.M., Tafalla, A., Acosta, X., Huertz de Lemps, J.L.M., Dieste, Salem Seña, J.F.: LA JUSTICIA ROBADA Corrupción, codícia y bien público en el mundo hispánico (siglos XVII-XX), Primera ed., Icaria Antrazyt, p. 319 (2018)

    Google Scholar 

  7. Corporación Latinobarómetro: Latinobarómetro (2018). https://www.latinobarometro.org/lat.jsp. Accessed 6 Feb 2020

  8. IDEA; NIMD; Instituto Clingendael, Briscoe, I., Perdomo, C., Burcher, C.U. (eds.): Redes Ilícitas y Política en América Latina, Trydells Tryckeri, p. 323 (2014)

    Google Scholar 

  9. Barr, A., Serra, D.: Corruption and culture: an experimental analysis. Public Econ. 94, 862–869 (2010)

    CrossRef  Google Scholar 

  10. Segunda Cohorte del Doctorado en Seguridad Facultad de Ciencias Jurídica y Sociales de la Escuela de Estudios de Postgrado de la Universidad de San Carlos de Guatemala, Seguridad de la Información: Revista de la Segunda Cohorte del Doctorado en Seguridad Estratégica, p. 376 (2014)

    Google Scholar 

  11. Arroyo Jácome, R.P., Roman Vasquez, A.F.: Análisis de los delitos informáticos por ataque y acceso no autorizado a sistemas electrónicos, tipificados en los artículos 232 y 234 del Código Orgánico Integral Penal en el Ecuador, Quito (2016)

    Google Scholar 

  12. Aya Palencia, D.S., Fernández Gómez, N.A.: Technological surveillance for the identification of lines of research over corruption. Estrategia Organizacional 9, 18 (2019)

    Google Scholar 

  13. Foro internacional: Instrumentar una política de informantes internos (whistleblowers): ¿mecanismo viable en México para atacar la corrupción? Foro Internacional 52(1), 38–91 (2012)

    Google Scholar 

  14. NF Cybersecurity & Antifraud Firm (2017)

    Google Scholar 

  15. Ackerman, S.R.: LA CORRUPCIÓN Y LOS GOBIERNOS Causas, consecuencias y reforma, Primera, p. 366. SIGLO VEINTEUNO DE ESPAÑA EDITORES, España (2001)

    Google Scholar 

  16. Eigen, P.: LAS REDES DE LA CORRUPCIóN, p. 319. Planeta, Bogotá (2004)

    Google Scholar 

  17. Secretaría Anticorrupción del Ecuador: Secretaría anticorrupción del Ecuador - nueva heramienta tecnológica, 23 January 2019. https://www.anticorrupcion.gob.ec/secretaria-anticorrupcion-presenta-nueva-herramienta-tecnologica-para-la-lucha-contra-la-corrupcion/. Accessed 24 Feb 2020

  18. Terán, A.J. (ed.): Comisión Nacional Anticorrupción, Corrupción en la Década Encubierta, Primera, Imprenta Don Bosco, p. 235 (2017)

    Google Scholar 

  19. Gordillo Montalvo, J.: DESHONESTIDAD VIA LAVADO DE SUCRES, Segunda ed., Quito, p. 14 (2001)

    Google Scholar 

  20. ISO: ISO (2016). https://www.iso.org/iso-37001-anti-bribery-management.html. Accessed 13 Sep 2020

  21. Martinez Mosquera, D., Lujan Mora, S., Navarrete, R., Mayorga Jácome, T., Vivanco Herrera, H.R.: An approach to big data modeling for key-value NoSQL databases. RISTI, 519–530 (2019)

    Google Scholar 

  22. Mayorga Jácome, T.C., García Jiménez, M., Duret Guiérrez, J.F., Carrión Jumbo, J., Yarad Jeada, P.V.: Historia de la normativa reguladora de la Protección de Datos de carácter personal en distintos países Latinoamericanos. Dominios de la Ciencia 5(1), 518–537 (2019)

    CrossRef  Google Scholar 

  23. Cisco Networking Academy: Introducción a cyberseguridad (2018)

    Google Scholar 

  24. Coloma Andagoya, R.F., Vaca Benalcazar, C.P.: IMPLEMENTACIÓN “THE FRAUD EXPLORER FTA” EN LA EMPRESA CELCO CÍA. LTDA. COMO MECANISMO DE PREVENCIÓN Y DETECCIÓN DE FRAUDE, p. 112. Universidad Tecnológica Israel, Quito, Pichincha (2019)

    Google Scholar 

  25. Ekransystem: Ekransystem. Ekransystem (2020). https://www.ekransystem.com. Accessed 12 Sep 2020

  26. Veriato: Veriato, sn. https://www.veriato.com. Accessed 12 Sep 2020

  27. ObserveIT: ObserveIT (2020). https://www.observeit.com/. Accessed 12 Sep 2020

  28. NF S.A.S.: The Fraud Explorer, 12 September 2020. https://www.thefraudexplorer.com/index.html. Accessed 12 Sep 2020

  29. Asamblea Nacional (2014)

    Google Scholar 

  30. Asamblea General de la República del Ecuador, Código Orgánico Integral Penal, Quito (2014)

    Google Scholar 

  31. Paredes Cabezas, M.d.R., Guachamboza Moposita, R.M., Velasteguí López, L.E.: Un análisis regional de la ética en la formación del Contador Público como pilar fundamental para combatir la corrupción. Ciencia Digital 4, 45–69 (2020)

    Google Scholar 

  32. NF Cybersecurity and Antifraud Firm S.A.A.: The fraud explorer, 15 August 2019. https://www.thefraudexplorer.com/files/The_Fraud_Explorer_Userguide.pdf

  33. GITHUB: The Fraud Explorer documentation (2019). https://github.com/nfsecurity/the-fraud-explorer/wiki/Requisitos. Accessed 2019

  34. Locatelli, G., Mariani, G., Sainati, T., Greco, M.: Corruption in public projects and megaprojects: there is an elephant in the room! ScienceDirect 35, 252–268 (2017)

    Google Scholar 

  35. Campos, J.E., Pradhan, S. (eds.) World Bank: The Many Faces of Corruption: Tracking Vulnerabilities at the Sector Level, p. 484. The World Bank, Washington (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tannia Cecilia Mayorga Jácome , Ronald Fernando Coloma Andagoya , Marianela Edith López Veloz or Juan Alberto Toro Álava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Mayorga Jácome, T.C., Coloma Andagoya, R.F., López Veloz, M.E., Álava, J.A.T. (2021). Method for Implementation of Preventive Technological Tools for Control and Monitoring of Fraud and Corruption. In: Rocha, Á., Ferrás, C., López-López, P.C., Guarda, T. (eds) Information Technology and Systems. ICITS 2021. Advances in Intelligent Systems and Computing, vol 1330. Springer, Cham. https://doi.org/10.1007/978-3-030-68285-9_46

Download citation