Detection System of Promotion Abuse Using Similarity and Risk Scoring Methods

  • Cut Fiarni Harapan Bangsa Insitute of Technology
  • Arief Samuel Gunawan Ghent University
  • Ishak Anthony Harapan Bangsa Insitute of Technology
Keywords: Detection System, Promotion Abuse, Levenshtein Edit Base, Exact Similarity, Risk Scoring, Exploratory Factor Analysis, E-Commerce

Abstract

Offering promotion coupons is one of the most popular strategies of online marketing to attract new customers and increase customer loyalty. However, this strategy opens chances for fraud risk as the coupons are being redeemed multiple times using fake accounts. This risk becomes a burden to marketing costs and leads to failure to accomplish the intended strategic value. Therefore, this research focuses on building an automatic detection system of online promotion abuse based on its risk level. The proposed system also must work on live stream and bulk data. Therefore, in live stream data, it could alert the administrator before the transaction finished or the next process started. After conducting an exploratory factor analysis of the 24 attributes collected from four tables of data transaction, there were seven attributes indicating promotion abuse. These attributes were the user IP address, shipping address, mobile number, member email, order email, payment ID, and product name. Then, supervised machine learning of similarity algorithms was used to build models and find the hidden correlation of attributes to indicate the promotion abuse. The result from comparing five similarity methods showed that based on the workflow and performance, the most suitable methods for this case were exact match and Levenshtein edit base. The automatic risk scoring feature of the proposed system used seven attributes of online transactions as their most prominent promotion abuse parameter based on its hidden correlation. From the system performance testing, the result values of precision, recall, and F-measure are 95%, 93%, and 0.94, respectively. These results indicate that the system performance is satisfactory.

References

Bank Indonesia, “Synergize to Build Optimism for Economic Recovery,” 2020, [Online], https://www.bi.go.id/en/publikasi/laporan/Documents/2020_LTBI.pdf.

European Consumer Centres Network, “Fraud in Cross Border E-Commerce,” 2017, [Online], https://ec.europa.eu/info/sites/default/files/online_fraud_2017.pdf.

A.S. Putri and R. Zakaria, “Analisis Pemetaan E-Commerce Terbesar di Indonesia Berdasarkan Model Kekuatan Ekonomi Digital,” Sem., Konf. Nas. IDEC 2020, 2020, pp. C06.1–14.

U. Fiore, et al., “Using Generative Adversarial Networks for Improving Classification Effectiveness in Credit Card Fraud Detection,” Inf. Sci., Vol. 479, pp. 448–455, Apr. 2019.

T. Amarasinghe, A. Aponso, and N. Krishnarajah, “Critical Analysis of Machine Learning Based Approaches for Fraud Detection in Financial Transactions,” Proc. 2018 Int. Conf. Mach. Learn. Technol., 2018, pp. 12–17.

A. Bartoli and E. Medvet, “An Architecture for Anonymous Mobile Coupons in a Large Network,” J. Comput. Netw., Commun., Vol. 2016, pp. 1–10, Dec. 2016.

A. Saputra and Suharjito, “Fraud Detection Using Machine Learning in E-Commerce,” Int. J. Adv. Comput. Sci., Appl. (IJACSA), Vol. 10, No. 9, pp. 332–339, 2019.

Y. Sibaroni, M. Ekaputra, and S. Prasetiyowati, “Detection of Fraudulent Financial Statement based on Ratio Analysis in Indonesia Banking Using Support Vector Machine,” J. Online Inf., Vol. 5, No. 2, pp. 185-194, Dec. 2020.

S. Marchal and S. Szyller, “Detecting Organized Ecommerce Fraud Using Scalable Categorical Clustering,” Proc. 35th Annu. Comput. Secur. Appl. Conf., 2019, pp. 215–228.

E. Sipayung, C. Fiarni, and R. Tanudjaya, “Modeling Data Mining Dynamic Code Attributes with Scheme Definition Technique,” Proc. Elect. Eng. Comput. Sci., Inform., 2014, pp. 25–28.

J. Wang, H.T. Shen, J. Song, and J. Ji, “Hashing for Similarity Search: A Survey,” 2014, arXiv:1408.2927.

A. Niewiarowski, “Short Text Similarity Algorithm Based on the Edit Distance and Thesaurus,” Tech. Trans. Fundam. Sci., No. 1-NP, pp. 159–173, Dec. 2016.

Y. Wang, J. Qin, and W. Wang, “Efficient Approximate Entity Matching Using Jaro-Winkler Distance,” Int. Conf. Web Inf. Syst. Eng., 2017, pp. 231–239.

P. Christen, “A Comparison of Personal Name Matching: Techniques and Practical Issues,” IEEE Int. Conf. Data Mining-Workshop (ICDMW’06), 2006, pp. 290–294.

C. Fiarni, H. Maharani, and C. Nathania, “Product Recommendation System Design Using Cosine Similarity and Content-Based Filtering Methods,” Int. J. Inf. Technol. Elect. Eng., Vol. 3, No. 2, pp. 42–48, Jun. 2019.

D.M.W. Powers, “Evaluation: From Precision, Recall, and F-Measure to ROC, Informedness, Markedness, and Correlation,” J. Mach. Learn. Technol., Vol. 2, No. 1, pp. 37–63, 2011.

Published
2022-08-24
How to Cite
Cut Fiarni, Arief Samuel Gunawan, & Ishak Anthony. (2022). Detection System of Promotion Abuse Using Similarity and Risk Scoring Methods. Jurnal Nasional Teknik Elektro Dan Teknologi Informasi, 11(3), 168-175. https://doi.org/10.22146/jnteti.v11i3.3743
Section
Articles