A New Model to Identify the Reliability and Trust of Internet Banking Users Using Fuzzy Theory and Data-Mining

: As a result of changes in approach from traditional to virtual banking system, security in data exchange has become more important; thus, it seems essentially necessary to present a pattern based on smart models in order to reduce fraud in this ﬁeld. A new algorithm has been provided in this article to improve security and to specify the limits of giving special services to Internet banking users in order to pave appropriate ground for virtual banking. In addition to identifying behavioral models of customers, this algorithm compares the behaviors of any customer with this model and ﬁnally computes the rate of trust in customer’s behavior. The hybrid data-mining and knowledge based structure has been adapted in this algorithm according to fuzzy systems. In this research, qualitative data was gathered from interviews with banking experts, analyzed by Expert Choice to identify the most important variables of customer behavior analysis, and to analyze customer behavior and customer bank Internet transaction data for a period of one year by MATLAB and Clementine. The results of this survey indicate that the potential of the given structure to recognize the rate of trust in Internet bank user’s behavior might be at reasonable level for experts in this area.


Introduction
Due to the rapid pace of Internet accessibility, the use of e-banking has also boosted [1]. Furthermore, the progress in electronic banking and mobile banking leads to the rapid development of real-time banking information [2]. Rising attractiveness of Internet banking for the customers caused ever-increasing growth in doing online transactions. For example, the number of online-shopping by using debit and credit cards has almost doubled in the previous 10 years, from 6.7 billion in 2006, to 16.4 billion purchases in 2016 [3]. In UK, debit cards are the most common payment method increased by 12 percent reaching 17.0 billion in 2019 [4]. In Iran, due to Central Bank of Iran's report, 25% growth in the number of e-banking transactions (20.4 billion transactions) and 27% increase in value terms (177 billion dollars) is shown in operations of key electronic banking platforms during March-September 2019 in comparison with the same period in the previous year [5].
This progress has excessively increased the rate of occurrence of financial crimes in e-banking so that the growing trend of such crimes shows approximately 8 to 9% annual increase. In this regard, it can be referred to the resulted financial losses incurred by British banks which was over GPB 22 million in 2007, although the published figures by UK Cards Association indicates the growing trend in the given figures of financial loss in these banks has actually increased 14% in 2010 compared to the previous year. Of course, if we add the undeclared statistics from financial institutions to these figures, the rate of this growth will be further [3]. Thus, nowadays online fraud has become more complicated in Internet banking and the security and trust has been more seriously addressed in e-banking [6]. Due to European Union Agency for Fundamental Rights [7] a one per four Europeans (24%) feels a huge amount of worries regards to misuse of their online bank account or payment card details by fraudsters or criminals. This rate is approximately 57 percent in Spain. These statistics indicate the highly importance of e-banking fraud detection systems.
Fraud in online banking sector is always growing and it is also challenging to investigate and detect since the fraudulent behavior is dynamic, vary through diverse customer profiles and present in extremely large and dynamic datasets [8]. Research investigating the customer behavior and evaluating the e-banking users' reliability is scare in the context of Iranian financial institutions [9,10]. Although employing of fuzzy system as one of the supervised learning tool and K-means as the unsupervised learning tool for fraud detection shown to have high fraud coverage and accuracy, there are few research in using these tools for fraud detection in literature [8]. Moreover, a major part of these studies use these tools separately, e.g., [11][12][13], however, we propose the algorithm which combines these two tools for detecting fraud in customers' behavior.
The current research aims to propose a smart system in order to determine the rate of trust in behavior of Internet banking users thereby it would be possible to detect online banking fraud quicker and define constraint for those unreliable customers in giving banking services. Therefore, the major question which may be raised in current research is that how banks can determine the rate of reliability of each customer in terms of future fraud behavior by means of smart algorithm based on the previous behavior of customers. The paper is organized as follows. In Section 1, the literature review is provided based on practical studies in the field of Internet fraud discovery systems in banking industry. In Section 2, we provide some details regards to research methodology and discuss the research implementation process. In Section 3, we provided data analysis in two phases of model preparation and model testing. Next, in Section 4, the finding of research was represented. Next, in Section 5, we provide some discussion relied on findings section. Finally, in Section 6, the research limitations, directions for further research, and the conclusions are discussed.

Internet Fraud Detection Systems
Fraud detection refers to some actions or methods to discover the frauds which have been occurred or are being occurred [1]. Online fraud has imposed financial burdens on the banks during recent decade while the efficient and effective systems for identifying this type of crimes have not become so far applied perfectly [14]. Therefore, this issue has been turned into the major concern for banking directors. The main subject in this regard is to prevent fraud with respect to financial and credit nature of transactions [15][16][17][18][19].
Integrated use of virtual and social information sources has caused creating a new approach in Internet fraud and phishing so that it could add the complexity in these fraud techniques. The international statistics and reports show that some numbers of cybercrimes follow excessive incremental trend in banking field [6,20,21], while analysis on the given models used in fraud discovery systems in Internet banking has indicated this type of systems possesses weak performance with lower accuracy [8,17].
Financial institutions are mostly in search of the required speed to discover the behaviors and operations of fraudsters. This problem is so crucial due to its indirect impact on customer service in financial institutions, declined operational costs due to providing trusted and valid monetary services. The most applicable algorithms employed for online banking fraud detection are regularly executed across the analysis of customer information such as their transactions [1]. Due to the dispersion of information resources of customers and unstructured nature of this information, limited techniques have been suggested for dynamic identifying of online fraud. This issue has converted presentation of efficient and immediate structures in discovery of fraud into one of the foremost challenges existing in this area [6]. The reason for poor performance of fraud detection systems in Internet banking is related to dynamic nature of customers' behavior and lack of access to the fraud occurrence data in this area. For instance, recognition of fraud in credit and telecommunication cards may usually emphasize in identifying behavioral models of groups of customers while fraud detection is very dynamic in customers of Internet banking and in line with behaviors of actual customers [17]. The created challenges put emphasis on the fact that the classic methods based on real data in Internet banking may not be highly accurate techniques for detection of all types of Internet banking fraud. In addition, research has shown that the use of modern analysis is a major problem due to its very high cost in big data and its very low error detection power [22]. Accordingly, as well as the results of research, the use of this method is not recommended [23].

Challenges through Online Banking Fraud Detection Systems
There are some characteristics and challenges regards to e-banking fraud detection explained in literature. Firstly, the dataset of e-banking transactions is large and highly imbalanced. Secondly, fraud detection should be real time to generate fraud alert and detect prompt money loss. Thirdly, the fraud behavior is dynamic. Finally, the pattern of customer behavior is diverse, so fraudsters try to behave similar to genuine customer which makes the fraud detection process so complicated [8]. These characteristics change the fraud detection into extremely challenging issues, which motivates researchers to employ different machine learning and data mining techniques to detect fraud in banking system [24].
Many essays and studies have been prepared concerning recognition of Internet banking fraud, e.g., [25]. The structure of most of these studies is based on comments of experts and use of base of rules to recognize suspicious transactions for which one can refer to the studies conducted by Karlsen and Killingberg [17], Bignell [26], as well as Kovach and Ruggiero [27]. Review on performance of these systems shows that the outputs lack high precision. The noticeable point existing in these studies is concerned with the relationship among performance of system and its compliance with rules and the phishing states which highly depend on the adequate expert knowledge. One of the problems and challenges with which these systems may be exposed is low tolerance level of system and non-creation of dynamic structure for immediate compliance with critical state.
It is noteworthy that many given fraud behaviors in Internet banking indicate this fact that the fraud cases are done independently, and sequence of fraud events may be very improbable in this sense. However, the method of identifying operational sequences in behaviors of customers in real world situation has been employed in some studies to discover fraudulent behaviors. For example, in the given study conducted by Fan et al. [28], the behavior of an actual customer with a Trojan (virus) has been explored. In this study, structure of events done by Trojan and actual user has been assessed with different trends.
Another challenge facing the design and implementation of fraud detection systems is the difficulty of accessing labeled data in Internet banking due to the security constraints of organizations. Therefore, one of the common methods for creation of labeled data regarding forgery and fraud in Internet banking is using historical data and adding knowledge from experts to these data. The unsupervised events possess shorter information gain than the supervised approaches and have potential to identify this approach compared to the supervised approaches, e.g., neural networks and decision trees at lower level [29,30].
It has been suggested that a design of offline system for identifying fraud in Internet banking should be designed in order to verify security and health of financial transactions. It has been proposed in another study to install a module on system of Internet banking users so that data exchange can be more secure. The most important challenge of this solution is the development problems of this system [27,29].
Some other articles are based on the fraud discovery systems developed practically in Internet banking based on knowledge-based database of expert rules. As a result, this type of systems has potential for diagnosis at low level and they may not be often capable to adjust to new types of fraud [28].
To meet these challenges, we conduct a survey considering a mixture of different methods to reduce the errors. This study aims to propose a smart system in order to determine rate of trust in behavior of Internet banking users in three general steps including determination of input parameters, optimization of fuzzy rules, and implementation of fuzzy system.

Previous Literature
New statistical techniques and smart algorithms have been suggested for discovery and identifying of fraud inside databases; for example, in some of studies, e.g., [15,31], neural networks and decision tree were utilized to disclose fraud and in some others, e.g., [32][33][34], this structure has been implemented according to logistic regression. It has been tried in many studies, e.g., [35,36], to present an expert system based on database of rules. These models have been employed regarding the subjects, e.g., money-laundering, forgery of credit cards, accounting frauds, and cyber tourism [34,36,37].
Recently, some researchers have highlighted the importance of fuzzy based data mining approaches, e.g., [38,39]. Aburrous et al. [40] proposed the model, combining fuzzy logic and data mining algorithms to classifying the phishing website types and categorizing six e-banking phishing website attack strategies with a layer structure. They proposed fuzzy data mining approach as an effective tool in identifying e-banking phishing websites as this technique offers a way for considering quality factors in an ambiguous process of phishing detection. In terms of considering user behaviors, Atta-ur-Rahman et al. [41] proposed a neuro-fuzzy approach to predict user behavior, considering users' temporal logs including local machine, network, and web usage logs. In terms of e-banking, Rezaiee and Karimi [42] proposed a model of determining validity and reliability of e-banking users by using Fuzzy C-Mean model. Eshghi and Kargari [29] employed multi criteria decision methods, intuitionistic fuzzy set, and evidential reasoning to proposed a new algorithm for fraud detection.

Methodology
The methodology of this research is a descriptive-exploratory data mining, employing quantitative and qualitative research methodology.
The interviews and datasets were conducted by the cooperation of Agri-Bank central center located in Tehran. Agri-Bank or Bank Keshavarzi of Iran, established in 1993, is one of the major Iranian bank. Agribank known as the only specialized bank serving financial services in the agricultural sector. This bank has 1817 branches in Iran and provide financial services and credits to almost 70% of the agricultural sector to facilities its development. As a bank with more than eight decades of banking experience, Agri-Bank has been a forerunner in applying the advanced technologies like electronic banking terminal, setting up of the core-banking system, and providing a wholly automatic system of inter-branch data transfer.
To analyze data, we have used qualitative and quantitative methodology. Rather than conducting librarian studies to design of expert fuzzy system, some other methods such as interview with the experts as well as data-mining techniques and Analytical-Hierarchy Process (AHP) were used. The process for research implementation has been given in Figure 1. The rate of accuracy of fuzzy system has been increased by using data-mining in this process. given in Figure 1. The rate of accuracy of fuzzy system has been increased by using data mining in this process. The analytical parts of the paper are divided into two steps as follow: Step 1: Determination of input parameters: On this step, based on analysis of liter ature, 10 input variables for fraud detection derived from customer behavior were ex tracted and they were ranked by means of Freidman test and AHP analysis. Data wa provided by expert opinion and analyzed by Expert Choice and SPP.
Step 2: Designing the expert fuzzy system: At this stage, according to quantitativ method, we use Agricultural Bank annual customer Internet banking data, employin clustering algorism K-Mean by MATLAB. In this phase, data mining and clustering wer used to determine the linguistic expressions or linguistic values of each of the variable It is composed of three main categories, i.e., 'inputs', 'base of rules', and 'outputs' throug three phases.
Phase 1: Optimization of fuzzy rules: During this step, the values and intervals o variables in fuzzy system determine based on actual values of variables in Internet bank ing database and by means of data mining process and K-Means clustering were analyzed Phase 2: Architecture of expert system in determination of the rate of trust in behavio of Internet banking users: In this step, the expert fuzzy system was implemented by usin MATLAB software and data-mining calculations by means of Clementine software.
Phase 3: Inputs of fuzzy system: Presentation of electronic dynamic behavior algo rithm: The expert system deduces each customer's categories based on customers' state in each parameter provided in the previous steps.
Moreover, to test the proposed model, we provided rule based fuzzy system an categorized the customers based on their reliability. Each of these steps were fully de scribed in Analysis section (Section 4). The analytical parts of the paper are divided into two steps as follow:

Model Preparation
Step 1: Determination of input parameters: On this step, based on analysis of literature, 10 input variables for fraud detection derived from customer behavior were extracted and they were ranked by means of Freidman test and AHP analysis. Data was provided by expert opinion and analyzed by Expert Choice and SPP.
Step 2: Designing the expert fuzzy system: At this stage, according to quantitative method, we use Agricultural Bank annual customer Internet banking data, employing clustering algorism K-Mean by MATLAB. In this phase, data mining and clustering were used to determine the linguistic expressions or linguistic values of each of the variables. It is composed of three main categories, i.e., 'inputs', 'base of rules', and 'outputs' through three phases.
Phase 1: Optimization of fuzzy rules: During this step, the values and intervals of variables in fuzzy system determine based on actual values of variables in Internet banking database and by means of data mining process and K-Means clustering were analyzed.
Phase 2: Architecture of expert system in determination of the rate of trust in behavior of Internet banking users: In this step, the expert fuzzy system was implemented by using MATLAB software and data-mining calculations by means of Clementine software.
Phase 3: Inputs of fuzzy system: Presentation of electronic dynamic behavior algorithm: The expert system deduces each customer's categories based on customers' states in each parameter provided in the previous steps.
Moreover, to test the proposed model, we provided rule based fuzzy system and categorized the customers based on their reliability. Each of these steps were fully described in Analysis section (Section 4).

Model Preparation
First step: Determination of input parameters According to qualitative method, we interviewed 30 experts in E-banking from Agri-Bank to identify the most important variables of customer behavior analysis. Interviews were analyzed by Analytical-Hierarchy Process (AHP) using Expert choice software. In this phase, AHP was used to rank the vari-ables and select the most important ones. Among respondents, 23% have BA degree, 70% have MA, and 7% have PhD degree. Following to interview analysis, 10 input variables were extracted.
To select the most important variables, we have designed a questionnaire filled by 100 banking experts. Thus, these data were ranked by means of Freidman test proportional. The conducted analysis is given in Table 1. After ranking of efficient variables in determination of rate of trust in behavior of Internet banking by means of Freidman test, 6 main variables were selected using fuzzy system ( Table 2). The variables were separated into two general classes proportional to nature of these variables and comments of experts. Six selected variables were ranked again by AHP method based on the 30 experts' opinions. This is because the AHP method does not require a statistically significant (large) sample size to get statistically robust results [43,44], The given analysis was conducted using Expert Choice software and the results are presented in Figure 2. According to Figure 2, the weight of user security information is estimated 0.625, compared with the weight of user behavior which is 0.397.
Second step: Designing the expert fuzzy system. This step is composed of three main categories, i.e., 'inputs', 'base of rules', and 'outputs' through three phases. Phase 1: Optimization of fuzzy rules. The lingual terms were identified for any variable within intervals of 3-5 terms after recognizing the efficient variables in fuzzy system and then the values and ranges of these terms were determined by questionnaire and based on comments from experts. With respect to specific relationship among accuracy of fuzzy system and the values and intervals of variables, the absolute reliance on experts' comment may be usually followed by human errors in determination of intervals and their values. Therefore, given the importance of appropriate selection of intervals for variables in implementation of more accurate fuzzy system, it has been suggested in this study to select the intervals According to Figure 2, the weight of user security information is estimated 0.625, compared with the weight of user behavior which is 0.397.
Second step: Designing the expert fuzzy system. This step is composed of three main categories, i.e., 'inputs', 'base of rules', and 'outputs' through three phases. Phase 1: Optimization of fuzzy rules. The lingual terms were identified for any variable within intervals of 3-5 terms after recognizing the efficient variables in fuzzy system and then the values and ranges of these terms were determined by questionnaire and based on comments from experts.
With respect to specific relationship among accuracy of fuzzy system and the values and intervals of variables, the absolute reliance on experts' comment may be usually followed by human errors in determination of intervals and their values. Therefore, given the importance of appropriate selection of intervals for variables in implementation of more accurate fuzzy system, it has been suggested in this study to select the intervals based on actual values of variables in Internet banking database and by means of data mining process and K-Means clustering analysis. Thus, employing of clustering technique for determination of lingual intervals in fuzzy system is assumed as one of the innovations in the aforesaid study. It should be noted that with respect to nature of variables of confidential account information, these variables were extracted for all customers by query in SQL-Server in Internet banking database.
The outputs resulting from clustering of confidential account information account are given by means of operation using Clementine software as follows (Tables 3-8). Table 3. Clustering of variable of token error (source: research analysis).

Cluster No
Card code error

Number of Cluster
Number of Account Deficit Error 1 2 3 4 1 10 3 5 Table 6. Number of customers at any cluster, account deficit error (source: research analysis).

Number of Customers
Cluster no  Table 7. Clustering variable of card code error (source: research analysis).  Table 8. Number of customers at any cluster, card code (source: research analysis). After collection of the related data to any variable, the given output was determined in form of triangular fuzzy numbers as the system input values where the results are displayed in Figure 3.

Number of Customers
havior of Internet banking users within monthly periods. Specific services may be given without security limit by determination of rate of trust in secure behavior of Internet banking users. The expert fuzzy system is composed of three main categories, i.e., 'inputs', 'base of rules', and 'outputs'. The expert fuzzy system has been implemented using MATLAB software and data-mining calculations by means of Clementine software.  Phase 2: Architecture of expert system in determination of rate of trust in behavior of Internet banking users. The presented structure in this system is based on identifying behavior of Internet banking users within monthly periods. Specific services may be given without security limit by determination of rate of trust in secure behavior of Internet banking users. The expert fuzzy system is composed of three main categories, i.e., 'inputs', 'base of rules', and 'outputs'. The expert fuzzy system has been implemented using MATLAB software and data-mining calculations by means of Clementine software.
Phase 3: Inputs of fuzzy system: Presentation of electronic dynamic behavior algorithm. The input parameters and lingual values of these parameters were determined at first and second phases of study. The expert system deduces each customer's categories based on customers' states in each parameter provided in the previous steps. Then the information of variables of electronic behavior was extracted according to Table 9 for Internet banking users. In order to propose an algorithm with potential for dynamic learning of electronic behavior and personalization of this structure for any customer, score status of any variable was calculated based on Formula 1 after collection of data listed in Table 9. Feature's detail i : number of occurrence of a type of feature i Total i : total number of occurrence of feature i n: score for user's electronic behavior in feature i x i : Status of feature i in user upon login in Internet banking. The given formula is important because the output of this formula may vary from 0 to 10 based on status of any customer. We have the maximum variation in customer's electronic behavior near to 1 and the minimum change in customer's electronic behavior near to 0. For example, if a user login in Internet banking via IE7, the user's score is calculated according to Formula 1 as follows.
With respect to the given explanations, user's status is placed in this feature at relatively usual level. It is noteworthy that the quantity of this formula may vary proportional to user's status in the long run.
Following to the former example, one can calculate user's score in all variables. The user's score is given in login (input) as described in Table 10.

Model Testing
After determination of triangular values of input and output of fuzzy system (Table 10), the laws were produced for base of fuzzy rules including 720 rules. This base of rules was implemented by Python software. It should be noted that with respect to tree structure of rules, the great number of variable may not be problematic for system processing speed. Generally, if status of a variable at low, medium, and high level, the total number of rules will be reduced to 237 and by analysis on status of the second variable at second step, this structure is reduced to 78 rules and this trend will be continued until recognition of the appropriate fuzzy law. Therefore, the great number of rules may not lead to reduced speed in system processing, and it can tangibly increase accuracy of system.
At this phase, base of fuzzy rules was extracted by means of lingual input variables and comment from experts using 729 rules of 'if and then'. Some of these rules are presented in Table 11. Table 11. Examples of description of fuzzy rules (source: research analysis).

Row
Rule Description

1
If the user logins the system with correct card code and within normal time and without making account deficit error and used usual browser and stable geographical situation without error into the Internet banking website, then the behavior of user is reliable.

2
If the user logins the system with card code low error and within normal time and without making account deficit error and used usual browser and stable geographical situation without error into the Internet banking website, then the behavior of user is reliable. 3 If the user logins the system with card code high error and within normal time and without making account deficit error and used usual browser and stable geographical situation without error into the Internet banking website, then the behavior of user is normal.

4
If the user logins the system without card code error and within relatively normal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as reliable.

5
If the user logins the system with card code low error and within relatively normal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as reliable.

6
If the user logins the system with card code high error and within relatively normal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as normal.

7
If the user logins the system without card code error and within abnormal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as reliable. 8 If the user logins the system with card code low error and within abnormal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as normal.

9
If the user logins the system with card code high error and within abnormal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as normal.

10
If the user logins the system without card code error and within normal time and in without making account deficit error and uses normal bowser and errorless and stable geographical situation into Internet banking system, then the user's behavior is assumed as reliable.

Findings
The rate of trust in Internet banking customers has been classified in the given system at four levels. In this structure, score of trust in customers' behavior is determined in monthly periods and proportional to the acquired scores by customer, specific level of services is given, e.g., higher level for fund transfer and opening of new account and so forth.
System output is implemented within framework of four general classes of customers. As a customer login in this system, the system determines at what level customer's behavior was placed at former period based on the given fuzzy model and in which group of customers it is classified. The levels of trust in customers' behavior have been classified in four following groups.
Reliable: It includes users who enjoy risk-free and uniform electronic behavior. This group of customers may use special electronic services without the usual constraints.
Normal: This category comprises of users with electronic behavior along with card code error and their electronic behavior is followed by periodic changes. This group of customers may use electronic services with the usual constraints.
Unreliable: It includes that class of Internet banking users who made a great deal of card code errors and also a lot of changes in electronic behavior in different periods. It necessitates for the limited use of this group of customers along with analysis on them.
Suspicious: It comprises of the users who make a lot of card code errors and in process of fund transfer. This group possesses different and abnormal electronic behavior compared to their behavior in the past. It is required not to give any electronic services to this group of customers via Internet banking.
At this step, expert fuzzy system was implemented by means of real situation data. To evaluate system, a few samples of the relevant information items to various users entered in the system of Internet banking database existing in Agri-bank. We will discuss two examples in more details.
The given analysis on user-1 has been proposed with respect to the extracted data in profile of this user. Given the output of fuzzy system, variable of trust in user's behavior is placed at normal level (Table 12). Accordingly, one can take appropriate strategies regarding rate of giving special services proportional to user's electronic behavior. In order to analyze more on performance of the given fuzzy system, another sample of Internet banking user's status entered into fuzzy system while output of system was assessed. The status of electronic behavior of User-2 was collected in Table 13 proportional to the existing data in Internet banking database.
Then status of User-2 is given in variables of fuzzy system described in Table 14.
As the output of fuzzy system indicates, with respect to the data in user's profile and laws in base of rules, the behavior of User-2 is at unreliable status. Thus it is not recommended to give special services to this user.
In this section, to evaluate the model, data related to 100 customers were examined. In this regard, the data was evaluated by the system and experts, using Chi Square test by R software. The results failed to reject H0, indicated the dependency of expert opinion and system results. The coding and results of Chi Square test is provided in Table 15.
Based on Table 15, It can be concluded that the evaluation results of the presented model are accepted by the experts. The p-value is 0.824249. The result is not significant at p < 0.5.

Discussion
The results show that four categories can be considered for reliability of Agri-Bank customers based on their behavior. Reliable customers are those who enjoy risk-free and uniform electronic behavior. This group of customers may use special electronic services without the usual constraints. Normal customers are those with card code error followed by periodic changes. This group of customers may use electronic services with the usual constraints. Unreliable users are those who made a great deal of card code errors and also a lot of changes in electronic behavior in different periods. It is required to trace and control the behavior of these customers through Internet banking more accurately, and lastly, suspicious customers' online banking services are those customers who make a lot of card code errors and in process of fund transfer. This group possesses different and abnormal electronic behavior compared to their behavior in the past. It necessitates for the limited use of this group of customers along with analysis on them. Moreover, results of this research show that the proposed model which employed data-oriented approaches based on data-mining in combination with data-oriented approaches based on fuzzy systems is reliable. Moreover, due to the acceptance of dependency hypothesis in Chi-square test, we can conclude the evaluation results of the proposed model are accepted by the experts.
This research contributes to the current literature by proposing the online banking fraud detection algorithm by both considering the expert opinion and dataset of bank. Such a model can provide the opportunity to use the contextual opinion of experts as well as different characteristics of customer behavior. We also proposed the model based on fuzzy system and K-means tools as two of the accurate tools with high coverage of fraud detection [8]. The foremost given innovation in this study is related to use of data-oriented approaches based on data-mining in combination with data-oriented approaches based on fuzzy systems and also use of clustering to determine lingual intervals in fuzzy system. Moreover, one can consider implementation of this system in real world situation in one of the greatest banks in Iran as a special advantage of the aforesaid research. Moreover, data mining and clustering were used to determine the linguistic expressions or linguistic values of each of the variables, which was one of the most important research innovations. It is noteworthy that the suggested structure has been proposed for improving security of Internet banking system in which the given services depends on rate of trust in electronic behavior of the user.

Conclusions and Suggestions
There are some limitations in this study, which provide a direction for further research. Due to time and accessibility limitations, the experts selected from the same bank, thus, it is recommended for future research to benefit from experts' opinion from several banks domain. It was tried in this study to design a dynamic algorithm based on the identified factors in the previous researches. With respect to importance of full identification of the effective factors in determination of credit of users in Internet banking, it is suggested identifying the effective factors in credit by means of content analysis technique in the future investigations and using open-ended questionnaire and direct interview with banking experts.
Banks can use suggested algorithm to increase the security of their Internet banking, to induce a sense of intelligence by observing the behavior of each customer. The extensive changes in IT and emerging of new concepts in this area, e.g., cloud-computing have turned the process of implementation of smart techniques as necessary and vital for improving security in data exchange to various organizations. Therefore, it has been tried in the given study to propose a smart structure for identifying behavior of Internet banking users. Adaption of this system may lead to creating new approach toward giving special services without the usual constraints such as the transferrable fund via Internet banking and opening of new account and so forth to the customers with reliable behavior. Due to the fact that the number of researches in this field is very limited, the implementation of this model in the banking industry and its application can be one of the dimensions of research innovation, while the use of clustering in calculating language values of each of the variables is another innovation of this research. Informed Consent Statement: Informed consent was obtained from all subjects involved in the study. Data Availability Statement: Data will not share. For having this data, please contact Hamid Bekamiri at Hamidb@business.aau.dk.