Enhancing Fraud Detection in Financial Transactions through Cyber Security Measures
DOI:
https://doi.org/10.32628/CSEIT2410281Keywords:
Fraud Detection, Cyber Security, Financial Transactions, Data Analytics, BlockchainAbstract
The digitization of financial systems has brought unprecedented convenience, but it has also increased fraud. This article explores the important intersection of cybersecurity and fraud detection in financial transactions. As the need to effectively combat fraud increases, he explores a variety of cybersecurity approaches and technologies. This article examines advanced technologies such as data mining, machine learning, biometric authentication, and blockchain through a comprehensive review of existing literature. It also highlights the challenges and limitations faced by modern fraud detection methodologies, including sophisticated cyberattacks and regulatory issues. By recognizing these challenges, stakeholders can work to implement holistic solutions that address both technical and regulatory aspects. Ultimately, the purpose of this document is to provide practical guidance for strengthening fraud detection capabilities, strengthening financial systems, and protecting consumer interests in the digital economy.
Downloads
References
Commission, E. (2021, June). Payment services (PSD 2) – Directive (EU) 2015/2366. Tratto da An official website of the European Union: European Commission. https://ec.europa.eu/info/law/payment-services-psd-2-directive-eu-2015-2366_en
Eurostat. (2021, February). E-commerce statistics. Taken from Eurostat: statistics explained. https://ec.europa.eu/eurostat/statistics-explained/index.php?title=E-commerce_statistics
Commission, E. (2014–2019). Shaping the digital single market. Tratto da European Commission: Digital Single Market Strategy. https://ec.europa.eu/digital-single-market/en/shaping-digital-single-market
Durkin, J. (1998). Expert systems: Design and development (1st ed.). Prentice Hall PTR.
Ketar, P. S., Shankar, R., & & Banwet, K. D. (2014). Telecom KYC and mobile banking regulation: An exploratory study. Journal of Banking Regulation, 117-128. DOI: https://doi.org/10.1057/jbr.2013.1
Hand, D. J., & Blunt, G. (2009). Estimating the iceberg: How much fraud is there in the UK? Journal of Financial Transformation, 19–29.
Crina Grosan, A. A. (2011). Rule-based expert systems. In Intelligent systems: A modern approach (pp. 149–185). Springer. DOI: https://doi.org/10.1007/978-3-642-21004-4_7
Sethi, N., & Gera, A. (2014). A revived survey of various credit card fraud detection techniques. International Journal of Computer Science and Mobile Computing, 3(4), 780–791.
Shimpi, P. R., & Kadroli, V. (2015). Survey on credit card fraud detection techniques. International Journal of Engineering and Computer Science, 4(11), 15010–15015. DOI: https://doi.org/10.18535/Ijecs/v4i11.25
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 15. DOI: https://doi.org/10.1145/1541880.1541882
Krawczyk, B. (2016). Learning from imbalanced data: Open challenges and future directions. Progress in Artificial Intelligence, 5(4), 221–232. DOI: https://doi.org/10.1007/s13748-016-0094-0
Dal Pozzolo, A., Caelen, O., Johnson, R. A., & Bontempi, G. (2015). Calibrating probability with undersampling for unbalanced classification. In Symposium series on computational intelligence (pp. 159–166). IEEE. DOI: https://doi.org/10.1109/SSCI.2015.33
Gama, J. A., Zliobaite, I., Bifet, A., Pechenizkiy, M., & Bouchachia, A. (2014). A survey on concept drift adaptation. ACM Computing Surveys, 46(4), 44. DOI: https://doi.org/10.1145/2523813
Carcillo, F., Le Borgne, Y.-A., Caelen, O., & Bontempi, G. (2018b). Streaming active learning strategies for real-life credit card fraud detection: Assessment and visualization. International Journal of Data Science and Analytics, 1–16. DOI: https://doi.org/10.1109/DSAA.2017.10
Yamanishi, K., & Takeuchi, J.-i. (2001). Discovering outlier filtering rules from unlabeled data: Combining a supervised learner with an unsupervised learner. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 389–394. ACM. DOI: https://doi.org/10.1145/502512.502570
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.