{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T20:10:51Z","timestamp":1724357451418},"reference-count":26,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1016\/j.chb.2012.01.002","type":"journal-article","created":{"date-parts":[[2012,2,4]],"date-time":"2012-02-04T04:32:44Z","timestamp":1328329964000},"page":"1002-1013","source":"Crossref","is-referenced-by-count":39,"title":["Identifying the signs of fraudulent accounts using data mining techniques"],"prefix":"10.1016","volume":"28","author":[{"given":"Shing-Han","family":"Li","sequence":"first","affiliation":[]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Wen-Hui","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Chiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2012.01.002_b0005","unstructured":"Administrative Enforcement Agency (2007). Be careful of new tricks from fraudulent organizations ."},{"key":"10.1016\/j.chb.2012.01.002_b0010","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1109\/69.250074","article-title":"Database mining: A performance perspective","volume":"5","author":"Agrawal","year":"1993","journal-title":"The IEEE Transactions on Knowledge and Data"},{"issue":"2","key":"10.1016\/j.chb.2012.01.002_b0015","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/TFUZZ.2003.809901","article-title":"Mining fuzzy association rules in a bank-account database","volume":"11","author":"Au","year":"2003","journal-title":"IEEE transactions on fuzzy systems"},{"key":"10.1016\/j.chb.2012.01.002_b0020","series-title":"Data Mining Techniques: For Marketing, Sales, and Customer Support","author":"Berry","year":"1997"},{"issue":"1","key":"10.1016\/j.chb.2012.01.002_b0025","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/j.1467-9876.2007.00599.x","article-title":"A statistical model for the temporal pattern of individual automated teller machine withdrawals","volume":"57","author":"Brentnall","year":"2008","journal-title":"Journal of the Royal Statistical Society Series C"},{"issue":"3","key":"10.1016\/j.chb.2012.01.002_b0030","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/j.eswa.2007.07.015","article-title":"Machine learning techniques for business blog search and mining","volume":"35","author":"Chen","year":"2008","journal-title":"Expert Systems with Applications"},{"issue":"5","key":"10.1016\/j.chb.2012.01.002_b0040","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0378-7206(99)00051-8","article-title":"Methodological and practical aspects of data mining","volume":"37","author":"Feelders","year":"2000","journal-title":"Information Management"},{"key":"10.1016\/j.chb.2012.01.002_b0045","unstructured":"Financial Supervisory Commission (2011). Automatic service machines of financial institutions. Financial statistics abstract (pp. 89\u201391)."},{"key":"10.1016\/j.chb.2012.01.002_b0050","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Reilly, D. L., (1994). Credit card fraud detection with a neural-network. In Proceedings of the 27th annual Hawaii international conference on systems (pp. 621\u2013630).","DOI":"10.1109\/HICSS.1994.323314"},{"key":"10.1016\/j.chb.2012.01.002_b0055","series-title":"Data Mining: Concepts and Techniques, 2\/e","author":"Han","year":"2006"},{"issue":"2","key":"10.1016\/j.chb.2012.01.002_b0060","first-page":"346","article-title":"Fraud, the consumer, and the banks: the (un-) regulation of electronic funds transfer","volume":"53","author":"Hayhoe","year":"1995","journal-title":"University of Toronto Faculty of Law Review"},{"issue":"4","key":"10.1016\/j.chb.2012.01.002_b0065","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1016\/j.eswa.2006.02.016","article-title":"Data mining techniques for the detection of fraudulent financial statements","volume":"32","author":"Kirkosa","year":"2007","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.chb.2012.01.002_b0070","first-page":"37","article-title":"The empirical analysis of internet fraud in taiwan\u2014focusing on type of payment","volume":"2007","author":"Ku","year":"2007","journal-title":"The Journal of Information Technology Society"},{"issue":"2","key":"10.1016\/j.chb.2012.01.002_b0075","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1016\/0377-2217(93)E0249-W","article-title":"The development of a rule based expert system model for fraud alert in consumer credit","volume":"80","author":"Leonard","year":"1995","journal-title":"European Journal of Operational Research"},{"key":"10.1016\/j.chb.2012.01.002_b0080","series-title":"Machine Learning","author":"Mitchell","year":"1997"},{"key":"10.1016\/j.chb.2012.01.002_b0085","unstructured":"National Police Agency (2011). Fraud statistics. ."},{"issue":"2","key":"10.1016\/j.chb.2012.01.002_b0090","doi-asserted-by":"crossref","first-page":"2592","DOI":"10.1016\/j.eswa.2008.02.021","article-title":"Application of data mining techniques in customer relationship management: A literature review and classification","volume":"36","author":"Ngai","year":"2009","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.chb.2012.01.002_b0095","unstructured":"Federal trade commission (n.d.). Recognize Phone Fraud. ."},{"key":"10.1016\/j.chb.2012.01.002_b0100","unstructured":"Phua, C., Leem, V., Smith, K., & Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research ."},{"issue":"4","key":"10.1016\/j.chb.2012.01.002_b0105","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1016\/j.eswa.2007.08.093","article-title":"Real-time credit card fraud detection using computational intelligence","volume":"35","author":"Quah","year":"2008","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.chb.2012.01.002_b0110","series-title":"Data mining: a practical approach for database marketing","author":"Rothman","year":"1995"},{"key":"10.1016\/j.chb.2012.01.002_b0115","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0167-9236(00)00123-8","article-title":"Knowledge management and data mining for marketing","volume":"31","author":"Shaw","year":"2001","journal-title":"A Decision Support System"},{"key":"10.1016\/j.chb.2012.01.002_b0120","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/S0957-4174(01)00037-9","article-title":"Mining the change of customer behavior in an internet shopping mall","volume":"21","author":"Song","year":"2001","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"10.1016\/j.chb.2012.01.002_b0125","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1198\/TECH.2010.07032","article-title":"Statistical methods for fighting financial crimes","volume":"52","author":"Sudjianto","year":"2010","journal-title":"Technometrics"},{"key":"10.1016\/j.chb.2012.01.002_b0130","first-page":"133","article-title":"Personal fraud: The victims and the scams","volume":"12","author":"Titus","year":"2001","journal-title":"Crime Prevention Studies"},{"issue":"2","key":"10.1016\/j.chb.2012.01.002_b0135","first-page":"228","article-title":"Massively multiplayer online fraud: Why the introduction of real world law in a virtual context is good for everyone","volume":"6","author":"White","year":"2008","journal-title":"Northwestern Journal of Technology and Intellectual Property"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212000040?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212000040?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T06:19:20Z","timestamp":1561270760000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563212000040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["S0747563212000040"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2012.01.002","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2012,5]]}}}