Abstract
Developing fraud detection models always has been challenging area. Low frequency of fraudulent cases within data, indications instead of certainty contribute to very challenging area for data science method applying. Traditional approach of predictive modelling became insufficient, because relaying on few variables as a base of the fraud model are very fragile concept. Reason for that is fact that we are talking about portfolio with low cases of events, and from the other hand it is unrealistic to lean on few variables articulated through logistic regression, neural network or similar method that will be able to detect sophisticated try of fraudulent activities. Chapter gives proposal how to use data science in such situations where there are no solid bases but only potential suspicious regarding fraudulent activities. For those purposes Benford’s law in combination with other data science methods and fuzzy logic will be used on sample data set, and will be shown potentials of proposed methodology for fraud detection purposes. Chapter shows case study in domain of finance on public data, where proposed methodology will be illustrated an efficient methodology which can be usable for fraud detection purposes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abraham, A., Hassanien, A.-E.: Computational Social Network Analysis Trends. In: Tools and Research Advances. Springer, London, UK (2010)
Aharony, N., Pan, W., Cory, I., Khayal, I., Pentland, A.: Social fMRI: investigating and shaping social mechanisms in the real world. Pervasive Mobile Comput. 7(6), str. 643–659 (2011)
Akoglu, L., Vaz de Melo, P.O.S., Faloutsos, C.: Quantifying reciprocity in large weighted communication networks. In: PAKDD 2, Lecture Notes in Computer Science, vol. 7302, pp. 85–96. Springer, str, Berlin, Heidelberg (2012)
Altshuler, Y., Pan, W., Pentland, A.: Trends Prediction Using Social Diffusion Models. In: Social Computing, Behavioral-Cultural Modeling and Prediction: Lecture Notes in Computer Science series. vol. 97, p. 104 Springer, str, Berlin, Heidelberg (2012)
Baesens, B., van Vlasselaer, V., Verbeke, W.: Fraud Analytics Using Descriptive, Predictive, and Social Network (2015) Techniques, Wiley
Benford, F.: The law of anomalous numbers. Proc. Am. Philos. Soc. 78, 551–572 (1938)
Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)
Bolton, R.J., Hand, D.J.: statistical fraud detection: a review. Stat. Sci. 17(3) 235–249 (2002)
Bojadziev, G., Bojadziev, M.: Fuzzy Logic for Business, Finance, and Management, 2nd edn. World Scientific Publishing Co., Inc, River Edge, NJ, USA (2007)
Carrington, P.J., Scott, J., Wasserman, S. (eds.): Models and Methods in Social Network Analysis, pp. 248–249. Cambridge University Press, Cambridge (2005)
Coser, L.A.: Masters of Sociological Thought: Ideas in Historical and Social Context, 2nd edn. Harcourt, New York, NY (1977)
D’Agostini G.D.: Bayesian Reasoning in Data Analysis: A Critical Introduction. World Scientific, New York (2003)
Duffield, G., Grabosky, P.: The psychology of fraud. In: Trends and Issues in Crime and Criminal Justice. Australian Institute of Criminology, vol. 199 (2001)
Easley, D., Kleinberg, J.: Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge (2010) University Press
Erdös, P., Rényi, A.: On random graphs. Publ. Mat. Debrecen 6 (1959)
Erdös, P., Rényi, A.: On the Evolution of Random Graphs. Publ. Math. Inst. Hung. Acad. Sci. 5 (1960)
Erdös, P., Rényi, A.: On the strength of connectedness of a random graph. Acta. Math. Acad, Sci. Hungar 12 (1961)
Fawcett, T., Provost, F.: Adaptive Fraud Detection. Data Min. Knowl. Discov. 13(3), 291–316 (1997)
Freeman, L.C.: The Development of Social Network Analysis: A Study in The Sociology of Science. Empirical Press, Vancouver, BC (2004)
Fuller, R., Carlsson, C.: Fuzzy Reasoning in Decision Making and Optimization. Physica-Verlag, Heidelberg, Germany (2002)
Giles, D.E.: Benford’s law and naturally occurring prices in certain ebay auctions. App. Econ. Lett. 14, 157–161 (2007)
Grabosky, P., Duffield, G.: Red flags of fraud. In: Trends and Issues in Crime and Criminal Justice. Australian Institute of Criminology (2001)
Hand, D.: Statistical Techniques for Fraud Detection, Prevention, and Evaluation. Paper presented at the NATO ASI: Mining Massive Data sets for Security, London, England Sept 2007
Hill, T.P.: The significant-digit phenomenon. Am. Math. Monthly 102, 322–327 (1995)
Hampel, R., Wagenknecht, M., Chaker, N. (eds.): Fuzzy Control: Theory and Practice. Physica-Verlag, Heidelberg, Germany (2000)
Jamain, A.: Benford’s Law. Imperial College, London (2001)
Jaynes, E.T.: Probability theory. In: The logic of science. Cambridge University Press, Cambridge (2003)
Jackson, M.O.: Social and Economic Networks. Princeton University Press, Princeton, NJ (2010)
Jennings, C.R., Poston, R.J.: Global Business Fraud and the Law: Preventing and Remedying Fraud and Corruption (May 2016 Edition). Practising Law Institute (PLI), Amazon Digital Services LLC (2016)
Jensen, F., Nielsen, T.: Bayesian Networks and Decision Graphs. Springer, New York (2007)
Kjarluff, U., Madsen, A.: Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis. Springer, New York (2013)
Klepac, G., Kopal, R., Mršić, L.: Developing Churn Models Using Data Mining Techniques and Social Network Analysis, pp. 1–308. IGI Global, Hershey, PA (2015). https://doi.org/10.4018/978-1-4666-6288-9
Klepac, G.: Handbook of research on advanced hybrid intelligent techniques and applications. In: Bhattacharyya, S., Banerjee, P., Majumdar, D., Dutta, P. (eds.) Discovering Behavioural Patterns within Customer Population by using Temporal Data Subsets, Hershey, PA, p. 321–348 (2016)
Klepac, G., Kopal, R., Mršić, L.: Hybrid soft computing approaches. In: Bhattacharyya, S., Dutta, P., Chakraborty, S. (eds.) REFII Model as a Base for Data Mining Techniques Hybridization with Purpose of Time Series Pattern Recognition, p. 237–270. Springer India (2015)
Krambia, K.M.: Corporate Fraud and Corruption: A Holistic Approach to Preventing Financial Crises. Palgrave Macmillan (2016). ISBN 978-1349680818
Lauritzen, S.L., Nilsson, D.: Representing and solving decision problems with limited information. Manage. Sci. 47, 1238–1251 (2001)
Leonides, C.: Fuzzy Logic and Expert Systems Applications. Academic Press, New York (1998)
Milgram, S.: The small-world problem. Psychol. Today 1(1), 61–67 (1967)
Moreno, J.L.: Sociometry, Experimental Method, and the Science of Society. Beacon House, Ambler, PA (1951)
Newcomb, S.: Note on the frequency of use of the different digits in natural numbers. Am. J. Math. 4, 39–40 (1881)
Nigrini, M.: A taxpayer compliance application of Benford’s Law. J. Am. Tax. Assoc. 18, 72–91 (1996)
Pedrycz, W., Gomide, F.: Fuzzy Systems Engineering: Toward Human-Centric Computing. Wiley-IEEE Press (2007)
Pinheiro, C.A.R.: Social Network Analysis in Telecommunications. Wiley, Hoboken, NJ (2011)
Raimi, R.A.: The first digit phenomenon. Am. Math. Monthly 83, 521–538 (1976)
Remer, R.: Chaos theory links to morenean theory: a synergistic relationship. J. Group Psychother. Psychodrama Sociom. 59 (2006)
Roselle, B.E.: The Fraud Factor: Recognize It. Overcome It. Leader Press (2016). ISBN 978-0978564629
Simmel, G.: How is society possible? In: Levine, D. (ed.) On Individuality and Social Forms Univevrsity of Chicago Press, Chicago, IL (1908/1971)
Scott, J.: Social Network Analysis: A Handbook. Sage Publications, London (1987)
Spann, D.D.: Fraud Analytics: Strategies and Methods for Detection and Prevention, Wiley (2014)
Ward, J., Peppard, J.: The Strategic Management of Information Systems: Building a Digital Strategy. Wiley (2016). ISBN 978-0470034675
Zadeh, L.A., Kacprzyk, J. (eds.): Fuzzy Logic for the Management of Uncertainty. Wiley, New York (1992)
Zhang, M.: Social network analysis: history, concepts, and research. In: Fuhrt, B. (ed.) Handbook of Social Network Technologies and Applications, pp. 3–22. Springer, New York, NY (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Klepac, G. (2018). Cognitive Data Science Automatic Fraud Detection Solution, Based on Benford’S Law, Fuzzy Logic with Elements of Machine Learning. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-70688-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70687-0
Online ISBN: 978-3-319-70688-7
eBook Packages: EngineeringEngineering (R0)