Abstract
Credit card and personal loan applications have increased significantly. Application fraud is present when the application forms contain plausible and synthetic identity information or real stolen identity information. The monetary cost of application fraud is often estimated to be in the billions of dollars [1].
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kou, Y., Lu, C., Sinvongwattana, S., Huang, Y.P.: Survey of Fraud Detection Techniques. In: Proc. of IEEE Networking, Taiwan, March 21-23 (2004)
Bolton, R.J., Hand, D.J.: Statistical Fraud Detection: A Review (2002)
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: Adaptive Spike Detection for Resilient Data Stream Mining. In: Proc. of 6th Australasian Data Mining Conf. (2007)
Fan, W., Huang, Y.-a., Wang, H., Yu, P.S.: Active Mining of Data Streams. IBM T. J. Watson Research, Hawthorne, NY 10532 (2006)
Phua, C., Lee, V., Smith-Miles, K.: The Personal Name Problem and a Recommended Data Mining Solution. In: Encyclopedia of Data Warehousing and Mining, Australian (2007)
Christen, P.: Probabilistic Data Generation for Deduplication and Data Linkage. Australian National University (Visited: 20-10-2008), http://datamining.anu.edu.au/linkage.html
Witten, I., Frank, E.: Data Mining: Practical Attribute Ranking Machine Learning Tools and Techniques. Morgan Kaufmann, Elsevier, San Francisco (2005)
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications. European J. of Operational Research (2006)
Macskassy, S., Provost, F.: Suspicion Scoring based on Guilt-by-Association, Collective Inference. In: Proc. of Conf. on Intelligence Analysis (2005)
Phua, C., Gayler, R., Lee, V., Smith, K.: Temporal representation in spike detection of sparse personal identity streams. In: Chen, H., Wang, F.-Y., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds.) WISI 2006. LNCS, vol. 3917, pp. 115–126. Springer, Heidelberg (2006)
Li, T., Li, Q., Zhu, S., Ogihara, M.: A Survey on Wavelet Applications in Data Mining 4(2), 49–69 (2002)
Steiner, S.H.: Exponentially Weighted Moving Average Control Charts with Time Varying Control Limits and Fast Initial Respons. Journal of Quality Technology 31, 75–86 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Laleh, N., Azgomi, M.A. (2009). An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. In: Prasad, S.K., Routray, S., Khurana, R., Sahni, S. (eds) Information Systems, Technology and Management. ICISTM 2009. Communications in Computer and Information Science, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00405-6_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-00405-6_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00404-9
Online ISBN: 978-3-642-00405-6
eBook Packages: Computer ScienceComputer Science (R0)