Visual data mining: Recognizing telephone calling fraud

被引:48
|
作者
Cox, KC [1 ]
Eick, SG [1 ]
Wills, GJ [1 ]
Brachman, RJ [1 ]
机构
[1] AT&T Bell Labs, Lucent Technol, Naperville, IL 60566 USA
关键词
visualization; fraud; information discovery; interaction; telecommunications data mining;
D O I
10.1023/A:1009740009307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Human pattern recognition skills me remarkable and in many situations far exceed the ability of automated mining algorithms. By building domain-specific interfaces that present information visually, we can combine human detection with machines' far greater computational capacity. We illustrate our ideas by describing a suite of visual interfaces we built for telephone fraud detection.
引用
收藏
页码:225 / 231
页数:7
相关论文
共 50 条
  • [21] SNIPER: A Data Mining Methodology for Fiscal Fraud Detection
    Basta, Stefano
    Giannotti, Fosca
    Manco, Giuseppe
    Pedreschi, Dino
    Spinsanti, Laura
    ERCIM NEWS, 2009, (78): : 27 - 28
  • [22] Data mining for credit card fraud: A comparative study
    Bhattacharyya, Siddhartha
    Jha, Sanjeev
    Tharakunnel, Kurian
    Westland, J. Christopher
    DECISION SUPPORT SYSTEMS, 2011, 50 (03) : 602 - 613
  • [23] A data mining framework for detecting subscription fraud in telecommunication
    Farvaresh, Hamid
    Sepehri, Mohammad Mehdi
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2011, 24 (01) : 182 - 194
  • [24] A fraud detection approach with data mining in health insurance
    Kirlidog, Melih
    Asuk, Cuneyt
    WORLD CONFERENCE ON BUSINESS, ECONOMICS AND MANAGEMENT (BEM-2012), 2012, 62 : 989 - 994
  • [25] Telephone fraud avoidance guide
    不详
    BRITISH TELECOMMUNICATIONS ENGINEERING, 1997, 16 : 175 - 175
  • [26] Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review
    Sanchez-Aguayo, Marco
    Urquiza-Aguiar, Luis
    Estrada-Jimenez, Jose
    COMPUTERS, 2021, 10 (10)
  • [27] Predictive Fraud Analysis Applying the Fraud Triangle Theory through Data Mining Techniques
    Sanchez-Aguayo, Marco
    Urquiza-Aguiar, Luis
    Estrada-Jimenez, Jose
    APPLIED SCIENCES-BASEL, 2022, 12 (07):
  • [28] Telephone card fraud - Manipulation with telephone card simulators
    Leimanzik, J
    Tietz, R
    KRIMINALISTIK, 1998, 52 (03): : 199 - 201
  • [29] Mining for fraud
    Weatherford, M
    IEEE INTELLIGENT SYSTEMS, 2002, 17 (04): : 4 - 6
  • [30] Data mining for recognizing patterns in foodborne disease outbreaks
    Thakur, Maitri
    Olafsson, Sigurdur
    Lee, Jong-Seok
    Hurburgh, Charles R.
    JOURNAL OF FOOD ENGINEERING, 2010, 97 (02) : 213 - 227