A hybrid model for plastic card fraud detection systems

2010 ◽  
Vol 37 (8) ◽  
pp. 6070-6076 ◽  
Author(s):  
M. Krivko
Author(s):  
William Ferreira Moreno Oliverio ◽  
Allan Barcelos Silva ◽  
Sandro José Rigo ◽  
Rodolpho Lopes Bezerra da Costa
Keyword(s):  

2021 ◽  
Author(s):  
Dr. Sharath Chandra I ◽  
Dr. Srikanth N ◽  
Dr. Senthil Kumar S k ◽  
Dr. Venkatessulu S ◽  
Dr. Anjaiah A ◽  
...  

The exceptional growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Credit card security is a major concern for any business establishment. With that in mind, it is hard to identify the credit card fraud. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses.


2018 ◽  
Vol 25 (3) ◽  
pp. 702-720 ◽  
Author(s):  
Vipin Khattri ◽  
Deepak Kumar Singh

Purpose This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction. Design/methodology/approach This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction. Findings There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud. Research limitations/implications This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system. Practical implications This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system. Originality/value This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.


Author(s):  
David Porter

This chapter discusses the latest innovations in fraud detection, with a particular focus on insider fraud and organized fraud. It argues that as fraud continues to grow at an alarming rate across the financial services sector, the constant evolution in fraudster behavior means that financial institutions need to keep their technology-based countermeasures constantly updated, particularly given the increasing involvement of serious organized criminals. In addition to upgrading their current operational detection systems, this chapter aims to encourage organizations to improve current levels of data and information assurance in order to ensure the generation of high quality intelligence on the enemy, and to adopt a structured framework for better understanding and describing exactly what we mean by “intelligence.”


2008 ◽  
Vol 2 (1) ◽  
pp. 45-62 ◽  
Author(s):  
David J. Weston ◽  
David J. Hand ◽  
Niall M. Adams ◽  
Christopher Whitrow ◽  
Piotr Juszczak

Author(s):  
Dhiya Al-Jumeily ◽  
Abir Hussain ◽  
Aine MacDermott ◽  
Hissam Tawfik ◽  
Gemma Seeckts ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document