807
Views
11
CrossRef citations to date
0
Altmetric
Articles

Can alert models for fraud protect the elderly clients of a financial institution?

ORCID Icon, , &
Pages 1683-1707 | Received 31 Jan 2018, Accepted 21 Nov 2018, Published online: 03 Dec 2018

References

  • Acierno, R., M. A. Hernandez, A. B. Amstadter, H. S. Resnick, K. Steve, W. Muzzy, and D. G. Kilpatrick. 2010. “Prevalence and Correlates of Emotional, Physical, Sexual, and Financial Abuse and Potential Neglect in the United States: The National Elder Mistreatment Study.” American Journal of Public Health 100 (2): 292–297. doi: 10.2105/AJPH.2009.163089
  • Batista, Gustavo E. A. P. A., Ronaldo C. Prati, and Maria Carolina Monard. 2004. “A Study of the Behavior of Several Methods for Balancing Machine Learning Training Data.” ACM SIGKDD Explorations Newsletter 6 (1): 20–29. doi: 10.1145/1007730.1007735
  • Bermúdez, Ll., J. M. Pérez, M. Ayuso, E. Gómez, and F. J. Vázquez. 2008. “A Bayesian Dichotomous Model with Asymmetric Link for Fraud in Insurance.” Insurance: Mathematics and Economics 42 (2): 779–786.
  • Bhattacharyya, Siddhartha, Sanjeev Jha, Kurian Tharakunnel, and J. Christopher Westland. 2011. “Data Mining for Credit Card Fraud: A Comparative Study.” Decision Support Systems 50 (3): 602–613. doi: 10.1016/j.dss.2010.08.008
  • Bolton, Richard J., and David J. Hand. 2001. “Unsupervised Profiling Methods for Fraud Detection.” Credit Scoring and Credit Control VII: 235–255.
  • Bolton, Richard J., and David J. Hand. 2002. “Statistical Fraud Detection: A Review.” Statistical Science 17 (3): 235–249. doi: 10.1214/ss/1042727940
  • Brause, R., T. Langsdorf, and Michael Hepp. 1999. “Neural Data Mining for Credit Card Fraud Detection.” Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence, 103–106. IEEE.
  • Butaru, Florentin, Qingqing Chen, Brian Clark, Sanmay Das, Andrew W. Lo, and Akhtar Siddique. 2016. “Risk and Risk Management in the Credit Card Industry.” Journal of Banking & Finance 72: 218–239. doi: 10.1016/j.jbankfin.2016.07.015
  • Chawla, Nitesh V. 2003. “C4. 5 and Imbalanced Data Sets: Investigating the Effect of Sampling Method, Probabilistic Estimate, and Decision Tree Structure.” Proceedings of the ICML 3: 66.
  • Chawla, Nitesh V., K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. 2002. “SMOTE: Synthetic Minority Over-Sampling Technique.” Journal of Artificial Intelligence Research 16: 321–357. doi: 10.1613/jair.953
  • Chernobai, Anna, Philippe Jorion, and Fan Yu. 2011. “The Determinants of Operational Risk in U.S. Financial Institutions.” Journal of Financial and Quantitative Analysis 46 (6): 1683–1725. doi: 10.1017/S0022109011000500
  • Choi, Namkee G., and James Mayer. 2000. “Elder Abuse, Neglect, and Exploitation: Risk Factors and Prevention Strategies.” Journal of Gerontological Social Work 33 (2): 5–25. doi: 10.1300/J083v33n02_02
  • Cohen, Carole A. 2006. “Consumer Fraud and the Elderly: A Review of Canadian Challenges and Initiatives.” Journal of Gerontological Social Work 46 (3–4): 137–144. doi: 10.1300/J083v46n03_08
  • Dal Pozzolo, Andrea, Olivier Caelen, Yann-Aël Le Borgne, Serge Waterschoot, and Gianluca Bontempi. 2014. “Learned Lessons in Credit Card Fraud Detection from a Practitioner Perspective.” Expert Systems with Applications 41 (10): 4915–4928. doi: 10.1016/j.eswa.2014.02.026
  • Drummond, Chris, and Robert C. Holte. 2003. “C4. 5, Class Imbalance, and Cost Sensitivity: Why Under-Sampling Beats Over-Sampling.” Workshop on Learning from Imbalanced Datasets II. Vol. 11, 1–8. Washington, DC: Citeseer.
  • Duman, Ekrem, and M. Hamdi Ozcelik. 2011. “Detecting Credit Card Fraud by Genetic Algorithm and Scatter Search.” Expert Systems with Applications 38 (10): 13057–13063. doi: 10.1016/j.eswa.2011.04.110
  • Estabrooks, Andrew, Taeho Jo, and Nathalie Japkowicz. 2004. “A Multiple Resampling Method for Learning from Imbalanced Data Sets.” Computational Intelligence 20 (1): 18–36. doi: 10.1111/j.0824-7935.2004.t01-1-00228.x
  • Fiordelisi, Franco, Maria-Gaia Soana, and Paola Schwizer. 2014. “Reputational Losses and Operational Risk in Banking.” The European Journal of Finance 20 (2): 105–124. doi: 10.1080/1351847X.2012.684218
  • Fraud Detection in Newly Opened Accounts. 2012. Accessed 28 September 2017. https://www.experian.com/assets/decision-analytics/white-papers/fraud-vision-wp.pdf.
  • Glancy, Fletcher H., and Surya B. Yadav. 2011. “A Computational Model for Financial Reporting Fraud Detection.” Decision Support Systems 50 (3): 595–601. doi: 10.1016/j.dss.2010.08.010
  • Guo, Tao, and Gui-Yang Li. 2008. “Neural Data Mining for Credit Card Fraud Detection.” International Conference on Machine Learning and Cybernetics. Vol. 7. IEEE.
  • He, Haibo, and Edwardo A. Garcia. 2009. “Learning from Imbalanced Data.” IEEE Transactions on Knowledge and Data Engineering 21 (9): 1263–1284. doi: 10.1109/TKDE.2008.239
  • Hilas, Constantinos S., and Paris As Mastorocostas. 2008. “An Application of Supervised and Unsupervised Learning Approaches to Telecommunications Fraud Detection.” Knowledge-Based Systems 21 (7): 721–726. doi: 10.1016/j.knosys.2008.03.026
  • Jackson, Shelly L., and Thomas L. Hafemeister. 2011. “Risk Factors Associated with Elder Abuse: The Importance of Differentiating by Type of Elder Maltreatment.” Violence and Victims 26 (6): 738–757. doi: 10.1891/0886-6708.26.6.738
  • Jackson, Shelly L., and Thomas L. Hafemeister. 2012. “Pure Financial Exploitation vs. Hybrid Financial Exploitation Co-occurring with Physical Abuse and/or Neglect of Elderly Persons.” Psychology of Violence 2 (3): 285–296. doi: 10.1037/a0027273
  • Japkowicz, Nathalie, and Shaju Stephen. 2002. “The Class Imbalance Problem: A Systematic Study.” Intelligent Data Analysis 6 (5): 429–449. doi: 10.3233/IDA-2002-6504
  • Jha, Sanjeev, Montserrat Guillen, and J. Christopher Westland. 2012. “Employing Transaction Aggregation Strategy to Detect Credit Card Fraud.” Expert Systems with Applications 39 (16): 12650–12657. doi: 10.1016/j.eswa.2012.05.018
  • John, Deborah Roedder, and Catherine A. Cole. 1986. “Age Differences in Information Processing: Understanding Deficits in Young and Elderly Consumers.” Journal of Consumer Research 13 (3): 297–315. doi: 10.1086/209070
  • Kang, Pilsung, and Sungzoon Cho. 2006. “EUS SVMs: Ensemble of Under-Sampled SVMs for Data Imbalance Problems.” International Conference on Neural Information Processing, 837–846. Berlin: Springer.
  • Khandani, Amir E., Adlar J. Kim, and Andrew W. Lo. 2010. “Consumer Credit-Risk Models via Machine-Learning Algorithms.” Journal of Banking & Finance 34 (11): 2767–2787. doi: 10.1016/j.jbankfin.2010.06.001
  • Kubat, Miroslav, and Stan Matwin. 1997. “Addressing the Curse of Imbalanced Training Sets: One-Sided Selection.” ICML 97: 179–186.
  • Lee, Jinkook, and Loren V. Geistfeld. 1999. “Elderly Consumers’ Receptiveness to Telemarketing Fraud.” Journal of Public Policy & Marketing 18 (2): 208–217.
  • Lee, Jinkook, and Horacio Soberon-Ferrer. 1997. “Consumer Vulnerability to Fraud: Influencing Factors.” Journal of Consumer Affairs 31 (1): 70–89. doi: 10.1111/j.1745-6606.1997.tb00827.x
  • Lin, Yi, and Yongho Jeon. 2006. “Random Forests and Adaptive Nearest Neighbors.” Journal of the American Statistical Association 101 (474): 578–590. doi: 10.1198/016214505000001230
  • Mears, Daniel P., Michael D. Reisig, Samuel Scaggs, and Kristy Holtfreter. 2016. “Efforts to Reduce Consumer Fraud Victimization among the Elderly: The Effect of Information Access on Program Awareness and Contact.” Crime & Delinquency 62 (9): 1235–1259. doi: 10.1177/0011128714555759
  • Menardi, Giovanna, and Nicola Torelli. 2014. “Training and Assessing Classification Rules with Imbalanced Data.” Data Mining and Knowledge Discovery 28 (1): 92–122. doi: 10.1007/s10618-012-0295-5
  • Rabiner, Donna J., David Brown, and Janet O’Keeffe. 2004. “Financial Exploitation of Older Persons: Policy Issues and Recommendations for Addressing Them.” Journal of Elder Abuse & Neglect 16 (1): 65–84. doi: 10.1300/J084v16n01_04
  • Rabiner, Donna J., Janet O’Keeffe, and David Brown. 2005. “A Conceptual Framework of Financial Exploitation of Older Persons.” Journal of Elder Abuse & Neglect 16 (2): 53–73. doi: 10.1300/J084v16n02_05
  • Ravisankar, P., V. Ravi, G. Raghava Rao, and I. Bose. 2011. “Detection of Financial Statement Fraud and Feature Selection Using Data Mining Techniques.” Decision Support Systems 50 (2): 491–500. doi: 10.1016/j.dss.2010.11.006
  • Seiffert, Chris, Taghi M. Khoshgoftaar, and Jason Van Hulse. 2009. “Hybrid Sampling for Imbalanced Data.” Integrated Computer-Aided Engineering 16 (3): 193–210. doi: 10.3233/ICA-2009-0314
  • Sklar, Judith B. 2000. “Elder and Dependent Adult Fraud: A Sampler of Actual Cases to Profile the Offenders and the Crimes they Perpetrate.” Journal of Elder Abuse & Neglect 12 (2): 19–32. doi: 10.1300/J084v12n02_04
  • Smith, Ruth Belk, and George P. Moschis. 1985. “A Socialization Perspective on Selected Consumer Characteristics of the Elderly.” Journal of Consumer Affairs 19 (1): 74–95. doi: 10.1111/j.1745-6606.1985.tb00345.x
  • Tacchino, Kenn Beam. 2017. “Preventing Financial Elder Abuse.” Journal of Personal Finance 16 (1): 78–88.
  • Wilber, Kathleen H., and Sandra L. Reynolds. 1997. “Introducing a Framework for Defining Financial Abuse of the Elderly.” Journal of Elder Abuse & Neglect 8 (2): 61–80. doi: 10.1300/J084v08n02_06
  • Wong, Nicholas, Pradeep Ray, Greg Stephens, and Lundy Lewis. 2012. “Artificial Immune Systems for the Detection of Credit Card Fraud: An Architecture, Prototype and Preliminary Results.” Information Systems Journal 22 (1): 53–76. doi: 10.1111/j.1365-2575.2011.00369.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.