id sid tid token lemma pos work_5xpfvjtqk5bbfefatdohgjss3a 1 1 Real real JJ work_5xpfvjtqk5bbfefatdohgjss3a 1 2 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 1 3 time time NN work_5xpfvjtqk5bbfefatdohgjss3a 1 4 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 1 5 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 1 6 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 1 7 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 1 8 using use VBG work_5xpfvjtqk5bbfefatdohgjss3a 1 9 computational computational JJ work_5xpfvjtqk5bbfefatdohgjss3a 1 10 intelligence intelligence NN work_5xpfvjtqk5bbfefatdohgjss3a 1 11 Real real JJ work_5xpfvjtqk5bbfefatdohgjss3a 1 12 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 1 13 time time NN work_5xpfvjtqk5bbfefatdohgjss3a 1 14 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 1 15 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 1 16 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 1 17 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 1 18 using use VBG work_5xpfvjtqk5bbfefatdohgjss3a 1 19 computational computational JJ work_5xpfvjtqk5bbfefatdohgjss3a 1 20 intelligence intelligence NN work_5xpfvjtqk5bbfefatdohgjss3a 1 21 Jon Jon NNP work_5xpfvjtqk5bbfefatdohgjss3a 1 22 T.S. T.S. NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 1 Quah Quah NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 2 * * NFP work_5xpfvjtqk5bbfefatdohgjss3a 2 3 , , , work_5xpfvjtqk5bbfefatdohgjss3a 2 4 M. M. NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 5 Sriganesh Sriganesh NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 6 School School NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 7 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 2 8 Electrical Electrical NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 9 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 2 10 Electronic Electronic NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 11 Engineering Engineering NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 12 , , , work_5xpfvjtqk5bbfefatdohgjss3a 2 13 Nanyang Nanyang NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 14 Technological Technological NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 15 University University NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 16 , , , work_5xpfvjtqk5bbfefatdohgjss3a 2 17 Nanyang Nanyang NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 18 Avenue Avenue NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 19 , , , work_5xpfvjtqk5bbfefatdohgjss3a 2 20 Singapore Singapore NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 21 639798 639798 CD work_5xpfvjtqk5bbfefatdohgjss3a 2 22 , , , work_5xpfvjtqk5bbfefatdohgjss3a 2 23 Republic Republic NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 24 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 2 25 Singapore Singapore NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 26 Abstract Abstract NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 27 Online Online NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 28 banking banking NN work_5xpfvjtqk5bbfefatdohgjss3a 2 29 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 2 30 e e NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 31 - - NN work_5xpfvjtqk5bbfefatdohgjss3a 2 32 commerce commerce NNP work_5xpfvjtqk5bbfefatdohgjss3a 2 33 have have VBP work_5xpfvjtqk5bbfefatdohgjss3a 2 34 been be VBN work_5xpfvjtqk5bbfefatdohgjss3a 2 35 experiencing experience VBG work_5xpfvjtqk5bbfefatdohgjss3a 2 36 rapid rapid JJ work_5xpfvjtqk5bbfefatdohgjss3a 2 37 growth growth NN work_5xpfvjtqk5bbfefatdohgjss3a 2 38 over over IN work_5xpfvjtqk5bbfefatdohgjss3a 2 39 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 2 40 past past JJ work_5xpfvjtqk5bbfefatdohgjss3a 2 41 few few JJ work_5xpfvjtqk5bbfefatdohgjss3a 2 42 years year NNS work_5xpfvjtqk5bbfefatdohgjss3a 2 43 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 2 44 show show VBP work_5xpfvjtqk5bbfefatdohgjss3a 2 45 tremendous tremendous JJ work_5xpfvjtqk5bbfefatdohgjss3a 2 46 promise promise NN work_5xpfvjtqk5bbfefatdohgjss3a 2 47 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 2 48 growth growth NN work_5xpfvjtqk5bbfefatdohgjss3a 2 49 even even RB work_5xpfvjtqk5bbfefatdohgjss3a 2 50 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 2 51 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 2 52 future future NN work_5xpfvjtqk5bbfefatdohgjss3a 2 53 . . . work_5xpfvjtqk5bbfefatdohgjss3a 3 1 This this DT work_5xpfvjtqk5bbfefatdohgjss3a 3 2 has have VBZ work_5xpfvjtqk5bbfefatdohgjss3a 3 3 made make VBN work_5xpfvjtqk5bbfefatdohgjss3a 3 4 it -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 3 5 easier easy JJR work_5xpfvjtqk5bbfefatdohgjss3a 3 6 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 3 7 fraudsters fraudster NNS work_5xpfvjtqk5bbfefatdohgjss3a 3 8 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 3 9 indulge indulge VB work_5xpfvjtqk5bbfefatdohgjss3a 3 10 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 3 11 new new JJ work_5xpfvjtqk5bbfefatdohgjss3a 3 12 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 3 13 abstruse abstruse NN work_5xpfvjtqk5bbfefatdohgjss3a 3 14 ways way NNS work_5xpfvjtqk5bbfefatdohgjss3a 3 15 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 3 16 committing commit VBG work_5xpfvjtqk5bbfefatdohgjss3a 3 17 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 3 18 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 3 19 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 3 20 over over IN work_5xpfvjtqk5bbfefatdohgjss3a 3 21 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 3 22 Internet internet NN work_5xpfvjtqk5bbfefatdohgjss3a 3 23 . . . work_5xpfvjtqk5bbfefatdohgjss3a 4 1 This this DT work_5xpfvjtqk5bbfefatdohgjss3a 4 2 paper paper NN work_5xpfvjtqk5bbfefatdohgjss3a 4 3 focuses focus VBZ work_5xpfvjtqk5bbfefatdohgjss3a 4 4 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 4 5 real real JJ work_5xpfvjtqk5bbfefatdohgjss3a 4 6 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 4 7 time time NN work_5xpfvjtqk5bbfefatdohgjss3a 4 8 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 4 9 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 4 10 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 4 11 presents present VBZ work_5xpfvjtqk5bbfefatdohgjss3a 4 12 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 4 13 new new JJ work_5xpfvjtqk5bbfefatdohgjss3a 4 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 4 15 innovative innovative JJ work_5xpfvjtqk5bbfefatdohgjss3a 4 16 approach approach NN work_5xpfvjtqk5bbfefatdohgjss3a 4 17 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 4 18 understanding understand VBG work_5xpfvjtqk5bbfefatdohgjss3a 4 19 spending spending NN work_5xpfvjtqk5bbfefatdohgjss3a 4 20 patterns pattern NNS work_5xpfvjtqk5bbfefatdohgjss3a 4 21 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 4 22 decipher decipher VB work_5xpfvjtqk5bbfefatdohgjss3a 4 23 potential potential JJ work_5xpfvjtqk5bbfefatdohgjss3a 4 24 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 4 25 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 4 26 . . . work_5xpfvjtqk5bbfefatdohgjss3a 5 1 It -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 5 2 makes make VBZ work_5xpfvjtqk5bbfefatdohgjss3a 5 3 use use NN work_5xpfvjtqk5bbfefatdohgjss3a 5 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 5 5 self self NN work_5xpfvjtqk5bbfefatdohgjss3a 5 6 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 5 7 organization organization NN work_5xpfvjtqk5bbfefatdohgjss3a 5 8 map map NN work_5xpfvjtqk5bbfefatdohgjss3a 5 9 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 5 10 decipher decipher NN work_5xpfvjtqk5bbfefatdohgjss3a 5 11 , , , work_5xpfvjtqk5bbfefatdohgjss3a 5 12 filter filter VB work_5xpfvjtqk5bbfefatdohgjss3a 5 13 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 5 14 analyze analyze VB work_5xpfvjtqk5bbfefatdohgjss3a 5 15 customer customer NN work_5xpfvjtqk5bbfefatdohgjss3a 5 16 behavior behavior NN work_5xpfvjtqk5bbfefatdohgjss3a 5 17 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 5 18 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 5 19 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 5 20 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 5 21 . . . work_5xpfvjtqk5bbfefatdohgjss3a 6 1 � � NNP work_5xpfvjtqk5bbfefatdohgjss3a 6 2 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 6 3 Elsevier Elsevier NNP work_5xpfvjtqk5bbfefatdohgjss3a 6 4 Ltd. Ltd. NNP work_5xpfvjtqk5bbfefatdohgjss3a 6 5 All all DT work_5xpfvjtqk5bbfefatdohgjss3a 6 6 rights right NNS work_5xpfvjtqk5bbfefatdohgjss3a 6 7 reserved reserve VBN work_5xpfvjtqk5bbfefatdohgjss3a 6 8 . . . work_5xpfvjtqk5bbfefatdohgjss3a 7 1 Keywords keyword NNS work_5xpfvjtqk5bbfefatdohgjss3a 7 2 : : : work_5xpfvjtqk5bbfefatdohgjss3a 7 3 Self self NN work_5xpfvjtqk5bbfefatdohgjss3a 7 4 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 7 5 organizing organize VBG work_5xpfvjtqk5bbfefatdohgjss3a 7 6 map map NN work_5xpfvjtqk5bbfefatdohgjss3a 7 7 ; ; , work_5xpfvjtqk5bbfefatdohgjss3a 7 8 Unsupervised unsupervise VBN work_5xpfvjtqk5bbfefatdohgjss3a 7 9 learning learning NN work_5xpfvjtqk5bbfefatdohgjss3a 7 10 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 7 11 Risk risk NN work_5xpfvjtqk5bbfefatdohgjss3a 7 12 scoring score VBG work_5xpfvjtqk5bbfefatdohgjss3a 7 13 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 7 14 Transaction transaction NN work_5xpfvjtqk5bbfefatdohgjss3a 7 15 1 1 CD work_5xpfvjtqk5bbfefatdohgjss3a 7 16 . . . work_5xpfvjtqk5bbfefatdohgjss3a 8 1 Introduction introduction NN work_5xpfvjtqk5bbfefatdohgjss3a 8 2 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 8 3 fast fast JJ work_5xpfvjtqk5bbfefatdohgjss3a 8 4 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 8 5 wide wide JJ work_5xpfvjtqk5bbfefatdohgjss3a 8 6 reach reach NN work_5xpfvjtqk5bbfefatdohgjss3a 8 7 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 8 8 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 8 9 Internet internet NN work_5xpfvjtqk5bbfefatdohgjss3a 8 10 has have VBZ work_5xpfvjtqk5bbfefatdohgjss3a 8 11 made make VBN work_5xpfvjtqk5bbfefatdohgjss3a 8 12 it -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 8 13 one one CD work_5xpfvjtqk5bbfefatdohgjss3a 8 14 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 8 15 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 8 16 major major JJ work_5xpfvjtqk5bbfefatdohgjss3a 8 17 selling selling NN work_5xpfvjtqk5bbfefatdohgjss3a 8 18 channels channel NNS work_5xpfvjtqk5bbfefatdohgjss3a 8 19 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 8 20 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 8 21 retail retail JJ work_5xpfvjtqk5bbfefatdohgjss3a 8 22 sector sector NN work_5xpfvjtqk5bbfefatdohgjss3a 8 23 . . . work_5xpfvjtqk5bbfefatdohgjss3a 9 1 In in IN work_5xpfvjtqk5bbfefatdohgjss3a 9 2 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 9 3 last last JJ work_5xpfvjtqk5bbfefatdohgjss3a 9 4 few few JJ work_5xpfvjtqk5bbfefatdohgjss3a 9 5 years year NNS work_5xpfvjtqk5bbfefatdohgjss3a 9 6 , , , work_5xpfvjtqk5bbfefatdohgjss3a 9 7 there there EX work_5xpfvjtqk5bbfefatdohgjss3a 9 8 has have VBZ work_5xpfvjtqk5bbfefatdohgjss3a 9 9 been be VBN work_5xpfvjtqk5bbfefatdohgjss3a 9 10 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 9 11 rapid rapid JJ work_5xpfvjtqk5bbfefatdohgjss3a 9 12 increase increase NN work_5xpfvjtqk5bbfefatdohgjss3a 9 13 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 9 14 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 9 15 number number NN work_5xpfvjtqk5bbfefatdohgjss3a 9 16 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 9 17 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 9 18 issuers issuer NNS work_5xpfvjtqk5bbfefatdohgjss3a 9 19 , , , work_5xpfvjtqk5bbfefatdohgjss3a 9 20 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 9 21 users user NNS work_5xpfvjtqk5bbfefatdohgjss3a 9 22 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 9 23 online online JJ work_5xpfvjtqk5bbfefatdohgjss3a 9 24 merchants merchant NNS work_5xpfvjtqk5bbfefatdohgjss3a 9 25 , , , work_5xpfvjtqk5bbfefatdohgjss3a 9 26 giving give VBG work_5xpfvjtqk5bbfefatdohgjss3a 9 27 very very RB work_5xpfvjtqk5bbfefatdohgjss3a 9 28 little little JJ work_5xpfvjtqk5bbfefatdohgjss3a 9 29 time time NN work_5xpfvjtqk5bbfefatdohgjss3a 9 30 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 9 31 technology technology NN work_5xpfvjtqk5bbfefatdohgjss3a 9 32 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 9 33 catch catch VB work_5xpfvjtqk5bbfefatdohgjss3a 9 34 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 9 35 up up RP work_5xpfvjtqk5bbfefatdohgjss3a 9 36 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 9 37 prevent prevent VB work_5xpfvjtqk5bbfefatdohgjss3a 9 38 online online JJ work_5xpfvjtqk5bbfefatdohgjss3a 9 39 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 9 40 completely completely RB work_5xpfvjtqk5bbfefatdohgjss3a 9 41 . . . work_5xpfvjtqk5bbfefatdohgjss3a 10 1 Statistics statistic NNS work_5xpfvjtqk5bbfefatdohgjss3a 10 2 shows show VBZ work_5xpfvjtqk5bbfefatdohgjss3a 10 3 that that IN work_5xpfvjtqk5bbfefatdohgjss3a 10 4 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 10 5 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 10 6 line line NN work_5xpfvjtqk5bbfefatdohgjss3a 10 7 banking banking NN work_5xpfvjtqk5bbfefatdohgjss3a 10 8 has have VBZ work_5xpfvjtqk5bbfefatdohgjss3a 10 9 been be VBN work_5xpfvjtqk5bbfefatdohgjss3a 10 10 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 10 11 fastest fast JJS work_5xpfvjtqk5bbfefatdohgjss3a 10 12 growing grow VBG work_5xpfvjtqk5bbfefatdohgjss3a 10 13 Internet internet NN work_5xpfvjtqk5bbfefatdohgjss3a 10 14 activity activity NN work_5xpfvjtqk5bbfefatdohgjss3a 10 15 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 10 16 nearly nearly RB work_5xpfvjtqk5bbfefatdohgjss3a 10 17 44 44 CD work_5xpfvjtqk5bbfefatdohgjss3a 10 18 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 10 19 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 10 20 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 10 21 population population NN work_5xpfvjtqk5bbfefatdohgjss3a 10 22 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 10 23 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 10 24 US US NNP work_5xpfvjtqk5bbfefatdohgjss3a 10 25 actively actively RB work_5xpfvjtqk5bbfefatdohgjss3a 10 26 participating participate VBG work_5xpfvjtqk5bbfefatdohgjss3a 10 27 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 10 28 it -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 10 29 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 10 30 Fighting fight VBG work_5xpfvjtqk5bbfefatdohgjss3a 10 31 Fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 10 32 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 10 33 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 10 34 Internet internet NN work_5xpfvjtqk5bbfefatdohgjss3a 10 35 , , , work_5xpfvjtqk5bbfefatdohgjss3a 10 36 1999 1999 CD work_5xpfvjtqk5bbfefatdohgjss3a 10 37 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 10 38 . . . work_5xpfvjtqk5bbfefatdohgjss3a 11 1 As as IN work_5xpfvjtqk5bbfefatdohgjss3a 11 2 overall overall JJ work_5xpfvjtqk5bbfefatdohgjss3a 11 3 e e NN work_5xpfvjtqk5bbfefatdohgjss3a 11 4 - - NN work_5xpfvjtqk5bbfefatdohgjss3a 11 5 com- com- NN work_5xpfvjtqk5bbfefatdohgjss3a 11 6 merce merce NN work_5xpfvjtqk5bbfefatdohgjss3a 11 7 volumes volume NNS work_5xpfvjtqk5bbfefatdohgjss3a 11 8 continued continue VBD work_5xpfvjtqk5bbfefatdohgjss3a 11 9 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 11 10 grow grow VB work_5xpfvjtqk5bbfefatdohgjss3a 11 11 over over IN work_5xpfvjtqk5bbfefatdohgjss3a 11 12 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 11 13 past past JJ work_5xpfvjtqk5bbfefatdohgjss3a 11 14 few few JJ work_5xpfvjtqk5bbfefatdohgjss3a 11 15 years year NNS work_5xpfvjtqk5bbfefatdohgjss3a 11 16 , , , work_5xpfvjtqk5bbfefatdohgjss3a 11 17 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 11 18 figure figure NN work_5xpfvjtqk5bbfefatdohgjss3a 11 19 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 11 20 losses loss NNS work_5xpfvjtqk5bbfefatdohgjss3a 11 21 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 11 22 Internet internet NN work_5xpfvjtqk5bbfefatdohgjss3a 11 23 merchants merchant NNS work_5xpfvjtqk5bbfefatdohgjss3a 11 24 was be VBD work_5xpfvjtqk5bbfefatdohgjss3a 11 25 projected project VBN work_5xpfvjtqk5bbfefatdohgjss3a 11 26 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 11 27 be be VB work_5xpfvjtqk5bbfefatdohgjss3a 11 28 between between IN work_5xpfvjtqk5bbfefatdohgjss3a 11 29 $ $ $ work_5xpfvjtqk5bbfefatdohgjss3a 11 30 5 5 CD work_5xpfvjtqk5bbfefatdohgjss3a 11 31 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 11 32 $ $ $ work_5xpfvjtqk5bbfefatdohgjss3a 11 33 15 15 CD work_5xpfvjtqk5bbfefatdohgjss3a 11 34 billion billion CD work_5xpfvjtqk5bbfefatdohgjss3a 11 35 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 11 36 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 11 37 year year NN work_5xpfvjtqk5bbfefatdohgjss3a 11 38 2005 2005 CD work_5xpfvjtqk5bbfefatdohgjss3a 11 39 . . . work_5xpfvjtqk5bbfefatdohgjss3a 12 1 Recent recent JJ work_5xpfvjtqk5bbfefatdohgjss3a 12 2 sta- sta- NN work_5xpfvjtqk5bbfefatdohgjss3a 12 3 tistics tistic NNS work_5xpfvjtqk5bbfefatdohgjss3a 12 4 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 12 5 Garner Garner NNP work_5xpfvjtqk5bbfefatdohgjss3a 12 6 group group NN work_5xpfvjtqk5bbfefatdohgjss3a 12 7 place place NN work_5xpfvjtqk5bbfefatdohgjss3a 12 8 online online JJ work_5xpfvjtqk5bbfefatdohgjss3a 12 9 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 12 10 rate rate NN work_5xpfvjtqk5bbfefatdohgjss3a 12 11 between between IN work_5xpfvjtqk5bbfefatdohgjss3a 12 12 0.8 0.8 CD work_5xpfvjtqk5bbfefatdohgjss3a 12 13 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 12 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 12 15 0.9 0.9 CD work_5xpfvjtqk5bbfefatdohgjss3a 12 16 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 12 17 , , , work_5xpfvjtqk5bbfefatdohgjss3a 12 18 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 12 19 auction auction NN work_5xpfvjtqk5bbfefatdohgjss3a 12 20 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 12 21 accounting account VBG work_5xpfvjtqk5bbfefatdohgjss3a 12 22 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 12 23 nearly nearly RB work_5xpfvjtqk5bbfefatdohgjss3a 12 24 half half NN work_5xpfvjtqk5bbfefatdohgjss3a 12 25 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 12 26 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 12 27 total total JJ work_5xpfvjtqk5bbfefatdohgjss3a 12 28 incidents incident NNS work_5xpfvjtqk5bbfefatdohgjss3a 12 29 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 12 30 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 12 31 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 12 32 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 12 33 Internet internet NN work_5xpfvjtqk5bbfefatdohgjss3a 12 34 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 12 35 Online Online NNP work_5xpfvjtqk5bbfefatdohgjss3a 12 36 Banking Banking NNP work_5xpfvjtqk5bbfefatdohgjss3a 12 37 , , , work_5xpfvjtqk5bbfefatdohgjss3a 12 38 2005 2005 CD work_5xpfvjtqk5bbfefatdohgjss3a 12 39 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 12 40 . . . work_5xpfvjtqk5bbfefatdohgjss3a 13 1 Considering consider VBG work_5xpfvjtqk5bbfefatdohgjss3a 13 2 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 13 3 current current JJ work_5xpfvjtqk5bbfefatdohgjss3a 13 4 trends trend NNS work_5xpfvjtqk5bbfefatdohgjss3a 13 5 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 13 6 e e NN work_5xpfvjtqk5bbfefatdohgjss3a 13 7 - - NN work_5xpfvjtqk5bbfefatdohgjss3a 13 8 com- com- NN work_5xpfvjtqk5bbfefatdohgjss3a 13 9 merce merce NN work_5xpfvjtqk5bbfefatdohgjss3a 13 10 volumes volume NNS work_5xpfvjtqk5bbfefatdohgjss3a 13 11 , , , work_5xpfvjtqk5bbfefatdohgjss3a 13 12 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 13 13 projected project VBN work_5xpfvjtqk5bbfefatdohgjss3a 13 14 loss loss NN work_5xpfvjtqk5bbfefatdohgjss3a 13 15 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 13 16 $ $ $ work_5xpfvjtqk5bbfefatdohgjss3a 13 17 8.2 8.2 CD work_5xpfvjtqk5bbfefatdohgjss3a 13 18 billion billion CD work_5xpfvjtqk5bbfefatdohgjss3a 13 19 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 13 20 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 13 21 year year NN work_5xpfvjtqk5bbfefatdohgjss3a 13 22 2006 2006 CD work_5xpfvjtqk5bbfefatdohgjss3a 13 23 , , , work_5xpfvjtqk5bbfefatdohgjss3a 13 24 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 13 25 $ $ $ work_5xpfvjtqk5bbfefatdohgjss3a 13 26 3.0 3.0 CD work_5xpfvjtqk5bbfefatdohgjss3a 13 27 billion billion CD work_5xpfvjtqk5bbfefatdohgjss3a 13 28 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 13 29 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 13 30 US US NNP work_5xpfvjtqk5bbfefatdohgjss3a 13 31 alone alone RB work_5xpfvjtqk5bbfefatdohgjss3a 13 32 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 13 33 Statistics statistic NNS work_5xpfvjtqk5bbfefatdohgjss3a 13 34 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 13 35 Gen- Gen- NNP work_5xpfvjtqk5bbfefatdohgjss3a 13 36 eral eral NNP work_5xpfvjtqk5bbfefatdohgjss3a 13 37 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 13 38 Online Online NNP work_5xpfvjtqk5bbfefatdohgjss3a 13 39 Fraud Fraud NNP work_5xpfvjtqk5bbfefatdohgjss3a 13 40 , , , work_5xpfvjtqk5bbfefatdohgjss3a 13 41 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 13 42 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 13 43 . . . work_5xpfvjtqk5bbfefatdohgjss3a 14 1 1.1 1.1 CD work_5xpfvjtqk5bbfefatdohgjss3a 14 2 . . . work_5xpfvjtqk5bbfefatdohgjss3a 15 1 How how WRB work_5xpfvjtqk5bbfefatdohgjss3a 15 2 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 15 3 where where WRB work_5xpfvjtqk5bbfefatdohgjss3a 15 4 does do VBZ work_5xpfvjtqk5bbfefatdohgjss3a 15 5 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 15 6 begin begin VB work_5xpfvjtqk5bbfefatdohgjss3a 15 7 In in IN work_5xpfvjtqk5bbfefatdohgjss3a 15 8 order order NN work_5xpfvjtqk5bbfefatdohgjss3a 15 9 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 15 10 understand understand VB work_5xpfvjtqk5bbfefatdohgjss3a 15 11 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 15 12 severity severity NN work_5xpfvjtqk5bbfefatdohgjss3a 15 13 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 15 14 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 15 15 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 15 16 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 15 17 , , , work_5xpfvjtqk5bbfefatdohgjss3a 15 18 let let VB work_5xpfvjtqk5bbfefatdohgjss3a 15 19 us -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 15 20 briefly briefly RB work_5xpfvjtqk5bbfefatdohgjss3a 15 21 look look VB work_5xpfvjtqk5bbfefatdohgjss3a 15 22 into into IN work_5xpfvjtqk5bbfefatdohgjss3a 15 23 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 15 24 mechanisms mechanism NNS work_5xpfvjtqk5bbfefatdohgjss3a 15 25 adopted adopt VBN work_5xpfvjtqk5bbfefatdohgjss3a 15 26 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 15 27 fraud- fraud- NNP work_5xpfvjtqk5bbfefatdohgjss3a 15 28 sters ster NNS work_5xpfvjtqk5bbfefatdohgjss3a 15 29 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 15 30 commit commit VB work_5xpfvjtqk5bbfefatdohgjss3a 15 31 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 15 32 . . . work_5xpfvjtqk5bbfefatdohgjss3a 16 1 Credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 16 2 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 16 3 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 16 4 involves involve VBZ work_5xpfvjtqk5bbfefatdohgjss3a 16 5 illegal illegal JJ work_5xpfvjtqk5bbfefatdohgjss3a 16 6 use use NN work_5xpfvjtqk5bbfefatdohgjss3a 16 7 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 16 8 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 16 9 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 16 10 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 16 11 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 16 12 without without IN work_5xpfvjtqk5bbfefatdohgjss3a 16 13 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 16 14 knowledge knowledge NN work_5xpfvjtqk5bbfefatdohgjss3a 16 15 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 16 16 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 16 17 owner owner NN work_5xpfvjtqk5bbfefatdohgjss3a 16 18 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 16 19 hence hence RB work_5xpfvjtqk5bbfefatdohgjss3a 16 20 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 16 21 an an DT work_5xpfvjtqk5bbfefatdohgjss3a 16 22 act act NN work_5xpfvjtqk5bbfefatdohgjss3a 16 23 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 16 24 criminal criminal JJ work_5xpfvjtqk5bbfefatdohgjss3a 16 25 deception deception NN work_5xpfvjtqk5bbfefatdohgjss3a 16 26 . . . work_5xpfvjtqk5bbfefatdohgjss3a 17 1 Fraudsters fraudster NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 2 usually usually RB work_5xpfvjtqk5bbfefatdohgjss3a 17 3 get get VBP work_5xpfvjtqk5bbfefatdohgjss3a 17 4 hold hold NN work_5xpfvjtqk5bbfefatdohgjss3a 17 5 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 17 6 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 17 7 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 17 8 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 17 9 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 17 10 variety variety NN work_5xpfvjtqk5bbfefatdohgjss3a 17 11 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 17 12 ways way NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 13 : : : work_5xpfvjtqk5bbfefatdohgjss3a 17 14 Intercepting intercept VBG work_5xpfvjtqk5bbfefatdohgjss3a 17 15 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 17 16 mails mail NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 17 containing contain VBG work_5xpfvjtqk5bbfefatdohgjss3a 17 18 newly newly RB work_5xpfvjtqk5bbfefatdohgjss3a 17 19 issued issue VBN work_5xpfvjtqk5bbfefatdohgjss3a 17 20 cards card NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 21 , , , work_5xpfvjtqk5bbfefatdohgjss3a 17 22 copying copying NN work_5xpfvjtqk5bbfefatdohgjss3a 17 23 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 17 24 replicating replicating NN work_5xpfvjtqk5bbfefatdohgjss3a 17 25 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 17 26 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 17 27 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 17 28 through through IN work_5xpfvjtqk5bbfefatdohgjss3a 17 29 skimmers skimmer NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 30 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 17 31 gathering gather VBG work_5xpfvjtqk5bbfefatdohgjss3a 17 32 sensitive sensitive JJ work_5xpfvjtqk5bbfefatdohgjss3a 17 33 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 17 34 through through IN work_5xpfvjtqk5bbfefatdohgjss3a 17 35 phish- phish- NNP work_5xpfvjtqk5bbfefatdohgjss3a 17 36 ing ing NNP work_5xpfvjtqk5bbfefatdohgjss3a 17 37 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 17 38 cloned cloned JJ work_5xpfvjtqk5bbfefatdohgjss3a 17 39 websites website NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 40 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 17 41 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 17 42 from from IN work_5xpfvjtqk5bbfefatdohgjss3a 17 43 unethical unethical JJ work_5xpfvjtqk5bbfefatdohgjss3a 17 44 employees employee NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 45 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 17 46 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 17 47 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 17 48 companies company NNS work_5xpfvjtqk5bbfefatdohgjss3a 17 49 . . . work_5xpfvjtqk5bbfefatdohgjss3a 18 1 Phishing phishe VBG work_5xpfvjtqk5bbfefatdohgjss3a 18 2 involves involve VBZ work_5xpfvjtqk5bbfefatdohgjss3a 18 3 acquiring acquire VBG work_5xpfvjtqk5bbfefatdohgjss3a 18 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 18 5 sensitive sensitive JJ work_5xpfvjtqk5bbfefatdohgjss3a 18 6 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 18 7 like like IN work_5xpfvjtqk5bbfefatdohgjss3a 18 8 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 18 9 numbers number NNS work_5xpfvjtqk5bbfefatdohgjss3a 18 10 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 18 11 passwords password NNS work_5xpfvjtqk5bbfefatdohgjss3a 18 12 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 18 13 masquerading masquerade VBG work_5xpfvjtqk5bbfefatdohgjss3a 18 14 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 18 15 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 18 16 trust- trust- NN work_5xpfvjtqk5bbfefatdohgjss3a 18 17 worthy worthy JJ work_5xpfvjtqk5bbfefatdohgjss3a 18 18 person person NN work_5xpfvjtqk5bbfefatdohgjss3a 18 19 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 18 20 business business NN work_5xpfvjtqk5bbfefatdohgjss3a 18 21 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 18 22 an an DT work_5xpfvjtqk5bbfefatdohgjss3a 18 23 electronic electronic JJ work_5xpfvjtqk5bbfefatdohgjss3a 18 24 communication communication NN work_5xpfvjtqk5bbfefatdohgjss3a 18 25 such such JJ work_5xpfvjtqk5bbfefatdohgjss3a 18 26 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 18 27 e e NN work_5xpfvjtqk5bbfefatdohgjss3a 18 28 - - NN work_5xpfvjtqk5bbfefatdohgjss3a 18 29 mail mail NN work_5xpfvjtqk5bbfefatdohgjss3a 18 30 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 18 31 Schneck Schneck NNP work_5xpfvjtqk5bbfefatdohgjss3a 18 32 , , , work_5xpfvjtqk5bbfefatdohgjss3a 18 33 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 18 34 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 18 35 . . . work_5xpfvjtqk5bbfefatdohgjss3a 19 1 Fraudsters fraudster NNS work_5xpfvjtqk5bbfefatdohgjss3a 19 2 may may MD work_5xpfvjtqk5bbfefatdohgjss3a 19 3 also also RB work_5xpfvjtqk5bbfefatdohgjss3a 19 4 resort resort VB work_5xpfvjtqk5bbfefatdohgjss3a 19 5 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 19 6 generation generation NN work_5xpfvjtqk5bbfefatdohgjss3a 19 7 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 19 8 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 19 9 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 19 10 numbers number NNS work_5xpfvjtqk5bbfefatdohgjss3a 19 11 using use VBG work_5xpfvjtqk5bbfefatdohgjss3a 19 12 BIN BIN NNP work_5xpfvjtqk5bbfefatdohgjss3a 19 13 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 19 14 Bank Bank NNP work_5xpfvjtqk5bbfefatdohgjss3a 19 15 Iden- Iden- NNP work_5xpfvjtqk5bbfefatdohgjss3a 19 16 tification tification NN work_5xpfvjtqk5bbfefatdohgjss3a 19 17 Numbers number NNS work_5xpfvjtqk5bbfefatdohgjss3a 19 18 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 19 19 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 19 20 banks bank NNS work_5xpfvjtqk5bbfefatdohgjss3a 19 21 . . . work_5xpfvjtqk5bbfefatdohgjss3a 20 1 A a DT work_5xpfvjtqk5bbfefatdohgjss3a 20 2 recent recent JJ work_5xpfvjtqk5bbfefatdohgjss3a 20 3 scheme scheme NN work_5xpfvjtqk5bbfefatdohgjss3a 20 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 20 5 Triangula- Triangula- NNP work_5xpfvjtqk5bbfefatdohgjss3a 20 6 tion tion NN work_5xpfvjtqk5bbfefatdohgjss3a 20 7 takes take VBZ work_5xpfvjtqk5bbfefatdohgjss3a 20 8 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 20 9 fighters fighter NNS work_5xpfvjtqk5bbfefatdohgjss3a 20 10 many many JJ work_5xpfvjtqk5bbfefatdohgjss3a 20 11 days day NNS work_5xpfvjtqk5bbfefatdohgjss3a 20 12 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 20 13 realize realize VB work_5xpfvjtqk5bbfefatdohgjss3a 20 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 20 15 investigate investigate VB work_5xpfvjtqk5bbfefatdohgjss3a 20 16 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 20 17 Bhatla Bhatla NNP work_5xpfvjtqk5bbfefatdohgjss3a 20 18 , , , work_5xpfvjtqk5bbfefatdohgjss3a 20 19 Prabhu Prabhu NNP work_5xpfvjtqk5bbfefatdohgjss3a 20 20 , , , work_5xpfvjtqk5bbfefatdohgjss3a 20 21 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 20 22 Dua Dua NNP work_5xpfvjtqk5bbfefatdohgjss3a 20 23 , , , work_5xpfvjtqk5bbfefatdohgjss3a 20 24 2003 2003 CD work_5xpfvjtqk5bbfefatdohgjss3a 20 25 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 20 26 . . . work_5xpfvjtqk5bbfefatdohgjss3a 21 1 In in IN work_5xpfvjtqk5bbfefatdohgjss3a 21 2 this this DT work_5xpfvjtqk5bbfefatdohgjss3a 21 3 method method NN work_5xpfvjtqk5bbfefatdohgjss3a 21 4 , , , work_5xpfvjtqk5bbfefatdohgjss3a 21 5 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 21 6 fraudster fraudster NN work_5xpfvjtqk5bbfefatdohgjss3a 21 7 operates operate VBZ work_5xpfvjtqk5bbfefatdohgjss3a 21 8 through through IN work_5xpfvjtqk5bbfefatdohgjss3a 21 9 an an DT work_5xpfvjtqk5bbfefatdohgjss3a 21 10 authentic authentic JJ work_5xpfvjtqk5bbfefatdohgjss3a 21 11 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 21 12 looking look VBG work_5xpfvjtqk5bbfefatdohgjss3a 21 13 website website NN work_5xpfvjtqk5bbfefatdohgjss3a 21 14 , , , work_5xpfvjtqk5bbfefatdohgjss3a 21 15 where where WRB work_5xpfvjtqk5bbfefatdohgjss3a 21 16 he -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 21 17 advertises advertise VBZ work_5xpfvjtqk5bbfefatdohgjss3a 21 18 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 21 19 sells sell VBZ work_5xpfvjtqk5bbfefatdohgjss3a 21 20 goods good NNS work_5xpfvjtqk5bbfefatdohgjss3a 21 21 at at IN work_5xpfvjtqk5bbfefatdohgjss3a 21 22 highly highly RB work_5xpfvjtqk5bbfefatdohgjss3a 21 23 discounted discount VBN work_5xpfvjtqk5bbfefatdohgjss3a 21 24 prices price NNS work_5xpfvjtqk5bbfefatdohgjss3a 21 25 . . . work_5xpfvjtqk5bbfefatdohgjss3a 22 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 22 2 unaware unaware JJ work_5xpfvjtqk5bbfefatdohgjss3a 22 3 buyer buyer NN work_5xpfvjtqk5bbfefatdohgjss3a 22 4 submits submit VBZ work_5xpfvjtqk5bbfefatdohgjss3a 22 5 his -PRON- PRP$ work_5xpfvjtqk5bbfefatdohgjss3a 22 6 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 22 7 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 22 8 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 22 9 buys buy VBZ work_5xpfvjtqk5bbfefatdohgjss3a 22 10 goods good NNS work_5xpfvjtqk5bbfefatdohgjss3a 22 11 . . . work_5xpfvjtqk5bbfefatdohgjss3a 23 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 23 2 fraudster fraudster NN work_5xpfvjtqk5bbfefatdohgjss3a 23 3 then then RB work_5xpfvjtqk5bbfefatdohgjss3a 23 4 places place VBZ work_5xpfvjtqk5bbfefatdohgjss3a 23 5 an an DT work_5xpfvjtqk5bbfefatdohgjss3a 23 6 order order NN work_5xpfvjtqk5bbfefatdohgjss3a 23 7 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 23 8 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 23 9 genuine genuine JJ work_5xpfvjtqk5bbfefatdohgjss3a 23 10 merchant merchant NN work_5xpfvjtqk5bbfefatdohgjss3a 23 11 using use VBG work_5xpfvjtqk5bbfefatdohgjss3a 23 12 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 23 13 stolen steal VBN work_5xpfvjtqk5bbfefatdohgjss3a 23 14 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 23 15 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 23 16 . . . work_5xpfvjtqk5bbfefatdohgjss3a 24 1 He -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 24 2 then then RB work_5xpfvjtqk5bbfefatdohgjss3a 24 3 uses use VBZ work_5xpfvjtqk5bbfefatdohgjss3a 24 4 0957 0957 CD work_5xpfvjtqk5bbfefatdohgjss3a 24 5 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 24 6 4174/$ 4174/$ CD work_5xpfvjtqk5bbfefatdohgjss3a 24 7 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 24 8 see see VB work_5xpfvjtqk5bbfefatdohgjss3a 24 9 front front JJ work_5xpfvjtqk5bbfefatdohgjss3a 24 10 matter matter NN work_5xpfvjtqk5bbfefatdohgjss3a 24 11 � � NNP work_5xpfvjtqk5bbfefatdohgjss3a 24 12 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 24 13 Elsevier Elsevier NNP work_5xpfvjtqk5bbfefatdohgjss3a 24 14 Ltd. Ltd. NNP work_5xpfvjtqk5bbfefatdohgjss3a 24 15 All all DT work_5xpfvjtqk5bbfefatdohgjss3a 24 16 rights right NNS work_5xpfvjtqk5bbfefatdohgjss3a 24 17 reserved reserve VBN work_5xpfvjtqk5bbfefatdohgjss3a 24 18 . . . work_5xpfvjtqk5bbfefatdohgjss3a 25 1 doi:10.1016 doi:10.1016 NNP work_5xpfvjtqk5bbfefatdohgjss3a 25 2 / / SYM work_5xpfvjtqk5bbfefatdohgjss3a 25 3 j.eswa.2007.08.093 j.eswa.2007.08.093 NNP work_5xpfvjtqk5bbfefatdohgjss3a 25 4 * * NFP work_5xpfvjtqk5bbfefatdohgjss3a 25 5 Corresponding Corresponding NNP work_5xpfvjtqk5bbfefatdohgjss3a 25 6 author author NN work_5xpfvjtqk5bbfefatdohgjss3a 25 7 . . . work_5xpfvjtqk5bbfefatdohgjss3a 26 1 Tel tel NN work_5xpfvjtqk5bbfefatdohgjss3a 26 2 . . . work_5xpfvjtqk5bbfefatdohgjss3a 27 1 : : : work_5xpfvjtqk5bbfefatdohgjss3a 27 2 +65 +65 NNP work_5xpfvjtqk5bbfefatdohgjss3a 27 3 67905871 67905871 CD work_5xpfvjtqk5bbfefatdohgjss3a 27 4 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 27 5 fax fax NN work_5xpfvjtqk5bbfefatdohgjss3a 27 6 : : : work_5xpfvjtqk5bbfefatdohgjss3a 27 7 +65 +65 NNP work_5xpfvjtqk5bbfefatdohgjss3a 27 8 62701556 62701556 CD work_5xpfvjtqk5bbfefatdohgjss3a 27 9 . . . work_5xpfvjtqk5bbfefatdohgjss3a 28 1 E e NN work_5xpfvjtqk5bbfefatdohgjss3a 28 2 - - NN work_5xpfvjtqk5bbfefatdohgjss3a 28 3 mail mail NN work_5xpfvjtqk5bbfefatdohgjss3a 28 4 address address NN work_5xpfvjtqk5bbfefatdohgjss3a 28 5 : : : work_5xpfvjtqk5bbfefatdohgjss3a 28 6 itsquah@ntu.edu.sg itsquah@ntu.edu.sg NNP work_5xpfvjtqk5bbfefatdohgjss3a 28 7 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 28 8 J.T.S. J.T.S. NNP work_5xpfvjtqk5bbfefatdohgjss3a 29 1 Quah Quah NNP work_5xpfvjtqk5bbfefatdohgjss3a 29 2 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 29 3 . . . work_5xpfvjtqk5bbfefatdohgjss3a 30 1 www.elsevier.com/locate/eswa www.elsevier.com/locate/eswa ADD work_5xpfvjtqk5bbfefatdohgjss3a 30 2 Available available JJ work_5xpfvjtqk5bbfefatdohgjss3a 30 3 online online RB work_5xpfvjtqk5bbfefatdohgjss3a 30 4 at at IN work_5xpfvjtqk5bbfefatdohgjss3a 30 5 www.sciencedirect.com www.sciencedirect.com ADD work_5xpfvjtqk5bbfefatdohgjss3a 30 6 Expert Expert NNP work_5xpfvjtqk5bbfefatdohgjss3a 30 7 Systems system NNS work_5xpfvjtqk5bbfefatdohgjss3a 30 8 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 30 9 Applications Applications NNPS work_5xpfvjtqk5bbfefatdohgjss3a 30 10 35 35 CD work_5xpfvjtqk5bbfefatdohgjss3a 30 11 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 30 12 2008 2008 CD work_5xpfvjtqk5bbfefatdohgjss3a 30 13 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 30 14 1721–1732 1721–1732 CD work_5xpfvjtqk5bbfefatdohgjss3a 30 15 Expert expert NN work_5xpfvjtqk5bbfefatdohgjss3a 30 16 Systems Systems NNPS work_5xpfvjtqk5bbfefatdohgjss3a 30 17 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 30 18 Applications Applications NNPS work_5xpfvjtqk5bbfefatdohgjss3a 30 19 mailto:itsquah@ntu.edu.sg mailto:itsquah@ntu.edu.sg NNP work_5xpfvjtqk5bbfefatdohgjss3a 30 20 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 30 21 stolen steal VBN work_5xpfvjtqk5bbfefatdohgjss3a 30 22 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 30 23 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 30 24 purchase purchase VB work_5xpfvjtqk5bbfefatdohgjss3a 30 25 other other JJ work_5xpfvjtqk5bbfefatdohgjss3a 30 26 goods good NNS work_5xpfvjtqk5bbfefatdohgjss3a 30 27 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 30 28 route route NN work_5xpfvjtqk5bbfefatdohgjss3a 30 29 funds fund NNS work_5xpfvjtqk5bbfefatdohgjss3a 30 30 into into IN work_5xpfvjtqk5bbfefatdohgjss3a 30 31 intractable intractable JJ work_5xpfvjtqk5bbfefatdohgjss3a 30 32 accounts account NNS work_5xpfvjtqk5bbfefatdohgjss3a 30 33 . . . work_5xpfvjtqk5bbfefatdohgjss3a 31 1 Its -PRON- PRP$ work_5xpfvjtqk5bbfefatdohgjss3a 31 2 only only RB work_5xpfvjtqk5bbfefatdohgjss3a 31 3 after after IN work_5xpfvjtqk5bbfefatdohgjss3a 31 4 several several JJ work_5xpfvjtqk5bbfefatdohgjss3a 31 5 days day NNS work_5xpfvjtqk5bbfefatdohgjss3a 31 6 that that WDT work_5xpfvjtqk5bbfefatdohgjss3a 31 7 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 31 8 mer- mer- JJ work_5xpfvjtqk5bbfefatdohgjss3a 31 9 chant chant NN work_5xpfvjtqk5bbfefatdohgjss3a 31 10 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 31 11 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 31 12 owners owner NNS work_5xpfvjtqk5bbfefatdohgjss3a 31 13 realize realize VBP work_5xpfvjtqk5bbfefatdohgjss3a 31 14 about about IN work_5xpfvjtqk5bbfefatdohgjss3a 31 15 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 31 16 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 31 17 . . . work_5xpfvjtqk5bbfefatdohgjss3a 32 1 This this DT work_5xpfvjtqk5bbfefatdohgjss3a 32 2 type type NN work_5xpfvjtqk5bbfefatdohgjss3a 32 3 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 32 4 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 32 5 causes cause VBZ work_5xpfvjtqk5bbfefatdohgjss3a 32 6 initial initial JJ work_5xpfvjtqk5bbfefatdohgjss3a 32 7 confusion confusion NN work_5xpfvjtqk5bbfefatdohgjss3a 32 8 that that WDT work_5xpfvjtqk5bbfefatdohgjss3a 32 9 provides provide VBZ work_5xpfvjtqk5bbfefatdohgjss3a 32 10 camouflage camouflage NN work_5xpfvjtqk5bbfefatdohgjss3a 32 11 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 32 12 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 32 13 fraudster fraudster NN work_5xpfvjtqk5bbfefatdohgjss3a 32 14 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 32 15 carry carry VB work_5xpfvjtqk5bbfefatdohgjss3a 32 16 out out RP work_5xpfvjtqk5bbfefatdohgjss3a 32 17 their -PRON- PRP$ work_5xpfvjtqk5bbfefatdohgjss3a 32 18 operations operation NNS work_5xpfvjtqk5bbfefatdohgjss3a 32 19 . . . work_5xpfvjtqk5bbfefatdohgjss3a 33 1 1.2 1.2 CD work_5xpfvjtqk5bbfefatdohgjss3a 33 2 . . . work_5xpfvjtqk5bbfefatdohgjss3a 34 1 Impact impact NN work_5xpfvjtqk5bbfefatdohgjss3a 34 2 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 34 3 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 34 4 It -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 34 5 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 34 6 interesting interesting JJ work_5xpfvjtqk5bbfefatdohgjss3a 34 7 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 34 8 note note VB work_5xpfvjtqk5bbfefatdohgjss3a 34 9 that that DT work_5xpfvjtqk5bbfefatdohgjss3a 34 10 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 34 11 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 34 12 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 34 13 affects affect VBZ work_5xpfvjtqk5bbfefatdohgjss3a 34 14 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 34 15 owners owner NNS work_5xpfvjtqk5bbfefatdohgjss3a 34 16 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 34 17 least least JJS work_5xpfvjtqk5bbfefatdohgjss3a 34 18 because because IN work_5xpfvjtqk5bbfefatdohgjss3a 34 19 their -PRON- PRP$ work_5xpfvjtqk5bbfefatdohgjss3a 34 20 liability liability NN work_5xpfvjtqk5bbfefatdohgjss3a 34 21 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 34 22 limited limit VBN work_5xpfvjtqk5bbfefatdohgjss3a 34 23 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 34 24 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 34 25 trans- trans- JJ work_5xpfvjtqk5bbfefatdohgjss3a 34 26 actions action NNS work_5xpfvjtqk5bbfefatdohgjss3a 34 27 made make VBN work_5xpfvjtqk5bbfefatdohgjss3a 34 28 . . . work_5xpfvjtqk5bbfefatdohgjss3a 35 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 35 2 existing exist VBG work_5xpfvjtqk5bbfefatdohgjss3a 35 3 legislations legislation NNS work_5xpfvjtqk5bbfefatdohgjss3a 35 4 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 35 5 cardholder cardholder NN work_5xpfvjtqk5bbfefatdohgjss3a 35 6 pro- pro- NN work_5xpfvjtqk5bbfefatdohgjss3a 35 7 tection tection NN work_5xpfvjtqk5bbfefatdohgjss3a 35 8 policies policy NNS work_5xpfvjtqk5bbfefatdohgjss3a 35 9 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 35 10 well well RB work_5xpfvjtqk5bbfefatdohgjss3a 35 11 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 35 12 insurance insurance NN work_5xpfvjtqk5bbfefatdohgjss3a 35 13 schemes scheme NNS work_5xpfvjtqk5bbfefatdohgjss3a 35 14 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 35 15 most most JJS work_5xpfvjtqk5bbfefatdohgjss3a 35 16 countries country NNS work_5xpfvjtqk5bbfefatdohgjss3a 35 17 protect protect VBP work_5xpfvjtqk5bbfefatdohgjss3a 35 18 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 35 19 interests interest NNS work_5xpfvjtqk5bbfefatdohgjss3a 35 20 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 35 21 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 35 22 cardholders cardholder NNS work_5xpfvjtqk5bbfefatdohgjss3a 35 23 . . . work_5xpfvjtqk5bbfefatdohgjss3a 36 1 However however RB work_5xpfvjtqk5bbfefatdohgjss3a 36 2 , , , work_5xpfvjtqk5bbfefatdohgjss3a 36 3 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 36 4 most most RBS work_5xpfvjtqk5bbfefatdohgjss3a 36 5 affected affected JJ work_5xpfvjtqk5bbfefatdohgjss3a 36 6 are be VBP work_5xpfvjtqk5bbfefatdohgjss3a 36 7 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 36 8 merchants merchant NNS work_5xpfvjtqk5bbfefatdohgjss3a 36 9 , , , work_5xpfvjtqk5bbfefatdohgjss3a 36 10 who who WP work_5xpfvjtqk5bbfefatdohgjss3a 36 11 , , , work_5xpfvjtqk5bbfefatdohgjss3a 36 12 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 36 13 most most JJS work_5xpfvjtqk5bbfefatdohgjss3a 36 14 situations situation NNS work_5xpfvjtqk5bbfefatdohgjss3a 36 15 , , , work_5xpfvjtqk5bbfefatdohgjss3a 36 16 do do VBP work_5xpfvjtqk5bbfefatdohgjss3a 36 17 not not RB work_5xpfvjtqk5bbfefatdohgjss3a 36 18 have have VB work_5xpfvjtqk5bbfefatdohgjss3a 36 19 any any DT work_5xpfvjtqk5bbfefatdohgjss3a 36 20 evidence evidence NN work_5xpfvjtqk5bbfefatdohgjss3a 36 21 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 36 22 eg eg NNP work_5xpfvjtqk5bbfefatdohgjss3a 36 23 . . . work_5xpfvjtqk5bbfefatdohgjss3a 37 1 Digital digital JJ work_5xpfvjtqk5bbfefatdohgjss3a 37 2 signature signature NN work_5xpfvjtqk5bbfefatdohgjss3a 37 3 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 37 4 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 37 5 dispute dispute VB work_5xpfvjtqk5bbfefatdohgjss3a 37 6 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 37 7 cardholders cardholder NNS work_5xpfvjtqk5bbfefatdohgjss3a 37 8 ’ ’ POS work_5xpfvjtqk5bbfefatdohgjss3a 37 9 claim claim NN work_5xpfvjtqk5bbfefatdohgjss3a 37 10 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 37 11 misused misused JJ work_5xpfvjtqk5bbfefatdohgjss3a 37 12 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 37 13 information information NN work_5xpfvjtqk5bbfefatdohgjss3a 37 14 . . . work_5xpfvjtqk5bbfefatdohgjss3a 38 1 Mer- Mer- NNP work_5xpfvjtqk5bbfefatdohgjss3a 38 2 chants chant NNS work_5xpfvjtqk5bbfefatdohgjss3a 38 3 end end VBP work_5xpfvjtqk5bbfefatdohgjss3a 38 4 up up RP work_5xpfvjtqk5bbfefatdohgjss3a 38 5 bearing bear VBG work_5xpfvjtqk5bbfefatdohgjss3a 38 6 all all PDT work_5xpfvjtqk5bbfefatdohgjss3a 38 7 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 38 8 loses lose NNS work_5xpfvjtqk5bbfefatdohgjss3a 38 9 due due JJ work_5xpfvjtqk5bbfefatdohgjss3a 38 10 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 38 11 chargeback chargeback NN work_5xpfvjtqk5bbfefatdohgjss3a 38 12 , , , work_5xpfvjtqk5bbfefatdohgjss3a 38 13 ship- ship- XX work_5xpfvjtqk5bbfefatdohgjss3a 38 14 ping ping NN work_5xpfvjtqk5bbfefatdohgjss3a 38 15 cost cost NN work_5xpfvjtqk5bbfefatdohgjss3a 38 16 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 38 17 goods good NNS work_5xpfvjtqk5bbfefatdohgjss3a 38 18 , , , work_5xpfvjtqk5bbfefatdohgjss3a 38 19 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 38 20 issuer issuer NN work_5xpfvjtqk5bbfefatdohgjss3a 38 21 fees fee NNS work_5xpfvjtqk5bbfefatdohgjss3a 38 22 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 38 23 charges charge NNS work_5xpfvjtqk5bbfefatdohgjss3a 38 24 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 38 25 well well RB work_5xpfvjtqk5bbfefatdohgjss3a 38 26 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 38 27 their -PRON- PRP$ work_5xpfvjtqk5bbfefatdohgjss3a 38 28 own own JJ work_5xpfvjtqk5bbfefatdohgjss3a 38 29 administrative administrative JJ work_5xpfvjtqk5bbfefatdohgjss3a 38 30 costs cost NNS work_5xpfvjtqk5bbfefatdohgjss3a 38 31 . . . work_5xpfvjtqk5bbfefatdohgjss3a 39 1 Excessive excessive JJ work_5xpfvjtqk5bbfefatdohgjss3a 39 2 fraudulent fraudulent JJ work_5xpfvjtqk5bbfefatdohgjss3a 39 3 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 39 4 involving involve VBG work_5xpfvjtqk5bbfefatdohgjss3a 39 5 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 39 6 same same JJ work_5xpfvjtqk5bbfefatdohgjss3a 39 7 merchant merchant NN work_5xpfvjtqk5bbfefatdohgjss3a 39 8 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 39 9 drive drive VB work_5xpfvjtqk5bbfefatdohgjss3a 39 10 away away RB work_5xpfvjtqk5bbfefatdohgjss3a 39 11 customers customer NNS work_5xpfvjtqk5bbfefatdohgjss3a 39 12 , , , work_5xpfvjtqk5bbfefatdohgjss3a 39 13 cause cause VB work_5xpfvjtqk5bbfefatdohgjss3a 39 14 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 39 15 issuer issuer NN work_5xpfvjtqk5bbfefatdohgjss3a 39 16 banks bank NNS work_5xpfvjtqk5bbfefatdohgjss3a 39 17 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 39 18 withdraw withdraw VB work_5xpfvjtqk5bbfefatdohgjss3a 39 19 service service NN work_5xpfvjtqk5bbfefatdohgjss3a 39 20 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 39 21 also also RB work_5xpfvjtqk5bbfefatdohgjss3a 39 22 result result VBP work_5xpfvjtqk5bbfefatdohgjss3a 39 23 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 39 24 loss loss NN work_5xpfvjtqk5bbfefatdohgjss3a 39 25 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 39 26 reputation reputation NN work_5xpfvjtqk5bbfefatdohgjss3a 39 27 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 39 28 goodwill goodwill NN work_5xpfvjtqk5bbfefatdohgjss3a 39 29 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 39 30 Yu Yu NNP work_5xpfvjtqk5bbfefatdohgjss3a 39 31 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 39 32 Singh Singh NNP work_5xpfvjtqk5bbfefatdohgjss3a 39 33 , , , work_5xpfvjtqk5bbfefatdohgjss3a 39 34 2002 2002 CD work_5xpfvjtqk5bbfefatdohgjss3a 39 35 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 39 36 . . . work_5xpfvjtqk5bbfefatdohgjss3a 40 1 Card card NN work_5xpfvjtqk5bbfefatdohgjss3a 40 2 issuer issuer NN work_5xpfvjtqk5bbfefatdohgjss3a 40 3 banks bank NNS work_5xpfvjtqk5bbfefatdohgjss3a 40 4 have have VBP work_5xpfvjtqk5bbfefatdohgjss3a 40 5 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 40 6 bear bear VB work_5xpfvjtqk5bbfefatdohgjss3a 40 7 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 40 8 administrative administrative JJ work_5xpfvjtqk5bbfefatdohgjss3a 40 9 cost cost NN work_5xpfvjtqk5bbfefatdohgjss3a 40 10 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 40 11 investi- investi- JJ work_5xpfvjtqk5bbfefatdohgjss3a 40 12 gations gation NNS work_5xpfvjtqk5bbfefatdohgjss3a 40 13 into into IN work_5xpfvjtqk5bbfefatdohgjss3a 40 14 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 40 15 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 40 16 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 40 17 well well RB work_5xpfvjtqk5bbfefatdohgjss3a 40 18 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 40 19 infrastructure infrastructure NN work_5xpfvjtqk5bbfefatdohgjss3a 40 20 costs cost NNS work_5xpfvjtqk5bbfefatdohgjss3a 40 21 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 40 22 set- set- DT work_5xpfvjtqk5bbfefatdohgjss3a 40 23 ting te VBG work_5xpfvjtqk5bbfefatdohgjss3a 40 24 up up RP work_5xpfvjtqk5bbfefatdohgjss3a 40 25 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 40 26 required required JJ work_5xpfvjtqk5bbfefatdohgjss3a 40 27 software software NN work_5xpfvjtqk5bbfefatdohgjss3a 40 28 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 40 29 hardware hardware NN work_5xpfvjtqk5bbfefatdohgjss3a 40 30 facilities facility NNS work_5xpfvjtqk5bbfefatdohgjss3a 40 31 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 40 32 combat combat VB work_5xpfvjtqk5bbfefatdohgjss3a 40 33 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 40 34 . . . work_5xpfvjtqk5bbfefatdohgjss3a 41 1 They -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 41 2 also also RB work_5xpfvjtqk5bbfefatdohgjss3a 41 3 incur incur VBP work_5xpfvjtqk5bbfefatdohgjss3a 41 4 indirect indirect JJ work_5xpfvjtqk5bbfefatdohgjss3a 41 5 costs cost NNS work_5xpfvjtqk5bbfefatdohgjss3a 41 6 through through IN work_5xpfvjtqk5bbfefatdohgjss3a 41 7 trans- trans- JJ work_5xpfvjtqk5bbfefatdohgjss3a 41 8 action action NN work_5xpfvjtqk5bbfefatdohgjss3a 41 9 delays delay NNS work_5xpfvjtqk5bbfefatdohgjss3a 41 10 . . . work_5xpfvjtqk5bbfefatdohgjss3a 42 1 Studies study NNS work_5xpfvjtqk5bbfefatdohgjss3a 42 2 show show VBP work_5xpfvjtqk5bbfefatdohgjss3a 42 3 that that IN work_5xpfvjtqk5bbfefatdohgjss3a 42 4 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 42 5 average average JJ work_5xpfvjtqk5bbfefatdohgjss3a 42 6 time time NN work_5xpfvjtqk5bbfefatdohgjss3a 42 7 lag lag NN work_5xpfvjtqk5bbfefatdohgjss3a 42 8 between between IN work_5xpfvjtqk5bbfefatdohgjss3a 42 9 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 42 10 fraudulent fraudulent JJ work_5xpfvjtqk5bbfefatdohgjss3a 42 11 transaction transaction NN work_5xpfvjtqk5bbfefatdohgjss3a 42 12 date date NN work_5xpfvjtqk5bbfefatdohgjss3a 42 13 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 42 14 chargeback chargeback NN work_5xpfvjtqk5bbfefatdohgjss3a 42 15 notification notification NN work_5xpfvjtqk5bbfefatdohgjss3a 42 16 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 42 17 be be VB work_5xpfvjtqk5bbfefatdohgjss3a 42 18 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 42 19 high high JJ work_5xpfvjtqk5bbfefatdohgjss3a 42 20 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 42 21 72 72 CD work_5xpfvjtqk5bbfefatdohgjss3a 42 22 days day NNS work_5xpfvjtqk5bbfefatdohgjss3a 42 23 , , , work_5xpfvjtqk5bbfefatdohgjss3a 42 24 thereby thereby RB work_5xpfvjtqk5bbfefatdohgjss3a 42 25 giving give VBG work_5xpfvjtqk5bbfefatdohgjss3a 42 26 fraudsters fraudster NNS work_5xpfvjtqk5bbfefatdohgjss3a 42 27 sufficient sufficient JJ work_5xpfvjtqk5bbfefatdohgjss3a 42 28 time time NN work_5xpfvjtqk5bbfefatdohgjss3a 42 29 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 42 30 cause cause VB work_5xpfvjtqk5bbfefatdohgjss3a 42 31 severe severe JJ work_5xpfvjtqk5bbfefatdohgjss3a 42 32 damage damage NN work_5xpfvjtqk5bbfefatdohgjss3a 42 33 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 42 34 Bhatla Bhatla NNP work_5xpfvjtqk5bbfefatdohgjss3a 42 35 et et NNP work_5xpfvjtqk5bbfefatdohgjss3a 42 36 al al NNP work_5xpfvjtqk5bbfefatdohgjss3a 42 37 . . NNP work_5xpfvjtqk5bbfefatdohgjss3a 42 38 , , , work_5xpfvjtqk5bbfefatdohgjss3a 42 39 2003 2003 CD work_5xpfvjtqk5bbfefatdohgjss3a 42 40 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 42 41 . . . work_5xpfvjtqk5bbfefatdohgjss3a 43 1 1.3 1.3 CD work_5xpfvjtqk5bbfefatdohgjss3a 43 2 . . . work_5xpfvjtqk5bbfefatdohgjss3a 44 1 Fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 44 2 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 44 3 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 44 4 prevention prevention NN work_5xpfvjtqk5bbfefatdohgjss3a 44 5 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 44 6 negative negative JJ work_5xpfvjtqk5bbfefatdohgjss3a 44 7 impacts impact NNS work_5xpfvjtqk5bbfefatdohgjss3a 44 8 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 44 9 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 44 10 make make VBP work_5xpfvjtqk5bbfefatdohgjss3a 44 11 it -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 44 12 very very RB work_5xpfvjtqk5bbfefatdohgjss3a 44 13 clear clear JJ work_5xpfvjtqk5bbfefatdohgjss3a 44 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 44 15 necessary necessary JJ work_5xpfvjtqk5bbfefatdohgjss3a 44 16 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 44 17 put put VB work_5xpfvjtqk5bbfefatdohgjss3a 44 18 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 44 19 place place NN work_5xpfvjtqk5bbfefatdohgjss3a 44 20 an an DT work_5xpfvjtqk5bbfefatdohgjss3a 44 21 effective effective JJ work_5xpfvjtqk5bbfefatdohgjss3a 44 22 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 44 23 economical economical JJ work_5xpfvjtqk5bbfefatdohgjss3a 44 24 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 44 25 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 44 26 system system NN work_5xpfvjtqk5bbfefatdohgjss3a 44 27 . . . work_5xpfvjtqk5bbfefatdohgjss3a 45 1 Recent recent JJ work_5xpfvjtqk5bbfefatdohgjss3a 45 2 technological technological JJ work_5xpfvjtqk5bbfefatdohgjss3a 45 3 advancements advancement NNS work_5xpfvjtqk5bbfefatdohgjss3a 45 4 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 45 5 combat combat VB work_5xpfvjtqk5bbfefatdohgjss3a 45 6 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 45 7 have have VBP work_5xpfvjtqk5bbfefatdohgjss3a 45 8 contributed contribute VBN work_5xpfvjtqk5bbfefatdohgjss3a 45 9 number number NN work_5xpfvjtqk5bbfefatdohgjss3a 45 10 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 45 11 solutions solution NNS work_5xpfvjtqk5bbfefatdohgjss3a 45 12 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 45 13 this this DT work_5xpfvjtqk5bbfefatdohgjss3a 45 14 area area NN work_5xpfvjtqk5bbfefatdohgjss3a 45 15 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 45 16 Bhatla Bhatla NNP work_5xpfvjtqk5bbfefatdohgjss3a 45 17 et et NNP work_5xpfvjtqk5bbfefatdohgjss3a 45 18 al al NNP work_5xpfvjtqk5bbfefatdohgjss3a 45 19 . . NNP work_5xpfvjtqk5bbfefatdohgjss3a 45 20 , , , work_5xpfvjtqk5bbfefatdohgjss3a 45 21 2003 2003 CD work_5xpfvjtqk5bbfefatdohgjss3a 45 22 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 45 23 All all DT work_5xpfvjtqk5bbfefatdohgjss3a 45 24 points point NNS work_5xpfvjtqk5bbfefatdohgjss3a 45 25 protection protection NN work_5xpfvjtqk5bbfefatdohgjss3a 45 26 , , , work_5xpfvjtqk5bbfefatdohgjss3a 45 27 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 45 28 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 45 29 . . . work_5xpfvjtqk5bbfefatdohgjss3a 46 1 Fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 46 2 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 46 3 techniques technique NNS work_5xpfvjtqk5bbfefatdohgjss3a 46 4 involving involve VBG work_5xpfvjtqk5bbfefatdohgjss3a 46 5 sophisticated sophisticated JJ work_5xpfvjtqk5bbfefatdohgjss3a 46 6 screen- screen- NN work_5xpfvjtqk5bbfefatdohgjss3a 46 7 ing ing NN work_5xpfvjtqk5bbfefatdohgjss3a 46 8 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 46 9 transactions transaction NNS work_5xpfvjtqk5bbfefatdohgjss3a 46 10 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 46 11 tracking track VBG work_5xpfvjtqk5bbfefatdohgjss3a 46 12 customer customer NN work_5xpfvjtqk5bbfefatdohgjss3a 46 13 behaviour behaviour NN work_5xpfvjtqk5bbfefatdohgjss3a 46 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 46 15 spending spending NN work_5xpfvjtqk5bbfefatdohgjss3a 46 16 patterns pattern NNS work_5xpfvjtqk5bbfefatdohgjss3a 46 17 are be VBP work_5xpfvjtqk5bbfefatdohgjss3a 46 18 now now RB work_5xpfvjtqk5bbfefatdohgjss3a 46 19 being be VBG work_5xpfvjtqk5bbfefatdohgjss3a 46 20 developed develop VBN work_5xpfvjtqk5bbfefatdohgjss3a 46 21 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 46 22 employed employ VBN work_5xpfvjtqk5bbfefatdohgjss3a 46 23 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 46 24 both both DT work_5xpfvjtqk5bbfefatdohgjss3a 46 25 merchants merchant NNS work_5xpfvjtqk5bbfefatdohgjss3a 46 26 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 46 27 well well RB work_5xpfvjtqk5bbfefatdohgjss3a 46 28 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 46 29 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 46 30 issuer issuer NN work_5xpfvjtqk5bbfefatdohgjss3a 46 31 banks bank NNS work_5xpfvjtqk5bbfefatdohgjss3a 46 32 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 46 33 Tan Tan NNP work_5xpfvjtqk5bbfefatdohgjss3a 46 34 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 46 35 Thoen Thoen NNP work_5xpfvjtqk5bbfefatdohgjss3a 46 36 , , , work_5xpfvjtqk5bbfefatdohgjss3a 46 37 2000 2000 CD work_5xpfvjtqk5bbfefatdohgjss3a 46 38 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 46 39 . . . work_5xpfvjtqk5bbfefatdohgjss3a 47 1 Some some DT work_5xpfvjtqk5bbfefatdohgjss3a 47 2 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 47 3 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 47 4 recently recently RB work_5xpfvjtqk5bbfefatdohgjss3a 47 5 employed employ VBN work_5xpfvjtqk5bbfefatdohgjss3a 47 6 techniques technique NNS work_5xpfvjtqk5bbfefatdohgjss3a 47 7 include include VBP work_5xpfvjtqk5bbfefatdohgjss3a 47 8 transaction transaction NN work_5xpfvjtqk5bbfefatdohgjss3a 47 9 screening screen VBG work_5xpfvjtqk5bbfefatdohgjss3a 47 10 through through IN work_5xpfvjtqk5bbfefatdohgjss3a 47 11 Address Address NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 12 Verification Verification NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 13 Systems Systems NNPS work_5xpfvjtqk5bbfefatdohgjss3a 47 14 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 47 15 AVS AVS NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 16 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 47 17 , , , work_5xpfvjtqk5bbfefatdohgjss3a 47 18 Card card NN work_5xpfvjtqk5bbfefatdohgjss3a 47 19 Verification Verification NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 20 Method method NN work_5xpfvjtqk5bbfefatdohgjss3a 47 21 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 47 22 CVM CVM NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 23 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 47 24 , , , work_5xpfvjtqk5bbfefatdohgjss3a 47 25 Per- Per- NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 26 sonal sonal JJ work_5xpfvjtqk5bbfefatdohgjss3a 47 27 Identification identification NN work_5xpfvjtqk5bbfefatdohgjss3a 47 28 Number Number NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 29 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 47 30 PIN PIN NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 31 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 47 32 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 47 33 Biometrics Biometrics NNP work_5xpfvjtqk5bbfefatdohgjss3a 47 34 . . . work_5xpfvjtqk5bbfefatdohgjss3a 48 1 AVS AVS NNP work_5xpfvjtqk5bbfefatdohgjss3a 48 2 involves involve VBZ work_5xpfvjtqk5bbfefatdohgjss3a 48 3 verification verification NN work_5xpfvjtqk5bbfefatdohgjss3a 48 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 48 5 address address NN work_5xpfvjtqk5bbfefatdohgjss3a 48 6 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 48 7 zip zip NN work_5xpfvjtqk5bbfefatdohgjss3a 48 8 code code NN work_5xpfvjtqk5bbfefatdohgjss3a 48 9 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 48 10 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 48 11 cus- cus- NNP work_5xpfvjtqk5bbfefatdohgjss3a 48 12 tomer tomer NN work_5xpfvjtqk5bbfefatdohgjss3a 48 13 while while IN work_5xpfvjtqk5bbfefatdohgjss3a 48 14 CVM CVM NNP work_5xpfvjtqk5bbfefatdohgjss3a 48 15 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 48 16 PIN PIN NNP work_5xpfvjtqk5bbfefatdohgjss3a 48 17 involve involve VBP work_5xpfvjtqk5bbfefatdohgjss3a 48 18 checking check VBG work_5xpfvjtqk5bbfefatdohgjss3a 48 19 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 48 20 numeric numeric JJ work_5xpfvjtqk5bbfefatdohgjss3a 48 21 code code NN work_5xpfvjtqk5bbfefatdohgjss3a 48 22 that that WDT work_5xpfvjtqk5bbfefatdohgjss3a 48 23 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 48 24 keyed key VBN work_5xpfvjtqk5bbfefatdohgjss3a 48 25 in in RP work_5xpfvjtqk5bbfefatdohgjss3a 48 26 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 48 27 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 48 28 customer customer NN work_5xpfvjtqk5bbfefatdohgjss3a 48 29 . . . work_5xpfvjtqk5bbfefatdohgjss3a 49 1 Biometrics biometric NNS work_5xpfvjtqk5bbfefatdohgjss3a 49 2 might may MD work_5xpfvjtqk5bbfefatdohgjss3a 49 3 involve involve VB work_5xpfvjtqk5bbfefatdohgjss3a 49 4 signature signature NN work_5xpfvjtqk5bbfefatdohgjss3a 49 5 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 49 6 fingerprint fingerprint NN work_5xpfvjtqk5bbfefatdohgjss3a 49 7 verification verification NN work_5xpfvjtqk5bbfefatdohgjss3a 49 8 . . . work_5xpfvjtqk5bbfefatdohgjss3a 50 1 Rule rule NN work_5xpfvjtqk5bbfefatdohgjss3a 50 2 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 50 3 based base VBN work_5xpfvjtqk5bbfefatdohgjss3a 50 4 methods method NNS work_5xpfvjtqk5bbfefatdohgjss3a 50 5 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 50 6 maintaining maintaining NN work_5xpfvjtqk5bbfefatdohgjss3a 50 7 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 50 8 positive positive JJ work_5xpfvjtqk5bbfefatdohgjss3a 50 9 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 50 10 negative negative JJ work_5xpfvjtqk5bbfefatdohgjss3a 50 11 lists list NNS work_5xpfvjtqk5bbfefatdohgjss3a 50 12 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 50 13 customers customer NNS work_5xpfvjtqk5bbfefatdohgjss3a 50 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 50 15 geographical geographical JJ work_5xpfvjtqk5bbfefatdohgjss3a 50 16 regions region NNS work_5xpfvjtqk5bbfefatdohgjss3a 50 17 are be VBP work_5xpfvjtqk5bbfefatdohgjss3a 50 18 also also RB work_5xpfvjtqk5bbfefatdohgjss3a 50 19 used use VBN work_5xpfvjtqk5bbfefatdohgjss3a 50 20 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 50 21 prac- prac- NNP work_5xpfvjtqk5bbfefatdohgjss3a 50 22 tice tice NNP work_5xpfvjtqk5bbfefatdohgjss3a 50 23 . . . work_5xpfvjtqk5bbfefatdohgjss3a 51 1 Data datum NNS work_5xpfvjtqk5bbfefatdohgjss3a 51 2 mining mining NN work_5xpfvjtqk5bbfefatdohgjss3a 51 3 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 51 4 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 51 5 scoring scoring NN work_5xpfvjtqk5bbfefatdohgjss3a 51 6 methods method NNS work_5xpfvjtqk5bbfefatdohgjss3a 51 7 focus focus VBP work_5xpfvjtqk5bbfefatdohgjss3a 51 8 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 51 9 sta- sta- JJ work_5xpfvjtqk5bbfefatdohgjss3a 51 10 tistical tistical JJ work_5xpfvjtqk5bbfefatdohgjss3a 51 11 analyses analysis NNS work_5xpfvjtqk5bbfefatdohgjss3a 51 12 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 51 13 deciphering deciphering NN work_5xpfvjtqk5bbfefatdohgjss3a 51 14 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 51 15 customer customer NN work_5xpfvjtqk5bbfefatdohgjss3a 51 16 behaviour behaviour NN work_5xpfvjtqk5bbfefatdohgjss3a 51 17 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 51 18 spending spend VBG work_5xpfvjtqk5bbfefatdohgjss3a 51 19 patterns pattern NNS work_5xpfvjtqk5bbfefatdohgjss3a 51 20 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 51 21 detect detect VB work_5xpfvjtqk5bbfefatdohgjss3a 51 22 frauds fraud NNS work_5xpfvjtqk5bbfefatdohgjss3a 51 23 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 51 24 Huang Huang NNP work_5xpfvjtqk5bbfefatdohgjss3a 51 25 , , , work_5xpfvjtqk5bbfefatdohgjss3a 51 26 Chen Chen NNP work_5xpfvjtqk5bbfefatdohgjss3a 51 27 , , , work_5xpfvjtqk5bbfefatdohgjss3a 51 28 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 51 29 Wang Wang NNP work_5xpfvjtqk5bbfefatdohgjss3a 51 30 , , , work_5xpfvjtqk5bbfefatdohgjss3a 51 31 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 51 32 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 51 33 . . . work_5xpfvjtqk5bbfefatdohgjss3a 52 1 Neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 52 2 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 52 3 are be VBP work_5xpfvjtqk5bbfefatdohgjss3a 52 4 capable capable JJ work_5xpfvjtqk5bbfefatdohgjss3a 52 5 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 52 6 deriving derive VBG work_5xpfvjtqk5bbfefatdohgjss3a 52 7 pat- pat- NN work_5xpfvjtqk5bbfefatdohgjss3a 52 8 terns tern NNS work_5xpfvjtqk5bbfefatdohgjss3a 52 9 out out IN work_5xpfvjtqk5bbfefatdohgjss3a 52 10 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 52 11 databases database NNS work_5xpfvjtqk5bbfefatdohgjss3a 52 12 containing contain VBG work_5xpfvjtqk5bbfefatdohgjss3a 52 13 historical historical JJ work_5xpfvjtqk5bbfefatdohgjss3a 52 14 transactions transaction NNS work_5xpfvjtqk5bbfefatdohgjss3a 52 15 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 52 16 customers customer NNS work_5xpfvjtqk5bbfefatdohgjss3a 52 17 . . . work_5xpfvjtqk5bbfefatdohgjss3a 53 1 These these DT work_5xpfvjtqk5bbfefatdohgjss3a 53 2 neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 53 3 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 53 4 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 53 5 be be VB work_5xpfvjtqk5bbfefatdohgjss3a 53 6 ‘ ' `` work_5xpfvjtqk5bbfefatdohgjss3a 53 7 trained train VBN work_5xpfvjtqk5bbfefatdohgjss3a 53 8 ’ ' '' work_5xpfvjtqk5bbfefatdohgjss3a 53 9 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 53 10 are be VBP work_5xpfvjtqk5bbfefatdohgjss3a 53 11 ‘ ' `` work_5xpfvjtqk5bbfefatdohgjss3a 53 12 adaptive adaptive JJ work_5xpfvjtqk5bbfefatdohgjss3a 53 13 ’ ' '' work_5xpfvjtqk5bbfefatdohgjss3a 53 14 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 53 15 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 53 16 emerging emerge VBG work_5xpfvjtqk5bbfefatdohgjss3a 53 17 new new JJ work_5xpfvjtqk5bbfefatdohgjss3a 53 18 forms form NNS work_5xpfvjtqk5bbfefatdohgjss3a 53 19 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 53 20 frauds fraud NNS work_5xpfvjtqk5bbfefatdohgjss3a 53 21 . . . work_5xpfvjtqk5bbfefatdohgjss3a 54 1 Deployment deployment NN work_5xpfvjtqk5bbfefatdohgjss3a 54 2 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 54 3 sophisticated sophisticated JJ work_5xpfvjtqk5bbfefatdohgjss3a 54 4 techniques technique NNS work_5xpfvjtqk5bbfefatdohgjss3a 54 5 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 54 6 screening screening NN work_5xpfvjtqk5bbfefatdohgjss3a 54 7 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 54 8 every every DT work_5xpfvjtqk5bbfefatdohgjss3a 54 9 transaction transaction NN work_5xpfvjtqk5bbfefatdohgjss3a 54 10 alone alone RB work_5xpfvjtqk5bbfefatdohgjss3a 54 11 will will MD work_5xpfvjtqk5bbfefatdohgjss3a 54 12 not not RB work_5xpfvjtqk5bbfefatdohgjss3a 54 13 reduce reduce VB work_5xpfvjtqk5bbfefatdohgjss3a 54 14 losses loss NNS work_5xpfvjtqk5bbfefatdohgjss3a 54 15 . . . work_5xpfvjtqk5bbfefatdohgjss3a 55 1 It -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 55 2 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 55 3 necessary necessary JJ work_5xpfvjtqk5bbfefatdohgjss3a 55 4 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 55 5 employ employ VB work_5xpfvjtqk5bbfefatdohgjss3a 55 6 an an DT work_5xpfvjtqk5bbfefatdohgjss3a 55 7 effective effective JJ work_5xpfvjtqk5bbfefatdohgjss3a 55 8 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 55 9 economical economical JJ work_5xpfvjtqk5bbfefatdohgjss3a 55 10 solution solution NN work_5xpfvjtqk5bbfefatdohgjss3a 55 11 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 55 12 combat combat VB work_5xpfvjtqk5bbfefatdohgjss3a 55 13 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 55 14 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 55 15 Turney turney NN work_5xpfvjtqk5bbfefatdohgjss3a 55 16 , , , work_5xpfvjtqk5bbfefatdohgjss3a 55 17 1995 1995 CD work_5xpfvjtqk5bbfefatdohgjss3a 55 18 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 55 19 . . . work_5xpfvjtqk5bbfefatdohgjss3a 56 1 Such such PDT work_5xpfvjtqk5bbfefatdohgjss3a 56 2 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 56 3 solution solution NN work_5xpfvjtqk5bbfefatdohgjss3a 56 4 should should MD work_5xpfvjtqk5bbfefatdohgjss3a 56 5 not not RB work_5xpfvjtqk5bbfefatdohgjss3a 56 6 only only RB work_5xpfvjtqk5bbfefatdohgjss3a 56 7 detect detect VB work_5xpfvjtqk5bbfefatdohgjss3a 56 8 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 56 9 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 56 10 efficiently efficiently RB work_5xpfvjtqk5bbfefatdohgjss3a 56 11 but but CC work_5xpfvjtqk5bbfefatdohgjss3a 56 12 also also RB work_5xpfvjtqk5bbfefatdohgjss3a 56 13 turn turn VB work_5xpfvjtqk5bbfefatdohgjss3a 56 14 out out RP work_5xpfvjtqk5bbfefatdohgjss3a 56 15 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 56 16 be be VB work_5xpfvjtqk5bbfefatdohgjss3a 56 17 cost cost NN work_5xpfvjtqk5bbfefatdohgjss3a 56 18 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 56 19 effective effective JJ work_5xpfvjtqk5bbfefatdohgjss3a 56 20 . . . work_5xpfvjtqk5bbfefatdohgjss3a 57 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 57 2 idea idea NN work_5xpfvjtqk5bbfefatdohgjss3a 57 3 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 57 4 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 57 5 strike strike VB work_5xpfvjtqk5bbfefatdohgjss3a 57 6 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 57 7 balance balance NN work_5xpfvjtqk5bbfefatdohgjss3a 57 8 between between IN work_5xpfvjtqk5bbfefatdohgjss3a 57 9 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 57 10 cost cost NN work_5xpfvjtqk5bbfefatdohgjss3a 57 11 involved involve VBN work_5xpfvjtqk5bbfefatdohgjss3a 57 12 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 57 13 transaction transaction NN work_5xpfvjtqk5bbfefatdohgjss3a 57 14 screening screening NN work_5xpfvjtqk5bbfefatdohgjss3a 57 15 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 57 16 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 57 17 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 57 18 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 57 19 losses loss NNS work_5xpfvjtqk5bbfefatdohgjss3a 57 20 due due JJ work_5xpfvjtqk5bbfefatdohgjss3a 57 21 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 57 22 fraud- fraud- NNP work_5xpfvjtqk5bbfefatdohgjss3a 57 23 ulent ulent NN work_5xpfvjtqk5bbfefatdohgjss3a 57 24 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 57 25 . . . work_5xpfvjtqk5bbfefatdohgjss3a 58 1 Analyses Analyses NNP work_5xpfvjtqk5bbfefatdohgjss3a 58 2 show show VBP work_5xpfvjtqk5bbfefatdohgjss3a 58 3 that that IN work_5xpfvjtqk5bbfefatdohgjss3a 58 4 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 58 5 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 58 6 only only RB work_5xpfvjtqk5bbfefatdohgjss3a 58 7 2.0 2.0 CD work_5xpfvjtqk5bbfefatdohgjss3a 58 8 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 58 9 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 58 10 trans- trans- JJ work_5xpfvjtqk5bbfefatdohgjss3a 58 11 actions action NNS work_5xpfvjtqk5bbfefatdohgjss3a 58 12 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 58 13 result result VB work_5xpfvjtqk5bbfefatdohgjss3a 58 14 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 58 15 reducing reduce VBG work_5xpfvjtqk5bbfefatdohgjss3a 58 16 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 58 17 losses loss NNS work_5xpfvjtqk5bbfefatdohgjss3a 58 18 accounting account VBG work_5xpfvjtqk5bbfefatdohgjss3a 58 19 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 58 20 1.0 1.0 CD work_5xpfvjtqk5bbfefatdohgjss3a 58 21 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 58 22 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 58 23 total total JJ work_5xpfvjtqk5bbfefatdohgjss3a 58 24 value value NN work_5xpfvjtqk5bbfefatdohgjss3a 58 25 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 58 26 transactions transaction NNS work_5xpfvjtqk5bbfefatdohgjss3a 58 27 . . . work_5xpfvjtqk5bbfefatdohgjss3a 59 1 While while IN work_5xpfvjtqk5bbfefatdohgjss3a 59 2 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 59 3 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 59 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 59 5 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 59 6 high high JJ work_5xpfvjtqk5bbfefatdohgjss3a 59 7 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 59 8 30 30 CD work_5xpfvjtqk5bbfefatdohgjss3a 59 9 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 59 10 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 59 11 transactions transaction NNS work_5xpfvjtqk5bbfefatdohgjss3a 59 12 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 59 13 reduce reduce VB work_5xpfvjtqk5bbfefatdohgjss3a 59 14 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 59 15 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 59 16 loses lose VBZ work_5xpfvjtqk5bbfefatdohgjss3a 59 17 drastically drastically RB work_5xpfvjtqk5bbfefatdohgjss3a 59 18 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 59 19 0.06 0.06 CD work_5xpfvjtqk5bbfefatdohgjss3a 59 20 % % NN work_5xpfvjtqk5bbfefatdohgjss3a 59 21 , , , work_5xpfvjtqk5bbfefatdohgjss3a 59 22 but but CC work_5xpfvjtqk5bbfefatdohgjss3a 59 23 that that IN work_5xpfvjtqk5bbfefatdohgjss3a 59 24 increases increase VBZ work_5xpfvjtqk5bbfefatdohgjss3a 59 25 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 59 26 costs cost NNS work_5xpfvjtqk5bbfefatdohgjss3a 59 27 exorbitantly exorbitantly RB work_5xpfvjtqk5bbfefatdohgjss3a 59 28 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 59 29 Bhatla Bhatla NNP work_5xpfvjtqk5bbfefatdohgjss3a 59 30 et et NNP work_5xpfvjtqk5bbfefatdohgjss3a 59 31 al al NNP work_5xpfvjtqk5bbfefatdohgjss3a 59 32 . . NNP work_5xpfvjtqk5bbfefatdohgjss3a 59 33 , , , work_5xpfvjtqk5bbfefatdohgjss3a 59 34 2003 2003 CD work_5xpfvjtqk5bbfefatdohgjss3a 59 35 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 59 36 . . . work_5xpfvjtqk5bbfefatdohgjss3a 60 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 60 2 estimated estimated JJ work_5xpfvjtqk5bbfefatdohgjss3a 60 3 cost cost NN work_5xpfvjtqk5bbfefatdohgjss3a 60 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 60 5 not not RB work_5xpfvjtqk5bbfefatdohgjss3a 60 6 using use VBG work_5xpfvjtqk5bbfefatdohgjss3a 60 7 anti anti JJ work_5xpfvjtqk5bbfefatdohgjss3a 60 8 - - JJ work_5xpfvjtqk5bbfefatdohgjss3a 60 9 fraud fraud JJ work_5xpfvjtqk5bbfefatdohgjss3a 60 10 soft- soft- JJ work_5xpfvjtqk5bbfefatdohgjss3a 60 11 ware ware NN work_5xpfvjtqk5bbfefatdohgjss3a 60 12 was be VBD work_5xpfvjtqk5bbfefatdohgjss3a 60 13 about about RB work_5xpfvjtqk5bbfefatdohgjss3a 60 14 $ $ $ work_5xpfvjtqk5bbfefatdohgjss3a 60 15 60 60 CD work_5xpfvjtqk5bbfefatdohgjss3a 60 16 billion billion CD work_5xpfvjtqk5bbfefatdohgjss3a 60 17 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 60 18 2005 2005 CD work_5xpfvjtqk5bbfefatdohgjss3a 60 19 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 60 20 Statistics Statistics NNP work_5xpfvjtqk5bbfefatdohgjss3a 60 21 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 60 22 General General NNP work_5xpfvjtqk5bbfefatdohgjss3a 60 23 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 60 24 Online Online NNP work_5xpfvjtqk5bbfefatdohgjss3a 60 25 Fraud Fraud NNP work_5xpfvjtqk5bbfefatdohgjss3a 60 26 , , , work_5xpfvjtqk5bbfefatdohgjss3a 60 27 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 60 28 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 60 29 . . . work_5xpfvjtqk5bbfefatdohgjss3a 61 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 61 2 key key NN work_5xpfvjtqk5bbfefatdohgjss3a 61 3 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 61 4 minimize minimize VB work_5xpfvjtqk5bbfefatdohgjss3a 61 5 total total JJ work_5xpfvjtqk5bbfefatdohgjss3a 61 6 costs cost NNS work_5xpfvjtqk5bbfefatdohgjss3a 61 7 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 61 8 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 61 9 categorize categorize VB work_5xpfvjtqk5bbfefatdohgjss3a 61 10 transac- transac- NNP work_5xpfvjtqk5bbfefatdohgjss3a 61 11 tions tion NNS work_5xpfvjtqk5bbfefatdohgjss3a 61 12 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 61 13 review review VB work_5xpfvjtqk5bbfefatdohgjss3a 61 14 only only RB work_5xpfvjtqk5bbfefatdohgjss3a 61 15 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 61 16 potentially potentially RB work_5xpfvjtqk5bbfefatdohgjss3a 61 17 fraudulent fraudulent JJ work_5xpfvjtqk5bbfefatdohgjss3a 61 18 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 61 19 . . . work_5xpfvjtqk5bbfefatdohgjss3a 62 1 This this DT work_5xpfvjtqk5bbfefatdohgjss3a 62 2 should should MD work_5xpfvjtqk5bbfefatdohgjss3a 62 3 involve involve VB work_5xpfvjtqk5bbfefatdohgjss3a 62 4 deployment deployment NN work_5xpfvjtqk5bbfefatdohgjss3a 62 5 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 62 6 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 62 7 step step NN work_5xpfvjtqk5bbfefatdohgjss3a 62 8 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 62 9 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 62 10 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 62 11 step step NN work_5xpfvjtqk5bbfefatdohgjss3a 62 12 screening screening NN work_5xpfvjtqk5bbfefatdohgjss3a 62 13 , , , work_5xpfvjtqk5bbfefatdohgjss3a 62 14 filter- filter- NNP work_5xpfvjtqk5bbfefatdohgjss3a 62 15 ing ing NN work_5xpfvjtqk5bbfefatdohgjss3a 62 16 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 62 17 review review VB work_5xpfvjtqk5bbfefatdohgjss3a 62 18 mechanism mechanism NN work_5xpfvjtqk5bbfefatdohgjss3a 62 19 . . . work_5xpfvjtqk5bbfefatdohgjss3a 63 1 A a DT work_5xpfvjtqk5bbfefatdohgjss3a 63 2 typical typical JJ work_5xpfvjtqk5bbfefatdohgjss3a 63 3 deployment deployment NN work_5xpfvjtqk5bbfefatdohgjss3a 63 4 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 63 5 involve involve VB work_5xpfvjtqk5bbfefatdohgjss3a 63 6 initial initial JJ work_5xpfvjtqk5bbfefatdohgjss3a 63 7 authentication authentication NN work_5xpfvjtqk5bbfefatdohgjss3a 63 8 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 63 9 transactions transaction NNS work_5xpfvjtqk5bbfefatdohgjss3a 63 10 through through IN work_5xpfvjtqk5bbfefatdohgjss3a 63 11 PIN PIN NNP work_5xpfvjtqk5bbfefatdohgjss3a 63 12 , , , work_5xpfvjtqk5bbfefatdohgjss3a 63 13 expiry expiry NN work_5xpfvjtqk5bbfefatdohgjss3a 63 14 date date NN work_5xpfvjtqk5bbfefatdohgjss3a 63 15 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 63 16 card card NN work_5xpfvjtqk5bbfefatdohgjss3a 63 17 , , , work_5xpfvjtqk5bbfefatdohgjss3a 63 18 AVS AVS NNP work_5xpfvjtqk5bbfefatdohgjss3a 63 19 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 63 20 CVM CVM NNP work_5xpfvjtqk5bbfefatdohgjss3a 63 21 . . . work_5xpfvjtqk5bbfefatdohgjss3a 64 1 A a DT work_5xpfvjtqk5bbfefatdohgjss3a 64 2 second second JJ work_5xpfvjtqk5bbfefatdohgjss3a 64 3 level level NN work_5xpfvjtqk5bbfefatdohgjss3a 64 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 64 5 screening screening NN work_5xpfvjtqk5bbfefatdohgjss3a 64 6 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 64 7 involve involve VB work_5xpfvjtqk5bbfefatdohgjss3a 64 8 comparing compare VBG work_5xpfvjtqk5bbfefatdohgjss3a 64 9 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 64 10 positive positive JJ work_5xpfvjtqk5bbfefatdohgjss3a 64 11 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 64 12 negative negative JJ work_5xpfvjtqk5bbfefatdohgjss3a 64 13 lists list NNS work_5xpfvjtqk5bbfefatdohgjss3a 64 14 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 64 15 well well RB work_5xpfvjtqk5bbfefatdohgjss3a 64 16 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 64 17 rules rule NNS work_5xpfvjtqk5bbfefatdohgjss3a 64 18 based base VBN work_5xpfvjtqk5bbfefatdohgjss3a 64 19 on on IN work_5xpfvjtqk5bbfefatdohgjss3a 64 20 customers customer NNS work_5xpfvjtqk5bbfefatdohgjss3a 64 21 , , , work_5xpfvjtqk5bbfefatdohgjss3a 64 22 geographical geographical JJ work_5xpfvjtqk5bbfefatdohgjss3a 64 23 regions region NNS work_5xpfvjtqk5bbfefatdohgjss3a 64 24 , , , work_5xpfvjtqk5bbfefatdohgjss3a 64 25 IP IP NNP work_5xpfvjtqk5bbfefatdohgjss3a 64 26 addresses address NNS work_5xpfvjtqk5bbfefatdohgjss3a 64 27 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 64 28 policies policy NNS work_5xpfvjtqk5bbfefatdohgjss3a 64 29 . . . work_5xpfvjtqk5bbfefatdohgjss3a 65 1 Risk risk NN work_5xpfvjtqk5bbfefatdohgjss3a 65 2 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 65 3 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 65 4 scoring score VBG work_5xpfvjtqk5bbfefatdohgjss3a 65 5 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 65 6 pattern pattern NN work_5xpfvjtqk5bbfefatdohgjss3a 65 7 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 65 8 behaviour behaviour NN work_5xpfvjtqk5bbfefatdohgjss3a 65 9 analyses analysis NNS work_5xpfvjtqk5bbfefatdohgjss3a 65 10 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 65 11 come come VB work_5xpfvjtqk5bbfefatdohgjss3a 65 12 next next RB work_5xpfvjtqk5bbfefatdohgjss3a 65 13 , , , work_5xpfvjtqk5bbfefatdohgjss3a 65 14 followed follow VBN work_5xpfvjtqk5bbfefatdohgjss3a 65 15 by by IN work_5xpfvjtqk5bbfefatdohgjss3a 65 16 manual manual JJ work_5xpfvjtqk5bbfefatdohgjss3a 65 17 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 65 18 . . . work_5xpfvjtqk5bbfefatdohgjss3a 66 1 This this DT work_5xpfvjtqk5bbfefatdohgjss3a 66 2 classifies classifie NNS work_5xpfvjtqk5bbfefatdohgjss3a 66 3 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 66 4 filters filter VBZ work_5xpfvjtqk5bbfefatdohgjss3a 66 5 out out RP work_5xpfvjtqk5bbfefatdohgjss3a 66 6 transactions transaction NNS work_5xpfvjtqk5bbfefatdohgjss3a 66 7 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 66 8 genuine genuine JJ work_5xpfvjtqk5bbfefatdohgjss3a 66 9 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 66 10 fraudulent fraudulent JJ work_5xpfvjtqk5bbfefatdohgjss3a 66 11 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 66 12 every every DT work_5xpfvjtqk5bbfefatdohgjss3a 66 13 step step NN work_5xpfvjtqk5bbfefatdohgjss3a 66 14 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 66 15 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 66 16 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 66 17 result result NN work_5xpfvjtqk5bbfefatdohgjss3a 66 18 only only RB work_5xpfvjtqk5bbfefatdohgjss3a 66 19 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 66 20 few few JJ work_5xpfvjtqk5bbfefatdohgjss3a 66 21 transac- transac- NN work_5xpfvjtqk5bbfefatdohgjss3a 66 22 tions tion NNS work_5xpfvjtqk5bbfefatdohgjss3a 66 23 would would MD work_5xpfvjtqk5bbfefatdohgjss3a 66 24 require require VB work_5xpfvjtqk5bbfefatdohgjss3a 66 25 further further JJ work_5xpfvjtqk5bbfefatdohgjss3a 66 26 manual manual JJ work_5xpfvjtqk5bbfefatdohgjss3a 66 27 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 66 28 . . . work_5xpfvjtqk5bbfefatdohgjss3a 67 1 Such such PDT work_5xpfvjtqk5bbfefatdohgjss3a 67 2 a a DT work_5xpfvjtqk5bbfefatdohgjss3a 67 3 solution solution NN work_5xpfvjtqk5bbfefatdohgjss3a 67 4 reduces reduce VBZ work_5xpfvjtqk5bbfefatdohgjss3a 67 5 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 67 6 overall overall JJ work_5xpfvjtqk5bbfefatdohgjss3a 67 7 processing processing NN work_5xpfvjtqk5bbfefatdohgjss3a 67 8 delay delay NN work_5xpfvjtqk5bbfefatdohgjss3a 67 9 as as RB work_5xpfvjtqk5bbfefatdohgjss3a 67 10 well well RB work_5xpfvjtqk5bbfefatdohgjss3a 67 11 as as IN work_5xpfvjtqk5bbfefatdohgjss3a 67 12 total total JJ work_5xpfvjtqk5bbfefatdohgjss3a 67 13 costs cost NNS work_5xpfvjtqk5bbfefatdohgjss3a 67 14 involved involve VBN work_5xpfvjtqk5bbfefatdohgjss3a 67 15 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 67 16 manpower manpower NN work_5xpfvjtqk5bbfefatdohgjss3a 67 17 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 67 18 administration administration NN work_5xpfvjtqk5bbfefatdohgjss3a 67 19 . . . work_5xpfvjtqk5bbfefatdohgjss3a 68 1 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 68 2 focus focus NN work_5xpfvjtqk5bbfefatdohgjss3a 68 3 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 68 4 this this DT work_5xpfvjtqk5bbfefatdohgjss3a 68 5 paper paper NN work_5xpfvjtqk5bbfefatdohgjss3a 68 6 will will MD work_5xpfvjtqk5bbfefatdohgjss3a 68 7 now now RB work_5xpfvjtqk5bbfefatdohgjss3a 68 8 shift shift VB work_5xpfvjtqk5bbfefatdohgjss3a 68 9 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 68 10 risk risk VB work_5xpfvjtqk5bbfefatdohgjss3a 68 11 scoring score VBG work_5xpfvjtqk5bbfefatdohgjss3a 68 12 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 68 13 behavioral behavioral JJ work_5xpfvjtqk5bbfefatdohgjss3a 68 14 pattern pattern NN work_5xpfvjtqk5bbfefatdohgjss3a 68 15 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 68 16 using use VBG work_5xpfvjtqk5bbfefatdohgjss3a 68 17 neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 68 18 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 68 19 . . . work_5xpfvjtqk5bbfefatdohgjss3a 69 1 2 2 LS work_5xpfvjtqk5bbfefatdohgjss3a 69 2 . . . work_5xpfvjtqk5bbfefatdohgjss3a 70 1 Neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 70 2 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 70 3 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 70 4 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 70 5 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 70 6 – – : work_5xpfvjtqk5bbfefatdohgjss3a 70 7 literature literature NN work_5xpfvjtqk5bbfefatdohgjss3a 70 8 review review NN work_5xpfvjtqk5bbfefatdohgjss3a 70 9 Neural Neural NNP work_5xpfvjtqk5bbfefatdohgjss3a 70 10 Networks Networks NNPS work_5xpfvjtqk5bbfefatdohgjss3a 70 11 have have VBP work_5xpfvjtqk5bbfefatdohgjss3a 70 12 been be VBN work_5xpfvjtqk5bbfefatdohgjss3a 70 13 extensively extensively RB work_5xpfvjtqk5bbfefatdohgjss3a 70 14 put put VBN work_5xpfvjtqk5bbfefatdohgjss3a 70 15 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 70 16 use use NN work_5xpfvjtqk5bbfefatdohgjss3a 70 17 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 70 18 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 70 19 areas area NNS work_5xpfvjtqk5bbfefatdohgjss3a 70 20 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 70 21 banking banking NN work_5xpfvjtqk5bbfefatdohgjss3a 70 22 , , , work_5xpfvjtqk5bbfefatdohgjss3a 70 23 finance finance NN work_5xpfvjtqk5bbfefatdohgjss3a 70 24 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 70 25 insurance insurance NN work_5xpfvjtqk5bbfefatdohgjss3a 70 26 . . . work_5xpfvjtqk5bbfefatdohgjss3a 71 1 They -PRON- PRP work_5xpfvjtqk5bbfefatdohgjss3a 71 2 have have VBP work_5xpfvjtqk5bbfefatdohgjss3a 71 3 been be VBN work_5xpfvjtqk5bbfefatdohgjss3a 71 4 successfully successfully RB work_5xpfvjtqk5bbfefatdohgjss3a 71 5 applied apply VBN work_5xpfvjtqk5bbfefatdohgjss3a 71 6 into into IN work_5xpfvjtqk5bbfefatdohgjss3a 71 7 credit credit NN work_5xpfvjtqk5bbfefatdohgjss3a 71 8 scoring scoring NN work_5xpfvjtqk5bbfefatdohgjss3a 71 9 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 71 10 customers customer NNS work_5xpfvjtqk5bbfefatdohgjss3a 71 11 , , , work_5xpfvjtqk5bbfefatdohgjss3a 71 12 bank- bank- JJ work_5xpfvjtqk5bbfefatdohgjss3a 71 13 ruptcy ruptcy NN work_5xpfvjtqk5bbfefatdohgjss3a 71 14 or or CC work_5xpfvjtqk5bbfefatdohgjss3a 71 15 business business NN work_5xpfvjtqk5bbfefatdohgjss3a 71 16 failure failure NN work_5xpfvjtqk5bbfefatdohgjss3a 71 17 prediction prediction NN work_5xpfvjtqk5bbfefatdohgjss3a 71 18 , , , work_5xpfvjtqk5bbfefatdohgjss3a 71 19 stock stock NN work_5xpfvjtqk5bbfefatdohgjss3a 71 20 price price NN work_5xpfvjtqk5bbfefatdohgjss3a 71 21 forecast- forecast- NNP work_5xpfvjtqk5bbfefatdohgjss3a 71 22 ing ing NNP work_5xpfvjtqk5bbfefatdohgjss3a 71 23 , , , work_5xpfvjtqk5bbfefatdohgjss3a 71 24 bond bond NN work_5xpfvjtqk5bbfefatdohgjss3a 71 25 rating rating NN work_5xpfvjtqk5bbfefatdohgjss3a 71 26 , , , work_5xpfvjtqk5bbfefatdohgjss3a 71 27 currency currency NN work_5xpfvjtqk5bbfefatdohgjss3a 71 28 prediction prediction NN work_5xpfvjtqk5bbfefatdohgjss3a 71 29 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 71 30 many many JJ work_5xpfvjtqk5bbfefatdohgjss3a 71 31 more more JJR work_5xpfvjtqk5bbfefatdohgjss3a 71 32 areas area NNS work_5xpfvjtqk5bbfefatdohgjss3a 71 33 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 71 34 Stock Stock NNP work_5xpfvjtqk5bbfefatdohgjss3a 71 35 Analysis Analysis NNP work_5xpfvjtqk5bbfefatdohgjss3a 71 36 , , , work_5xpfvjtqk5bbfefatdohgjss3a 71 37 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 71 38 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 71 39 Quah Quah NNP work_5xpfvjtqk5bbfefatdohgjss3a 71 40 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 71 41 Srinivasan Srinivasan NNP work_5xpfvjtqk5bbfefatdohgjss3a 71 42 , , , work_5xpfvjtqk5bbfefatdohgjss3a 71 43 1999 1999 CD work_5xpfvjtqk5bbfefatdohgjss3a 71 44 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 71 45 . . . work_5xpfvjtqk5bbfefatdohgjss3a 72 1 In in IN work_5xpfvjtqk5bbfefatdohgjss3a 72 2 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 72 3 area area NN work_5xpfvjtqk5bbfefatdohgjss3a 72 4 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 72 5 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 72 6 detection detection NN work_5xpfvjtqk5bbfefatdohgjss3a 72 7 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 72 8 prevention prevention NN work_5xpfvjtqk5bbfefatdohgjss3a 72 9 , , , work_5xpfvjtqk5bbfefatdohgjss3a 72 10 neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 72 11 net- net- NN work_5xpfvjtqk5bbfefatdohgjss3a 72 12 works work NNS work_5xpfvjtqk5bbfefatdohgjss3a 72 13 like like IN work_5xpfvjtqk5bbfefatdohgjss3a 72 14 feed feed NN work_5xpfvjtqk5bbfefatdohgjss3a 72 15 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 72 16 forward forward NN work_5xpfvjtqk5bbfefatdohgjss3a 72 17 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 72 18 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 72 19 back back NN work_5xpfvjtqk5bbfefatdohgjss3a 72 20 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 72 21 propagation propagation NN work_5xpfvjtqk5bbfefatdohgjss3a 72 22 have have VBP work_5xpfvjtqk5bbfefatdohgjss3a 72 23 found find VBN work_5xpfvjtqk5bbfefatdohgjss3a 72 24 immense immense JJ work_5xpfvjtqk5bbfefatdohgjss3a 72 25 applications application NNS work_5xpfvjtqk5bbfefatdohgjss3a 72 26 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 72 27 Fraud Fraud NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 28 Brief Brief NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 29 – – : work_5xpfvjtqk5bbfefatdohgjss3a 72 30 AVS AVS NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 31 & & CC work_5xpfvjtqk5bbfefatdohgjss3a 72 32 CVM CVM NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 33 , , , work_5xpfvjtqk5bbfefatdohgjss3a 72 34 ClearCommerce ClearCommerce NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 35 Corporation Corporation NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 36 , , , work_5xpfvjtqk5bbfefatdohgjss3a 72 37 2003 2003 CD work_5xpfvjtqk5bbfefatdohgjss3a 72 38 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 72 39 The the DT work_5xpfvjtqk5bbfefatdohgjss3a 72 40 Evolving Evolving NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 41 Threat threat NN work_5xpfvjtqk5bbfefatdohgjss3a 72 42 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 72 43 Card Card NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 44 Skimming Skimming NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 45 , , , work_5xpfvjtqk5bbfefatdohgjss3a 72 46 FairIsaac FairIsaac NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 47 , , , work_5xpfvjtqk5bbfefatdohgjss3a 72 48 2007 2007 CD work_5xpfvjtqk5bbfefatdohgjss3a 72 49 ; ; : work_5xpfvjtqk5bbfefatdohgjss3a 72 50 ClearCom- clearcom- NN work_5xpfvjtqk5bbfefatdohgjss3a 72 51 merce merce NN work_5xpfvjtqk5bbfefatdohgjss3a 72 52 Fraud Fraud NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 53 Prevention Prevention NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 54 Guide Guide NNP work_5xpfvjtqk5bbfefatdohgjss3a 72 55 , , , work_5xpfvjtqk5bbfefatdohgjss3a 72 56 2002 2002 CD work_5xpfvjtqk5bbfefatdohgjss3a 72 57 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 72 58 . . . work_5xpfvjtqk5bbfefatdohgjss3a 73 1 Usually usually RB work_5xpfvjtqk5bbfefatdohgjss3a 73 2 such such JJ work_5xpfvjtqk5bbfefatdohgjss3a 73 3 appli- appli- JJ work_5xpfvjtqk5bbfefatdohgjss3a 73 4 cations cation NNS work_5xpfvjtqk5bbfefatdohgjss3a 73 5 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 73 6 neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 73 7 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 73 8 systems system NNS work_5xpfvjtqk5bbfefatdohgjss3a 73 9 involve involve VBP work_5xpfvjtqk5bbfefatdohgjss3a 73 10 knowing know VBG work_5xpfvjtqk5bbfefatdohgjss3a 73 11 about about IN work_5xpfvjtqk5bbfefatdohgjss3a 73 12 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 73 13 previous previous JJ work_5xpfvjtqk5bbfefatdohgjss3a 73 14 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 73 15 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 73 16 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 73 17 , , , work_5xpfvjtqk5bbfefatdohgjss3a 73 18 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 73 19 make make VB work_5xpfvjtqk5bbfefatdohgjss3a 73 20 systems system NNS work_5xpfvjtqk5bbfefatdohgjss3a 73 21 learn learn VB work_5xpfvjtqk5bbfefatdohgjss3a 73 22 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 73 23 var- var- NN work_5xpfvjtqk5bbfefatdohgjss3a 73 24 ious ious JJ work_5xpfvjtqk5bbfefatdohgjss3a 73 25 trends trend NNS work_5xpfvjtqk5bbfefatdohgjss3a 73 26 . . . work_5xpfvjtqk5bbfefatdohgjss3a 74 1 Fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 74 2 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 74 3 are be VBP work_5xpfvjtqk5bbfefatdohgjss3a 74 4 statistically statistically RB work_5xpfvjtqk5bbfefatdohgjss3a 74 5 analyzed analyze VBN work_5xpfvjtqk5bbfefatdohgjss3a 74 6 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 74 7 derive derive VB work_5xpfvjtqk5bbfefatdohgjss3a 74 8 out out RP work_5xpfvjtqk5bbfefatdohgjss3a 74 9 relationships relationship NNS work_5xpfvjtqk5bbfefatdohgjss3a 74 10 among among IN work_5xpfvjtqk5bbfefatdohgjss3a 74 11 input input NN work_5xpfvjtqk5bbfefatdohgjss3a 74 12 data datum NNS work_5xpfvjtqk5bbfefatdohgjss3a 74 13 and and CC work_5xpfvjtqk5bbfefatdohgjss3a 74 14 values value NNS work_5xpfvjtqk5bbfefatdohgjss3a 74 15 for for IN work_5xpfvjtqk5bbfefatdohgjss3a 74 16 certain certain JJ work_5xpfvjtqk5bbfefatdohgjss3a 74 17 key key JJ work_5xpfvjtqk5bbfefatdohgjss3a 74 18 parameters parameter NNS work_5xpfvjtqk5bbfefatdohgjss3a 74 19 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 74 20 order order NN work_5xpfvjtqk5bbfefatdohgjss3a 74 21 to to TO work_5xpfvjtqk5bbfefatdohgjss3a 74 22 understand understand VB work_5xpfvjtqk5bbfefatdohgjss3a 74 23 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 74 24 various various JJ work_5xpfvjtqk5bbfefatdohgjss3a 74 25 patterns pattern NNS work_5xpfvjtqk5bbfefatdohgjss3a 74 26 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 74 27 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 74 28 . . . work_5xpfvjtqk5bbfefatdohgjss3a 75 1 This this DT work_5xpfvjtqk5bbfefatdohgjss3a 75 2 knowledge knowledge NN work_5xpfvjtqk5bbfefatdohgjss3a 75 3 of of IN work_5xpfvjtqk5bbfefatdohgjss3a 75 4 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 75 5 trends trend NNS work_5xpfvjtqk5bbfefatdohgjss3a 75 6 is be VBZ work_5xpfvjtqk5bbfefatdohgjss3a 75 7 then then RB work_5xpfvjtqk5bbfefatdohgjss3a 75 8 iteratively iteratively RB work_5xpfvjtqk5bbfefatdohgjss3a 75 9 taught teach VBN work_5xpfvjtqk5bbfefatdohgjss3a 75 10 to to IN work_5xpfvjtqk5bbfefatdohgjss3a 75 11 feed feed VB work_5xpfvjtqk5bbfefatdohgjss3a 75 12 - - HYPH work_5xpfvjtqk5bbfefatdohgjss3a 75 13 forward forward RB work_5xpfvjtqk5bbfefatdohgjss3a 75 14 neural neural JJ work_5xpfvjtqk5bbfefatdohgjss3a 75 15 networks network NNS work_5xpfvjtqk5bbfefatdohgjss3a 75 16 , , , work_5xpfvjtqk5bbfefatdohgjss3a 75 17 which which WDT work_5xpfvjtqk5bbfefatdohgjss3a 75 18 can can MD work_5xpfvjtqk5bbfefatdohgjss3a 75 19 success- success- VB work_5xpfvjtqk5bbfefatdohgjss3a 75 20 fully fully RB work_5xpfvjtqk5bbfefatdohgjss3a 75 21 identify identify VB work_5xpfvjtqk5bbfefatdohgjss3a 75 22 similar similar JJ work_5xpfvjtqk5bbfefatdohgjss3a 75 23 fraud fraud NN work_5xpfvjtqk5bbfefatdohgjss3a 75 24 cases case NNS work_5xpfvjtqk5bbfefatdohgjss3a 75 25 occurring occur VBG work_5xpfvjtqk5bbfefatdohgjss3a 75 26 in in IN work_5xpfvjtqk5bbfefatdohgjss3a 75 27 the the DT work_5xpfvjtqk5bbfefatdohgjss3a 75 28 future future NN work_5xpfvjtqk5bbfefatdohgjss3a 75 29 . . . work_5xpfvjtqk5bbfefatdohgjss3a 76 1 1722 1722 CD work_5xpfvjtqk5bbfefatdohgjss3a 76 2 J.T.S. J.T.S. NNP work_5xpfvjtqk5bbfefatdohgjss3a 77 1 Quah Quah NNP work_5xpfvjtqk5bbfefatdohgjss3a 77 2 , , , work_5xpfvjtqk5bbfefatdohgjss3a 77 3 M. M. NNP work_5xpfvjtqk5bbfefatdohgjss3a 77 4 Sriganesh Sriganesh NNP work_5xpfvjtqk5bbfefatdohgjss3a 77 5 / / SYM work_5xpfvjtqk5bbfefatdohgjss3a 77 6 Expert Expert NNP work_5xpfvjtqk5bbfefatdohgjss3a 77 7 Systems Systems NNPS work_5xpfvjtqk5bbfefatdohgjss3a 77 8 with with IN work_5xpfvjtqk5bbfefatdohgjss3a 77 9 Applications Applications NNPS work_5xpfvjtqk5bbfefatdohgjss3a 77 10 35 35 CD work_5xpfvjtqk5bbfefatdohgjss3a 77 11 ( ( -LRB- work_5xpfvjtqk5bbfefatdohgjss3a 77 12 2008 2008 CD work_5xpfvjtqk5bbfefatdohgjss3a 77 13 ) ) -RRB- work_5xpfvjtqk5bbfefatdohgjss3a 77 14 1721–1732 1721–1732 CD work_5xpfvjtqk5bbfefatdohgjss3a 77 15 https://isiarticles.com/article/17706 https://isiarticles.com/article/17706 NNP