skip to main content
10.1145/3345035.3345059acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemeConference Proceedingsconference-collections
research-article

Fraud Payment Research: Payment through Credit Car

Authors Info & Claims
Published:15 July 2019Publication History

ABSTRACT

Credit card payment is called CNP which stands for "card not present". Security issues about CNP are critical. We propose an empirical study research for analyzing payment transactions using K-means clustering and decision table method of data mining techniques. The data sets we used are credit card payment from government open data website and credit card fraud data set shared from Weka. In this paper, we found that EC (Electronic Commerce) payment was the majority credit card payment fraud from the first data set and got a close look about similar attributes of fraud customer payments.

References

  1. Bolton, Richard J.; Hand, David J. Statistical fraud detection: A review. Statistical science, 2002, 235--249.Google ScholarGoogle Scholar
  2. Changsu Kim a,1, Wang Tao a,2, Namchul Shin b,*, Ki-Soo Kim. An empirical study of customers' perceptions of security and trust in e-payment systems, Electronic Commerce Research and Applications 9(2010) 84--95.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ekerm Duman, M. Hamdi Ozcelik. Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Application 38(2011)13057--13063Google ScholarGoogle Scholar
  4. Fahmi, Marwan, Abeer Hamdy, and Khaled Nagati. Data Mining Techniques for Credit Card Fraud Detection: Empirical Study. Sustainable Vital Technologies in Engineering and Informatics BUE ACE1. Elsevier Ltd, 2016. 1--9.Google ScholarGoogle Scholar
  5. G. Parthasarathya, L. Ramanathanb, Y. JustinDhasc, J. Saravanakumard and J. Darwine. Comparative Case Study of Machine Learning Classification Techniques Using Imbalanced Credit Card Fraud Datasets, International Conference on Sustainable Computing in Science, Technology & Management (SUSCOM-2019)Google ScholarGoogle Scholar
  6. Hall, Mark A., and Eibe Frank. Combining naive bayes and decision tables. FLAIRS conference. Vol. 2118. 2008.Google ScholarGoogle Scholar
  7. Huysmans, Johan, et al. An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. Decision Support Systems 51.1 (2011): 141--154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. https://data.gov.tw/dataset/11703/Google ScholarGoogle Scholar
  9. https://en.wikipedia.org/wiki/Credit_card_fraudGoogle ScholarGoogle Scholar
  10. https://en.wikipedia.org/wiki/Weka_(machine_learning)Google ScholarGoogle Scholar
  11. Hegarty, J. et al. A trust model for consumer internet shopping. International Journal of Electronic Commerce, 6, 1, 2003, 75--91.Google ScholarGoogle Scholar
  12. Kohavi, Ron. The power of decision tables. European conference on machine learning. Springer, Berlin, Heidelberg, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. MacQueen, James. Some methods for classification and analysis of multivariate observations. Proceedings of the fifth Berkeley symposium on mathematical statistics and probability. Vol. 1. No. 14. 1967.Google ScholarGoogle Scholar
  14. Mukherjee, S.; Mukherjee, T.; Nath, A. Fraud Analytics Using Data Mining. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE), 2016, 3.4: 1--11.Google ScholarGoogle Scholar
  15. Narendra Sharma, Aman Bajpai, Mr. Ratnesh Litoriya. Comparison the various clustering algorithms of Weka tools. International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459), 2012, 2--5Google ScholarGoogle Scholar
  16. PANIGRAHI, Suvasini, et al. Credit card fraud detection: A fusion approach using Dempster--Shafer theory and Bayesian learning. Information Fusion, 2009, 10.4: 354--363.Google ScholarGoogle Scholar
  17. Quah, J.T.S., & Srinagesh, M. Real-time credit fraud detection using computational intelligence. Expert Systems with Applications, 35, 1721--1732Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Raghavendra Patidar, Lokesh Sharma. Credit card Fraud Detection Using neural network. International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-1, Issue-NCAI2011, June 2011Google ScholarGoogle Scholar
  19. Safavian, S. Rasoul, and David Landgrebe. "A survey of decision tree classifier methodology. IEEE transactions on systems, man, and cybernetics 21.3 (1991): 660--674.Google ScholarGoogle Scholar
  20. Yee, Ong Shu; SAGADEVAN, Saravanan; MALIM, Nurul Hashimah Ahamed Hassain. Credit card fraud detection using machine learning as data mining technique. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 2018, 10.1-4: 23--27.Google ScholarGoogle Scholar

Index Terms

  1. Fraud Payment Research: Payment through Credit Car

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEME '19: Proceedings of the 2019 10th International Conference on E-business, Management and Economics
      July 2019
      297 pages
      ISBN:9781450372190
      DOI:10.1145/3345035

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 July 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader