Show simple item record

dc.contributor.authorLopez Rojas, Edgar Alonso
dc.contributor.authorAxelsson, Stefan
dc.contributor.authorBaca, Dejan
dc.date.accessioned2019-02-07T09:10:32Z
dc.date.available2019-02-07T09:10:32Z
dc.date.created2018-08-28T14:07:59Z
dc.date.issued2018
dc.identifier.citationInternational Journal of Simulation and Process Modelling. 2018, 13 (4), 377-386.nb_NO
dc.identifier.issn1740-2123
dc.identifier.urihttp://hdl.handle.net/11250/2584265
dc.description.abstractFraud controls for financial transactions are needed and required by law enforcement agencies to flag suspicious criminal activity. These controls however require deeper analysis of the effectiveness and the negative impact for the legal customers. Owing to the intrinsically private nature of financial transactions this analysis is often performed after several months of actively using fraud controls. In this paper, we present an analysis of different fraud prevention controls on a mobile money service based on thresholds using a simulator called PaySim. PaySim uses aggregated data from a sample dataset to generate a synthetic dataset that resembles the normal operation of transactions and injects malicious behaviour. With technology frameworks such as agent-based simulation techniques, and the application of mathematical statistics, we show in this paper that the simulated data can be as prudent as the original dataset for setting optimal controls for fraud detection.nb_NO
dc.language.isoengnb_NO
dc.publisherIndersciencenb_NO
dc.titleAnalysis of fraud controls using the PaySim financial simulatornb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber377-386nb_NO
dc.source.volume13nb_NO
dc.source.journalInternational Journal of Simulation and Process Modellingnb_NO
dc.source.issue4nb_NO
dc.identifier.doi10.1504/IJSPM.2018.093756
dc.identifier.cristin1605027
dc.description.localcode© 2018. This is the authors' accepted and refereed manuscript to the article. Locked until 25.07.2019. The final authenticated version is available online at: http://doi.org/10.1504/IJSPM.2018.093756nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record