{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T08:03:10Z","timestamp":1726473790000},"reference-count":18,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2009,6,1]],"date-time":"2009-06-01T00:00:00Z","timestamp":1243814400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Operational Research"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1016\/j.ejor.2008.02.015","type":"journal-article","created":{"date-parts":[[2008,4,3]],"date-time":"2008-04-03T08:24:14Z","timestamp":1207211054000},"page":"595-612","source":"Crossref","is-referenced-by-count":21,"title":["On the communal analysis suspicion scoring for identity crime in streaming credit applications"],"prefix":"10.1016","volume":"195","author":[{"given":"Clifton","family":"Phua","sequence":"first","affiliation":[]},{"given":"Ross","family":"Gayler","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kate","family":"Smith-Miles","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ejor.2008.02.015_bib1","unstructured":"Baxter, R., Christen, P., Churches, T., 2003. A Comparison of fast blocking methods for record linkage. In: Proceedings of SIGKDD03 Workshop on Data Cleaning, Record Linkage, and Object Consolidation, pp. 25\u201327."},{"key":"10.1016\/j.ejor.2008.02.015_bib2","unstructured":"Baycorp Advantage, 2005. Zero-Interest Credit Cards Cause Record Growth In Card Applications."},{"issue":"5","key":"10.1016\/j.ejor.2008.02.015_bib3","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MIS.2003.1234765","article-title":"Adaptive name matching in information integration","volume":"18","author":"Bilenko","year":"2003","journal-title":"IEEE Intelligent Systems"},{"key":"10.1016\/j.ejor.2008.02.015_bib4","unstructured":"Chapman, S., 2005. Simmetrics \u2013 Open Source Similarity Measure Library. Accessed from: (accessed April 2005)."},{"key":"10.1016\/j.ejor.2008.02.015_bib5","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1198\/1061860032742","article-title":"Computational methods for dynamic graphs","volume":"12","author":"Cortes","year":"2003","journal-title":"Journal of Computational and Graphical Statistics"},{"key":"10.1016\/j.ejor.2008.02.015_bib6","doi-asserted-by":"crossref","unstructured":"Cortes, C., Pregibon, D., 1999. Information mining platforms: an infrastructure for KDD rapid deployment. In: Proceedings of SIGKDD99, pp. 327\u2013331.","DOI":"10.1145\/312129.312270"},{"issue":"3","key":"10.1016\/j.ejor.2008.02.015_bib7","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1009700419189","article-title":"Adaptive fraud detection","volume":"1","author":"Fawcett","year":"1997","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.1016\/j.ejor.2008.02.015_bib8","unstructured":"ID Analytics, 2004. Identity 2004: The Identity Risk Management Conference."},{"issue":"5","key":"10.1016\/j.ejor.2008.02.015_bib9","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1145\/324133.324140","article-title":"Authoritative sources in a hyperlinked environment","volume":"46","author":"Kleinberg","year":"1999","journal-title":"Journal of the ACM"},{"key":"10.1016\/j.ejor.2008.02.015_bib10","unstructured":"Kubica, J., Moore, A., Cohn, D., Schneider, J., 2003. Finding underlying connections: a fast graph-based method for link analysis and collaboration queries. In: Proceedings of the ICML, pp. 392\u2013399."},{"year":"2005","series-title":"Freakonomics: A Rogue Economist Explores the Hidden Side of Everything","author":"Levitt","key":"10.1016\/j.ejor.2008.02.015_bib11"},{"key":"10.1016\/j.ejor.2008.02.015_bib12","unstructured":"Liberty Financial, 2004. Fears over Holiday Credit Binge."},{"key":"10.1016\/j.ejor.2008.02.015_bib13","unstructured":"Macskassy, S., Provost, F., 2005. Suspicion scoring based on guilt-by-association, collective inference, and focused data access. In: Proceedings of the International Conference on Intelligence Analysis."},{"issue":"7","key":"10.1016\/j.ejor.2008.02.015_bib14","article-title":"Synthetic identity fraud: unseen identity challenge","volume":"3","author":"Oscherwitz","year":"2005","journal-title":"Bank Security News"},{"key":"10.1016\/j.ejor.2008.02.015_bib15","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T., 1998. The PageRank Citation Ranking: Bringing Order to the Web. Stanford Digital Library Project Technical Report."},{"key":"10.1016\/j.ejor.2008.02.015_bib16","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R., 2005. A comprehensive survey of data mining-based fraud detection research. Clayton School of Information Technology, Monash University."},{"year":"1994","series-title":"Social Network Analysis: Methods and Applications","author":"Wasserman","key":"10.1016\/j.ejor.2008.02.015_bib17"},{"year":"2005","series-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","key":"10.1016\/j.ejor.2008.02.015_bib18"}],"container-title":["European Journal of Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221708001999?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221708001999?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T16:50:45Z","timestamp":1557420645000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377221708001999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["S0377221708001999"],"URL":"https:\/\/doi.org\/10.1016\/j.ejor.2008.02.015","relation":{},"ISSN":["0377-2217"],"issn-type":[{"type":"print","value":"0377-2217"}],"subject":[],"published":{"date-parts":[[2009,6]]}}}