Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Journal

2015 | 2 (59) | 7-24

Article title

Profile of the Fraudulent Customer

Content

Title variants

Languages of publication

EN

Abstracts

EN
When there is an economic downturn, financial crime proliferates and people are more likely to commit fraud. One of the most common frauds is when a loan is secured without any intention of repaying it. Credit crime is a significant risk to financial institutions and has recently led to increased interest in fraud prevention systems. The most important features of such systems are the determinants (warning signals) that allow you to identify potentially fraudulent transactions. The purpose of this paper is to identify warning signals using the following data mining techniques - logistic regression, decision trees and neural networks. Proper identification of the determinants of a fraudulent transaction can be useful in further analysis, i.e. in the segmentation process or assignment of fraud likelihood. Data obtained in this way allows profiles to be defined for fraudulent and non-fraudulent applicants. Various fraud-scoring models have been created and presented.

Journal

Year

Issue

Pages

7-24

Physical description

Contributors

author
  • Warsaw School of Economics
  • Warsaw School of Economics

References

  • 1. Hand, D.J. (2007): Mining personal banking data to detect fraud. In Selected Contributions in Data Analysis and Classification, ed. P Brito, P Bertrand, G. Cucumel, F. de Carvalho, Berlin: Springer, pp. 377-386.
  • 2. Bolton, R.J., Hand, D.J. (2002): Statistical Fraud Detection: A Review, Statistical Sciences Vol. 17, Issue 3, pp. 235-255.
  • 3. Delamaire, L., Abdou, H., Pointon, J., (2009): Credit card fraud and detection techniques: A review, Banks and Bank Systems, Vol. 4, Issue 2.
  • 4. Dorfleitner, G., Jahnes, H. (2014): What factors drive personal loan fraud? Evidence from Germany, Review of Managerial Science, 1/8, pp. 89-119.
  • 5. Dorronsoro, J.R., Ginel, F., Sanchez, C., Cruz, C.S. (1997): Neural fraud detection in credit card operations, Neural Networks, IEEE Transactions on In Neural Networks, Vol. 8, No. 4, pp. 827-834.
  • 6. Hartmann-Wendels, Т., Mählmann, Т., Versen Т. (2009): Determinants of banks' risk exposure to new account fraud - Evidence from Germany, Journal of Banking & Finance, 01.
  • 7. King, G., Zeng, L. (2001): Logistic Regression in Rare Events Data, Political Analysis, No. 9, pp. 137-163.
  • 8. Fawcett, Т., Provost, E (1997): Adaptive Fraud Detection, Data Mining and Knowledge Discovery, Vol. 1, No. 3, pp. 291-316.
  • 9. Mählmann, Т. (2010): On the correlation between fraud and default risk, Zeitschrift für Betriebswirtschaft, December, Volume 80, Issue 12, pp. 1325-1352.
  • 10. Wheeler, R., Aitken, S. (2000): Multiple algorithms for fraud detection, Knowledge-Based Systems, April, Vol. 13, No. 2-3, pp. 93-99.
  • 11. Whitrow, G, Hand, D.J., Juszczak, E, Weston, D., Adams, N. (2009): Transaction aggregation as a strategy for credit card fraud detection, Data Mining and Knowledge Discovery, Volume 18, Issue 1, pp. 30-55.
  • 12. Sandrej I. (2005): Credit Fraud in retail banking, Narodna Banka Slovenska, Eurosystem, No 8.
  • 13. Bolton, R.J., Hand, D.J. (2001): Unsupervised Profiling Methods for Fraud Detection, Credit Scoring and Credit Control VII, Edinburgh, UK, 20012.
  • 14. Phua, С., Lee, V, Smith, K. and Gayler, R., A comprehensive survey of data mining-based fraud detection research, The Smithsonian/NASA Astrophysics Data System, 2010, September, http://adsabs.harvard.edu/abs/2010arXivl009.6119P accessed 01/06/2013.
  • 15. Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P (1997): Credit card fraud detection using meta-learning: Issues and initial results, AAA! Workshop on AI Approaches to Fraud Detection and Risk Management.
  • 16. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/118530/ annual-fraud-indicator-2012.pdf, accessed 01/06/2013.
  • 17. http://www.cifas.org.uk/application_fraud_novtwelve, accessed 01/06/2013.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-bf2cb1b1-9a0f-4068-bbb1-8a8c8f5d1f76
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.