iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s13198-023-02043-7
Review the role of artificial intelligence in detecting and preventing financial fraud using natural language processing | International Journal of System Assurance Engineering and Management Skip to main content

Advertisement

Log in

Review the role of artificial intelligence in detecting and preventing financial fraud using natural language processing

  • ORIGINAL ARTICLE
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Frauds accounted for significant losses in the financial sector and emerged as the industry’s biggest challenge. Companies invest significant amounts to prevent such fraud. It has been reported that 63.6% of the financial institutions that use Automated Fraud prevention methods successfully prevented frauds before their occurrence. Some estimations suggest that 80% of specialists are confident in cutting down fraud using Artificial Intelligence (AI)-based platforms. Several research studies have also administered AI-based techniques for fraud prevention. This study takes a systematic literature review approach to uncover the emerging areas of fraud detection using AI. The authors have analyzed 241 research articles published in the last 20 years. The Scopus database was the source of the articles in the literature review. The meta-analysis and network analysis were carried out, and the output shows the up trend of this research domain. Author-coauthor network collaboration is analyzed using the VOSviewer tool. K-means clustering was performed to identify the critical research domain, and future research areas were also identified. This research will act as a reference for future scholars who want to perform analysis on the application of AI techniques in financial fraud detection and prevention. We finally conclude the study by identifying the scope of future research and will be a value addition for financial fraud researchers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

(Source: KNIME 4.3.3)

Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Abbasimehr H, Paki R (2022) Improving time series forecasting using LSTM and attention models. J Ambient Intell Humaniz Comput 1–19

  • Abdul Sathar A, Muneer P, Thafasal Ijyas VP, Usman M, Shamim MZM, Shiblee M (2020) Filter-bank modulation based signal design and transmission techniques for intensity modulated MIMO visible light communication systems. Wirel Pers Commun 111:1129–1150

    Google Scholar 

  • Ahmed AAA, Agarwal S, Kurniawan IGA, Anantadjaya SPD, Krishnan C (2022) Business boosting through sentiment analysis using Artificial Intelligence approach. Int J Syst Assur Eng Manag 13(1):699–709

    Google Scholar 

  • Aleskerov E, Freisleben B, Rao B (1997) Cardwatch: a neural network based database mining system for credit card fraud detection. In: Proceedings of the IEEE/IAFE 1997 computational intelligence for financial engineering (CIFEr) 220–226

  • Alketbi A, Nasir Q, Abu Talib M (2020) Novel blockchain reference model for government services: Dubai government case study. Int J Syst Assur Eng Manag 11:1170–1191

    Google Scholar 

  • Alrae R, Nasir Q, Abu Talib M (2020) Developing house of information quality framework for IoT systems. Int J Syst Assur Eng Manag 11:1294–1313

    Google Scholar 

  • Alzubi JA, Jain R, Kathuria A, Khandelwal A, Saxena A, Singh A (2020) Paraphrase identification using collaborative adversarial networks. J Intell Fuzzy Syst 39(1):1021–1032

    Google Scholar 

  • Alzubi OA, Qiqieh I, Alzubi JA (2023) Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Cluster Comput 26(2):1363–1374

    Google Scholar 

  • Amanbek N, Mamayeva LA, Rakhimzhanova GM (2021) Results of a comprehensive assessment of the quality of services to the population with the use of statistical methods. Int J Syst Assur Eng Manag 12:1322–1333

    Google Scholar 

  • Arcos-Medina G, Mauricio D (2019) Aspects of software quality applied to the process of agile software development: a systematic literature review. Int J Syst Assur Eng Manag 10:867–897

    Google Scholar 

  • Artama M, Sukajaya IN, Indrawan G (2020) Classification of official letters using TF-IDF method. J Phys Conf Ser 1516(1):12001. https://doi.org/10.1088/1742-6596/1516/1/012001

    Article  Google Scholar 

  • Awoyemi JO, Adetunmbi AO, Oluwadare SA (2017) Credit card fraud detection using machine learning techniques: a comparative analysis. In: 2017 international conference on computing networking and informatics (ICCNI) 1–9s

  • BakIr G, Hofmann T, Smola AJ, Schölkopf B, Taskar B (2007) Predicting structured data. MIT press, Cambridge

    Google Scholar 

  • Balaha HM, Antar ER, Saafan MM, El-Gendy EM (2023) A comprehensive framework towards segmenting and classifying breast cancer patients using deep learning and Aquila optimizer. J Ambient Intell Humaniz Comput 1–21

  • Balasubramanian K, Ananthamoorthy NP (2021) Robust retinal blood vessel segmentation using convolutional neural network and support vector machine. J Ambient Intell Humaniz Comput 12:3559–3569

    Google Scholar 

  • Bera S, Gupta GS, Kumar D, Shiva Kumar S, Gupta KK (2023) LSTM-UKF framework for an effective global land-ocean index temperature prediction. J Ambient Intell Humaniz Comput 14(3):2369–2384

    Google Scholar 

  • Bhattacharyya S, Jha S, Tharakunnel K, Westland JC (2011) Data mining for credit card fraud: a comparative study. Decis Support Syst 50(3):602–613

    Google Scholar 

  • Bodapati JD, Srilakshmi U, Veeranjaneyulu N (2022) FERNet: a deep CNN architecture for facial expression recognition in the wild. J Inst Eng Ser B 103(2):439–448

    Google Scholar 

  • Button M, Lewis C, Tapley J (2009) Fraud typologies and the victims of fraud: literature review

  • Chang J-W, Yen N, Hung JC (2022) Design of a NLP-empowered finance fraud awareness model: the anti-fraud chatbot for fraud detection and fraud classification as an instance. J Ambient Intell Humaniz Comput 13(10):4663–4679

    Google Scholar 

  • Cleatus TS, Thungamani M (2022) Epileptic seizure detection using spectral transformation and convolutional neural networks. J Inst Eng Ser B 103(4):1115–1125

    Google Scholar 

  • Danandeh Mehr A, Rikhtehgar Ghiasi A, Yaseen ZM, Sorman AU, Abualigah L (2022) A novel intelligent deep learning predictive model for meteorological drought forecasting. J Ambient Intell Humaniz Comput 1–15

  • Dash G, Sharma C, Sharma S (2023) Sustainable marketing and the role of social media: an experimental study using natural language processing (NLP). Sustainability 15(6):5443

    Google Scholar 

  • Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391–407

    Google Scholar 

  • Dietz C, Berthold MR (2016) KNIME for open-source bioimage analysis: a tutorial. Adv Anat Embryol Cell Biol 219:179–197. https://doi.org/10.1007/978-3-319-28549-8_7

    Article  Google Scholar 

  • Ding CHQ (2005) A probabilistic model for latent semantic indexing. J Am Soc Inf Sci Technol 56(6):597–608. https://doi.org/10.1002/asi.20148

    Article  Google Scholar 

  • Ebad SA (2022) Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory. Int J Syst Assur Eng Manag 13(1):535–545

    Google Scholar 

  • Evangelopoulos N, Zhang X, Prybutok VR (2012) Latent semantic analysis: five methodological recommendations. Eur J Inf Syst 21(1):70–86

    Google Scholar 

  • Feldman R, Sanger J (2006) The text mining handbook. Cambridge University Press, Cambridge. https://doi.org/10.1017/cbo9780511546914

    Book  Google Scholar 

  • Fillbrunn A, Dietz C, Pfeuffer J, Rahn R, Landrum GA, Berthold MR (2017) KNIME for reproducible cross-domain analysis of life science data. J Biotechnol 261:149–156. https://doi.org/10.1016/j.jbiotec.2017.07.028. (Elsevier B.V)

    Article  Google Scholar 

  • Forbes K (2021) Opening the path to ethics in artificial intelligence. AI Ethics 1(3):297–300

    Google Scholar 

  • Ghazizadeh A, Sarani M, Hamid M, Ghasemkhani A (2021) Detecting and estimating the time of a single-step change in nonlinear profiles using artificial neural networks. Int J Syst Assur Eng Manag 1–13, 2021

  • Griggs K, Wild R (2009) New software tools for internal control in the private sector: can they work in government? In: 9th european conference on e-government, proceedings, London, 327–336

  • Gupta V (2023a) Application of chaos theory for arrhythmia detection in pathological databases. Int J Med Eng Inform 15(2):191–202

    Google Scholar 

  • Gupta V, Mittal M (2019) QRS complex detection using STFT, chaos analysis, and PCA in standard and real-time ECG databases. J Inst Eng Ser B 100:489–497

    Google Scholar 

  • Gupta V, Mittal M (2021) R-peak detection in ECG signal using Yule-Walker and principal component analysis. IETE J Res 67(6):921–934

    Google Scholar 

  • Gupta S, Gupta P, Parida A (2017) Modeling lean maintenance metric using incidence matrix approach. Int J Syst Assur Eng Manag 8:799–816

    Google Scholar 

  • Gupta V, Mittal M, Mittal V (2020a) Chaos theory: an emerging tool for arrhythmia detection. Sens Imaging 21:1–22

    Google Scholar 

  • Gupta V, Mittal M, Mittal V, Saxena NK, Chaturvedi Y (2021) Nonlinear technique-based ECG signal analysis for improved healthcare systems. Proc Int Conf Commun Comput Technol ICCCT 2021:247–255

    Google Scholar 

  • Gupta V, Mittal M, Mittal V, Gupta A (2022a) An efficient AR modelling-based electrocardiogram signal analysis for health informatics. Int J Med Eng Inform 14(1):74–89

    Google Scholar 

  • Gupta V, Saxena NK, Kanungo A, Kumar P, Diwania S (2022b) PCA as an effective tool for the detection of R-peaks in an ECG signal processing. Int J Syst Assur Eng Manag 13(5):2391–2403

    Google Scholar 

  • Gupta G (2022) Development of fading channel patch based convolutional neural network models for customer churn prediction. Int J Syst Assur Eng Manag 1–21

  • Gupta V (2023) Wavelet transform and vector machines as emerging tools for computational medicine. J Ambient Intell Humaniz Comput 1–11

  • Gupta V, Rathi N (2010) Various objects detection using bayesian theory. In: Computer applications II-proceedings of the international conference on computer applications: 24–27 December 2010, Pondicherry, India

  • Gupta V, Mittal M, Mittal V, Saxena NK (2022) Spectrogram as an emerging tool in ECG signal processing. In: Recent advances in manufacturing, automation, design and energy technologies: proceedings from ICoFT 2020b, 407–414

  • Gupta V, Mittal M, Mittal V (2021) FrWT-PPCA-based R-peak detection for improved management of healthcare system. IETE J Res 1–15

  • Gupta V, Mittal M, Mittal V (2022e) A simplistic and novel technique for ECG signal pre-processing. IETE Js Res 1–12

  • Gupta V, Mittal M, Mittal V (2022d) A novel FrWT based arrhythmia detection in ECG signal using YWARA and PCA. Wirel Pers Commun, 1–18

  • Gupta V, Mittal M, Mittal V, Chaturvedi Y (2022c) Detection of R-peaks using fractional Fourier transform and principal component analysis. J Ambient Intell Humaniz Comput 1–12

  • Gupta V, Mittal M, Mittal V, Diwania S, Saxena NK (2023) ECG Signal analysis based on the spectrogram and spider monkey optimisation technique. J Inst Eng Ser B 1–12

  • Gupta V, Kanungo A, Saxena NK, Kumar P, Kumar P (2023) An adaptive optimized schizophrenia electroencephalogram disease prediction framework. Wirel Pers Commun 1–23

  • Hamdoun H, Alzubi JA, Alzubi OA, Mangeni S (2016) Key economic and environmental perspectives on sustainability in the ICT sector. arXiv Prepr. arXiv1602.05559

  • Harikrishnan NB, Vinayakumar R, Soman KP, Poornachandran P (2019) Time split based pre-processing with a data-driven approach for malicious url detection. In: Cybersecurity and secure information systems, Springer, 43–65

  • Hsin Y-Y, Dai T-S, Ti Y-W, Huang M-C (2021) Interpretable electronic transfer fraud detection with expert feature constructions. In: CIKM Workshops

  • Hussain GA, Audah L (2020) RS codes with filtered-OFDM: a waveform contender for 5G mobile communication systems. Wirel Pers Commun 115:575–587

    Google Scholar 

  • Ioannou A, Bourlis D, Valsamidis S, Mandilas A (2021) A Framework for Information Mining from Audit Data. In: Global, Regional and Local Perspectives on the Economies of Southeastern Europe, Springer, 223–242

  • Jain R, Alzubi JA, Jain N, Joshi P (2019) Assessing risk in life insurance using ensemble learning. J Intell Fuzzy Syst 37(2):2969–2980

    Google Scholar 

  • Jing T, Li Z, Jiang L, Huo Y (2018) Preventing eavesdropper by artificial noise in MIMO-OFDM systems. Wirel Pers Commun 99:1103–1121

    Google Scholar 

  • Jones KS (1972) A statistical interpretation of term specificity and its application in retrieval. J Doc 28(1):11–21. https://doi.org/10.1108/eb026526. (MCB UP Ltd)

    Article  Google Scholar 

  • Kadri F, Dairi A, Harrou F, Sun Y (2022) Towards accurate prediction of patient length of stay at emergency department: A GAN-driven deep learning framework. J Ambient Intell Humaniz Comput 1–15

  • Kannusamy PSP, Thangavelu RB (2019) The IMBES model for achieving excellence in manufacturing industry: an interpretive structural modeling approach. Int J Syst Assur Eng Manag 10:02–622

    Google Scholar 

  • Keswani B et al (2020) Adapting machine learning techniques for credit card fraud detection. In: International conference on innovative computing and communications, 443–455

  • Kim HJ, Baek JW, Chung K (2020) Optimization of associative knowledge graph using TF-IDF based ranking score. Appl Sci 10(13):4590. https://doi.org/10.3390/app10134590

    Article  Google Scholar 

  • Kiraz MS (2016) A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Humaniz Comput 7:731–760

    Google Scholar 

  • Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering

  • Kulkarni VY, Sinha PK, Petare MC (2016) Weighted hybrid decision tree model for random forest classifier. J Inst Eng Ser B 97:209–217

    Google Scholar 

  • Kumar RA, Prasad KS (2021) Performance analysis of GFDM modulation in heterogeneous network for 5G NR. Wirel Pers Commun 116:2299–2319

    Google Scholar 

  • Kumar MS, Ramanathan R, Jayakumar M (2021) An investigation of secret key generation for physical layer security using wavelet packets. Wirel Pers Commun 120(1):701–725

    Google Scholar 

  • Kumari N, Sathiya S (2023) Performance enhanced nonlinearity compensation of thermocouple using convolutional neural network. J Inst Eng Ser B 1–10

  • Li C-W, Chao Y-Y (2020) The effect of auditing assurance levels on accounting conservatism: evidence from Taiwan. Int J Syst Assur Eng Manag 11(1):64–76

    Google Scholar 

  • Liu T, Gao H, Wu J (2020) Review of outlier detection algorithms based on grain storage temperature data. In: 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) 1045–1048

  • Lo N-W, Lu S-K, Chuang Y-H (2016) A framework for third party android marketplaces to identify repackaged apps. In: 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech, 475–482

  • Maitre J, Bouchard K, Gaboury S (2023) Data filtering and deep learning for enhanced human activity recognition from UWB radars. J Ambient Intell Humaniz Comput 1–12

  • Majib Y, Barhamgi M, Heravi BM, Kariyawasam S, Perera C (2022) Detecting anomalies within smart buildings using do-it-yourself internet of things. J Ambient Intell Humaniz Comput 1–17

  • Molontay R, Nagy M (2021) Twenty years of network science: a bibliographic and co-authorship network analysis. In: Big data and social media analytics, Springer, pp 1–24

  • Nayak JR, Shaw B, Sahu BK (2022) A fuzzy adaptive symbiotic organism search based hybrid wavelet transform-extreme learning machine model for load forecasting of power system: a case study. J Ambient Intell Humaniz Comput 1–15

  • Ngai EWT, Hu Y, Wong YH, Chen Y, Sun X (2011) The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis Support Syst 50(3):559–569

    Google Scholar 

  • Ooi H (2002) Density visualization and mode hunting using trees. J Comput Graph Stat 11(2):328–347

    MathSciNet  Google Scholar 

  • Pankaja K, Suma V (2020) Plant leaf recognition and classification based on the whale optimization algorithm (WOA) and random forest (RF). J Inst Eng Ser B 101:597–607

    Google Scholar 

  • Pejic-Bach M, Dumičić K, Žmuk B, Ćurlin T (2020) Data mining approach to internal fraud in a project-based organization. Int J Inf Syst Proj Manag 8(2):81–101

    Google Scholar 

  • Ramos JE (2003) Using TF-IDF to determine word relevance in document queries

  • Rao PM, Deebak BD (2022) Security and privacy issues in smart cities/industries: Technologies, applications, and challenges. J Ambient Intell Humaniz Comput 1–37

  • Ravichandran D, Padmaa M, Rajagopal N, Thanikaiselvan V, Amirtharajan R (2023) Chaos and DNA blended hybrid encryption algorithm for secure image transmission over DCT pre-coded OFDM. Wirel Pers Commun 129(1):703–727

    Google Scholar 

  • Ravisankar P, Ravi V, Rao GR, Bose I (2011) Detection of financial statement fraud and feature selection using data mining techniques. Decis Support Syst 50(2):491–500

    Google Scholar 

  • Reurink A (2018) Financial fraud: a literature review. J Econ Surv 32(5):1292–1325

    Google Scholar 

  • Saha A, Rajak S, Saha J, Chowdhury C (2022) A survey of machine learning and meta-heuristics approaches for sensor-based human activity recognition systems. J Ambient Intell Humaniz Comput 1–28

  • Sathyanarayana N, Narasimhamurthy AM (2022) Vehicle type detection and classification using enhanced ReliefF algorithm and long short-term memory network. J Inst Eng Ser B 1–15

  • Saxena R, Gayathri E, Surya Kumari L (2023) Semantic analysis of blockchain intelligence with proposed agenda for future issues. Int J Syst Assur Eng Manag, 1–21

  • Shah AM, Yan X, Shah SAA, Mamirkulova G (2020) Mining patient opinion to evaluate the service quality in healthcare: a deep-learning approach. J Ambient Intell Humaniz Comput 11:2925–2942

    Google Scholar 

  • Sharma C, Sakhuja S, Nijjer S (2022a) Recent trends of green human resource management: text mining and network analysis. Environ Sci Pollut Res. https://doi.org/10.1007/s11356-022-21471-9

    Article  Google Scholar 

  • Sharma K, Sharma C, Sharma S, Asenso E (2022b) Broadening the research pathways in smart agriculture: predictive analysis using semiautomatic information modeling. J Sensors 2022:5442865. https://doi.org/10.1155/2022/5442865

    Article  Google Scholar 

  • Sharma C, Batra I, Sharma S, Malik A, Hosen ASMS, Ra I-H (2022c) Predicting trends and research patterns of smart cities: a semi-automatic review using latent dirichlet allocation (LDA). IEEE Access. https://doi.org/10.1109/ACCESS.2022.3214310

    Article  Google Scholar 

  • Singh A, Salwe SS, Naik KK, Kumar CRS (2018) OFDM-based TVWS-IEEE standards: a survey of PHY and cognitive radio features. Wirel Pers Commun 103:1725–1764

    Google Scholar 

  • Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339

    Google Scholar 

  • Söderholm P, Karim R (2010) An enterprise risk management framework for evaluation of eMaintenance. Int J Syst Assur Eng Manag 1:219–228

    Google Scholar 

  • Son Y, Zhang X, Yoon Y, Cho J, Choi S (2022) LSTM--GAN based cloud movement prediction in satellite images for PV forecast. J Ambient Intell Humaniz Comput 1–14

  • Sood P, Bhushan P (2020) A structured review and theme analysis of financial frauds in the banking industry. Asian J Bus Ethics 9(2):305–321

    Google Scholar 

  • Sun L, Gupta RK, Sharma A (2022) Review and potential for artificial intelligence in healthcare. Int J Syst Assur Eng Manag 13(Suppl 1):54–62

    Google Scholar 

  • Suresha HS, Parthasarathy SS (2021) Probabilistic principal component analysis and long short-term memory classifier for automatic detection of Alzheimer’s disease using MRI brain images. J Inst Eng Ser B 102:807–818

    Google Scholar 

  • Tacser PY, Bozyiugit F (2022) Machine learning applications for fraud detection in finance sector. In: The impact of artificial intelligence on governance, economics and finance, Volume 2, Springer, 121–146

  • Tan SJ (1999) Strategies for reducing consumers’ risk aversion in Internet shopping. J Consum Mark

  • Tseng M-L, Islam MS, Karia N, Fauzi FA, Afrin S (2019) A literature review on green supply chain management: trends and future challenges. Resour Conserv Recycl 141:145–162

    Google Scholar 

  • Ubaid AM, Dweiri FT (2020) Business process management (BPM): terminologies and methodologies unified. Int J Syst Assur Eng Manag 11:1046–1064

    Google Scholar 

  • Ubaid AM, Dweiri FT, Ojiako U (2020) Organizational excellence methodologies (OEMs): a systematic literature review. Int J Syst Assur Eng Manag 11:1395–1432

    Google Scholar 

  • Van Driel H (2018) Financial fraud, scandals, and regulation: a conceptual framework and literature review. Bus Hist

  • Vinayakumar R, Soman KP, Poornachandran P (2018) Evaluating deep learning approaches to characterize and classify malicious URL’s. J Intell Fuzzy Syst 34(3):1333–1343

    Google Scholar 

  • Wagire AA, Rathore APS, Jain R (2019) Analysis and synthesis of Industry 4.0 research landscape: using latent semantic analysis approach. J Manuf Technol Manag

  • Wu HC, Luk RWP, Wong KF, Kwok KL (2008) Interpreting TF-IDF term weights as making relevance decisions. ACM Trans Inf Syst. https://doi.org/10.1145/1361684.1361686

    Article  Google Scholar 

  • Xiao Y, Watson M (2019) Guidance on conducting a systematic literature review. J Plan Educ Res 39(1):93–112

    Google Scholar 

  • Xie L, Chen Z, Q6 Q, Wang H, Zheng C, Jiang J (2020) Bibliometric and visualized analysis of scientific publications on atlantoaxial spine surgery based on web of science and VOSviewer bibliometric and visualized analysis of scientific publications on atlantoaxial spine surgery based on web of science and V. Elsevier. https://doi.org/10.1016/j.wneu.2020.01.171.

  • Xu Q, Wu D, Jiang C, Wang X (2023) A composite quantile regression long short-term memory network with group lasso for wind turbine anomaly detection. J Ambient Intell Humaniz Comput 14(3):2261–2274

    Google Scholar 

  • Xu H, Fan G, Song Y (2022) Application analysis of the machine learning fusion model in building a financial fraud prediction model. Secur Commun Netw 2022

  • Yadav P, Kumar S, Kumar R (2022) A review of transmission rate over wireless fading channels: Classifications, applications, and challenges. Wirel Pers Commun 1–57

  • Yakkundimath R, Saunshi G, Anami B, Palaiah S (2022) Classification of rice diseases using convolutional neural network models. J Inst Eng Ser B 103(4):1047–1059

    Google Scholar 

  • Yalcinkaya M, Singh V (2015) Patterns and trends in building information modeling (BIM) research: a latent semantic analysis. Autom Constr 59:68–80. https://doi.org/10.1016/j.autcon.2015.07.012

    Article  Google Scholar 

  • Yang M, Kumar P, Bhola J, Shabaz M (2021) Development of image recognition software based on artificial intelligence algorithm for the efficient sorting of apple fruit. Int J Syst Assur Eng Manag 1–9

  • Ye W, Wang H, Zhong Y (2022) Optimization of network security protection situation based on data clustering. Int J Syst Assur Eng Manag 1–8

  • Yue C, Zhang J, He C, Li S (2021) Research on recognition of financial fraud based on data mining. In: Proceedings of the 2021 international conference on control and intelligent robotics, 613–618

  • Zareapoor M, Seeja KR, Alam MA (2012) Analysis on credit card fraud detection techniques: based on certain design criteria. Int J Comput Appl 52(3)

  • Zeng L et al (2021) An LSTM-based driving operation suggestion method for riding comfort-oriented critical zone. J Ambient Intell Humaniz Comput 1–17

  • Zhang Y (2022) The construction of college students’ sports health management service platform based on artificial intelligence. Int J Syst Assur Eng Manag 13(Suppl 3):1102–1110

    Google Scholar 

  • Zhang Z, Wang Z (2021) Design of financial big data audit model based on artificial neural network. Int J Syst Assur Eng Manag 1–10

  • Zhou D, He J, Yang H, Fan W (2018) Sparc: Self-paced network representation for few-shot rare category characterization. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining, 2807–2816

Download references

Funding

No funding available.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chetan Sharma.

Ethics declarations

Conflict of interest

There are no conflicts of interest.

Research involving human participants and/or animals

No.

Informed consent

No.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sood, P., Sharma, C., Nijjer, S. et al. Review the role of artificial intelligence in detecting and preventing financial fraud using natural language processing. Int J Syst Assur Eng Manag 14, 2120–2135 (2023). https://doi.org/10.1007/s13198-023-02043-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-023-02043-7

Keywords

Navigation