Automatic on-line risk analysis of suspicious transactions

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Portion of the electronically processed agendas and transactions of all kinds constantly increases and also the volume and importance of the processed agendas grows. Therefore, the need for supervision and inspection of these transactions is also increasing. One possibility is to accomplish control e.g. with the use of specialised mining instruments. The main disadvantage of this approach is the fact that the discovered suspicious transaction was completed long ago and it is impossible to change it. In such a case, we need to inspect and evaluate transactions in the real time still before their completion. But the complexity of real-time analysis of transaction rapidly grows with the increasing set of aspects of this assessment. This paper describes the conception, architecture and possibilities to utilize a system which contains mainly the on-line risk analysis and simultaneously it enables an automatic adaptation by the means of utilizing conclusions from a feedback analysis of mining instruments of the data warehouse. This system is suitable e.g. for the automatic on-line analysis of risks of credit card payments, authenticity of the submitted projects (at university), the submitted tax or customs declarations, etc. Without any detriment to generality, we shall use the last mentioned application domain for explaining the system properties.

Cite

CITATION STYLE

APA

Sobotka, P., & Vrana, I. (2007). Automatic on-line risk analysis of suspicious transactions. Agricultural Economics, 53(12), 558–564. https://doi.org/10.17221/1221-agricecon

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free