CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Overview of Fraud Prevention & Management

Published on March 2012 by Rashmi G.Dukhi, Sandhya Dahake
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 13
March 2012
Authors: Rashmi G.Dukhi, Sandhya Dahake
d90e74a2-6b77-413e-95b1-6fb9ede1c269

Rashmi G.Dukhi, Sandhya Dahake . Overview of Fraud Prevention & Management. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 13 (March 2012), 4-7.

@article{
author = { Rashmi G.Dukhi, Sandhya Dahake },
title = { Overview of Fraud Prevention & Management },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 13 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 4-7 },
numpages = 4,
url = { /proceedings/ncipet/number13/5286-1098/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Rashmi G.Dukhi
%A Sandhya Dahake
%T Overview of Fraud Prevention & Management
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 13
%P 4-7
%D 2012
%I International Journal of Computer Applications
Abstract

Credit Card Fraud is one of the biggest threats to business establishments today. To combat the fraud effectively, it is important to first understand the mechanisms of executing a fraud. The purpose of this white paper is to study different types of frauds,how fraudsters attempt to take advantage of loopholes,impact of credit card fraud on card holders, merchants, issuers, fraud detection system could help maintain the cost of detecting fraud techniques, how skimming works & use of Neural networks in fraud detection.

References
  1. .Transnational Credit Card Frauds http://www.ex.ac.uk/politics/pol_data/undergrad/owsylves/index.htm
  2. .Credit / Debt Management http://credit.about.com/cs/fraud/
  3. .Duncan M D G. 1995. The Future Threat of Credit Card Crime, RCMP Gazette, 57 (10): 25–26.
  4. .P Chan, W Fan, A Prodromidis & S Stolfo. 1999. Distributed data mining in credit card fraud detection, IEEE Intelligent Systems, 14(6): 67–74.
  5. .2001. Fraud Prevention Reference Guide, Anonymous, Certegy, September 2001.
  6. .Bill Rini. 2002.White Paper on Controlling Online Credit Card Fraud, Window Six, January 2002. http://www.windowsix.com
  7. .Austin Jay Harris & David C Yen. 2002. Biometric Authentication- Assuring access to Information,Information Management & Computer Security, 10(1): 12–19.
  8. .Maguire S. 2002. Identifying Risks During Information System Development: Managing the Process, Information Management & Computer Security, 10(3): 126–134.
  9. .2002. White Paper on Efficient Risk Management for Online Retail, ClearCommerce Product Management, ClearCommerce Corporation, September 2002. http://www.clearcommerce.com Van Leeuwen. 2002. A Surge in Credit Card Fraud, H. Financial Review, 24 September, p.49.
  10. .2002. Online Fruad Report – Online Credit Card Fraud Trends and Merchant‘s Response, Mindware Research Group, CyberSource. http://www.cybersource.com
  11. Hansen, J. V., McDonald, J. B., Messier, W. F., & Bell, T. B. A generalized qualitative – response model and the analysis of management fraud. Management Science, 42(7), 1022-1032, 1996.
  12. Martin, D. Early warning of bank failure: A logit regression approach. Journal of Banking and Finance, 1, 249–276, 1997.
  13. Ohlson, J.A. Financial ratios and probabilistic prediction of bankruptcy. Journal of Accounting Research, 18(1), 109–131, 1980.
  14. Quinlan J.R. C4.5 Programs for Machine Learning, Morgan Kaufmann, San Mateo, CA. 1993.
  15. Quinlan J.R. Introduction to decision trees. Mach Learning;1(1):81–106, 1986.
  16. Rumelhart D.E. McClelland J.L. Parallel Distributed Processing. Experiments in the Microstructure of Cognition, MIT Press, Cambridge, MA, 1986.
  17. M.J. Kim and T.S. Kim, ?A Neural Classifier with Fraud Density Map for Effective Credit Card Fraud Detection,? Proc. Int‘l Conf.Intelligent Data Eng. and Automated Learning, pp. 378-383, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

counterfeit doctored cards embossing holograms Redbox kiosks