Show simple item record

dc.contributor.authorLopez Rojas, Edgar Alonso
dc.contributor.authorBarneaud, Camille
dc.date.accessioned2020-02-11T07:47:33Z
dc.date.available2020-02-11T07:47:33Z
dc.date.created2019-09-05T19:45:16Z
dc.date.issued2019
dc.identifier.citationAdvances in Intelligent Systems and Computing. 2019, 998 727-736.nb_NO
dc.identifier.issn2194-5357
dc.identifier.urihttp://hdl.handle.net/11250/2640900
dc.description.abstractFinancial transactions lay up the foundation of modern society. Unfortunately, illicit abuse of the financial system is pervasive. Fraud controls aim to detect these suspicious activities, but they require deep analysis to model their efficacy and value proposition. Due to the private nature and scale of these financial transactions, this analysis is often performed in hindsight. Financial institutions lack of information, due to the hidden fraud problem, to properly set and tune their fraud controls systems. This is probably one of the reasons we are losing the war against crime. This paper presents PaySim, a cutting edge agent-based model that simulates financial fraud scenarios to improve current fraud controls. PaySim uses aggregated anonymized data from a real financial dataset to generate synthetic data that closely resembles the transactions dynamics, statistical properties and causal dynamics observed in the original dataset, while incorporating any malicious behaviour of interest. Using an agent-based framework specifically designed to cover the demands of financial simulation and the application of mathematical statistics, we leverage a real-life scenario based on a known fraud scheme to demonstrate the advantage of simulated data over real-world data when setting adequate controls for fraud detection.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleAdvantages of the PaySim Simulator for Improving Financial Fraud Controlsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber727-736nb_NO
dc.source.volume998nb_NO
dc.source.journalAdvances in Intelligent Systems and Computingnb_NO
dc.identifier.doi10.1007/978-3-030-22868-2_51
dc.identifier.cristin1722061
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article. Locked until 9.72020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-22868-2_51nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record