Search results
1 – 10 of 209Vipin Khattri and Deepak Kumar Singh
This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online…
Abstract
Purpose
This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction.
Design/methodology/approach
This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction.
Findings
There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud.
Research limitations/implications
This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system.
Practical implications
This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system.
Originality/value
This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.
Details
Keywords
Anahita Farhang Ghahfarokhi, Taha Mansouri, Mohammad Reza Sadeghi Moghaddam, Nila Bahrambeik, Ramin Yavari and Mohammadreza Fani Sani
The best algorithm that was implemented on this Brazilian dataset was artificial immune system (AIS) algorithm. But the time and cost of this algorithm are high. Using asexual…
Abstract
Purpose
The best algorithm that was implemented on this Brazilian dataset was artificial immune system (AIS) algorithm. But the time and cost of this algorithm are high. Using asexual reproduction optimization (ARO) algorithm, the authors achieved better results in less time. So the authors achieved less cost in a shorter time. Their framework addressed the problems such as high costs and training time in credit card fraud detection. This simple and effective approach has achieved better results than the best techniques implemented on our dataset so far. The purpose of this paper is to detect credit card fraud using ARO.
Design/methodology/approach
In this paper, the authors used ARO algorithm to classify the bank transactions into fraud and legitimate. ARO is taken from asexual reproduction. Asexual reproduction refers to a kind of production in which one parent produces offspring identical to herself. In ARO algorithm, an individual is shown by a vector of variables. Each variable is considered as a chromosome. A binary string represents a chromosome consisted of genes. It is supposed that every generated answer exists in the environment, and because of limited resources, only the best solution can remain alive. The algorithm starts with a random individual in the answer scope. This parent reproduces the offspring named bud. Either the parent or the offspring can survive. In this competition, the one which outperforms in fitness function remains alive. If the offspring has suitable performance, it will be the next parent, and the current parent becomes obsolete. Otherwise, the offspring perishes, and the present parent survives. The algorithm recurs until the stop condition occurs.
Findings
Results showed that ARO had increased the AUC (i.e. area under a receiver operating characteristic (ROC) curve), sensitivity, precision, specificity and accuracy by 13%, 25%, 56%, 3% and 3%, in comparison with AIS, respectively. The authors achieved a high precision value indicating that if ARO detects a record as a fraud, with a high probability, it is a fraud one. Supporting a real-time fraud detection system is another vital issue. ARO outperforms AIS not only in the mentioned criteria, but also decreases the training time by 75% in comparison with the AIS, which is a significant figure.
Originality/value
In this paper, the authors implemented the ARO in credit card fraud detection. The authors compared the results with those of the AIS, which was one of the best methods ever implemented on the benchmark dataset. The chief focus of the fraud detection studies is finding the algorithms that can detect legal transactions from the fraudulent ones with high detection accuracy in the shortest time and at a low cost. That ARO meets all these demands.
Details
Keywords
Chandra Sekhar Kolli and Uma Devi Tatavarthi
Fraud transaction detection has become a significant factor in the communication technologies and electronic commerce systems, as it affects the usage of electronic payment. Even…
Abstract
Purpose
Fraud transaction detection has become a significant factor in the communication technologies and electronic commerce systems, as it affects the usage of electronic payment. Even though, various fraud detection methods are developed, enhancing the performance of electronic payment by detecting the fraudsters results in a great challenge in the bank transaction.
Design/methodology/approach
This paper aims to design the fraud detection mechanism using the proposed Harris water optimization-based deep recurrent neural network (HWO-based deep RNN). The proposed fraud detection strategy includes three different phases, namely, pre-processing, feature selection and fraud detection. Initially, the input transactional data is subjected to the pre-processing phase, where the data is pre-processed using the Box-Cox transformation to remove the redundant and noise values from data. The pre-processed data is passed to the feature selection phase, where the essential and the suitable features are selected using the wrapper model. The selected feature makes the classifier to perform better detection performance. Finally, the selected features are fed to the detection phase, where the deep recurrent neural network classifier is used to achieve the fraud detection process such that the training process of the classifier is done by the proposed Harris water optimization algorithm, which is the integration of water wave optimization and Harris hawks optimization.
Findings
Moreover, the proposed HWO-based deep RNN obtained better performance in terms of the metrics, such as accuracy, sensitivity and specificity with the values of 0.9192, 0.7642 and 0.9943.
Originality/value
An effective fraud detection method named HWO-based deep RNN is designed to detect the frauds in the bank transaction. The optimal features selected using the wrapper model enable the classifier to find fraudulent activities more efficiently. However, the accurate detection result is evaluated through the optimization model based on the fitness measure such that the function with the minimal error value is declared as the best solution, as it yields better detection results.
Details
Keywords
This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify…
Abstract
This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify fraud events as the outliers of the reconstruction error of a trained autoencoder (AE). The trained AE shows fitness and robustness on the normal transactions and heterogeneous behavior on fraud activities. The cost of false-positive normal transactions is controlled, and the loss of false-negative frauds can be evaluated by the thresholds from the percentiles of reconstruction error of trained AE on normal transactions. To align the risk assessment of the economic and financial situation, the risk manager can adjust the threshold to meet the risk control requirements. Using the 95th percentile as the threshold, the rate of wrongly detecting normal transactions is controlled at 5% and the true positive rate is 86%. For the 99th percentile threshold, the well-controlled false positive rate is around 1% and 83% for the truly detecting fraud activities. The performance of a false positive rate and the true positive rate is competitive with other supervised learning algorithms.
Details
Keywords
Satinder Singh, Sarabjeet Singh and Tanveer Kajla
Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud…
Abstract
Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud in various sectors.
Design/Methodology/Approach: The authors focus on studies conducted during 2015–2022 using keywords such as blockchain, fraud detection and financial domain for Systematic Literature Review (SLR). The SLR approach entails two databases, namely, Scopus and IEEE Xplore, to seek relevant articles covering the effectiveness of blockchain technology in controlling financial fraud.
Findings: The findings of the research explored different types of business domains using blockchains in detecting fraud. They examined their effectiveness in other sectors such as insurance, banks, online transactions, real estate, credit card usage, etc.
Practical Implications: The results of this research highlight (1) the real-life applications of blockchain technology to secure the gateway for online transactions; (2) people from diverse backgrounds with different business objectives can strongly rely on blockchains to prevent fraud.
Originality/Value: The SLR conducted in this study assists in the identification of future avenues with practical implications, making researchers aware of the work so far carried out for checking the effectiveness of blockchain; however, it does not ignore the possibility of zero to less effectiveness in some businesses which is yet to be explored.
Details
Keywords
This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.
Abstract
Purpose
This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.
Design/methodology/approach
In surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques.
Findings
The findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions.
Originality/value
Some common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms.
Details
Keywords
Vipin Khattri, Sandeep Kumar Nayak and Deepak Kumar Singh
Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper…
Abstract
Purpose
Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper education and awareness can only thrive when concrete fraud detection techniques are being suggested together with potential mitigation possibilities. The purpose of this research study is tendering in the same direction with a suitable plan of action in developing the authentication strength metric to give weightage marks for authentication techniques.
Design/methodology/approach
In this research study, a qualitative in-depth exploration approach is being adapted for a better description, interpretation, conceptualization for attaining exhaustive insights into specific notions. A concrete method of observation is being adopted to study various time boxed reports on plastic card fraud and its possible impacts. Content and narrative analysis are being followed to interpret more qualitative and less quantitative story about existing fraud detection techniques. Moreover, an authentication strength metric is being developed on the basis of time, cost and human interactions.
Findings
The archived data narrated in various published research articles represent the local and global environment and the need for plastic card money. It gives the breathing sense and capabilities in the marketplace. The authentication strength metric gives a supporting hand for more solidification of the authentication technique with respect to the time, cost and human ease.
Practical implications
The research study is well controlled and sufficient interpretive. The empirical representation of authentication technique and fraud detection technique identification and suggestive mitigation gives this research study an implication view for the imbibing research youths. An application and metric based pathway of this research study provides a smoother way to tackle futuristic issues and challenges.
Originality/value
This research study represents comprehensive knowledge about the causes of the notion of plastic card fraud. The authentication strength metric represents the novelty of a research study which produced on the basis of rigorous documentary and classified research analysis. The creativity of the research study is rendering the profound and thoughtful reflection of the novel dimension in the same domain.
Details
Keywords
Katherine J. Barker, Jackie D'Amato and Paul Sheridon
To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers.
Abstract
Purpose
To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers.
Design/methodology/approach
A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billions of dollars each year. Numerous schemes and techniques are described in addition to recommendations as to how to help control this growing type of fraud.
Findings
Credit card fraud is a healthy and growing means of stealing billions of dollars from credit card companies, merchants and consumers. This paper offers current information to help understand the techniques used by fraudsters and how to avoid falling prey to them.
Research limitations/implications
This fraud relies on technology currently available and the easy ability to obtain machinery to steal individual identities and account information, and to produce fraudulent credit cards. Information cited is current but could change radically as technological breakthroughs occur. The changing nature of technology also affects the recommendations made to control this fraud.
Practical implications
A very useful source of current information on credit card fraud for bank, credit card companies, merchants, and consumers.
Originality/value
This paper provides specific current information and recommendations regarding a fraud topic that is of interest to a wide audience.
Details
Keywords
The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.
Abstract
Purpose
The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.
Design/methodology/approach
Using survey data, this paper models the relationship between past experience of consumers and their levels of concern, and derives the principal components that make up consumer behaviours.
Findings
The components are physical prevention measures, account monitoring, agency monitoring, password security, and risky behaviour avoidance. These components were found to be almost orthogonal, implying that consumers tend to “buy into” a particular component of behaviour. The proposed model of consumer behaviour, while statistically significant, did not have high predictive value.
Research limitations/implications
The survey data used were collected without reference to the model used in this paper, which limits the efficacy of the model.
Practical implications
Consumers use all the behaviours in one component without regard to other components. This can leave “holes” in consumer defence against identity theft and fraud. Consumer education on identity theft and fraud needs to stress that consumers need to employ all behaviours that can minimise risk and loss.
Originality/value
This paper puts forward an initial model of consumer behaviours as it relates to identity theft and fraud. The derivation of the orthogonal components of behaviour is a new and important finding.
Details
Keywords
Kapil Bansal, Aseem Chandra Paliwal and Arun Kumar Singh
Technology advancement has changed how banks operate. Modernizing technology has, on the one hand, made it simpler for banks to do their daily business, but it has also increased…
Abstract
Purpose
Technology advancement has changed how banks operate. Modernizing technology has, on the one hand, made it simpler for banks to do their daily business, but it has also increased cyberattacks. The purpose of the study is to to determine the factors that have the most effects on online fraud detection and to evaluate the advantages of AI and human psychology research in preventing online transaction fraud. Artificial intelligence has been used to create new techniques for both detecting and preventing cybercrimes. Fraud has also been facilitated in some organizations via employee participation.
Design/methodology/approach
The main objective of the research approach is to guide the researcher at every stage to realize the main objectives of the study. This quantitative study used a survey-based methodology. Because it allows for both unbiased analysis of the relationship between components and prediction, a quantitative approach was adopted. The study of the body of literature, the design of research questions and the development of instruments and procedures for data collection, analysis and modeling are all part of the research process. The study evaluated the data using Matlab and a structured model analysis method. For reliability analysis and descriptive statistics, IBM SPSS Statistics was used. Reliability and validity were assessed using the measurement model, and the postulated relationship was investigated using the structural model.
Findings
There is a risk in scaling at a fast pace, 3D secure is used payer authentication has a maximum mean of 3.830 with SD of 0.7587 and 0.7638, and (CE2).
Originality/value
This study focused on investigating the benefits of artificial intelligence and human personality study in online transaction fraud and to determine the factors that affect something most strongly on online fraud detection. Artificial intelligence and human personality in the Indian banking industry have been emphasized by the current research. The study revealed the benefits of artificial intelligence and human personality like awareness, subjective norms, faster and more efficient detection and cost-effectiveness significantly impact (accept) online fraud detection in the Indian banking industry. Also, security measures and better prediction do not significantly impact (reject) online fraud detection in the Indian banking industry.
Details