Search results

1 – 10 of 209
Article
Publication date: 2 July 2018

Vipin Khattri and Deepak Kumar Singh

This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online…

1077

Abstract

Purpose

This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction.

Design/methodology/approach

This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction.

Findings

There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud.

Research limitations/implications

This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system.

Practical implications

This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system.

Originality/value

This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.

Details

Journal of Financial Crime, vol. 25 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 27 July 2021

Anahita Farhang Ghahfarokhi, Taha Mansouri, Mohammad Reza Sadeghi Moghaddam, Nila Bahrambeik, Ramin Yavari and Mohammadreza Fani Sani

The best algorithm that was implemented on this Brazilian dataset was artificial immune system (AIS) algorithm. But the time and cost of this algorithm are high. Using asexual…

Abstract

Purpose

The best algorithm that was implemented on this Brazilian dataset was artificial immune system (AIS) algorithm. But the time and cost of this algorithm are high. Using asexual reproduction optimization (ARO) algorithm, the authors achieved better results in less time. So the authors achieved less cost in a shorter time. Their framework addressed the problems such as high costs and training time in credit card fraud detection. This simple and effective approach has achieved better results than the best techniques implemented on our dataset so far. The purpose of this paper is to detect credit card fraud using ARO.

Design/methodology/approach

In this paper, the authors used ARO algorithm to classify the bank transactions into fraud and legitimate. ARO is taken from asexual reproduction. Asexual reproduction refers to a kind of production in which one parent produces offspring identical to herself. In ARO algorithm, an individual is shown by a vector of variables. Each variable is considered as a chromosome. A binary string represents a chromosome consisted of genes. It is supposed that every generated answer exists in the environment, and because of limited resources, only the best solution can remain alive. The algorithm starts with a random individual in the answer scope. This parent reproduces the offspring named bud. Either the parent or the offspring can survive. In this competition, the one which outperforms in fitness function remains alive. If the offspring has suitable performance, it will be the next parent, and the current parent becomes obsolete. Otherwise, the offspring perishes, and the present parent survives. The algorithm recurs until the stop condition occurs.

Findings

Results showed that ARO had increased the AUC (i.e. area under a receiver operating characteristic (ROC) curve), sensitivity, precision, specificity and accuracy by 13%, 25%, 56%, 3% and 3%, in comparison with AIS, respectively. The authors achieved a high precision value indicating that if ARO detects a record as a fraud, with a high probability, it is a fraud one. Supporting a real-time fraud detection system is another vital issue. ARO outperforms AIS not only in the mentioned criteria, but also decreases the training time by 75% in comparison with the AIS, which is a significant figure.

Originality/value

In this paper, the authors implemented the ARO in credit card fraud detection. The authors compared the results with those of the AIS, which was one of the best methods ever implemented on the benchmark dataset. The chief focus of the fraud detection studies is finding the algorithms that can detect legal transactions from the fraudulent ones with high detection accuracy in the shortest time and at a low cost. That ARO meets all these demands.

Article
Publication date: 13 August 2020

Chandra Sekhar Kolli and Uma Devi Tatavarthi

Fraud transaction detection has become a significant factor in the communication technologies and electronic commerce systems, as it affects the usage of electronic payment. Even…

Abstract

Purpose

Fraud transaction detection has become a significant factor in the communication technologies and electronic commerce systems, as it affects the usage of electronic payment. Even though, various fraud detection methods are developed, enhancing the performance of electronic payment by detecting the fraudsters results in a great challenge in the bank transaction.

Design/methodology/approach

This paper aims to design the fraud detection mechanism using the proposed Harris water optimization-based deep recurrent neural network (HWO-based deep RNN). The proposed fraud detection strategy includes three different phases, namely, pre-processing, feature selection and fraud detection. Initially, the input transactional data is subjected to the pre-processing phase, where the data is pre-processed using the Box-Cox transformation to remove the redundant and noise values from data. The pre-processed data is passed to the feature selection phase, where the essential and the suitable features are selected using the wrapper model. The selected feature makes the classifier to perform better detection performance. Finally, the selected features are fed to the detection phase, where the deep recurrent neural network classifier is used to achieve the fraud detection process such that the training process of the classifier is done by the proposed Harris water optimization algorithm, which is the integration of water wave optimization and Harris hawks optimization.

Findings

Moreover, the proposed HWO-based deep RNN obtained better performance in terms of the metrics, such as accuracy, sensitivity and specificity with the values of 0.9192, 0.7642 and 0.9943.

Originality/value

An effective fraud detection method named HWO-based deep RNN is designed to detect the frauds in the bank transaction. The optimal features selected using the wrapper model enable the classifier to find fraudulent activities more efficiently. However, the accurate detection result is evaluated through the optimization model based on the fitness measure such that the function with the minimal error value is declared as the best solution, as it yields better detection results.

Book part
Publication date: 22 July 2021

Chien-Hung Chang

This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify…

Abstract

This chapter introduces a risk control framework on credit card fraud instead of providing a solely binary classifier model. The anomaly detection approach is adopted to identify fraud events as the outliers of the reconstruction error of a trained autoencoder (AE). The trained AE shows fitness and robustness on the normal transactions and heterogeneous behavior on fraud activities. The cost of false-positive normal transactions is controlled, and the loss of false-negative frauds can be evaluated by the thresholds from the percentiles of reconstruction error of trained AE on normal transactions. To align the risk assessment of the economic and financial situation, the risk manager can adjust the threshold to meet the risk control requirements. Using the 95th percentile as the threshold, the rate of wrongly detecting normal transactions is controlled at 5% and the true positive rate is 86%. For the 99th percentile threshold, the well-controlled false positive rate is around 1% and 83% for the truly detecting fraud activities. The performance of a false positive rate and the true positive rate is competitive with other supervised learning algorithms.

Details

Advances in Pacific Basin Business, Economics and Finance
Type: Book
ISBN: 978-1-80043-870-5

Keywords

Book part
Publication date: 15 May 2023

Satinder Singh, Sarabjeet Singh and Tanveer Kajla

Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud

Abstract

Purpose: The study aims to explore the wider acceptance of blockchain technology and growing faith in this technology among all business domains to mitigate the chances of fraud in various sectors.

Design/Methodology/Approach: The authors focus on studies conducted during 2015–2022 using keywords such as blockchain, fraud detection and financial domain for Systematic Literature Review (SLR). The SLR approach entails two databases, namely, Scopus and IEEE Xplore, to seek relevant articles covering the effectiveness of blockchain technology in controlling financial fraud.

Findings: The findings of the research explored different types of business domains using blockchains in detecting fraud. They examined their effectiveness in other sectors such as insurance, banks, online transactions, real estate, credit card usage, etc.

Practical Implications: The results of this research highlight (1) the real-life applications of blockchain technology to secure the gateway for online transactions; (2) people from diverse backgrounds with different business objectives can strongly rely on blockchains to prevent fraud.

Originality/Value: The SLR conducted in this study assists in the identification of future avenues with practical implications, making researchers aware of the work so far carried out for checking the effectiveness of blockchain; however, it does not ignore the possibility of zero to less effectiveness in some businesses which is yet to be explored.

Details

Contemporary Studies of Risks in Emerging Technology, Part B
Type: Book
ISBN: 978-1-80455-567-5

Keywords

Article
Publication date: 31 May 2022

Mark E. Lokanan

This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.

Abstract

Purpose

This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.

Design/methodology/approach

In surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques.

Findings

The findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions.

Originality/value

Some common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms.

Details

Journal of Money Laundering Control, vol. 26 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 11 May 2020

Vipin Khattri, Sandeep Kumar Nayak and Deepak Kumar Singh

Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper…

Abstract

Purpose

Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper education and awareness can only thrive when concrete fraud detection techniques are being suggested together with potential mitigation possibilities. The purpose of this research study is tendering in the same direction with a suitable plan of action in developing the authentication strength metric to give weightage marks for authentication techniques.

Design/methodology/approach

In this research study, a qualitative in-depth exploration approach is being adapted for a better description, interpretation, conceptualization for attaining exhaustive insights into specific notions. A concrete method of observation is being adopted to study various time boxed reports on plastic card fraud and its possible impacts. Content and narrative analysis are being followed to interpret more qualitative and less quantitative story about existing fraud detection techniques. Moreover, an authentication strength metric is being developed on the basis of time, cost and human interactions.

Findings

The archived data narrated in various published research articles represent the local and global environment and the need for plastic card money. It gives the breathing sense and capabilities in the marketplace. The authentication strength metric gives a supporting hand for more solidification of the authentication technique with respect to the time, cost and human ease.

Practical implications

The research study is well controlled and sufficient interpretive. The empirical representation of authentication technique and fraud detection technique identification and suggestive mitigation gives this research study an implication view for the imbibing research youths. An application and metric based pathway of this research study provides a smoother way to tackle futuristic issues and challenges.

Originality/value

This research study represents comprehensive knowledge about the causes of the notion of plastic card fraud. The authentication strength metric represents the novelty of a research study which produced on the basis of rigorous documentary and classified research analysis. The creativity of the research study is rendering the profound and thoughtful reflection of the novel dimension in the same domain.

Article
Publication date: 10 October 2008

Katherine J. Barker, Jackie D'Amato and Paul Sheridon

To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers.

8575

Abstract

Purpose

To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers.

Design/methodology/approach

A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billions of dollars each year. Numerous schemes and techniques are described in addition to recommendations as to how to help control this growing type of fraud.

Findings

Credit card fraud is a healthy and growing means of stealing billions of dollars from credit card companies, merchants and consumers. This paper offers current information to help understand the techniques used by fraudsters and how to avoid falling prey to them.

Research limitations/implications

This fraud relies on technology currently available and the easy ability to obtain machinery to steal individual identities and account information, and to produce fraudulent credit cards. Information cited is current but could change radically as technological breakthroughs occur. The changing nature of technology also affects the recommendations made to control this fraud.

Practical implications

A very useful source of current information on credit card fraud for bank, credit card companies, merchants, and consumers.

Originality/value

This paper provides specific current information and recommendations regarding a fraud topic that is of interest to a wide audience.

Details

Journal of Financial Crime, vol. 15 no. 4
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 January 2012

Norm Archer

The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.

5291

Abstract

Purpose

The purpose of this paper is to investigate consumer behaviour as it relates to identity theft and fraud.

Design/methodology/approach

Using survey data, this paper models the relationship between past experience of consumers and their levels of concern, and derives the principal components that make up consumer behaviours.

Findings

The components are physical prevention measures, account monitoring, agency monitoring, password security, and risky behaviour avoidance. These components were found to be almost orthogonal, implying that consumers tend to “buy into” a particular component of behaviour. The proposed model of consumer behaviour, while statistically significant, did not have high predictive value.

Research limitations/implications

The survey data used were collected without reference to the model used in this paper, which limits the efficacy of the model.

Practical implications

Consumers use all the behaviours in one component without regard to other components. This can leave “holes” in consumer defence against identity theft and fraud. Consumer education on identity theft and fraud needs to stress that consumers need to employ all behaviours that can minimise risk and loss.

Originality/value

This paper puts forward an initial model of consumer behaviours as it relates to identity theft and fraud. The derivation of the orthogonal components of behaviour is a new and important finding.

Details

Journal of Financial Crime, vol. 19 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 29 April 2024

Kapil Bansal, Aseem Chandra Paliwal and Arun Kumar Singh

Technology advancement has changed how banks operate. Modernizing technology has, on the one hand, made it simpler for banks to do their daily business, but it has also increased…

Abstract

Purpose

Technology advancement has changed how banks operate. Modernizing technology has, on the one hand, made it simpler for banks to do their daily business, but it has also increased cyberattacks. The purpose of the study is to to determine the factors that have the most effects on online fraud detection and to evaluate the advantages of AI and human psychology research in preventing online transaction fraud. Artificial intelligence has been used to create new techniques for both detecting and preventing cybercrimes. Fraud has also been facilitated in some organizations via employee participation.

Design/methodology/approach

The main objective of the research approach is to guide the researcher at every stage to realize the main objectives of the study. This quantitative study used a survey-based methodology. Because it allows for both unbiased analysis of the relationship between components and prediction, a quantitative approach was adopted. The study of the body of literature, the design of research questions and the development of instruments and procedures for data collection, analysis and modeling are all part of the research process. The study evaluated the data using Matlab and a structured model analysis method. For reliability analysis and descriptive statistics, IBM SPSS Statistics was used. Reliability and validity were assessed using the measurement model, and the postulated relationship was investigated using the structural model.

Findings

There is a risk in scaling at a fast pace, 3D secure is used payer authentication has a maximum mean of 3.830 with SD of 0.7587 and 0.7638, and (CE2).

Originality/value

This study focused on investigating the benefits of artificial intelligence and human personality study in online transaction fraud and to determine the factors that affect something most strongly on online fraud detection. Artificial intelligence and human personality in the Indian banking industry have been emphasized by the current research. The study revealed the benefits of artificial intelligence and human personality like awareness, subjective norms, faster and more efficient detection and cost-effectiveness significantly impact (accept) online fraud detection in the Indian banking industry. Also, security measures and better prediction do not significantly impact (reject) online fraud detection in the Indian banking industry.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

1 – 10 of 209