Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning Neo4j

You're reading from   Learning Neo4j Run blazingly fast queries on complex graph datasets with the power of the Neo4j graph database

Arrow left icon
Product type Paperback
Published in Aug 2014
Publisher
ISBN-13 9781849517164
Length 222 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Rik Van Bruggen Rik Van Bruggen
Author Profile Icon Rik Van Bruggen
Rik Van Bruggen
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Graphs and Graph Theory – an Introduction FREE CHAPTER 2. Graph Databases – Overview 3. Getting Started with Neo4j 4. Modeling Data for Neo4j 5. Importing Data into Neo4j 6. Use Case Example – Recommendations 7. Use Case Example – Impact Analysis and Simulation 8. Visualizations for Neo4j 9. Other Tools Related to Neo4j A. Where to Find More Information Related to Neo4j B. Getting Started with Cypher Index

Fraud detection systems


We have seen a number of customers that are using Graph Database Management Systems such as Neo4j for fraud detection systems. The principle is quite simple: in many cases, the fraud of a particular nature is not defined by one transaction only, but by a chain of transactions that have their specific characteristics and that need to be compared to one another to see if they really do constitute a case of fraud.

In the following example, we are just looking at a suspect case of credit card fraud:

A particular user always uses his credit card for transactions at a particular store. Another user uses his credit card for similar transactions at a different store. And all of a sudden, there is this new transaction in the middle, which uses the credit card (let's say for a similar kind of transaction) in the other store. This kind of pattern may become flagged as a suspect pattern in some fraud detection systems. The system would not necessarily immediately block the credit...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime