FRAUD PREVENTION AND DETECTION SYSTEM IN NIGERIA BANKING INDUSTRIES
DOI:
https://doi.org/10.51594/csitrj.v3i2.355Abstract
Fraud is on the rise as a result of the advent of modern technology and the global superhighways of banking transactions, resulting in billions of dollars in losses worldwide each year. Although fraud prevention technologies are the most effective method of combating fraud, fraudsters are flexible and will usually find a way around them over time. We need fraud detection approaches if we are to catch fraudsters after fraud prevention has failed. Statistics and machine learning are effective fraud detection technologies that have been used to detect money laundering, e-commerce credit card fraud, telecommunications fraud, and computer intrusion, to name a few. The program is simple to use, and anyone with permission can use it. The importance of computer technology has expanded as it has advanced in all areas of human endeavor.
Keywords: Fraud Detection, Fraud Prevention, Banking Industries, Telecommunications.
Published
Issue
Section
Copyright (c) 2022 Kamalu Aliyu Babando

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Fair East Publishing has chosen to apply for the Creative Common Attribution Noncommercial 4.0 Licence (CC BY) license on our published work. Authors who wish to publish their manuscript in our journal agree on the following terms:1. Authors retain the copyright and grant us (Fair East Publishing and its subsidiary journals) the right for first publication with the work licensed under a Creative Commons Attribution (CC BY) License which permits others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal. Under this license, author retains the ownership of the copyright of their content, but anyone is allowed to download, reuse, reprint, modify, distribute, and/or copy the contents as long as the original authors and source are cited. No permission is required from the publishers or authors.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (for example, publishing it as a book or submitting it to an institutional repository), with an acknowledgment of its initial publication in Fair East Publishing owned journals.
3. We encourage our authors/contributors to post their work online (such as posting it on their website or some institutional repositories) prior to and during the submission process since it produces scholarly exchange and greater and earlier citation of published work.