2023
DOI: 10.48084/etasr.6128
|View full text |Cite
|
Sign up to set email alerts
|

A Survey and a Credit Card Fraud Detection and Prevention Model using the Decision Tree Algorithm

Abstract: Today, many people prefer online payment methods due to the rapid growth in cashless electronic transactions. Credit and debit cards are the most popular electronic payment methods but are prone to fraud due to the nature of their use and the tendency of fraudsters to access their details. This study proposes a theoretical credit fraud detection and prevention model using a Decision Tree Algorithm (DCA). Moreover, a survey questionnaire was used to investigate students' perceptions of credit card fraud inciden… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 34 publications
0
1
0
Order By: Relevance
“…Generally, design science is known as a systematic and rigorous approach. It aids in creating models and solutions that incorporate modeling and analysis [9,60,61]. It is a powerful research methodology that combines theory and practice to create and evaluate innovative artifacts or systems [62].…”
Section: Methodsmentioning
confidence: 99%
“…Generally, design science is known as a systematic and rigorous approach. It aids in creating models and solutions that incorporate modeling and analysis [9,60,61]. It is a powerful research methodology that combines theory and practice to create and evaluate innovative artifacts or systems [62].…”
Section: Methodsmentioning
confidence: 99%
“…Authors in [31] presented IoT engineering applications in the humanitarian context, entailing disaster management, healthcare monitoring, environmental monitoring, and infrastructure development. Multi-level blockchain security architectures were proposed in [32,33] to simplify implementation while bolstering network security. A more recent study [34], examined the challenges and strategies related to cloud computing and IoT security.…”
Section: Inclusionmentioning
confidence: 99%
“…A classification of uncertain event logs and models is defined and the challenges posed by uncertainty for process discovery and consistency checking are examined. Chaotic activity detection facilitates the improvement of business process quality and promotes early prediction of various fraudulent activities [12], such as credit card theft [13], false insurance claims [14], and healthcare systems [15]. Detecting chaotic activity in data streams is extremely challenging because event logs are by nature highly variable [2].…”
Section: Introductionmentioning
confidence: 99%