信用卡偽卡偵測之研究
碩士 === 國立政治大學 === 資訊管理研究所 === 92 === When reviewing the researches about fraud cards detecting in the past, most of them focus on how to enhance the probabilities to detect fraud cards. Then,they applied the methods they found to detect all the cardholders’ credit cards. The shortcoming is it’s easy...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72510980521491306395 |
id |
ndltd-TW-092NCCU5396045 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092NCCU53960452015-10-13T13:01:31Z http://ndltd.ncl.edu.tw/handle/72510980521491306395 信用卡偽卡偵測之研究 張憶賢 碩士 國立政治大學 資訊管理研究所 92 When reviewing the researches about fraud cards detecting in the past, most of them focus on how to enhance the probabilities to detect fraud cards. Then,they applied the methods they found to detect all the cardholders’ credit cards. The shortcoming is it’s easy to treat the fraud transactions as the normal transactions because every cardholder has different consuming behavior. Even some researchers try to detect fraud cards by personal consuming behavior. In fact,they still don’t detect fraud cards by personal consuming behavior completely. To resolve the problems described as above,this research adapt Event History analysis. Event history analysis revolves around two concepts: the risk set and the hazard rate(Allison 1984). The risk set comprises the number of dyads subject to event occurrence at a particular point in time. “The hazard rate is the probability that an event will occur at a particular time to a particular individual, given that the individual is at risk at that time” (Allison 1984, 16). We applied this method on fraud cards detecting to find the factors which cause fraud cards happened. Besides that,we can build the hazard function and use it to know the fraud opportunity of the transaction. This research applied the method to find the factors which cause fraud cards happened successfully. The software this research used doesn’t provide the function to create hazard function when the time dependent variables exist,so this research replaced it with decision tree 陳春龍 諶家蘭 2003 學位論文 ; thesis 35 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立政治大學 === 資訊管理研究所 === 92 === When reviewing the researches about fraud cards detecting in the past, most of them focus on how to enhance the probabilities to detect fraud cards. Then,they applied the methods they found to detect all the cardholders’ credit cards. The shortcoming is it’s easy to treat the fraud transactions as the normal transactions because every cardholder has different consuming behavior. Even some researchers try to detect fraud cards by personal consuming behavior. In fact,they still don’t detect fraud cards by personal consuming behavior completely.
To resolve the problems described as above,this research adapt Event History analysis. Event history analysis revolves around two concepts: the risk set and the hazard rate(Allison 1984). The risk set comprises the number of dyads subject to event occurrence at a particular point in time. “The hazard rate is the probability that an event will occur at a particular time to a particular individual, given that the individual is at risk at that time” (Allison 1984, 16). We applied this method on fraud cards detecting to find the factors which cause fraud cards happened. Besides that,we can build the hazard function and use it to know the fraud opportunity of the transaction.
This research applied the method to find the factors which cause fraud cards happened successfully. The software this research used doesn’t provide the function to create hazard function when the time dependent variables exist,so this research replaced it with decision tree
|
author2 |
陳春龍 |
author_facet |
陳春龍 張憶賢 |
author |
張憶賢 |
spellingShingle |
張憶賢 信用卡偽卡偵測之研究 |
author_sort |
張憶賢 |
title |
信用卡偽卡偵測之研究 |
title_short |
信用卡偽卡偵測之研究 |
title_full |
信用卡偽卡偵測之研究 |
title_fullStr |
信用卡偽卡偵測之研究 |
title_full_unstemmed |
信用卡偽卡偵測之研究 |
title_sort |
信用卡偽卡偵測之研究 |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/72510980521491306395 |
work_keys_str_mv |
AT zhāngyìxián xìnyòngkǎwěikǎzhēncèzhīyánjiū |
_version_ |
1717728858909704192 |