Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
1.1 BACKGROUND OF STUDY
Fraud is committed in various fields such as insurance (Ormerod et al. 2010; Li et al. 2008; Atwood et al. 2006), credit card (Weston et al. 2008; Dal Pozzolo et al. 2014), telecommunications (Estevez, 2006), and financial communications (Kirkos et al. 2007; Kotsiantis et al. 2006; Holton, 2009). Insurance fraud is one of the most frequent types of fraud to undertake. This type of fraud can take place in many forms with the simple objective of gaining money (Almedia, 2009). One of these domains is car insurance in which fraudsters (policyholders) setting planned traffic accidents up and file fake insurance claims (e.g. inflating costs) to obtain an illicit benefit from their insurance policy (Ayuso et al. 2011). It has been reported that Almost 21% to 36% of auto-insurance claims contain elements of suspected fraud but only less than 3% of them are prosecuted (Nian et al. 2016).
There are two different types of fraud, including opportunistic, and professional fraud that the second type is committed by organized groups. Although the organized fraud is perpetrated fewer than the opportunistic insurance fraud, the majority of revenue outflow (financial losses) is due to these groups (a White paper, 2012). According to Bolton and Han (2002), fraud detection would be difficult due to many reasons. The first one is, involving high volume of data, which are constantly evolving. In reality, for processing these sets of data, the fast, the novel, and efficient algorithms are entailed. Moreover, in terms of cost, it is evident that undertaking a detailed analysis of all records is too much expensive. Here the issues of effectiveness enter; indeed, many legitimate records exist for every person that an effective method should detect fraudulent records correctly.
Traditional systems for fraud detection are only able to find fraudulent customers (opportunistic fraud), whereas more professional fraudsters will be overlooked (a white paper, Roberts, 2010). In other words, opportunistic fraud is a continuous issue for insurers, whereas the more remarkable challenge comes from professional fraud, and such organized groups of perpetrators impose the greatest cost upon insurers. Fraudulent groups are being arranged by fraudsters in order to employ different individuals for doing some works, and using the newest technologies to be at least one step in front of insurers. They know properly that insurers and law enforcements officials utilize what kind of tools, and information (Smallwood and Breading, 2011). Due to aforementioned reasons, it is imperative for insurance companies to consider relevant methods for finding organized fraud groups, and promulgating them in the future.
1.2 STATEMENT OF THE PROBLEM
The detection of insurance fraud has been seriously taken into account in recent years. Although this issue is seen more in practical and functional fields, it is considered in terms of the academic aspects due to its negative effect on insurance pricing and on efficiency of insurance industry. Despite the extensive utilization of data mining algorithms for sorting fraud out, according to (Phua et al. 2005), there are some complexities with regard to nature of data mining techniques that illustrate they might be inefficient in flagging fraudulent activities in future; firstly, a volume of data will fluctuate over time (doubtless that the volume of data will have boomed by near future). Secondly, the forms and styles of fraud are changing regularly. The third criticism is regarding introducing new patterns of suspicious activities during the near future like professional fraud that will have been generated. In the last decade, social networks play a prominent role in researches on detecting and deterring fraud in various areas such as credit card, Social online, financial trade, Internet Auction, health insurance, etc. (Eberle et al. 2010; Bindu and Thilagam, 2016; Yu et al. 2015; Chau et al. 2006; Akoglu et al. 2013; Chiu et al. 2014; Vlasselaer et al. 2015; Flynn, 2016). It is to this regard that the study desired to design and implement a fraud detection system in computerized insurance firm
1.3 AIM AND OBJECTIVES OF THE STUDY
The main aim of the research work is to design and implement a fraud detection system in computerized insurance firm. Other specific objectives of the study are:
1. to design a system that will be able to detect fraud in the insurance firm
2. to determine the types of fraud in an insurance firm
3. to design a system that will be able to compare previous data and the present data
4. to aid in monitoring and controlling of fraudulent activities in an insurance firm
1.4 RESEARCH QUESTIONS
The study came up with research questions so as to ascertain the above stated objectives of the study. The research questions for the study are:
1. Can the new system be able to detect fraud in an insurance firm?
2. What are the types of fraud in an insurance firm?
3. Can the new system be able to compare previous data and the present data?
4. How can the new system aid in monitoring and controlling of fraudulent activities in an insurance firm?
1.5 SIGNIFICANCE OF STUDY
The study on design and implementation of fraud detection system in computerized insurance firm will be of immense benefit to the entire insurance firms in Nigeria and the computer science department in the sense that the study will educate the above subjects on the types of fraud in the insurance firms in Nigeria. The study will educate them how to design a fraud detection system. The study will also serve as a repository of information to other researchers that desire to carry out similar research on the above topic and to contribute to the body of the existing literature.
1.6 SCOPE OF STUDY
The study on design and implementation of fraud detection system will focus on computerized insurance firms in Nigeria and also provides will developed software to automate the new system
1.7 LIMITATION OF STUDY
Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet).Secondly the researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work
1.8 DEFINITION OF TERMS
- Fraud:Is defined as deception deliberately practiced with a view of gaining an unlawful or unfair advantage.
- Economic crime: this is the manifestation of criminal act done either solely or in an organized manner or without associates or group with the purpose earning wealth or being rich through all illegal means.
- Identity theft: n this is an action that proceed enable a fraud to occur.
- False billing fraud: this occurs when a business or an individual receives a bill for a product whereby the representation of the product by the promoter was either false or misleading or whereby the product were either never ordered or received.
- Internet fraud: this refers generally to any type of fraud scheme that uses one or more components of the internet such as chartroom, e-mail, message boards or websites to present fraudulent transactions or to transmit the proceed of fraud into in financial institutions or to other connected with the scheme.
- Password: this is a measure of protection against intruders from gaining access to the documents and secretes information.
- System investigation: this is an in-depth and study of an existing system with regard to its producer in working out an improve system.
- Research methodology: This is an investigation undertaking in order to discover new factors through planning and systematic collection, analysis and interpretation of data.
- Direct personal observation: Involves the means of watching people, events and obtaining a lot of first land information relating to the people concerned.
- Personal interview: this is a means of which information needed are source directly by interviewing people whoa re going to sue the system
- System analysis: Is defined as the study of a system to access the feasibility of proposed information system and to determine how it should function.
- Input design: the input refers to the data that is supplied to the system for it is to process and produce information.
- Output design: the output for the system refers to the information that is gotten from the system.
- Algorithm: Is defined as a description of a procedure which terminates with a result.
- Flow chart: Is a diagrammatic representation of the sequence of steps involved in carrying out process.
- Debugging: Is defined as the process of locating and fixing error (know as bugs) in a computer program or hardware device.
- Coding:Is defined as the representation the algorithms written for a particular task with the aid of high level language that help to translate a simple code to machine code and produce the minimum output needed.
- Test run: this is an exercise that puts a machine, processor system through a series of actions to ascertain its current status or to verify its reliability to ask.
- Documentation:It is an important part of implementation process. It serves as a method of communication among the people responsible for developing.
- Implementation: This enable programmer to work modules in parallel and periodic testing and check on performance of the whole system allowed manageable growth in complexity without introducing untraceable bugs.
- Maintenance:This is to change in hardware software and documentation or procedure to production system in order to correct error or anomalies, most new requirements, or improve efficiency.
- Corrective maintenance: This is identification and removal of errors or failures in the system.
- Preventive maintenance: This hooks or regular inspection or periodic monitoring of the system to detect fraud, as such invokes maintenance in such area so as to forestall bridge in the operation of the system.
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE 1.0 INTRODUCTION In 1998 at the opening of the publication, HIGHER EDUCATION: transformed by learning Technology (eds.) Darby and Kjoilers...Continue Reading »
2. THE IMPACT OF COMPUTER VIRUS ATTACKS AND IT’S PREVENTIVE MECHANISMS AMONG PERSONAL COMPUTER (PC) USERS» IntroductionThis research paper targets to find the factors which leads the virus attacks among personal computer users. Today’s society has seen a ...Continue Reading »
» ABSTRACTThis project work is primarily designed to give an insight to computer based restaurant management information system. It is as a result of pr...Continue Reading »
» ABSTRACTThis project study is focused on the design and development of security package for the Access Point Communication Limited.This research work ...Continue Reading »
» Website designers make use of graphics to design their products. They therefore need a steady of fresh images that they can use for their designs. On ...Continue Reading »
» CHAPTER ONE INTRODUCTION Online refers to electronic learning, it is the acquisition of knowledge and skill using electronic technologies such as comp...Continue Reading »
7. DESIGN AND IMPLEMENTATION COMPUTERIZED EMPLOYEE CLOCKING SYSTEM ( A CASE STUDY OF MARLUN CONSTRUCTION COMPANY ENUGU)» CHAPTER ONE INTRODUCTION 1.1. BACKGROUND OF STUDY Employee clocking systems are time system used by organization to accurately record the number of ho...Continue Reading »
» ABSTRACT This project work is concerned with the use of the internet in banking operation.The internet in its ever evolving state, is becoming a serio...Continue Reading »
» AbstractChapter One: IntroductionBackground of the StudyStatement of the Research problemResearch ObjectivesHypothesisSignificance/Scope of the StudyO...Continue Reading »
10. Design And Implementation Of A Computerized Security Information System (A Case Study Of Nigeria Police Force)» Abstract Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well organized ...Continue Reading »