{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T18:51:11Z","timestamp":1655491871818},"reference-count":29,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7,1]]},"abstract":"<p>Fraud Detection is a detection of criminal activity that generally occurs in commercial organization. Detection of such fraud can prevent a great economic loss. Credit card fraud depends upon usage of card, its unusual transactions behavior or any unauthorized activity on a credit card. Clustering process can divide the data into subsets and it can be very helpful in credit card fraud detection where outlier may be more interesting than common cases. Self-organizing Map (SOM) is unsupervised clustering technique which is very efficient and handling large and high dimensional dataset. Particle Swarm Optimization (PSO) is another stochastic optimization technique based on intelligent of swarms. In the present study, we combine these two methods and present a new hybrid approach self-organizing Particle Swarm Optimization (SOPSO) in detection of credit card fraud. In order to apply our method, we demonstrated an example and its results are compared with previous techniques. Some challenges shown in the previous researches such as time and space complexity, false positive rate and supervised techniques. Our approach is efficient as it implements one of the optimization technique and unsupervised approach which results in less time and space complexity and false positive rate is very low. Domain independency is also achieved in our approach.<\/p>","DOI":"10.4018\/ijisss.2017070102","type":"journal-article","created":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T14:22:44Z","timestamp":1496672564000},"page":"17-36","source":"Crossref","is-referenced-by-count":2,"title":["Hybridization of SOM and PSO for Detecting Fraud in Credit Card"],"prefix":"10.4018","volume":"9","author":[{"given":"Suman","family":"Arora","sequence":"first","affiliation":[{"name":"Research Scholar, Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar, India"}]},{"given":"Dharminder","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar, India"}]}],"member":"2432","reference":[{"key":"IJISSS.2017070102-0","doi-asserted-by":"publisher","DOI":"10.4018\/jisss.2013010105"},{"key":"IJISSS.2017070102-1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"IJISSS.2017070102-2","doi-asserted-by":"publisher","DOI":"10.1109\/72.595879"},{"key":"IJISSS.2017070102-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.110"},{"key":"IJISSS.2017070102-4","doi-asserted-by":"publisher","DOI":"10.1109\/64.539013"},{"key":"IJISSS.2017070102-5","author":"J.Han","year":"2011","journal-title":"Data mining: concepts and techniques"},{"key":"IJISSS.2017070102-6","first-page":"2","article-title":"A comprehensive foundation.","author":"S.Haykin","year":"2004","journal-title":"Neural Networks"},{"key":"IJISSS.2017070102-7","unstructured":"Hern\u00e1ndez-Aguilar, J. A., Zavala, C., D\u00edaz, O., Burlak, G., Ochoa, A., & Ponce, J. C. (2011). Biometric Data Mining Applied to On-line Recognition Systems."},{"key":"IJISSS.2017070102-8","doi-asserted-by":"publisher","DOI":"10.4018\/ijisss.2015040104"},{"key":"IJISSS.2017070102-9","doi-asserted-by":"crossref","unstructured":"Kennedy, J. (2011). Particle swarm optimization. In Encyclopedia of machine learning (pp. 760-766). Springer US.","DOI":"10.1007\/978-0-387-30164-8_630"},{"key":"IJISSS.2017070102-10","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"key":"IJISSS.2017070102-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.02.021"},{"key":"IJISSS.2017070102-12","unstructured":"MathWorks. M. U. S. G., & Release, S. T. (1992). the Mathworks. Inc., Natick, MA."},{"key":"IJISSS.2017070102-13","doi-asserted-by":"publisher","DOI":"10.4018\/jisss.2010070101"},{"key":"IJISSS.2017070102-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"IJISSS.2017070102-15","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-007-0274-8"},{"key":"IJISSS.2017070102-16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIT.2010.5508478"},{"key":"IJISSS.2017070102-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"IJISSS.2017070102-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"IJISSS.2017070102-19","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-006-9496-5"},{"key":"IJISSS.2017070102-20","author":"K. A.Smith","year":"1999","journal-title":"\u2018Introduction to Neural Networks and Data Mining for Business Applications"},{"key":"IJISSS.2017070102-21","doi-asserted-by":"publisher","DOI":"10.4018\/jisss.2010070104"},{"key":"IJISSS.2017070102-22","doi-asserted-by":"publisher","DOI":"10.1007\/s11634-008-0021-8"},{"key":"IJISSS.2017070102-23","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0116-z"},{"key":"IJISSS.2017070102-24","first-page":"808","author":"W. K.Wong","year":"2003","journal-title":"Bayesian network anomaly pattern detection for disease outbreaks"},{"key":"IJISSS.2017070102-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"IJISSS.2017070102-26","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213290"},{"key":"IJISSS.2017070102-27","first-page":"48","article-title":"Credit card fraud detection using self-organizing maps","volume":"18","author":"V.Zaslavsky","year":"2006","journal-title":"Information and Security"},{"key":"IJISSS.2017070102-28","unstructured":"Zhu, X. (2005). Semi-Supervised Learning Literature Survey. World, 10, 10."}],"container-title":["International Journal of Information Systems in the Service Sector"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=182657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:52:00Z","timestamp":1651881120000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISSS.2017070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,7,1]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisss.2017070102","relation":{},"ISSN":["1935-5688","1935-5696"],"issn-type":[{"value":"1935-5688","type":"print"},{"value":"1935-5696","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,1]]}}}