Sie sind auf Seite 1von 6

2010 International Conference on Intelligent Systems, Modelling and Simulation

Profiling intelligent systems applications in fraud detection and prevention: survey


of research articles

Mirjana Pejic-Bach
Faculty of Economics & Business
University of Zagreb
Zagreb, Croatia
e-mail: mpejic@efzg.hr

Abstract-This paper surveys intelligent systems (IS) Methods that are used for constructing intelligent systems
applications using a literature review and classification of that are subject to this paper are: fuzzy logic, neural
articles from 1956 to 2009 with a keyword index and article networks, and evolutionary computation. Fuzzy logic is is
abstract in order to explore how IS applications in the field of mainly concerned with imprecision and approximate
fraud detection and prevention have developed during this reasoning, neural networks mainly with learning and curve
period. Based on the scope of 36 articles found from Web of fitting, evolutionary computation with searching and
science (SSCI, SCI and A&HCI) database, this paper surveys optimization [6].
and classifies IS applications in the fraud detection and Since intelligent systems (IS) could overcome erroneous
prevention using the following three categories of intelligent human decisions in fraud detection by the ability to learn
systems: neural networks, fuzzy ISs, and computational from incomplete information, to adapt to changing
intelligence. Following applications areas were detected and
circumstances, to explain their decisions and to cope with
described: telecommunications, insurance, auditing, medical
care, credit card transactions, e-business, bid pricing and
novel situations [7], they proved to be useful also in the
identity verification. domain of fraud detection by many applications [8]. Number
Keywords-intelligent systems, fraud detection, fraud of authors mention IS as part of the data mining process
prevention when fraud detection and prevention is goal of the research
[9, 10, 11].
I. INTRODUCTION (HEADING 1) As part of IS research, this paper survey the application
According to the Random House Dictionary fraud is a of IS in fraud prevention and detection through a literature
deceit, trickery, sharp practice, or breach of confidence, review and classification of articles from Web of science
perpetrated for profit or to gain some unfair or dishonest (SSCI, SCI and A&HCI) database. This literature survey was
advantage. For the purpose of this article the definition of conducted in November, 2009 and it was based on a search
fraud proposed by [1] will be used: Fraud is the obtaining of in the topic index for applications of IS in fraud prevention
financial advantage or causing of loss by implicit or explicit and detection in which 4,462 articles on fraud were found.
deception; it is the mechanism through which the fraudster After topic filtering, there were 36 articles from 26 journals
gains an unlawful advantage or causes unlawful loss. related to the keywords connected to the intelligent systems:
Attempts to estimate size and damage from the fraud neural networks, fuzzy intelligence, genetic algorithms,
indicates that fraud costs a very considerable sum of money. evolutionary programming, genetic programming, evolution
For example, cost of fraud in UK may fall in rough order of strategies, and particle swarm optimization.
magnitude of ten+ billion pounds per year. However, there II. METHODOLOGY OF THE RESERACH
are many weaknesses of the data collection process on crime
[1]. One reason for incomplete data is that the fraud is not Is fraud a hot topic in today's science? A search for
always reported and in addition not always detected, because citations in the 'Web of Science' (November 2009; SSCI, SCI
those that are victim of fraud are often not even aware that and A&HCI) yielded confirming results: from the beginning
the fraud has been committed. Intense financial pressure of documentation in 1956 to 1980, 430 citations were
during the economic crisis has led to an increase of fraud, produced with the key word 'fraud'. In the following decade,
according to a survey of fraud experts conducted by the [2]. 1981 to 1990, the number increased to 725, and reached
Fraud detection is made difficult in part due to the fact 1528 in the years spanning 1991 to 2000. Even faster growth
that most auditors have relatively little experience with it [3]. is seen from 2001 to 2009, with 1979 new publications
Experiment indicated many of the auditors failed to detect registered.
the manipulations in fraudulent financial statement [4]. Much Articles contained in the Web of science are classified
hope was put to the use of artificial intelligence in the fraud according to one or more subject fields. Articles found on
detection as an aid to the human reasoning [5]. topic fraud are from diversified subject areas, mostly from
An intelligent system is a system that emulates some law (887 articles). There were also 337 articles from business
aspects of intelligence exhibited by nature. These include & finance subject area, 235 articles from economics, 181
learning, adaptability, robustness across problem domains, articles from business, and 80 from management. However,
improving efficiency (over time and/or space), information there were lots of articles from subject areas connected with
compression (data to knowledge), extrapolated reasoning. health and medicine (e.g. medicine, general & internal – 361

978-0-7695-3973-7/10
Unrecognized Copyright
$26.00
Information
© 2010 IEEE 80
DOI 10.1109/ISMS.2010.26
articles), criminology & penology (245 articles), and ethics TABLE I. TELECOMMUNICATIONS APPLICATIONS
(110 articles). Other articles were from the subject areas Application / Methods / Goal Authors
connected with scientific fraud, and specific industries were On-line security system for Boukerche and Notare (2000)
fraud occurrence was detected or prevented (e.g. impostors and improper use Boukerche and Notare (2002)
telecommunications, food science & technology, veterinary detection / neural networks Boukerche, Juca, Sobral and
science). We didn’t want to focus our research only on the (Kohonen, radial-basis, Notare (2004)
specific subject areas (e.g. business & finance), but to detect biocomputing) / classification
Classifying incoming toll tickets Burge and Shawe-Taylor
various subject area in which ISs were applied for fraud to form behavior profiles / (2001)
prevention and detection. neural network (recurrent ) /
Since IS are mainly concerned with the usage of the soft profiling
computing techniques (neural networks, fuzzy intelligence, Unusual changes of Grosser, Britos and Garcia-
genetic algorithms, evolutionary programming, genetic consumption / neural networks / Martinez (2005)
programming, evolution strategies, and particle swarm classification
Discriminating normal from Hilas and Sahalos (2006)
optimization) following words were used for detecting fraudulent activity / neural
articles that are likely to describe applications of intelligent network (feed-forward) /
systems in fraud detection and prevention: neural, fuzzy, classification
genetic, evolution, and particle swarm. However, in order to Subscription fraud prevention / Estevez, Held and Perez
find articles that describe usage of particle swarm neural network; fuzzy rules / (2006)
classification
optimization, quote signs for words ‘particle swarm’ were Classifying billing records in IP Bella, Eloff and Olivier (2009)
used. detail record (IPDR) format /
This approach yielded 36 articles from 26 journals. neural networks (self-organizing
Before 2000 seven articles were published, the number maps) / classification
increased to 11 from 2000 to 2005, and 17 articles were Classifying call detail records Sanver and Karahoca (2009)
published in from 2006 to 2009. Based on the scope of other for fraud intentions detection /
fuzzy rules (adaptive neuro
found articles on IS applications in fraud detection and fuzzy inference) / classification
prevention this paper survey and classifies IS applications in Real time fraud detection / Krenker, Volk, Sedlar, Bester
the following fields: telecommunications, insurance, medical neural network (bidirectional) / and Kos (2009)
fraud, auditing, credit card transactions, and other predicting behaviour
applications.
B. Insurance
III. APPLICATIONS OF IS IN FRAUD DETECTION AND Detecting fraudulent claims is the main source of
PREVENTION maintaining profitability in insurance industry. Fuzzy pattern
recognition, Kohonen’s Self-Organizing Feature Map,
A. Telecommunications Bayesian learning multilayer perceptron neural network
Telecommunications is the application area with the (MLP), least-squares support vector machine are used in
highest number of articles published which reflects the fact order to classify claims according to the suspicion of fraud.
that many telecoms take fraud very seriously, and those who Applications range from property-liability, life insurance and
did not do so saw their customers leave and their costs rise. automobile bodily injury claims to financial disress
This is also due to the competition and regulation among prediction.
telecommunications market especially in European Union
TABLE II. INSURANCE APPLICATIONS
that is getting more crowded each year.
Fraud detection and prevention is taken very seriously Application / Method / Goal Authors
among telecommunications companies, which resulted in Property-liability and life Derrig and Ostaszewski
insurance / fuzzy rules (pattern (1995)
the 10 articles found on the applications of IS. Number of
recognition) / segmentation
articles range modestly from one article in average per year Automobile bodily injury claims Brockett, Xia and Derrig
until three articles were published in 2009. Neural networks / neural networks (Kononen’s (1998)
were used in most of the articles: Kohonen classifying Self-Organizing Feature Map, Viaene, Dedene and Derrig
model, recurrent neural networks, radial basis function feed-forward, back propagation, (2005)
Bayesian learning multilayer
(RBF) model, feed-forward (FF) neural networks, self- perceptron, least-squared
organizing maps (SOMs) and bidirectional artificial neural support vector) / classification
network (bi-ANN). Other IS mentioned are fuzzy rules, Personal injury protection claims Viaene, Derrig, Baesens and
artificial bio-computing systems, and adaptive neuro-fuzzy / neural network (multilayer Dedene (2002)
perceptron) / classification Viaene, Derrig and Dedene
inference system (ANFIS). Applications are focused either (2003)
to on-line and real-time security systems or to pre-billing Life insurance (financial distress Brockett, Golden, Jang and
systems that classify unusual behavior in consumption, call prediction) / neural network Yang (2006)
detail, and subscription information. (back-propagation, learning
vector quatization) / clustering

81
C. Medical care (e.g. few data with skewed distributions), or they try to
Medical care applications are focused mainly to general improve existing classifiers (e.g. evolutionary serach
practitioners’ practice patterns segmentation in order to algorithm is used to improve NN classifier).
detect inappropriate or unusual behavior to overcome the Following IS methods were used in order to achieve
growth in health expenditures. One application in dentist higher detection rate in a desired range of false detection
practice was also described. Authors use following IS rates: Binary support vector system (BSVS) that combines
methods: self-organizing maps (SOMs), multi-layer support vector machines (SVM) and the genetic algorithm
perception (MLP) network, genetic algorithm in combination (GA), and neural network classifier.
to K-nearest neighbor (KNN) algorithm. IS methods are TABLE V. CREDIT CARD APPLICATIONS
compared to experts’ classifications, and are used in
combination with other methods (e.g. Bayesian rules). All of Application / Method / Goal Authors
the applications focus on GP and dentist practice On-line fraud detection / genetic Dorronsoro, Ginel, Sanchez
segmentation that is used in order to detect characteristics of algorithm, neural network (self- and Cruz (1997)
organizing maps) / classification
potentially fraudulent behavior.
Identifying credit card frauds Chen, Chen and Lin (2006)
from few data with skewed
TABLE III. MEDICAL CARE APPLICATIONS
distributions / neural networks /
Application / Method / Goal Authors classification
Detecting credit card frauds / Kim and Kim (2002)
General practitioners’ (GPs’) He, Wang, Graco and
neural network / classification Park (2005)
practice patterns segmentation / Hawkings (1997)
neural network (multi-layer He, Graco and Yao (1989) F. Other areas
perception), genetic algorithm / Lin, Lin, Li and Kuo (2008)
classification Other applications comprehend a wide range. Detecting
Dentist practice profiles / neural Lin, Lin and Hong (2009) novelties in time series for fraud detection in financial
network (self-organizing maps) / systems are conducted with the usage of MLP networks and
clustering
classifiers. New approach to identity verification with brain
D. Auditing potentials during processing of visual stimuli is proposed,
and Elman neural network achieved very high recognition
IS methods are used in order to detect firms that issue
rage. IS were used to choose best decision strategy in
fraudulent financial statements (FFS) and in predicting
assessing the likelihood of the existence of defective pricing
corporate bankruptcy. Such prototypes would have proved
in defense contracts.
useful in cases such as Enron and WorldCom. Neural
network, genetic programming model, Bayesian belief TABLE VI. OTHER AREAS APPLICATIONS
networks (BBN) are used in auditing applications yielding
better predicting accuracy, better detecting power, less Application / Method / Goal Authors
misclassification cost. IS methods were compared to logit Detecting novelties in financial Oliviera and Meira (2006)
time series / neural network / Oliviera, Neto and Meirad
model and auditor judgments, and decision trees.
predictions (2004)
Identity verification with brain Palaniappan and Mandic
TABLE IV. AUDITING APPLICATIONS
potentials during processing of (2007)
Application / Method / Goal Authors visual stimuli / neural network
(Elman) / classification
Assessing the risk of Green and Choi (1997)
management fraud during Bid pricing fraud / neural Welch, Reeves and Welch
preliminary stage of audit / network (back propagation) / (1998)
neural network / classification classification
Detecting fake escrow websites / Abbasi and Chen (2009)
Fraudulent financial statements Lensberg, Ellifsen and McKee
and predicting bankruptcy / (2006) neural networks / classification
genetic programming; neural Kotsiantis, Koumanakos, Modeling conditions under Geng, Whinston and Zhang
network / classification; Tzelepis and Tampakas (2006) which electronic community (2004)
clustering Krikos, Spathis and lack fraud behavior /
Maholopoulos (2007) evolutionary game theory /
clustering
Potential accounting frauds in Yen (2007)
blue chip companies / neural
network / clustering IV. CITATION AND AUTHOR ANALYSIS
Predict fraud litigation for Chen, Huang and Kuo (2009) Research impact of the most influential authors and
assisting accountants oil audit
strategy making / neural network studies can be estimated based on a citation analysis.
/ classification Citation data (citation count) from Web of Science was
retrieved on November 1, 2009 for all 36 articles found.
E. Credit card transactions Data obtained from Web of Science on citation count per
Authors of the articles of usage of IS in credit card article suggests that 12 articles had none citations, 16
transactions stress by themselves that systems for detecting articles received citations under 10 times, and 8 articles
fraudulent claims are highly efficient already. However, were cited more than 10 times with the highest number of
articles focus on identifying frauds in non-typical situations citations of 31. Rather low number of citations for 12

82
articles is due to the fact that these are in most of the cases (Derrig and Notare) have contributed to 5 and 4 publications
articles written less than two years ago. Older articles were respectively. Other authors each contributed to three
more likely to have larger numbers of citations. Similar articles. Although not listed in the table, eight authors
research finding was also noted in other bibliographical contributed to two articles each and finally, the largest
studies. number of authors (69) contributed to one article each.
Journals with the highest number of articles are Expert
Systems with Applications (6 articles with 6 citations per TABLE VIII. AUTHORS WITH MORE THAN THREE ARTICLES

article in average) and Journal of Risk and Insurance (4 Author Application area No of Most recent affiliation
articles with 20.75 citations per article in average). (Gender) articles
RA Derrig OPAL Consulting
Articles with more than 10 citations come from all of the (M) insurance 5 LLC, Great Britain
areas of IS applications in fraud detection and prevention: MSMA Barddal University,
insurance, credit card transactions, auditing, Notare (F) telecommunications 4 Brazil
telecommunications and medical care. A University of Ottawa,
Boukerche Canada
An analysis is conducted to identify those authors who (M) telecommunications 3
published the most articles in the field of IS applications in G Dedene Katholieke Universiteit
fraud prevention and detection contained in the Web of (M) insurance 3 Leuven
science database. All publications naming the researcher S Viaene Katholieke Universiteit
(M) insurance 3 Leuven
were counted equally, which resulted in the combined count
of all authors being greater than the total number of articles. V. DISCUSSIONS

TABLE VII. ARTICLES WITH MORE THAN 10 CITATIONS A. Application areas


Article
No of Articles found are from the five main application areas.
citations Most of the articles describe applications of IS in
RA. Derrig and KM. Ostaszewski, „Fuzzy techniques of 31
pattern recognition in risk and claim classification“,
telecommunications (10 articles) which is due to the fact
Journal Of Risk And Insurance, Vol. 62 (3), 1995. that telecom companies are very interested in early detection
PL. Brockett, XH. Xia and RA. Derrig, „Using Kohonen's 29 of fraudulent activity of its clients. Insurance and auditing
self-organizing feature map to uncover automobile bodily have the same number of articles (6 article each), and these
injury claims fraud“, Journal Of Risk And Insurance, Vol.
65 (2), 1998. are the second largest areas of applications. The least
JR. Dorronsoro, F. Ginel, C. Sanchez and CS. Cruz, 23 number of articles come from the credit card transactions
„Neural fraud detection in credit card operations“, IEEE and medical fraud (4 articles each). Other applications
Transactions On Neural Networks 8 (4), 1997. encompass e-business, identity verification, and bidding.
S. Viaene, RA. Derrig, B. Baesens and G. Dedene, „A 21
comparison of state-of-the-art classification techniques for Although we could expect that authors that are experts in
expert automobile insurance claim fraud detection“, particular IS method could contribute to more different
Journal Of Risk And Insurance, Vol. 69 (3), 2002. areas. However, all of the authors that appear in the
BP. Green and JH. Choi, „Assessing the risk of 20 literature with more than one article wrote articles on the
management fraud through neural network technology“,
Auditing-A Journal Of Practice & Theory, Vol. 16 (1), same field of applications.
1997.
T. Lensberg, A. Eilifsen and TE. McKee, „Bankruptcy 13
B. Methods used
theory development and classification via genetic Neural networks are the method that is most often used
programming“, European Journal Of Operational for the fraud prevention and detection, while fuzzy rules and
Research, Vol. 169 (2), 2006.
P. Burge and J. Shawe-Taylor, „An unsupervised neural 13 genetic algorithms are used only in few cases. IS are used in
network approach to profiling the behavior of mobile most cases for classification purpose, while clustering is the
phone users for use in fraud detection“, Journal Of Parallel goal of IS usage in several cases in telecommunications,
And Distributed Computing, Vol. 61 (7), 2001. insurance and auditing application areas. In few cases two
HX. He, JC. Wang, W. Graco and S. Hawkins, 11
„Application of neural networks to detection of medical or more IS methods were integrated in the fraud detection
fraud“, Expert Systems With Applications, Vol. 13 (4), and prevention applications, and in other cases IS methods
1997. were integrated with other machine learning or statistical
methods. In the future we expect more integration of
For presenting the findings of this study, only those methodologies and cross-interdisciplinary research to
authors who have published three or more articles are develop applications of IS methods in fraud prevention and
included in the list. A total of 82 authors contributed to the detection.
36 articles found. Table VIII. lists the five most productive Most of the articles describes IS applications in fraud
authors, ordered according to the number of articles found prevention before the damage is already done. One example
in the Web of science on topic of IS applications in fraud is that IS system is applied in fraud prevention at the
detection and prevention, with only one female author moment when the client asks for her premium, which is
among them. The findings suggest that only two authors tested against fraud. Other example is that the neural

83
network is used to conduct identity verification in the http://www.acfe.com/documents/occupational-fraud.pdf. Accessed:
08-11-2009.
moment when somebody else is trying to use the system
[3] P.E. Johnson, S. Grazioli, K. Jamal, K. „Fraud detection –
(faking to be somebody else). In most of the cases usage of intelionality and deception in cognition“, Accounting organizations
IS is proposed instead of other technique in already existing and society, vol. 18, 1993, no. 5, pp.467-488.
system (usually experts’ judgment). Exceptions encompass [4] P.E. Johnson, S. Grazioli, K. Jamal, R.G. Berryman (2001).
modeling the best decision-making approach and/or “Detecting deception: adversarial problem solving in a low base-rate
modeling characteristics of such electronic community that world”, Cognitive Science
is highly resistant to fraud. [5] M.J. Cerullo, M.V. Cerulo, “Conducting A Financial Audit In An
Automated Environment”, Computer Audit Update, vol 1997, Sept.
C. Limitations 1997, pp.8-16.
[6] I.J. Rudas, J. Fodor, “Intelligent Systems”, International Journal of
A literature review for the broad category of IS Computers, Communications & Control, vol. 3, 2008, pp. 132-138
applications in fraud prevention and detection is a difficult [7] E. Turban, J.E. Aronson, T. Liang, R. Sharda, Decision Support
task due to the extensive background knowledge needed for Systems and Intelligent Systems, 6th edn. Englewood Cliffs, NJ.:
collecting, studying and classifying these articles. Altough Prentice Hall, 2006.
limited in background knowledge, this paper makes a brief [8] Fadlalla and CH. Lin, „An analysis of the applications of neural
literature review of IS applications in order to explore networks in finance“, Interfaces, Vol. 31 (4), 2001, pp. 112-122,
LINTHICUM HTS, INST OPERATIONS RESEARCH
applications in fraud and detection. We focused only to the MANAGEMENT SCIENCES
articles cited in Web of science (SSCI, SCI and A&HCI) [9] M.J. MacKinnon, N. Glick, „Data mining and knowledge discovery
database, and more extensive research that would include in databases - An overview“. Australian & New Zealand Journal Of
other databases as well as other academic Statistics, vol. 41, no. 3, 1999, pp. 255-275, OXFORD,
BLACKWELL PUBL LTD
journals/magazines, practical articles and reports. These
[10] DS. Zhang and L. Zhou, „Discovering golden nuggets: Data mining
would have provided more complete information to explore in financial application“, IEEE Transactions On Systems Man And
IS applications in fraud prevention and detection. In Cybernetics Part C-Applications And Review, Vol. 34 (4), 2004, pp.
addition, non-English publications are not considered in this 513-522, doi: 10.1109/TSMCC.2004.829279, PISCATAWAY, IEEE-
survey. Some other articles may have implemented IS INST ELECTRICAL ELECTRONICS ENGINEERS INC
methods without words neural, fuzzy, genetic and evolution [11] B, Baesens, C. Mues, D. Martens and J. Vanthienen, „50 years of data
mining and OR: upcoming trends and challenges“. Journal Of The
in title, keywords or abstract, so this paper might not find Operational Research Society, Vol. 60, 2009, pp.16-23, doi:
these reference sources. Therefore, the limitation of this 10.1057/jors.2008.171, Suppl. 1.BASINGSTOKE, PALGRAVE
article is the author’s limited knowledge in focusing on the MACMILLAN LTD
overall usage of IS in fraud detection and prevention. [12] A. Boukerche and MSMA. Notare, „Neural fraud detection in mobile
phone operations“, Parallel And Distributed Processing, Proceedings
VI. CONCLUSIONS 1800, 2000, pp. 636-644, edited by Rolim, J.BERLIN, SPRINGER-
VERLAG BERLIN
Fraud prevention and detection is a broad category of [13] A. Boukerche and MSMA. Notare, „Behavior-based intrusion
research issues. Some specific methodologies and methods detection in mobile phone systems“, Journal Of Parallel And
are presented as examples for exploring the suggestions and Distributed Computing, Vol. 62 (9), 2002, pp. 1476-1490, doi:
10.1006/jpdc.2002.1857, SAN DIEGO, ACADEMIC PRESS INC
solutions to specific fraud detection and prevention problem ELSEVIER SCIENCE
domains. Methodologies of fraud detection and prevetion [14] Boukerche, KRL. Juca, JB. Sobral and MSMA. Notare, „An artificial
are attracting much attention and efforts, both academia and immune based intrusion detection model for computer and
practical. telecommunication systems“, Parallel Computing, Vol. 30 (5-6),
2004, pp. 629-646, doi: 10.1016/j.parco.2003.12.008,
Intelligent systems provide powerful and flexible means AMSTERDAM, ELSEVIER SCIENCE BV
for obtaining solutions to a variety of problems that often [15] P. Burge and J. Shawe-Taylor, „An unsupervised neural network
cannot be dealt with by other methods. approach to profiling the behavior of mobile phone users for use in
Literature review on the usage of intelligent systems fraud detection“, Journal Of Parallel And Distributed Computing,
usage in fraud detection and prevention has been conducted Vol. 61 (7), 2001, pp. 915-925, SAN DIEGO, ACADEMIC PRESS
INC
based on the articles cited in Web of science database.
[16] H. Grosser, P. Britos and R. Garcia-Martinez, „Detecting fraud in
Survey on research articles indicated that IS applications in mobile telephony using neural networks“. Innovations In Applied
fraud detection and prevention are diversified due to Artificial Intelligence, Vol. 3533, 2005, pp. 613-615, edited by Ali,
problem domains, and that their applications are proving to M; Esposito, F.BERLIN, SPRINGER-VERLAG BERLIN
be critical in the process of fraud detection and prevention. [17] CS. Hilas and JN. Sahalos, „Testing the fraud detection ability of
different user profiles by means of FF-NN classifiers“. Artificial
REFERENCES Neural Networks – Icann, Vol. 2 4132, 2006, pp. 872-883, edited by
Kollias, S; Stafylopatis, A; Duch, W; Oja, E.BERLIN, SPRINGER-
[1] M. Levi and M. Burrows, "Measuring the impact of fraud in the UK: VERLAG BERLIN
a conceptual and empirical journey", British Journal of Criminology, [18] PA. Estevez, CM. Held and CA. Perez, „Subscription fraud
vol. 48, 2008, no.3, pp.293-318.
prevention in telecommunications using fuzzy rules and neural
[2] Association of Certified Fraud Examiners, „Occupational Fraud:A networks“, Expert Systems With Applications, Vol. 31 (2), 2006, pp.
Study of the Impact of an Economic Recession, 2009. Available at: 337-344, doi: 10.1016/j.eswa.2005.09.028, OXFORD, PERGAMON-
ELSEVIER SCIENCE LTD

84
[19] MAB. Bella, JHP. Eloff and MS. Olivier, „A fraud management [34] S. Kotsiantis, E. Koumanakos, D. Tzelepis and V. Tampakas,
system architecture for next-generation networks“. Forensic Science „Financial application of neural networks: Two case studies in
International Vol. 185 (1-3), 2009, pp. 51-58.CLARE, doi: Greece“. Artificial Neural Networks - Icann 2006, Vol. 2 4132: 2006,
10.1016/j.forsciint.2008.12.013, ELSEVIER IRELAND LTD pp. 672-681, edited by Kollias, S; Stafylopatis, A; Duch, W; Oja,
[20] M. Sanver and A. Karahoca, „Fraud Detection Using an Adaptive E.BERLIN, SPRINGER-VERLAG BERLIN
Neuro-Fuzzy Inference System in Mobile Telecommunication [35] E. Kirkos, C. Spathis and Y. Manolopoulos, „Data mining techniques
Networks“, Journal of multiple-valued logic and soft computing, Vol. for the detection of fraudulent financial statements“, Expert Systems
15 (2-3), 2009, pp. 155-179, sp. iss. si.Philadelphia, Old City With Applications, Vol. 32 (4), 2007, pp. 995-1003, doi:
Publishing Inc 10.1016/j.eswa.2006.02.016, OXFORD, PERGAMON-ELSEVIER
[21] Krenker, M. Volk, U. Sedlar, J. Bester and A. Kos, „Bidirectional SCIENCE LTD
Artificial Neural Networks for Mobile-Phone Fraud Detection“. Etri [36] ECC. Yen, „Warning signals for potential accounting frauds in blue
Journal, Vol. 31 (1), 2009, pp. 92-94, TAEJON, ELECTRONICS chip companies - An application of adaptive resonance theory“,
TELECOMMUNICATIONS RESEARCH INST Information Sciences, Vol. 177 (20), 2007, pp. 4515-4525, doi:
[22] RA. Derrig and KM. Ostaszewski, „Fuzzy techniques of pattern 10.1016/j.ins.2007.03.034, NEW YORK, ELSEVIER SCIENCE INC
recognition in risk and claim classification“, Journal Of Risk And [37] HJ. Chen, SY. Huang and CL. Kuo, „Using the artificial neural
Insurance, Vol. 62 (3), 1995, pp. 447-482, MT VERNON, AMER network to predict fraud litigation: Some empirical evidence from
RISK INSURANCE ASSOC, INC emerging markets“. Expert Systems With Applications, Vol. 36 (2),
[23] PL. Brockett, XH. Xia and RA. Derrig, „Using Kohonen's self- 2009, pp. 1478-1484, doi: 10.1016/j.eswa.2007.11.030, Part
organizing feature map to uncover automobile bodily injury claims 1.OXFORD, PERGAMON-ELSEVIER SCIENCE LTD
fraud“, Journal Of Risk And Insurance, Vol. 65 (2), 1998, pp. 245- [38] JR. Dorronsoro, F. Ginel, C. Sanchez and CS. Cruz, „Neural fraud
274, MT VERNON, AMER RISK INSURANCE ASSOC, INC detection in credit card operations“, IEEE Transactions On Neural
[24] S. Viaene, G. Dedene and RA. Derrig, „Auto claim fraud detection Networks 8 (4), 1997, pp. 827-834, NEW YORK, IEEE-INST
using Bayesian learning neural networks“, Expert Systems With ELECTRICAL ELECTRONICS ENGINEERS INC
Applications, Vol. 29 (3), 2005, pp. 653-666, doi: [39] RC. Chen, TS. Chen and CC. Lin, „A new binary support vector
10.1016/j.eswa.2005.04.030, OXFORD, PERGAMON-ELSEVIER system for increasing detection rate of credit card fraud“,.
SCIENCE LTD International Journal Of Pattern Recognition And Artificial
[25] S. Viaene, R. Derrig and G. Dedene, „MLP-ARD vs. logistic Intelligence, Vol. 20 (2), 2006, pp. 227-239, SINGAPORE, WORLD
regression and C4.5 for PIP claim fraud explication“, Insurance SCIENTIFIC PUBL CO PTE LTD
Mathematics & Economics, Vol. 32 (1), 2003, pp. 154- [40] MJ. Kim and TS. Kim, „A neural classifier with fraud density map
154.AMSTERDAM, ELSEVIER SCIENCE BV for effective credit card fraud detection“, Intelligent Data Engineering
[26] S. Viaene, RA. Derrig, B. Baesens and G. Dedene, „A comparison of And Automated Learning – Ideal, Vol. 2002 2412, 2002, pp. 378-383,
state-of-the-art classification techniques for expert automobile edited by Yin, H; Allinson, N; Freeman, R; Keane, J; Hubbard,
insurance claim fraud detection“, Journal Of Risk And Insurance, S.BERLIN, SPRINGER-VERLAG BERLIN
Vol. 69 (3), 2002, pp. 373-421, OXFORD, BLACKWELL PUBL [41] LJ. Park, „Learning of neural networks for fraud detection based on a
LTD partial area under curve“, Advances In Neural Networks, Pt 2,
[27] PL. Brockett, LL. Golden, JH. Jang and CH. Yang, „A comparison of Proceedings 3497, 2005, pp. 922-927, edited by Wang, J; Liao, X;
neural network, statistical methods, and variable choice for life Wang, J.BERLIN, SPRINGER-VERLAG BERLIN
insurers' financial distress prediction“, Journal Of Risk And Insurance [42] ALI. Oliveira and SRL. Meira, „Detecting novelties in time series
Vol. 73 (3), 2006, pp. 397-419, OXFORD, BLACKWELL through neural networks forecasting with robust confidence
PUBLISHING intervals“, Neurocomputing, Vol. 70 (1-3), 2006, pp. 79-92, doi:
[28] HX. He, JC. Wang, W. Graco and S. Hawkins, „Application of neural 10.1016/j.neucom.2006.05.008, AMSTERDAM, ELSEVIER
networks to detection of medical fraud“, Expert Systems With SCIENCE BV
Applications, Vol. 13 (4), 1997, pp. 329-336.OXFORD, [43] ALI. Oliveira, FBL. Neto and SRL. Meira, „Combining MLP and
PERGAMON-ELSEVIER SCIENCE LTD RBF neural networks for novelty detection in short time series“,
[29] HX. He, W. Graco and X. Yao, „Application of genetic algorithm and Micai 2004: Advances In Artificial Intelligence, Vol. 2972, 2004, pp.
k-nearest neighbour method in medical fraud detection“, Simulated 844-853, edited by Monroy, R; ArroyoFigueroa, G; Sucar, LE; Sossa,
Evolution And Learning, Vol. 1585, 1999, pp. 74-81, edited by H.BERLIN, SPRINGER-VERLAG BERLIN
McKay, B; Yao, X; Newton, CS; Kim, JH; Furuhashi, T.BERLIN, [44] R. Palaniappan and DP. Mandic, „EEG based biometric framework
SPRINGER-VERLAG BERLIN for automatic identity verification“, Journal Of Vlsi Signal Processing
[30] Lin, CM. Lin, ST. Li and SC. Kuo, „Intelligent physician Systems For Signal Image And Video Technology, Vol. 49 (2),
segmentation and management based on KDD approach“, Expert 2007, pp. 243-250, doi: 10.1007/s11265-007-0078-1,
Systems With Applications, Vol. 34 (3): 2008, pp. 1963-1973, doi: DORDRECHT,SPRINGER
10.1016/j.eswa.2007.02.038, OXFORD, PERGAMON-ELSEVIER [45] OJ. Welch, TE. Reeves and ST. Welch, „Neural network model: Bid
SCIENCE LTD pricing fraud“, Journal Of Computer Information Systems, Vol. 38
[31] CH. Lin, CM. Lin and CW. Hong, „The development of dentist (3), 1998, pp. 99-104,STILLWATER, INT ASSOC COMPUTER
practice profiles and management“, Journal Of Evaluation In Clinical INFO SYSTEM
Practice, Vol. 15 (1), 2009, pp. 4-13, doi: 10.1111/j.1365- [46] A. Abbasi and HC. Chen, „A comparison of fraud cues and
2753.2007.00940.x, MALDEN, WILEY-BLACKWELL classification methods for fake escrow website detection“,
PUBLISHING, INC Information Technology & Management, Vol. 10 (2-3), 2009, pp. 83-
[32] BP. Green and JH. Choi, „Assessing the risk of management fraud 101, doi: 10.1007/s10799-009-0059-0, Sp. Iss. SI.NEW YORK,
through neural network technology“, Auditing-A Journal Of Practice SPRINGER
& Theory, Vol. 16 (1), 1997, pp. 14-28.SARASOTA, AMER [47] XJ. Geng, AB. Whinston and H. Zhang, „Health of electronic
ACCOUNTING ASSOC communities: An evolutionary game approach“, Journal Of
[33] T. Lensberg, A. Eilifsen and TE. McKee, „Bankruptcy theory Management Information Systems, Vol. 21 (3), 2004, pp. 83-110,
development and classification via genetic programming“, European ARMONK, M E SHARPE INC
Journal Of Operational Research, Vol. 169 (2), 2006, pp. 677-697,
doi: 10.1016/j.ejor.2004.06.013, AMSTERDAM, ELSEVIER
SCIENCE BV

85

Das könnte Ihnen auch gefallen