A field guide to hidden accounting information detection

Yeog Kim, Jewan Bang, GuTaek Lee, Sangjin Lee, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A covert system is in objective to hide critical information. If a company has a covert system, it may have had illegible information. Who has it? Why? Most companies want to make good progress of debt finance, inducement of investment and to get a good company image. If the company doesn't get a good condition on its finance and management, it commits some frauds. The company manipulates financial statements in order to get good assessment results about the state of its finance and management from investors and manages actual data in a covert system. When the company's fraud comes out and the investigation launches, the management may want to secrete his covert system. On the step of data acquisition, the covert system detection influences on the investigation results. If the investigator couldn't detect the covert system and the fraud company having a covert system may not say about it, the data on the covert system may not come to the front. It is difficult for the investigator to find out the covert system on the physical place or the network. So it is required a field guide to detection of a covert system with meeting the situation of the investigation field. This paper introduces the field investigation guide for detecting the covert system having accounting information and the detection skill according to the types of the covert system.

Original languageEnglish
Title of host publicationProceedings of Future Generation Communication and Networking, FGCN 2007
Pages146-150
Number of pages5
Volume2
Publication statusPublished - 2007 Dec 1
Event2007 International Conference on Future Generation Communication and Networking, FGCN 2007 - Jeju Island, Korea, Republic of
Duration: 2007 Dec 62007 Dec 8

Other

Other2007 International Conference on Future Generation Communication and Networking, FGCN 2007
CountryKorea, Republic of
CityJeju Island
Period07/12/607/12/8

Fingerprint

Finance
Industry
Data acquisition

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Cite this

Kim, Y., Bang, J., Lee, G., Lee, S., & Lim, J. I. (2007). A field guide to hidden accounting information detection. In Proceedings of Future Generation Communication and Networking, FGCN 2007 (Vol. 2, pp. 146-150). [4426220]

A field guide to hidden accounting information detection. / Kim, Yeog; Bang, Jewan; Lee, GuTaek; Lee, Sangjin; Lim, Jong In.

Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2 2007. p. 146-150 4426220.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, Y, Bang, J, Lee, G, Lee, S & Lim, JI 2007, A field guide to hidden accounting information detection. in Proceedings of Future Generation Communication and Networking, FGCN 2007. vol. 2, 4426220, pp. 146-150, 2007 International Conference on Future Generation Communication and Networking, FGCN 2007, Jeju Island, Korea, Republic of, 07/12/6.
Kim Y, Bang J, Lee G, Lee S, Lim JI. A field guide to hidden accounting information detection. In Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2. 2007. p. 146-150. 4426220
Kim, Yeog ; Bang, Jewan ; Lee, GuTaek ; Lee, Sangjin ; Lim, Jong In. / A field guide to hidden accounting information detection. Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2 2007. pp. 146-150
@inproceedings{a36c7c1d3370498d8f31b98dbe0d827b,
title = "A field guide to hidden accounting information detection",
abstract = "A covert system is in objective to hide critical information. If a company has a covert system, it may have had illegible information. Who has it? Why? Most companies want to make good progress of debt finance, inducement of investment and to get a good company image. If the company doesn't get a good condition on its finance and management, it commits some frauds. The company manipulates financial statements in order to get good assessment results about the state of its finance and management from investors and manages actual data in a covert system. When the company's fraud comes out and the investigation launches, the management may want to secrete his covert system. On the step of data acquisition, the covert system detection influences on the investigation results. If the investigator couldn't detect the covert system and the fraud company having a covert system may not say about it, the data on the covert system may not come to the front. It is difficult for the investigator to find out the covert system on the physical place or the network. So it is required a field guide to detection of a covert system with meeting the situation of the investigation field. This paper introduces the field investigation guide for detecting the covert system having accounting information and the detection skill according to the types of the covert system.",
author = "Yeog Kim and Jewan Bang and GuTaek Lee and Sangjin Lee and Lim, {Jong In}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "0769530486",
volume = "2",
pages = "146--150",
booktitle = "Proceedings of Future Generation Communication and Networking, FGCN 2007",

}

TY - GEN

T1 - A field guide to hidden accounting information detection

AU - Kim, Yeog

AU - Bang, Jewan

AU - Lee, GuTaek

AU - Lee, Sangjin

AU - Lim, Jong In

PY - 2007/12/1

Y1 - 2007/12/1

N2 - A covert system is in objective to hide critical information. If a company has a covert system, it may have had illegible information. Who has it? Why? Most companies want to make good progress of debt finance, inducement of investment and to get a good company image. If the company doesn't get a good condition on its finance and management, it commits some frauds. The company manipulates financial statements in order to get good assessment results about the state of its finance and management from investors and manages actual data in a covert system. When the company's fraud comes out and the investigation launches, the management may want to secrete his covert system. On the step of data acquisition, the covert system detection influences on the investigation results. If the investigator couldn't detect the covert system and the fraud company having a covert system may not say about it, the data on the covert system may not come to the front. It is difficult for the investigator to find out the covert system on the physical place or the network. So it is required a field guide to detection of a covert system with meeting the situation of the investigation field. This paper introduces the field investigation guide for detecting the covert system having accounting information and the detection skill according to the types of the covert system.

AB - A covert system is in objective to hide critical information. If a company has a covert system, it may have had illegible information. Who has it? Why? Most companies want to make good progress of debt finance, inducement of investment and to get a good company image. If the company doesn't get a good condition on its finance and management, it commits some frauds. The company manipulates financial statements in order to get good assessment results about the state of its finance and management from investors and manages actual data in a covert system. When the company's fraud comes out and the investigation launches, the management may want to secrete his covert system. On the step of data acquisition, the covert system detection influences on the investigation results. If the investigator couldn't detect the covert system and the fraud company having a covert system may not say about it, the data on the covert system may not come to the front. It is difficult for the investigator to find out the covert system on the physical place or the network. So it is required a field guide to detection of a covert system with meeting the situation of the investigation field. This paper introduces the field investigation guide for detecting the covert system having accounting information and the detection skill according to the types of the covert system.

UR - http://www.scopus.com/inward/record.url?scp=52249089854&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=52249089854&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:52249089854

SN - 0769530486

SN - 9780769530482

VL - 2

SP - 146

EP - 150

BT - Proceedings of Future Generation Communication and Networking, FGCN 2007

ER -