Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
1.1 BACKGROUND OF STUDY
Fraud is committed in various fields such as insurance (Ormerod et al. 2010; Li et al. 2008; Atwood et al. 2006), credit card (Weston et al. 2008; Dal Pozzolo et al. 2014), telecommunications (Estevez, 2006), and financial communications (Kirkos et al. 2007; Kotsiantis et al. 2006; Holton, 2009). Insurance fraud is one of the most frequent types of fraud to undertake. This type of fraud can take place in many forms with the simple objective of gaining money (Almedia, 2009). One of these domains is car insurance in which fraudsters (policyholders) setting planned traffic accidents up and file fake insurance claims (e.g. inflating costs) to obtain an illicit benefit from their insurance policy (Ayuso et al. 2011). It has been reported that Almost 21% to 36% of auto-insurance claims contain elements of suspected fraud but only less than 3% of them are prosecuted (Nian et al. 2016).
There are two different types of fraud, including opportunistic, and professional fraud that the second type is committed by organized groups. Although the organized fraud is perpetrated fewer than the opportunistic insurance fraud, the majority of revenue outflow (financial losses) is due to these groups (a White paper, 2012). According to Bolton and Han (2002), fraud detection would be difficult due to many reasons. The first one is, involving high volume of data, which are constantly evolving. In reality, for processing these sets of data, the fast, the novel, and efficient algorithms are entailed. Moreover, in terms of cost, it is evident that undertaking a detailed analysis of all records is too much expensive. Here the issues of effectiveness enter; indeed, many legitimate records exist for every person that an effective method should detect fraudulent records correctly.
Traditional systems for fraud detection are only able to find fraudulent customers (opportunistic fraud), whereas more professional fraudsters will be overlooked (a white paper, Roberts, 2010). In other words, opportunistic fraud is a continuous issue for insurers, whereas the more remarkable challenge comes from professional fraud, and such organized groups of perpetrators impose the greatest cost upon insurers. Fraudulent groups are being arranged by fraudsters in order to employ different individuals for doing some works, and using the newest technologies to be at least one step in front of insurers. They know properly that insurers and law enforcements officials utilize what kind of tools, and information (Smallwood and Breading, 2011). Due to aforementioned reasons, it is imperative for insurance companies to consider relevant methods for finding organized fraud groups, and promulgating them in the future.
1.2 STATEMENT OF THE PROBLEM
The detection of insurance fraud has been seriously taken into account in recent years. Although this issue is seen more in practical and functional fields, it is considered in terms of the academic aspects due to its negative effect on insurance pricing and on efficiency of insurance industry. Despite the extensive utilization of data mining algorithms for sorting fraud out, according to (Phua et al. 2005), there are some complexities with regard to nature of data mining techniques that illustrate they might be inefficient in flagging fraudulent activities in future; firstly, a volume of data will fluctuate over time (doubtless that the volume of data will have boomed by near future). Secondly, the forms and styles of fraud are changing regularly. The third criticism is regarding introducing new patterns of suspicious activities during the near future like professional fraud that will have been generated. In the last decade, social networks play a prominent role in researches on detecting and deterring fraud in various areas such as credit card, Social online, financial trade, Internet Auction, health insurance, etc. (Eberle et al. 2010; Bindu and Thilagam, 2016; Yu et al. 2015; Chau et al. 2006; Akoglu et al. 2013; Chiu et al. 2014; Vlasselaer et al. 2015; Flynn, 2016). It is to this regard that the study desired to design and implement a fraud detection system in computerized insurance firm
1.3 AIM AND OBJECTIVES OF THE STUDY
The main aim of the research work is to design and implement a fraud detection system in computerized insurance firm. Other specific objectives of the study are:
1. to design a system that will be able to detect fraud in the insurance firm
2. to determine the types of fraud in an insurance firm
3. to design a system that will be able to compare previous data and the present data
4. to aid in monitoring and controlling of fraudulent activities in an insurance firm
1.4 RESEARCH QUESTIONS
The study came up with research questions so as to ascertain the above stated objectives of the study. The research questions for the study are:
1. Can the new system be able to detect fraud in an insurance firm?
2. What are the types of fraud in an insurance firm?
3. Can the new system be able to compare previous data and the present data?
4. How can the new system aid in monitoring and controlling of fraudulent activities in an insurance firm?
1.5 SIGNIFICANCE OF STUDY
The study on design and implementation of fraud detection system in computerized insurance firm will be of immense benefit to the entire insurance firms in Nigeria and the computer science department in the sense that the study will educate the above subjects on the types of fraud in the insurance firms in Nigeria. The study will educate them how to design a fraud detection system. The study will also serve as a repository of information to other researchers that desire to carry out similar research on the above topic and to contribute to the body of the existing literature.
1.6 SCOPE OF STUDY
The study on design and implementation of fraud detection system will focus on computerized insurance firms in Nigeria and also provides will developed software to automate the new system
1.7 LIMITATION OF STUDY
Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet).Secondly the researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work
1.8 DEFINITION OF TERMS
- Fraud:Is defined as deception deliberately practiced with a view of gaining an unlawful or unfair advantage.
- Economic crime: this is the manifestation of criminal act done either solely or in an organized manner or without associates or group with the purpose earning wealth or being rich through all illegal means.
- Identity theft: n this is an action that proceed enable a fraud to occur.
- False billing fraud: this occurs when a business or an individual receives a bill for a product whereby the representation of the product by the promoter was either false or misleading or whereby the product were either never ordered or received.
- Internet fraud: this refers generally to any type of fraud scheme that uses one or more components of the internet such as chartroom, e-mail, message boards or websites to present fraudulent transactions or to transmit the proceed of fraud into in financial institutions or to other connected with the scheme.
- Password: this is a measure of protection against intruders from gaining access to the documents and secretes information.
- System investigation: this is an in-depth and study of an existing system with regard to its producer in working out an improve system.
- Research methodology: This is an investigation undertaking in order to discover new factors through planning and systematic collection, analysis and interpretation of data.
- Direct personal observation: Involves the means of watching people, events and obtaining a lot of first land information relating to the people concerned.
- Personal interview: this is a means of which information needed are source directly by interviewing people whoa re going to sue the system
- System analysis: Is defined as the study of a system to access the feasibility of proposed information system and to determine how it should function.
- Input design: the input refers to the data that is supplied to the system for it is to process and produce information.
- Output design: the output for the system refers to the information that is gotten from the system.
- Algorithm: Is defined as a description of a procedure which terminates with a result.
- Flow chart: Is a diagrammatic representation of the sequence of steps involved in carrying out process.
- Debugging: Is defined as the process of locating and fixing error (know as bugs) in a computer program or hardware device.
- Coding:Is defined as the representation the algorithms written for a particular task with the aid of high level language that help to translate a simple code to machine code and produce the minimum output needed.
- Test run: this is an exercise that puts a machine, processor system through a series of actions to ascertain its current status or to verify its reliability to ask.
- Documentation:It is an important part of implementation process. It serves as a method of communication among the people responsible for developing.
- Implementation: This enable programmer to work modules in parallel and periodic testing and check on performance of the whole system allowed manageable growth in complexity without introducing untraceable bugs.
- Maintenance:This is to change in hardware software and documentation or procedure to production system in order to correct error or anomalies, most new requirements, or improve efficiency.
- Corrective maintenance: This is identification and removal of errors or failures in the system.
- Preventive maintenance: This hooks or regular inspection or periodic monitoring of the system to detect fraud, as such invokes maintenance in such area so as to forestall bridge in the operation of the system.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» ABSTRACT This project is directly towards business, governmental, or educational institution that needs to implement a quality server. While this topi...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.0 BACKGROUND TO THE STUDY The increasing demand for education in Nigeria especially tertiary education has been an issue in...Continue Reading »
3. DESIGN AND IMPLEMENTATION OF A WEB-BASED TRADING SYSTEM (A CASE STUDY OF FEDERAL UNIVERSITY OF TECHNOLOGY, MINNA).» CHAPTER ONE INTRODUCTION 1.0 INTRODUCTION This chapter unfold the impact of Web based Trading System, it background information, the statement of the ...Continue Reading »
» ABSTRACT This project work is concerned with the use of the internet in banking operation.The internet in its ever evolving state, is becoming a serio...Continue Reading »
» ABSTRACTContact management system deals with the collection and storage of contact information of people, addresses, phone numbers and other contact d...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY Pension is generally a way of catering for the need of the retiree. It is a form of income provided t...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF INTEGRATED SOFTWARE SUIT FOR ACADEMIC PLANNING UNIT (A CASE STUDY OF IMO STATE UNIVERSITY OWERRI)» ABSTRACT The formulation of a good academic planning is only the first implementation putting the academic program plan into action. this requires tha...Continue Reading »
8. DESIGN AND IMPLEMENTATION OF AN ONLINE VEHICLE AND PLATE NUMBER REGISTRATION AND IDENTIFICATION SYSTEM IN NIGERIA» CHAPTER ONE 1.0 INTRODUCTION Vehicle Registration in Nigeria began over 100 years ago and the records have been essentially manual which in turn has n...Continue Reading »
» CHAPTER 1 INTRODUCTION 1.0 Background of Study Oil and Gas is considered to be one of the major sources of energy in the world due to its high energy ...Continue Reading »
10. DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DOCUMENTATION SYSTEM OF COURT PROCEEDINGS (A CASE STUDY OF FEDERAL HIGH COURT ENUGU STATE)» ABSTRACTAs the complexity and degress of crimes widen, system using new technology will have to be utilized to aid lawyers etc to fight this tends.Jus...Continue Reading »