Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services

Ahmed Yesuf, Lars Peter Wolos, Kai Rannenberg

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

267 Downloads (Pure)

Abstract

Telecom providers are losing tremendous amounts of money due to fraud risks posed to Telecom services and products. Currently, they are mainly focusing on fraud detection approaches to reduce the impact of fraud risks against their services. However, fraud prevention approaches should also be investigated in order to further reduce fraud risks and improve the revenue of Telecom providers. Fraud risk modelling is a fraud prevention approach aims at identifying the potential fraud risks, estimating the damage and setting up preventive mechanisms before the fraud risks lead to actual losses. In this paper, we highlight the important requirements for a usable and context-aware fraud risk modelling approach for Telecom services. To do so, we have conducted two workshops with experts from a Telecom provider and experts from multi-disciplinary areas. In order to show and document the requirements, we present two exemplary Telecom fraud scenarios, analyse and estimate the impacts of fraud risks qualitatively.
Original languageEnglish
Title of host publicationExploring Services Science
Volume279
PublisherSpringer
Publication date2017
Pages323-336
ISBN (Print)9783319569246
DOIs
Publication statusPublished - 2017
Event8th International Conference on Exploring Services Science - Sapienza University, Rome, Italy
Duration: 24 May 201726 May 2017
Conference number: 8

Conference

Conference8th International Conference on Exploring Services Science
Number8
LocationSapienza University
CountryItaly
CityRome
Period24/05/201726/05/2017
SeriesLecture Notes in Business Information Processing
Volume279
ISSN1865-1348

Keywords

  • Computer Science
  • Information Systems Applications (incl. Internet)
  • Business IT Infrastructure
  • Software Engineering
  • Computer Appl. in Administrative Data Processing
  • Big Data/Analytics
  • Information Storage and Retrieval
  • Fraud risk
  • Requirement elicitation
  • Fraud modelling
  • Service security
  • Telecommunication
  • Risk assessment

Fingerprint Dive into the research topics of 'Fraud Risk Modelling: Requirements Elicitation in the Case of Telecom Services'. Together they form a unique fingerprint.

Cite this