Financial fraud detection: the use of visualization techniques in credit card fraud and money laundering domains
Purpose This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions. Design/methodology/approach In surveying the literature on visual fraud detection in these two domains, this paper reviews: the curre...
Saved in:
Published in | Journal of money laundering control Vol. 26; no. 3; pp. 436 - 444 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
London
Emerald Publishing Limited
18.04.2023
Emerald Group Publishing Limited |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Purpose
This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.
Design/methodology/approach
In surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques.
Findings
The findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions.
Originality/value
Some common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms. |
---|---|
AbstractList | Purpose
This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.
Design/methodology/approach
In surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques.
Findings
The findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions.
Originality/value
Some common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms. PurposeThis paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering transactions.Design/methodology/approachIn surveying the literature on visual fraud detection in these two domains, this paper reviews: the current use of visualization techniques, the variations of visual analytics used and the challenges of these techniques.FindingsThe findings reveal how visual analytics is used to detect outliers in CCF detection and identify links to criminal networks in money laundering transactions. Graph methodology and unsupervised clustering analyses are the most dominant types of visual analytics used for CCF detection. In contrast, network and graph analytics are heavily used in identifying criminal relationships in money laundering transactions.Originality/valueSome common challenges in using visualization techniques to identify fraudulent transactions in both domains relate to data complexity and fraudsters’ ability to evade monitoring mechanisms. |
Author | Lokanan, Mark E. |
Author_xml | – sequence: 1 givenname: Mark E. surname: Lokanan fullname: Lokanan, Mark E. email: mark.lokanan@royalroads.ca |
BookMark | eNptkctOwzAQRS1UJFrgA9hZYh0YOy-HHaooDxWxgbU18YO6SpxiJ0jl60nUbpBYzUhz78zVmQWZ-c4bQq4Y3DAG4vbldb1MIEs4cJ4A5OKEzFmZi6QUIGZjnxYiyTmwM7KIcQvA8hyyOdmtnEevHDbUBhw01aY3qnedv6P9xtAhGtpZ-u3igI37wWlCR8XGu6_BROo8VcFo11OFQR93oNe0HfPtaYOD1yY4_0l116Lz8YKcWmyiuTzWc_KxenhfPiXrt8fn5f06USnL-kRklajRWqXRIKgCtCrKvAQobKWhZDmYXI1SRK4LlRpbc1trwUVdFamui_ScXB_27kI3Je3lthuCH09KLoBnospEOqrYQaVCF2MwVu6CazHsJQM5gZUTWAmZnMDKCezogYPHtCZgo_-1_PlF-gt5HH39 |
CitedBy_id | crossref_primary_10_1080_10447318_2023_2238367 crossref_primary_10_1109_ACCESS_2024_3380823 |
Cites_doi | 10.1111/cgf.12931 10.1016/j.jvlc.2014.01.002 10.1007/978-3-319-50901-3_57 10.1016/j.visinf.2018.11.001 10.1016/j.future.2015.01.001 10.1088/1757-899X/884/1/012059 10.1016/j.ins.2014.10.015 10.1016/j.accinf.2018.03.001 10.1016/j.dss.2010.08.006 10.1016/j.dss.2017.01.002 10.1155/2014/252797 10.1109/MC.2002.1016905 10.1145/1980022.1980134 10.1016/j.dss.2010.08.010 10.1016/j.eswa.2014.02.026 10.1016/j.accinf.2015.01.001 10.1016/j.eswa.2018.01.037 10.1117/12.840142 10.1080/08874417.2015.11645796 10.1111/cgf.14042 10.1108/MAJ-01-2018-1767 10.1016/j.ins.2017.12.030 10.1007/s13369-021-05682-9 10.1016/j.eswa.2016.09.029 10.1145/1007730.1007738 10.1007/s41060-018-0116-z 10.1155/2018/5764370 10.1108/MAJ-10-2014-1117 10.1007/978-3-030-42048-2_26 10.1016/j.accinf.2019.06.001 10.1109/ICIICT1.2019.8741421 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited Emerald Publishing Limited. |
Copyright_xml | – notice: Emerald Publishing Limited – notice: Emerald Publishing Limited. |
DBID | AAYXX CITATION 0-V 0U~ 1-H 7WY 7WZ 7XB 8AO AFKRA ALSLI ANIOZ AZQEC BENPR BEZIV BGRYB CCPQU DWQXO F~G GNUQQ GUQSH K6~ L.- L.0 M0C M0O M1F M2O MBDVC PQBIZ PQEST PQQKQ PQUKI PRINS Q9U |
DOI | 10.1108/JMLC-04-2022-0058 |
DatabaseName | CrossRef ProQuest Social Sciences Premium Collection【Remote access available】 Global News & ABI/Inform Professional Trade PRO ABI-INFORM Complete ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection ProQuest Central Social Science Premium Collection (Proquest) (PQ_SDU_P3) Accounting, Tax & Banking Collection (ProQuest) ProQuest Central Essentials ProQuest Central Business Premium Collection Criminology Collection ProQuest One Community College ProQuest Central Korea ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep ProQuest Business Collection ABI/INFORM Professional Advanced ABI/INFORM Professional Standard ABI/INFORM Global Criminal Justice Database (ProQuest) Banking Information Database ProQuest research library Research Library (Corporate) One Business (ProQuest) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest One Business Research Library Prep ProQuest Central Student ProQuest Central Essentials ProQuest One Community College Trade PRO ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central Global News & ABI/Inform Professional ABI/INFORM Professional Advanced ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea ProQuest Research Library Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Business Collection Accounting, Tax & Banking Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic Banking Information Source |
DatabaseTitleList | ABI/INFORM Global (Corporate) CrossRef |
Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Law Business |
EISSN | 1758-7808 1368-5201 |
EndPage | 444 |
ExternalDocumentID | 10_1108_JMLC_04_2022_0058 10.1108/JMLC-04-2022-0058 |
GroupedDBID | 0R~ 1WG 1XV 2-G 29L 3FY 4.4 5GY 5VS 70U 7WY 9E0 9F- AADTA AADXL AAGBP AAMCF AAPSD AAUDR ABEAN ABIJV ABRIO ABSDC ACGFS ACMTK ADEUS ADOMW AEBZA AEDOK AEMMR AETHF AEUCW AFNZV AHQGB AHUOY AJEBP ALMA_UNASSIGNED_HOLDINGS ALSLI ANIOZ ASMFL ATGMP AUCOK AVELQ BENPR BLEHN BUONS CS3 EBS FNNZZ GEI GMF GMN GMX GQ. H13 HZ~ IJT IPNFZ J1Y JI- JL0 KLENG LBA LFVXT LKZDS LXB M0O M2O MS~ O9- P2P Q3A RIG RWL RXW TDD TEM TGG TMD TMF V1G W2G Y9Z Z11 Z12 Z18 ZYG ZYZAG ~Y1 0-V 8AO 8R4 8R5 AAKOT AAYXX ABYQI ACHMN ACTSA ADQHX AFKRA AFLPE AGTVX AODMV ARALO AZQEC BEZIV BGRYB BPHCQ CCPQU CITATION DWQXO GNUQQ GUQSH K6~ M0C PQBIZ PQQKQ PRG PROAC Q2X 0U~ 1-H 7XB L.- L.0 M1F MBDVC PQEST PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c314t-8498baffcdaea0c60dc6757006f9d07150e5cc31aa2d6c3efb2fbd828b963db63 |
IEDL.DBID | BENPR |
ISSN | 1368-5201 |
IngestDate | Fri Sep 13 08:14:16 EDT 2024 Thu Sep 12 17:59:08 EDT 2024 Thu Apr 20 13:00:51 EDT 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Visualization Knowledge discovery Financial crimes Money laundering |
Language | English |
License | Licensed re-use rights only |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c314t-8498baffcdaea0c60dc6757006f9d07150e5cc31aa2d6c3efb2fbd828b963db63 |
PQID | 2802489483 |
PQPubID | 27389 |
PageCount | 9 |
ParticipantIDs | proquest_journals_2802489483 crossref_primary_10_1108_JMLC_04_2022_0058 emerald_primary_10_1108_JMLC-04-2022-0058 |
PublicationCentury | 2000 |
PublicationDate | 2023-04-18 |
PublicationDateYYYYMMDD | 2023-04-18 |
PublicationDate_xml | – month: 04 year: 2023 text: 2023-04-18 day: 18 |
PublicationDecade | 2020 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | Journal of money laundering control |
PublicationYear | 2023 |
Publisher | Emerald Publishing Limited Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Publishing Limited – name: Emerald Group Publishing Limited |
References | (key2023041817215600000_ref003) 2014 (key2023041817215600000_ref004) 2002; 17 (key2023041817215600000_ref040) 2021; 46 (key2023041817215600000_ref037) 2004; 6 (key2023041817215600000_ref016) 2019; 479 (key2023041817215600000_ref022) 2004; 15 (key2023041817215600000_ref043) 2016; 56 (key2023041817215600000_ref009) 2017; 67 (key2023041817215600000_ref020) 2003; 24 (key2023041817215600000_ref005) 2018; 5 (key2023041817215600000_ref001) 2016; 55 (key2023041817215600000_ref047) 2019; 34 (key2023041817215600000_ref039) 2018 key2023041817215600000_ref011 (key2023041817215600000_ref041) 2018; 29 (key2023041817215600000_ref045) 2002; 35 (key2023041817215600000_ref036) 2016 (key2023041817215600000_ref002) 2020; 884 (key2023041817215600000_ref007) 2019 (key2023041817215600000_ref025) 2020; 36 (key2023041817215600000_ref008) 2007 (key2023041817215600000_ref019) 2010 (key2023041817215600000_ref014) 2015; 295 (key2023041817215600000_ref018) 2011 (key2023041817215600000_ref035) 2017 (key2023041817215600000_ref021) 2009 (key2023041817215600000_ref049) 2018; 2018 (key2023041817215600000_ref024) 2016; 35 (key2023041817215600000_ref017) 2011; 50 (key2023041817215600000_ref028) 2018; 2 (key2023041817215600000_ref038) 2015 (key2023041817215600000_ref006) 2017; 95 (key2023041817215600000_ref033) 2011; 50 (key2023041817215600000_ref029) 2015 (key2023041817215600000_ref034) 2019 (key2023041817215600000_ref015) 2016; 23 (key2023041817215600000_ref042) 2017 (key2023041817215600000_ref013) 2015; 16 (key2023041817215600000_ref027) 2020; 39 key2023041817215600000_ref031 (key2023041817215600000_ref010) 2014; 41 (key2023041817215600000_ref026) 2016 (key2023041817215600000_ref044) 2014; 2014 (key2023041817215600000_ref023) 2018; 100 (key2023041817215600000_ref048) 2019; 34 (key2023041817215600000_ref032) 2014; 18 (key2023041817215600000_ref030) 2017; 24 (key2023041817215600000_ref046) 2016; 31 (key2023041817215600000_ref012) 2014; 25 |
References_xml | – volume: 35 start-page: 599 issue: 3 year: 2016 ident: key2023041817215600000_ref024 article-title: A survey on visual analysis approaches for financial data publication-title: Computer Graphics Forum doi: 10.1111/cgf.12931 – volume: 25 start-page: 433 issue: 4 year: 2014 ident: key2023041817215600000_ref012 article-title: Network visualization for financial crime detection publication-title: Journal of Visual Languages and Computing doi: 10.1016/j.jvlc.2014.01.002 – start-page: 721 volume-title: International Workshop on Complex Networks and Their Applications year: 2016 ident: key2023041817215600000_ref026 article-title: A graph-based, semi-supervised, credit card fraud detection system doi: 10.1007/978-3-319-50901-3_57 – volume: 2 start-page: 198 issue: 4 year: 2018 ident: key2023041817215600000_ref028 article-title: Visual analytics for event detection: focusing on fraud publication-title: Visual Informatics doi: 10.1016/j.visinf.2018.11.001 – volume: 55 start-page: 278 year: 2016 ident: key2023041817215600000_ref001 article-title: A survey of anomaly detection techniques in financial domain publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2015.01.001 – volume: 884 start-page: 1 issue: 1 year: 2020 ident: key2023041817215600000_ref002 article-title: Detecting telecommunication fraud with visual analytics: a review publication-title: IOP Conference Series: Materials Science and Engineering doi: 10.1088/1757-899X/884/1/012059 – volume: 295 start-page: 18 year: 2015 ident: key2023041817215600000_ref014 article-title: The application of social network analysis algorithms in a system supporting money laundering detection publication-title: Information Sciences doi: 10.1016/j.ins.2014.10.015 – volume: 29 start-page: 37 year: 2018 ident: key2023041817215600000_ref041 article-title: Business intelligence and analytics in management accounting research: status and future focus publication-title: International Journal of Accounting Information Systems doi: 10.1016/j.accinf.2018.03.001 – volume: 17 start-page: 235 issue: 3 year: 2002 ident: key2023041817215600000_ref004 article-title: Statistical fraud detection: a review publication-title: Statistical Science – ident: key2023041817215600000_ref011 – volume: 50 start-page: 559 issue: 3 year: 2011 ident: key2023041817215600000_ref033 article-title: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature publication-title: Decision Support Systems doi: 10.1016/j.dss.2010.08.006 – volume: 24 start-page: 330 issue: 1 year: 2017 ident: key2023041817215600000_ref030 article-title: Eva: visual analytics to identify fraudulent events publication-title: IEEE Transactions on Visualization and Computer Graphics – volume: 95 start-page: 91 year: 2017 ident: key2023041817215600000_ref006 article-title: A data mining based system for credit-card fraud detection in e-tail publication-title: Decision Support Systems doi: 10.1016/j.dss.2017.01.002 – volume: 2014 year: 2014 ident: key2023041817215600000_ref044 article-title: Fraudminer: a novel credit card fraud detection model based on frequent itemset mining publication-title: The Scientific World Journal doi: 10.1155/2014/252797 – volume: 24 start-page: 1641 issue: 9 year: 2003 ident: key2023041817215600000_ref020 article-title: Discovering cluster-based local outliers publication-title: Pattern Recognition Letters – volume: 35 start-page: 80 issue: 7 year: 2002 ident: key2023041817215600000_ref045 article-title: Interactively exploring hierarchical clustering results [gene identification] publication-title: Computer doi: 10.1109/MC.2002.1016905 – start-page: 522 volume-title: in Proceedings of the International Conference and Workshop on Emerging Trends in Technology year: 2011 ident: key2023041817215600000_ref018 article-title: Outlier detection and visualization of large datasets doi: 10.1145/1980022.1980134 – volume: 50 start-page: 595 issue: 3 year: 2011 ident: key2023041817215600000_ref017 article-title: A computational model for financial reporting fraud detection publication-title: Decision Support Systems doi: 10.1016/j.dss.2010.08.010 – volume: 41 start-page: 4915 issue: 10 year: 2014 ident: key2023041817215600000_ref010 article-title: Learned lessons in credit card fraud detection from a practitioner perspective publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2014.02.026 – volume: 16 start-page: 1 year: 2015 ident: key2023041817215600000_ref013 article-title: Data visualization for fraud detection: practice implications and a call for future research publication-title: International Journal of Accounting Information Systems doi: 10.1016/j.accinf.2015.01.001 – volume: 100 start-page: 234 year: 2018 ident: key2023041817215600000_ref023 article-title: Sequence classification for credit-card fraud detection publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2018.01.037 – volume-title: Proc. SPIE 7530 Visualization and Data Analysis year: 2010 ident: key2023041817215600000_ref019 article-title: Visual analytics of large multidimensional data using variable binned scatter plots doi: 10.1117/12.840142 – start-page: 155 volume-title: in 2007 IEEE Symposium on Visual Analytics Science and Technology year: 2007 ident: key2023041817215600000_ref008 article-title: Wirevis: visualization of categorical, time-varying data from financial transactions – volume: 36 start-page: 2369 issue: 10/12 year: 2020 ident: key2023041817215600000_ref025 article-title: ST sequence miner: visualization and mining of spatio-temporal event sequences publication-title: The Visual Computer – start-page: 39 year: 2015 ident: key2023041817215600000_ref038 article-title: Gaussian process for regression in business intelligence: a fraud detection application publication-title: In KMIS – start-page: 2585 year: 2017 ident: key2023041817215600000_ref035 article-title: Learning homophily couplings from non-iid data for joint feature selection and noise-resilient outlier detection – volume: 56 start-page: 11 issue: 1 year: 2016 ident: key2023041817215600000_ref043 article-title: Self-service business intelligence resulting in disruptive technology publication-title: Journal of Computer Information Systems doi: 10.1080/08874417.2015.11645796 – volume: 39 start-page: 344 issue: 6 year: 2020 ident: key2023041817215600000_ref027 article-title: NEVA: visual analytics to identify fraudulent networks publication-title: Computer Graphics Forum doi: 10.1111/cgf.14042 – volume: 23 start-page: 811 issue: 1 year: 2016 ident: key2023041817215600000_ref015 article-title: In situ distribution guided analysis and visualization of transonic jet engine simulations publication-title: IEEE Transactions on Visualization and Computer Graphics – volume: 34 start-page: 324 issue: 3 year: 2019 ident: key2023041817215600000_ref048 article-title: Financial fraud detection and big data analytics – implications on auditors’ use of fraud brainstorming session publication-title: Managerial Auditing Journal doi: 10.1108/MAJ-01-2018-1767 – volume: 479 start-page: 448 year: 2019 ident: key2023041817215600000_ref016 article-title: Using generative adversarial networks for improving classification effectiveness in credit card fraud detection publication-title: Information Sciences doi: 10.1016/j.ins.2017.12.030 – volume: 46 start-page: 1 issue: 9 year: 2021 ident: key2023041817215600000_ref040 article-title: Credit card fraud detection technique by applying graph database model publication-title: Arabian Journal for Science and Engineering doi: 10.1007/s13369-021-05682-9 – volume: 67 start-page: 49 year: 2017 ident: key2023041817215600000_ref009 article-title: Using social network analysis to prevent money laundering publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2016.09.029 – volume: 6 start-page: 50 issue: 1 year: 2004 ident: key2023041817215600000_ref037 article-title: Minority report in fraud detection: classification of skewed data publication-title: ACM SIGKDD Explorations Newsletter doi: 10.1145/1007730.1007738 – start-page: 201 volume-title: in 2015 IEEE Conference on Visual Analytics Science and Technology (VAST) year: 2015 ident: key2023041817215600000_ref029 article-title: Visual analytics for fraud detection and monitoring – volume: 5 start-page: 285 issue: 4 year: 2018 ident: key2023041817215600000_ref005 article-title: Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization publication-title: International Journal of Data Science and Analytics doi: 10.1007/s41060-018-0116-z – start-page: 70 volume-title: in 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) year: 2018 ident: key2023041817215600000_ref039 article-title: Applying big data technologies to detect cases of money laundering and counter financing of terrorism – volume: 2018 year: 2018 ident: key2023041817215600000_ref049 article-title: Credit card fraud detection through parenclitic network analysis publication-title: Complexity doi: 10.1155/2018/5764370 – start-page: 197 year: 2009 ident: key2023041817215600000_ref021 article-title: A visualization approach for frauds detection in financial market – volume: 18 start-page: 1 issue: 1 year: 2014 ident: key2023041817215600000_ref032 article-title: Using enterprise systems to enhance organizational agility publication-title: Journal of Applied Computing and Information Technology – volume-title: in Workshops at the Thirty-First AAAI Conference on Artificial Intelligence year: 2017 ident: key2023041817215600000_ref042 article-title: Detection of money laundering groups: supervised learning on small networks – start-page: 153 year: 2014 ident: key2023041817215600000_ref003 article-title: A fraud detection visualization system utilizing radial drawings and heat-maps – volume: 15 start-page: 245 issue: 3 year: 2004 ident: key2023041817215600000_ref022 article-title: A customized ERP/SAP model for business curriculum integration publication-title: Journal of Information Systems Education – volume: 31 start-page: 35 issue: 1 year: 2016 ident: key2023041817215600000_ref046 article-title: Interactive visual analysis of anomalous accounts payable transactions in SAP enterprise systems publication-title: Managerial Auditing Journal doi: 10.1108/MAJ-10-2014-1117 – volume-title: Computer Security year: 2019 ident: key2023041817215600000_ref034 article-title: Anomaly detection in the HVAC system operation by a RadViz based visualization-driven ‘approach’ doi: 10.1007/978-3-030-42048-2_26 – ident: key2023041817215600000_ref031 – volume: 34 start-page: 1 year: 2019 ident: key2023041817215600000_ref047 article-title: Anti-money laundering: using data visualization to identify suspicious activity publication-title: International Journal of Accounting Information Systems doi: 10.1016/j.accinf.2019.06.001 – start-page: 410 volume-title: in 2016 IEEE 16th International Conference on Data Mining (ICDM) year: 2016 ident: key2023041817215600000_ref036 article-title: Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings – start-page: 1 volume-title: 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT) year: 2019 ident: key2023041817215600000_ref007 article-title: Credit card fraud detection using anomaly techniques doi: 10.1109/ICIICT1.2019.8741421 |
SSID | ssj0015504 |
Score | 2.28376 |
Snippet | Purpose
This paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering... PurposeThis paper aims to reviews the literature on applying visualization techniques to detect credit card fraud (CCF) and suspicious money laundering... |
SourceID | proquest crossref emerald |
SourceType | Aggregation Database Publisher |
StartPage | 436 |
SubjectTerms | Algorithms Business intelligence Credit card fraud Criminal investigations Data mining Datasets Feature selection Fraud prevention Machine learning Money laundering Trends Visualization |
SummonAdditionalLinks | – databaseName: Emerald Management eJournals Collection dbid: ZYZAG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEB6sgnjxLdYXe_CiEJsmm3TjTcRaxMdFQb2EfWQxWGMxqaK_3pk8Kop48pxlw87O45vZeQDshgatoBahY3jAHa5DQTInHMWNq3ta2a6kOOTFZTi44We3we0UXDW1MGVaZRWOKfV0muXkpHYocRu18KThAE2vObs4P6bAvkcZ6TQfr0Mh685D8TRswQxibR-9sZn7u_uj08nDAgLyas4tFRyh8asfOn_d7pup-lGv-6WzS0PUX4BRc4Qq_-TxYFyoA_3xo7vjP55xEeZr0MqOKi5bgqkkW4bZJmd-GVrn8m0FRv2mewezL3JsmEmKMtErO2QIM9k4T9izZa9pToWcVfknm_SQzVmaMWpfmhZMI9vWe8jMMJSU5J0NJdW7URiSmecnicdZhZv-yfXxwKkHOjja7_LCETwSSlqrjUykq0PXaPRXeij4NjKIdQI3CTQuldIzofYTqzyrDPqECtWEUaG_BtMZ_nIdGFdeZBF9WC27XAU9FXk9ge6tCjxrEKS2Yb-5u3hU9e2IS3_HFTHRNHZ5TDSNiaZt2Kvv49e13-jfhq3m_uNa3PPYE9QaLuLC3_j78ybM0bx62rErtmC6eBkn24hqCrVTc-onopPxsA priority: 102 providerName: Emerald |
Title | Financial fraud detection: the use of visualization techniques in credit card fraud and money laundering domains |
URI | https://www.emerald.com/insight/content/doi/10.1108/JMLC-04-2022-0058/full/html https://www.proquest.com/docview/2802489483/abstract/ |
Volume | 26 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB60gngRrYrVKnvwohCapJt040VqaS1SRURBvYR9ZCGgaW1SxX_vTJsoinjKIcuGzOzsvOcDOAoNakEtQsfwgDtch4JkTjiKG1d3tLKepDjk1XU4vOeXD8HDEgyrXhgqq6zuxPlFbcaaYuQtX9D0rYiLdksqigLoonU2eXUIP4ryrCWYxjKs-B6nhO3Kef_65vYro4CW-ALgljqNUOuVGU5Cwbm8GvUoQeBTZTvh7P3QUb8adb8v67kGGmzAemk6su6C15uwlGR1WK0q1-uwPJLvWzAZVDM0mJ3KmWEmKeblVtkpQ2OPzfKEjS17S3Nqp1w0YbKvSa45SzNGQ0TTgmk8POUeMjMMfzv5YM-Sus4oGMjM-EWmWb4N94P-XW_olLAKjm57vHAEj4SS1mojE-nq0DUavYYOip-NDFocgZsEGpdK6ZtQtxOrfKsMemYKhdWosL0DtQw_uQuMKz-yaANYLT2ugo6K_I5AJ1MFvjVoKjbgpCJkPFlMz4jnXocrYqJ67PKYqB4T1RtwXJL6z7U_ONSAZsWMuBS6PP4-Inv_v96HNUKNpx090YRaMZ0lB2hbFOqwPDb4fHp86l58ArI8zUw |
link.rule.ids | 315,786,790,21416,21737,27957,27958,33779,43840,53300,74659 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dSxtBEB80gbYvUlNLo1b3wRcLh5e7vcueL6IhIU2TUIqCb8t-3EKgvUTvovjfO5PsKSni8y273OzMzvf8AE5Si1rQiDSwPOEBN6kgmROB5jY0XaNdR1EccjJNhzd8dJvc-oBb6csq6zdx9VDbuaEY-VkkaPpWxkV8sbgLCDWKsqseQmMbmjxGV6UBzav-9PeflzwC2t9rWFvqL0Jd5_OahH0zmox7lBaIqJ6d0PU2NNN_7bmvT_RK7ww-w443GNnl-oZ3YSsvWvChrldvwfZYPX6BxaCenMHcvVpaZvNqVWRVnDM08diyzNncsYdZSU2U69ZL9jK_tWSzgtHo0FnFDLKM30MVluFv50_sr6JeMwoBMjv_p2ZFuQc3g_51bxh4MIXAxB1eBYJnQivnjFW5Ck0aWoO-QheFzmUW7YwkzBODS5WKbGri3OnIaYv-mEYRtTqNv0KjwCO_AeM6yhxqfmdUh-ukq7OoK9C11EnkLBqIbfhRE1Iu1jMz5MrXCIUkqsuQS6K6JKq34dST-s21GzfUhsP6MqQXtVK-Msb--5-P4ePwejKW45_TXwfwiXDjafeOOIRGdb_Mv6N1Uekjz0LP6L_Kxw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1ZS8NAEB48QHwRT6znPviiEEzTTbLxRbyKRy0iCr4te2ShoGltUsV_70y7URTxOUtCZmd2vtk5PoC9xKIXNCIJLI95wE0iyOZEoLkNTWq0ayq6h7ztJpeP_PopfvL1T6Uvq6zPxPFBbfuG7sgPI0HTtzIuWofOl0XcnbePB68BMUhRptXTaUzDbMqTGDV89vSie3f_lVNALD6huKVeI_R7PsdJPDjXt50zShFEVNtOTHs_vNSvVt3v43rsg9qLsODBIzuZ7PYSTOXFMszVtevLMN1R7yswaNdTNJgbqpFlNq_GBVfFEUO4x0ZlzvqOvfVKaqictGGyr1muJesVjMaI9ipmUH38O1RhGf52_sGeFfWd0XUgs_0X1SvKVXhsXzycXQaeWCEwrSavAsEzoZVzxqpchSYJrcG4IUUDdJlFzBGHeWxwqVKRTUwrdzpy2mJsptFcrU5aazBT4CfXgXEdZQ5RgDOqyXWc6ixKBYaZOo6cRbDYgINakHIwmZ8hx3FHKCRJXYZcktQlSb0B-17Uf679sUMN2Ko3Q3qzK-W3kmz8_3gX5lB7ZOeqe7MJ80QhTy9vii2YqYajfBuBRqV3vAZ9AoIbzwQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Financial+fraud+detection%3A+the+use+of+visualization+techniques+in+credit+card+fraud+and+money+laundering+domains&rft.jtitle=Journal+of+money+laundering+control&rft.au=Lokanan%2C+Mark+E&rft.date=2023-04-18&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=1368-5201&rft.eissn=1758-7808&rft.volume=26&rft.issue=3&rft.spage=436&rft.epage=444&rft_id=info:doi/10.1108%2FJMLC-04-2022-0058&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1368-5201&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1368-5201&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1368-5201&client=summon |