Skip to main content

Customs-Based Distributed Risk Assessment Method

  • Conference paper
  • First Online:
Parallel Architectures, Algorithms and Programming (PAAP 2019)

Abstract

Customs administration oversees the important processes of facilitating trade and protecting local societies and economies: the former by minimising shipment processing times and the latter by ensuring the lawfulness of trade. One of the main processes that affect the facilitation and protection of trade is the risk of the shipment assessment process. This assessment is performed by analysing available information about shipments to determine whether or not they require physical inspection. When a shipment is identified as suspicious, a physical inspection that can take hours is performed to identify and (dis)confirm the risk factors. In this process, changing trading behaviour by increasing the volume of expected shipments can be a source of pressure. This work proposes a secondary distributed risk assessment method that provides customs administration with an online risk assessment capabilities. The proposed method complements the risk assessments performed at customs administration by providing feedback from the early stage of risk analysis. The results show that the proposed method can provide classification that is 83% accurate on average.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. World Customs Organization: WCO SAFE Framework of Standards, June 2018

    Google Scholar 

  2. Breunig, M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 93–104 (2000)

    Google Scholar 

  3. Yuan, C., Xu, M., Si, X.: Research on a new signature scheme on blockchain. Secur. Commun. Netw. 2017, 1–10 (2017)

    Google Scholar 

  4. Macedo, L.: Blockchain for trade facilitation: Ethereum, eWTP, COs and regulatory issues. World Cust. J. 12(2), 87–94 (2018)

    Google Scholar 

  5. Deloitte: Global Blockchain Survey - Blockchain Gets Down to Business. Deloitte Insights (2019)

    Google Scholar 

  6. Loklindt, C., Moeller, M., Kinra, A.: How Blockchain could be adopted for exchanging documentation in the shipping industry. In: Lecture Notes in Logistics, pp. 194–198 (2011)

    Google Scholar 

  7. Gan, Z., Zhou, X.: Abnormal network traffic detection based on improved LOF algorithm. In: Proceedings of the 2018 10th International Conference on Intelligent Human-Machine System and Cybernetics, IHMSC 2018, vol. 1, pp. 142–145 (2018)

    Google Scholar 

  8. Gao, Z.: Application of cluster-based local outlier factor algorithm in anti-money laundering. In: Proceedings of the 2009 International Conference on Management and Service Science, Wuhan, pp. 1–4 (2009)

    Google Scholar 

  9. Chen, M.C., Wang, R.J., Chen, A.P.: An empirical study for the detection of corporate financial anomaly using outlier mining techniques. In: Proceedings of the 2007 International Conference on Convergence Information Technology, ICCIT 2007, pp. 612–617 (2007)

    Google Scholar 

  10. Ceronmani Sharmila, V., Kumar, K., Sundaram, R., Samyuktha, D., Harish, R.: Credit card fraud detection using anomaly techniques. In: Proceedings of the 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT), pp. 1–6 (2019)

    Google Scholar 

  11. Malini, N., Pushpa, M.: Analysis on credit card fraud identification techniques based on KNN and outlier detection. In: Proceedings of the 3rd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, AEEICB 2017, pp. 255–258 (2017)

    Google Scholar 

  12. Badriyah, T., Rahmaniah, L., Syarif, I.: Nearest neighbour and statistics method based for detecting fraud in auto insurance. In: Proceedings of the 2018 International Conference on Applied Engineering, ICAE 2018, pp. 1–5 (2018)

    Google Scholar 

Download references

Acknowledgement

Dubai Customs funded the research for this paper. The authors would also like to thank everyone from the Service Innovation department for constructive discussions and inputs.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hussam Juma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Juma, H., Shaalan, K., Kamel, I. (2020). Customs-Based Distributed Risk Assessment Method. In: Shen, H., Sang, Y. (eds) Parallel Architectures, Algorithms and Programming. PAAP 2019. Communications in Computer and Information Science, vol 1163. Springer, Singapore. https://doi.org/10.1007/978-981-15-2767-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2767-8_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2766-1

  • Online ISBN: 978-981-15-2767-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics