Taxonomy of Fraud Detection Metrics for Business Processes
A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are imp...
Ausführliche Beschreibung
Autor*in: |
Badr Omair [verfasserIn] Ahmad Alturki [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2020 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: IEEE Access - IEEE, 2014, 8(2020), Seite 71364-71377 |
---|---|
Übergeordnetes Werk: |
volume:8 ; year:2020 ; pages:71364-71377 |
Links: |
---|
DOI / URN: |
10.1109/ACCESS.2020.2987337 |
---|
Katalog-ID: |
DOAJ068418639 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ068418639 | ||
003 | DE-627 | ||
005 | 20230502082915.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230228s2020 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1109/ACCESS.2020.2987337 |2 doi | |
035 | |a (DE-627)DOAJ068418639 | ||
035 | |a (DE-599)DOAJebe38be68a99449aa43f2b12238247ad | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK1-9971 | |
100 | 0 | |a Badr Omair |e verfasserin |4 aut | |
245 | 1 | 0 | |a Taxonomy of Fraud Detection Metrics for Business Processes |
264 | 1 | |c 2020 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. | ||
650 | 4 | |a Business process fraud | |
650 | 4 | |a fraud categories | |
650 | 4 | |a fraud classification | |
650 | 4 | |a fraud detection | |
650 | 4 | |a fraud indicators | |
650 | 4 | |a fraud metrics | |
653 | 0 | |a Electrical engineering. Electronics. Nuclear engineering | |
700 | 0 | |a Ahmad Alturki |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t IEEE Access |d IEEE, 2014 |g 8(2020), Seite 71364-71377 |w (DE-627)728440385 |w (DE-600)2687964-5 |x 21693536 |7 nnns |
773 | 1 | 8 | |g volume:8 |g year:2020 |g pages:71364-71377 |
856 | 4 | 0 | |u https://doi.org/10.1109/ACCESS.2020.2987337 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad |z kostenfrei |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/document/9064571/ |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2169-3536 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a SSG-OLC-PHA | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 8 |j 2020 |h 71364-71377 |
author_variant |
b o bo a a aa |
---|---|
matchkey_str |
article:21693536:2020----::aooyfrudtcinercfru |
hierarchy_sort_str |
2020 |
callnumber-subject-code |
TK |
publishDate |
2020 |
allfields |
10.1109/ACCESS.2020.2987337 doi (DE-627)DOAJ068418639 (DE-599)DOAJebe38be68a99449aa43f2b12238247ad DE-627 ger DE-627 rakwb eng TK1-9971 Badr Omair verfasserin aut Taxonomy of Fraud Detection Metrics for Business Processes 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics Electrical engineering. Electronics. Nuclear engineering Ahmad Alturki verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 71364-71377 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:71364-71377 https://doi.org/10.1109/ACCESS.2020.2987337 kostenfrei https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad kostenfrei https://ieeexplore.ieee.org/document/9064571/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 71364-71377 |
spelling |
10.1109/ACCESS.2020.2987337 doi (DE-627)DOAJ068418639 (DE-599)DOAJebe38be68a99449aa43f2b12238247ad DE-627 ger DE-627 rakwb eng TK1-9971 Badr Omair verfasserin aut Taxonomy of Fraud Detection Metrics for Business Processes 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics Electrical engineering. Electronics. Nuclear engineering Ahmad Alturki verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 71364-71377 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:71364-71377 https://doi.org/10.1109/ACCESS.2020.2987337 kostenfrei https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad kostenfrei https://ieeexplore.ieee.org/document/9064571/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 71364-71377 |
allfields_unstemmed |
10.1109/ACCESS.2020.2987337 doi (DE-627)DOAJ068418639 (DE-599)DOAJebe38be68a99449aa43f2b12238247ad DE-627 ger DE-627 rakwb eng TK1-9971 Badr Omair verfasserin aut Taxonomy of Fraud Detection Metrics for Business Processes 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics Electrical engineering. Electronics. Nuclear engineering Ahmad Alturki verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 71364-71377 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:71364-71377 https://doi.org/10.1109/ACCESS.2020.2987337 kostenfrei https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad kostenfrei https://ieeexplore.ieee.org/document/9064571/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 71364-71377 |
allfieldsGer |
10.1109/ACCESS.2020.2987337 doi (DE-627)DOAJ068418639 (DE-599)DOAJebe38be68a99449aa43f2b12238247ad DE-627 ger DE-627 rakwb eng TK1-9971 Badr Omair verfasserin aut Taxonomy of Fraud Detection Metrics for Business Processes 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics Electrical engineering. Electronics. Nuclear engineering Ahmad Alturki verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 71364-71377 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:71364-71377 https://doi.org/10.1109/ACCESS.2020.2987337 kostenfrei https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad kostenfrei https://ieeexplore.ieee.org/document/9064571/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 71364-71377 |
allfieldsSound |
10.1109/ACCESS.2020.2987337 doi (DE-627)DOAJ068418639 (DE-599)DOAJebe38be68a99449aa43f2b12238247ad DE-627 ger DE-627 rakwb eng TK1-9971 Badr Omair verfasserin aut Taxonomy of Fraud Detection Metrics for Business Processes 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics Electrical engineering. Electronics. Nuclear engineering Ahmad Alturki verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 71364-71377 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:71364-71377 https://doi.org/10.1109/ACCESS.2020.2987337 kostenfrei https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad kostenfrei https://ieeexplore.ieee.org/document/9064571/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 71364-71377 |
language |
English |
source |
In IEEE Access 8(2020), Seite 71364-71377 volume:8 year:2020 pages:71364-71377 |
sourceStr |
In IEEE Access 8(2020), Seite 71364-71377 volume:8 year:2020 pages:71364-71377 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics Electrical engineering. Electronics. Nuclear engineering |
isfreeaccess_bool |
true |
container_title |
IEEE Access |
authorswithroles_txt_mv |
Badr Omair @@aut@@ Ahmad Alturki @@aut@@ |
publishDateDaySort_date |
2020-01-01T00:00:00Z |
hierarchy_top_id |
728440385 |
id |
DOAJ068418639 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ068418639</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502082915.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/ACCESS.2020.2987337</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ068418639</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJebe38be68a99449aa43f2b12238247ad</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Badr Omair</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Taxonomy of Fraud Detection Metrics for Business Processes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business process fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud categories</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud classification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud indicators</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud metrics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electrical engineering. Electronics. Nuclear engineering</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Ahmad Alturki</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Access</subfield><subfield code="d">IEEE, 2014</subfield><subfield code="g">8(2020), Seite 71364-71377</subfield><subfield code="w">(DE-627)728440385</subfield><subfield code="w">(DE-600)2687964-5</subfield><subfield code="x">21693536</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2020</subfield><subfield code="g">pages:71364-71377</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/ACCESS.2020.2987337</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/9064571/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2169-3536</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2020</subfield><subfield code="h">71364-71377</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Badr Omair |
spellingShingle |
Badr Omair misc TK1-9971 misc Business process fraud misc fraud categories misc fraud classification misc fraud detection misc fraud indicators misc fraud metrics misc Electrical engineering. Electronics. Nuclear engineering Taxonomy of Fraud Detection Metrics for Business Processes |
authorStr |
Badr Omair |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)728440385 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TK1-9971 |
illustrated |
Not Illustrated |
issn |
21693536 |
topic_title |
TK1-9971 Taxonomy of Fraud Detection Metrics for Business Processes Business process fraud fraud categories fraud classification fraud detection fraud indicators fraud metrics |
topic |
misc TK1-9971 misc Business process fraud misc fraud categories misc fraud classification misc fraud detection misc fraud indicators misc fraud metrics misc Electrical engineering. Electronics. Nuclear engineering |
topic_unstemmed |
misc TK1-9971 misc Business process fraud misc fraud categories misc fraud classification misc fraud detection misc fraud indicators misc fraud metrics misc Electrical engineering. Electronics. Nuclear engineering |
topic_browse |
misc TK1-9971 misc Business process fraud misc fraud categories misc fraud classification misc fraud detection misc fraud indicators misc fraud metrics misc Electrical engineering. Electronics. Nuclear engineering |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
IEEE Access |
hierarchy_parent_id |
728440385 |
hierarchy_top_title |
IEEE Access |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)728440385 (DE-600)2687964-5 |
title |
Taxonomy of Fraud Detection Metrics for Business Processes |
ctrlnum |
(DE-627)DOAJ068418639 (DE-599)DOAJebe38be68a99449aa43f2b12238247ad |
title_full |
Taxonomy of Fraud Detection Metrics for Business Processes |
author_sort |
Badr Omair |
journal |
IEEE Access |
journalStr |
IEEE Access |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2020 |
contenttype_str_mv |
txt |
container_start_page |
71364 |
author_browse |
Badr Omair Ahmad Alturki |
container_volume |
8 |
class |
TK1-9971 |
format_se |
Elektronische Aufsätze |
author-letter |
Badr Omair |
doi_str_mv |
10.1109/ACCESS.2020.2987337 |
author2-role |
verfasserin |
title_sort |
taxonomy of fraud detection metrics for business processes |
callnumber |
TK1-9971 |
title_auth |
Taxonomy of Fraud Detection Metrics for Business Processes |
abstract |
A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. |
abstractGer |
A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. |
abstract_unstemmed |
A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
title_short |
Taxonomy of Fraud Detection Metrics for Business Processes |
url |
https://doi.org/10.1109/ACCESS.2020.2987337 https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad https://ieeexplore.ieee.org/document/9064571/ https://doaj.org/toc/2169-3536 |
remote_bool |
true |
author2 |
Ahmad Alturki |
author2Str |
Ahmad Alturki |
ppnlink |
728440385 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1109/ACCESS.2020.2987337 |
callnumber-a |
TK1-9971 |
up_date |
2024-07-03T17:40:27.620Z |
_version_ |
1803580528534749184 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ068418639</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230502082915.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/ACCESS.2020.2987337</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ068418639</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJebe38be68a99449aa43f2b12238247ad</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Badr Omair</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Taxonomy of Fraud Detection Metrics for Business Processes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A business process is a set of connected events, activities, and decision points, including actors and objects, which collectively produce a beneficial outcome for the customer. The success of an organization's strategic goals and performance depends on how well these business processes are implemented and executed. However, process-based fraud (PBF), a type of fraud that occurs in business processes, can be an obstacle to achieving this. Literature analysis shows that to date PBF detection metrics have not been sufficiently addressed. Specifically, there is overlap, confusion, and no standard for fraud definitions and categories that can affect our understanding of fraud mechanisms. This study develops a taxonomy to expose the dimensions, characteristics, and objects of PBF detection and to determine their relationships by using the design science research methodology. The developed taxonomy identifies four PBF dimensions with the following characteristics: (1) process perspective {time, function, data, resource, and location}, (2) presentation layer {process map, process stream, process model, process instance, and process activity}, (3) fraud data scheme {anomalous, discrepant, missing, and wrong}, and (4) fraud domain {generic and specific}. The objective of this taxonomy is to offer a useful tool to anyone seeking to classify, develop, and evaluate PBF detection metrics, along with a holistic view of PBF detection and the determination of its borders. Additionally, it may help in standardizing the concepts of PBF detection metrics to ensure consistency between stakeholders.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business process fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud categories</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud classification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud indicators</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">fraud metrics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electrical engineering. Electronics. Nuclear engineering</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Ahmad Alturki</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Access</subfield><subfield code="d">IEEE, 2014</subfield><subfield code="g">8(2020), Seite 71364-71377</subfield><subfield code="w">(DE-627)728440385</subfield><subfield code="w">(DE-600)2687964-5</subfield><subfield code="x">21693536</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2020</subfield><subfield code="g">pages:71364-71377</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/ACCESS.2020.2987337</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/ebe38be68a99449aa43f2b12238247ad</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/9064571/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2169-3536</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2020</subfield><subfield code="h">71364-71377</subfield></datafield></record></collection>
|
score |
7.4007626 |