{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:52:41Z","timestamp":1767901961274,"version":"3.49.0"},"reference-count":54,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["CISUC---UID\/CEC\/00326\/2020"],"award-info":[{"award-number":["CISUC---UID\/CEC\/00326\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","award":["Regional Operational Program Centro 2020"],"award-info":[{"award-number":["Regional Operational Program Centro 2020"]}],"id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:p> Fraud detection is related to the suppression of possible financial losses for institutions and their clients. It is a task of high responsibility and, therefore, an important phase of the decision-making chain. Nowadays, experts in charge base their analysis on tabular data, usually presented in spreadsheets and seldom supplemented with simple visualisations. However, this type of inspection is laborious, time-consuming, and may be of little use for the analysis and overview of complex transactional data. To aid in the inspection of fraudulent activities, we develop ATOVis \u2013 a visualisation tool that enables a fast analysis and detection of suspicious behaviours. We aim to ease and accelerate fraud detection by providing an overview of specific patterns within the data, and enabling details on demand. ATOVis focuses on applying visualisation techniques to the Finance domain, specifically e-commerce, contributing to the state-of-the-art as the first visualisation tool primarily specialised in Account Takeover (ATO) patterns. In particular, the present paper incorporates: a task abstraction for detecting a specific financial fraud pattern \u2013 ATO; two models for the visualisation of ATO; and a multiscale timeline to enable an overview of the data. We also validate our tool through user testing, with experts in fraud detection and experts from other fields of data science. Based on the feedback provided by the analysts, we could conclude that ATOVis is an efficient and effective tool in detecting specific patterns of fraud which can improve the analysts\u2019 work. <\/jats:p>","DOI":"10.1177\/14738716221098074","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T11:25:37Z","timestamp":1654601137000},"page":"371-392","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["ATOVis \u2013 A visualisation tool for the detection of financial fraud"],"prefix":"10.1177","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4511-5763","authenticated-orcid":false,"given":"Catarina","family":"Ma\u00e7\u00e3s","sequence":"first","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Centre for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]},{"given":"Evgheni","family":"Polisciuc","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Centre for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]},{"given":"Penousal","family":"Machado","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Centre for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2022,6,7]]},"reference":[{"key":"bibr1-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2016.2489"},{"key":"bibr2-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"bibr3-14738716221098074","first-page":"749","volume-title":"IEEE International conference on networking, sensing and control","volume":"2","author":"Kou Y"},{"key":"bibr4-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1016\/j.visinf.2018.11.001"},{"key":"bibr5-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"bibr6-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2015.01.001"},{"key":"bibr7-14738716221098074","doi-asserted-by":"crossref","unstructured":"Crain M. Fraud Prevention, detection, and response, chapter 8. Hoboken, NJ: John Wiley & Sons, Ltd, 2017. pp.211\u2013243.","DOI":"10.1002\/9781119449423.ch8"},{"key":"bibr8-14738716221098074","author":"Phua C","year":"2010","journal-title":"arXiv preprint"},{"key":"bibr9-14738716221098074","volume-title":"Human compatible: artificial intelligence and the problem of control","author":"Russell S.","year":"2019"},{"key":"bibr10-14738716221098074","volume-title":"Artificial intelligence: a guide for thinking humans","author":"Mitchell M.","year":"2019"},{"key":"bibr11-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12931"},{"key":"bibr12-14738716221098074","first-page":"155","volume-title":"2007 IEEE Symposium on visual analytics science and technology","author":"Chang R"},{"key":"bibr13-14738716221098074","volume-title":"Poster abstracts of IEEE Conference on visualization","volume":"2","author":"Dumas M","year":"2014"},{"key":"bibr14-14738716221098074","first-page":"197","volume-title":"2009 13th International conference information visualisation","author":"Huang ML"},{"issue":"1","key":"bibr15-14738716221098074","first-page":"55","volume":"20","author":"Kirkland JD","year":"1999","journal-title":"AI Mag"},{"key":"bibr16-14738716221098074","first-page":"45","volume-title":"Proceedings of the Eurographics\/IEEE VGTC conference on visualization: Posters","author":"Leite RA"},{"key":"bibr17-14738716221098074","volume-title":"IIEEJ Image electronics and visual computing workshop","author":"Sakoda C"},{"key":"bibr18-14738716221098074","first-page":"203","volume-title":"2011 IEEE pacific visualization symposium","author":"Didimo W"},{"key":"bibr19-14738716221098074","first-page":"799","volume-title":"GRAPP\/IVAPP","author":"Didimo W","year":"2012"},{"key":"bibr20-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70415"},{"key":"bibr21-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2614803"},{"key":"bibr22-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/WISE.2000.882407"},{"key":"bibr23-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865076"},{"key":"bibr24-14738716221098074","first-page":"101","volume-title":"Proceedings of the 20th annual ACM symposium on user interface software and technology","author":"Andr\u2019e P"},{"key":"bibr25-14738716221098074","first-page":"433","volume-title":"Proceedings of the international working conference on advanced visual interfaces","author":"Zhao J"},{"key":"bibr26-14738716221098074","first-page":"1737","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems","author":"Zhao J"},{"key":"bibr27-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.180"},{"key":"bibr28-14738716221098074","volume-title":"IEEE conference on visual analytics science and technology (VAST Challenge 2018 MC2)","author":"Cakmak E"},{"key":"bibr29-14738716221098074","first-page":"156","volume-title":"2009 13th International conference information visualisation","author":"Hoeber O"},{"key":"bibr30-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2392771"},{"key":"bibr31-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1177\/1473871615605347"},{"key":"bibr32-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.008"},{"key":"bibr33-14738716221098074","first-page":"119","volume-title":"2013 IEEE Symposium on visual languages and human centric computing","author":"Yoon Y"},{"key":"bibr34-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238493"},{"key":"bibr35-14738716221098074","first-page":"575","volume-title":"2009 IEEE 31st international conference on software engineering","author":"Treude C"},{"key":"bibr36-14738716221098074","first-page":"75","volume-title":"Proceedings of the working conference on Advanced visual interfaces","author":"Burch M"},{"key":"bibr37-14738716221098074","unstructured":"Jensen M. Visualizing complex semantic timelines, https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download? (2003, accessed 21 December 2021)."},{"key":"bibr38-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1117\/12.871215"},{"key":"bibr39-14738716221098074","unstructured":"Richter HA, Brotherton JA, Abowd GD, et al. A multi-scale timeline slider for stream visualization and control. Technical report, Georgia Institute of Technology, Atlanta, GA, 1999."},{"key":"bibr40-14738716221098074","first-page":"33","volume-title":"2010 IEEE Pacific visualization symposium (PacificVis)","author":"Javed W"},{"issue":"27","key":"bibr41-14738716221098074","first-page":"27","volume":"70","author":"TabinHasan K","year":"2013","journal-title":"Int J Comput Appl"},{"key":"bibr42-14738716221098074","first-page":"514","volume-title":"International symposium on visual computing","author":"Stab C"},{"key":"bibr43-14738716221098074","volume-title":"VAW2 011: The third international UKVAC workshop on visual analytics","author":"Schaefer M"},{"key":"bibr44-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744758"},{"key":"bibr45-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12904"},{"key":"bibr46-14738716221098074","first-page":"153","volume-title":"2014 International conference on information visualization theory and applications (IVAPP)","author":"Argyriou EN"},{"key":"bibr47-14738716221098074","doi-asserted-by":"crossref","unstructured":"Veeramachaneni K, Arnaldo I, Korrapati V, et al. AI2: training a big data machine to defend. New York, NY: IEEE, 2016. pp.49\u201354.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"bibr48-14738716221098074","unstructured":"Farinelli B. Fraud bots: is your business at risk?https:\/\/blog.clear.sale\/fraud-bots-is-your-business-at-risk (accessed 22 December 2021)."},{"key":"bibr49-14738716221098074","first-page":"392","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems","author":"Zhou MX","year":"1996"},{"key":"bibr50-14738716221098074","unstructured":"Shneiderman B. The eyes have it: A task by data type taxonomy for information visualizations. In: Visual Languages, IEEE Symposium. Los Alamitos: IEEE Computer Society, 1996, pp.336. https:\/\/doi.ieeecomputersociety.org\/10.1109\/VL.1996.545307"},{"key":"bibr51-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1145\/22949.22950"},{"key":"bibr52-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.23"},{"key":"bibr53-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.209"},{"key":"bibr54-14738716221098074","doi-asserted-by":"publisher","DOI":"10.1016\/j.aos.2007.06.003"}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14738716221098074","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14738716221098074","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14738716221098074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T23:15:20Z","timestamp":1740784520000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14738716221098074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["10.1177\/14738716221098074"],"URL":"https:\/\/doi.org\/10.1177\/14738716221098074","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"value":"1473-8716","type":"print"},{"value":"1473-8724","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,7]]}}}