A survey of payment challenges in fraud detection in digital transactions methodologies

https://doi.org/10.53730/ijhs.v6nS3.5927

Authors

  • Shilpa H. K. Research Scholar, MUIT, Lucknow
  • Manish Varshney Professor, Maharishi School of Engineering & Technology, MUIT, Lucknow

Keywords:

credit card, master card, visa, database, cardholders

Abstract

Any theft of the real card (Credit) or the arrangement of the card data, or potentially cardholder data, is the start of a Visa fraud. A vendor store agent duplicating deal receipts is one example of a tradeoff that can occur in a variety of ways. Because of the wide geographic reach that security lapses on databases holding MasterCard data might have, security lapses on databases including MasterCard data can be particularly large and costly. In one example in 2005, 40 million Visa customer accounts were stolen as a result of a single trade off of a massive database including charge card information. This had global consequences since fresh cards had to be issued to a huge number of cardholders all over the world. There are mays of credit card fraud, in this paper I concentrate some of them. Now a days we are facing a risk in payment of card, everyday payment for the exchange has been increasing as a result of the rising technique of instalment type and the introduction of new channels for the exchange. 

Downloads

Download data is not yet available.

References

https://www.onespan.com/topics/fraud-prevention.

https://www.sas.com/en_us/insights/fraud/fraud-prevention.html.

Hoogs, B., Kiehl, T., Lacomb, C., & Senturk, D. (2007). A genetic algorithm approach to detecting temporal patterns indicative of financial statement fraud, Intelligent Systems in Accounting, Finance and Management, 2007, vol. 15: 41-56.

http://financial-dictionary.thefreedictionary.com.

Yogeesh N. "Study on Clustering Method Based on K-Means Algorithm." Journal of Advances and Scholarly Researches in Allied Education (JASRAE), vol. 17, no. 1, 2020, pp. 485-489(5), www.ignited.in//I/a/305304.

http://rapidminer.com/products/rapidminer-studio/.

Yogeesh N. "Mathematical Approach to Representation of Locations Using K-Means Clustering Algorithm." International Journal of Mathematics And its Applications (IJMAA), vol. 9, no. 1, 2021, pp. 127-136.

http://spreadsheets.about.com/od/tipsandfaqs/f/excel_use.html.

Huang, X. (2006). Research on Public Company Accounting Fraud and regulation-from perspective of protecting investors.

Yogeesh N. "A Study of Solving Linear System of Equations by GAUSS-JORDAN Matrix Method-An Algorithmic Approach." Journal of Emerging Technologies and Innovative Research (JETIR), vol. 3, no. 5, 2016, pp. 314-321.

I. Yeh, C. Lien, The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients, Expert Systems with Applications 36 (2) (2008) 2473–2480.

J. Li, K. Huang, J. Jin, J. Shi, A survey on statistical methods for health care fraud detection, Health Care Management Science 11 (3) (2008) 275–287.

J. Pearl, Probabilistic Reasoning in Intelligent Systems, Morgan Kaufmann, 1988.

Jack C. Robertson, Timothy J. Louwers, Auditing, Irwin/McGraw- Hill, 1999.

Jiawei Han and Micheline Kamber, Second Edition (2010), ―Data Mining, Concepts and Techniques‖, Morgan Kaufmann, An imprint of Elsevier (San Francisco).

Joseph T. Wells ,Principles of fraud examination John Wiley, 2005

Yogeesh N. "Mathematics Application on Open Source Software." Journal of Advances and Scholarly Researches in Allied Education [JASRAE], vol. 15, no. 9, 2018, pp. 1004-1009(6), www.ignited.in/p/304819.

Joseph T. Wells, Fraud examination, investigative and audit procedures, Quorum Books, 1992.

Girija D.K & M. S. Shashidhara Data mining techniques used for uterus fibroid diagnosis and prognosis In Kottayam, India, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), INSPEC Accession Number: 13567035.

Girija D.K & M. S. Shashidhara Data mining approach for prediction of fibroid disease using neural networks, Bangalore, India, 2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA), INSPEC Accession Number: 14130830.

Published

13-04-2022

How to Cite

Shilpa, H. K., & Varshney, M. (2022). A survey of payment challenges in fraud detection in digital transactions methodologies. International Journal of Health Sciences, 6(S3), 2041–2052. https://doi.org/10.53730/ijhs.v6nS3.5927

Issue

Section

Peer Review Articles