A survey of payment challenges in fraud detection in digital transactions methodologies
Keywords:
credit card, master card, visa, database, cardholdersAbstract
Any theft of the real card (Credit) or the arrangement of the card data, or potentially cardholder data, is the start of a Visa fraud. A vendor store agent duplicating deal receipts is one example of a tradeoff that can occur in a variety of ways. Because of the wide geographic reach that security lapses on databases holding MasterCard data might have, security lapses on databases including MasterCard data can be particularly large and costly. In one example in 2005, 40 million Visa customer accounts were stolen as a result of a single trade off of a massive database including charge card information. This had global consequences since fresh cards had to be issued to a huge number of cardholders all over the world. There are mays of credit card fraud, in this paper I concentrate some of them. Now a days we are facing a risk in payment of card, everyday payment for the exchange has been increasing as a result of the rising technique of instalment type and the introduction of new channels for the exchange.
Downloads
References
https://www.onespan.com/topics/fraud-prevention.
https://www.sas.com/en_us/insights/fraud/fraud-prevention.html.
Hoogs, B., Kiehl, T., Lacomb, C., & Senturk, D. (2007). A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud, Intelligent Systems in Accounting, Finance and Management, 2007, vol. 15: 41-56.
http://financial-dictionary.thefreedictionary.com.
Yogeesh N. "Study on Clustering Method Based on K-Means Algorithm." Journal of Advances and Scholarly Researches in Allied Education (JASRAE), vol. 17, no. 1, 2020, pp. 485-489(5), www.ignited.in//I/a/305304.
http://rapidminer.com/products/rapidminer-studio/.
Yogeesh N. "Mathematical Approach to Representation of Locations Using K-Means Clustering Algorithm." International Journal of Mathematics And its Applications (IJMAA), vol. 9, no. 1, 2021, pp. 127-136.
http://spreadsheets.about.com/od/tipsandfaqs/f/excel_use.html.
Huang, X. (2006). Research on Public Company Accounting Fraud and regulation-from perspective of protecting investors.
Yogeesh N. "A Study of Solving Linear System of Equations by GAUSS-JORDAN Matrix Method-An Algorithmic Approach." Journal of Emerging Technologies and Innovative Research (JETIR), vol. 3, no. 5, 2016, pp. 314-321.
I. Yeh, C. Lien, The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients, Expert Systems with Applications 36 (2) (2008) 2473–2480.
J. Li, K. Huang, J. Jin, J. Shi, A survey on statistical methods for health care fraud detection, Health Care Management Science 11 (3) (2008) 275–287.
J. Pearl, Probabilistic Reasoning in Intelligent Systems, Morgan Kaufmann, 1988.
Jack C. Robertson, Timothy J. Louwers, Auditing, Irwin/McGraw- Hill, 1999.
Jiawei Han and Micheline Kamber, Second Edition (2010), ―Data Mining, Concepts and Techniques‖, Morgan Kaufmann, An imprint of Elsevier (San Francisco).
Joseph T. Wells ,Principles of fraud examination John Wiley, 2005
Yogeesh N. "Mathematics Application on Open Source Software." Journal of Advances and Scholarly Researches in Allied Education [JASRAE], vol. 15, no. 9, 2018, pp. 1004-1009(6), www.ignited.in/p/304819.
Joseph T. Wells, Fraud examination, investigative and audit procedures, Quorum Books, 1992.
Girija D.K & M. S. Shashidhara Data mining techniques used for uterus fibroid diagnosis and prognosis In Kottayam, India, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), INSPEC Accession Number: 13567035.
Girija D.K & M. S. Shashidhara Data mining approach for prediction of fibroid disease using neural networks, Bangalore, India, 2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA), INSPEC Accession Number: 14130830.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








