International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 136 | Views: 287

Research Paper | Information Technology | Zimbabwe | Volume 6 Issue 9, September 2017 | Popularity: 6.9 / 10


     

Fraud Detection in E-Transactions using Deep Neural Networks - A Case of Financial Institutions in Zimbabwe

Elliot Mbunge, Ralph Makuyana, Nation Chirara, Antony Chingosho


Abstract: Due to advancement in E-Commerce, the most common method of payment is credit card for both online and offline. It has become the most convenient way of online shopping, paying bills and money transfers. Hence, the credit card industry is investing vast amounts of money to secure credit card transactions. Financial institutions that have adopted credit card as a payment method are prone to credit card fraud attacks. The objective of this study was to develop a distributed application that analyses financial datasets to detect the possibility fraudulent activities in financial transactions. The researchers used the Hidden Markov Models (HMM) to analyze the datasets so as to generate the spending profile of a cardholder. The results generated from the HMM are then fed into the Multilayer Perceptron (MLP) that classifies the transaction into suspicious and non-suspicious classes. Since the researchers could not obtain a real dataset from the bank, one that resembles a bank dataset has been developed to train and test the MLP.


Keywords: Fraud, Credit card, E-Commerce, Deep learning, Multilayer Perceptron, Hidden Markov


Edition: Volume 6 Issue 9, September 2017


Pages: 1036 - 1041



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Elliot Mbunge, Ralph Makuyana, Nation Chirara, Antony Chingosho, "Fraud Detection in E-Transactions using Deep Neural Networks - A Case of Financial Institutions in Zimbabwe", International Journal of Science and Research (IJSR), Volume 6 Issue 9, September 2017, pp. 1036-1041, https://www.ijsr.net/getabstract.php?paperid=ART20176804, DOI: https://www.doi.org/10.21275/ART20176804



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 8 Issue 2, February 2019

Pages: 2377 - 2381

Understanding Financial Products: A Key to Informed Consumer Decisions

Vaijinath Susuruth Narayana Saker

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, Iraq, Volume 11 Issue 8, August 2022

Pages: 933 - 935

Artificial Intelligence (AI) Deep Learning for Phishing Attack

Taif S. Hasan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 13 Issue 9, September 2024

Pages: 427 - 431

Leveraging Qualitative and Quantitative Market Research in Configuring Financial Products: A U.S. Perspective

Vaijinath Susuruth Narayana Saker

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1470 - 1473

The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability

Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati

Share this Article

Downloads: 113

Research Paper, Information Technology, Malaysia, Volume 4 Issue 12, December 2015

Pages: 1021 - 1024

Security Issues with Health Care Information Technology

Ahmed Mohamed Mahmoud, Akram M Zeki

Share this Article



Top