Downloads: 136 | Views: 287
Research Paper | Information Technology | Zimbabwe | Volume 6 Issue 9, September 2017 | Popularity: 6.9 / 10
Fraud Detection in E-Transactions using Deep Neural Networks - A Case of Financial Institutions in Zimbabwe
Elliot Mbunge, Ralph Makuyana, Nation Chirara, Antony Chingosho
Abstract: Due to advancement in E-Commerce, the most common method of payment is credit card for both online and offline. It has become the most convenient way of online shopping, paying bills and money transfers. Hence, the credit card industry is investing vast amounts of money to secure credit card transactions. Financial institutions that have adopted credit card as a payment method are prone to credit card fraud attacks. The objective of this study was to develop a distributed application that analyses financial datasets to detect the possibility fraudulent activities in financial transactions. The researchers used the Hidden Markov Models (HMM) to analyze the datasets so as to generate the spending profile of a cardholder. The results generated from the HMM are then fed into the Multilayer Perceptron (MLP) that classifies the transaction into suspicious and non-suspicious classes. Since the researchers could not obtain a real dataset from the bank, one that resembles a bank dataset has been developed to train and test the MLP.
Keywords: Fraud, Credit card, E-Commerce, Deep learning, Multilayer Perceptron, Hidden Markov
Edition: Volume 6 Issue 9, September 2017
Pages: 1036 - 1041
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 8 Issue 2, February 2019
Pages: 2377 - 2381Understanding Financial Products: A Key to Informed Consumer Decisions
Vaijinath Susuruth Narayana Saker
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, Iraq, Volume 11 Issue 8, August 2022
Pages: 933 - 935Artificial Intelligence (AI) Deep Learning for Phishing Attack
Taif S. Hasan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 13 Issue 9, September 2024
Pages: 427 - 431Leveraging Qualitative and Quantitative Market Research in Configuring Financial Products: A U.S. Perspective
Vaijinath Susuruth Narayana Saker
Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1470 - 1473The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability
Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati
Downloads: 113
Research Paper, Information Technology, Malaysia, Volume 4 Issue 12, December 2015
Pages: 1021 - 1024Security Issues with Health Care Information Technology
Ahmed Mohamed Mahmoud, Akram M Zeki