Usando análises sociais na identificação de nós relevantes em um cenário multirredes: Operação Licitante Fantasma, um estudo de caso / Using social analysis to identify relevant nodes in a multi-network scenario: The Ghost Bidder Operation, a case study

Bruno César Barreto de Figueirêdo, Fabíola Guerra Nakamura, Gardenya da Silva Felix, Eduardo Freire Nakamura

Abstract


Este artigo propõe o modelo NDNS (Nodes Detection using Network Science) que, usando redes complexas, busca encontrar os nós mais relevantes, em um cenário multi-redes, de forma mais eficiente do que medidas de centralidade estabelecidas. O artigo utiliza, como estudo de caso, uma investigação de corrupção em licitações públicas no Brasil – Operação de Licitante Fantasma. Considerando um período de quatro anos de investigações, o NDNS, quando comparado a quatro medidas de centralidade (betweenness, eigenvector, weighted degree, page rank e sua média geométrica normalizada), alcançou uma precisão de 93% e uma revocação de 94% na detecção de valores fraudulentos contra 38% e 51%, respectivamente, das segundas medidas mais bem posicionadas.


Keywords


redes complexas, redes sociais, detecção de fraude, licitação fraudulenta, operação de licitante fantasma.

References


Balaniuk, Remis, Pierre Bessiere, Emmanuel Mazer, and Paulo Cobbe. 2013. “Collusion and Corruption Risk Analysis Using Naïve Bayes Classifiers.” In Communications in Computer and Information Science. https://doi.org/10.1007/978-3-642-42017-7_7.

Bansal, Rashi, Nishant Gaur, and Shailendra Narayan Singh. 2016. “Outlier Detection: Applications and Techniques in Data Mining.” In Proceedings of the 2016 6th International Conference - Cloud System and Big Data Engineering, Confluence 2016. https://doi.org/10.1109/CONFLUENCE.2016.7508146.

Beveridge, Andrew, and Jie Shan. 2016. “Network of Thrones.” Math Horizons. https://doi.org/10.4169/mathhorizons.23.4.18.

Bhowmik, Rekha. 2008. “Data Mining Techniques in Fraud Detection.” Journal of Digital Forensics, Security and Law. https://doi.org/10.15394/jdfsl.2008.1040.

Boccaletti, Stefano, V. Latora, Y. Moreno, M. Chavez, and D. U. Hwang. 2006. “Complex Networks: Structure and Dynamics.” Physics Reports. https://doi.org/10.1016/j.physrep.2005.10.009.

Bonacich, Phillip. 2007. “Some Unique Properties of Eigenvector Centrality.” Social Networks. https://doi.org/10.1016/j.socnet.2007.04.002.

Carvalho, José Carlos Oliveira. 2014. Por Dentro Das Fraudes: Como São Feitas, Como Denunciá-Las, Como Evitá-Las. Edited by Digitaliza Brasil. 1st ed.

Controladoria Geral da União. 2019. “No Title.” Ministério Da Transparência e PF Deflagram Operação Licitante Fantasma. 2019. https://www.cgu.gov.br/noticias/2017/03/ministerio-da-transparencia-e-pf-deflagram-operacao-licitante-fantasma.

Costa, Carlos J., and Manuela Aparicio. 2011. “Using Data Mining to Help Auditors.” In Creating Global Competitive Economies: A 360-Degree Approach - Proceedings of the 17th International Business Information Management Association Conference, IBIMA 2011.

Cunha, Flávia Ceccato, Rodrigues, and Maurício Soares Bugarin. 2014. “Lei de Benford e Auditoria de Obras Públicas: Uma Análise de Sobrepreço Na Reforma Do Maracanã.” Revista Do TCU, 48–53. https://revista.tcu.gov.br/ojs/index.php/RTCU/article/view/63.

Diário Digital. 2017. “PF e CGU Deflagram Operação ‘Licitante Fantasma,’” March 21, 2017. http://www.diariodigital.com.br/policia/pf-e-cgu-deflagram-operacao-licitante-fantasma/155891/.

Federal, Polícia. 2017. “PF Desarticula Organização Criminosa Que Fraudava Licitações No MS.” 2017. http://www.pf.gov.br/agencia/noticias/2017/03/pf-desarticula-organizacao-criminosa-que-fraudava-licitacoes-no-ms.

Fire, Michael, and Carlos Guestrin. 2020. “The Rise and Fall of Network Stars: Analyzing 2.5 Million Graphs to Reveal How High-Degree Vertices Emerge over Time.” Information Processing and Management. https://doi.org/10.1016/j.ipm.2019.05.002.

Ghedini Ralha, Célia, and Carlos Vinícius Sarmento Silva. 2012. “A Multi-Agent Data Mining System for Cartel Detection in Brazilian Government Procurement.” Expert Systems with Applications. https://doi.org/10.1016/j.eswa.2012.04.037.

Hu, Bo, Nuno Carvalho, Loredana Laera, Vivian Lee, Takahide Matsutsuka, Roger Menday, and Aisha Naseer. 2013. “Applying Semantic Technologies to Public Sector: A Case Study in Fraud Detection.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). https://doi.org/10.1007/978-3-642-37996-3_23.

Kitsak, Maksim, Lazaros K. Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H. Eugene Stanley, and Hernán A. Makse. 2010. “Identification of Influential Spreaders in Complex Networks.” Nature Physics. https://doi.org/10.1038/nphys1746.

Koh, Robin, EW Edmund W Schuster, Indy Chackrabarti, and Attilio Bellman. 2003. “White Paper: Securing the Pharmaceutical Supply Chain. 2003.” AUTO-ID CENTER, Massachusetts Institute …. https://doi.org/10.1007/s10611-006-9009-5.

Mankiw, N Gregory, and Mark P. Taylor. 2011. Principles of Economics, Second Edition. Book. https://doi.org/10.1017/CBO9780511511455.

Neville, Jennifer, Özgür Şimşek, David Jensen, John Komoroske, Kelly Palmer, and Henry Goldberg. 2005. “Using Relational Knowledge Discovery to Prevent Securities Fraud.” In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. https://doi.org/10.1145/1081870.1081922.

Otte, Evelien, and Ronald Rousseau. 2002. “Social Network Analysis: A Powerful Strategy, Also for the Information Sciences.” Journal of Information Science. https://doi.org/10.1177/016555150202800601.

Silva, Carlos Vinícius Sarmento, and Célia Ghedini Ralha. 2010. “Utilização de Técnicas de Mineração de Dados Como Auxílio Na Detecção de Cartéis Em Licitações.” In XXX Congresso Da Sociedade Brasileira de Computação, 1–14. Belo Horizonte / Brazil.

———. 2011. “Agmi - An Agent-Mining Tool and Its Application to Brazilian Government Auditing.” In WEBIST 2011 - Proceedings of the 7th International Conference on Web Information Systems and Technologies. https://doi.org/10.5220/0003333905350538.

Silva, Luis Andre Dutra. 2016. “Utilização de Deep Learning Em Ações de Controle.” Revista TCU, 18–23. https://revista.tcu.gov.br/ojs/index.php/RTCU/article/view/1321.

Skillicorn, D. B., and L. Purda. 2012. “Detecting Fraud in Financial Reports.” In Proceedings - 2012 European Intelligence and Security Informatics Conference, EISIC 2012. https://doi.org/10.1109/EISIC.2012.8.

Virdhagriswaran, Sankar, and Gordon Dakin. 2006. “Camouflaged Fraud Detection in Domains with Complex Relationships.” In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. https://doi.org/10.1145/1150402.1150532.

Yang, Hu, Jar Der Luo, Ying Fan, and Li Zhu. 2020. “Using Weighted K-Means to Identify Chinese Leading Venture Capital Firms Incorporating with Centrality Measures.” Information Processing and Management. https://doi.org/10.1016/j.ipm.2019.102083.

Zareie, Ahmad, and Amir Sheikhahmadi. 2018. “A Hierarchical Approach for Influential Node Ranking in Complex Social Networks.” Expert Systems with Applications. https://doi.org/10.1016/j.eswa.2017.10.018.

Žiberna, Aleš. 2020. “K-Means-Based Algorithm for Blockmodeling Linked Networks.” Social Networks. https://doi.org/10.1016/j.socnet.2019.10.006.




DOI: https://doi.org/10.34117/bjdv6n9-280

Refbacks

  • There are currently no refbacks.