Intelligent Financial Fraud Detection Practices: An Investigation
|
|
|
- Emil Moody
- 10 years ago
- Views:
Transcription
1 Intelligent Financial Fraud Detection Practices: An Investigation Jarrod West 1, Maumita Bhattacharya and Rafiqul Islam School of Computing & Mathematics Charles Sturt University, Australia Abstract. Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded the problem. Traditional methods of detection involve extensive use of auditing, where a trained individual manually observes reports or transactions in an attempt to discover fraudulent behaviour. This method is not only time consuming, expensive and inaccurate, but in the age of big data it is also impractical. Not surprisingly, financial institutions have turned to automated processes using statistical and computational methods. This paper presents a comprehensive investigation on financial fraud detection practices using such data mining methods, with a particular focus on computational intelligence-based techniques. Classification of the practices based on key aspects such as detection algorithm used, fraud type investigated, and success rate have been covered. Issues and challenges associated with the current practices and potential future direction of research have also been identified. 1 Introduction and Background Financial fraud is an issue that has wide reaching consequences in both the finance industry and daily life. Fraud can reduce confidence in industry, destabilise economies, and affect people's cost of living. Traditional approaches of fraud detection relied on manual techniques such as auditing, which are inefficient and unreliable due to the complexities associated with the problem. Computational intelligence (CI)- based as well as conventional data mining approaches have been proven to be useful because of their ability to detect small anomalies in large data sets [14]. Financial fraud is a broad term with various potential meanings, but for our purposes it can be defined as the intentional use of illegal methods or practices for the purpose of obtaining financial gain [30]. There are many different types of financial fraud, as well as a variety of data mining methods, and research is continually being undertaken to find the best approach for each case. The common financial fraud categories and the popular data mining as well as computational intelligence-based techniques used for financial fraud detection are depicted in Fig. 1 and Fig. 2 respectively.
2 Advancements in modern technologies such as the internet and mobile computing have led to an increase in financial fraud in recent years [27]. Social factors such as the increased distribution of credit cards have increased spending, but also resulted in an increase to fraud [20]. Fraudsters are continually refining their methods, and as such there is a requirement for detection methods to be able to evolve accordingly. CI and data mining have already been shown to be useful in similar domains such as credit card approval, bankruptcy prediction, and analysis of share markets [16]. Fraud detection is primarily considered to be a classification problem, but with a vast imbalance in fraudulent to legitimate transactions misclassification is common and can be significantly costly [6]. Many data mining approaches are efficient classifiers and are applicable to fraud detection for their efficiency at processing large datasets and their ability to work without extensive problem specific knowledge [19]. Fig. 1. Common financial fraud categories. A useful framework for applying CI or data mining to fraud detection is to use them as methods for classifying suspicious transactions or samples for further consideration. Studies show that reviewing 2% of credit card transactions could reduce fraud losses to 1% of the total cost of all purchases, with more assessments resulting in smaller loss but with an increase in auditing costs [18]. A multi-layer pipeline approach can be used with each step applying a more rigorous method to detect fraud. Data mining can be utilised to efficiently filter out more obvious fraud cases in the initial levels and leave the more subtle ones to be reviewed manually [18]. Early fraud detection studies focused on statistical models such as logistic regression, as well as neural networks (see [18], [28] and [9] for details). In 1995 Sohl et al. first predicted financial statement fraud using a back-propagation neural network [28]. More recently, in addition to examining financial scenarios such as stock market and bankruptcy prediction, Zhang et al. applied various data mining techniques to financial fraud detection in 2004 [29]. In 2005 Vatsa et al. investigated a novel approach using game theory which modelled fraudsters and detection methods as opposing players in a game, each striving to obtain the greatest financial advantage [22]. A process mining approach was used by Yang et al. in 2006 to detect health care fraud [26]. In 2007 Yue et al. observed that, to date, classification-based methods are both the most commonly researched techniques as well as the only successful ones [28]. The chronological progression of some of the recent financial fraud detection research has been depicted in Fig. 3.
3 Fig. 2. Detection algorithms used for various fraud categories. In this paper we provide a comprehensive investigation of the existing practices in financial fraud detection. We present a detailed classification of such practices; aimed at informing development of enhanced financial fraud detection frameworks. The remainder of the paper is structured as follows: Section 2 presents a comprehensive classification of the existing practices in financial fraud detection based on fraud type, detection algorithm, success rate and so on. Section 3 offers an insight into issues and challenges associated with financial fraud detection and potential direction for future research. Finally, Section 4 presents some concluding remarks. 2 Classification of Financial Fraud Detection Practices In the following sub-sections we will classify existing financial fraud detection practices based on success rate, detection technique used, and fraud type. This categorisation will enable us to identify trends in current practices, including which have been successful, probable factors influencing the outcomes, and also any gaps in the research. 2.1 Classification Based on Performance A variety of standards have been used to determine performance, but the three most commonly used are accuracy, sensitivity, and specificity. Accuracy measures the ratio of all successfully classified samples to unsuccessful ones. Sensitivity compares the amount of items correctly identified as fraud to the amount incorrectly listed as fraud, also known as the ratio of true positives to false positives. Specificity refers to the same concept with legitimate transactions, or the comparison of true negatives to false negatives [3], [19]. Tables 1, 2, and 3 classify financial fraud detection research based on these performance measures. Additionally, Fig 4 depicts the broad comparative performance of various fraud detection methods.
4 Fig. 3. Chronological progression of recent financial fraud detection research. In addition to the three performance measures discussed here, several other performance measures have been used in the literature. For example, Duman et al. chose to show their results for sensitivity in graph form instead of deterministic values, grouped by each set of input parameters [6]. In addition to other forms of graphing [18], some research used software-determined success levels or case-based procedures to determine the success of their fraud detection techniques [20], [11]. From the results we can see that CI methods typically had better success rate than statistical methods. Sensitivity was slightly better for random forests and support vector machines than logistic regression, with comparable specificity and accuracy [3]. Genetic programming, support vector machines, probabilistic neural networks, and group method of data handling outperformed regression in all three areas [19]. Additionally, a neural network with exhaustive pruning was found to be more specific and accurate than CDA [4]. One statistical method seems to contradict this theory however: Bayesian belief networks were reported to be more accurate than neural networks and decision trees [12]. Most of the research showed a large difference between each method's sensitivity and specificity results. For example, Bhattacharyya et al. showed that logistic regression, support vector machines and random forests all performed significantly better at detecting legitimate transactions correctly than fraudulent ones [3]. Support vector machines, genetic programming, neural networks, group method of data handling, and particularly logistic regression were also slightly less sensitive [19]. Also a neural network with exhaustive pruning showed more specificity than sensitivity [4]. As explained previously, fraud detection is a problem with a large difference in misclassification costs: it is typically far more expensive to misdiagnose a fraudulent transaction as legitimate than the reverse. With that in mind it would be beneficial for
5 detection techniques to show a much higher sensitivity than specificity, meaning that these results are less than ideal. Contrary to this belief, Hoogs et al. hypothesised that financial statement fraud may carry higher costs for false positives, and their results reflect this with a much higher specificity [9]. Panigrahi et al. also acknowledged the costs associated with following up credit card transactions marked as fraudulent, focussing their results on sensitivity only [16]. The CDA and CART methods, as well as neural networks, Bayesian belief networks and decision trees performed better in this regard, with all showing a somewhat higher ability to classify fraudulent transactions than legitimate ones [4], [12]. Table 1. Accuracy results for fraud detection practices Research Fraud Investigated Method Investigated Accuracy [3] Credit card transaction fraud from a real world example Logistic model (regression) Support vector machines Random forests % % % [12] Financial statement fraud from a selection of Greek manufacturing firms [19] Financial statement fraud with financial items from a selection of public Chinese companies [7] Financial statement fraud with managerial statements for US companies [5] Financial statement fraud with managerial statements for US companies [10] Financial statement fraud with managerial statements for US companies [4] Financial statement fraud with financial items from a selection of public Chinese companies Decision trees Neural networks Bayesian belief networks Support vector machine Genetic programming Neural network (feed forward) Group method of data handling Logistic model (regression) Neural network (probabilistic) Text mining with singular validation decomposition vector Text mining Text mining and support vector machine hybrid Text mining and decision tree hybrid Text mining and Bayesian belief network hybrid Text mining and support vector machine hybrid CDA CART Neural network (exhaustive pruning) 73.6% 80% 90.3% % % % % % % 95.65% % % 67.3% 67.3% 65.8% 71.37% 72.38% 77.14% Remarks: Considering the three performance measures, namely accuracy, sensitivity and specificity, our investigation shows that the computational intelligence-based approaches have generally performed better than the statistical approaches in most cases.
6 Fig. 4. Comparative performance of various detection methods. 2.2 Classification Based on Detection Algorithm Classifying fraud detection practices by the detection algorithm used is a useful way to identify the suitable techniques for this problem domain. It can also help us to determine why particular methods were chosen or successful. Additionally, we can identify any gaps in research by looking at algorithms which have not been explored sufficiently. Table 4 shows classification of financial fraud detection practices based on detection algorithm (conventional data mining and CI-based approaches) used. Previously it was mentioned that early fraud detection research focussed on statistical models and neural networks; however, it may be noted that these methods still continue to be popular. Many used at least one form of neural network [12], [19], [4], some investigated logistic regression [3], [17], [23], [19], while others applied Bayesian belief networks [8], [12], [2]. Application of CDA has been relatively uncommon [4]. Neural networks and logistic regression are often chosen for their well-established popularity, giving them the ability to be used as a control method by which other techniques are tested. Comparatively, more advanced methods such as support vector machines and genetic programming have received substantially less attention. Yue et al. also reported that all the methods mentioned in their research were a form of classification, with no studies performed on clustering or time-series approaches, and that most of the research focussed on supervised learning as opposed to unsupervised [28].
7 Table 2. Sensitivity results for fraud detection practices Research Fraud Investigated Method Investigated Sensitivity [3] Credit card transaction fraud from a real world example Logistic model (regression) Support vector machines Random forests % % % [12] Financial statement fraud from a selection of Greek manufacturing firms [19] Financial statement fraud with financial items from a selection of public Chinese companies Decision trees Neural networks Bayesian belief networks Support vector machine Genetic programming Neural network (feed forward) Group method of data handling Logistic model (regression) Neural network (probabilistic) 75.0% 82.5% 91.7% % % % % % % [7] Financial statement fraud with managerial statements [4] Financial statement fraud with financial items from a selection of public Chinese companies [16] Credit card fraud using legitimate customer transaction history as well as generic fraud transactions [9] Financial statement fraud from Accounting and Auditing Enforcement Releases by the Securities and Exchange Commission [25] Transactional fraud in automated bank machines and point of sale from a financial institution Text mining with singular validation decomposition vector CDA CART Neural network (exhaustive pruning) Bayesian learning with Dempster- Shafer combination 95.65% 61.96% 72.40% 80.83% 71-83% Genetic algorithm 13-27% Coevolution artificial immune system Standard evolution artificial immune system % % Several of the research focussed on a single form of fraud detection which they advocated above others, such as studying text mining with the singular validation decomposition vector [7], self-organising maps [18], logistic regression [23], [17], and fuzzy logic [20]. Additionally, some researchers focussed soley on classification and regression trees [1], Bayesian belief networks [8], individual statistical techniques [16], or their own hybrid methods [6]. This unilateral approach is useful for demonstrating the ability of the specific method in isolation, but without comparing it to other methods it is difficult to understand the relative performance of the technique. Additional factors such as the fraud type researched and the specific dataset used can
8 influence the results of the experiment. Future research could focus on reviewing these methods against other more established techniques. Table 3. Specificity results for fraud detection practices Research Fraud Investigated Method Investigated Specificity [3] Credit card transaction fraud from a real world example Logistic model (regression) Support vector machines Random forests % % % [12] Financial statement fraud from a selection of Greek manufacturing firms [19] Financial statement fraud with financial items from a selection of public Chinese companies Decision trees Neural networks Bayesian belief networks Support vector machine Genetic programming Neural network (feed forward) Group method of data handling Logistic model (regression) Neural network (probabilistic) 72.5% 77.5% 88.9% % % % % % % [7] Financial statement fraud with managerial statements [4] Financial statement fraud with financial items from a selection of public Chinese companies [9] Financial statement fraud from Accounting and Auditing Enforcement Releases by the Securities and Exchange Commission [25] Transactional fraud in automated bank machines and point of sale from a financial institution Text mining with singular validation decomposition vector CDA CART Neural network (exhaustive pruning) 95.65% 80.77% 72.36% 73.45% Genetic algorithm 98%-100% Coevolution artificial immune system Standard evolution artificial immune system % % A rising trend in fraud detection is the use of hybrid methods which utilise the strengths of multiple algorithms to classify samples. Duman and Ozcelik used a combination of scatter search and genetic algorithm, based on the latter but targeting attributes of scatter search such as the smaller populations and recombination as the reproduction method [6]. A different approach was taken by Panigrahi et al. who used two methods sequentially, beginning with the Depster-Schaefer method to combine rules and then using a Bayesian learner to detect the existence of fraud [16]. Some researchers applied fuzzy logic to introduce variation to their samples, attempting to transform it to resemble real world data before deploying a different technique to actually detect the presence of fraud [11]. The investigators recognised that applying
9 'fuzziness' to their problem increased the performance of their solution [25]. Similarly, several researchers combined traditional computational intelligence methods with text mining to analyse financial statements for the presence of fraud [5], [10]. Remarks: Based on our investigation, it is apparent that neural networks and statistical algorithms have continued to remain popular through recent years, while hybrid methods are a rising trend in financial fraud detection, combining the strengths of multiple techniques. 2.3 Classification Based on Fraud Type Given the varying nature of each type of fraud, the problem domain can differ significantly depending on the form that is being detected. By classifying the existing practices on the type of fraud investigated we can identify the techniques more suitable and more commonly used for a specific type of fraud. Additionally we can infer the varieties which are considered the most important for investigation depending on the scope and scale of their impact. Table 5 depicts the classification based on fraud types considered, along with the detection methods used. With each chosen algorithm, feature selection will differ depending on the problem domain. Specific financial statement fraud exists within individual companies, and as such attribute ratios are used instead of absolute values. Koh and Low provide a good example of the relevant ratios such as net income to total assets, interest payments to earnings before interest and tax, and market value of equity to total assets [13]. In comparison, research into credit card fraud has typically selected independent variables or aggregate values which may be quantitative or qualitative. For example, Bhattacharyya et al. made use of transaction amount, categorical values such as account number, transaction date, and currency, and aggregated properties like total transaction amount per day, and average amount spent at a single merchant [3]. We can see that the existing research has been greatly unbalanced in fraud type studied. The vast majority of research has focussed on two forms of financial fraud: credit card fraud and financial statement fraud. Only a handful of studies have looked at securities and commodities fraud; also many studies focus on external forms of corporate fraud while neglecting the internal ones [11]. Ngai et al. found that insurance fraud had received the highest coverage during their research [14]: the fact that we identified only a few examples of published literature on this type of fraud since 2007 indicates that research into insurance fraud is declining. Additionally, no studies have been performed directly on mortgage fraud or money laundering. The reason for this disparity may be the differing relevance to stakeholders of each fraud type. Remarks: Through our investigation we observe a significant imbalance in fraud type studied, with the majority focussing on either financial statement fraud or credit card fraud. Other forms of corporate fraud have received little attention, and hardly any studies have been done into mortgage fraud or money laundering.
10 Method Investigated Neural network Logistic model Support vector machine Decision trees, forests and CART Genetic algorithm/progra mming Text mining Group method of data handling Responsesurface methodology Selforganizing map Provide both clustering and classification abilities, similarly to neural networks. Typically used for classification and clustering. Structured and formulaic, used extensively in other problems with good results. Typically used for prediction and anomaly de- Bayesian belief network Process mining Table 4. Classification based on detection algorithm used Relevant Method Properties Fraud Investigated Research Capable of adapting to new trends, able to handle problems with no algorithmic solution. Typically used for classification and prediction. Suitable for categorical classification problems like fraud detection. Typically used for regression. Able to handle unbalanced data and complicated relationships between variables. Typically used for classification and prediction. Easy to use and has a welldocumented ability with similar problems. Typically used for classification and prediction. Suitable for binary classification as the fitness function can be the accuracy of the population. Typically used for classification. Capable of studying plain text, which offers a new dimension to the problem. Typically used for clustering and anomaly detection. Provides many of the same benefits as neural networks. Typically used for prediction. Useful for determining which method is best applied to the problem domain. tection. Objective and able to work well with large samples of existing data. Typically used for anomaly detection. Financial statement fraud [4], [12], [19] Credit card fraud Insurance fraud Financial statement fraud Credit card fraud Financial statement fraud Credit card fraud Financial statement fraud [3] [17], [23], [2] [19] [3], [24] [19] [3], [24] [4], [1], [12] Financial statement fraud [19], [9] Financial statement fraud [7], [5] Financial statement fraud [19] Financial statement fraud [29] Credit card fraud [18], [20] Insurance fraud Corporate fraud Financial statement fraud Securities and commodities fraud [2] [8] [12] Artificial Utilises binary matching rules, Credit card fraud [25] [11]
11 immune system Hybrid methods All/generic shown to be very powerful when paired with fuzzy logic. Typically used for anomaly detection. Combines the strengths of multiple standard algorithms into a new, superior method. Can be used for any combination of classification, clustering, prediction, regression, and anomaly detection. Allows the comparison of multiple methods on a specific problem to discover the benefits and negatives of each. Can be used for any combination of classification, clustering, prediction, regression, and anomaly detection. Credit card fraud Financial statement fraud [16], [6] [5], [10] All/generic [28], [14] 3 Financial Fraud Detection: Challenges and Future Directions Financial fraud detection is an evolving field in which it is desirable to stay ahead of the perpetrators. Additionally, it is evident that there are still facets of intelligent fraud detection that have not been investigated. In this section we present some of the key issues associated with financial fraud detection and suggest areas for future research. Some of the identified issues and challenges are as follows: Typical classification problems: CI and data mining-based financial fraud detection is subject to the same issues as other classification problems, such as feature selection, parameter tuning, and analysis of the problem domain. Fraud types and detection methods: Financial fraud is a diverse field and there has been a large imbalance in both fraud types and detection methods studied: some have been studied extensively while others, such as hybrid methods, have only been looked at superficially. Privacy considerations: Financial fraud is a sensitive topic and stakeholders are reluctant to share information on the subject. This has led to experimental issues such as undersampling. Computational performance: As a high-cost problem it is desirable for financial fraud to be detected immediately. Very little research has been conducted on the computational performance of fraud detection methods for use in real-time situations. Evolving problem: Fraudsters are continually modifying their techniques to remain undetected. As such detection methods are required to be able to constantly adapt to new fraud techniques. Disproportionate misclassification costs: Fraud detection is primarily a classification problem with a vast difference in misclassification costs. Research on
12 the performance of detection methods with respect to this factor is an area which needs further attention. Generic framework: Given that there are many varieties of fraud, a generic framework which can be applied to multiple fraud categories would be valuable. Table 5. Classification based on fraud type investigated Fraud Type Method Applied Research on the Type of Fraud Credit card Support vector machines; [3] investigated credit card fraud from an Decision tree; Self-organising maps; Fuzzy logic; Artificial immune system; Hybrid methods international operation; [18] investigated a banking database from the Singapore branch of a well-known international bank; [20] investigated fraud in multinational department stores; [6] investigated typical consumer spending to determine fraud in a major bank in Turkey; [16] investigated variation in legitimate customer transaction behaviour with synthesised credit card data; [25] investigated automated bank machines and point of sale from an anonymous financial institution; [24] investigated credit card transactions. Securities and commodities and other Corporate Insurance Fraud Financial statement Bayesian belief network; Process mining Logistic model Response-surface methodology; Neural networks; Decision trees; Bayesian belief networks; Support vector machine; Genetic algorithms; Group method of data handling; Logistic model (regression); Text mining; Hybrid methods [11] investigated internal transactional fraud from a successful, anonymous European financial institution; [8] Investigated s and discussion group messages to detect corporate fraud. [17], [23] and [2] all investigated motor insurance claims from Spanish insurance companies. [29] investigated financial statement fraud in general; [12] investigated a selection of Greek manufacturing firms; [19], [4], and [1] investigated a series of public Chinese companies; [7] and [10] investigated managerial statements from official company documents; [9] and [5] investigated Accounting and Auditing Enforcement Releases authored by a selection of US companies. As a classification problem, financial fraud detection suffers from the same issues as other similar problems. Feature selection has a high impact on the success of any classification method. While some researchers have mentioned feature selection for one type of fraud [13], [3], no comparisons have been made between features for differing problem domains. Also, one of the major benefits of the computational intelligence and data mining methods is their ability to be adjusted to fit the problem domain. Existing research has rarely used any form of customisation or tuning for specific problems; however, tuning is an important factor in the context of an
13 algorithm s performance. For example, the number of nodes and internal layers within a neural network has a large impact on both accuracy and computational performance. Similarly the kernel function chosen will considerably alter the success of a support vector machine and parameters such as the fitness function, crossover method, and probability for mutation will impact the results of a genetic programming algorithm. Research on customisation or tuning of the computational methods is required to truly comprehend the ability of each method. Further, in other data mining cases the solution algorithm is selected based on its performance within the problem domain, which for financial fraud detection is the type of fraud investigated. Studies on the suitability of various methods for each fraud category are necessary to understand which attributes of each algorithm make them appropriate for detecting financial fraud. From the existing literature it is apparent that there are some forms of fraud that have not been investigated as extensively as others. Financial statement fraud has been considerably investigated, which is understandable given its high profile nature, but there are other forms of fraud that have a significant impact on consumers. Credit card fraud often has a direct impact on the public and the recent increase in online transactions has led to a majority of the U.S. public being concerned with identity theft [3]. A benefit of this close relation to the user is that credit card fraud is typically detected quickly, which gives researchers access to large datasets of unambiguous transactions. Other forms of fraud which have not been covered in depth include money laundering, mortgage, and securities and commodities fraud. A lack of sufficient sample size may be the reason for the lack of research in these areas [14]. Future studies that focussed on these types of fraud detection would be beneficial. The private nature of financial data has led to institutions being reluctant to share fraudulent information. This has had an affect both on the fraud types that have been investigated as well as the datasets used for the purpose. In the published literature many of the financial fraud simulations consisted of less than a few hundred samples, typically with comparable amounts of fraudulent and legitimate specimens. This is contrary to the realities of the problem domain, where fraud cases are far outweighed by legitimate transactions [3]. Undersampling the problem domain like this can cause biases in the data that do not accurately represent real-world scenarios [9]. There is a definite need for further studies with realistic samples to accurately depict the performance of each method [7]. Some forms of financial fraud occur very rapidly, such as credit card fraud. If a fraudster obtains an individual s credit card information it s very likely that they will use it immediately until the card limit is reached. The ability to detect fraud in realtime would be highly beneficial as it may be able to prevent the fraudster from making subsequent transactions. Computational performance is therefore a key factor to consider in fraud detection. Though some researchers have noted the performance of their particular methods [3], [18], most studies were simulations performed on test datasets. Further research focussing on the computational as well as classification performance is required. Unlike many classification problems, fraud detection solutions must be capable of handling active attempts to circumvent them. As detection methods become more
14 intelligent, fraudsters are also constantly upgrading their techniques. For example, in the last few decades credit card fraud has moved from individuals stealing or forging single cards to large-scale phone and online fraud perpetrated by organised groups [3]. It is therefore necessary for fraud detection methods to be capable of evolving to stay ahead of fraudsters. Some researchers have considered models for adaptive classification, however further research is required to fully develop these for use in practical fraud detection problems [30]. As explained previously fraud has a large cost to businesses. Additionally, fraud detection has associated costs: systems require maintenance and computational power, and auditors must be employed to monitor them and investigate when a potential fraud case is identified [12]. The expense of a false positive, in misclassifying a legitimate transaction as fraud, is typically far less than that of a false negative [14]. Insufficient study has been performed on the disproportionate nature of these costs, with attention typically focussing on the traditional classification performance methods outlined in Section 2.1. Considering the accuracy of each fraud detection method, focus should be on achieving an optimum balance for each technique such that the expense is smallest. Research specifically focused on finding this balance would add significant real-world value to financial fraud detection. Given the diversity of common categories of fraud it would be useful to have some form of generic framework that could apply to more than one fraud category. Such a framework could be used to study the differences between various types of fraud, or even specific details such as differentiating between stolen and counterfeit credit cards [3]. A ubiquitous model could also be used to determine which specific fraud detection method is applicable given the problem domain. This approach has been investigated slightly with response surface methodology [30], but more detailed research is desirable. 4 Conclusion Fraud detection is an important part of the modern finance industry. In this research, we have investigated the current practices in financial fraud detection using intelligent approaches, both statistical and computational. Though their performance differed, each technique was shown to be reasonably capable at detecting various forms of financial fraud. In particular, the ability of CI methods such as neural networks and support vector machines to learn and adapt to new situations is highly effective at defeating the evolving tactics of fraudsters. There are still many aspects of intelligent fraud detection that have not yet been the subject of research. Some types of fraud, as well as some data mining methods, have been superficially explored but require future study to be completely understood. There is also the opportunity to examine the performance of existing methods by using customisation or tuning, as well as the potential to study cost benefit analysis of computational fraud detection. Finally, further research into the differences between each type of financial fraud could lead to a generic framework which would greatly enhance the scope of intelligent detection methods for this problem domain.
15 References 1. Bai B, Yen J, and Yang X (2008) False financial statements: characteristics of China's listed companies and CART detecting approach. International Journal of Information Technology & Decision Making 7, Bermúdez L, Pérez J, Ayuso M, Gómez E, and Vázquez F (2008) A Bayesian dichotomous model with asymmetric link for fraud in insurance. Insurance: Mathematics and Economics 42, Bhattacharyya S, Jha S, Tharakunnel K, and Westland JC (2011) Data mining for credit card fraud: A comparative study. Decision Support Systems 50, Bose I and Wang J (2007) Data mining for detection of financial statement fraud in Chinese Companies. Paper presented at the International Conference on Electronic Commerce, Administration, Society and Education, Hong Kong, August Cecchini M, Aytug H, Koehler GJ, and Pathak P (2010) Making words work: Using financial text as a predictor of financial events. Decision Support Systems 50, Duman E and Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications 38, Glancy FH and Yadav SB (2011) A computational model for financial reporting fraud detection. Decision Support Systems 50, Holton C (2009) Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem. Decision Support Systems 46, Hoogs B, Kiehl T, Lacomb C, and Senturk D (2007) A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud. Intelligent Systems in Accounting, Finance and Management 15, Humpherys SL, Moffitt KC, Burns MB, Burgoon JK, and Felix WF (2011) Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems 50, Jans M, van der Werf JM, Lybaert N, and Vanhoof K (2011) A business process mining application for internal transaction fraud mitigation. Expert Systems with Applications 38, Kirkos E, Spathis C, and Manolopoulos Y (2007) Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications 32, Koh HC and Low CK (2004) Going concern prediction using data mining techniques. Managerial Auditing Journal 19, Ngai E, Hu Y, Wong Y, Chen Y, and Sun X (2011) The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems 50, Paasch CA (2010) In Credit card fraud detection using artificial neural networks tuned by genetic algorithms. Vol. pp. HONG KONG UNIV. OF SCI. AND TECH.(HONG KONG), 16. Panigrahi S, Kundu A, Sural S, and Majumdar AK (2009) Credit card fraud detection: A fusion approach using Dempster Shafer theory and Bayesian learning. Information Fusion 10, Pinquet J, Ayuso M, and Guillen M (2007) Selection bias and auditing policies for insurance claims. Journal of Risk and Insurance 74, Quah JT and Sriganesh M (2008) Real-time credit card fraud detection using computational intelligence. Expert Systems with Applications 35,
16 19. Ravisankar P, Ravi V, Raghava Rao G, and Bose I (2011) Detection of financial statement fraud and feature selection using data mining techniques. Decision Support Systems 50, Sánchez D, Vila M, Cerda L, and Serrano J-M (2009) Association rules applied to credit card fraud detection. Expert Systems with Applications 36, Sohl JE and Venkatachalam A (1995) A neural network approach to forecasting model selection. Information & Management 29, Vatsa V, Sural S, and Majumdar AK (2005) A game-theoretic approach to credit card fraud detection. In Information Systems Security. Vol. pp Springer. 23. Viaene S, Ayuso M, Guillen M, Van Gheel D, and Dedene G (2007) Strategies for detecting fraudulent claims in the automobile insurance industry. European Journal of Operational Research 176, Whitrow C, Hand DJ, Juszczak P, Weston D, and Adams NM (2009) Transaction aggregation as a strategy for credit card fraud detection. Data Mining and Knowledge Discovery 18, Wu SX and Banzhaf W (2008) Combatting financial fraud: a coevolutionary anomaly detection approach. In Proceedings of the 10th annual conference on Genetic and evolutionary computation. (ed.), Vol. pp , ACM. 26. Yang W-S and Hwang S-Y (2006) A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 31, Yeh I and Lien C-h (2009) The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients. Expert Systems with Applications 36, Yue D, Wu X, Wang Y, Li Y, and Chu C-H (2007) A review of data mining-based financial fraud detection research. In Wireless Communications, Networking and Mobile Computing, WiCom International Conference on. (ed.), Vol. pp , IEEE Press. 29. Zhang D and Zhou L (2004) Discovering golden nuggets: data mining in financial application. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 34, Zhou W and Kapoor G (2011) Detecting evolutionary financial statement fraud. Decision Support Systems 50,
Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit
Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Prevention and Detection of Financial Statement Fraud An Implementation of Data Mining Framework
Prevention and Detection of Financial Statement Fraud An Implementation of Data Mining Framework Rajan Gupta Research Scholar, Dept. of Computer Sc. & Applications, MaharshiDayanand University, Rohtak
A Novel Classification Approach for C2C E-Commerce Fraud Detection
A Novel Classification Approach for C2C E-Commerce Fraud Detection *1 Haitao Xiong, 2 Yufeng Ren, 2 Pan Jia *1 School of Computer and Information Engineering, Beijing Technology and Business University,
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
Equity forecast: Predicting long term stock price movement using machine learning
Equity forecast: Predicting long term stock price movement using machine learning Nikola Milosevic School of Computer Science, University of Manchester, UK [email protected] Abstract Long
Review on Financial Forecasting using Neural Network and Data Mining Technique
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
Review Paper on Credit Card Fraud Detection
Review Paper on Credit Card Fraud Detection 1 Suman Research Scholar, GJUS&T Hisar HCE Sonepat 2 Nutan Mtech.CSE,HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars
DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING
DECISION TREE ANALYSIS: PREDICTION OF SERIOUS TRAFFIC OFFENDING ABSTRACT The objective was to predict whether an offender would commit a traffic offence involving death, using decision tree analysis. Four
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Research Article FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
e Scientific World Journal, Article ID 252797, 10 pages http://dx.doi.org/10.1155/2014/252797 Research Article FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining K.
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of
A Review of Financial Accounting Fraud Detection based on Data Mining Techniques
A Review of Financial Accounting Fraud Detection based on Data Mining Techniques Anuj Sharma Information Systems Area Indian Institute of Management, Indore, India Prabin Kumar Panigrahi Information Systems
Data Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
On the effect of data set size on bias and variance in classification learning
On the effect of data set size on bias and variance in classification learning Abstract Damien Brain Geoffrey I Webb School of Computing and Mathematics Deakin University Geelong Vic 3217 With the advent
Review on Financial Forecasting using Neural Network and Data Mining Technique
Global Journal of Computer Science and Technology Neural & Artificial Intelligence Volume 12 Issue 11 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
Data Mining Part 5. Prediction
Data Mining Part 5. Prediction 5.1 Spring 2010 Instructor: Dr. Masoud Yaghini Outline Classification vs. Numeric Prediction Prediction Process Data Preparation Comparing Prediction Methods References Classification
Towards applying Data Mining Techniques for Talent Mangement
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Towards applying Data Mining Techniques for Talent Mangement Hamidah Jantan 1,
Mining medical specialist billing patterns for health service management
Mining medical specialist billing patterns for health service management Yin Shan 1, David Jeacocke, D. Wayne Murray, Alison Sutinen Program Review Division, Medicare Australia 134 Reed St. North, Tuggeranong
Decision Support Systems
Decision Support Systems 50 (2011) 602 613 Contents lists available at ScienceDirect Decision Support Systems journal homepage: www.elsevier.com/locate/dss Data mining for credit card fraud: A comparative
Social media based analytical framework for financial fraud detection
Social media based analytical framework for financial fraud detection Abstract: With more and more companies go public nowadays, increasingly number of financial fraud are exposed. Conventional auditing
DATA PREPARATION FOR DATA MINING
Applied Artificial Intelligence, 17:375 381, 2003 Copyright # 2003 Taylor & Francis 0883-9514/03 $12.00 +.00 DOI: 10.1080/08839510390219264 u DATA PREPARATION FOR DATA MINING SHICHAO ZHANG and CHENGQI
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Techniques for Fraud Detection
Analysis on Credit Card Fraud Detection Methods 1 Renu HCE Sonepat 2 Suman HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
Dan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Welcome. Data Mining: Updates in Technologies. Xindong Wu. Colorado School of Mines Golden, Colorado 80401, USA
Welcome Xindong Wu Data Mining: Updates in Technologies Dept of Math and Computer Science Colorado School of Mines Golden, Colorado 80401, USA Email: xwu@ mines.edu Home Page: http://kais.mines.edu/~xwu/
Detecting Credit Card Fraud by Decision Trees and Support Vector Machines
Detecting Credit Card Fraud by Decision Trees and Support Vector Machines Y. Sahin and E. Duman Abstract With the developments in the Information Technology and improvements in the communication channels,
Credit Card Fraud Detection and Concept-Drift Adaptation with Delayed Supervised Information
Credit Card Fraud Detection and Concept-Drift Adaptation with Delayed Supervised Information Andrea Dal Pozzolo, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi 15/07/2015 IEEE IJCNN
Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms
Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms Johan Perols Assistant Professor University of San Diego, San Diego, CA 92110 [email protected] April
NEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
Prediction of Stock Performance Using Analytical Techniques
136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Automatic Bank Fraud Detection Using Support Vector Machines
Automatic Bank Fraud Detection Using Support Vector Machines Djeffal Abdelhamid 1, Soltani Khaoula 1, Ouassaf Atika 2 1 Computer science department, LESIA Laboratory, Biskra University, Algeria 2 Economic
HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION
HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION Chihli Hung 1, Jing Hong Chen 2, Stefan Wermter 3, 1,2 Department of Management Information Systems, Chung Yuan Christian University, Taiwan
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
Data Mining in Financial Application
Journal of Modern Accounting and Auditing, ISSN 1548-6583 December 2011, Vol. 7, No. 12, 1362-1367 Data Mining in Financial Application G. Cenk Akkaya Dokuz Eylül University, Turkey Ceren Uzar Mugla University,
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Meta Learning Algorithms for Credit Card Fraud Detection
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection
About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Design call center management system of e-commerce based on BP neural network and multifractal
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce
GARY J. KOEHLER. Biography. The Foundation for The Gator Nation
Warrington College of Business Administration 335 Stuzin Hall Department of Information Systems and Operations Management PO Box 117169 Gainesville, FL 32611-7169 352-846-2090 352-392-5438 Fax GARY J.
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Data Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Predictive Analytics Techniques: What to Use For Your Big Data. March 26, 2014 Fern Halper, PhD
Predictive Analytics Techniques: What to Use For Your Big Data March 26, 2014 Fern Halper, PhD Presenter Proven Performance Since 1995 TDWI helps business and IT professionals gain insight about data warehousing,
Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis
ISSN (Online) 2278-121 ISSN (Print) 2319 59 Vol. 4, Issue 7, July 215 Detection of Financial Statement Fraud using Data Mining Technique and Performance Analysis KK Tangod 1, GH Kulkarni 2 Assistant Professor,
Nine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
How To Detect Credit Card Fraud
Card Fraud Howard Mizes December 3, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox Design are trademarks of Xerox Corporation in the United States and/or other countries. Outline of
Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.
Chronological Sampling for Email Filtering Ching-Lung Fu 2, Daniel Silver 1, and James Blustein 2 1 Acadia University, Wolfville, Nova Scotia, Canada 2 Dalhousie University, Halifax, Nova Scotia, Canada
Customer Relationship Management using Adaptive Resonance Theory
Customer Relationship Management using Adaptive Resonance Theory Manjari Anand M.Tech.Scholar Zubair Khan Associate Professor Ravi S. Shukla Associate Professor ABSTRACT CRM is a kind of implemented model
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
life science data mining
life science data mining - '.)'-. < } ti» (>.:>,u» c ~'editors Stephen Wong Harvard Medical School, USA Chung-Sheng Li /BM Thomas J Watson Research Center World Scientific NEW JERSEY LONDON SINGAPORE.
A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
Machine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Chapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
A Data Mining Framework for Prevention and Detection of Financial Statement Fraud
A Data Mining Framework for Prevention and Detection of Financial Statement Fraud Rajan Gupta Research Scholar, Dept. of Computer Sc. & Applications, Maharshi Dayanand University, Rohtak (Haryana) India.
Supply Chain Forecasting Model Using Computational Intelligence Techniques
CMU.J.Nat.Sci Special Issue on Manufacturing Technology (2011) Vol.10(1) 19 Supply Chain Forecasting Model Using Computational Intelligence Techniques Wimalin S. Laosiritaworn Department of Industrial
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Discovering, Not Finding. Practical Data Mining for Practitioners: Level II. Advanced Data Mining for Researchers : Level III
www.cognitro.com/training Predicitve DATA EMPOWERING DECISIONS Data Mining & Predicitve Training (DMPA) is a set of multi-level intensive courses and workshops developed by Cognitro team. it is designed
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data
INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS
INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS R. Sarala 1, M.Kayalvizhi 2, G.Zayaraz 3 1 Associate Professor, Computer Science and Engineering, Pondicherry Engineering
Knowledge Discovery and Data Mining. Bootstrap review. Bagging Important Concepts. Notes. Lecture 19 - Bagging. Tom Kelsey. Notes
Knowledge Discovery and Data Mining Lecture 19 - Bagging Tom Kelsey School of Computer Science University of St Andrews http://tom.host.cs.st-andrews.ac.uk [email protected] Tom Kelsey ID5059-19-B &
Real Stock Trading Using Soft Computing Models
Real Stock Trading Using Soft Computing Models Brent Doeksen 1, Ajith Abraham 2, Johnson Thomas 1 and Marcin Paprzycki 1 1 Computer Science Department, Oklahoma State University, OK 74106, USA, 2 School
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
Neural Network Applications in Stock Market Predictions - A Methodology Analysis
Neural Network Applications in Stock Market Predictions - A Methodology Analysis Marijana Zekic, MS University of Josip Juraj Strossmayer in Osijek Faculty of Economics Osijek Gajev trg 7, 31000 Osijek
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
Rule based Classification of BSE Stock Data with Data Mining
International Journal of Information Sciences and Application. ISSN 0974-2255 Volume 4, Number 1 (2012), pp. 1-9 International Research Publication House http://www.irphouse.com Rule based Classification
Data Mining Approach For Subscription-Fraud. Detection in Telecommunication Sector
Contemporary Engineering Sciences, Vol. 7, 2014, no. 11, 515-522 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4431 Data Mining Approach For Subscription-Fraud Detection in Telecommunication
ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION
ISSN 9 X INFORMATION TECHNOLOGY AND CONTROL, 00, Vol., No.A ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION Danuta Zakrzewska Institute of Computer Science, Technical
Sales Forecast for Pickup Truck Parts:
Sales Forecast for Pickup Truck Parts: A Case Study on Brake Rubber Mojtaba Kamranfard University of Semnan Semnan, Iran [email protected] Kourosh Kiani Amirkabir University of Technology Tehran,
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Unsupervised Profiling Methods for Fraud Detection
Unsupervised Profiling Methods for Fraud Detection Richard J. Bolton and David J. Hand Department of Mathematics Imperial College London {r.bolton, d.j.hand}@ic.ac.uk Abstract Credit card fraud falls broadly
Knowledge Based Descriptive Neural Networks
Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University or Regina Regina, Saskachewan, CANADA S4S 0A2 Email: [email protected] Abstract This paper presents a
An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset
P P P Health An Analysis of Missing Data Treatment Methods and Their Application to Health Care Dataset Peng Liu 1, Elia El-Darzi 2, Lei Lei 1, Christos Vasilakis 2, Panagiotis Chountas 2, and Wei Huang
Predictive modelling around the world 28.11.13
Predictive modelling around the world 28.11.13 Agenda Why this presentation is really interesting Introduction to predictive modelling Case studies Conclusions Why this presentation is really interesting
Nishchol Mishra et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012, 4434-4438
Predictive Analytics: A Survey, Trends, Applications, Oppurtunities & Challenges Nishchol Mishra 1, Dr.Sanjay Silakari 2 School of IT, Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India 1 Professor&
Using Data Mining to Detect Insurance Fraud
IBM SPSS Modeler Using Data Mining to Detect Insurance Fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
ANALYTICS STRATEGY: creating a roadmap for success
ANALYTICS STRATEGY: creating a roadmap for success Companies in the capital and commodity markets are looking at analytics for opportunities to improve revenue and cost savings. Yet, many firms are struggling
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
