Theoretical Study of Analysis Prevention and Detection of different Financial Services of Data Mining

Authors

  • Geetanjali Rohan Kalme  IT, Mumbai University, A. P. Shah Institute of Technology, Thane, Maharashtra, India
  • Dr. Manoj S. Kathane  Electronics and Telecommunication, TSEC, Burhanpur, Madhya Pradesh, India

Keywords:

Data Mining Techniques, Data Mining Tasks, Data Mining Applications, Clustering, Classification.

Abstract

The Cyberspace in India is developing swiftly. It has presented ascend to new open entrances in each pitch we can consider - be it change, business, sports or training. There are dissimilar borders to a money. Network likewise has its own weaknesses. One of the significant disservices is Cybercrime illegal behavior carried out on the web. The network, alongside its drawbacks, has likewise presented us to security hazards that accompany associating with an enormous system. PCs are being abused for illegal operations like email secret work, Visa misrepresentation, suitable, program design theft, mental pestering, etc., which incidence our protection and scandal our abilities. Crimes in the internet are on the mounting. Building up a economic digital wrongdoing recognition framework is a difficult assignment and secure public activity. At whatever point any online exchange is performed through the charge card, at that point there isn't any framework that without a doubt predicts an exchange as fake. It just predicts the probability of the exchange to be a false.

References

  1. Mr. Nilesh kumar dokania & ms. Navneet kaur,” comparative study of various techniques in data mining”, international journal of engineering sciences & research technology(IJESRT),ISSN:2277-9655, CODEN: IJESS7, IC™ Value: 3.00J.
  2. https://m.economictimes.com/definition/data-mining/amp
  3. https://www.digitalvidya.com/blog/what-is-data-mining/
  4. https://content.wisestep.com/data-mining-purpose-characteristics-benefits-limitations/
  5. Jia Xue, PhD, Junxiang Chen, PhD, and Richard Gelles, PhD,” Using Data Mining Techniques to Examine Domestic Violence Topics on Twitter”, VIOLENCE AND GENDER Volume 6, Number 2, 2019ª, MaryAnnLiebert, Inc. DOI:10.1089/vio.2017.
  6. Michela Carlotta Massi, Francesca Ieva and Emanuele Lettieri, “Data mining application to healthcare fraud detection: a two-step unsupervised.
  7. clustering method for outlier detection with administrative databases”, BMC Medical Informatics and DecisionMaking (2020) 20:160 https://doi.org/10.1186/s12911-020-01143-9
  8. U.U.Veerendra, B.Ravitheja and K.Veeresh, “DATA MINING FOR SECURITY APPLICATIONS”, International Journal Of Core Engineering & Management (ISSN: 2348-9510) Special Issue, NCETICT -2017
  9. John Akhilomen,” Data Mining Application for Cyber Credit-Card Fraud Detection System”, P. Perner (Ed.): ICDM 2013, LNAI 7987, pp. 218–228, 2013.© Springer-Verlag Berlin Heidelberg 2013
  10. Hee Chan Ha,n Hana Kim and Huy Kang Kim,” Fraud Detection System in Mobile Payment Service Using Data Mining”, Journal of The Korea Institute of Information Security & Cryptology VOL.26, NO.6, Dec. 2016
  11. Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].

Downloads

Published

2020-12-18

Issue

Section

Research Articles

How to Cite

[1]
Geetanjali Rohan Kalme, Dr. Manoj S. Kathane, " Theoretical Study of Analysis Prevention and Detection of different Financial Services of Data Mining, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 5, Issue 8, pp.337-343, November-December-2020.