Financial fraud detection: the use of visualization techniques in credit card fraud and money laundering domains

Purpose This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions. Design/methodology/approach In surveying the literature on visual fraud detection in these two domains, this paper reviews: the curre...

Full description

Saved in:
Bibliographic Details
Published inJournal of money laundering control Vol. 26; no. 3; pp. 436 - 444
Main Author Lokanan, Mark E.
Format Journal Article
LanguageEnglish
Published London Emerald Publishing Limited 18.04.2023
Emerald Group Publishing Limited
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Purpose This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions. Design/methodology/approach In surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques. Findings The findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions. Originality/value Some common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms.
AbstractList Purpose This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions. Design/methodology/approach In surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques. Findings The findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions. Originality/value Some common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms.
PurposeThis paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.Design/methodology/approachIn surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques.FindingsThe findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions.Originality/valueSome common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms.
Author Lokanan, Mark E.
Author_xml – sequence: 1
  givenname: Mark E.
  surname: Lokanan
  fullname: Lokanan, Mark E.
  email: mark.lokanan@royalroads.ca
BookMark eNptkctOwzAQRS1UJFrgA9hZYh0YOy-HHaooDxWxgbU18YO6SpxiJ0jl60nUbpBYzUhz78zVmQWZ-c4bQq4Y3DAG4vbldb1MIEs4cJ4A5OKEzFmZi6QUIGZjnxYiyTmwM7KIcQvA8hyyOdmtnEevHDbUBhw01aY3qnedv6P9xtAhGtpZ-u3igI37wWlCR8XGu6_BROo8VcFo11OFQR93oNe0HfPtaYOD1yY4_0l116Lz8YKcWmyiuTzWc_KxenhfPiXrt8fn5f06USnL-kRklajRWqXRIKgCtCrKvAQobKWhZDmYXI1SRK4LlRpbc1trwUVdFamui_ScXB_27kI3Je3lthuCH09KLoBnospEOqrYQaVCF2MwVu6CazHsJQM5gZUTWAmZnMDKCezogYPHtCZgo_-1_PlF-gt5HH39
CitedBy_id crossref_primary_10_1080_10447318_2023_2238367
crossref_primary_10_1109_ACCESS_2024_3380823
Cites_doi 10.1111/cgf.12931
10.1016/j.jvlc.2014.01.002
10.1007/978-3-319-50901-3_57
10.1016/j.visinf.2018.11.001
10.1016/j.future.2015.01.001
10.1088/1757-899X/884/1/012059
10.1016/j.ins.2014.10.015
10.1016/j.accinf.2018.03.001
10.1016/j.dss.2010.08.006
10.1016/j.dss.2017.01.002
10.1155/2014/252797
10.1109/MC.2002.1016905
10.1145/1980022.1980134
10.1016/j.dss.2010.08.010
10.1016/j.eswa.2014.02.026
10.1016/j.accinf.2015.01.001
10.1016/j.eswa.2018.01.037
10.1117/12.840142
10.1080/08874417.2015.11645796
10.1111/cgf.14042
10.1108/MAJ-01-2018-1767
10.1016/j.ins.2017.12.030
10.1007/s13369-021-05682-9
10.1016/j.eswa.2016.09.029
10.1145/1007730.1007738
10.1007/s41060-018-0116-z
10.1155/2018/5764370
10.1108/MAJ-10-2014-1117
10.1007/978-3-030-42048-2_26
10.1016/j.accinf.2019.06.001
10.1109/ICIICT1.2019.8741421
ContentType Journal Article
Copyright Emerald Publishing Limited
Emerald Publishing Limited.
Copyright_xml – notice: Emerald Publishing Limited
– notice: Emerald Publishing Limited.
DBID AAYXX
CITATION
0-V
0U~
1-H
7WY
7WZ
7XB
8AO
AFKRA
ALSLI
ANIOZ
AZQEC
BENPR
BEZIV
BGRYB
CCPQU
DWQXO
F~G
GNUQQ
GUQSH
K6~
L.-
L.0
M0C
M0O
M1F
M2O
MBDVC
PQBIZ
PQEST
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1108/JMLC-04-2022-0058
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
Global News & ABI/Inform Professional
Trade PRO
ABI-INFORM Complete
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
ProQuest Central
Social Science Premium Collection (Proquest) (PQ_SDU_P3)
Accounting, Tax & Banking Collection (ProQuest)
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Criminology Collection
ProQuest One Community College
ProQuest Central Korea
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
ProQuest Business Collection
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
ABI/INFORM Global
Criminal Justice Database (ProQuest)
Banking Information Database
ProQuest research library
Research Library (Corporate)
One Business (ProQuest)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest One Business
Research Library Prep
ProQuest Central Student
ProQuest Central Essentials
ProQuest One Community College
Trade PRO
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
Global News & ABI/Inform Professional
ABI/INFORM Professional Advanced
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
ProQuest Research Library
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest Central Basic
ProQuest One Academic Eastern Edition
ProQuest Business Collection
Accounting, Tax & Banking Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
Banking Information Source
DatabaseTitleList
ABI/INFORM Global (Corporate)
CrossRef
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Law
Business
EISSN 1758-7808
1368-5201
EndPage 444
ExternalDocumentID 10_1108_JMLC_04_2022_0058
10.1108/JMLC-04-2022-0058
GroupedDBID 0R~
1WG
1XV
2-G
29L
3FY
4.4
5GY
5VS
70U
7WY
9E0
9F-
AADTA
AADXL
AAGBP
AAMCF
AAPSD
AAUDR
ABEAN
ABIJV
ABRIO
ABSDC
ACGFS
ACMTK
ADEUS
ADOMW
AEBZA
AEDOK
AEMMR
AETHF
AEUCW
AFNZV
AHQGB
AHUOY
AJEBP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ANIOZ
ASMFL
ATGMP
AUCOK
AVELQ
BENPR
BLEHN
BUONS
CS3
EBS
FNNZZ
GEI
GMF
GMN
GMX
GQ.
H13
HZ~
IJT
IPNFZ
J1Y
JI-
JL0
KLENG
LBA
LFVXT
LKZDS
LXB
M0O
M2O
MS~
O9-
P2P
Q3A
RIG
RWL
RXW
TDD
TEM
TGG
TMD
TMF
V1G
W2G
Y9Z
Z11
Z12
Z18
ZYG
ZYZAG
~Y1
0-V
8AO
8R4
8R5
AAKOT
AAYXX
ABYQI
ACHMN
ACTSA
ADQHX
AFKRA
AFLPE
AGTVX
AODMV
ARALO
AZQEC
BEZIV
BGRYB
BPHCQ
CCPQU
CITATION
DWQXO
GNUQQ
GUQSH
K6~
M0C
PQBIZ
PQQKQ
PRG
PROAC
Q2X
0U~
1-H
7XB
L.-
L.0
M1F
MBDVC
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c314t-8498baffcdaea0c60dc6757006f9d07150e5cc31aa2d6c3efb2fbd828b963db63
IEDL.DBID BENPR
ISSN 1368-5201
IngestDate Fri Sep 13 08:14:16 EDT 2024
Thu Sep 12 17:59:08 EDT 2024
Thu Apr 20 13:00:51 EDT 2023
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Visualization
Knowledge discovery
Financial crimes
Money laundering
Language English
License Licensed re-use rights only
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c314t-8498baffcdaea0c60dc6757006f9d07150e5cc31aa2d6c3efb2fbd828b963db63
PQID 2802489483
PQPubID 27389
PageCount 9
ParticipantIDs proquest_journals_2802489483
crossref_primary_10_1108_JMLC_04_2022_0058
emerald_primary_10_1108_JMLC-04-2022-0058
PublicationCentury 2000
PublicationDate 2023-04-18
PublicationDateYYYYMMDD 2023-04-18
PublicationDate_xml – month: 04
  year: 2023
  text: 2023-04-18
  day: 18
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Journal of money laundering control
PublicationYear 2023
Publisher Emerald Publishing Limited
Emerald Group Publishing Limited
Publisher_xml – name: Emerald Publishing Limited
– name: Emerald Group Publishing Limited
References (key2023041817215600000_ref003) 2014
(key2023041817215600000_ref004) 2002; 17
(key2023041817215600000_ref040) 2021; 46
(key2023041817215600000_ref037) 2004; 6
(key2023041817215600000_ref016) 2019; 479
(key2023041817215600000_ref022) 2004; 15
(key2023041817215600000_ref043) 2016; 56
(key2023041817215600000_ref009) 2017; 67
(key2023041817215600000_ref020) 2003; 24
(key2023041817215600000_ref005) 2018; 5
(key2023041817215600000_ref001) 2016; 55
(key2023041817215600000_ref047) 2019; 34
(key2023041817215600000_ref039) 2018
key2023041817215600000_ref011
(key2023041817215600000_ref041) 2018; 29
(key2023041817215600000_ref045) 2002; 35
(key2023041817215600000_ref036) 2016
(key2023041817215600000_ref002) 2020; 884
(key2023041817215600000_ref007) 2019
(key2023041817215600000_ref025) 2020; 36
(key2023041817215600000_ref008) 2007
(key2023041817215600000_ref019) 2010
(key2023041817215600000_ref014) 2015; 295
(key2023041817215600000_ref018) 2011
(key2023041817215600000_ref035) 2017
(key2023041817215600000_ref021) 2009
(key2023041817215600000_ref049) 2018; 2018
(key2023041817215600000_ref024) 2016; 35
(key2023041817215600000_ref017) 2011; 50
(key2023041817215600000_ref028) 2018; 2
(key2023041817215600000_ref038) 2015
(key2023041817215600000_ref006) 2017; 95
(key2023041817215600000_ref033) 2011; 50
(key2023041817215600000_ref029) 2015
(key2023041817215600000_ref034) 2019
(key2023041817215600000_ref015) 2016; 23
(key2023041817215600000_ref042) 2017
(key2023041817215600000_ref013) 2015; 16
(key2023041817215600000_ref027) 2020; 39
key2023041817215600000_ref031
(key2023041817215600000_ref010) 2014; 41
(key2023041817215600000_ref026) 2016
(key2023041817215600000_ref044) 2014; 2014
(key2023041817215600000_ref023) 2018; 100
(key2023041817215600000_ref048) 2019; 34
(key2023041817215600000_ref032) 2014; 18
(key2023041817215600000_ref030) 2017; 24
(key2023041817215600000_ref046) 2016; 31
(key2023041817215600000_ref012) 2014; 25
References_xml – volume: 35
  start-page: 599
  issue: 3
  year: 2016
  ident: key2023041817215600000_ref024
  article-title: A survey on visual analysis approaches for financial data
  publication-title: Computer Graphics Forum
  doi: 10.1111/cgf.12931
– volume: 25
  start-page: 433
  issue: 4
  year: 2014
  ident: key2023041817215600000_ref012
  article-title: Network visualization for financial crime detection
  publication-title: Journal of Visual Languages and Computing
  doi: 10.1016/j.jvlc.2014.01.002
– start-page: 721
  volume-title: International Workshop on Complex Networks and Their Applications
  year: 2016
  ident: key2023041817215600000_ref026
  article-title: A graph-based, semi-supervised, credit card fraud detection system
  doi: 10.1007/978-3-319-50901-3_57
– volume: 2
  start-page: 198
  issue: 4
  year: 2018
  ident: key2023041817215600000_ref028
  article-title: Visual analytics for event detection: focusing on fraud
  publication-title: Visual Informatics
  doi: 10.1016/j.visinf.2018.11.001
– volume: 55
  start-page: 278
  year: 2016
  ident: key2023041817215600000_ref001
  article-title: A survey of anomaly detection techniques in financial domain
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2015.01.001
– volume: 884
  start-page: 1
  issue: 1
  year: 2020
  ident: key2023041817215600000_ref002
  article-title: Detecting telecommunication fraud with visual analytics: a review
  publication-title: IOP Conference Series: Materials Science and Engineering
  doi: 10.1088/1757-899X/884/1/012059
– volume: 295
  start-page: 18
  year: 2015
  ident: key2023041817215600000_ref014
  article-title: The application of social network analysis algorithms in a system supporting money laundering detection
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2014.10.015
– volume: 29
  start-page: 37
  year: 2018
  ident: key2023041817215600000_ref041
  article-title: Business intelligence and analytics in management accounting research: status and future focus
  publication-title: International Journal of Accounting Information Systems
  doi: 10.1016/j.accinf.2018.03.001
– volume: 17
  start-page: 235
  issue: 3
  year: 2002
  ident: key2023041817215600000_ref004
  article-title: Statistical fraud detection: a review
  publication-title: Statistical Science
– ident: key2023041817215600000_ref011
– volume: 50
  start-page: 559
  issue: 3
  year: 2011
  ident: key2023041817215600000_ref033
  article-title: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2010.08.006
– volume: 24
  start-page: 330
  issue: 1
  year: 2017
  ident: key2023041817215600000_ref030
  article-title: Eva: visual analytics to identify fraudulent events
  publication-title: IEEE Transactions on Visualization and Computer Graphics
– volume: 95
  start-page: 91
  year: 2017
  ident: key2023041817215600000_ref006
  article-title: A data mining based system for credit-card fraud detection in e-tail
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2017.01.002
– volume: 2014
  year: 2014
  ident: key2023041817215600000_ref044
  article-title: Fraudminer: a novel credit card fraud detection model based on frequent itemset mining
  publication-title: The Scientific World Journal
  doi: 10.1155/2014/252797
– volume: 24
  start-page: 1641
  issue: 9
  year: 2003
  ident: key2023041817215600000_ref020
  article-title: Discovering cluster-based local outliers
  publication-title: Pattern Recognition Letters
– volume: 35
  start-page: 80
  issue: 7
  year: 2002
  ident: key2023041817215600000_ref045
  article-title: Interactively exploring hierarchical clustering results [gene identification]
  publication-title: Computer
  doi: 10.1109/MC.2002.1016905
– start-page: 522
  volume-title: in Proceedings of the International Conference and Workshop on Emerging Trends in Technology
  year: 2011
  ident: key2023041817215600000_ref018
  article-title: Outlier detection and visualization of large datasets
  doi: 10.1145/1980022.1980134
– volume: 50
  start-page: 595
  issue: 3
  year: 2011
  ident: key2023041817215600000_ref017
  article-title: A computational model for financial reporting fraud detection
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2010.08.010
– volume: 41
  start-page: 4915
  issue: 10
  year: 2014
  ident: key2023041817215600000_ref010
  article-title: Learned lessons in credit card fraud detection from a practitioner perspective
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2014.02.026
– volume: 16
  start-page: 1
  year: 2015
  ident: key2023041817215600000_ref013
  article-title: Data visualization for fraud detection: practice implications and a call for future research
  publication-title: International Journal of Accounting Information Systems
  doi: 10.1016/j.accinf.2015.01.001
– volume: 100
  start-page: 234
  year: 2018
  ident: key2023041817215600000_ref023
  article-title: Sequence classification for credit-card fraud detection
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2018.01.037
– volume-title: Proc. SPIE 7530 Visualization and Data Analysis
  year: 2010
  ident: key2023041817215600000_ref019
  article-title: Visual analytics of large multidimensional data using variable binned scatter plots
  doi: 10.1117/12.840142
– start-page: 155
  volume-title: in 2007 IEEE Symposium on Visual Analytics Science and Technology
  year: 2007
  ident: key2023041817215600000_ref008
  article-title: Wirevis: visualization of categorical, time-varying data from financial transactions
– volume: 36
  start-page: 2369
  issue: 10/12
  year: 2020
  ident: key2023041817215600000_ref025
  article-title: ST sequence miner: visualization and mining of spatio-temporal event sequences
  publication-title: The Visual Computer
– start-page: 39
  year: 2015
  ident: key2023041817215600000_ref038
  article-title: Gaussian process for regression in business intelligence: a fraud detection application
  publication-title: In KMIS
– start-page: 2585
  year: 2017
  ident: key2023041817215600000_ref035
  article-title: Learning homophily couplings from non-iid data for joint feature selection and noise-resilient outlier detection
– volume: 56
  start-page: 11
  issue: 1
  year: 2016
  ident: key2023041817215600000_ref043
  article-title: Self-service business intelligence resulting in disruptive technology
  publication-title: Journal of Computer Information Systems
  doi: 10.1080/08874417.2015.11645796
– volume: 39
  start-page: 344
  issue: 6
  year: 2020
  ident: key2023041817215600000_ref027
  article-title: NEVA: visual analytics to identify fraudulent networks
  publication-title: Computer Graphics Forum
  doi: 10.1111/cgf.14042
– volume: 23
  start-page: 811
  issue: 1
  year: 2016
  ident: key2023041817215600000_ref015
  article-title: In situ distribution guided analysis and visualization of transonic jet engine simulations
  publication-title: IEEE Transactions on Visualization and Computer Graphics
– volume: 34
  start-page: 324
  issue: 3
  year: 2019
  ident: key2023041817215600000_ref048
  article-title: Financial fraud detection and big data analytics – implications on auditors’ use of fraud brainstorming session
  publication-title: Managerial Auditing Journal
  doi: 10.1108/MAJ-01-2018-1767
– volume: 479
  start-page: 448
  year: 2019
  ident: key2023041817215600000_ref016
  article-title: Using generative adversarial networks for improving classification effectiveness in credit card fraud detection
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2017.12.030
– volume: 46
  start-page: 1
  issue: 9
  year: 2021
  ident: key2023041817215600000_ref040
  article-title: Credit card fraud detection technique by applying graph database model
  publication-title: Arabian Journal for Science and Engineering
  doi: 10.1007/s13369-021-05682-9
– volume: 67
  start-page: 49
  year: 2017
  ident: key2023041817215600000_ref009
  article-title: Using social network analysis to prevent money laundering
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2016.09.029
– volume: 6
  start-page: 50
  issue: 1
  year: 2004
  ident: key2023041817215600000_ref037
  article-title: Minority report in fraud detection: classification of skewed data
  publication-title: ACM SIGKDD Explorations Newsletter
  doi: 10.1145/1007730.1007738
– start-page: 201
  volume-title: in 2015 IEEE Conference on Visual Analytics Science and Technology (VAST)
  year: 2015
  ident: key2023041817215600000_ref029
  article-title: Visual analytics for fraud detection and monitoring
– volume: 5
  start-page: 285
  issue: 4
  year: 2018
  ident: key2023041817215600000_ref005
  article-title: Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization
  publication-title: International Journal of Data Science and Analytics
  doi: 10.1007/s41060-018-0116-z
– start-page: 70
  volume-title: in 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
  year: 2018
  ident: key2023041817215600000_ref039
  article-title: Applying big data technologies to detect cases of money laundering and counter financing of terrorism
– volume: 2018
  year: 2018
  ident: key2023041817215600000_ref049
  article-title: Credit card fraud detection through parenclitic network analysis
  publication-title: Complexity
  doi: 10.1155/2018/5764370
– start-page: 197
  year: 2009
  ident: key2023041817215600000_ref021
  article-title: A visualization approach for frauds detection in financial market
– volume: 18
  start-page: 1
  issue: 1
  year: 2014
  ident: key2023041817215600000_ref032
  article-title: Using enterprise systems to enhance organizational agility
  publication-title: Journal of Applied Computing and Information Technology
– volume-title: in Workshops at the Thirty-First AAAI Conference on Artificial Intelligence
  year: 2017
  ident: key2023041817215600000_ref042
  article-title: Detection of money laundering groups: supervised learning on small networks
– start-page: 153
  year: 2014
  ident: key2023041817215600000_ref003
  article-title: A fraud detection visualization system utilizing radial drawings and heat-maps
– volume: 15
  start-page: 245
  issue: 3
  year: 2004
  ident: key2023041817215600000_ref022
  article-title: A customized ERP/SAP model for business curriculum integration
  publication-title: Journal of Information Systems Education
– volume: 31
  start-page: 35
  issue: 1
  year: 2016
  ident: key2023041817215600000_ref046
  article-title: Interactive visual analysis of anomalous accounts payable transactions in SAP enterprise systems
  publication-title: Managerial Auditing Journal
  doi: 10.1108/MAJ-10-2014-1117
– volume-title: Computer Security
  year: 2019
  ident: key2023041817215600000_ref034
  article-title: Anomaly detection in the HVAC system operation by a RadViz based visualization-driven ‘approach’
  doi: 10.1007/978-3-030-42048-2_26
– ident: key2023041817215600000_ref031
– volume: 34
  start-page: 1
  year: 2019
  ident: key2023041817215600000_ref047
  article-title: Anti-money laundering: using data visualization to identify suspicious activity
  publication-title: International Journal of Accounting Information Systems
  doi: 10.1016/j.accinf.2019.06.001
– start-page: 410
  volume-title: in 2016 IEEE 16th International Conference on Data Mining (ICDM)
  year: 2016
  ident: key2023041817215600000_ref036
  article-title: Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings
– start-page: 1
  volume-title: 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)
  year: 2019
  ident: key2023041817215600000_ref007
  article-title: Credit card fraud detection using anomaly techniques
  doi: 10.1109/ICIICT1.2019.8741421
SSID ssj0015504
Score 2.28376
Snippet Purpose This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering...
PurposeThis paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering...
SourceID proquest
crossref
emerald
SourceType Aggregation Database
Publisher
StartPage 436
SubjectTerms Algorithms
Business intelligence
Credit card fraud
Criminal investigations
Data mining
Datasets
Feature selection
Fraud prevention
Machine learning
Money laundering
Trends
Visualization
SummonAdditionalLinks – databaseName: Emerald Management eJournals Collection
  dbid: ZYZAG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB6sgnjxLdYXe_CiEJsmm3TjTcRaxMdFQb2EfWQxWGMxqaK_3pk8Kop48pxlw87O45vZeQDshgatoBahY3jAHa5DQTInHMWNq3ta2a6kOOTFZTi44We3we0UXDW1MGVaZRWOKfV0muXkpHYocRu18KThAE2vObs4P6bAvkcZ6TQfr0Mh685D8TRswQxibR-9sZn7u_uj08nDAgLyas4tFRyh8asfOn_d7pup-lGv-6WzS0PUX4BRc4Qq_-TxYFyoA_3xo7vjP55xEeZr0MqOKi5bgqkkW4bZJmd-GVrn8m0FRv2mewezL3JsmEmKMtErO2QIM9k4T9izZa9pToWcVfknm_SQzVmaMWpfmhZMI9vWe8jMMJSU5J0NJdW7URiSmecnicdZhZv-yfXxwKkHOjja7_LCETwSSlqrjUykq0PXaPRXeij4NjKIdQI3CTQuldIzofYTqzyrDPqECtWEUaG_BtMZ_nIdGFdeZBF9WC27XAU9FXk9ge6tCjxrEKS2Yb-5u3hU9e2IS3_HFTHRNHZ5TDSNiaZt2Kvv49e13-jfhq3m_uNa3PPYE9QaLuLC3_j78ybM0bx62rErtmC6eBkn24hqCrVTc-onopPxsA
  priority: 102
  providerName: Emerald
Title Financial fraud detection: the use of visualization techniques in credit card fraud and money laundering domains
URI https://www.emerald.com/insight/content/doi/10.1108/JMLC-04-2022-0058/full/html
https://www.proquest.com/docview/2802489483/abstract/
Volume 26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB60gngRrYrVKnvwohCapJt040VqaS1SRURBvYR9ZCGgaW1SxX_vTJsoinjKIcuGzOzsvOcDOAoNakEtQsfwgDtch4JkTjiKG1d3tLKepDjk1XU4vOeXD8HDEgyrXhgqq6zuxPlFbcaaYuQtX9D0rYiLdksqigLoonU2eXUIP4ryrCWYxjKs-B6nhO3Kef_65vYro4CW-ALgljqNUOuVGU5Cwbm8GvUoQeBTZTvh7P3QUb8adb8v67kGGmzAemk6su6C15uwlGR1WK0q1-uwPJLvWzAZVDM0mJ3KmWEmKeblVtkpQ2OPzfKEjS17S3Nqp1w0YbKvSa45SzNGQ0TTgmk8POUeMjMMfzv5YM-Sus4oGMjM-EWmWb4N94P-XW_olLAKjm57vHAEj4SS1mojE-nq0DUavYYOip-NDFocgZsEGpdK6ZtQtxOrfKsMemYKhdWosL0DtQw_uQuMKz-yaANYLT2ugo6K_I5AJ1MFvjVoKjbgpCJkPFlMz4jnXocrYqJ67PKYqB4T1RtwXJL6z7U_ONSAZsWMuBS6PP4-Inv_v96HNUKNpx090YRaMZ0lB2hbFOqwPDb4fHp86l58ArI8zUw
link.rule.ids 315,786,790,21416,21737,27957,27958,33779,43840,53300,74659
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dSxtBEB80gbYvUlNLo1b3wRcLh5e7vcueL6IhIU2TUIqCb8t-3EKgvUTvovjfO5PsKSni8y273OzMzvf8AE5Si1rQiDSwPOEBN6kgmROB5jY0XaNdR1EccjJNhzd8dJvc-oBb6csq6zdx9VDbuaEY-VkkaPpWxkV8sbgLCDWKsqseQmMbmjxGV6UBzav-9PeflzwC2t9rWFvqL0Jd5_OahH0zmox7lBaIqJ6d0PU2NNN_7bmvT_RK7ww-w443GNnl-oZ3YSsvWvChrldvwfZYPX6BxaCenMHcvVpaZvNqVWRVnDM08diyzNncsYdZSU2U69ZL9jK_tWSzgtHo0FnFDLKM30MVluFv50_sr6JeMwoBMjv_p2ZFuQc3g_51bxh4MIXAxB1eBYJnQivnjFW5Ck0aWoO-QheFzmUW7YwkzBODS5WKbGri3OnIaYv-mEYRtTqNv0KjwCO_AeM6yhxqfmdUh-ukq7OoK9C11EnkLBqIbfhRE1Iu1jMz5MrXCIUkqsuQS6K6JKq34dST-s21GzfUhsP6MqQXtVK-Msb--5-P4ePwejKW45_TXwfwiXDjafeOOIRGdb_Mv6N1Uekjz0LP6L_Kxw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1ZS8NAEB48QHwRT6znPviiEEzTTbLxRbyKRy0iCr4te2ShoGltUsV_70y7URTxOUtCZmd2vtk5PoC9xKIXNCIJLI95wE0iyOZEoLkNTWq0ayq6h7ztJpeP_PopfvL1T6Uvq6zPxPFBbfuG7sgPI0HTtzIuWofOl0XcnbePB68BMUhRptXTaUzDbMqTGDV89vSie3f_lVNALD6huKVeI_R7PsdJPDjXt50zShFEVNtOTHs_vNSvVt3v43rsg9qLsODBIzuZ7PYSTOXFMszVtevLMN1R7yswaNdTNJgbqpFlNq_GBVfFEUO4x0ZlzvqOvfVKaqictGGyr1muJesVjMaI9ipmUH38O1RhGf52_sGeFfWd0XUgs_0X1SvKVXhsXzycXQaeWCEwrSavAsEzoZVzxqpchSYJrcG4IUUDdJlFzBGHeWxwqVKRTUwrdzpy2mJsptFcrU5aazBT4CfXgXEdZQ5RgDOqyXWc6ixKBYaZOo6cRbDYgINakHIwmZ8hx3FHKCRJXYZcktQlSb0B-17Uf679sUMN2Ko3Q3qzK-W3kmz8_3gX5lB7ZOeqe7MJ80QhTy9vii2YqYajfBuBRqV3vAZ9AoIbzwQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Financial+fraud+detection%3A+the+use+of+visualization+techniques+in+credit+card+fraud+and+money+laundering+domains&rft.jtitle=Journal+of+money+laundering+control&rft.au=Lokanan%2C+Mark+E&rft.date=2023-04-18&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=1368-5201&rft.eissn=1758-7808&rft.volume=26&rft.issue=3&rft.spage=436&rft.epage=444&rft_id=info:doi/10.1108%2FJMLC-04-2022-0058&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1368-5201&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1368-5201&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1368-5201&client=summon