National Payment Switches and the Power of Cognitive Computing against Fintech Fraud
Abstract
:1. Introduction
1.1. Payment Switches and Gateways in the Fintech Ecosystem
- ○
- Standardisation of cognitive computing practices can lead to more consistent results in fraud detection, ensuring that financial institutions are better equipped to identify and prevent fraudulent activities. This standardisation could involve the development of common protocols, algorithms, and data models that facilitate collaboration between different organisations and streamline the deployment of cognitive computing technologies in fraud detection.
- ○
- Benchmarking standards, on the other hand, can help financial institutions gauge the effectiveness of their fraud detection systems against industry leaders, thereby encouraging continuous improvement and innovation. These standards may encompass various metrics, such as success rates in detecting fraud, reductions in false positives, and improvements in decision-making speed and accuracy.
- ○
- Identifying best practices can provide valuable insights into the most effective methods for implementing cognitive computing in fraud detection. These practices might address challenges such as data privacy and security, integrating cognitive computing with existing systems, and training and upskilling personnel. Financial institutions can learn from their peers by studying cases where cognitive computing has been successfully deployed and adopt proven strategies to bolster their fraud detection efforts.
- ○
- Developing integrated cross-border solutions is essential in today’s interconnected financial landscape. Fraudsters are increasingly operating across multiple jurisdictions, making it vital for financial institutions to collaborate and share information to combat these threats. By adopting cognitive computing tools and best practices that enable seamless cross-border cooperation, financial institutions can more effectively prevent and detect fraud on a global scale.
1.2. Cognitive Computing, NPSs, and Financial Frauds
2. Materials and Methods
- Familiarisation with the data by reviewing the literature on cognitive computing in fraud detection for payment switches, including academic publications and industry reports. It provided a foundation for understanding the context and key concepts.
- Generation of initial codes. The literature review and data collection created a set of initial codes to categorise the information. It included codes related to specific cognitive computing techniques, their effectiveness, or challenges faced in implementation.
- Search for themes: initial codes review and grouping them into broader themes that capture the essence of the research question.
- Producing the report: With the themes established, findings are presented by discussing each theme in detail. The most common and effective techniques of cognitive computing used in payment switches are presented. An evaluation of their effectiveness in detecting and preventing financial fraud is performed.
- Providing recommendations for payment switches on optimising their use of cognitive computing in fraud detection.
3. Findings: Cognitive Computing Tools Adopted by National Payment Switches to Tackle Financial Fraud
3.1. Central Banks and National Payment Switches an Ongoing Collaboration
3.2. Real-World Examples of Cognitive Computing in Fraud Detection—Data Familiarisation
3.2.1. ACH (Automated Clearing House) (USA)
3.2.2. Bancontact (Belgium)
3.2.3. BKM Express (Türkiye)
3.2.4. BPAY (Australia)
3.2.5. China UnionPay (China)
3.2.6. EBA Clearing (Germany)
3.2.7. EFTPOS (Australia)
3.2.8. Faster Payments (UK)
3.2.9. Interac (Canada)
3.2.10. NETS (Singapore)
3.2.11. NEXI (Italy)
3.2.12. NPCI (India)
- UPI (Unified Payments Interface): UPI is a real-time payment system that enables users to send and receive money using a virtual payment address linked to their bank account. The system has gained widespread adoption in India due to its ease of use and convenience.
- IMPS (Immediate Payment Service): IMPS is a real-time interbank electronic fund transfer system that enables users to transfer money instantly between bank accounts in India.
- RuPay: RuPay is a domestic card payment network that enables users to make payments using debit, credit, and prepaid cards. The system competes with international card networks such as Visa and Mastercard.
- AEPS (Aadhaar Enabled Payment System): AEPS is a payment system that enables users to make payments using their Aadhaar number and biometric authentication. The system is designed to enable financial inclusion for individuals who do not have access to traditional banking services [103].
3.2.13. NSPK (National System of Payment Cards) (Russia)
3.2.14. PIX (Brazil)
3.2.15. SADAD (Saudi Arabia)
3.2.16. SNCE (Sistema Nacional de Compensación Electrónica) (Argentina)
3.2.17. SPEI (Sistema de Pagos Electrónicos Interbancarios) (Mexico)
3.2.18. STET (France)
3.2.19. UAEFTS (UAE Funds Transfer System) (United Arab Emirates)
3.3. Initial Code Generation
3.4. Search for Themes—Codes Grouping
- ⬝
- Fraud Detection and Prevention (Tout Court): This group brings together tools and techniques to identify, monitor, and prevent fraudulent activities in payment systems. These tools help financial institutions detect and respond to potential fraud in real time, thereby reducing the likelihood of financial loss and enhancing the security of transactions. By combining rules and models with advanced detection methods, such as anomaly detection and AI-powered solutions, this group emphasises the proactive aspect of fraud management.
- ⬝
- Authentication and Security: This group’s primary objective is to ensure users’ authenticity and secure their financial transactions. By utilising various authentication techniques such as biometrics, two-factor authentication, and risk-based authentication, this theme aims to create a secure environment for financial transactions. Encryption and 3-D Secure further strengthen transaction security, making it difficult for malicious actors to compromise sensitive information or impersonate legitimate users.
- ⬝
- Machine Learning and Advanced Analytics: This group leverages machine learning and advanced analytics to enhance fraud detection and prevention capabilities. With the increasing volume and complexity of financial data, these tools play a crucial role in identifying subtle patterns of fraudulent behaviour, making predictions, and adapting to emerging trends. This theme highlights the value of data-driven insights in combating financial fraud by utilising advanced techniques such as natural language processing and user behaviour analysis.
- ⬝
- Risk Management and Assessment: The tools and techniques in this group aim to identify, assess, and manage risks associated with financial transactions. By conducting network analysis, risk assessment, and data analytics for trend analysis, financial institutions can gain a deeper understanding of the potential vulnerabilities in their systems and take appropriate measures to mitigate them. Data visualisation further supports this process by clearly representing risks and trends, enabling informed decision making.
- ⬝
- Data Protection and Privacy: This theme focuses on safeguarding sensitive financial data and ensuring users’ privacy. Tokenisation and blockchain technology are key tools in this group that help protect sensitive information from being intercepted or misused. Geo-localisation adds a layer of security by identifying the geographical location of users, which can help detect potential fraud if transactions originate from unexpected or high-risk locations. Overall, this group emphasises the importance of data protection and user privacy in maintaining trust and confidence in the financial system.
3.5. Producing the Report
4. Discussion and Recommendations
5. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Putland, P.A.; Hill, J.; Tsapikidis, D. Electronic payment systems. BT Technol. J. 1997, 15, 32–38. [Google Scholar] [CrossRef]
- Omarini, A.E. Fintech and the future of the payment landscape: The mobile wallet ecosystem. A challenge for retail banks? Int. J. Financ. Res. 2018, 9, 97–116. [Google Scholar] [CrossRef]
- Mu, H.L.; Lee, Y.C. How inclusive digital financial services impact user behavior: A case of proximity mobile payment in Korea. Sustainability 2021, 13, 9567. [Google Scholar] [CrossRef]
- Briggs, A.; Brooks, L. Electronic payment systems development in a developing country: The role of institutional arrangements. Electron. J. Inf. Syst. Dev. Ctries. 2011, 49, 1–16. [Google Scholar] [CrossRef]
- Dhobe, S.D.; Tighare, K.K.; Dake, S.S. A review on prevention of fraud in electronic payment gateway using secret code. Int. J. Res. Eng. Sci. Manag. 2020, 3, 602–606. [Google Scholar]
- Lowry, P.B.; Wells, T.M.; Moody, G.D.; Humphreys, S.; Kettles, D. Online payment gateways used to facilitate e-commerce transactions and improve risk management. Commun. Assoc. Inf. Syst. (CAIS) 2006, 17, 1–48. [Google Scholar] [CrossRef]
- Machine Learning for Mobile Network Payment Security Evaluation System. Available online: https://doi.org/10.1002/ett.4226 (accessed on 2 March 2023).
- Pangestu, A.; Baskoro, R.A. Analysis of the Development of the National Payment Gateway (GPN) as a Symbol of Domestic Retail Transaction Sovereignty in Indonesia. In Proceedings of the 4th International Conference on Economics, Business and Economic Education Science, ICE-BEES 2021, Semarang, Indonesia, 27–28 July 2021; European Alliance for Innovation: Ghent, Belgium, 2022; p. 111. [Google Scholar]
- Parlour, C.A.; Rajan, U.; Zhu, H. Fintech disruption, payment data, and bank information. NBER Work. Pap. 2019, 22476, 1–35. [Google Scholar]
- Tay, L.Y.; Tai, H.T.; Tan, G.S. Digital financial inclusion: A gateway to sustainable development. Heliyon 2022, 8, e09766. [Google Scholar] [CrossRef]
- Moreno-Serra, R.; Wagstaff, A. System-wide impacts of hospital payment reforms: Evidence from Central and Eastern Europe and Central Asia. J. Health Econ. 2010, 29, 585–602. [Google Scholar] [CrossRef]
- Adzimatinur, F.; Manalu, V.G. The Effect of islamic financial inclusion on economic growth: A case study of islamic banking in indonesia. Bp. Int. Res. Crit. Inst. (BIRCI-J.) Humanit. Soc. Sci. 2021, 4, 976–985. [Google Scholar] [CrossRef]
- Alkhowaiter, W.A. Digital payment and banking adoption research in Gulf countries: A systematic literature review. Int. J. Inf. Manag. 2020, 53, 102102. [Google Scholar] [CrossRef]
- Nurfahrohim, R.; Aprilianty, F. A study of national payment gateway system in indonesia. In Proceedings of the 4th ICMEM 2019 and the 11th IICIES 2019, Bali, Indonesia, 7–9 August 2019. [Google Scholar]
- Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of big data and machine learning in smart grid, and associated security concerns: A review. IEEE Access 2019, 7, 13960–13988. [Google Scholar] [CrossRef]
- Pourhabibi, T.; Ong, K.L.; Kam, B.H.; Boo, Y.L. Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decis. Support Syst. 2020, 133, 113303. [Google Scholar] [CrossRef]
- Mosteanu, N.R.; Faccia, A. Digital systems and new challenges of financial management–FinTech, XBRL, blockchain and cryptocurrencies. Qual. Access Success J. 2020, 21, 159–166. [Google Scholar]
- Faccia, A.; Al Naqbi, M.Y.K.; Lootah, S.A. Integrated cloud financial accounting cycle: How artificial intelligence, blockchain, and XBRL will change the accounting, fiscal and auditing practices. In Proceedings of the 2019 3rd International Conference on Cloud and Big Data Computing, Oxford, UK, 28–30 August 2019; pp. 31–37. [Google Scholar]
- Mosteanu, N.R.; Faccia, A. Fintech frontiers in quantum computing, fractals, and blockchain distributed ledger: Paradigm shifts and open innovation. J. Open Innov. Technol. Mark. Complex. 2021, 7, 19. [Google Scholar] [CrossRef]
- Ruff, L.; Kauffmann, J.R.; Vandermeulen, R.A.; Montavon, G.; Samek, W.; Kloft, M.; Müller, K.R. A unifying review of deep and shallow anomaly detection. Proc. IEEE 2021, 109, 756–795. [Google Scholar] [CrossRef]
- Zhu, X.; Ao, X.; Qin, Z.; Chang, Y.; Liu, Y.; He, Q.; Li, J. Intelligent financial fraud detection practices in post-pandemic era. Innovation 2021, 2, 100176. [Google Scholar] [CrossRef]
- Farahani, M.S.; Esfahani, A. Opportunities and Challenges of Applying Artificial Intelligence in the Financial Sectors and Startups during the Coronavirus Outbreak. Int. J. Innov. Manag. Econ. Soc. Sci. 2022, 2, 33–55. [Google Scholar]
- Srivastava, K. Paradigm shift in Indian banking industry with special reference to artificial intelligence. Turk. J. Comput. Math. Educ. (TURCOMAT) 2021, 12, 1623–1629. [Google Scholar]
- Tuckett, A.G. Applying thematic analysis theory to practice: A researcher’s experience. Contemp. Nurse 2005, 19, 75–87. [Google Scholar] [CrossRef]
- Mhlanga, D. Industry 4.0 in finance: The impact of artificial intelligence (ai) on digital financial inclusion. Int. J. Financ. Stud. 2020, 8, 45. [Google Scholar] [CrossRef]
- Bouzidi, Z.; Amad, M.; Boudries, A. Deep Learning-Based Automated Learning Environment Using Smart Data to Improve Corporate Marketing, Business Strategies, Fraud Detection in Financial Services, and Financial Time Series Forecasting. In International Conference on Managing Business Through Web Analytics; Springer International Publishing: Cham, Switzerland, 2022; pp. 353–377. [Google Scholar]
- Ololade, B.M.; Salawu, M.K.; Adekanmi, A.D. E-Fraud in Nigerian banks: Why and how? J. Financ. Risk Manag. 2020, 9, 211–228. [Google Scholar] [CrossRef]
- Behera, R.K.; Bala, P.K.; Dhir, A. The emerging role of cognitive computing in healthcare: A systematic literature review. Int. J. Med. Inform. 2019, 129, 154–166. [Google Scholar] [CrossRef]
- Capuano, N.; Fenza, G.; Loia, V.; Stanzione, C. Explainable Artificial Intelligence in CyberSecurity: A Survey. IEEE Access 2022, 10, 93575–93600. [Google Scholar] [CrossRef]
- Pozzar, R.; Hammer, M.J.; Underhill-Blazey, M.; Wright, A.A.; Tulsky, J.A.; Hong, F.; Berry, D.L. Threats of bots and other bad actors to data quality following research participant recruitment through social media: Cross-sectional questionnaire. J. Med. Internet Res. 2020, 22, e23021. [Google Scholar] [CrossRef]
- Capizzi, A.; Distefano, S.; Araújo, L.J.; Mazzara, M.; Ahmad, M.; Bobrov, E. Anomaly detection in devops toolchain. In Proceedings of the Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment: Second International Workshop, DEVOPS 2019, Château de Villebrumier, France, 6–8 May 2019; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 37–51. [Google Scholar]
- Auer, R.; Frost, J.; Gambacorta, L.; Monnet, C.; Rice, T.; Shin, H.S. Central bank digital currencies: Motives, economic implications, and the research frontier. Annu. Rev. Econ. 2022, 14, 697–721. [Google Scholar] [CrossRef]
- AL-mamoorey, M.A.; Al-Rubaye, M.M.M. The role of electronic payment systems in Iraq in reducing banking risks: An empirical research on private banks. Pol. J. Manag. Stud. 2020, 21, 49–59. [Google Scholar] [CrossRef]
- Norman, B. Liquidity saving in real-time gross settlement systems: An overview. J. Paym. Strategy Syst. 2010, 4, 261–276. [Google Scholar]
- Fernández-Villaverde, J.; Sanches, D.; Schilling, L.; Uhlig, H. Central bank digital currency: Central banking for all? Rev. Econ. Dyn. 2021, 41, 225–242. [Google Scholar] [CrossRef]
- Schmiedel, H.; Kostova, G.L.; Ruttenberg, W. The social and private costs of retail payment instruments: A European perspective. ECB Occas. Pap. 2012, 137, 1–49. [Google Scholar] [CrossRef]
- Carstens, A. Big Tech in Finance and New Challenges for Public Policy. Keynote address, FT Banking Summit London. 4 December 2018. Available online: https://www.bis.org/speeches/sp181205.htm (accessed on 2 March 2023).
- Khan, M.A.; Malaika, M. Central Bank Risk Management, Fintech, and Cybersecurity; International Monetary Fund: Washington, DC, USA, 2021. [Google Scholar]
- Ryman-Tubb, N.F.; Krause, P.; Garn, W. How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark. Eng. Appl. Artif. Intell. 2018, 76, 130–157. [Google Scholar] [CrossRef]
- Sangaiah, A.K.; Goli, A.; Tirkolaee, E.B.; Ranjbar-Bourani, M.; Pandey, H.M.; Zhang, W. Big data-driven cognitive computing system for optimisation of social media analytics. IEEE Access 2020, 8, 82215–82226. [Google Scholar] [CrossRef]
- Raj, S.B.E.; Portia, A.A. Analysis on credit card fraud detection methods. In Proceedings of the 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET), Tirunelveli, India, 18–19 March 2011; pp. 152–156. [Google Scholar]
- Gutierrez, D.D. ACH Fraud and AI/ML—Much Work to Be Done. 2022. Available online: https://insidebigdata.com/2022/09/19/ach-fraud-and-ai-ml-much-work-to-be-done/ (accessed on 2 March 2023).
- Goodell, J.W.; Kumar, S.; Lim, W.M.; Pattnaik, D. Artificial intelligence and machine learning in finance: Identifying foundations, themes, and research clusters from bibliometric analysis. J. Behav. Exp. Financ. 2021, 32, 100577. [Google Scholar] [CrossRef]
- Faivusovich, A. Modern Fraud Prevention Playbook Unit21. 2022. Available online: https://www.unit21.ai/resources/fraud-prevention-playbook (accessed on 2 March 2023).
- Van Droogenbroeck, E.; Van Hove, L. COVID-19 and point-of-sale payments in Belgium: How the older generation also learned to love contactless. J. Paym. Strategy Syst. 2022, 16, 17–27. [Google Scholar]
- Maillard, H.; Vermeulen, J. The Single Euro Payments Area: SEPA. Economic Review. 2006. Available online: https://www.ecb.europa.eu/pub/pdf/other/sepa_brochure_2006en.pdf (accessed on 2 March 2023).
- Van Hove, L. Electronic money and the network externalities theory: Lessons for real life. Netnomics 1999, 1, 137–171. [Google Scholar] [CrossRef]
- Emerchantpay. Payment Gateway—What Is It and How Does It Work? 2022. Available online: https://www.emerchantpay.com/insights/what-is-a-payment-gateway-and-how-does-it-work/ (accessed on 2 March 2023).
- Fabcic, D. Strong Customer Authentication in Online Payments Under GDPR and PSD2: A Case of Cumulative Application. In Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2. 2 International Summer School, Maribor, Slovenia, 21–23 September 2020; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 78–95, Revised Selected Papers 15. [Google Scholar]
- Lone, S.; Harboul, N.; Weltevreden, J. European E-Commerce Report; Amsterdam University of Applied Sciences: Amsterdam, The Netherlands, 2021. [Google Scholar]
- Wolters, P.T.; Jacobs, B.P. The security of access to accounts under the PSD2. Comput. Law Secur. Rev. 2019, 35, 29–41. [Google Scholar] [CrossRef]
- Lample, G.; Ott, M.; Conneau, A.; Denoyer, L.; Ranzato, M.A. Phrase-based & neural unsupervised machine translation. arXiv 2018, arXiv:1804.07755. [Google Scholar]
- Kauffman, R.J.; McAndrews, J.; Wang, Y.M. Opening the “black box” of network externalities in network adoption. Inf. Syst. Res. 2000, 11, 61–82. [Google Scholar] [CrossRef]
- Wu, Z.; Liu, Y. Exploring country differences in the adoption of mobile payment service: The surprising robustness of the UTAUT2 model. Int. J. Bank Mark. 2022, 41, 237–268. [Google Scholar] [CrossRef]
- Aktuğ, S.S. Development of fintech sector in Turkey. BİLTÜRK J. Econ. Relat. Stud. 2020, 2, 487–499. [Google Scholar] [CrossRef]
- Yuksel, B. Future of Fintech in Turkey in the Absence of Mandatory Open Banking Regulations and the Possible Role of Competition Law; SSRN: Rochester, NY, USA, 2020. [Google Scholar]
- Yazici, M. The impact of COVID-19 on payment systems in Turkey. Int. J. Inf. Res. Rev. 2020, 7, 6911–6917. [Google Scholar]
- Canko, S.; Bruggink, D. The Turkish payment market and its specifics: An interview with Soner Canko. J. Paym. Strategy Syst. 2016, 10, 230–237. [Google Scholar]
- Yeniceler, İ.; Ilgın, H.Ö. New Media and Digital Surveillance Reflections. In Proceedings of the Communication and Technology Congress, Online, 17 April 2019. [Google Scholar]
- Alsadi, M.; Mantar, H.A.; Coskun, V.; Ok, K.; Ozdenizci, B. Challenges and Risks of Developing a Payment Facilitator Model. J. Inf. Secur. Res. 2016, 7, 109–117. [Google Scholar]
- Prenzler, T. Detecting and preventing welfare fraud. Trends Issues Crime Crim. Justice 2011, 418, 1–6. [Google Scholar]
- Choo, K.K.R.; Smith, R.G. Criminal exploitation of online systems by organised crime groups. Asian J. Criminol. 2008, 3, 37–59. [Google Scholar] [CrossRef]
- Cao, L. AI in Finance: A Review; SSRN: Rochester, NY, USA, 2020. [Google Scholar]
- Wewege, L.; Thomsett, M.C. The Digital Banking Revolution: How Fintech Companies Are Transforming the Retail Banking Industry through Disruptive Financial Innovation; Walter de Gruyter GmbH & Co KG: Berlin, Germany, 2019. [Google Scholar]
- Huang, Z. Is it money laundering: Case study of China UnionPay scandal from the perspective of mutual legal assistance on anti-money laundering. J. Money Laund. Control 2015, 18, 411–424. [Google Scholar] [CrossRef]
- Ghosh, S. Payments Overview-China. Finance Finland. 2018. Available online: https://www.finanssiala.fi/wp-content/uploads/2018/12/Payment20Overview20China.pdf (accessed on 2 March 2023).
- Henderson, R. Using graph databases to detect financial fraud. Comput. Fraud Secur. 2020, 2020, 6–10. [Google Scholar] [CrossRef]
- Zhou, H.; Chai, H.F.; Qiu, M.L. Fraud detection within bankcard enrollment on mobile device based payment using machine learning. Front. Inf. Technol. Electron. Eng. 2018, 19, 1537–1545. [Google Scholar] [CrossRef]
- Sun, Q.; Tang, T.; Chai, H.; Wu, J.; Chen, Y. Boosting fraud detection in mobile payment with prior knowledge. Appl. Sci. 2021, 11, 4347. [Google Scholar] [CrossRef]
- Sun, Q.; Zhou, Y.; Tang, T. Mobile Payment Innovations in China: China UnionPay’s Practice and Experience. In Business Innovation with New ICT in the Asia-Pacific: Case Studies; Springer: Berlin/Heidelberg, Germany, 2021; pp. 257–279. [Google Scholar]
- Pouwelse, J.; Bruggink, D. Reducing card-not-present fraud using pre-approved transactions. J. Paym. Strategy Syst. 2016, 10, 50–63. [Google Scholar]
- Baba, C.; Batog, C.; Flores, E.; Gracia, B.; Karpowicz, I.; Kopyrski, P.; Xu, X.C. Fintech in Europe: Promises and Threats; SSRN: Rochester, NY, USA, 2020. [Google Scholar]
- Hassani, B.; Hassani, B.K. Scenario Analysis in Risk Management; Springer International Publishing: Cham, Switzerland, 2016. [Google Scholar]
- Singh, A.; Rumantir, G.; South, A. Market Segmentation of EFTPOS Retailers. In Proceedings of the Twelfth Australasian Data Mining Conference (AusDM 2014), Brisbane, Australia, 27–28 November 2014; pp. 19–24. [Google Scholar]
- Worthington, S. Debit cards and fraud. Int. J. Bank Mark. 2009, 27, 400–402. [Google Scholar] [CrossRef]
- Smith, R.G. Best Practice in Fraud Prevention; Australian Institute of Criminology: Canberra, Australia, 1998. [Google Scholar]
- Sakharova, I. Payment card fraud: Challenges and solutions. In Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, Washington, DC, USA, 11–14 June 2012; pp. 227–234. [Google Scholar]
- Conroy, J. EMV: Lessons Learned and the US Outlook; Aite Group, Inc.: Boston, MA, USA, 2012; Available online: https://eft-direct.com/wp-content/uploads/2016/11/Aite_Report_-_EMV_Lessons_Learned_and_the_U.S._Outlook.pdf (accessed on 2 March 2023).
- Connolly, C. Australian and Regional Regulatory Responses to the Key Challenges of Consumer Protection in Electronic Commerce (March 2008); Galexia: Sydney, Australia, 2008. [Google Scholar]
- Balakrishnan, M. Real-time retail payments systems or faster payments: A quick framework for decision making. J. Paym. Strategy Syst. 2016, 10, 267–278. [Google Scholar]
- Natarajan, H.; Balakrishnan, M. Real-time retail payments system or faster payments: Implementation considerations. J. Paym. Strategy Syst. 2020, 14, 48–60. [Google Scholar]
- Weyman, J. Risks in faster payments. In Retail Payments Risk Forum Working Paper; Federal Reserve Bank of Atlanta: Atlanta, GA, USA, 2016. [Google Scholar]
- Button, M. Fraud investigation and the ‘flawed architecture’of counter fraud entities in the United Kingdom. Int. J. Law Crime Justice 2011, 39, 249–265. [Google Scholar] [CrossRef]
- Bech, M.L.; Shimizu, Y.; Wong, P. The quest for speed in payments. In BIS Quarterly Review March 2017; SSRN: Rochester, NY, USA, 2017. [Google Scholar]
- Hayashi, F. Faster Payments in the United States: How Can Private Sector Systems Achieve Public Policy Goals? Working Paper; Federal Reserve Bank of Kansas City: Kansas City, MO, USA, 2015; p. 15-03. [Google Scholar]
- Anderson, R.D.; Rivard, B. Antitrust Policy towards EFT Networks: The Canadian experience in the Interac case. Antitrust LJ 1999, 67, 389. [Google Scholar]
- Amin, M. National infrastructures as complex interactive networks. Automat. Control Complex. Integr. Approach 2000, 3, 263–286. [Google Scholar]
- Bansal, H.S.; Taylor, S.F. Investigating interactive effects in the theory of planned behavior in a service-provider switching context. Psychol. Mark. 2002, 19, 407–425. [Google Scholar] [CrossRef]
- Gursoy, M.; Mirafzal, B. Self-security for grid-interactive smart inverters using steady-state reference model. In Proceedings of the 2021 IEEE 22nd Workshop on Control and Modelling of Power Electronics (COMPEL), Cartagena, Colombia, 2–5 November 2021; pp. 1–5. [Google Scholar]
- Banerjee, S.P.; Woodard, D.L. Biometric authentication and identification using keystroke dynamics: A survey. J. Pattern Recognit. Res. 2012, 7, 116–139. [Google Scholar] [CrossRef]
- Ng, D. Evolution of digital payments: Early learnings from Singapore’s cashless payment drive. J. Paym. Strategy Syst. 2018, 11, 306–312. [Google Scholar]
- Bolt, S.; Emery, D.; Harrigan, P. Fast retail payment systems. In RBA Bulletin; Reserve Bank of Australia: Sydney, Australia, 2014; pp. 43–51. [Google Scholar]
- Tavani, E. Private Equity, the Powerful Forces Reshaping Capital Markets and the Business Case of Nexi: M&A Activity, IPO and Company Valuation. 2020. Available online: http://tesi.luiss.it/29276/ (accessed on 2 March 2023).
- Agarwal, S.; Qian, W.; Ren, Y.; Tsai, H.T.; Yeung, B.Y. The Real Impact of FinTech: Evidence from Mobile Payment Technology; SSRN: Rochester, NY, USA, 2020. [Google Scholar]
- Bhargava, A.; Ubaid, M.; Khan, Y.; Gupta, P.C. Expansion of Unified Payment Interface. Ann. Rom. Soc. Cell Biol. 2021, 25, 12491–12499. [Google Scholar]
- BusinessWire. Securing Payments in Asia with Latest 3-D Secure Technology. 2022. Available online: https://www.businesswire.com/news/home/20221011006169/en/Securing-payments-in-Asia-with-latest-3-D-Secure-technology (accessed on 2 March 2023).
- Arditti, L.; Trevisan, M.; Vassio, L.; De Lazzari, A.; Danese, A. User Value in Modern Payment Platforms: A Graph Approach. arXiv 2022, arXiv:2210.11168. [Google Scholar]
- Gordon, K. Investment guarantees and political risk insurance: Institutions, incentives and development. In OECD Investment Policy Perspectives; OECD: Paris, France, 2008; pp. 95–103. [Google Scholar]
- NEXI. Nexi and Biometric Recognition: A Question of Security. 2023. Available online: https://www.nexi.it/en/news.html (accessed on 2 March 2023).
- Reply. Getting Cloud and ML into the DNA of Nexi. 2023. Available online: https://www.reply.com/data-reply/en/getting-cloud-and-ml-into-the-dna-of-nexi (accessed on 2 March 2023).
- Cook, W.; Raman, A. National Payments Corporation of India and the Remaking of Payments in India; Consultative Group to Assist the Poor Working Paper: Washington, DC, USA, 2019. [Google Scholar]
- Dhamija, A.; Dhamija, D. Technological advancements in payments: From cash to digital through unified payments interface (UPI). In Strategic Human Capital Development and Management in Emerging Economies; IGI Global: Hershey, PA, USA, 2017; pp. 250–258. [Google Scholar]
- Joshi, M. Digital Payment System: A Feat Forward of India. Research Dimension; SSRN: Rochester, NY, USA, 2017; ISSN 2249-3867. [Google Scholar]
- Gochhwal, R. Unified payment interface—An advancement in payment systems. Am. J. Ind. Bus. Manag. 2017, 7, 1174–1191. [Google Scholar] [CrossRef]
- Dabbeeru, R.; Rao, D.N. Fintech Applications in Banking and Financial Services Industry in India; SSRN: Rochester, NY, USA, 2021. [Google Scholar]
- Selvaraj, P.; Ragesh, T.V. Innovative approach of a regional rural bank in adopting technology banking and improving service quality leading to better digital banking. Vinimaya 2018, 39, 22–32. [Google Scholar]
- Ahmed, M.R.; Meenakshi, K.; Obaidat, M.S.; Amin, R.; Vijayakumar, P. Blockchain based architecture and solution for secure digital payment system. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
- Khetagurov, G.V.; Khetagurova, Y.I. National Payment Card System as an Important Factor of Economic Security of Russia. In International Session on Factors of Regional Extensive Development (FRED 2019); Atlantis Press: Paris, France, 2020; pp. 252–255. [Google Scholar]
- Khromenkov, G.D. Competitiveness of the Russian market of fintech services in the digital economy. In Hayкa и Инновaции-cовpeмeнныe Kонцeпции; Financial University: Moscow, Russia, 2019; pp. 15–18. [Google Scholar]
- Nedoluga, M.S.; Mustafin, A.N. Payment systems: International payment system mastercard and mir (Russia). In QUID: Investigación, Ciencia y Tecnología; IUSH: Medellín, Colombia, 2017; pp. 123–127. [Google Scholar]
- Fu, Y.; Yan, Z.; Cao, J.; Koné, O.; Cao, X. An automata based intrusion detection method for internet of things. Mobile Inf. Syst. 2017, 2017, 1750637. [Google Scholar] [CrossRef]
- Almuhaideb, A.M.; Alqudaihi, K.S. Authentication in Wireless Body Area Network: Taxonomy and Open Challenges. J. Internet Things 2021, 3, 159. [Google Scholar] [CrossRef]
- Amaral, G.; Guizzardi, R.; Guizzardi, G.; Mylopoulos, J. Trustworthiness requirements: The pix case study. In Proceedings of the Conceptual Modeling: 40th International Conference, ER 2021, Virtual, 18–21 October 2021; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 257–267. [Google Scholar]
- Gomes, S.L.; Rebouças, E.D.S.; Neto, E.C.; Papa, J.P.; Albuquerque, V.H.D.; Rebouças Filho, P.P.; Tavares, J.M.R. Embedded real-time speed limit sign recognition using image processing and machine learning techniques. Neural Comput. Appl. 2017, 28 (Suppl. 1), 573–584. [Google Scholar] [CrossRef]
- Pickens, M.; Porteous, D.; Rotman, S. Banking the Poor via G2P payments. Focus Note 2009, 58, 1–22. [Google Scholar]
- Zhao, L.; Matsuo, I.B.; Salehi, F.; Zhou, Y.; Lee, W.J. Development of a real-time web-based power monitoring system for the substation of petrochemical facilities. IEEE Trans. Ind. Appl. 2018, 55, 43–50. [Google Scholar] [CrossRef]
- Alyabes, A.F.; Alsalloum, O. Factors affecting consumers’ perception of electronic payment in Saudi Arabia. Eur. J. Bus. Manag. 2018, 10, 36–45. [Google Scholar]
- Halliday, F. A Curious and Close Liaison: Saudi Arabia’s Relations with the United States. In State, Society and Economy in Saudi Arabia; Routledge: Abingdon, UK, 2015; pp. 125–147. [Google Scholar]
- Authority, S.A.M. Cyber Security Framework; Saudi Arabian Monetary Authority: Riyadh, Saudi Arabia, 2017. [Google Scholar]
- Kulick, S. Exploiting separation of closed-class categories for arabic Tokenisation and part-of-speech tagging. ACM Trans. Asian Lang. Inf. Process. (TALIP) 2011, 10, 1–18. [Google Scholar] [CrossRef]
- León, M.H. Los servicios de dirimencias como instrumento de resolución de conflictos interbancarios. CEFLegal. Rev. Práct. Derecho 2020, 39–70. [Google Scholar] [CrossRef]
- Banco de Mexico. Sistema de Pagos Electrónicos Interbancarios (SPEI). In Divulgación del Cumplimiento y Adopción de los Principios Para las Infraestructuras del Mercado Financiero; Banco de Mexico: Mexico City, Mexico, 2016. [Google Scholar]
- Banco de Mexico. Information for SPEI® Users. Available online: https://www.banxico.org.mx/services/interbanking-electronic-payme.html (accessed on 2 April 2023).
- Banco de Mexico. Interbank Electronic Payment System (SPEI). 2016. Available online: https://www.banxico.org.mx/payment-systems/d/%7B90965A55-8F44-7DD2-45CF-2BF1D7C0B75B%7D.pdf (accessed on 2 April 2023).
- STET. European-Wide Solutions. Available online: https://www.stet.eu/en/payment-solutions/ (accessed on 2 April 2023).
- IBM. Payment Fraud Prevention at a National Payment Switch. 2019. Available online: https://www.ibm.com/blogs/client-voices/payment-fraud-prevention-national-payment-switch/ (accessed on 2 April 2023).
- Iman, N. Financial innovations in Islamic countries: The road to perdition or salvation? J. Islam. Mark. 2020, 11, 1579–1600. [Google Scholar] [CrossRef]
- Subramanian, M. Payments in the Middle East and Africa: An overview and review of implications for corporates operating in the region. J. Paym. Strategy Syst. 2014, 8, 188–205. [Google Scholar]
- UAE Central Bank. Guidance for Licensed Financial Institutions on Transaction Monitoring and Sanctions Screening. 2021. Available online: https://www.centralbank.ae/media/j5shd2lq/amlcft-guidance-for-lfis-on-transaction-monitoring-and-sanctions-screening.pdf (accessed on 2 April 2023).
- AFP—PNC. Cash and Treasury Management—Country Report UAE. 2023. Available online: https://www.afponline.org/docs/default-source/default-document-library/pdf/cp_afp-uae4ae7354e827d6df1bc1fff00003724d4.pdf?sfvrsn=0 (accessed on 2 April 2023).
- Bayanat. UAE FTS Statistics 2012–2019. 2020. Available online: https://opendata.fcsc.gov.ae/@central-bank-united-arab-emirates/uae-fts-fund-transfer-system/r/UAE%20FTS%20Statistics%202012-2019 (accessed on 2 April 2023).
Step | Description |
---|---|
1 | Research question: What are the most important techniques of cognitive computing applied by national and international payment switches in fraud detection? |
2 | Literature review: Identify relevant academic and industry publications, including journals, conference proceedings, and reports. Search for studies and articles that specifically address the application of cognitive computing in fraud detection for payment switches. Analyse and synthesise the findings from these studies, if any. |
3 | Data collection: Collect data on the most common and effective techniques of cognitive computing used in payment switches. Collect data on the effectiveness of these techniques in detecting and preventing financial fraud. |
4 | Data analysis: Analyse the data collected on the most common and effective techniques of cognitive computing used in payment switches. Analyse the data collected on the effectiveness of these techniques in detecting and preventing financial fraud. Identify patterns and trends in the data. |
5 | Results and findings: Summarise the most common and effective techniques of cognitive computing used in payment switches. Evaluate the effectiveness of these techniques in detecting and preventing financial fraud. Provide recommendations for payment switches on optimising their use of cognitive computing in fraud detection. |
6 | Conclusion: Summarise the key findings of the research. Discuss the implications of the findings for payment switches and the wider financial industry. Identify areas for future research. |
3-D Secure | CC-01 |
Advanced Data Analytics | CC-02 |
AI-Powered Fraud Detection | CC-03 |
Anomaly Detection | CC-04 |
Behavioural Biometrics | CC-05 |
Biometric Authentication | CC-06 |
Blockchain Technology | CC-07 |
Data Analytics for trend analysis | CC-08 |
Data Visualisation | CC-09 |
Encryption | CC-10 |
Fraud Detection Rules and Models | CC-11 |
Fraud Prevention | CC-12 |
Geo-Localisation | CC-13 |
ML Algorithms | CC-14 |
ML-based Anomaly Detection | CC-15 |
Network Analysis | CC-16 |
NLP (Natural Language Processing) | CC-17 |
Predictive Analytics | CC-18 |
Real-Time Alerting | CC-19 |
Real-Time Transaction Monitoring | CC-20 |
Risk Assessment | CC-21 |
Risk Management | CC-22 |
Risk-Based Authentication | CC-23 |
Tokenisation | CC-24 |
Two-Factor Authentication | CC-25 |
UPI Authentication | CC-26 |
User Behaviour Analysis | CC-27 |
National Payment Switch | Country | Codes | Cognitive Computing Tools Used |
---|---|---|---|
ACH | USA | CC-21; CC-22; CC-04, CC-16, CC-27 | Risk management and assessment models, Anomaly detection, Network analysis, User behaviour analysis |
Bancontact | Belgium | CC-14; CC-05; CC-17; CC-16; CC-18 | Machine learning algorithms, Behavioural biometrics, Natural Language Processing (NLP), Network analysis, Predictive analytics |
BKM Express | Türkiye | CC-22; CC-11; CC-12; CC-06; CC-25 | Risk Management, Fraud Detection and Prevention, Biometric Authentication, Two-Factor Authentication |
BPAY | Australia | CC-15; CC-17; CC-08; CC-20 | Machine learning-based anomaly detection, Natural language processing (NLP) for customer support, Data analytics for trend analysis, Real-time transaction monitoring |
China UnionPay | China | CC-02; CC-11; CC-06; CC-24 | Advanced data analytics and machine learning, Fraud detection rules and models, Biometric authentication, Tokenisation |
EBA Clearing—STEP2 | Germany | CC-22; CC-11; CC-12; CC-03; CC-14 | Risk Management, Fraud Detection and Prevention, AI/ML |
EFTPOS | Australia | CC-22; CC-11; CC-12; CC-24; CC-25 | Risk Management, Fraud Detection and Prevention, Tokenisation, Two-Factor Authentication |
Faster Payments | UK | CC-22; CC-11; CC-12; CC-20; CC-24 | Risk Management, Fraud Detection and Prevention, Real-Time Monitoring, Tokenisation |
Interac | Canada | CC-22; CC-11; CC-12; CC-06; CC-20 | Risk Management, Fraud Detection and Prevention, Biometric Authentication, Real-Time Monitoring |
NETS | Singapore | CC-13; CC-14; CC-06; CC-01 | Geo-Location, Machine Learning, Biometric Authentication, 3-D Secure |
Nexi | Italy | CC-20; CC-06; CC-14 | Transaction Monitoring, Biometric Authentication, Machine Learning |
NPCI | India | CC-26; CC-03; CC-20; CC-07 | UPI Authentication, AI-Powered Fraud Detection, Real-Time Monitoring and Alerting, Blockchain Technology |
NSPK | Russia | CC-24; CC-01; CC-11; CC-12; CC-06 | Tokenisation, 3D Secure, Fraud Detection and Prevention, Biometric Authentication |
PIX | Brazil | CC-14; CC05; CC-20 | Machine Learning, Behavioural Biometrics, Real-Time Monitoring |
SADAD | KSA | CC-11; CC-12; CC-23; CC-24; CC-14 | Fraud Detection and Prevention, Risk-Based Authentication, Tokenisation, Machine Learning (SARIE system) |
SNCE | Argentina | CC-11; CC-12; CC-10; CC-06; CC-19; CC-20 | Fraud Detection and Prevention, Encryption, Biometric Authentication, Real-time Monitoring and Alerting |
SPEI | Mexico | CC-25; CC-10; CC-20; CC-04 | Two-factor authentication, encryption, transaction monitoring, anomaly detection |
STET | France | CC-11; CC-12; CC-19; CC-20; CC-06; CC-24 | Fraud Detection and Prevention, Real-time Monitoring and Alerting, Biometric Authentication, Tokenisation |
UAEFTS | United Arab Emirates | CC-20; CC-21; CC-09 | Transaction Monitoring, Risk Assessment, Data Visualisation |
Codes | Freq | Codes | Freq |
---|---|---|---|
CC-11 (Fraud Detection Rules and Models) | 10 | CC-19 (Real-Time Alerting) | 2 |
CC-20 (Real-Time Transaction Monitoring) | 10 | CC-21 (Risk Assessment) | 2 |
CC-12 (Fraud Prevention) | 9 | CC-02 (Advanced data analytics) | 1 |
CC-06 (Biometric Authentication) | 8 | CC-05 (Behavioural Biometrics) | 1 |
CC-14 (ML Algorithms) | 6 | CC-07 (Blockchain Technology) | 1 |
CC-22 (Risk Management) | 6 | CC-08 (Data analytics for trend analysis) | 1 |
CC-24 (Tokenisation) | 6 | CC-09 (Data Visualisation) | 1 |
CC-25 (Two-Factor Authentication) | 3 | CC-13 (Geo-Localisation) | 1 |
CC-01 (3-D Secure) | 2 | CC-15 (ML-based Anomaly Detection) | 1 |
CC-03 (AI-Powered Fraud Detection) | 2 | CC-18 (Predictive analytics) | 1 |
CC-04 (Anomaly detection) | 2 | CC-23 (Risk-Based Authentication) | 1 |
CC-10 (Encryption) | 2 | CC-26 (UPI Authentication) | 1 |
CC-16 (Network Analysis) | 2 | CC-27 (User behaviour analysis) | 1 |
CC-17 (Natural Language Processing (NLP)) | 2 |
Codes | Freq | Groups |
---|---|---|
CC-01 (3-D Secure) | 2 | Authentication and Security |
CC-05 (Behavioural Biometrics) | 1 | Authentication and Security |
CC-06 (Biometric Authentication) | 8 | Authentication and Security |
CC-10 (Encryption) | 2 | Authentication and Security |
CC-23 (Risk-Based Authentication) | 1 | Authentication and Security |
CC-25 (Two-Factor Authentication) | 3 | Authentication and Security |
CC-26 (UPI Authentication) | 1 | Authentication and Security |
CC-07 (Blockchain Technology) | 1 | Data Protection and Privacy |
CC-13 (Geo-Localisation) | 1 | Data Protection and Privacy |
CC-24 (Tokenisation) | 6 | Data Protection and Privacy |
CC-03 (AI-Powered Fraud Detection) | 2 | Fraud Detection and Prevention |
CC-04 (Anomaly detection) | 2 | Fraud Detection and Prevention |
CC-11 (Fraud Detection Rules and Models) | 10 | Fraud Detection and Prevention |
CC-12 (Fraud Prevention) | 9 | Fraud Detection and Prevention |
CC-19 (Real-Time Alerting) | 2 | Fraud Detection and Prevention |
CC-20 (Real-Time Transaction Monitoring) | 10 | Fraud Detection and Prevention |
CC-02 (Advanced data analytics) | 1 | Machine Learning and Advanced Analytics |
CC-14 (ML Algorithms) | 6 | Machine Learning and Advanced Analytics |
CC-15 (ML-based Anomaly Detection) | 1 | Machine Learning and Advanced Analytics |
CC-17 (Natural Language Processing (NLP)) | 2 | Machine Learning and Advanced Analytics |
CC-18 (Predictive Analytics) | 1 | Machine Learning and Advanced Analytics |
CC-27 (User behaviour analysis) | 1 | Machine Learning and Advanced Analytics |
CC-08 (Data analytics for trend analysis) | 1 | Risk Management and Assessment |
CC-09 (Data Visualisation) | 1 | Risk Management and Assessment |
CC-16 (Network Analysis) | 2 | Risk Management and Assessment |
CC-21 (Risk Assessment) | 2 | Risk Management and Assessment |
CC-22 (Risk Management) | 6 | Risk Management and Assessment |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Faccia, A. National Payment Switches and the Power of Cognitive Computing against Fintech Fraud. Big Data Cogn. Comput. 2023, 7, 76. https://doi.org/10.3390/bdcc7020076
Faccia A. National Payment Switches and the Power of Cognitive Computing against Fintech Fraud. Big Data and Cognitive Computing. 2023; 7(2):76. https://doi.org/10.3390/bdcc7020076
Chicago/Turabian StyleFaccia, Alessio. 2023. "National Payment Switches and the Power of Cognitive Computing against Fintech Fraud" Big Data and Cognitive Computing 7, no. 2: 76. https://doi.org/10.3390/bdcc7020076
APA StyleFaccia, A. (2023). National Payment Switches and the Power of Cognitive Computing against Fintech Fraud. Big Data and Cognitive Computing, 7(2), 76. https://doi.org/10.3390/bdcc7020076