Logo PTI Logo FedCSIS

Communication Papers of the 18th Conference on Computer Science and Intelligence Systems

Annals of Computer Science and Information Systems, Volume 37

Data science to identify crimes against public administration

, , , , , , ,

DOI: http://dx.doi.org/10.15439/2023F5207

Citation: Communication Papers of the 18th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 37, pages 287293 ()

Full text

Abstract. Context: The management of public resources is subject to illegal acts and the automatic identification of such acts depends on the analysis of a lot of data. Objective: The object of this work is the analysis of scientific publications through a study based on systematic mapping with the purpose of evaluating them in relation to the use of automated tools to identify crimes against public administration in databases from the perspective of researchers in the data science context. Method: Using PICO strategy (Population, In- tervention, Comparison, and Outcome), a systematic mapping was conducted to find the primary studies in the literature and collect evidence for directing future research. Results: Nineteen works were found that fit the proposed cri- teria. Almost 80\% of the studies found seek to identify some type of fraud in bidding processes, obtaining accuracies between 72\% and 99\%. The research also revealed different techniques for approaching the problem. Considering all the works, the most used databases are bidding bases, lawsuits, public notices and corporate structure of companies, respectively. Conclusions: The work has shown a recent increase in interest in analyzing public data for irregularities. It is expected that this analysis will help control bodies elucidating different ways of detecting crimes against the public administration in an automated way.


  1. Brasil (2011). Lei nº 12.527, de 18 de novembro de 2011. Dia´rio Oficial da Repu´blica Federa- tiva do Brasil.
  2. Busu, M. and Busu, C. (2021). Detecting bid-rigging in public procurement. a cluster analysis approach. Administrative Sciences, 11(1):13.
  3. Campos, S. R., Fernandes, A. A., De Souza, R. T., De Freitas, E. P., da Costa, J. P. C. L., Serrano, A. M. R., and Rodrigues, D. d. C. (2012). Ontologic audit trails mapping for detection of irregularities in payrolls. In 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), pages 339-344. IEEE>
  4. Carneiro, D., Veloso, P., Ventura, A., Palumbo, G., and Costa, J. (2020). Network analysis for fraud detection in portuguese public procurement. In International Conference on Intelligent Data Engineering and Automated Learning, pages 390–401. Springer.
  5. Carvalho, R. N., Sales, L., Da Rocha, H. A., and Mendes, G. L. (2014). Using bayesian networks to identify and prevent split purchases in brazil. In BMA@ UAI, pages 70–78.
  6. Domashova, J. and Kripak, E. (2021). Application of machine learning methods for risk analysis of unfavorable outcome of government procurement procedure in building and grounds maintenance domain. Procedia Computer Science, 190:171–177.
  7. Domingos, S. L., Carvalho, R. N., Carvalho, R. S., and Ramos, G. N. (2016). Iden- tifying it purchases anomalies in the brazilian government procurement system using deep learning. In 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pages 722–727. IEEE.
  8. FIESP (2010). Relato´rio corrupc¸a˜o: custos econoˆmicos e propostas de combate. In DECOM- TEC. FIESP - Federac¸a˜o das Indu´strias do Estado de Sa˜o Paulo.
  9. Gallego, J., Rivero, G., and Mart´ınez, J. (2021). Preventing rather than punishing: An early warning model of malfeasance in public procurement. International journal of forecasting, 37(1):360–377.
  10. International, T. (2021). Corruption perceptions index.
  11. Investopedia (2021). Credit score. https://www.investopedia.com/terms/ c/credit_score.asp. Accessed: 2021-10-16.
  12. Kitchenham, B. (2004). Procedures for performing systematic reviews. Keele, UK, Keele University, 33(2004):1–26.
  13. Kumar, A., Das, S., and Tyagi, V. (2020). Anti money laundering detection using na¨ıve bayes classifier. In 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), pages 568–572. IEEE.
  14. Li, J., Chen, W.-H., Xu, Q., Shah, N., and Mackey, T. (2019). Leveraging big data to identify corruption as an sdg goal 16 humanitarian technology. In 2019 IEEE Global Humanitarian Technology Conference (GHTC), pages 1–4. IEEE.
  15. Mart´ınez-Plumed, F., Casamayor, J. C., Ferri, C., Go´mez, J. A., and Vidal, E. V. (2018). Saler: a data science solution to detect and prevent corruption in public administration. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pages 103–117. Springer.
  16. Modrusan, N., Rabuzin, K., and Mrsic, L. (2020). Improving public sector efficiency using advanced text mining in the procurement process. In DATA, pages 200–206.
  17. Niessen, M. E. K., Paciello, J. M., and Fernandez, J. I. P. (2020). Anomaly detection in public procurements using the open contracting data standard. In 2020 Seventh International Conference on eDemocracy & eGovernment (ICEDEG), pages 127–134. IEEE.
  18. Padhi, S. S. and Mohapatra, P. K. (2011). Detection of collusion in government procurement auctions. Journal of Purchasing and Supply Management, 17(4):207–221.
  19. Popa, M. (2019). Uncovering the structure of public procurement transactions. Business and Politics, 21(3):351–384.
  20. Pramanik, A., Sarker, A., Islam, Z., and Hashem, M. (2020). Public sector corruption analysis with modified k-means algorithm using perception data. In 2020 11th International Conference on Electrical and Computer Engineering (ICECE), pages 198–201. IEEE.
  21. Rabuzin, K. and Modrusan, N. (2019). Prediction of public procurement cor- ruption indices using machine learning methods. In KMIS, pages 333–340.
  22. Ralha, C. G. and Silva, C. V. S. (2012). A multi-agent data mining system for cartel detection in brazilian government procurement. Expert Systems with Applications, 39(14):11642–11656.
  23. Santos, C. M. d. C., Pimenta, C. A. d. M., and Nobre, M. R. C. (2007). A estrate´gia pico para a construc¸a˜o da pergunta de pesquisa e busca de evideˆncias. Revista Latino-Americana de Enfermagem, 15:508–511.
  24. Simon, R. and Aalbers, G. (2019). The capacity to combat corruption (ccc) index. AS/COA, page 15.
  25. Velasco, R. B., Carpanese, I., Interian, R., Paulo Neto, O. C., and Ribeiro, C. C. (2021). A decision support system for fraud detection in public procurement. International Transactions in Operational Research, 28(1):27–47.
  26. V.I., D., N.V., M., and M.I., B. (2017). Adaptation of cluster analysis methods in respect to vector space of social network analysis indicators for revealing suspicious government contracts. In 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pages 57–62.