Public Procurement Fraud Detection: A Review Using Network Analysis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Public procurement fraud is a plague that produces significant economic losses in any state and society, but empirical studies to detect it in this area are still scarce. This article presents a review of the most recent literature on public procurement to identify techniques for fraud detection using Network Science. Applying the PRISMA methodology and using the Scopus and Web of Science repositories, we selected scientific articles and compared their results over a period from 2011 to 2021. Employing a compiled search string, we found cluster analysis and centrality measures as the most adopted techniques.
Original languageEnglish
Title of host publicationComplex Networks & Their Applications X
Subtitle of host publicationProceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021 (Vol. 1)
EditorsRosa Maria Benito, Chantal Cherifi, Hocine Cherifi, Esteban Moro, Luis M. Rocha, Marta Sales-Pardo
PublisherSpringer, Cham
Chapter11
Pages116-129
Number of pages14
VolumeI
ISBN (Electronic)978-3-030-93409-5
ISBN (Print)978-3-030-93411-8
DOIs
Publication statusPublished - 1 Jan 2022
Event10th International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2021) - Madrid, Spain
Duration: 30 Nov 20212 Dec 2021
Conference number: 10th
https://complexnetworks.org/

Publication series

NameStudies in Computational Intelligence
Volume1015
ISSN (Print)1860-949X
ISSN (Electronic)1860-9503

Conference

Conference10th International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2021)
Abbreviated titleCOMPLEX NETWORKS 2021
CountrySpain
CityMadrid
Period30/11/212/12/21
Internet address

Keywords

  • Public procurement
  • Corruption
  • Network analysis
  • PRISMA

Fingerprint

Dive into the research topics of 'Public Procurement Fraud Detection: A Review Using Network Analysis'. Together they form a unique fingerprint.

Cite this