Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Identifying the signs of fraudulent accounts using data mining techniques

Published: 01 May 2012 Publication History

Abstract

In today's technological society there are various new means to commit fraud due to the advancement of media and communication networks. One typical fraud is the ATM phone scams. The commonality of ATM phone scams is basically to attract victims to use financial institutions or ATMs to transfer their money into fraudulent accounts. Regardless of the types of fraud used, fraudsters can only collect victims' money through fraudulent accounts. Therefore, it is very important to identify the signs of such fraudulent accounts and to detect fraudulent accounts based on these signs, in order to reduce victims' losses. This study applied Bayesian Classification and Association Rule to identify the signs of fraudulent accounts and the patterns of fraudulent transactions. Detection rules were developed based on the identified signs and applied to the design of a fraudulent account detection system. Empirical verification supported that this fraudulent account detection system can successfully identify fraudulent accounts in early stages and is able to provide reference for financial institutions.

References

[1]
Administrative Enforcement Agency (2007). Be careful of new tricks from fraudulent organizations <http://www.tpk.moj.gov.tw/ct.asp?xItem=112289&ctNode=21720&mp=124>.
[2]
Database mining: A performance perspective. The IEEE Transactions on Knowledge and Data. v5. 914-925.
[3]
Mining fuzzy association rules in a bank-account database. IEEE transactions on fuzzy systems. v11 i2. 238-248.
[4]
Data Mining Techniques: For Marketing, Sales, and Customer Support. John Wiley & Sons, Inc, Hoboken.
[5]
A statistical model for the temporal pattern of individual automated teller machine withdrawals. Journal of the Royal Statistical Society Series C. v57 i1. 43-59.
[6]
Machine learning techniques for business blog search and mining. Expert Systems with Applications. v35 i3. 581-590.
[7]
Methodological and practical aspects of data mining. Information Management. v37 i5. 271-281.
[8]
Financial Supervisory Commission (2011). Automatic service machines of financial institutions. Financial statistics abstract (pp. 89-91).
[9]
Ghosh, S., Reilly, D. L., (1994). Credit card fraud detection with a neural-network. In Proceedings of the 27th annual Hawaii international conference on systems (pp. 621-630).
[10]
Data Mining: Concepts and Techniques, 2/e. Morgan Kaufmann Publishers, Waltham.
[11]
Fraud, the consumer, and the banks: the (un-) regulation of electronic funds transfer. University of Toronto Faculty of Law Review. v53 i2. 346
[12]
Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications. v32 i4. 995-1003.
[13]
The empirical analysis of internet fraud in taiwan-focusing on type of payment. The Journal of Information Technology Society. v2007 i1. 37-52.
[14]
The development of a rule based expert system model for fraud alert in consumer credit. European Journal of Operational Research. v80 i2. 350-356.
[15]
Machine Learning. The McGraw-Hill Companies, Inc, New York.
[16]
National Police Agency (2011). Fraud statistics. <http://www.npa.gov.tw/NPAGip/wSite/public/Attachment/f1296196748375.doc>.
[17]
Application of data mining techniques in customer relationship management: A literature review and classification. Expert Systems with Applications. v36 i2. 2592-2602.
[18]
Federal trade commission (n.d.). Recognize Phone Fraud. <http://www.ftc.gov/bcp/edu/microsites/phonefraud/recognize.shtml>.
[19]
Phua, C., Leem, V., Smith, K., & Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research <http://arxiv.org/ftp/arxiv/papers/1009/1009.6119.pdf>.
[20]
Real-time credit card fraud detection using computational intelligence. Expert Systems with Applications. v35 i4. 1721-1732.
[21]
Data mining: a practical approach for database marketing. IBM White Paper, Dallas.
[22]
Knowledge management and data mining for marketing. A Decision Support System. v31. 127-137.
[23]
Mining the change of customer behavior in an internet shopping mall. Expert Systems with Applications. v21. 157-168.
[24]
Statistical methods for fighting financial crimes. Technometrics. v52 i1. 5-19.
[25]
Personal fraud: The victims and the scams. Crime Prevention Studies. v12. 133-151.
[26]
Massively multiplayer online fraud: Why the introduction of real world law in a virtual context is good for everyone. Northwestern Journal of Technology and Intellectual Property. v6 i2. 228

Cited By

View all
  • (2023)Fraud analyticsExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120605232:COnline publication date: 1-Dec-2023
  • (2019)Introducing a new method for the fusion of fraud evidence in banking transactions with regards to uncertaintyExpert Systems with Applications: An International Journal10.1016/j.eswa.2018.11.039121:C(382-392)Online publication date: 1-May-2019
  • (2017)Mining the Networks of Telecommunication Fraud Groups using Social Network AnalysisProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3119396(1128-1131)Online publication date: 31-Jul-2017
  • Show More Cited By
  1. Identifying the signs of fraudulent accounts using data mining techniques

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Computers in Human Behavior
        Computers in Human Behavior  Volume 28, Issue 3
        May, 2012
        312 pages

        Publisher

        Elsevier Science Publishers B. V.

        Netherlands

        Publication History

        Published: 01 May 2012

        Author Tags

        1. ATM phone scams
        2. Data mining
        3. Dummy account
        4. Fraud detection
        5. Fraudulent account

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Fraud analyticsExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120605232:COnline publication date: 1-Dec-2023
        • (2019)Introducing a new method for the fusion of fraud evidence in banking transactions with regards to uncertaintyExpert Systems with Applications: An International Journal10.1016/j.eswa.2018.11.039121:C(382-392)Online publication date: 1-May-2019
        • (2017)Mining the Networks of Telecommunication Fraud Groups using Social Network AnalysisProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3119396(1128-1131)Online publication date: 31-Jul-2017
        • (2016)Towards felicitous decision makingInformation Sciences: an International Journal10.1016/j.ins.2016.07.007367:C(747-765)Online publication date: 1-Nov-2016
        • (2016)Social big dataInformation Fusion10.1016/j.inffus.2015.08.00528:C(45-59)Online publication date: 1-Mar-2016

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media