Abstract

By combining the similarity matching (SM) method with the utilities additives discriminates (UTADIS) method, we propose a hybrid SM-UTADIS approach to detect falsified financial statements (FFS) of listed companies. To evaluate the performance of this hybrid approach, we conduct experiments using the annual financial ratios of listed traditional Chinese medicine (TCM) companies in China. There are three stages in the detection procedure. First, we use the cosine similarity matching method to select matched companies for each considered company, derive the deviation data of each considered company as a sample dataset to capture the intrinsic law of the financial data, and further divide these into training and testing datasets for the next two stages. Second, we put the training dataset into the UTADIS to train the SM-UTADIS model. Finally, we use the trained SM-UTADIS model to classify the testing dataset and evaluate the performance of the proposed method. Furthermore, we use other approaches, such as single UTADIS and logistic and SM-logistic regression models, to detect FFS. By comparing these results to those of the hybrid SM-UTADIS approach, we find that the proposed hybrid approach greatly improves the accuracy of FFS detection.

1. Introduction

Falsified financial statements (FFS) are deliberate misstatements of material facts by management in a company’s accounts with the aim of deceiving investors and creditors. FFS primarily consist of overstating profit, sales, or assets or understating liabilities, expenses, or losses [1,2]. Such illegitimate behaviours have a severe effect on the global economy because they significantly undermine the confidence of investors and creditors. Falsified financial statements have become a serious problem worldwide, especially in some fast-growing countries like China, where FFS often cause investor failure, such as huge losses.

With the current upsurge in FFS, there is an increasing demand for greater transparency and consistency and for more information to be incorporated in financial statements. Detecting FFS has attracted considerable attention from investors, creditors, regulators, academic researchers, etc. FFS detection has always been an important but complex task for accounting professionals, and this problem has been difficult for traditional internal audits to solve effectively. In fact, detecting FFS is a classification problem because we can classify FFS as a group and non-FFS as another group. Hence, there are many studies in the literature regarding FFS detection which introduce advanced techniques or construct formal models, such as statistical models, data mining techniques, and multicriteria decision models. The classic statistical models mainly include logistic regression models, discriminant analysis, and probit models. Among these models, logistic regression is the most widely used approach to detect FFS, and it was developed by statistician Cox [3]. Beasley [4] applies logistic regression to analyze 75 fraud and 75 nonfraud firms and derives that nonfraud firms have boards with significantly higher percentages of outside members than fraud firms. Ines et al. [5] explore fraud in financial statements using logistic regression and find that performance pressure on managers is a factor leading to fraud in the financial statements. Hansen et al. [6] introduce a powerful generalized qualitative-response model, EGB2, to predict management fraud based on data developed by an international public accounting company; therefore, the EGB2 model mainly consists of Probit and logistic techniques. The results indicate a good predictive ability for both symmetric and asymmetric cost assumptions. In addition, Persons [7] uses logistic regression to predict fraudulent financial reporting. Spathis [8] uses logistic regression analysis estimated using financial ratios from companies to determine which ratios are related to FFS. Chen et al. [9] screen important variables using stepwise regression, and then they match logistic regression, support vector machine, and decision trees to construct classification models for comparison. Ye et al. [10] adopt a random forest approach to detect FFS by learning imbalanced data.

With the development of artificial intelligence, neural networks are developed rapidly and used in economic prediction problems. For example, Zhang et al. [11] use Long Short-Term Memory (LSTM) networks to predict stock price movement. The results show that the LSTM model outperforms other models with the best prediction accuracy. Also, neural networks have a better performance in FFS detection. Green and Choi [12] develop a neural network fraud classification model using endogenous financial data. A classification model from the learned behaviour pattern was applied to a test sample. During the preliminary stage of an audit, a financial statement classified as fraudulent signals an auditor to increase substantive testing. By combining feature selection and machine learning classification, Yao et al. [13] propose an optimized financial fraud detection model. Jan [14] finds that variables screened with an artificial neural network (ANN) and processed by CART yield the best classification results in the detection of financial statements fraud. Fanning and Cogger [15] use ANN to develop a model for detecting management fraud. Using publicly available predictors of fraudulent financial statements, they develop a model using eight variables with a high probability for detection. Pazarskis et al. [16] apply 30 financial ratios and several statistical tests to create a model that uses ratios as predictors in the analysis of financial statements for fraud. Temponeras et al. [17] present a new predictive model for fraud detection using a deep dense artificial neural network. Kirkos et al. [18] explore the effectiveness of data mining classification techniques in detecting companies that issue FFS. To identify factors associated with FFS, they investigate the performances of decision trees, neural networks, and Bayesian belief networks in the identification of fraud financial statements. Gupta and Gill [19] implement three data mining methodologies, a decision tree, naïve Bayesian classifier, and genetic programming, to detect FFS. The three data mining methods for the detection of financial statement fraud were compared on the basis of two important evaluation criteria: sensitivity and specificity.

Different from natural world data, financial statement data are often irregular and it is hard to capture their intrinsic law. To date, the statistical models and data mining techniques have not derived ideal results. Hence, many researchers borrowed multiple-criteria decision-making models to identify FFS. Multiple-criteria decision-making (MCDM) or multiple-criteria decision analysis (MCDA) is a subdiscipline of operations research that explicitly evaluates multiple conflicting criteria in decision-making (both in daily life and in settings such as business, government, and medicine); Zionts [20] popularized the acronym. The approach was first summarized comprehensively in a book by Roy Bernard [21]. The significant approach in MCDA is utilities additives (UTA) method, which is based on preference disaggregation that aims at the estimation of an additive utility function through the analysis of global judgments (ranking or grouping of alternatives) of decision-makers. Lagrèze and Siskos [22] assess the additive utility functions that aggregate multiple criteria in a composite criterion, using linear programming to estimate the parameters of the utility function. Siskos et al. [23] analyze the UTA method and its variants to summarize the progress made in this field. The UTA method is a well-known preference disaggregation method applied in many sorting problems. Furthermore, Corrente et al. [24] integrate the multiple-criteria hierarchy process and UTA method for dealing with MCDA in case of a hierarchical structure of the family of evaluation criteria. Mousseau et al. [25] consider the inverse multiple-criteria sorting problem (IMCSP) with UTA and other sorting methods for determining which actions to implement to provide guarantees on object classification. Mota [26] uses the approach to support project managers to focus on the main tasks of a project network.

Zopounidis and Doumpos [27] propose the UTADIS method based on the preference disaggregation approach and estimate a set of additive utility functions and utility profiles using linear programming techniques to minimize misclassification errors in sorting problems. They present the application of the UTADIS method in two real-world classification problems concerning the field of financial distress. Kosmidou et al. [28] use UTADIS to investigate the performance of small and large UK banks over multiple criteria, such as asset quality, capital adequacy, liquidity, and efficiency/profitability. The results determine the key factors that classify a bank as small or large and provide us with responsible banking decision-makers for future readjustments. Mehregan et al. [29] use the UTADIS method to classify securities and to form a profitable investment portfolio. Doumpos et al. [30] propose a robust multicriteria approach that can be used to provide early warning signals for possible future capital shortfalls that banks may face. These research results show that the proposed MCDA approach provides models with strong discriminative power. Recently, Spathis et al. [31] apply UTADIS classification method to detect factors associated with FFS; a jackknife procedure approach is used for model validation and comparison with multivariate statistical techniques, namely, discriminant and logistic analysis. The results indicate that the UTADIS methodology achieves relatively good results in detecting FFS.

Based on this, we borrow the UTADIS idea to detect the FFS of companies. The sample data are chosen from the financial ratios of listed traditional Chinese medicine (TCM) companies in China, which is a historical and prosperous industry. The reasons why we choose this industry as our research sample are the following: (1) There is a necessary sample size of FFS for our research in this sector. (2) There are few mixed businesses in TCM industry, and the main business of this sector is relatively concentrated. This will ensure that the selected samples have the homogeneous feature in their main business. Accordingly, this also can reduce the interference of unrelated noises.

As we know, in the real world, the data of each financial ratio may change drastically over time. For example, the outbreak of an epidemic will raise the income of almost all of the companies in the TCM sector, whereas an increase in material costs will result in a decline in that sector. Accordingly, related financial ratios will change sharply, inducing FFS misjudgments. However, we observe that the operating performance of a company is usually similar to other companies in the same sector; therefore, such companies should have similar changes in their financial ratios. In view of this, we introduce the cosine similarity algorithm to help us select companies most similar to the matched companies and use their financial data to compute the deviation of the considered company. Then, the deviation data are used for UTADIS classification (more details in Section 2). The merit of the financial deviation data is that they reflect the intrinsic law of a considered company, making it easier to detect FFS with UTADIS. This is the main contribution of this paper, that is, based on the UTADIS method, we combine the similarity algorithm with UTADIS and formulate an integrated method, SM-UTADIS, for detecting FFS.

The remainder of this paper is organized as follows. In Section 2, we describe the proposed SM-UTADIS methodology, including the similarity computation, UTADIS method, and classification procedure. Section 3 provides the results obtained using the SM-UTADIS classification method and reports the comparisons with the single UTADIS and logistic regression approaches. Concluding remarks and opportunities for future research are presented in Section 4.

2. Model Description

For convenience, we first introduce the following notations that are used throughout the paper:(1)Considered company Ac (c = 1, 2, …, C): the c-th considered company whose annual financial data we classify into FFS and non-FFS groups.(2)Candidate matching company #m (m = 1, 2, …, L): the m-th candidate matching company.(3)Matched company #Mq (q = 1, 2, 3, …, Q): the q-th matched company with ; these matched companies are selected from the above candidate matching companies.(4)Variables or financial ratios represent the -th variable or financial ratio of company #l. In this paper, we choose the same financial ratios for all companies (including considered and candidate matching companies), and each different right superscript represents a different company. In total, there are J financial ratios for each company.

We propose a hybrid classification model that combines the SM and UTADIS methods, as illustrated in Figure 1. As shown in Figure 1, the procedure has three stages. In the SM stage, the cosine similarity matching algorithm is applied to select matched companies for each considered company. Using the initial financial data, we compute the deviation data of each considered company and gather all of the deviation financial data into the research sample. We further divide the research sample into training and testing datasets for the next two stages. In the second stage, we put the training dataset into the UTADIS to train the model. In the last stage, we put the testing data into the well-trained UTADIS model to predict the testing data and evaluate the classification performance of the proposed method.

In the detection procedure, the key algorithms are the cosine SM method in Stage 1 and UTADIS in Stages 2 and 3. Thus, we provide more explicit descriptions of the algorithms in the two following subsections.

2.1. Similarity Matching Method

The operating performance of a company is usually similar to other companies in the same industry. Therefore, there should be similar changes in the financial ratios of these companies. In view of this, for each considered company, we use the cosine similarity matching algorithm to select the most similar matched companies and to obtain the deviation data of each considered company. Without loss of generality, the algorithm for considered company is as follows:Step 1—Computation of cosine similarity: Cosine similarity is a measure of the similarity between two vectors of an inner product space that measures the cosine of the angle between them [32]. Here, we give the cosine similarity between considered company Ac and the candidate matching company #m as follows:where represents the similarity between considered company Ac and candidate matching company , represents the financial ratio vector of considered company Ac, and represents the financial ratio vector of candidate matching company #m.Step 2—Selection of matched companies: Now we rank the matched companies in descending order with and choose the first several companies as the matched companies. For example, if we choose P matched companies, we only choose companies with , and denote the P companies as the matched companies for considered company Ac.Step 3—Computation of data deviation: Denote as the j-th financial ratio of the p-th (p = 1, 2, …, P) matched company, and using the corresponding financial data of the matched companies, we derive the deviation data of the j-th financial ratio for considered company Ac as follows:

Thus, we derive the deviation sample data for inputting into the UTADIS.

2.2. UTADIS Method

Following Zopounidis and Doumpos [27] and Spathis et al. [31], we give a brief description of the UTADIS method as follows.

Let be a set of n annual financial datasets described along a set of m attributes or evaluation criteria ; here, the attributes correspond to financial ratios. The goal is to classify the n annual financial datasets into ordered classes , which are defined as ( is preferred to , is preferred to , and so on).

For each evaluation criterion (j = 1, 2, …, J), the interval of its values is defined; here and represent the minimal and maximal values, respectively, of criterion for all of the alternatives belonging to . The internal can be divided into equal intervals ,. depends on the number of estimate points of the marginal utility . Every break point can be determined using the following formula:

Our aim is to estimate the marginal utilities at each of these breakpoints. Suppose that the evaluation of each alternative on the criterion is , and the marginal utility of each alternative and can be roughly estimated through the linear interpolation:

To achieve monotonicity of the criteria, the following conditions and the monotonicity constraints must be satisfied:

Using these transformations, (4) can be rewritten as

The total utility of each alternative can be expressed as

Estimations of the total utility model (marginal utilities of all breakpoints ) and utility thresholds are accomplished through the solution of the following linear program:subject to

Here, and are the two possible errors (misclassification errors) relative to the global utility U(a); an overestimation error represents cases in which an alternative, according to its utility, is classified in a lower class than the class to which it belongs (e.g., an alternative is classified in class C2 while belonging to class C1), whereas an underestimation error represents cases in which an alternative, according to its utility, is classified in a higher class than the class to which it belongs. The threshold is used to denote the strict preference relation between the utility thresholds that distinguish the classes; >0 is used to denote the strict preference relation between the utility thresholds that distinguish the classes.

By comparing each utility with the corresponding utility thresholds , we derive a decision rule for each alternative to distinguish each class from the others:

Next, we examine the detection of FFS. In this study, only two classes of annual financial samples are considered, that is, non-FFS (group ) and FFS (group ), and the rule for the classification of a sample as FFS or non-FFS is as follows:where is the corresponding utility threshold.

Based on the above classification rule, we classify the data into two classes: non-FFS and FFS. Here, the FFS class is the fraudulent financial data.

3. Experiment Results and Discussion

In this section, using the real financial data of the TCM sector in China, we evaluate the performance of the proposed SM-UTADIS approach. The computation results of this section are obtained using Matlab software.

3.1. Selection of Fraud Companies and Nonfraud Companies Experiment Results and Discussion

Currently, there are about 150 companies listed in the TCM sector in China, but most are involved in mixed business areas, and the main profit of some is not earned through traditional Chinese medicine. Such companies must be discarded; otherwise, they will obscure the evolving law of financial ratios as it relates to companies whose business is purely related to TCM. In addition, we must choose companies with financial ratios that include falsified data, but too much non-FFS data will dilute and hinder the identification process. Hence, only 24 TCM companies are used in our research. Among these 24 companies, three considered companies are regarded as fraud companies as they were accused of fraud in some years by the China Securities Regulatory Commission (CSRC). The other 21, as the candidate matching companies, are non-FFS, which are free of fraud. Of course, there is at least one annual financial data point in the fraudulent statements. For simplicity, we label the three considered companies as A1, A2, and A3, and the other 21 non-FFS candidate matching companies are labelled #1, #2, …, #21.

Next, we use the annual financial data of the three considered companies to evaluate the classification performance of the proposed SM-UTADIS method. The annual financial data cover the period from 2001 to 2016, and the data are collected from the Wind website (http://www.wind.com.cn/). If a company’s financial statement in a specific year is identified as fraudulent by the CSRC, it is classified as a fraudulent observation. In contrast, financial statements that are free from falsified allegations are classified as nonfraudulent observations.

For each falsified company, we first identify the earliest year in which financial statement fraud was committed. Each period covers the years before and after the year of the event. Thus, seven consecutive annual financial statements are used in most cases except for some class in which consecutive annual financial statements are accused of fraud or the related data are not published. We get 36 firm-year observations (i.e., annual financial statements) of the three considered companies as our research sample, out of which 24 are nonfraudulent (Class C1) and 12 are fraudulent (Class C2). Next, we divide these 36 annual observations into two groups: a training dataset and a testing dataset. To get better training and testing effects, the proportion of training and testing data is set to 1 : 1, respectively. Moreover, to maintain the rationality and validity of the division, we try to distribute the data of each company into the training and testing datasets as equally as possible. Therefore, the 6 falsified and 12 nonfalsified annual observations are treated as the training dataset, and the rest are treated as the testing dataset.

3.2. Choice of Financial Ratios

Based on Green and Choi [12], Mironiuc et al. [33], and Shin-Ying Huang et al. [34], 12 explanatory variables or financial ratios are selected as the sample variables; the definitions and measurements of these financial ratios (financial ratios that describe both the structure of the company assets and the level of the recorded performance care) are summarized in Table 1.

3.3. Similarity Computation and Matched Company Selection of Financial Ratios

For classification purposes, we match each falsified considered company with nonfalsified candidate matching companies in the same sector using cosine similarity analysis. In fact, we only need to compute the similarity of nonfraudulent years between the considered company and its candidate matching companies from the training dataset. If fraudulent data were included in the similarity computation, it would decrease identification efficiency because it would distort characteristics that are similar in the real world. Hence, for each considered company (i = 1, 2, 3), we select its nonfalsified annual financial data from the training dataset and the corresponding data of non-FFS candidate matching companies #1–#21 in the same years, and, using (1), we can compute the similarity between considered company (CM) and its non-FFS candidate matching companies (CMC) #1–#21. The results of the similarity analysis are given in the following table.

Choosing the similarity threshold is the key issue for improving classification accuracy in the following training and forecasting stages. If the threshold value is too big, the number of matched companies will be small. However, if the threshold value is too small, the number of matching companies will become lagger. In fact, the threshold value will directly affect the selection of matched companies, and this will further affect the accuracy of the training and testing results. We hope to choose a suitable threshold that will allow for ideal training and testing accuracy. Through many trials, the 0.70 threshold value provides the best performance. After many trials and adjustments, we select our matched companies, and the similarity values are greater than 0.70. In Table 2, the first three maximal values are highlighted in grey for each considered company. There are two matched companies, #3 and #14, for considered company A1, three matched companies, #1, #9, and #20, for considered company A2, and one matched company, #18, for considered company A3. Based on the initial financial data of each considered company and its matched companies, by (2), we can easily get the deviation data of all considered companies and further divide the data into a training dataset and a testing dataset. This concludes the data preparation for the next two stages.

3.4. Results and Discussion

Applying the proposed SM-UTADIS method to the training dataset, we get the marginal utility of each financial ratio as shown in Figure 2. The classification results and the utility threshold t are shown in Table 3.

In Figure 2, we see that the most significant ratios for discrimination in the training dataset are , , and ; their weights are 27.4971%, 23.7773%, and 12.8746%, respectively. The next is with a weight of 7.3757%. The other ratios show no significant differences in their contribution to FFS detection. Table 3 shows that the threshold is 0.349489. Using classification rules (10), Table 3 shows that there are no misclassifications.

Furthermore, the prediction ability of the trained model developed by the UTADIS method is also tested using the testing dataset. Using the trained model, we derive classification results for the testing dataset. The results are presented in Table 4. To make it clear, the misclassifications are highlighted in grey. There are two misclassifications in the testing dataset; we summarize the type I error, type II error, and overall error in Table 5. Here, a type I error corresponds to an overestimation error , meaning that an FFS observation is classified as non-FFS, whereas a type II error corresponds to an underestimation error , meaning that a non-FFS observation is classified as FFS. According to the results in Table 5, the overall error rate is 11.1111%, and type I and type II errors are 16.6667% and 8.3333%, respectively.

3.5. Comparison with Single UTADIS Results and Discussion

To evaluate the performance of the proposed SM-UTADIS approach, we compare its classification results with those of single UTADIS using the same initial data of considered company (c = 1, 2, 3). Figure 3 illustrates the marginal utility of each financial ratio. Similar to the SM-UTADIS analysis, Figure 3 shows that the most significant ratios for discrimination in the training dataset are also and , and their weights change to 24.3604% and 19.2855%, respectively. The other ratios show no significant differences in their contribution to FFS detection. Table 6 shows that there is no identification error in the training process. Using the trained model, we predict the testing dataset, and the classification results are shown in Table 7. Table 7 shows that there are 13 misclassification errors. The type I, type II, and overall errors are summarized in Table 8. Compared with Table 5, the classification results using the proposed SM-UTADIS are far superior to the results with single UTADIS.

3.6. Comparison of Logistic and SM-Logistic Models

Logistic regression is another popular method for FFS detection; it is widely used in many research areas, such as finance and social sciences. To test the performance of our proposed SM-UTADIS method, we use logistic regression and SM-logistic regression (a combination of SM and logistic regression) to classify the same training and testing datasets and further compare the classification results with those of SM-UTADIS. The results of logistic and SM-logistic regression are presented in Tables 9 and 10, respectively. Comparing Table 9 with Table 10, we see fewer classification errors with the SM-logistic regression method than with single logistic regression; this implies that the SM technique improves the classification accuracy rate. However, the classification result of the SM-logistic regression method is not better than that of the SM-UTADIS method. Tables 5 and 10 show that the type I, type II, and overall errors with SM-logistic regression are far higher than those with SM-UTADIS (see Table 5). Therefore, by comparing the classification results of three approaches, we find that the superiority of the SM-UTADIS method over logistic regression and single regression is clear, whether classifying the training dataset or the testing dataset.

4. Conclusions

Combining the SM method with UTADIS, a hybrid SM-UTADIS approach is proposed to detect falsified financial statements by classifying financial ratio data into FFS and non-FFS groups. To evaluate the performance of this hybrid method, we conduct experiments using the annual financial ratios of listed companies in the TCM sector in China. Compared with UTADIS and logistic and SM-logistic regression models, the results show that the hybrid SM method can improve the clustering accuracy, and the SM-UTADIS method has the highest prediction accuracy.

The main contributions of this paper are summarized as follows:(1)From the candidate matching companies, the cosine similarity algorithm is introduced to select out the matched companies, similar to the considered companies. Based on this, we use the financial data of matched companies to compute the deviation of the considered company by SM method. The financial deviation data obtained by SM method can reflect the intrinsic law of a considered company more clearly and make it easier to detect FFS with UTADIS.(2)We formulate a hybrid SM-UTADIS method by combining the cosine SM algorithm with UTADIS method for detecting FFS.(3)We give an empirical analysis by taking the traditional Chinese medicine industry as our research sample and prove the outperformance of the proposed hybrid method.

The proposed hybrid method can also be used for FFS detection in other industries. Here, the traditional Chinese medicine industry is just chosen as an example to test our hybrid method in this paper. Note that the industry of research samples had better have the homogeneous feature in their main business. The usefulness of this study first comes from the possibility of applying current working methods in financial fraud detecting and the improvement of classification methods. The development direction of future research is to expand the sample of the analyzed companies, focus on specific activity objects, determine the characteristics of each department, and improve the proposed model according to the specific economic environment of each company, so as to provide the best possible guarantee for the existence of fraud.

The importance of this topic and its results stems from the promotion of the method to identify financial fraud, which may contribute to the successful prevention and detection of these catastrophic actions.

Data Availability

The data used to support the findings of this study can be accessed from the following online address: http://www.wind.com.cn/.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

This study was partially supported by the National Natural Science Foundation of China (Grant no. 71761029), Natural Science Foundation of Inner Mongolia Autonomous Region (Grant no. 2017MS717), and the Program for Innovative Research Team in Universities of Inner Mongolia Autonomous Region (Grant no. NMGIT1405).