PREVENTING ONLINE PAYMENT FRAUD: A MACHINE LEARNING APPROACH FOR PREDICTIVE MODELING AND RISK ASSESSMENT
DOI:
https://doi.org/10.17605/OSF.IO/N5GDUAbstract
The size of online transactions is always growing due to the Internet's quick growth of technology. The problem of associated network transaction fraud has also gotten worse at the same time. The properties of the network transaction—low cost, extensive reach, and high frequency—make it more difficult to identify fraud. The practice of making payments online is becoming increasingly popular as we move closer to modernity. Online payments are particularly advantageous for the buyer since they save time and address the issue of free money. We also don't need to bring any cash with us. But as we all know, good things often come with negative things.
Downloads
References
Online Payment Fraud Detection using Machine Learning in Python - GeeksforGeeks
T. P. Bhatla, V. Prabhu, and A. Dua. Understanding Credit Card Frauds
E. Kurshan, H. Shen: Graph Computing for Financial Crime and Fraud Detection: Trends, Challenges and Outlook.
Dheepa V, Dhanapal R: Analysis of credit card fraud detection methods. International journal of recent trends in engineering, 2009
Fan, W., Miller, M., Stolfo, S., Lee, W. & Chan, P. (2001). Using Artificial Anomalies to Detect Unknown and Known Network
Intrusions. Proc. of ICDM01 , 123-248.
Fanning, K., Cogger, K. & Srivastava, R. (1995). Detection of Management Fraud: A Neural Network Approach. Journal of Intelligent Systems in Accounting, Finance and Management 4: 113-126.
Fawcett, T. (2003). "In Vivo" Spam Filtering: A Challenge Problem for KDD. SIGKDD Explorations 5 (2): 140-148.
Fawcett, T. (1997). AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI Workshop. Technical Report WS-97-07. AAAI Press.
Fawcett, T. & Provost, F. (1999). Activity monitoring: Noticing Interesting Changes in Behavior. Proc. of SIGKDD99 , 53-62.
Fawcett, T. & Provost, F. (1997). Adaptive Fraud Detection. Data Mining and Knowledge Discovery 1 (3): 291-316.
Foster, D. & Stine, R. (2004). Variable Selection in Data Mining: Building a Predictive Model for Bankruptcy.Journal of American Statistical Association 99 : 303-313.
Ghosh, S. & Reilly, D. (1994). Credit Card Fraud Detection with a Neural Network. Proc. of 27th Hawaii International Conference on Systems Science 3 : 621-630.
Goldberg, H., Kirkland, J., Lee, D., Shyr, P. & Thakker, D. (2003). The NASD Securities Observation, News Analysis & Regulation System (SONAR). Proc. of IAAI03.
Goldenberg, A., Shmueli, G., Caruana, R. & Fienberg, S. (2002). Early Statistical Detection of Anthrax Outbreaks by Tracking Over-the-Counter Medication Sales. Proc. of the National Academy of Sciences , 5237-5249.
Green, B. & Choi, J. (1997). Assessing the Risk of Management Fraud through Neural Network Technology. Auditing 16 (1): 14-28.
Hawkins, S., He, H., Williams, G. & Baxter, R. (2002). Outlier Detection Using Replicator Neural Networks. Proc. of DaWaK2002 170-180.
He, H., Graco, W. & Yao, X. (1999). Application of Genetic Algorithms and k -Nearest Neighbour Method in Medical Fraud Detection. Proc. of SEAL1998 , 74-81.
He, H., Wang, J., Graco, W. & Hawkins, S. (1997). Application of Neural Networks to Detection of Medical Fraud. Expert Systems with Applications 13 : 329-336.
Heino, J. & Toivonen, H. (2003). Automated Detection of Epidemics from Usage Logs of a Physicians' Reference Database. Proc. of PKDD2003 , 180-191.
Hodge, V. & Austin, J. (2004). A Survey of Outlier Detection Methodologies. Artificial Intelligence Review 22 : 85-126.
Hollmen, J. & Tresp, V. (1998). Call-based Fraud detection in Mobile Communication Networks using a Hierarchical Regime- Switching Model. Proc. of Advances in Neural Information Processing Systems .
Hutwagner, L., Thompson, W. & Seeman, M. (2003). The Bioterrorism Preparedness and Response Early Abberation Reporting System (EARS).
Journal of Urban Health: Bulletin of the New York Academy of Medicine 80 (2): 89-96.
Jensen, D., Rattigan,M.Blau, H. (2003). Information Awareness: A Prospective Technical Assessment. Proc. of SIGKDD03 , 378-387.
Julisch, K. & Dacier, M. (2002). Mining Intrusion Detection Alarms for Actionable Knowledge. Proc. of SIGKDD02 , 366-375.
Kim, H., Pang, S., Je, H., Kim, D. & Bang, S. (2003). Constructing Support Vector Machine Ensemble. Pattern Recognition 36 : 2757-2767.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 IEJRD

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.