A Survey on Digital Fraud Risk Control Management by Automatic Case Management System
PDF
PDF

How to Cite

Haoxiang, Wang, and S. Smys. 2021. “A Survey on Digital Fraud Risk Control Management by Automatic Case Management System”. Journal of Electrical Engineering and Automation 3 (1): 1-14. https://doi.org/10.36548/jeea.2021.1.001.

Keywords

— Digital fraud
— risk control management
Published: 10-05-2021

Abstract

In this digital era, a huge amount of money had been laundered via digital frauds, which mainly occur in the timeframe of electronic payment transaction made by first-time credit/debit card users. Currently, Finance organizations are facing several fraud attempts and it likely happens due to the current infrastructure, which only has an older database.. The current infrastructure diminishes the working environment of any finance organization sector with frequent fraud attempts. In this perspective, the roposed research article provides an overview for the development of an automated prevention system for any finance organization to protect it from any fraudulent attacks. The proposed automated case management system is used to monitor the expenses of the behavior study of users by avoiding the undesirable contact. The proposed research work develops a new management procedure to prevent the occurrence of electronic fraud in any finance organization. The existing procedure can predict digital fraud with an old updated database. This creates disaster and destructive analysis of the finance segment in their procedure. The cyber fraud phenomenon prediction is used to predict the fraud attempt with content-based analysis. The lack of resources is one of the enormous challenges in the digital fraud identification domain. The proposed scheme addresses to integrate all safety techniques to safeguard the stakeholders and finance institutions from cyber-attacks.

References

  1. D. Rahmawati, R. Sarno, C. Fatichah, and D. Sunaryono, ‘‘Fraud detection on event log of bank financial credit business process using hidden Markov model algorithm,’’ in Proc. 3rd Int. Conf. Sci. Inf. Technol. (ICSITech), Oct. 2017, pp. 35–40.
  2. H. A. Hartanto, R. Sarno, and N. F. Ariyani, ‘‘Linked warning criterion on ontology-based key performance indicators,’’ in Proc. Int. Seminar Appl. Technol. Inf. Commun. (ISemantic), Aug. 2016, pp. 211–216.
  3. W. M. P. van der Aalst, ‘‘Business process management: A comprehensive survey,’’ ISRN Softw. Eng., vol. 2013, pp. 1–37, Aug. 2013.
  4. R. Nisbet, G. Miner, and K. Yale, ‘‘Fraud detection,’’ in Handbook of Statistical Analysis and Data Mining Applications. Amsterdam, The Netherlands: Elsevier, 2018, pp. 289–302.
  5. A. Misra and V. Walden, ‘‘Proactive fraud analysis,’’ Intern. Audit., vol. 73, no. 2, pp. 33–37, 2016.
  6. T. Seyffarth, S. Kühnel, and S. Sackmann, ‘‘A taxonomy of compliance processes for business process compliance,’’ in Proc. BPM, vol. 297, 2017, pp. 71–87.
  7. G. D. Moyes, R. Young, and H. F. M. Din, ‘‘Malaysian internal and external auditor perceptions of the effectiveness of red flags for detecting fraud,’’ Int. J. Auditing Technol., vol. 1, no. 1, p. 91, 2013.
  8. R. Sarno and F. P. Sinaga, ‘‘Business process anomaly detection using ontology-based process modelling and multi-level class association rule learning,’’ in Proc. Int. Conf. Comput., Control, Informat. Appl. (ICINA), Oct. 2015, pp. 12–17.
  9. S. Huda, T. Ahmad, R. Sarno, and H. A. Santoso, ‘‘Identification of process-based fraud patterns in credit application,’’ in Proc. 2nd Int. Conf. Inf. Commun. Technol. (ICoICT), May 2014, pp. 84–89.
  10. R. Sarno, R. D. Dewandono, T. Ahmad, M. F. Naufal, and F. Sinaga, ‘‘Hybrid association rule learning and process mining for fraud detection,’’ IAENG Int. J. Comput. Sci., vol. 42, no. 2, pp. 59–72, Apr. 2015.
  11. N. Sandhu, ‘‘Behavioural red flags of Fraud—A qualitative assessment,’’ J. Hum. Values, vol. 22, no. 3, pp. 221–237, Sep. 2016.
  12. G. L. Gray and R. S. Debreceny, ‘‘A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits,’’ Int. J. Accounting Inf. Syst., vol. 15, no. 4, pp. 357–380, Dec. 2014.
  13. Gercke, M. (2011), Understanding Cybercrime: A Guide for Developing Countries.ICT Applications and Cybersecurity Division.Policies and Strategies Department.ITU Telecommunications Development Sector 2nd Edition, www.itu.int/ITUD/ cyb/cybersecurity/legislation.html
  14. Siddique, M.I. and Rehman, S. (2011), Impact of Electronic Crime in Indian Banking Sector – An Overview. International Journal of Business & Information Technology, Vol. 1 No. 2.
  15. Oracle (2012), Fraud Fight: Enterprise-wide Strategy Sets the Stage for Victory. Oracle Corporation, www.oracle.com.
  16. Cooper, D.R. and Schindler P.S. (2011), Business Research Methods, McGraw-Hill/Irwin Series
  17. A. Dal Pozzolo, O. Caelen, Y.-A. Le Borgne, S. Waterschoot, and G. Bontempi, ‘‘Learned lessons in credit card fraud detection from a practitioner perspective,’’ Expert Syst. Appl., vol. 41, no. 10, pp. 4915–4928, Aug. 2014
  18. A. Yang and U. Varshney, ‘‘A taxonomy for mobile health implementation and evaluation,’’ in Proc. 22nd Amer. Conf. Inf. Syst., 2016, pp. 1–10.
  19. K. Mule and M. Kulkarni, ‘‘Credit card fraud detection using hidden Markov model (HMM),’’ Int. J. Innov. Technol. Adapt. Manag., vol. 1, no. 6, p. 30, Aug. 2014.
  20. W. Wei, J. Li, L. Cao, Y. Ou, and J. Chen, ‘‘Effective detection of sophisticated online banking fraud on extremely imbalanced data,’’ World Wide Web, vol. 16, no. 4, pp. 449–475, Jul. 2013.
  21. S. Mardani and H. Shahriari, ‘‘Fraud detection in process-aware information systems using process mining,’’ in Proc. 21st Century, E-Syst. Theno, Dec. 2017, pp. 307–344.
  22. A. Dresch, D. P. Lacerda, and J. A. V. Antunes, Jr., Design Science Research. Cham, Switzerland: Springer, 2015.
  23. B. Wetzstein, KPI-Related Monitoring, Analysis, and Adaptation of Business Processes. Berlin, Germany: Stuttgart, 2016.
  24. D. Cotton, S. Johnigan, and L. Givarz, Fraud Risk Management Guide. New York, NY, USA: COSO, 2016.[Online]. Available: https://www.coso. org/Documents/COSO-Fraud-Risk-Management-Guide-ExecutiveSummary.pdf
  25. A. Abdallah, M. A. Maarof, and A. Zainal, ‘‘Fraud detection system: A survey,’’ J. Netw. Comput. Appl., vol. 68, pp. 90–113, Jun. 2016.
  26. S. Huda, R. Sarno, and T. Ahmad, ‘‘Fuzzy MADM approach for rating of process-based fraud,’’ J. ICT Res. Appl., vol. 9, no. 2, pp. 111–128, Nov. 2015.
  27. S. Huda, R. Sarno, and T. Ahmad, ‘‘Increasing accuracy of process-based fraud detection using a behavior model,’’ Int. J. Softw. Eng. Appl., vol. 10, no. 5, pp. 175–188, May 2016.
  28. D. Al-Jumeily, A. Hussain, A. MacDermott, G. Seeckts, and J. Lunn, ‘‘Methods and techniques to support the development of fraud detection system,’’ in Proc. Int. Conf. Syst., Signals Image Process. (IWSSIP), Sep. 2015, pp. 224–227.
  29. Association of Certified Fraud Examiners. (Sep. 2016). 2016 ACFE Report to the Nations|Executive Summary.[Online]. Available: https://www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf