Evaluation of Destructive e-Banking Users’ Loyalty by Applying RFM

Main Article Content

Notash Maryam
Harounabadi Ali

Abstract

World economy has encountered money laundering phenomenon and its destructive effects on economy of countries over the last decades. Money laundry detection is one of the fields in which data mining tools can be very helpful in detecting it. Nowadays, recognizing credible customers to present banking facilities to them is of high importance. On the other hand, by increasing cheating in banking, detecting the fraud customers is also important. In this study, the decision tree was being trained by providing a fuzzy decision tree and users’ behavioral vectors. The output of fuzzy tree can signify users’ risking behaviors. Some features of customers’ accounts need to be extracted in order to identify the people with high risks. For instance, the variance of money transaction and money transfer can be done. In another part of the study, RFM (Recency, Frequency, Monetary) features and MLP (Multi-Layer Perception) classifications were used to identify the loyal customers. The three-fold features of refreshment, frequency, and shopping amount was completely discussed for every customer, whereby the customers’ scores were established as well. This classification aimed to categorize the credible users of neural networks. The results of current research indicate that the represented techniques possess high precision values, in comparison with previous techniques.

Keywords:
E-banking, fraud, credible customer detection, fuzzy decision tree.

Article Details

How to Cite
Maryam, N., & Ali, H. (2019). Evaluation of Destructive e-Banking Users’ Loyalty by Applying RFM. Asian Journal of Advanced Research and Reports, 7(1), 1-12. https://doi.org/10.9734/ajarr/2019/v7i130163
Section
Original Research Article

References

Rahman RA, Anwar ISK. Effectiveness of fraud prevention and detection techniques in Malaysian Islamic banks. Procedia-Social and Behavioral Sciences. 2014;145: 97-102.

Tianqing Z. An outlier detection model based on cross datasets comparison for financial surveillance. Proceedings of the Asia-Pacific Conference on Services Computing, IEEE. 822-822:0228.

Wang SN, Yang JG. A money laundering risk evaluation method based on decision tree. In 2007 International Conference on Machine Learning and Cybernetics. IEEE. 2007;1:283-286.

Gao S, Xu D. Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Systems with Applications. 2009;36(2):1493-1504.

Gao S, Xu D, Wang H, Wang Y. Intelligent anti-money laundering system. In 2006 IEEE International Conference on Service Operations and Logistics, and Informatics. IEEE. 2006;851-856.

Xuan L, Pengzhu Z. An agent based anti-money laundering system architecture for financial supervision. In 2007 International Conference on Wireless Communications, Networking and Mobile Computing; 2007.

Lv LT, Ji N, Zhang JL. A RBF neural network model for anti-money laundering. In 2008 International Conference on Wavelet Analysis and Pattern Recognition. IEEE. 2008;1:209-215.

Michalak K, Korczak J. Graph mining approach to suspicious transaction detection. In 2011 Federated conference on computer science and information systems (FedCSIS). IEEE. 2011;69-75.

Huang YP, Lu CC, Chang TW, Horng MS. An intelligent approach to detecting the bad credit card accounts. In Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications. ACTA Press. 2007;220- 225.

Herrera F, Lozano M. Fuzzy adaptive genetic algorithms: Design, taxonomy, and future directions. Soft Computing. 2003; 7(8):545-562.

Quah JT, Sriganesh M. Real-time credit card fraud detection using computational intelligence. Expert Systems with Applica-tions. 2008;35(4):1721-1732.

Sánchez D, Vila MA, Cerda L, Serrano JM. Association rules applied to credit card fraud detection. Expert Systems with Applications. 2009;36(2):3630-3640.

Yamakawa T. A fuzzy neuron and its application to pattern rcognition. Proc. of IFSA'89. 1989;30-38.

Jang JSR, Sun CT, Mizutani E, Ho YC. Neuro-fuzzy and soft computing-a computational approach to learning and machine intelligence. Proceedings of the IEEE. 1998;86(3):600-603.

Qiasi R, Minaei-Bidgoli B, Amooee G. Developing a model for measuring customer’s loyalty and value with RFM technique and clustering algorithms. The Journal of Mathematics and Computer Science. 2012;4(2):172-181.