<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>ui̇i̇i̇d</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Uluslararası İktisadi ve İdari İncelemeler Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1307-9832</issn>
                                        <issn pub-type="epub">1307-9859</issn>
                                                                                            <publisher>
                    <publisher-name>Kenan ÇELİK</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.18092/ulikidince.748742</article-id>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>DETECTING FINANCIAL INFORMATION MANIPULATION BY USING SUPERVISED MACHINE LEARNING TECHNICS: SVM, PNN, KNN, DT</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="tr">
                                    <trans-title>DENETİMLİ MAKİNE ÖĞRENMESİ TEKNİKLERİNİ KULLANARAK FİNANSAL BİLGİ MANİPÜLASYONUNUN TESPİTİ: SVM, PNN, KNN, DT</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Aydın</surname>
                                    <given-names>Osman Musa</given-names>
                                </name>
                                                                    <aff>TOBB EKONOMİ VE TEKNOLOJİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Aktaş</surname>
                                    <given-names>Ramazan</given-names>
                                </name>
                                                                    <aff>TOBB EKONOMİ VE TEKNOLOJİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20201010">
                    <day>10</day>
                    <month>10</month>
                    <year>2020</year>
                </pub-date>
                                                    <issue>29</issue>
                                        <fpage>165</fpage>
                                        <lpage>174</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20200606">
                        <day>06</day>
                        <month>06</month>
                        <year>2020</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200814">
                        <day>08</day>
                        <month>14</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2008, Uluslararası İktisadi ve İdari İncelemeler Dergisi</copyright-statement>
                    <copyright-year>2008</copyright-year>
                    <copyright-holder>Uluslararası İktisadi ve İdari İncelemeler Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Within the scope of this paper, traditional estimation algorithms and supervised machine learning methods are used to estimate the manipulation of financial information. Traditional estimation algorithms, such as logit, and supervised machine learning methods, which are support vector machine (SVM), probabilistic neural network (PNN), k-nearest neighbor (KNN) and decision tree (DT) algorithms, are utilized. According to previous studies, support vector machine and probabilistic neural network algorithms perform higher than traditional estimation algorithms. Comparative analysis is made to decide better algorithm for classification by applying all algorithms separately to the data that is collected by skimming weekly bulletins of Capital Market Board of Turkey between 2009 and 2018. Thus, it is determined which algorithms perform better in financial information manipulation by looking at performance of classification accuracy, sensitivity and specificity statistics. The obtained results show that KNN and SVM have better performance than the other algorithms and all utilized algorithms have high performance compared to the previous literature’s results.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="tr">
                            <p>Bu çalışma kapsamında, finansal bilgi manipülasyonunu tahmin etmek için geleneksel tahmin algoritmaları ve denetimli makine öğrenmesi yöntemleri kullanılmaktadır. Geleneksel tahmin algoritması olarak logit kullanılırken, denetimli makine öğrenmesi yöntemlerinden destek vektör makinesi (SVM), olasılıksal sinir ağı (PNN), k-en yakın komşu (KNN) ve karar ağacı (DT) algoritmaları kullanılmıştır. Önceki çalışmalara göre, destek vektör makinesi ve olasılıksal sinir ağı algoritmaları geleneksel tahmin algoritmalarından daha yüksek performans göstermektedir. 2009-2018 yılları arasında Sermaye Piyasası Kurulu&#039;nun haftalık bültenlerini gözden geçirerek toplanan verilere tüm algoritmalar ayrı ayrı uygulanmıştır. Hangi algoritmanın finansal bilgi manipülasyonunu tespitinde daha başarılı olduğuna karar vermek amacıyla karşılaştırmalı analiz yapılmıştır. Karşılaştırmalı analizde, algoritmaların duyarlılık ve özgünlük istatistiklerinin performansına bakılmıştır. Elde edilen sonuçlar, KNN ve SVM’nin diğer algoritmalardan daha iyi performansa sahip olduğunu ve kullanılan tüm algoritmaların önceki literatürün sonuçlarına kıyasla yüksek performansa sahip olduğunu göstermektedir.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Financial Information Manipulation</kwd>
                                                    <kwd>  Supervised Machine Learning</kwd>
                                                    <kwd>  SVM</kwd>
                                                    <kwd>  KNN</kwd>
                                                    <kwd>  Beneish</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="tr">
                                                    <kwd>Finansal Bilgi Manipülasyonu</kwd>
                                                    <kwd>  Denetimli Makine Öğrenmesi</kwd>
                                                    <kwd>  SVM</kwd>
                                                    <kwd>  KNN</kwd>
                                                    <kwd>  Beneish</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Aktaş, R., Alp, A. and Doğanay, M. M. (2007). Towards predicting financial information manipulation. The ICFAI Journal of Applied Finance, 13(7), 39–52.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Arens, A. A. and Loebbecke, J. K. (2000). Auditing: An integrated approach (Internatial ed.). New Jersey: Prentice Hall International, Inc.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Beneish, Messod D. (1999). The Detection of Earnings Manipulation. Financial Analysts Journal, 55(5), 24–36.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Cortes, Corinna., Vapnik, Vladimir N. (1995). Support-Vector Network. Machine Learning, 20, 273-297.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">DataCamp. (2018). Decision Tree Classification in Python. Retrieved from www.datacamp.com/community/tutorials/decision-tree-classification-python.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Doğanay, M., Aktaş, R., Alp, A. and Öğüt H. (2009). Prediction of Financial Information Manipulation by Using Support Vector Machine and Probabilistic Neural Network. Expert Systems with Applications, 36, 5419–5423.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Fanning, K., M.  and Cogger, K., O. (1998).  Neural Network Detection of Management Fraud Using Published Financial Data, International Journal of Intelligent Systems in Accounting, Finance &amp; Management, 7(1), 21-41.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Hsu, C.-W., Chang, C.-C. and Lin, C.-J. (2004). A Practical Guide to Support Vector Classification, Technical Report. Department of Computer Science and Information Engineering, National Taiwan University.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Küçüksözen, C. (2004). Financial Information Manipulation: Causes, Methods, Objectives, Techniques, Results And An Empirical Study On IMKB Companies. (Unpublished Doctoral Dissertation). Ankara University Social Science Institute, Management, Ankara.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Liou, F. M. (2008). Fraudulent Financial Reporting Detection And Business Failure Prediction Models: A Comparison. Managerial Auditing Journal, 23(7), 650-662.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Machine Learning Mastery. (2019). A Gentle Introduction to k-Fold Cross-Validation. Retrieved from machinelearningmastery.com/k-fold-cross-validation/.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Moise, I., Pournaras, E. and Helbing, D. (2015).  K-Nearest Neighbour Classifier.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">NeuPy (2019). Probabilistic Neural Network (PNN). Retrieved from neupy.com/apidocs/neupy.algorithms.rbfn.pnn.html.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">OECD (2004). OECD Principles of Corporate Governance.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Rokach, L. and Maimon, O. (2005). Top-Down Induction of Decision Trees Classifiers—A Survey. IEEE Trans. Syst., Man, Cybern. C, Appl. Rev, 35(4), 476–487.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Rutkowski, L. (2004). Adaptive Probabilistic Neural Networks for Pattern Classification In Time-Varying Environment. IEEE Transactions on Neural Networks, 15, 811–827.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Scikit (2018). Sklearn.feature_selection.RFE. Retrieved from scikit-learn.org/stable/modules/generated/sklearn.feature_selection.RFE.html.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Scikit (2019). Sklearn.neighbors.KNeighborsClassifier. Retrieved from scikit-learn.org/stable/modules/generated/sklearn.neighbors.KNeighborsClassifier.html#sklearn.neighbors.KNeighborsClassifier.kneighbors.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Spathis, C. T. (2002). Detecting False Financial Statements Using Published Data: Some Evidence From Greece. Managerial Auditing Journal, 17(4), 179-191.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Tibshirani, R. (2019). K-Fold Cross-Validation. Cross-Validation and Bootstrap. Retrieved from statweb.stanford.edu/~tibs/sta306bfiles/cvwrong.pdf.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Vincent, C., Kevin, C. (2002). An introduction to Probabilistic Neural Networks.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
