Parameters of automated fraud detection techniques during online transactions

2018 ◽  
Vol 25 (3) ◽  
pp. 702-720 ◽  
Author(s):  
Vipin Khattri ◽  
Deepak Kumar Singh

Purpose This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction. Design/methodology/approach This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction. Findings There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud. Research limitations/implications This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system. Practical implications This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system. Originality/value This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.

Author(s):  
Nitesh Singh Bhati ◽  
Manju Khari ◽  
Vicente García-Díaz ◽  
Elena Verdú

An Intrusion Detection System (IDS) is a network security system that detects, identifies, and tracks an intruder or an invader in a network. As the usage of the internet is growing every day in our society, the IDS is becoming an essential part of the network security system. Therefore, the proper research and implementation of IDSs are required. Today, with the help of improved technologies at our disposal, many solutions have been found to create many intrusion detection systems. However, it is difficult to identify the perfect solution from the vast options we have available. Hence, motivated by the need of a better security system, this paper presents a survey of different published solutions that have been developed and/or researched on the topic of intrusion detection techniques during the period from 2000 to 2019, including the accuracy of the output. With the help of this survey, an all-inclusive view of the different papers would be at one’s disposal.


Author(s):  
Aishwarya Priyadarshini ◽  
Sanhita Mishra ◽  
Debani Prasad Mishra ◽  
Surender Reddy Salkuti ◽  
Ramakanta Mohanty

<p>Nowadays, fraudulent or deceitful activities associated with financial transactions, predominantly using credit cards have been increasing at an alarming rate and are one of the most prevalent activities in finance industries, corporate companies, and other government organizations. It is therefore essential to incorporate a fraud detection system that mainly consists of intelligent fraud detection techniques to keep in view the consumer and clients’ welfare alike. Numerous fraud detection procedures, techniques, and systems in literature have been implemented by employing a myriad of intelligent techniques including algorithms and frameworks to detect fraudulent and deceitful transactions. This paper initially analyses the data through exploratory data analysis and then proposes various classification models that are implemented using intelligent soft computing techniques to predictively classify fraudulent credit card transactions. Classification algorithms such as K-Nearest neighbor (K-NN), decision tree, random forest (RF), and logistic regression (LR) have been implemented to critically evaluate their performances. The proposed model is computationally efficient, light-weight and can be used for credit card fraudulent transaction detection with better accuracy.</p>


2019 ◽  
Vol 119 (2) ◽  
pp. 331-350 ◽  
Author(s):  
Kangning Wei ◽  
Yuzhu Li ◽  
Yong Zha ◽  
Jing Ma

Purpose The purpose of this paper is to compare the relative impacts of trust and risk on individual’s transaction intention in consumer-to-consumer (C2C) e-marketplaces from both the buyers’ and the sellers’ perspectives. Design/methodology/approach Two surveys were used to collect data regarding buyers’ and sellers’ perceptions and transaction intentions at a typical C2C e-marketplace. Partial least squares was used to analyze the data. A complementary qualitative study was conducted to triangulate the results from the quantitative study. Findings Institution-based trust (IBT) exerts a stronger influence on transaction intentions for buyers than for sellers. Sellers perceive a stronger impact of trust in intermediary (TII) than buyers on transaction intentions. The impacts of perceived risk in transactions are not different between buyers and sellers. Furthermore, IBT mediates the impacts of TII and perceived risk on transaction intentions for buyers. Research limitations/implications The results indicate that the impacts of trust and risk on transaction intention in e-marketplaces do differ between buyers and sellers. This suggests a need to further investigate the buyer–seller difference in online transactions. Practical implications Intermediaries need to focus on different types of trust-building mechanisms when attracting buyers and sellers to make transactions in the e-marketplace. Originality/value C2C e-marketplaces cannot survive without participation from both buyers and sellers. Most prior research is conducted from the buyers’ perspective. This research sets a starting point for future research to further explore the differences between buyers’ and sellers’ behavior in C2C e-commerce environments.


2019 ◽  
pp. 54-83
Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


2019 ◽  
Vol 34 (5) ◽  
pp. 606-626 ◽  
Author(s):  
Mark J. Nigrini

Purpose This study aims to classify the numbers used in recent financial statement, corruption and asset misappropriation fraud schemes in such a way that these classes can be used to design effective proactive analytics-based fraud detection tests. Design/methodology/approach The data sources for the classification scheme include the court records of fraud prosecutions, investigative reports and research papers related to fraud cases. Findings Fraudulent numbers are most often amounts that are round, have a strong period-over-period growth, are just above or below internal control thresholds or other targets, are deviations from Benford’s Law, are purposeful duplicates of authentic transactions, are outliers due to being excessively large and are excessively rounded up or down. The study includes several examples of fraudulent numbers. Research limitations/implications The fraudulent number types are based on a sample of fraud-related court documents, and the sample might not be representative of the population of detected and undetected frauds. Further research is needed into the detection of corruption/bribery schemes. Practical implications The results are important for auditors and forensic accountants running proactive fraud detection tests. The discussions emphasize that the analysis should include refining and rerunning the tests, and then using groupings and filtering to deal with false positives. The importance of an effective audit of the notable transactions is stressed in the concluding section. Originality/value The study is an original in-depth coverage of the patterns found in fraudulent numbers. The discussion sections review implementation issues and considerations for future research.


2015 ◽  
Vol 29 (5) ◽  
pp. 611-624 ◽  
Author(s):  
Karsten Vrangbaek

Purpose – The purpose of this paper is to investigate different types of patient involvement in Denmark, and to discuss the potential implications of pursuing several strategies for patient involvement simultaneously. Design/methodology/approach – The paper presents a preliminary framework for analysis of patient involvement in health care. This framework is used to analyze key governance features of patient involvement in Denmark based on previous research papers and reports describing patient involvement in Danish health care. Findings – Patient involvement is important in Denmark at the rhetorical level, and many policies and initiatives have been introduced. All three governance forms (voice, choice and co-production) are used. However, there are important barriers and limitations in translating the rhetoric into practice, and potential synergy and negative synergy effects can be identified when pursuing the strategies at the same time. Research limitations/implications – Because of the chosen research approach, the research results may lack generalizability. Therefore, researchers are encouraged to test the proposed framework further. Practical implications – The paper includes implications for the development of patient involvement in health care. Originality/value – This paper fulfills a need to study different types of patient involvement and to develop a theoretical framework for characterizing and analyzing such involvement strategies.


Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


2021 ◽  
Author(s):  
C Pallavi ◽  
Girija R ◽  
Vedhapriyavadhana R ◽  
Barnali Dey ◽  
Rajiv Vincent

Online financial transactions play a crucial role in today’s economy. It becomes an unavoidable part of the business and global activities. Transaction fraud executes thoughtful intimidations to e-commerce spending. Now-a-days, the online contract or business is fetching additional sound by knowing the types of online transaction frauds associated with, these are raising which disturbs the currency accompanying business. It has the capability to confine and encumber the contract accomplished by the intruder from an honest consumer’s credit card information. In order to avoid such a problem, the proposed system is established transaction limit for the customers. Efficient data is only considered for detecting fraudulent user action and it happens only at the time of registration. Transaction which is happening for any individual is not at all known to any FDS (Fraud Detection System) consecutively at the bank which mainly issues credit cards to customers. To speak out this problem, BLA (Behaviour and Location Analysis) is executed. The FDS tracks at a credit card provided by bank. All the inbound business is directed to the FDS aimed at confirmation, authentication and verification. FDS catches the card particulars and matter to confirm that the operation is fake or genuine. The pick-up merchandises are unknown to Fraud Detection System. If the transaction is assumed to be fraud, then the corresponding bank declines it. In order to verify the individuality, uniqueness or originality, it uses spending patterns and geographical area. In case, if any suspicious pattern is identified or detected, the FDS system needs verification. The information which is already registered by the user, the system identifies infrequent outlines in the disbursement method. After three invalid attempts, the system will hinder the user. In this proposed system, most of the algorithms are checked and investigated for online financial fraud detection techniques.


2015 ◽  
Vol 719-720 ◽  
pp. 1124-1131 ◽  
Author(s):  
Jing Guo ◽  
Yi Luo ◽  
Yun Feng Sui ◽  
Dan Qing Yan ◽  
Qi Zhong

Airport runway Foreign Object Debris (FOD) jeopardizes flight safety and leads to a large amount of financial cost on flight maintenance constantly. Several FOD detection systems based on a variety of detection techniques and architectures have been developed. This paper gives a brief introduction of our FOD detection system, in comparison with FOD detection systems currently in the international market. What distinguish our system from all the others is that, our detection approach is based on both linear frequency modulated continuous wave (LFMCW) radar signal and image data. This innovation combines the advantages of radar in shape detection and image in appearance detection. As a result, it increases the FOD detection rate and reduces the false alarming rate. Experiments following Federal Aviation Administration (FAA) advisory indicate that our system has reached the FAA requirements.


Sign in / Sign up

Export Citation Format

Share Document