Abstract
Frauds accounted for significant losses in the financial sector and emerged as the industry’s biggest challenge. Companies invest significant amounts to prevent such fraud. It has been reported that 63.6% of the financial institutions that use Automated Fraud prevention methods successfully prevented frauds before their occurrence. Some estimations suggest that 80% of specialists are confident in cutting down fraud using Artificial Intelligence (AI)-based platforms. Several research studies have also administered AI-based techniques for fraud prevention. This study takes a systematic literature review approach to uncover the emerging areas of fraud detection using AI. The authors have analyzed 241 research articles published in the last 20 years. The Scopus database was the source of the articles in the literature review. The meta-analysis and network analysis were carried out, and the output shows the up trend of this research domain. Author-coauthor network collaboration is analyzed using the VOSviewer tool. K-means clustering was performed to identify the critical research domain, and future research areas were also identified. This research will act as a reference for future scholars who want to perform analysis on the application of AI techniques in financial fraud detection and prevention. We finally conclude the study by identifying the scope of future research and will be a value addition for financial fraud researchers.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abbasimehr H, Paki R (2022) Improving time series forecasting using LSTM and attention models. J Ambient Intell Humaniz Comput 1–19
Abdul Sathar A, Muneer P, Thafasal Ijyas VP, Usman M, Shamim MZM, Shiblee M (2020) Filter-bank modulation based signal design and transmission techniques for intensity modulated MIMO visible light communication systems. Wirel Pers Commun 111:1129–1150
Ahmed AAA, Agarwal S, Kurniawan IGA, Anantadjaya SPD, Krishnan C (2022) Business boosting through sentiment analysis using Artificial Intelligence approach. Int J Syst Assur Eng Manag 13(1):699–709
Aleskerov E, Freisleben B, Rao B (1997) Cardwatch: a neural network based database mining system for credit card fraud detection. In: Proceedings of the IEEE/IAFE 1997 computational intelligence for financial engineering (CIFEr) 220–226
Alketbi A, Nasir Q, Abu Talib M (2020) Novel blockchain reference model for government services: Dubai government case study. Int J Syst Assur Eng Manag 11:1170–1191
Alrae R, Nasir Q, Abu Talib M (2020) Developing house of information quality framework for IoT systems. Int J Syst Assur Eng Manag 11:1294–1313
Alzubi JA, Jain R, Kathuria A, Khandelwal A, Saxena A, Singh A (2020) Paraphrase identification using collaborative adversarial networks. J Intell Fuzzy Syst 39(1):1021–1032
Alzubi OA, Qiqieh I, Alzubi JA (2023) Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Cluster Comput 26(2):1363–1374
Amanbek N, Mamayeva LA, Rakhimzhanova GM (2021) Results of a comprehensive assessment of the quality of services to the population with the use of statistical methods. Int J Syst Assur Eng Manag 12:1322–1333
Arcos-Medina G, Mauricio D (2019) Aspects of software quality applied to the process of agile software development: a systematic literature review. Int J Syst Assur Eng Manag 10:867–897
Artama M, Sukajaya IN, Indrawan G (2020) Classification of official letters using TF-IDF method. J Phys Conf Ser 1516(1):12001. https://doi.org/10.1088/1742-6596/1516/1/012001
Awoyemi JO, Adetunmbi AO, Oluwadare SA (2017) Credit card fraud detection using machine learning techniques: a comparative analysis. In: 2017 international conference on computing networking and informatics (ICCNI) 1–9s
BakIr G, Hofmann T, Smola AJ, Schölkopf B, Taskar B (2007) Predicting structured data. MIT press, Cambridge
Balaha HM, Antar ER, Saafan MM, El-Gendy EM (2023) A comprehensive framework towards segmenting and classifying breast cancer patients using deep learning and Aquila optimizer. J Ambient Intell Humaniz Comput 1–21
Balasubramanian K, Ananthamoorthy NP (2021) Robust retinal blood vessel segmentation using convolutional neural network and support vector machine. J Ambient Intell Humaniz Comput 12:3559–3569
Bera S, Gupta GS, Kumar D, Shiva Kumar S, Gupta KK (2023) LSTM-UKF framework for an effective global land-ocean index temperature prediction. J Ambient Intell Humaniz Comput 14(3):2369–2384
Bhattacharyya S, Jha S, Tharakunnel K, Westland JC (2011) Data mining for credit card fraud: a comparative study. Decis Support Syst 50(3):602–613
Bodapati JD, Srilakshmi U, Veeranjaneyulu N (2022) FERNet: a deep CNN architecture for facial expression recognition in the wild. J Inst Eng Ser B 103(2):439–448
Button M, Lewis C, Tapley J (2009) Fraud typologies and the victims of fraud: literature review
Chang J-W, Yen N, Hung JC (2022) Design of a NLP-empowered finance fraud awareness model: the anti-fraud chatbot for fraud detection and fraud classification as an instance. J Ambient Intell Humaniz Comput 13(10):4663–4679
Cleatus TS, Thungamani M (2022) Epileptic seizure detection using spectral transformation and convolutional neural networks. J Inst Eng Ser B 103(4):1115–1125
Danandeh Mehr A, Rikhtehgar Ghiasi A, Yaseen ZM, Sorman AU, Abualigah L (2022) A novel intelligent deep learning predictive model for meteorological drought forecasting. J Ambient Intell Humaniz Comput 1–15
Dash G, Sharma C, Sharma S (2023) Sustainable marketing and the role of social media: an experimental study using natural language processing (NLP). Sustainability 15(6):5443
Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391–407
Dietz C, Berthold MR (2016) KNIME for open-source bioimage analysis: a tutorial. Adv Anat Embryol Cell Biol 219:179–197. https://doi.org/10.1007/978-3-319-28549-8_7
Ding CHQ (2005) A probabilistic model for latent semantic indexing. J Am Soc Inf Sci Technol 56(6):597–608. https://doi.org/10.1002/asi.20148
Ebad SA (2022) Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory. Int J Syst Assur Eng Manag 13(1):535–545
Evangelopoulos N, Zhang X, Prybutok VR (2012) Latent semantic analysis: five methodological recommendations. Eur J Inf Syst 21(1):70–86
Feldman R, Sanger J (2006) The text mining handbook. Cambridge University Press, Cambridge. https://doi.org/10.1017/cbo9780511546914
Fillbrunn A, Dietz C, Pfeuffer J, Rahn R, Landrum GA, Berthold MR (2017) KNIME for reproducible cross-domain analysis of life science data. J Biotechnol 261:149–156. https://doi.org/10.1016/j.jbiotec.2017.07.028. (Elsevier B.V)
Forbes K (2021) Opening the path to ethics in artificial intelligence. AI Ethics 1(3):297–300
Ghazizadeh A, Sarani M, Hamid M, Ghasemkhani A (2021) Detecting and estimating the time of a single-step change in nonlinear profiles using artificial neural networks. Int J Syst Assur Eng Manag 1–13, 2021
Griggs K, Wild R (2009) New software tools for internal control in the private sector: can they work in government? In: 9th european conference on e-government, proceedings, London, 327–336
Gupta V (2023a) Application of chaos theory for arrhythmia detection in pathological databases. Int J Med Eng Inform 15(2):191–202
Gupta V, Mittal M (2019) QRS complex detection using STFT, chaos analysis, and PCA in standard and real-time ECG databases. J Inst Eng Ser B 100:489–497
Gupta V, Mittal M (2021) R-peak detection in ECG signal using Yule-Walker and principal component analysis. IETE J Res 67(6):921–934
Gupta S, Gupta P, Parida A (2017) Modeling lean maintenance metric using incidence matrix approach. Int J Syst Assur Eng Manag 8:799–816
Gupta V, Mittal M, Mittal V (2020a) Chaos theory: an emerging tool for arrhythmia detection. Sens Imaging 21:1–22
Gupta V, Mittal M, Mittal V, Saxena NK, Chaturvedi Y (2021) Nonlinear technique-based ECG signal analysis for improved healthcare systems. Proc Int Conf Commun Comput Technol ICCCT 2021:247–255
Gupta V, Mittal M, Mittal V, Gupta A (2022a) An efficient AR modelling-based electrocardiogram signal analysis for health informatics. Int J Med Eng Inform 14(1):74–89
Gupta V, Saxena NK, Kanungo A, Kumar P, Diwania S (2022b) PCA as an effective tool for the detection of R-peaks in an ECG signal processing. Int J Syst Assur Eng Manag 13(5):2391–2403
Gupta G (2022) Development of fading channel patch based convolutional neural network models for customer churn prediction. Int J Syst Assur Eng Manag 1–21
Gupta V (2023) Wavelet transform and vector machines as emerging tools for computational medicine. J Ambient Intell Humaniz Comput 1–11
Gupta V, Rathi N (2010) Various objects detection using bayesian theory. In: Computer applications II-proceedings of the international conference on computer applications: 24–27 December 2010, Pondicherry, India
Gupta V, Mittal M, Mittal V, Saxena NK (2022) Spectrogram as an emerging tool in ECG signal processing. In: Recent advances in manufacturing, automation, design and energy technologies: proceedings from ICoFT 2020b, 407–414
Gupta V, Mittal M, Mittal V (2021) FrWT-PPCA-based R-peak detection for improved management of healthcare system. IETE J Res 1–15
Gupta V, Mittal M, Mittal V (2022e) A simplistic and novel technique for ECG signal pre-processing. IETE Js Res 1–12
Gupta V, Mittal M, Mittal V (2022d) A novel FrWT based arrhythmia detection in ECG signal using YWARA and PCA. Wirel Pers Commun, 1–18
Gupta V, Mittal M, Mittal V, Chaturvedi Y (2022c) Detection of R-peaks using fractional Fourier transform and principal component analysis. J Ambient Intell Humaniz Comput 1–12
Gupta V, Mittal M, Mittal V, Diwania S, Saxena NK (2023) ECG Signal analysis based on the spectrogram and spider monkey optimisation technique. J Inst Eng Ser B 1–12
Gupta V, Kanungo A, Saxena NK, Kumar P, Kumar P (2023) An adaptive optimized schizophrenia electroencephalogram disease prediction framework. Wirel Pers Commun 1–23
Hamdoun H, Alzubi JA, Alzubi OA, Mangeni S (2016) Key economic and environmental perspectives on sustainability in the ICT sector. arXiv Prepr. arXiv1602.05559
Harikrishnan NB, Vinayakumar R, Soman KP, Poornachandran P (2019) Time split based pre-processing with a data-driven approach for malicious url detection. In: Cybersecurity and secure information systems, Springer, 43–65
Hsin Y-Y, Dai T-S, Ti Y-W, Huang M-C (2021) Interpretable electronic transfer fraud detection with expert feature constructions. In: CIKM Workshops
Hussain GA, Audah L (2020) RS codes with filtered-OFDM: a waveform contender for 5G mobile communication systems. Wirel Pers Commun 115:575–587
Ioannou A, Bourlis D, Valsamidis S, Mandilas A (2021) A Framework for Information Mining from Audit Data. In: Global, Regional and Local Perspectives on the Economies of Southeastern Europe, Springer, 223–242
Jain R, Alzubi JA, Jain N, Joshi P (2019) Assessing risk in life insurance using ensemble learning. J Intell Fuzzy Syst 37(2):2969–2980
Jing T, Li Z, Jiang L, Huo Y (2018) Preventing eavesdropper by artificial noise in MIMO-OFDM systems. Wirel Pers Commun 99:1103–1121
Jones KS (1972) A statistical interpretation of term specificity and its application in retrieval. J Doc 28(1):11–21. https://doi.org/10.1108/eb026526. (MCB UP Ltd)
Kadri F, Dairi A, Harrou F, Sun Y (2022) Towards accurate prediction of patient length of stay at emergency department: A GAN-driven deep learning framework. J Ambient Intell Humaniz Comput 1–15
Kannusamy PSP, Thangavelu RB (2019) The IMBES model for achieving excellence in manufacturing industry: an interpretive structural modeling approach. Int J Syst Assur Eng Manag 10:02–622
Keswani B et al (2020) Adapting machine learning techniques for credit card fraud detection. In: International conference on innovative computing and communications, 443–455
Kim HJ, Baek JW, Chung K (2020) Optimization of associative knowledge graph using TF-IDF based ranking score. Appl Sci 10(13):4590. https://doi.org/10.3390/app10134590
Kiraz MS (2016) A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Humaniz Comput 7:731–760
Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering
Kulkarni VY, Sinha PK, Petare MC (2016) Weighted hybrid decision tree model for random forest classifier. J Inst Eng Ser B 97:209–217
Kumar RA, Prasad KS (2021) Performance analysis of GFDM modulation in heterogeneous network for 5G NR. Wirel Pers Commun 116:2299–2319
Kumar MS, Ramanathan R, Jayakumar M (2021) An investigation of secret key generation for physical layer security using wavelet packets. Wirel Pers Commun 120(1):701–725
Kumari N, Sathiya S (2023) Performance enhanced nonlinearity compensation of thermocouple using convolutional neural network. J Inst Eng Ser B 1–10
Li C-W, Chao Y-Y (2020) The effect of auditing assurance levels on accounting conservatism: evidence from Taiwan. Int J Syst Assur Eng Manag 11(1):64–76
Liu T, Gao H, Wu J (2020) Review of outlier detection algorithms based on grain storage temperature data. In: 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) 1045–1048
Lo N-W, Lu S-K, Chuang Y-H (2016) A framework for third party android marketplaces to identify repackaged apps. In: 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech, 475–482
Maitre J, Bouchard K, Gaboury S (2023) Data filtering and deep learning for enhanced human activity recognition from UWB radars. J Ambient Intell Humaniz Comput 1–12
Majib Y, Barhamgi M, Heravi BM, Kariyawasam S, Perera C (2022) Detecting anomalies within smart buildings using do-it-yourself internet of things. J Ambient Intell Humaniz Comput 1–17
Molontay R, Nagy M (2021) Twenty years of network science: a bibliographic and co-authorship network analysis. In: Big data and social media analytics, Springer, pp 1–24
Nayak JR, Shaw B, Sahu BK (2022) A fuzzy adaptive symbiotic organism search based hybrid wavelet transform-extreme learning machine model for load forecasting of power system: a case study. J Ambient Intell Humaniz Comput 1–15
Ngai EWT, Hu Y, Wong YH, Chen Y, Sun X (2011) The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis Support Syst 50(3):559–569
Ooi H (2002) Density visualization and mode hunting using trees. J Comput Graph Stat 11(2):328–347
Pankaja K, Suma V (2020) Plant leaf recognition and classification based on the whale optimization algorithm (WOA) and random forest (RF). J Inst Eng Ser B 101:597–607
Pejic-Bach M, Dumičić K, Žmuk B, Ćurlin T (2020) Data mining approach to internal fraud in a project-based organization. Int J Inf Syst Proj Manag 8(2):81–101
Ramos JE (2003) Using TF-IDF to determine word relevance in document queries
Rao PM, Deebak BD (2022) Security and privacy issues in smart cities/industries: Technologies, applications, and challenges. J Ambient Intell Humaniz Comput 1–37
Ravichandran D, Padmaa M, Rajagopal N, Thanikaiselvan V, Amirtharajan R (2023) Chaos and DNA blended hybrid encryption algorithm for secure image transmission over DCT pre-coded OFDM. Wirel Pers Commun 129(1):703–727
Ravisankar P, Ravi V, Rao GR, Bose I (2011) Detection of financial statement fraud and feature selection using data mining techniques. Decis Support Syst 50(2):491–500
Reurink A (2018) Financial fraud: a literature review. J Econ Surv 32(5):1292–1325
Saha A, Rajak S, Saha J, Chowdhury C (2022) A survey of machine learning and meta-heuristics approaches for sensor-based human activity recognition systems. J Ambient Intell Humaniz Comput 1–28
Sathyanarayana N, Narasimhamurthy AM (2022) Vehicle type detection and classification using enhanced ReliefF algorithm and long short-term memory network. J Inst Eng Ser B 1–15
Saxena R, Gayathri E, Surya Kumari L (2023) Semantic analysis of blockchain intelligence with proposed agenda for future issues. Int J Syst Assur Eng Manag, 1–21
Shah AM, Yan X, Shah SAA, Mamirkulova G (2020) Mining patient opinion to evaluate the service quality in healthcare: a deep-learning approach. J Ambient Intell Humaniz Comput 11:2925–2942
Sharma C, Sakhuja S, Nijjer S (2022a) Recent trends of green human resource management: text mining and network analysis. Environ Sci Pollut Res. https://doi.org/10.1007/s11356-022-21471-9
Sharma K, Sharma C, Sharma S, Asenso E (2022b) Broadening the research pathways in smart agriculture: predictive analysis using semiautomatic information modeling. J Sensors 2022:5442865. https://doi.org/10.1155/2022/5442865
Sharma C, Batra I, Sharma S, Malik A, Hosen ASMS, Ra I-H (2022c) Predicting trends and research patterns of smart cities: a semi-automatic review using latent dirichlet allocation (LDA). IEEE Access. https://doi.org/10.1109/ACCESS.2022.3214310
Singh A, Salwe SS, Naik KK, Kumar CRS (2018) OFDM-based TVWS-IEEE standards: a survey of PHY and cognitive radio features. Wirel Pers Commun 103:1725–1764
Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339
Söderholm P, Karim R (2010) An enterprise risk management framework for evaluation of eMaintenance. Int J Syst Assur Eng Manag 1:219–228
Son Y, Zhang X, Yoon Y, Cho J, Choi S (2022) LSTM--GAN based cloud movement prediction in satellite images for PV forecast. J Ambient Intell Humaniz Comput 1–14
Sood P, Bhushan P (2020) A structured review and theme analysis of financial frauds in the banking industry. Asian J Bus Ethics 9(2):305–321
Sun L, Gupta RK, Sharma A (2022) Review and potential for artificial intelligence in healthcare. Int J Syst Assur Eng Manag 13(Suppl 1):54–62
Suresha HS, Parthasarathy SS (2021) Probabilistic principal component analysis and long short-term memory classifier for automatic detection of Alzheimer’s disease using MRI brain images. J Inst Eng Ser B 102:807–818
Tacser PY, Bozyiugit F (2022) Machine learning applications for fraud detection in finance sector. In: The impact of artificial intelligence on governance, economics and finance, Volume 2, Springer, 121–146
Tan SJ (1999) Strategies for reducing consumers’ risk aversion in Internet shopping. J Consum Mark
Tseng M-L, Islam MS, Karia N, Fauzi FA, Afrin S (2019) A literature review on green supply chain management: trends and future challenges. Resour Conserv Recycl 141:145–162
Ubaid AM, Dweiri FT (2020) Business process management (BPM): terminologies and methodologies unified. Int J Syst Assur Eng Manag 11:1046–1064
Ubaid AM, Dweiri FT, Ojiako U (2020) Organizational excellence methodologies (OEMs): a systematic literature review. Int J Syst Assur Eng Manag 11:1395–1432
Van Driel H (2018) Financial fraud, scandals, and regulation: a conceptual framework and literature review. Bus Hist
Vinayakumar R, Soman KP, Poornachandran P (2018) Evaluating deep learning approaches to characterize and classify malicious URL’s. J Intell Fuzzy Syst 34(3):1333–1343
Wagire AA, Rathore APS, Jain R (2019) Analysis and synthesis of Industry 4.0 research landscape: using latent semantic analysis approach. J Manuf Technol Manag
Wu HC, Luk RWP, Wong KF, Kwok KL (2008) Interpreting TF-IDF term weights as making relevance decisions. ACM Trans Inf Syst. https://doi.org/10.1145/1361684.1361686
Xiao Y, Watson M (2019) Guidance on conducting a systematic literature review. J Plan Educ Res 39(1):93–112
Xie L, Chen Z, Q6 Q, Wang H, Zheng C, Jiang J (2020) Bibliometric and visualized analysis of scientific publications on atlantoaxial spine surgery based on web of science and VOSviewer bibliometric and visualized analysis of scientific publications on atlantoaxial spine surgery based on web of science and V. Elsevier. https://doi.org/10.1016/j.wneu.2020.01.171.
Xu Q, Wu D, Jiang C, Wang X (2023) A composite quantile regression long short-term memory network with group lasso for wind turbine anomaly detection. J Ambient Intell Humaniz Comput 14(3):2261–2274
Xu H, Fan G, Song Y (2022) Application analysis of the machine learning fusion model in building a financial fraud prediction model. Secur Commun Netw 2022
Yadav P, Kumar S, Kumar R (2022) A review of transmission rate over wireless fading channels: Classifications, applications, and challenges. Wirel Pers Commun 1–57
Yakkundimath R, Saunshi G, Anami B, Palaiah S (2022) Classification of rice diseases using convolutional neural network models. J Inst Eng Ser B 103(4):1047–1059
Yalcinkaya M, Singh V (2015) Patterns and trends in building information modeling (BIM) research: a latent semantic analysis. Autom Constr 59:68–80. https://doi.org/10.1016/j.autcon.2015.07.012
Yang M, Kumar P, Bhola J, Shabaz M (2021) Development of image recognition software based on artificial intelligence algorithm for the efficient sorting of apple fruit. Int J Syst Assur Eng Manag 1–9
Ye W, Wang H, Zhong Y (2022) Optimization of network security protection situation based on data clustering. Int J Syst Assur Eng Manag 1–8
Yue C, Zhang J, He C, Li S (2021) Research on recognition of financial fraud based on data mining. In: Proceedings of the 2021 international conference on control and intelligent robotics, 613–618
Zareapoor M, Seeja KR, Alam MA (2012) Analysis on credit card fraud detection techniques: based on certain design criteria. Int J Comput Appl 52(3)
Zeng L et al (2021) An LSTM-based driving operation suggestion method for riding comfort-oriented critical zone. J Ambient Intell Humaniz Comput 1–17
Zhang Y (2022) The construction of college students’ sports health management service platform based on artificial intelligence. Int J Syst Assur Eng Manag 13(Suppl 3):1102–1110
Zhang Z, Wang Z (2021) Design of financial big data audit model based on artificial neural network. Int J Syst Assur Eng Manag 1–10
Zhou D, He J, Yang H, Fan W (2018) Sparc: Self-paced network representation for few-shot rare category characterization. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery and data mining, 2807–2816
Funding
No funding available.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There are no conflicts of interest.
Research involving human participants and/or animals
No.
Informed consent
No.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sood, P., Sharma, C., Nijjer, S. et al. Review the role of artificial intelligence in detecting and preventing financial fraud using natural language processing. Int J Syst Assur Eng Manag 14, 2120–2135 (2023). https://doi.org/10.1007/s13198-023-02043-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-023-02043-7