dc.contributor.author | Lopez Rojas, Edgar Alonso | |
dc.contributor.author | Axelsson, Stefan | |
dc.contributor.author | Baca, Dejan | |
dc.date.accessioned | 2019-02-07T09:10:32Z | |
dc.date.available | 2019-02-07T09:10:32Z | |
dc.date.created | 2018-08-28T14:07:59Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | International Journal of Simulation and Process Modelling. 2018, 13 (4), 377-386. | nb_NO |
dc.identifier.issn | 1740-2123 | |
dc.identifier.uri | http://hdl.handle.net/11250/2584265 | |
dc.description.abstract | Fraud controls for financial transactions are needed and required by law enforcement agencies to flag suspicious criminal activity. These controls however require deeper analysis of the effectiveness and the negative impact for the legal customers. Owing to the intrinsically private nature of financial transactions this analysis is often performed after several months of actively using fraud controls. In this paper, we present an analysis of different fraud prevention controls on a mobile money service based on thresholds using a simulator called PaySim. PaySim uses aggregated data from a sample dataset to generate a synthetic dataset that resembles the normal operation of transactions and injects malicious behaviour. With technology frameworks such as agent-based simulation techniques, and the application of mathematical statistics, we show in this paper that the simulated data can be as prudent as the original dataset for setting optimal controls for fraud detection. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Inderscience | nb_NO |
dc.title | Analysis of fraud controls using the PaySim financial simulator | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 377-386 | nb_NO |
dc.source.volume | 13 | nb_NO |
dc.source.journal | International Journal of Simulation and Process Modelling | nb_NO |
dc.source.issue | 4 | nb_NO |
dc.identifier.doi | 10.1504/IJSPM.2018.093756 | |
dc.identifier.cristin | 1605027 | |
dc.description.localcode | © 2018. This is the authors' accepted and refereed manuscript to the article. Locked until 25.07.2019. The final authenticated version is available online at: http://doi.org/10.1504/IJSPM.2018.093756 | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |