Vous êtes sur la page 1sur 17

JID: OME

ARTICLE IN PRESS [m5G;July 20, 2018;2:29]


Omega 0 0 0 (2018) 1–17

Contents lists available at ScienceDirect

Omega
journal homepage: www.elsevier.com/locate/omega

Credit card fraud detection strategies with consumer incentives


Deshen Wang a, Bintong Chen a,∗, Jing Chen b
a
Institute for Financial Services Analytics, University of Delaware, Newark, DE 19711, USA
b
Rowe School of Business, Dalhousie University, Halifax, NS B3H 4R2, Canada

a r t i c l e i n f o a b s t r a c t

Article history: Credit card fraud increases as ecommerce becomes more prevalent. Current fraud detection techniques,
Received 14 February 2018 however, are far from accurate, and can result in significant financial losses to merchants and card is-
Accepted 8 July 2018
suers. Furthermore, the associated high false positive declines can cause inconvenience and dissatisfac-
Available online xxx
tion for consumers. We introduce a consumer incentive strategy for merchants to adopt more accurate
Keywords: fraud detection (prevention) techniques, such as secondary verification. We further optimize the strat-
Credit card frauds egy by applying secondary verification only to transactions with values higher than certain thresholds.
Optimal detection strategy We identify the conditions under which the strategy is attractive to merchants, and show that it may
Consumer incentives lead to a ‘win-win-win’ for consumers, merchants, and the card issuer, when the consumer’s tolerance
Case study of false declines is low or/and the incentive amount is within a certain range. In addition, we show that
Financial operations management coordinated decisions by the merchant and the card issuer may generate further benefits. Finally, the
effectiveness of various proposed strategies is demonstrated using actual credit card transaction data.
© 2018 Elsevier Ltd. All rights reserved.

1. Introduction fraud worldwide [2,45]. It is worth noting that banks typically bear
the losses for CP fraud, while merchants bear the losses for CNP
Credit card fraud causes significant financial losses to mer- fraud. It is thus critical for merchants to reduce CNP fraud which
chants and financial services companies (banks) that issue credit is the focus of this paper.
cards. According to Robertson [40], the worldwide card fraud losses Card issuers and network providers rely on machine learning
rose from $7.6 billion in 2010 to $21.81 billion in 2015, or 300% (ML) models for credit card fraud detection. Even though a sig-
over 5 years. By 2020, global card fraud losses are expected to nificant amount of research has been done in both industry and
reach to $31.67 billion. academia to improve ML models, effective solutions remains a
There are two major types of credit card fraud: card present challenge [24] (reasons to be discussed later); current ML mod-
(CP) fraud, such as counterfeit cards used at the point-of-sale or els for credit card fraud generate a high volume of false declines
an auto teller machine, and card-not-present (CNP) fraud, which (false positive). In fact, it has been reported in [47] that every le-
occurs when transactions are made online or via mail, telephone, gitimate decline is accompanied by as many as 40 false declines,
or mobile apps [24,40]. With the introduction and adoption of the which means that 97% of transactions flagged as high-risk could
Europay, Mastercard, and Visa (EMV) chip card [16], CP fraud has be legitimate transactions. Other reports, like [31,46], suggest sim-
been reduced dramatically in recent years. According to Robertson ilar performance; in order to detect half of the fraud (about 50 0 0
[40], losses due to counterfeit cards in US in the first quarter of transactions), the ML algorithm generates about 6,0 0 0,0 0 0 false
2016 were reduced more than one-third as compared to the same positives.
quarter in the previous year. CNP fraud, on the other hand, has The high amount of false declines causes inconvenience, dissat-
increased dramatically worldwide in recent years, due to the pop- isfaction, and negative shopping experiences for consumers. As re-
ularity of ecommerce and as fraudsters have shifted their attacks ported in [35], 61% of cardholders who experience false declines
from CP to CNP transactions. In the US market, CNP fraud loss is decrease or even completely stop card use. False declines also lead
expected to grow from $2.8 billion in 2014 to $7.2 billion in 2020 to significant revenue loss for merchants [31,46,47] (and thus card
[3]. Overall, the CNP fraud now accounts for more than 70% of card issuers). Indeed, according to the report of [5], falsely declined card
transactions cost US ecommerce merchants an estimated $8.6 bil-
lion in 2016, which is much more than the $6.5 billion savings

Corresponding author. from the fraud detection. The unreliable performance of current
E-mail addresses: dwang@udel.edu (D. Wang), bchen@udel.edu (B. Chen), ML fraud detection models puts merchants in what [22] calls a
jchen@dal.ca (J. Chen).

https://doi.org/10.1016/j.omega.2018.07.001
0305-0483/© 2018 Elsevier Ltd. All rights reserved.

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

2 D. Wang et al. / Omega 000 (2018) 1–17

merchant’s dilemma; the merchant must decide whether to accept


the ML models’ false positives or to simply accept all transactions
(and thus absorb the losses due to fraudulent transactions).
While card fraud happens globally, its severity varies by coun-
try. Card fraud is more prevalent in the US than in many other
countries. Among 20 countries surveyed by the [26,45] in 2016,
based on data from the past 5 years, US was ranked the second
highest in card fraud rate; 46% of cardholders in US incurred credit
card fraud, as compared to 8%, 12%, and 17%, respectively, for Hun-
gary, Sweden, and Germany. In fact, the US is responsible for 38.7%
of the world’s card fraud, with only 22.9% of total worldwide card
use volume [6]. The major difference between countries is in the
adoption of more effective secondary verification (2V) techniques. Fig. 1. Credit card transaction authorization network.
While this technique, especially a PIN system, is well accepted for
credit card payment in many Asian and European countries, it is
not implemented in US. This is because US consumers are not li- and by coordinating the merchant and the card issuer. In addition,
able for any credit card losses due to fraud, and many of them are we propose an easy-to-implement coordination mechanism to co-
not willing to go through the secondary verification steps in the ordinate the system. Finally, we use real data to show the viability
checkout process. Indeed, an experiment conducted in the US by of the proposed consumer incentive strategy, and illustrate its effi-
Adyen [1] shows that when a 3D secure step (a type of secondary ciency and implementation in improving the system.
verification) is added to the checkout process, 40% of the trans- The paper is organized as follows. Section 2 describes the credit
actions are abandoned at the secure step. As a result, merchants card transaction system and reviews the literature. Section 3 de-
worry about potential revenue losses and are reluctant to adopt scribes the model, and Section 4 introduces the consumer incen-
the more secure fraud detection technique [12]. It is interesting to tive strategy of implementing secondary verification, and compares
note that card issuers also do not have an incentive to introduce with existing strategies. Section 5 focuses on developing further
secondary verification, since they are not liable for CNP fraud; their improvements of the incentive strategy by optimally identifying
revenue depends on transaction volume. the thresholds between high-value and low-value credit card trans-
Our research is motivated by the observation that merchants actions. The improved strategy is shown to be a ‘win-win-win’ sys-
seem to have the most to gain or lose from the effectiveness of tem, when the consumer’s tolerance of false declines and the in-
fraud detection. Given the poor performance of the current ML centive amounts are within a certain range. Section 6 shows that
credit card fraud detection models, implementing secondary ver- further improvement can be achieved via merchant and card is-
ification seems to be a relatively effective way of reducing credit suer coordination. Section 7 is a case study using real data to
card fraud, and the key to implementing secondary verification is test the viability of implementing the consumer incentive strategy.
to incentivize the consumers. In this paper, we propose a consumer Section 8 concludes the paper and discusses future research direc-
incentive strategy to implement secondary verification for credit tions. All proofs are in the Appendix.
card fraud detection. We are interested in finding out, from a mer-
chant’s perspective, when it is beneficial to accept all transactions, 2. Industry background and relevant literature
when the current ML fraud detection is sufficient, and when the
more advanced secondary verification should be adopted. We show Understanding the credit card transaction system is critical to
that secondary verification with consumer incentive may benefit the economic analysis carried out in the paper. We start by de-
the merchant. We further study the benefits of the proposed strat- scribing the typical process and analyzing the role and economic
egy of only requesting secondary verification for the small portion incentives for each player in the system. We then provide a brief
of transactions with high value. The optimal threshold transaction review of the literature relevant to credit card fraud detection, in-
value, above which the secondary verification is requested, is de- cluding ML algorithms, and secondary verification.
rived. We show that our proposed strategy with consumer incen- Fig. 1 provides an overview of the credit card transaction au-
tive may lead to a ‘win-win-win’ for consumers, the merchant, and thorization system, including the transaction path and decision-
the card issuer. In addition, a coordination method is proposed to making process [13]. Five players are involved: consumer, mer-
further benefit the merchant and the card issuer. Finally, the ef- chant, (merchant) acquirer, network (provider), and (card) issuer. A
fectiveness of the proposed strategies is demonstrated using actual consumer purchases product from a merchant (such as Home De-
bank credit card transaction data. pot) using a credit card from an issuer (such as Chase Bank) that
This paper contributes to the literature and practice in several is associated with a network provider (such as VISA). The issuer
areas. First, most of the existing work on credit card fraud detec- is typically a bank or a financial institution that offers the net-
tion focuses on improving ML models and algorithms. This paper, work provider branded payment cards directly to consumers. The
to the best of our knowledge, is among the first to provide an aca- merchant acquirer is often also a bank or financial institution, and
demic study of credit card fraud detection from a systems perspec- processes card payments on behalf of the merchant. It allows mer-
tive. By analyzing the roles and incentives of each player in the chants to accept credit card payments from the issuer within the
credit card transaction network, we find that merchants have more network provider. The network provider, such as VISA and Master-
incentives to improve credit card fraud detection than other play- Card, also known as the card association, provides a branded plat-
ers in the system, including card issuers, who have conventionally form for the execution of payment transactions. A transaction is
been thought to be more motivated. Second, we identify the con- authorized by the system through 8 steps: (1) the consumer re-
ditions under which strategy can be better off for the merchant. quests a purchase from the merchant; (2) the merchant submits
Third, we introduce a consumer incentive strategy, which may lead the request to the acquirer; (3,4) the acquirer sends the request to
to ‘win-win-win’ for consumers, merchants, and card issuers un- the issuer, through the network provider, to authorize the transac-
der certain conditions, and could resolve the merchant’s dilemma. tion; (5,6) the issuer sends an authorization code (approve or de-
Fourth, we develop a strategy that can further improve the system cline) back to the acquirer; (7) the acquirer authorizes the transac-
by optimally differentiating the values of credit card transactions, tion; (8) the consumer receives the product or service.

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 3

As shown in Fig. 1, the efforts to curb card fraud in the trans- to detect credit card fraud [8,14,36,39]. Techniques used include:
action authorization system can be classified into two categories: logistic regression [32,41], decision tree [9,27,42], random forest
fraud prevention and fraud detection. While fraud prevention at- [8,38,49], and artificial neural network [19,31,34,41]. Unlike suc-
tempts to block fraudulent transactions at the source, fraud de- cessful applications in other areas, however, the performance of
tection aims to identify fraudulent transactions that have already ML models for credit card fraud detection are far from accurate.
passed through the prevention stage. This poor performance can be attributed to several reasons, as ex-
Credit card fraud prevention consists of two layers of verifi- plained in [38]. First, frauds usually represent a very small frac-
cation; the first layer verification includes widely adopted tech- tion, typically less than 0.1%, of all transactions [34]. This produces
nologies such as Address Verification Systems (AVS), which verify what is known as a data unbalance problem [21,37], and most
the cardholder’s billing address and ZIP code, and Card Verifica- ML algorithms cannot extract patterns accurately from unbalanced
tion Method (CVM), which verifies card information, such as card data. Second, in order for an ML algorithm to accurately capture
number, expiration date, and Card Verification Value (CVV) code. the transaction behavior of a consumer, the algorithm would need
Even though it has been widely adopted in US, with an adoption comprehensive transaction data from other banks, and product and
rate higher than 90% [13], first layer verification is not effective, service data from merchants. The reality, however, is that these
since fraudsters are also likely to have this information. Through critical data are not shared among banks and merchants, and they
an agreement, a merchant and the network provider may choose are treated as private assets and business secrets for each bank and
to implement additional more sophisticated and effective but less merchant. These transaction data are also not shared with research
convenient second layer verification [4,23,30,33,51], also known as community, and as a result, research studies on credit card fraud
secondary verification (2V), to be discussed further below. In con- are very limited [8,36]. Finally, fraud behaviors also evolve over
trast to first level verification, the adoption rate of secondary veri- time [18,38], and some fraudsters even have consumers’ shopping
fication is very low; only 10% [13] of merchants, mostly from Euro- behavior and transaction data and can imitate normal transactions,
pean and Asian countries, have adopted the PIN system. The higher which makes credit card fraud detection even more challenging.
level of adoption of 2V in Europe and Asia partially explains the The present paper therefore focuses on studying and evaluating the
lower credit card fraud rate in those areas versus the US [20,26,45]. economics of credit card fraud prevention and detection strategies.
The dashed lines around the 2V module in Fig. 1 represent its ab- We propose a strategy to improve credit fraud detection by opti-
sence from current practice in the United States. mally differentiating the values of credit card transactions, and by
Currently available versions of 2V may include 3D secure, two coordinating the merchant and the card issuer.
factor authentication (2FA), and biometric indicators (in order of To study and evaluate strategies for credit card fraud preven-
increased accuracy and inconvenience to consumers). 3D secure tion and detection, it is imperative to understand the roles of each
refers to static password verification, 2FA verifies a dynamic code player and the associated economic incentives. Each of the five
(one-time password) sent to a consumer’s default device, and bio- players involved in the credit card system, as shown in Fig. 1, bears
metric techniques enhance security by adding bio feature verifi- a different level of risk in the face of card fraud. While consumer
cation, such as finger print and facial recognition. Studies show risks vary from country to country, US consumers hold zero lia-
that 2V techniques are very effective in reducing credit card fraud. bility for any unauthorized transactions [10]. As a result, they are
Orzechowski and Walker [33] report that the fraud losses associ- not interested in adopting more complicated verification methods,
ated with the PIN card are only 1/6 of those associated with the and are more concerned with their shopping experience, which is
signature card. Aloul et al. [4] propose a fast and effective mo- negatively impacted by a high rate of false declines of their credit
bile one-time-password generation system, which is hard to hack. card transactions. A merchant, on the other hand, is responsible for
Jin et al. [23] propose a hybrid security system, which combines losses from all fraudulent CNP transactions [47,48]. Both the card
randomly generated one-time passwords and user bio features, issuer and the merchant suffer from false positive declines, since
such as fingerprints. The hybrid system increases the security level, rejected consumers may seek customer service or abandon their
since it is extremely hard to obtain both the specific code and bio purchases. Finally, the card issuer, the merchant acquirer, and the
features at the same time. Liao and Wang [30] propose to com- network provider all profit from charging the merchant transac-
plete authentication with dynamic ID verification in a multi-server tion fees that are proportional to the volume of transactions, and
system to increase security level. Overall, there are many available they are mostly concerned with the reputation of the brand of the
highly advanced and secure secondary verification tools. The adop- credit card network. Poor performance of credit card fraud preven-
tion rate of 2V is very low, however, especially in the US, due to its tion and detection will lead to reduced market share of the credit
complexity and inconvenience to consumers. Here, therefore, we card brand and cost them in a long run. Our paper focuses on an
propose a consumer incentive mechanism to enable the use of the incentive strategy to motivate the merchant, the card issuer, and
secondary verification for high value transactions. consumers to use secondary verification.
If a transaction passes the fraud prevention step(s) described Interestingly, we have found very few economic models of
above, it is then sent to the card issuer for fraud detection to fil- credit card fraud prevention and detection. To the best of our
ter out fraudulent transactions from legitimate. The fraud detection knowledge, [20] is the only relevant paper; they study a simple
model can be an expert rule system, and/or a more sophisticated duopoly game in which two merchants adopt 3D secure, one of
and effective data-driven machine learning (ML) algorithm. The lat- the simple 2V strategies. They show that in the equilibrium the
ter captures fraudulent transaction patterns by correlating the sta- two merchants will both choose to adopt or not adopt 3D secure,
tus of a transaction with associated features based on historical depending on the benefit from 3D secure, net the opportunity cost
data. An ML algorithm typically generates a fraud probability (or of sales lost due to consumer inconvenience from adopting 3D se-
score) for each transaction. If the algorithm is sufficiently accurate, cure. In this paper, we develop economic models by considering an
the larger the probability, the more likely that the transaction is incentive strategy for merchants to adopt more accurate fraud de-
fraudulent. The probability is then compared with a threshold de- tection/prevention techniques (secondary verification) and by opti-
termined by the card issuer. If the probability is higher than the mizing the strategy for applying the secondary verification only to
assigned threshold, the transaction is declined, and otherwise it is transactions with values higher than certain thresholds.
approved. This decision (code) is then sent to the merchant. Incentive systems have been studied and applied in many dif-
Almost all credit fraud detection research by academia and ferent domains. Feldmann and Muller [17] design an incentive
banks focuses on applying and modifying existing ML algorithms scheme for providing true information in supply chains. They ob-

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

4 D. Wang et al. / Omega 000 (2018) 1–17

serve that the partners in a supply chain may not reveal true in-
formation, such as production ability, to the supply chain, in or-
der to maximize profit. They propose to incentivize the partners
who provide true information, or penalize those who do not pro-
vide true information. The incentive scheme maximizes the sup-
ply chain overall profit and encourages partners to reveal their
true information. Conversely, Wu et al. [50] study incentives for
sharing information under a Cournot duopoly model with capacity
constraints. Their model considers both demand and cost informa-
tion sharing, and shows that the incentive can be reversed under
boundary solutions. Taylor [43] discusses two common forms of Fig. 2. A merchant’s decision tree for a transaction.
channel incentives, linear incentive and target incentive. He shows
that a properly designed target incentive can achieve channel coor-
dination and a win-win outcome. Chen [11] discusses an incentive Table 1
Table of notation.
for the retailer to reveal its information on product return rate.
Consumer incentives have also been examined in the marketing Indexes
and operations literature. Thompson et al., Laroche et al., and Liao i Subscript, index for strategies, i = 1, 2, 3, 4, 5
et al. [28,29,44] study the effects of different consumer incentive
Parameters
mechanisms on sales and on consumer response. From the opera- Si Strategy i
tions and decision-making perspectives, Demirel et al. [15] propose N Total number of transactions in dataset
a genetic algorithm to determine the consumer incentive amount v Transaction value, a random variable following a distribution
for a closed-loop supply chain network. Similarly, Berger and Bech- with a probability density function g( · ) in the range [0, vmax ]
vmax modification of p∗ by proposed method
wati [7] offer a general approach to the organization’s incentive v̄ Expected (average) transaction value
budget allocation to maximize customer equity. r Fraud rate
In our paper, in addition to developing economic models, we α Merchant’s profit margin (percentage)
present an incentive system and propose improved strategies for θ Transaction abandon (incomplete) rate when legitimate
transactions are falsely declined
easy implementation of 2V by the merchant. To the best of our
c Merchant’s unit cost of purchasing the product and processing
knowledge, this is the first study to design an incentive system for a transaction
credit card fraud detection. We also optimize the proposed strate- f0 , f1 False negative and positive rate for machine learning (ML) model
gies to ensure a win-win-win coordination system. In addition, our πi , πiI , πiS Net expected profits of merchant, issuer, and system for
case study using real bank data validates the efficiency and effec- Strategy i, respectively, where πiS = πi + πiI
πiC Consumer’s gain for Strategy i
tiveness of the proposed strategy with incentive system. New man- πB , πBI , πBS Net expected profits of merchant, issuer, and system for
agerial insights are discussed. benchmark case, respectively, where πBS = πB + πBI and
benchmark case is for f 0 = 0 and f 1 = 0
π ij Net profit difference between π i and π j , where πi j = πi − π j
δ Incentive offered by merchant to compensate consumer for
3. Model description
inconvenience related to secondary verification
ρ Interchange fee, the issuer charges the merchant a proportion
We consider a credit card transaction network with one mo- of transaction value
nopolistic ecommerce merchant, one credit card network provider, c2v Cost to consumer for using secondary verification
cμ Handling expense of issuer for falsely declined transaction
one issuing bank, and one acquiring bank. To focus on the profit
analysis for the merchant’s fraud detection strategies, we com- Decision variables
ti Threshold of transaction value above which secondary
bine the credit card network provider, the issuing bank, and the
verification is requested for Strategy i, i = 4, 5
acquiring bank into one ‘aggregated’ bank, since their cost func-
Other notation
tions to the merchant are similar, being proportional to the value g(v) Distribution probability density function for transaction value
of each transaction. We consider N consumer transactions that oc- v(t) Expected transaction value for transaction value larger than t
cur during a given period. Let vi ∈ [0, vmax ], i = 1, . . . , N, represent p(t) Probability of transaction with transaction value larger than t
the value of ith transaction, where vmax is the largest transaction
value. Each transaction value v is assumed to be an independent
and identically distributed (iid) random variable with a probabil-
ity density function g(v) on a support range [0, vmax ]. We denote assume that both f0 and f1 for the bank’s ML model are available

v̄ = vg(v ) dv as the expected value of a transaction. for our analysis. When legitimate transactions are falsely declined
We refer to transactions made by fraudsters as ‘fraudulent (false positive), some consumers may abandon their purchases and
transactions’ and those by consumers as ‘legitimate transactions’. thus the associated transactions. We assume that the abandon rate
To distinguish fraudulent transactions from legitimate transactions, is θ , where 0 ≤ θ ≤ 1. The probabilities of all possible transaction
let r (the fraudulent transaction rate) represent the percentage of outcomes of the ML method in detecting frauds are summarized
transactions being fraudulent. Then 1 − r is the rate of legitimate and illustrated in Fig. 2.
transactions. Most banks adopt ML models to detect fraudulent This paper focuses on fraud detection strategies from the mer-
transactions. To measure the accuracy of an ML model, we com- chant’s perspective, since the merchant bears the most significant
pare the predictions made by the ML model and the actual status economic impact from the outcomes. Let 0 < α ≤ 1 be the mer-
of each transaction. Let f0 represent the false negative rate, which chant’s net profit margin, which is the percentage of net profit
is the probability that the ML model predicts a transaction to be from a transaction of value (v), after the transaction fees are paid
legitimate, but it turns out to be fraudulent; let f1 represent the to the (aggregated) bank. Let c be the merchant’s cost, measured
false positive rate, which is the probability that the ML model pre- as a percentage of the associated transaction value (v) , and let ρ
dicts a transaction to be fraudulent, but it turns out to be legiti- be the percentage fee paid to the bank. Then α = 1 − c − ρ , and
mate. The fraud rate (r), the false negative rate (f0 ), and the false the merchant’s net profit is α v. Since all transactions are iid dis-
positive rate (f1 ) capture the uncertainties in detecting fraud. We tributed, our profit analysis will focus on the expected profit/loss

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 5

from one transaction. Table 1 summarizes the notation used in this 4.3. Strategy 3: Secondary verification for all transactions
paper.
While Strategies 1 and 2 may work well when the fraud rate
is low, more precise fraud detection techniques are needed to
4. Three pure fraud detection strategies for the merchant
handle transactions facing a high fraud rate. As mentioned in
Sections 1 and 2, secondary verification is an effective technique
In this section, we start our discussion with two fraud detection
in preventing fraud. In fact, the PIN system, a simple form of sec-
strategies that are widely used in practice: no fraud detection for
ondary verification, has been widely adopted in most European
all transactions (Strategy 1), and applying an ML fraud detection
and some Asian countries. It faces resistance in the US for two rea-
model for all transactions (Strategy 2). We then introduce a sec-
sons; implementing a secondary verification system requires addi-
ondary verification strategy with consumer incentive, for all trans-
tional effort from consumers, and US consumers are not liable for
actions (Strategy 3). We compare these three strategies by identi-
any credit card fraud. As a result, US consumers have no incen-
fying the conditions under which the merchant benefits most from
tive to cooperate with merchants and banks to implement a more
each strategy.
accurate system associated with additional inconveniences.
On the other hand, banks also have little incentive to imple-
4.1. Strategy 1: No fraud detection for all transactions ment secondary verification, since they are not liable for CNP
fraud, which is becoming a major portion of fraud. If a bank
Due to high false positive declines in the current ML fraud de- switches to secondary verification, it risks losing its customers to
tection models, some merchants request that issuers approve all of competitors who do not use the (inconvenient) secondary verifi-
their transactions, to provide better shopping experiences to their cation. Based on this observation, we propose a consumer incen-
customers. This is the so-called ‘merchant’s dilemma’, in which a tive system, with compensation offered by merchants, to facilitate
merchant voluntarily gives up fraud detection and chooses to bear implementation of secondary verification for fraud prevention. The
all costs of fraudulent transactions to avoid the risk of false de- incentive will be offered for each transaction and could be in the
clines. This corresponds to an ML model with f0 = 1 and f1 = 0 in form of a discount, cash back, bonus points, or other rewards.
the decision tree (Fig. 2). The expected profit of the merchant for Assume that the inconvenience cost associated with each trans-
a transaction under Strategy 1 (π 1 ) is: action for a consumer is c2v . Then the merchant needs to offer an
incentive δ ≥ c2v for each transaction using secondary verification
π1 = [α (1 − r ) − (1 − α )r]v̄. (1) to keep consumers happy and not switching. We assume that if
The first term in the bracket is the expected profit from a legiti- the merchant chooses to use secondary verification, it will do so
mate transaction, and the second term is the fraud loss. Eq. (1) can for all transactions. For simplicity of analysis, we assume that the
be simplified as: secondary verification is perfectly accurate in identifying fraudu-
lent transactions and costs nothing to implement. In reality, sec-
π1 = (α − r )v̄. (2) ondary verification is often implemented by the network provider,
who will charge the merchant an additional small percentage of
It is clear from (2) that the merchant, if choosing no fraud detec- the transaction fee, proportional to the transaction value. Our ro-
tion, will be profitable only if its net profit margin is higher than bust test shows that this will not affect the major results and in-
the fraud rate. We denote r̄1 = α as the maximum fraud rate al- sights in our paper.
lowed for Strategy 1 for subsequent comparisons. In view of the decision tree in Fig. 2, the merchant’s expected
profit is:
4.2. Strategy 2: ML detection model for all transactions π3 = (α v̄ − δ )(1 − r ). (5)

As the fraud rate (r) increases, the performance of Strategy 1 Notice that the merchant’s net expected profit is the profit from
deteriorates. In practice, most merchants still rely on the bank’s the legitimate transactions minus the incentive that is given to the
ML fraud detection models to protect their transactions. The per- consumers for the use of the secondary verification. Clearly, the
formance of an ML model depends on its accuracy, which is mea- merchant is profitable only if the paid incentive δ ≤ δ̄3 = α v̄.
sured by f0 and f1 . In view of the decision tree in Fig. 2, we obtain
the expected profit of the merchant as follows: 4.4. The merchant’s best strategy

π2 = {α (1 − r )[(1 − f1 ) + (1 − θ ) f1 ] − (1 − α )r f0 }v̄, (3) We now identify the merchant’s best option by comparing
three strategies discussed above. The result is summarized in
where the first term represents the expected profit from a legiti- Proposition 1 and illustrated in Fig. 3.
mate transaction and the second term is the expected loss from a
false negative fraudulent transaction. Eq. (3) can be written as: Proposition 1. Among three pure strategies, Strategies 1, 2, and 3,
the merchant will choose:
π2 = {α (1 − θ f1 ) − r[α (1 − θ f1 ) + (1 − α ) f0 ]}v, (4)
(1) Strategy 1 if and only if (θ ≥ θ 12 , δ ≥ δ 13 , and r ≤ r̄1 );
It is clear from (4) that the merchant’s expected profit is nega- (2) Strategy 2 if and only if (θ ≤ θ 12 , δ ≥ δ 23 , and r ≤ r̄2 );
tively impacted by the ML model’s false positive rate (f1 ) and false (3) Strategy 3 if and only if δ ≤ min(δ13 , δ23 , δ̄3 );
negative rate (f0 ), and the impact of f1 is higher than that of f0 , (4) not to do business, as it cannot be profitable, otherwise; where
especially when the abandon rate θ due to false declines is high. θ12 = (1−αα(1)−r
r ( 1− f 0 )
, δ13 = r (11−−rα )v̄ , δ23 =
αθ (1−r ) f1 +(1−α )r f0
v̄, r̄1 =
)f1 1−r
In addition, the merchant is profitable only when the fraud rate α (1−θ f1 )
α (1−θ f ) α , r̄2 = α (1−θ f1 )+(1−α ) f0 , and δ̄3 = α v̄.
(r) is lower than the upper bound r̄2 = α (1−θ f )+(11−α ) f , which in-
1 0
creases with the merchant’s profit margin (α ) and the accuracies Proposition 1 shows that there is no strictly dominant strat-
(1 − f0 , 1 − f1 ) of the ML model. For most ML models, we have egy for the merchant. The most beneficial strategy is impacted
f1 + f0 < 1, which leads to r̄2 > r̄1 . This implies that the merchant by several factors: fraud rate (r), consumer’s abandon rate (θ ), in-
is more likely to be profitable when it adopts an ML model, espe- centive for compensation (δ ), the merchant’s margin profit (α ),
cially when the fraud rate is high. the average transaction value (v̄), the probability that a fraudulent

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

6 D. Wang et al. / Omega 000 (2018) 1–17

secondary verification for high-value transactions and ML fraud de-


tection for low-value transactions. We are interested in determin-
ing the optimal transaction value thresholds for both strategies.
Furthermore, we show that the mixed strategies dominate the cor-
responding pure strategies for a wide range of transaction value
thresholds, and offer robust performance.

5.1. Strategy 4: Secondary verification for high-value transactions and


no fraud detection for low-value transactions

In Strategy 4, we introduce a threshold (t) such that all trans-


actions with values higher than t are required to go through sec-
ondary verification, and the remaining transactions are automat-
ically approved. The merchant optimizes the threshold to maxi-
v
mize its net profit. We first define v(t ) = t max vg(v ) dv and p(t ) =
 vmax
t g(v ) dv as the average value of transactions that are higher
than t, and the probability of a transaction with value higher than
t, respectively. With the merchant’s decision tree in Fig. 2, the mer-
Fig. 3. The merchant’s strategy choice if three strategies are available.
chant’s net expected profit is given:
π4 (t ) = α (1 − r )v̄ − (1 − α )r[v̄ − v(t )] − δ (1 − r ) p(t ). (6)

transaction is approved (f0 ), and the probability that a legitimate The first term on the right-hand side of (6) is the profit from legit-
transaction is declined (f1 ). Note that f0 and f1 mainly depend on imate transactions, and the last two terms are the expected fraud
the prediction accuracy of the ML model, while α is usually pre- loss generated by the low-value transactions and compensation
decided by the merchant, and v̄ depends on consumers’ purchase costs for the high-value transactions using secondary verification.
value. Three parameters, fraud rate (r), consumer’s abandon rate Clearly, as the threshold t approaches 0 or vmax , Strategy 4 reduces
(θ ) due to a legitimate transaction being falsely declined by the ML to Strategy 3 or Strategy 1, respectively. Eq. (6) can be written as:
detection model, and the incentive to compensation for the sec-
ondary verification (δ ), directly capture the credit card fraud issue π4 (t ) = α v̄ − δ p(t ) − r[v̄ − (1 − α )v(t ) − δ p(t )]. (7)
as well as the detection approaches. Proposition 1 clearly defines Eq. (7) suggests that Strategy 4 is profitable if and only if r ≤ r̄4 ,
the merchant’s strategy space, which varies with these three pa- α v̄−δ p(t )
where r̄4 = v̄−(1−α )v(t )−δ p(t ) . Notice that r̄4 > r̄1 , where r̄1 is the
rameters, when there are three strategies available. The implication
corresponding threshold for Strategy 1 (Proposition 1). This implies
of Proposition 1 is that it provides the merchant an easy way to se-
that when the fraud rate (r) is higher, the merchant is more likely
lect its strategy if the three pure strategies are available. It implies
to be profitable with Strategy 4 rather than the pure Strategy 1.
that after the merchant carefully estimates r, θ , and δ from its ex-
To maximize the expected profit in (7), the problem can be
perience, or historical data, or industrial reports, and estimates f0
rewritten as:
and f1 for the ML detection model, it can calculate the boundaries
(θ12 , δ13 , δ23 , r̄1 , r̄2 and δ̄3 ) given in Proposition 1. max π4 (t ) subject to t ∈ [0, vmax ]. (8)
t
As illustrated by Fig. 3, when both the fraud rate r and sec-
With (8), we can prove that there exists a unique optimal thresh-
ondary verification compensation rate δ are high, none of the three
old t4∗ , above which secondary verification is requested by the mer-
pure strategies works well and the merchant cannot make a profit
chant. We summarize the result in Proposition 2 as follows:
no matter which strategy it chooses. If the compensation rate (δ ) is
sufficiently low, it is economical for the merchant to choose Strat- Proposition 2. When the merchant uses Strategy 4, there exists a
egy 3 and incentivize consumers to do secondary verification for unique optimal threshold transaction value (t4∗ ), which is given by:
all transactions. On the other hand, if the fraud rate r is low, the  
merchant should consider Strategy 1 or 2, since the benefit of us- ( 1 − r )δ
t4∗ = min , vmax . (9)
ing secondary verification diminishes. Whether to adopt Strategy r (1 − α )
1 or Strategy 2 depends on the consumer’s abandon rate θ in the
)δ )δ
face of false positive declines. Strategy 1 is better if the abandon Eq. (9) indicates that t4∗ = r((11−r
−α )
if and only if r((11−r
−α )

r (1−α )
rate is high, since by accepting all transactions it eliminates all vmax , which leads to δ ≤ δ4 = 1−r vmax ; otherwise, t4 = vmax .

false positive declines. Strategy 2 is better otherwise. Proposition 2 shows that when the merchant must pay a high
compensation for secondary verification (δ > δ 4 ), the best option
5. Optimal strategy design is simply not to use the secondary verification with incentive
(t4∗ = vmax ), as the benefit cannot be offset by the high compen-
Section 4 shows that none of the three pure strategies dom- sation. Instead, using a no-detection policy is more profitable. No-
inates, and each has its advantages and disadvantages. Strategies tice that δ 4 decreases with the merchant’s margin profit (α ), sug-
1 and 2 are less accurate in detecting fraudulent transactions but gesting that when the merchant cannot make a high margin profit
are easy to implement. Strategy 3, on the other hand, is accurate from a transaction, it is less likely to offer an incentive, or it can-
but will be costly to implement, due to the need to offer incen- not pay a high incentive, to implement secondary verification for
tives to the cardholder. Since the value of transactions varies signif- high-valued transactions by compensating the consumer for incon-
icantly between 0 and vmax , it is natural to consider mixed strate- venience. The implication is that low profit-margin merchants may
gies that apply more accurate but costly fraud detection for high- not be able to offer those consumers who have high transaction
value transitions and less accurate methods for lower-value trans- values a high incentive to implement secondary verification. In ad-
actions. We propose two mixed strategies in this section; Strategy dition, δ 4 increases with fraud rate (r), suggesting that as the fraud
4 applies secondary verification for high-value transactions and no rate increases the merchants are more likely to implement sec-
fraud detection for low-value transactions, and Strategy 5 applies ondary verification, or it is worth offering a high incentive in order

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 7

to implement secondary verification. For the extreme case, if and we see that when δ ≥ δ 13 , Strategy 1 is strictly better than Strat-
only if all transactions are fraudulent (r = 1), the optimal thresh- egy 3, while Strategy 3 is strictly better than Strategy 1 if δ < δ 13 .
old transaction value becomes zero (t4∗ = 0). In such a case, Strat- Points (2) and (3) in Lemma 1 show that even if the merchant
egy 4 is reduced to Strategy 3, in which it is optimal for the mer- does not use the optimal transaction value threshold (t4∗ ), it can
chant to implement secondary verification for all transactions. On select a range of t for Strategy 4 that is better than Strategy 1
the other hand, secondary verification becomes unusual or unnec- (t 4 ≤ t ≤ vmax ) and Strategy 3 (0 ≤ t ≤ t̄4 ). Lemma 1 implies that
essary when the fraud rate is very low (r → 0). the mixed Strategy 4 is better for the merchant, as compared to
Interestingly, Proposition 2 indicates that the optimal threshold either of the pure strategies, either Strategy 1 or Strategy 3, for a
t4∗ in Strategy 4 is independent of the distribution of transaction wide range of threshold choices (t 4 < t4∗ < t̄4 ).
values. This allows for convenient implementation of Strategy 4; We now propose and discuss Strategy 5, in which instead of no
the merchant can easily determine when it should request sec- prevention for low transactions, the merchant uses the ML detec-
ondary verification, as it only needs to estimate the fraud rate (r), tion model, as compared to Strategy 4.
its margin profit (α ), and the incentive for compensation of each
transaction (δ ). Both the fraud rate and the margin profit can be 5.2. Strategy 5: Secondary verification for high-value transactions
estimated from historical data or a careful cost estimate. (9) shows and ML detection for low-value transactions
that the threshold of transaction value (t4∗ ) increases with the mer-
chant’s margin profit (α ) and the compensation fee (δ ), and de- Let t again be the transaction value threshold. With the mer-
creases with fraud rate (r), suggesting that when the merchant can chant decision tree in Fig. 2, the merchant’s expected profit is:
gain a high margin profit or must pay a high compensation, it
should raise the bar for requesting secondary verification. This is π5 (t ) = [α (1 − r )(1 − θ f1 ) − (1 − α )r f0 ][v̄ − v(t )]
because the high profit margin reduces the risk of the loss from +α (1 − r )v(t ) − δ (1 − r ) p(t ). (11)
fraudulent transactions, and the high threshold reduces the com-
The first two terms of the right-hand side of (11) are the profit
pensation costs; when more transactions are fraudulent and the
from transactions of low value and high value, respectively. The
compensation is cheaper, the merchant should request secondary
last term is the compensation costs for high-value transactions
verification for more transactions, as fraud becomes a serious is-
due to the request for secondary verification. Similar to Strategy
sue.
4, (11) suggests that Strategy 5 is profitable if and only if r ≤ r̄5 ,
In particular, Strategy 4 may reduce to Strategy 1 (Proposition 2 α (1−θ f )v̄+αθ f v(t )−δ p(t )
where r̄5 = α v̄[(1−α ) f1 −αθ f ][1v̄−v(t )]−δ p(t ) . Notice that r̄5 > r̄2 , where
for the case when t4∗ = vmax ) if it is costly to incent consumers to 0 1

use the secondary verification. Strategy 4 may also reduce to Strat- r̄2 is the corresponding threshold for Strategy 2 (Proposition 1).
egy 3 in the case when t4∗ = 0, when the fraud rate (r) approaches This implies that the merchant is more likely to be profitable when
1 or when it is costless to use secondary verification (for example, it applies Strategy 5 rather than the pure Strategy 2, if both the
no incentive is offered to the consumer. That is δ = 0). fraud rate (r) and the consumer’s abandon rate (θ ) are higher. Eq.
Next, we show that the mixed strategy dominates the corre- (11) can be written as:
sponding pure strategies if the transaction threshold is optimally π5 (t ) = γ1 v̄ + γ2 v(t ) − δ (1 − r ) p(t ), (12)
chosen, and furthermore this dominance holds for a wide range of
thresholds. Reorganizing (7), we have: where γ1 = α (1 − r )(1 − θ f1 ) − (1 − α )r f0 and γ2 = r (1 − α ) f0 +
(1 − r )αθ f1 .
π4 (t ) = π1 + (1 − α )rv(t ) − δ (1 − r ) p(t ). (10) The optimal transition threshold can be found by maximizing

With (10), we see that when vp((tt )) = r((11−r
−α )
, then π4 (t ) = π1 . Let the expected profit in (12):
t4 be the boundary for π4 (t ) = π1 . We also compare (10) to the max π5 (t ) subject to t ∈ [0, vmax ]. (13)
merchant’s profit in (5) for Strategy 3, and we have π4 (t ) = π3 t
−v(t ) (1−r )δ
if 1v̄−p(t ) = r (1−α ) . Let t̄4 be the boundary for π4 (t ) = π3 . Notice Proposition 3 summarizes the properties of the optimal threshold
)δ )δ (t5∗ ) for Strategy 5:
that r((11−r
−α )
= t4∗ if and only if r((11−r
−α )
≤ vmax (see Proposition 2). We
have the following result that is summarized in Lemma 1. Proposition 3. When the merchant uses Strategy 5, there exists a
Lemma 1. unique optimal threshold transaction value (t5∗ ) that maximizes its ex-
pected profit and the optimal threshold is given by:
(1) Strategy 4 with the optimal transaction threshold t = t4∗ dominates  
both Strategy 1 and Strategy 3; ( 1 − r )δ
t5∗ = min , vmax . (14)
(2) When δ ≥ δ 13 , Strategy 4 dominates Strategy 3 for any t ≥ 0, and γ2
dominates Strategy 1 for t 4 ≤ t ≤ vmax ;
where γ 2 is given in (12).
(3) When δ < δ 13 , Strategy 4 dominates Strategy 1 for any t ≥ 0, and
dominates Strategy 3 for 0 ≤ t ≤ t̄4 , where t 4 < t4∗ < t̄4 . Eq. (14) indicates that t5∗ = (1−r )δ (1−r )δ
γ2 , if and only if γ2 ≤ vmax ,
γ2
Lemma 1 indicates that Strategy 4 dominates Strategy 1 and which leads to δ ≤ δ5 = 1−r vmax ; otherwise, t5 = vmax . Similar to

Strategy 3 when the merchant sets the optimal transaction thresh- Proposition 2, Proposition 3 shows that when the merchant must
old t = t4∗ . Based on the definition of t4 and t̄4 above, we have pay a high compensation for a high-value transaction (δ > δ 5 ),
for t 4 < t < t̄4 , then π 4 (t) > π 1 and π 4 (t) > π 3 . Since t 4 < t4∗ < t̄4 , the best option is to not use the secondary verification with in-
point (1) in Lemma 1 holds. Strategy 4 is mixed strategy of Strat- centive, as the benefit from using secondary verification cannot
egy 1 and Strategy 3, and takes advantage of secondary verifica- cover the high compensation. Instead, the use of the ML detec-
tion only for high-value transactions. The intuition is that, as com- tion model for all transactions can be more profitable, although it
pared to pure Strategy 1, Strategy 4 reduces revenue loss from may cause some false declined non-fraudulent transactions or/and
high-value fraudulent transactions although the merchant must some falsely approved fraudulent transactions. Notice that δ 5 in-
pay compensation to the customers; as compared to Strategy 3, creases with fraud rate (r) and the consumer’s abandon rate (θ ),
Strategy 4 saves on compensation paid for secondary verification suggesting that as r or θ increases, the merchant is more likely to
on low-value transactions (where the compensation would not be provide a high compensation to consumers with high-value trans-
offset by the savings through fraud detection). From Proposition 1, actions for implementing secondary verification.

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

8 D. Wang et al. / Omega 000 (2018) 1–17

Eq. (14) gives that the threshold of transaction value (t5∗ ) in-
creases with the merchant’s margin profit (α ) if (1 − r )θ f 1 − r f0 <
0; otherwise, it decreases with α ; this suggests that when the
probability that a fraudulent transaction is approved is higher than
the probability that a legitimate transaction is abandoned due to
being falsely declined, the merchant should optimally set a high
threshold (t5∗ ) of transaction values, as long as its margin profit is
large. That is, if the impact of an approved fraud is high relative
to that of a declined legitimate transaction, the merchant should
focus on mitigating these two errors on high value transactions if
it can enhance its margin profit; while the impact of an approved
fraud is low relative to that of a declined legitimate transaction,
the merchant should focus on mitigating these two errors on rela-
tively low value transactions if it can enhance its margin profit. In
addition, t5∗ decreases while δ 5 increases with r, f0 , and f1 , and this
suggests that when fraud rate (r) is higher, or when the probabil-
ity that a fraud is approved (f0 ) is higher, or the probability of a
legitimate transaction being declined is higher (f1 ), the impact of
fraud becomes more serious, and the merchant should request sec-
ondary verification at a lower transaction value, even at the cost of Fig. 4. The merchant’s strategy choice between strategy 4 and strategy 5
a higher incentive (δ ). (‘+’ and ‘−’ represent the merchant’s positive and negative profits, respectively).
(1−r )θ f α
With (9) and (14), we have when r (1− f )1 < 1− ∗
α , then t4 < t5

0
and δ 4 > δ 5 ; otherwise, t4∗ > t5∗ and δ 4 < δ 5 . This implies that in (2) When δ ≥ δ 23 , Strategy 5 dominates Strategy 3 for any t ≥ 0, and
Strategy 5 the merchant should set a high bar for high-value trans- dominates Strategy 2 for t 5 ≤ t ≤ vmax ;
actions for using secondary verification, and probably a compensa- (3) When δ < δ 23 , Strategy 5 dominates Strategy 2 for any t ≥ 0, and
tion lower than that in Strategy 4 (t4∗ < t5∗ and δ 4 > δ 5 ) only when dominates Strategy 3 for 0 ≤ t ≤ t̄5 , where t 5 < t5∗ < t̄5 .
the ratio of the probability that a legitimate transaction is aban-
doned to the probability that a fraud is correctly declined is suf- Lemma 2 indicates that Strategy 5 dominates Strategy 2 and
ficiently low (< 1− α Strategy 3 when the merchant sets the optimal transaction thresh-
α ). In other words, it is not worth it for the
merchant to provide an incentive to compensate the consumer for old t = t5∗ . From the definition of t5 and t̄5 above, we have for t 5 <
inconvenience at relatively low transaction values. t < t̄5 , then π 5 (t) > π 2 and π 5 (t) > π 3 . Since t 5 < t5∗ < t̄5 , point (1)
Interestingly, similar to t4∗ in Proposition 2, t5∗ is independent in Lemma 2 applies. The intuition is that Strategy 5 takes advan-
of the distribution. This implies that to implement Strategy 5, tage of secondary verification only for high-value transactions by
the merchant can easily find out when it should request sec- mixing Strategy 2 and Strategy 3. As compared to pure Strategy 2,
ondary verification, as it only needs to estimate several parameters. by compensating customers with high-value transactions for using
(14) shows that the threshold of transaction value (t5∗ ) increases the secondary verification, Strategy 5 reduces revenue loss from
with the incentive (δ ), and decreases with fraud rate (r) and the high-value fraudulent transitions; as compared to Strategy 3, Strat-
consumer’s abandon rate (θ ), suggesting that when the merchant egy 5 saves the costly compensation for customers with low-value
provides a high incentive it should raise the bar for request of sec- transactions for using the secondary verification (the benefit from
ondary verification, to reduce the possible frequency of use; when using Strategy 3 instead of Strategy 5 cannot offset the compen-
more transactions are fraudulent or consumer’s abandon rate (θ ) sation). In addition, from Proposition 1, we see that when δ ≥ δ 23 ,
for low-value transactions is high, the merchant should request Strategy 2 is strictly better than Strategy 3 and Strategy 3 is strictly
secondary verification when the transaction value is relatively low, better than Strategy 2 if δ < δ 23 . Points (2) and (3) allow the mer-
as the lost sales due to abandoned transactions becomes the con- chant to select a range of t for Strategy 5 that is better than Strat-
cern to the merchant. egy 2 (t 5 ≤ t ≤ vmax ) and Strategy 3 (0 ≤ t ≤ t̄5 ), if the merchant
In particular, Strategy 5 may reduce to Strategy 2 (Proposition 3 does not use the optimal transaction value threshold (t5∗ ).
for the case if t5∗ = vmax if δ > δ 5 ), when the merchant must to pay
a high incentive. Strategy 5 may also reduce to Strategy 3 for the 5.3. Comparison between strategy 4 and strategy 5
case when t5∗ = 0, when the fraud rate (r) approaches 1 or when it
is costless to use secondary verification (no incentive for consumer Notice that the two mixed strategies differ only in the fraud
at all, or δ = 0). detection choices for the low-value transactions. After deriving the
Rewriting (12), we have: optimal threshold transaction values (t4∗ and t5∗ ), we compare the
merchant’s optimal profit π5 (t5∗ ) in Strategy 5 to π4 (t4∗ ) in Strategy
π5 (t ) = π2 + γ2 v(t ) − δ (1 − r ) p(t ). (15) 4. The result is summarized in Lemma 3 and illustrated in Fig. 4,

which is like the comparison between Strategies 1 and 2.
With (15), we see that when vp((tt )) = (1−r γ2 , then π5 (t ) = π2 . Let
t5 be the boundary for π5 (t ) = π2 . We also compare (15) to the Lemma 3. The merchant chooses:
merchant’s profit in (5) for Strategy 3, and we have π5 (t ) = π3 if (1) Strategy 5 if and only if θ ≤ θ 12 and r ≤ r̄4 ;
v̄−v(t ) )δ
1−p(t )
= (1−r
γ . Let t̄5 be the boundary for π5 (t ) = π2 . Notice that (2) Strategy 4 if and only if θ > θ 12 and r ≤ r̄5 ;
2
(1−r )δ ∗ (1−r )δ r̄4 =
γ2 = t5 if and only if γ2 ≤ vmax (see Proposition 3). Then we
(3) not to process any transaction, otherwise, where
α v̄−δ p(t ) α (1−θ f1 )v̄+αθ f1 v(t )−δ p(t )
have the following result. v̄−(1−α )v(t )−δ p(t ) and r̄5 = α v̄+[(1−α ) f −αθ f ][v̄−v(t )]−δ p(t ) .
0 1

Lemma 2. Notice that the breakeven line θ 12 for choosing a strategy


between Strategy 4 and Strategy 5 is exactly same as that
(1) Strategy 5 with the optimal transaction threshold t = t5∗ dominates of for choosing a strategy between Strategy 1 and Strategy 2
both Strategy 2 and Strategy 3; (Proposition 1). r̄4 and r̄5 ensure the merchant’s positive profits

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 9

in Strategy 4 and Strategy 5, respectively. Notice that in Fig. 4, issuer’s expected profit (π2I ) is:
the regions between the red and black dashed lines are where
the merchant cannot be profitable if either Strategy 1 or Strategy π2I = ρ [(1 − r )(1 − f1 ) + (1 − r )(1 − θ ) f1 + r f0 ]
2 is adopted, implying that either Strategy 4 or Strategy 5 could × v̄ − cμ (1 − r )(1 − θ ) f1 . (16)
be more applicable with a higher fraud rate (r) or/and a higher
The first three terms on the right-hand side of (16) are the issuer’s
consumer’s abandon rate (θ ). The intuition is that when π4 (t4∗ ) =
revenue from approved legitimate transactions, declined legitimate
π5 (t5∗ ), we can find t4∗ = t5∗ , which suggests that it is optimal for
and complete transactions, and approved fraudulent transactions,
the merchant to require the same portion of high-value transac-
respectively; the last term is the issuer’s handling costs for falsely
tions for secondary verification for both Strategy 4 and Strategy
declining legitimate transactions. Eq. (16) can be written as:
5. By requiring secondary verification for high-value transactions,
the merchant can be profitable even with a higher fraud rate (see π2I = ρ [(1 − r )(1 − θ f1 ) + r f0 ]v̄ − cμ (1 − r )(1 − θ ) f1 . (17)
r̄4 > r̄1 and r̄5 > r̄2 ), as compared to Strategies 1 and 2. This im-
Clearly, (17) represents the issuer’s expected profit which is the
proves the merchant’s performance in the presence of fraud trans-
difference between the revenue from all completed transactions
actions.
and the handling costs for falsely declining legitimate transactions.
If the merchant adopts Strategy 5, the issuer’s expected profit
(π5I (t )) is:
6. ‘Win-Win-Win’ system
π5I (t ) = ρ [(1 − r )(1 − f1 ) + (1 − r )(1 − θ ) f1 + r f0 ](v̄ − v(t ) )
Section 5 shows that both mixed strategies, by combining the
+ρ (1 − r )v(t ) − cμ (1 − r )(1 − θ ) f1 (1 − p(t )). (18)
consumer-incentivized secondary verification with the currently
used fraud detection practices (no fraud detection or ML fraud de- The first three terms on the right-hand side of (18) are the is-
tection), lead to profit improvements for the merchant, after more suer’s revenue from approved legitimate low-value transactions,
than compensating the inconveniences for the consumers. There- declined legitimate but complete low-value transactions, and ap-
fore, Strategies 4 and 5 lead to ‘win-win’ for both the merchant proved fraudulent transactions with low value, respectively; the
and consumers. In this section, we show that these mixed strate- fourth term is the revenue from approved legitimate high-value
gies are also likely to be winning strategies for the card issuer (the transactions; the last term is the issuer’s false decline handling
bank). In addition, we show that when the merchant and the bank cost for declined and complete low-value legitimate transactions.
coordinate in their mixed strategy threshold decision, their prof- Eq. (18) can be written as:
its can be improved further. We will focus our study on Strategy
π5I (t ) = ρ [(1 − r )(1 − θ f1 ) + r f0 ](v̄ − v(t ) )
5, since in current practice card issuers do not commonly approve
all transactions (Strategy 1), even when requested by merchants. +ρ (1 − r )v(t ) − cμ (1 − r )(1 − θ ) f1 (1 − p(t )). (19)
Instead, most use ML fraud detection (Strategy 2).1 Then (19) represents the issuer’s expected profit, the revenue from
We start by analyzing the credit issuer’s net profit. The issuer all completed transactions (low- and high-value transactions) mi-
typically earns an interchange fee from each complete transaction, nus the handling costs for falsely declined legitimate transactions.
which is a fixed percentage (ρ ) of the transaction value (v). If a Comparing (19) when t = t5∗ to (17), we have the following re-
consumer’s transaction is declined by mistake (false positive), the sult:
issuer will also incur a cost of cμ for related customer services.
By adding secondary verification for high-value transactions, the Lemma 4. As compared to Strategy 2, the issuer is more profitable
issuer clearly reduces the customer service cost. It remains to be when the merchant uses Strategy 5, if and only if θ ≥ θ̄ , where θ̄ =
ρ r f0 v(t5∗ )−(1−r )cμ f1 p(t5∗ )
seen if the added secondary verification has any negative impact .
(1−r ) (ρv(t5∗ )−cμ p(t5∗ ) ) f1
on the interchange fee earned by the issuer. In practice, when
a fraudulent transaction occurs, the card-holding consumer will With Lemma 2, Lemma 4 shows that if the merchant holds
claim a chargeback. The chargeback process is complex and is nor- full liability to fraud, the merchant’s optimal Strategy 5 benefits
mally resolved case by case. The chargeback amounts paid back not only the merchant, but also the credit card issuer, when the
by the merchant and the bank depend on their liabilities. Some- consumer’s abandon rate (θ ) is sufficiently high (θ ≥ θ̄ ). Here θ̄
times they split the chargeback, based on what they earned from is solved by setting π2I = π5I (t ) (in (17) and (19)), which is the
the transaction. That is, the merchant pays back (1 − ρ )v and the breakeven abandon rate when Strategy 2 and Strategy 5 are equiv-
issuer pays back ρ v. In this case, the net interchange fees earned alent for the issuer. As long as the actual consumer abandon rate
by the issuer are simply those from normal transactions. Adding is higher than the breakeven value, the issuer is better off with
secondary verification will not change the issuer’s revenue (inter- Strategy 5 than with Strategy 2. The intuition is that as more con-
change fee) but will save in customer service costs. This makes sumers are unsatisfied with falsely declined transactions and give
the issuer also a ‘winner’, and leads to a “win-win-win” system up their transactions under the ML detection approach, the issuer
for consumers, the merchant, and the issuer. can benefit from Strategy 5 (high-value transactions will not be
In case of a fraudulent CNP transaction, however, the merchant falsely declined). The issuer gains more from a high-value trans-
holds the full liability and is responsible to pay the full chargeback. action than a low-value transaction, as it gains ρ portion of the
In this case, by using more accurate secondary verification tech- transaction value. The benefit comes from the loss reduction from
niques, the issuer will lose revenue, since less accurate fraud de- the reduction in truly fraudulent transactions and false positive de-
tection translates to more transactions, and even fraudulent trans- clines. In addition, for the case in which the bank is requested to
actions result in fees for the issuer. In the remaining section, we refund the interchange fee to the merchant, the issuer saves han-
will focus our analysis on this case. dling costs (for contested declines) and no further profit loss, if the
We now calculate and compare the issuer’s expected profits for merchant switches from Strategy 2 to Strategy 5. In this case, the
Strategy 2 and Strategy 5. If the merchant adopts Strategy 2, the positive profit incremental for the bank is guaranteed.
Lemmas 2 and 4 give the conditions when the merchant and
issuer can benefit from Strategy 5, as compared to Strategy 2. The
1
We can show that Strategy 4 also can benefit the issuer and consumers, as com- consumers whose transaction values are higher than t5∗ will re-
pared to Strategy 1. ceive compensation from the merchant, and c2v is the minimum

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

10 D. Wang et al. / Omega 000 (2018) 1–17

incentive to compensate the consumers’ inconvenience for the use Proposition 5. If δ 0 < δ < δ̄0 < δ5 , the merchant can coordinate the
of the secondary verification. Lemma 5 gives the condition under system by offering an interchange fee ρ ∗ to the issuer, where ρ ∗ is
which both the merchant and the consumer can benefit from Strat- given by:
egy 5.
cμ (1 − θ ) f1 [cr f0 + (1 − c )(1 − r )θ f1 ]
ρ∗ = , (22)
Lemma 5. Both the consumers and the merchant benefit
 from Strat- [δ − cμ (1 − θ ) f1 ][r f0 − (1 − r )θ f1 ]
γ2 v(t5∗ )
egy 5 as long as c2v ≤ δ ≤ c̄2v , where c̄2v = c2v + 1−r p(t5∗ )−t5∗
; γ2
where δ 0 and δ̄0 are given in Proposition 4.
and t5∗ are given in (12) and (14), respectively.
Offering the interchange fee given in (22), the merchant’s mar-
Lemmas 2, 4, and 5 show that Strategy 5 is a win-win-win
gin profit becomes, α = 1 − c − ρ ∗ . For a given (1 − c ), ρ ∗ is the
strategy for the merchant, the bank, and the consumer, as long
optimal portion that the issuer charges to maximize the system
as c2v ≤ δ ≤ c̄2v and θ ≥ θ̄ . c̄2v is the upper bound of the incen-
benefit. Proposition 5 gives the system’s coordination condition
tive that a merchant can offer to consumers. Any incentive amount
(δ 0 < δ < δ̄0 < δ5 ). Proposition 4 shows that δ 0 and δ̄0 are lower
that is greater than c̄2v will cost the merchant more than the ben-
and upper bounds to ensure t∗ to be valid, and Proposition 3 gives
efit it receives, while any incentive amount below c2v will cause
the upper bound (δ 5 ) to ensure t5∗ to be valid, for implementing
sales loss for the merchant. Therefore, Lemma 5 implies that as
Strategy 5. The coordination conditions ensure that the optimal in-
long as the compensation is within the range (δ ∈ [c2v , c̄2v ]), when
terchange rate (ρ ∗ ) is paid by the merchant to the issuer when
the merchant implements Strategy 5, both consumers and mer-
both t∗ and t5∗ are valid for implementing Strategy 5. In addition,
chant can always benefit.
In addition, although the consumers can always benefit if the when δ̄0 ≥ δ5 , t ∗ = t5∗ = vmax , implying that the merchant should
compensation from the merchant is appropriate (c2v ≤ δ ≤ c̄2v ), not use secondary verification at all from both perspectives, maxi-
from Lemma 4, we see that the issuer can only conditionally ben- mizing its own profit and maximizing the system’s profit.
efit from the merchant’s implementation of Strategy 5. To ensure We now discuss the implementation of system coordination.
that the issuer can always benefit from Strategy 5, we now discuss From (22), we see that ρ ∗ is positive only when both the proba-
the system coordination and implementation mechanism between bility of the approved fraud is higher than the probability of de-
the merchant and the issuer to ensure an easy-to-implement sys- clined and incomplete legitimate transactions, and the merchant’s
tem. compensation to the customer is higher than the issuer’s handling
The merchant and the issuer may benefit even further by coor- cost for declined and incomplete legitimate transactions, or when
dinating their decisions on the transaction threshold (t). With the both the probability of the approved fraud is lower than the prob-
merchant’s expected profit in (14) and the issuer’s expected profit ability of the declined and incomplete legitimate transactions, and
in (19), the system’s profit π5S (t ) = π5 (t ) + π5I (t ) is: the merchant’s compensation to the customer is lower than the is-
suer’s handling cost for declined and incomplete legitimate trans-
π5S (t ) = [(1 − c )(1 − r )(1 − θ f1 ) − cr f0 ]v̄ actions. Otherwise, to coordinate the system, the merchant should
+[(1 − c )(1 − r )θ f1 + cr f0 ]v(t ) negotiate with the issuer for a complementary agreement (ρ ∗ , β )
on how to allocate the system’s profit such that ρ ∗ can be set ac-
+(1 − r )[cμ (1 − θ ) f1 − δ ] p(t ) − cμ (1 − r )(1 − θ ) f1 .
cording to (22) to achieve the system coordination, where β is the
(20) portion of system profit that can be allocated to the issuer. In ad-
dition, from (22), we see that ρ ∗ may be small, and in fact smaller
Maximizing π5S (t )
in (20), we can have the optimal threshold
than the interchange rate that the merchant gives to the issuer be-
transaction value (t∗ ), which is summarized in Proposition 4.
fore coordination. In such a case, the issuer is not willing to accept
Proposition 4. The merchant will set the optimal threshold transac- this coordination contract (ρ ∗ ). If ρ ∗ set in (22) is too low to be
tion value (t∗ ), which can enhance the system’s profit and coordinate accepted by the bank issuer, the merchant also should negotiate
the system. t∗ is given by: such a complementary agreement (ρ ∗ , β ) with the issuer.

⎨0, i f δ ≤ δ0,
(1−r )[δ −cμ (1−θ ) f1 ]
t∗ = (1−c )(1−r )θ f1 +cr f0 , i f δ 0 < δ < δ̄0 , (21) 7. A case study
⎩v , otherwise,
max
In this section, we use real data to demonstrate the effective-
where δ 0 = cμ ( 1 − θ ) f 1 and δ̄0 = cμ (1 − θ ) f1 + [(1 − c )θ f1 + ness of the fraud detection strategies studied in this paper, es-
cr f0 pecially the mixed strategies we proposed. The dataset used in
1−r ]vmax .
this experiment is a large and well-known dataset on credit card
From the proof of Proposition 4 (see Appendix), we see that the fraud detection, which is available in [25]. This dataset includes
system profit is enhanced (π5S (t ∗ ) ≥ π5S (t5∗ )) by setting t = t ∗ . This credit card transactions made in September 2013 in Europe, con-
suggests that all members in the system, the merchant and the is- sisting of 492 fraudulent transactions out of 284,807 transaction
suer, are likely to benefit. How much each can benefit from the records for a two-day period. The fraud rate of this dataset is
coordination depends on the bargaining power between the mer- r = 0.0017. This data was acquired from a European bank, so the
chant and the credit card issuer, and the effort of the merchant to fraud rate is far lower than would be expected in the US mar-
incent the consumers whose transactions are of high value. ket [6,26]. The dataset contains 30 anonymized numerical features
Eq. (21) shows that when the merchant’s compensation (δ ) for each record. The only non-anonymous features are ‘Time’ and
for the secondary verification for high-value transactions is lower ‘Amount’. The feature ‘Time’ contains the seconds elapsed between
than the issuer’s handling cost of falsely declined but completed each transaction and the first transaction in the dataset. The fea-
low-value transactions, from the system perspective, the merchant ture ‘Amount’ is for each transaction value, and it ranges from $0.1
should apply secondary verification to all transactions. When δ is to vmax = $25, 691.16. Therefore, the average transaction value is
too high (δ > δ̄0 ), the system is better off when the merchant does v̄ = $88.35 and the standard deviation is σ = $250 for this dataset.
not request the secondary verification at all. Table 2 gives an overview of the distribution of the dataset.
With (14) and (21) by setting t ∗ = t5∗ , we can have the mer- From Table 2, we can see that the majority of the transactions
chant’s coordination mechanism in Proposition 5. (89.9%) are for values under $200, suggesting that the transac-

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 11

Table 2 between Strategy 5 and 2, as illustrated in Fig. 5(b) , where δ 4 and


Dataset overview.
δ 5 are given in Propositions 2 and 3, respectively. As compared to
Transaction value > $2, 0 0 0 ($1, 0 0 0, $2, 0 0 0] ($500, $1, 000] Fig. 5(a), the range of δ significantly increases. The merchant can
Percentage 0.237% 0.795% 2.178% give an incentive of up to $45 and $20 for Strategy 4 and Strat-
Transaction value ($30 0, $50 0] ($20 0, $30 0] ($0, $200] egy 5, respectively, to compensate the consumer’s inconvenience,
Percentage 3.131% 3.784% 89.875% in this dataset. The result implies that as compared to Strategy
Table 3 3, in which all transactions are requested for secondary verifica-
f0 and f1 from different ML models. tion, Strategy 4 and Strategy 5, in which the secondary verification
is only requested for high-value transactions, are easier to imple-
ML models f0 f1
ment, as they allow for reasonable incentive (δ ) for consumers. Us-
Decision tree 0.31 0.0 0 06
ing this dataset, for an incentive δ = $1 cash back for each trans-
Naïve Bayes 0.17 0.025
Logistic regression 0.45 0.0 0 03
action and a profit margin α = 50% for the merchant, if Strategy 4
Random forest 0.27 0.0 0 05 or Strategy 5 is adopted by the merchant, the optimal threshold is
Artificial neural network 0.22 0.0 0 02 t4∗ = $1, 174 (from Eq. (9)) or t5∗ = $2, 183 (from Eq. (14)). This sug-
gests that the merchant should only require secondary verification
for 2218 out of 284,807 transactions (around 1%) for Strategy 4 or
tion distribution in this dataset is significantly skewed to low-value 577 out of total transactions (around 0.2%) for Strategy 5, in this
transactions. dataset. This further implies that our proposed strategies are easy
to implement, as our strategies only request secondary verification
7.1. Machine learning prediction for a very small portion of transactions.

To illustrate the result for Strategy 2, we first run the ML detec- 7.3. ‘Win-Win-Win’ system
tion models on the dataset to obtain the value of f0 and f1 . We
divide the dataset into two parts, a training dataset and a test- From Table 3, we see that the Naïve Bayes ML model has the
ing dataset, each having 50% of the transactions. We train different lowest false negative rate (f0 ) (the probability that a fraudulent
ML models using the training data and run the models on the test transaction will be approved) but the highest false positive rate (f1 )
data. The value of f0 and f1 are obtained from test results. Five pop- (the probability that a legitimate transaction will be declined). In
ular ML models are tested, including Decision Tree, Naïve Bayes, contrast, Logistic Regression has the highest f0 but a relatively low
Logistic Regression, Random Forest, and Artificial Neural Network. f1 . In this case study, we use these two ML models to illustrate the
The derived predictions on f0 and f1 are summarized in Table 3. improved performance in detecting fraudulent transactions using
The dataset described in Table 2 features a large amount of our proposed Strategy 5. To illustrate, we first introduce a bench-
transaction with very low values as compared to vmax , and the mark case, a perfect system (with a subscript B), in which f 0 = 0
fraud rate is very low (r = 0.17%). Since f1 reflects the ratio of false and f1 = 0. We set θ = 0.5, α = 50%, cμ = $5, and c2v = 0.4. We
positive declines over the total legitimate transactions, with a very also use ρ = 2% for Strategy 2 and Strategy 5 (for a decentralized
low fraud rate, f1 is very low even though the number of false de- system in which the system is not coordinated) in our study.
clined transactions is large compared to the number of detected For the benchmark case, we have: the merchant’s profit πB =
frauds. Even with the very low fraud rate (r) and false positive $12, 559, 561, the issuer’s profit πBI = $502, 382, and the system’s
rate (f1 ) in this dataset, we are still able to show that our pro- profit πBS = πB + πBI = $13, 061, 943.
posed strategies significantly improve the fraud detection perfor-
mance (Section 7.3). 7.3.1. Comparison with the Naïve Bayes ML detection model
When the merchant uses the Naïve Bayes ML detection
7.2. Implementation of proposed strategies model for Strategy 2, we can obtain the merchant’s profit π2 =
$12, 405, 151, the issuer’s profit π2I = $479, 443, and the system’s
In implementing secondary verification, the exact incentive (δ ) profit π2S = π2 + π2I = $12, 884, 594. As compared to the bench-
is critical to the merchant. We now discuss the range of δ for each mark case, we have πBS − π2S = $177, 349.
of Strategies 3, 4, and 5. Following the reports of [1,35], it is rea- For
 Strategy 5, with Lemma 5, we have δ ≤ c̄2v = c2v +
γ2 v(t5∗ )
sonable to assume θ = 0.5 in our study. We also set ρ = 0.02 and 1−r p(t5∗ )
− t5∗ . The profits of the merchant and the issuer, and
cμ = $5. We first show when the merchant should implement sec- consumer’s surplus, and the system’s profit with the change of
ondary verification (Strategy 3) using this data by comparing the the incentive (δ ), are summarized in Table 4, for both Strategy 5
three basic strategies we discussed in Section 4. As an example, and the coordinated system. To illustrate the effectiveness of our
we use Logistic Regression as the ML detection model. The Lo- proposed strategy, we focus on the system improvement by defin-
gistic Regression ML detection model is one of the most popular π5S −π2S π S −π S
approaches, and it performs on average among demoed models. ing the percentage increase in the system as and S 2S for
πBS −π2S πB −π2
Fig. 5(a) gives boundaries measured by δ , as α increases; that is, Strategy 5 and the coordinated system, respectively. Percentage in-
δ 13 between Strategy 3 and 1 and δ 23 between Strategy 3 and 2 crease in the system and percentage of transactions are requested
(δ 13 and δ 23 are given in Proposition 1). As we see, secondary ver- for secondary verification (% 2V) are also shown in Table 4, as δ
ification with incentive for all transactions is optimal only in the changes.
shadow region under the two boundaries. This implies that the in- When the merchant uses the Naïve Bayes detection model,
centive for each transaction should be less than 7 cents. For the based on Proposition 5, we cannot have a positive ρ ∗ . To im-
given average transaction value v̄ = $88.35 in this dataset, the in- plement system coordination, the merchant should negotiate an
centive for consumers may be too low to implement secondary agreement with the issuer on (ρ , β ), such that the system can
verification. Thus Strategy 3 (secondary verification for all transac- achieve coordination.
tions) would be difficult for the merchant to implement for trans- The profits of the merchant, the issuer, and the system, and the
actions like those in this dataset. consumer’s surplus, with the change of the incentive (δ ), are sum-
Similarly, by setting t4∗ = t5∗ = 1 for Strategy 4 and Strategy 5, marized in Table 4, for both Strategy 5 and the coordinated system,
we can derive the boundaries δ 4 between Strategy 4 and 1 and δ 5 when the Naïve Bayes ML detection model is adopted.

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

12 D. Wang et al. / Omega 000 (2018) 1–17

Fig. 5. Incentive (δ ) boundaries.

Table 4
Benefit from optimal strategy 5 and system coordination (Naïve Bayes model).

Strategy 5 Coordination

δ t5∗ c̄2v π5 π5I π5C π5S % increase in system % 2V t∗ πS % increase in system % 2V

0.4 $65 $1.7 $12, 505, 880 $489, 289 $0 $12, 995, 169 62.3% 28.2% $53 $12, 995, 589 62.6% 32.1%
0.8 $130 $2.5 $12, 481, 856 $486, 467 $18, 143 $12, 968, 323 47.2% 16.0% $116 $12, 968, 552 47.3% 17.8%
1.2 $195 $3.3 $12, 467, 122 $484, 988 $24, 105 $12, 952, 110 38.07% 10.6% $179 $12, 952, 249 38.15% 11.6%
2 $325 $4.7 $12, 449, 414 $483, 356 $26, 172 $12, 932, 770 27.16% 5.77% $304 $12, 932, 866 27.22% 6.26%
6 $976 $10.7 $12, 420, 188 $480, 938 $17, 917 $12, 901, 126 9.32% 1.13% $930 $12, 901, 162 9.34% 1.21%
10 $1, 627 $16.6 $12, 412, 582 $480, 223 $10, 820 $12, 892, 805 4.63% 0.40% $1, 558 $12, 892, 830 4.64% 0.44%
12 $1, 952 $19.7 $12, 410, 749 $480, 032 $8, 453 $12, 890, 781 3.48% 0.26% $1, 871 $12, 890, 804 3.50% 0.29%

Table 4 shows that our proposed Strategy 5 can significantly en- δ > $2, the negative effect of the decrease in the number of trans-
hance the system’s performance when the merchant’s incentive (δ ) actions that are requested for secondary verification outweighs the
to compensate the consumer’s cost of inconvenience is not high, positive effect of the increase in δ , thus the consumer’s surplus de-
as compared to Strategy 2, in which only the Naïve Bayes ML de- creases. If the merchants strategy focuses on its relationship with
tection model is used. Notice that this performance improvement the consumer, it may be a good option for the merchant to select a
occurs when only a small portion of high-value transactions are δ that can maximize the consumer’s surplus, when it implements
requested for secondary verification by our proposed strategy with Strategy 5.
incentive system.
Table 4 also shows that as δ increases, the merchant should in-
7.3.2. Comparison with Logistic Regression ML detection model
crease the optimal threshold transaction values for both Strategy
For Strategy 2, we have the merchant’s profit π2 =
5 and the coordinated system, resulting in a significant decrease
$12, 547, 897, the issuer’s profit π2I = $502, 485, and the sys-
(with small increase in δ ), and a slight decrease (with a high δ ),
tem’s profit π2S = π2 + π2I = $13, 050, 382. As compared to the
in the profits of the merchant and issuer for Strategy 5. As a re-
benchmark case, we have πBS − π2S = $11, 561. The profits of the
sult, the effectiveness of our proposed Strategy 5 decreases as δ
merchant, the issuer, and the system, and the consumer’s surplus,
increases. The reason is that as δ increases, either t5∗ or t∗ increases
with the change of the incentive (δ ) are summarized in Table 5,
significantly, the merchant should pay an increased incentive to
for both Strategy 5 and the coordinated system, when the Logistic
consumers (in total amount) to compensate for their inconvenience
Regression ML detection model is adopted. With Proposition 5,
in using secondary verification, because more transactions are re-
we have δ̄0 = 11.6 < 11.9 = δ5 in this case study if the Logistic
quested, and this results in losses for the merchant and the issuer.
Regression model is used. We calculate and list ρ ∗ in Table 5.
For the consumers, when δ is small, although the consumer’s
Table 5 also shows that as δ increases, the merchant should in-
surplus (δ − c2v ) from the request of secondary verification for
crease the optimal threshold transaction values for both Strategy
each transaction is low, the number of transactions that are re-
5 and the coordinated system, resulting in a significant decrease
quested for secondary verification is high, the total consumer’s sur-
in the merchant’s profit and a slight increase in the issuer’s profit
plus (π5C ) increases with δ ; however, as δ continues to increase,
for Strategy 5. As a result, the effectiveness of our proposed Strat-
the effect of the decrease in the number of transactions for which
egy 5 decreases as δ increases. The reason is that as δ increases,
secondary verification is requested outweighs the effect of the
either t5∗ or t∗ also increases significantly. The merchant may pay
increase in the consumer’s surplus, and therefore the total con-
less to consumers in compensation because fewer transactions are
sumer’s surplus (π5C ) decreases.
requested for secondary verification, but the loss from the increase
Interestingly, from Table 4, we see that as δ increases, although
in frauds approved by the Logistic Regression ML detection model
the profits of the merchant and the issuer decrease, the consumer’s
significantly increases, resulting in loss for the merchant. Since the
surplus does not always increase. When δ increases slightly, the
total number of approved transactions increases, the issuer’s profit
consumer’s surplus increases quickly, until it peaks (δ = $2 in this
increases. Notice that the issuer’s profit is lower than that in Strat-
example) and then gradually decreases. The reason is that as δ
egy 2. To motivate the issuer, the merchant should negotiate with
increases, t5∗ increases, implying that secondary verification is re-
the issuer for an agreement to allocate the additional profit from
quested for fewer transactions. The positive effect of the increase
the merchant’s Strategy 5 or implement the coordination mecha-
in δ outweighs the negative effect on the consumer’s surplus of the
nism discussed in Proposition 5. The consumer’s total surplus in-
decrease in the number of transactions for which secondary verifi-
creases only when δ is small, and then decreases (as discussed in
cation is requested, therefore, the consumer’s surplus increases. As
Section 7.3.1).

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 13

Table 5
Benefit from optimal strategy 5 and system coordination (Logistic Regression model).

Strategy 5 Coordination

δ t5∗ c̄2v π5 π5I π5C π5S % increase in system % 2V t∗ ρ∗ πS % increase in system % 2V

0.4 $861 $0.74 $12, 549, 221 $502, 410 $0 $13, 051, 631 10.8% 1.37% $884 0.135% $13, 051, 632 10.81% 1.33%
0.8 $1, 723 $1.32 $12, 548, 411 $502, 450 $397 $13, 050, 861 4.14% 0.35% $1, 769 0.067% $13, 050, 862 4.15% 0.33%
1.2 $2, 584 $1.85 $12, 548, 160 $502, 465 $325 $13, 050, 625 2.10% 0.14% $2, 654 0.045% $13, 050, 626 2.11% 0.13%
2 $4, 307 $2.99 $12, 547, 989 $502, 477 $148 $13, 050, 466 0.73% 0.033% $4, 425 0.027% $13, 050, 467 0.73% 0.029%
6 $12, 921 $9.95 $12, 547, 909 $502, 484 $16 $13, 050, 393 0.1% only 3 $13, 279 0.009% $13, 050, 393 0.1% only 3
10 $21, 535 $11.9 $12, 547, 899 $502, 484 $10 $13, 050, 383 0.01% only 1 $22, 133 0.005% $13, 050, 383 0.01% only 1

We also notice that the coordinated system produces only lim- that are used in practice: no prevention (Strategy 1) and using the
ited improvement in this case study. The intuition is that when ML detection model for all transactions (Strategy 2). We also dis-
Strategy 5 uses the Logistic Regression ML detection model for cuss Strategy 3, in which secondary verification is requested for all
low-value transactions, the optimal t5∗ is very close to the optimal transactions, with an incentive for consumers. We find that three
t∗ , suggesting that the decentralized decision is not much different parameters (fraud rate, consumers’ rate of abandoning legitimate
from the centralized decision. In addition, to coordinate the sys- transactions that are falsely declined by an ML detection model,
tem, the merchant gives the issuer a lower interchange rate as it and the incentive required to compensate the consumer for the in-
gains more margin profit (α = 1 − ρ ∗ − c) for a given c. As we dis- convenience of secondary verification) can capture the issues in-
cussed in Section 6, the merchant should negotiate with the issuer volved in fraudulent credit card transactions. By carefully estimat-
with a complementary agreement with (ρ ∗ , β ). Besides offering a ing three parameters from experience, or historical data, or indus-
lower interchange rate (ρ ∗ ) to the issuer, it should also share a por- trial reports, the merchant can easily choose a strategy.
tion of the systems profit (β ) with the issuer. The magnitude of β We find that when both the fraud rate and the secondary ver-
depends on the bargaining power of the merchant and the issuer. ification compensation rate are high, none of the three strate-
Comparing Table 5 to Table 4, we see that the enhancement gies works well, as the merchant cannot make a profit using any
of the system’s performance using the Naïve Bayes ML detection of strategies. If the required compensation is sufficiently low, the
model is more significant than that of using the Logistic Regression merchant should choose Strategy 3 and incentivize consumers to
ML detection model. The reason is that as compared to the Logis- accept secondary verification for all transactions. If the fraud rate is
tic Regression ML detection model, to mitigate the negative impact low, the merchant should consider Strategy 1 or 2, since the ben-
of falsely declined transactions (remember that the Naïve Bayes efit of using secondary verification diminishes. Whether to adopt
ML detection model has a high f1 ), the merchant (represented in Strategy 1 or Strategy 2 depends on the rate at which consumers
Table 4) must reduce the optimal threshold transaction values (for abandon transactions due to false positive declines. Strategy 1 is
t5∗ and t∗ ), leading to many more transactions being requested for better if the abandon rate is high, since by accepting all transac-
the secondary verification. As a result, the merchant must incent tions, it eliminates all false positive declines. Strategy 2 is better
consumers more in compensation. This significantly reduces the otherwise.
merchant’s profit, although the total consumers’ surplus is signif- In current practice in the United States, secondary verification is
icantly higher with Naïve Bayes than with the Logistic Regression rarely adopted, because it is inconvenient to consumers. In this pa-
ML detection model for low-value transactions. Since the difference per, we propose consumer incentive strategies to facilitate the im-
between t5∗ and t∗ is higher when the Naïve Bayes ML detection plementation of secondary verification. In particular, we introduce
model is used for low-value transactions in Strategy 5, the differ- two mixed strategies, in which secondary verification is applied to
ence between the decentralized system and coordinated system is high-value transactions, and either no fraud detection (Strategy 4)
also larger. Therefore, the coordinated system thus has a larger per- or an ML detection model (Strategy 5) is used for low value trans-
formance improvement. actions. These mixed strategies set the optimal transaction value
In addition, this case study also illustrates the robustness of thresholds by balancing the effectiveness of secondary verification
threshold value (t) between the low-value transactions and the against compensation to consumers for associated inconveniences.
high-value transactions for Strategy 5 if the merchant does not set As compared to common strategies currently used in practice, our
the optimal t5∗ . Here, we take the compensation δ = 0.4 = c2v as an proposed optimal strategy can lead to a win-win-win for the mer-
example. If the Naïve Bayes ML detection model is adopted, then chant, the credit card issuer, and consumers, with the appropri-
we have δ < δ23 = 0.45. As discussed in Lemma 2, Strategy 5 dom- ate incentive provided to consumers. The mixed strategies can be
inates Strategy 2 for any t > 0 (Lemma 2). By calculation, we ob- further improved by introducing an easy-to-implement coordina-
tain that for t = 0, π52 = $40, 683, and for t = vmax , π52 = $157. tion mechanism between the merchant and the card issuer. This
Similarly, if the Logistic Regression ML detection model is adopted, study provides new insights to the merchant, who acts as a deci-
then δ > δ23 = 0.04, and we find that Strategy 5 dominates Strat- sion maker, and who can easily choose an optimal mixed strategy
egy 2 for t 5 ≤ t ≤ vmax . With Lemma 2, we can obtain t 5 = $386 < by estimating the parameters in our models from industry experi-
t5∗ = $861 (see t5∗ in Table 5 for δ = 0.4). The dominating ranges ence, historical data, and other market conditions. Consumers and
vmax −t 5
take 100% and 98.5% of the whole range of transactions the card issuer, the two other major players in the transaction net-
vmax
values and cover 100% and 4.7% of the whole transactions for the work, can also benefit from the merchant’s optimal mixed strategy,
Naïve Bayes and Logistic Regression ML models, respectively. The and this makes implementation practical.
high skewness of the dataset produces these different dominating We use a real dataset to conduct a case study to illustrate and
ranges for the two ML detection methods. verify the major results discussed in our paper. We show that
our proposed optimal strategies only request secondary verification
8. Conclusion for a small number of high-value transactions, while they signifi-
cantly enhance the efficiency of credit card fraud detection, and
In this paper, we discuss a strategy for a merchant to prevent this has important practical implications. This research shows that
fraudulent credit card transactions. We first examine two strategies our proposed optimal strategies can not only enhance the mer-

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

14 D. Wang et al. / Omega 000 (2018) 1–17

chant’s profit, the issuer’s profit, and the consumer’s surplus (un- (7) w.r.t. t:
der certain conditions), but also significantly reduce the negative
∂ 2 π4 (t )  
impact of fraudulent transactions on the system. The evidence of = −(1 − α )r[g(t ) + tg (t )] + δ (1 − r )g (t ). (A5)
testing our proposed strategies using a real dataset suggests that
∂t2
these optimal strategies can perform well to resolve issues of false Substituting t4∗ into (A5):
decline of transactions using the ML detection model, or of con- ∂ π4 (t )
2
(1 − r )δ  ∗
= −(1 − α )rg(t4∗ ) − (1 − α )r g (t4 )
sumer inconvenience in requests for secondary verification. ∂t2 r (1 − α )
Our paper has a limitation that we assume a monopolistic mer- 
chant and issuer in the card transaction network. This study can + δ (1 − r )g (t4∗ ) = −(1 − α )rg(t4∗ ) < 0.
be extended to address the problem in which multiple merchants Therefore, t4∗ is proved to be the optimal threshold for Strategy 4.
)δ −α )
and card issuers compete for consumers. While card issuers cur- Since t ∈ [0, vmax ], t4∗ = r((11−r
−α )
if and only if δ ≤ δ4 = r (11−r vmax ;
rently compete on card offerings to attract consumers, it would be
otherwise, t4∗ = vmax . The optimal threshold can be summarized as
interesting to study a competition model, in which the merchants  
(1−r )δ
offer different incentives to consumers based on both the trans- t4∗ = min r (1−α )
, vmax . 
action values and the card issuers’ fraud detection accuracy, and
consumers can switch between multiple card issuers. Another lim- Proof of Lemma 1. Eqs. (7) and (2) give:
itation of our model is that we assume that fraudsters’ behavior π41 = π4 (t ) − π1 = (1 − α )rv(t ) − δ (1 − r ) p(t ). (A6)
is static, as described by an aggregate probability of fraud. A fu-
Eqs. (7) and (5) give:
ture study could consider the fraudster’s gaming behavior in the
competition model as fraudsters may constantly game the credit π43 (t ) = π4 (t ) − π3 = δ (1 − r )[1 − p(t )] − (1 − α )r[v̄ − v(t )].
card fraud detection system by dynamically changing their behav-
(A7)
iors and transaction values.
r (1−α ) ∗
For (1), When setting t = t4∗ , (A6) and δ = 1−r t4 gives:
Acknowledgment π ( ) = ( 1 − α ) r v ( ) − δ ( 1 − r ) p( )

41 t4 t4∗ t4∗
 ∗ 
v(t4 )
The authors gratefully acknowledge financial support from = (1 − α )r p(t4 )∗ ∗
− t4 .
the National Natural Science Foundation of China (Grants Nos. p(t4∗ )
71331004 and 71671081) and the Natural Sciences and Engineer- Let h(t ) = v(t ) − t p(t ) and take the first order derivative to
 v
ing Research Council of Canada (Grant No. RGPIN/05008). h(t) w.r.t t, we obtain: h (t ) = −tg(t ) − t max g(v ) dv + tg(t ) =
 vmax
− t g(v ) dv < 0. Therefore, h(t) is monotonic decreasing, and
Proof of Proposition 1. With the merchant’s net profits in (1)–(5),
h(t ) ≥ h(vmax ) = 0. Therefore, π41 (t4∗ ) > 0.
we derive the first breakeven condition by setting π1 = π2 : −α ) ∗
In addition, (A7) and δ = r (11−r t4 gives:
(α − r )v̄ = {α (1 − r )[(1 − f1 ) + (1 − θ ) f1 ] − (1 − α )r f0 }v̄. (A1)
π43 (t4∗ ) = (1 − α )r[t4∗ (1 − p(t4∗ )) − (v̄ − v(t4∗ ))]
Solving (A1) w.r.t. θ and letting θ 12 be the breakeven solution,  t4∗
(1−α )r (1− f )
we have θ12 = α (1−r ) f 0 . Therefore, π 1 ≥ π 2 if θ ≥ θ 12 , otherwise = ( 1 − α )r (t4∗ − v )g(v ) dv > 0.
1 0
π 1 < π 2.
Therefore, π43 (t4∗ ) > 0.
We then derive the second breakeven condition by setting π1 =
For (2) and (3), Taking the first order derivatives of
π3 : ∂ π41 (t )
(A6) w.r.t t: ∂t = −(1 − α )rt g(t ) + δ (1 − r )g(t ) = [δ (1 − r ) −
(α − r )v̄ = (α v̄ − δ )(1 − r ). (A2) (1 − α )rt ]g(t ). We see that when δ (1 − r ) − (1 − α )rt ≤ 0, which
)δ ∂ π41 (t )
leads to t ≥ r((11−r = t4∗ , ≤ 0. Since π 41 (t) decreases with
Solving (A2) w.r.t. δ and letting δ 13 be the breakeven value, we −α ) ∂t
have δ13 = r (11−−rα )v̄ . Therefore,π 1 ≥ π 3 if δ ≥ δ 13 , otherwise π 1 < π 3 . t, π41 (t ) ≥ π41 (vmax ) = 0. Therefore, Strategy 4 dominates
Finally, we derive the third breakeven condition by setting π2 = Strategy 1 if t ≥ t4∗ .
∂ π (t )
π3 : Taking the first order derivative of (A7) w.r.t t: 43
∂t =
−(1 − α )rt g(t ) + δ (1 − r )g(t ) = [δ (1 − r ) − (1 − α )rt ]g(t ). If δ (1 −
{α (1 − r )[(1 − f1 ) + (1 − θ ) f1 ] − (1 − α )r f0 }v )δ ∂ π43 (t )
(A3) r ) − (1 − α )rt > 0, we have t < r((11−r −α )
= t4∗ and ∂t > 0. Since
= (αv − δ )(1 − r ). π 43 (t) increases with t, then π43 (t ) ≥ π43 (0 ) = 0. Therefore,
Solving (A3) w.r.t. to δ and letting δ 23 be the breakeven value, we Strategy 4 dominates Strategy 3 if t < t4∗ .
αθ (1−r ) f1 +(1−α )r f0 When δ ≥ δ 13 , Proposition 1 gives Strategy 1 dominates Strategy
have δ23 = v̄. Therefore, π 2 ≥ π 3 if δ ≥ δ 23 , other-
1−r 3, where π 1 ≥ π 3 . Therefore, Strategy 4 dominates Strategy 3 for
wise π 2 < π 3 .
any t.
Combining the profitable conditions for each strategy and the
In addition, setting π41 (t ) = 0, which leads to:
above breakeven conditions, we obtain: Strategy 1 is optimal and
profitable if θ ≥ θ 12 , δ ≥ δ 13 , and r ≤ r̄1 ; Strategy 2 is optimal and v(t )
− t4∗ = 0. (A8)
profitable if θ ≤ θ 12 , δ ≥ δ 23 , and r ≤ r̄2 ; Strategy 3 is optimal and p(t )
profitable if δ ≤ min(δ13 , δ23 , δ̄3 ). Otherwise, there is no profitable Let t4 be the solution for (A8), we can obtain π 41 (t) ≥ 0 if t 4 ≤
strategy for the merchant.  v(t ∗ )
t ≤ vmax . Since vp((tt )) increases with t, and p(t4∗ ) > t4∗ , any t satisfies
4
Proof of Proposition 2. For given π 4 (t), taking the first order v(t )
− t4∗ = 0 must be less than t4∗ . Therefore t 4 < t4∗ .
p(t )
derivatives of (6) w.r.t. t:
Similarly, when δ < δ 13 , Proposition 1 gives Strategy 3 domi-
∂π4 (t ) nates Strategy 1, where π 3 > π 1 . Therefore, Strategy 4 dominates
= −(1 − α )rt g(t ) + δ (1 − r )g(t ). (A4)
∂t Strategy 1 for any t.
∂π4 (t ) Furthermore, setting π43 (t ) = 0, which leads to:
Setting ∂ t = 0 and solving (A4) equals to 0, we obtain the only
)δ v̄ − v(t )
solution t4∗ = r((11−r
−α )
. Then, taking the second order derivatives of − t4∗ = 0. (A9)
1 − p(t )
Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 15

Let t̄4 be the solution for (A9). We can obtain π 43 (t) ≥ 0 if 0 ≤ Similarly, when δ < δ 23 , Proposition 1 gives Strategy 3 domi-
t ≤ t̄4 . Similarly, t̄4 > t4∗ .  nates Strategy 2, where π 3 > π 2 . Therefore, Strategy 5 dominates
Strategy 2 for any t.
Proof of Proposition 3. For given π 5 (t), taking the first order Furthermore, setting π53 (t ) = 0, which leads to:
derivative of (12) w.r.t. t:
v̄ − v(t )
∂π5 (t ) − t5∗ = 0. (A15)
= −γ2 t g(t ) + δ (1 − r )g(t ). (A10) 1 − p(t )
∂t
Let t̄5 be the solution for (A15). We can obtain π 53 (t) ≥ 0 if 0 ≤
Since g(t) > 0, solve (A10) equals to 0, we obtain the only solution
)δ t ≤ t̄5 . Similar to Lemma 1, t 5 < t5∗ < t̄5 . 
t5∗ = (1−r
γ2 . Then, taking the second order derivatives of (12) w.r.t.
t: Proof of Lemma 3. For given the net profits of the merchant (π 4
∂ 2 π5 (t )  
and π 5 ) for Strategy 4 and Strategy 5, we solve the breakeven con-
= −γ2 [g(t ) + tg (t )] + δ (1 − r )g (t ). (A11) dition by setting π45 = π4 (t4∗ ) − π5 (t5∗ ) = 0:
∂t2
Substituting t5∗ into (A11): π45 = (α − r )v + (1 − α )rv(t4∗ ) − δ (1 − r ) p(t4∗ )
(A16)
∂ 2 π5 (t ) ( 1 − r )δ  ∗ −γ1 v + γ2 v(t5∗ ) − δ (1 − r ) p(t5∗ ).

= −γ2 g(t5∗ ) − γ2 g (t5 ) + δ (1 − r )g (t5∗ )
∂t2 γ2 Reorganizing (A16), we have:
= −γ2 g(t5∗ ) < 0. π45 = [αθ (1 − r ) f1 − (1 − α )r (1 − f0 )][v̄ − v(t5∗ )]
Therefore, t5∗ is proved to be the optimal threshold for Strategy +(1 − α )r[v(t4∗ ) − v(t5∗ )] + δ (1 − r )[ p(t5∗ ) − p(t4∗ )]. (A17)
)δ γ
5. Since t ∈ [0, vmax ], t5∗ = (1−r
γ2 if and only if δ ≤ δ5 = 1−r
2
vmax ; (1−α )r (1− f0 )
The only solution for π45 = 0 is when θ = θ12 = α (1−r ) f1 .
otherwise, t5∗ = vmax . The optimal threshold can be summarized as
  Since when θ = θ12 and = t4∗ t5∗ ,
all three terms in (A17) are equal

t5∗ = min (1−r
γ2 , vmax .  to 0. Therefore, the breakeven condition for Strategy 4 and 5 is
equivalent to the breakeven condition for Strategy 1 and 2.
Proof of Lemma 2. Eqs. (12) and (4) give: To discuss the profitability condition for Strategy 4, we set:
π52 = π5 (t ) − π2 = γ2 v(t ) − δ (1 − r ) p(t ). (A12) π4 (t ) = (α − r )v̄ + (1 − α )rv(t ) − δ (1 − r ) p(t ) = 0. (A18)
Eqs. (12) and (5) give: Let r̄4 be the breakeven value. Solving (A18), we obtain: r = r̄4 =
α v̄−δ p(t )
π53 (t ) = π5 (t ) − π3 = δ (1 − r )[1 − p(t )] − γ2 [v̄ − v(t )]. (A13) v̄−(1−α )v(t )−δ p(t ) . To ensure r̄4 ≥ 0, α v̄ − δ p(t ) must be nonnegative,
γ2 ∗ thus δ ≤ pα(tv̄) . The numerator can be rewritten as v̄ − (1 − α )v̄ −
For (1), When setting t = t5∗ , (A12) and δ = 1−r t5 gives:
  δ p(t ) ≤ v̄ − (1 − α )v(t ) − δ p(t ), thus r̄4 is guaranteed smaller than
v(t5∗ )
π52 (t5∗ ) = γ2 p(t5∗ ) p(t5∗ )
− t5∗ > 0 (see the proof for Lemma 1). 1. Therefore, π 4 (t) ≥ 0 if and only if r ≤ r̄4 . Further comparing r̄4
(1−α )[α v̄−δ p(t )]
γ2 ∗ and r̄1 , we have r̄4 − r̄1 = v̄− (1−α )v(t )−δ p(t ) ≥ 0.
(A13) and δ = 1−r t5 gives:
Similarly, to discuss the profitability condition for Strategy 5, we
π53 (t5∗ ) = γ2 [t5∗ (1 − p(t5∗ )) − (v̄ − v(t5∗ ))] set:
 t5∗
= γ2 (t5∗ − v )g(v ) dv > 0. π5 (t ) = γ1 v̄ + γ2 v(t ) − δ (1 − r ) p(t ) = 0. (A19)
0
Let r̄5 be the breakeven value. Solving (A19), we obtain:
For (2) and (3), Taking the first order derivatives of (A12) w.r.t
∂ π52 (t ) α (1 − θ f1 )v̄ + αθ f1 v(t ) − δ p(t )
t: ∂t = −γ2 t g(t ) + δ (1 − r )g(t ) = [δ (1 − r ) − γ2 t ]g(t ). r = r̄5 =
[α (1 − θ f1 ) + (1 − α ) f0 ]v̄ + [αθ f1 − (1 − α ) f0 ]v(t ) − δ p(t )
.
We see that when δ (1 − r ) − γ2 t ≤ 0, which leads to
Similar to the proof for r̄4 , r̄5 is also guaranteed smaller than 1.
Therefore, π 5 (t) ≥ 0 if and only if r ≤ r̄5 . In addition,

(1 − α ) f0 [α v̄ − δ p(t )]
r̄5 − r̄2 = ≥ 0.
[α (1 − θ f1 ) + (1 − α ) f0 ]{[α (1 − θ f1 ) + (1 − α ) f0 ]v̄ + [αθ f1 − (1 − α ) f0 ]v(t ) − δ p(t )}

)δ ∗ ∂ π52 (t ) ≤ 0. 
t ≥ (1−r
γ2 = t5 , ∂t Since π 52 (t) decreases with t,
π52 (t ) ≥ π52 (vmax ) = 0. Therefore, Strategy 5 dominates Proof of Lemma 4. For given the issuer’s profit (π2I and π5I (t )), if
Strategy 2 if t ≥ t5∗ . the merchant chooses Strategy 2 and Strategy 5, we have:
∂ π (t )
Taking the first order derivative of (A13) w.r.t t: 53
∂t = π5I (t5∗ ) − π2I = ρ [(1 − r )θ f1 − r f0 ]v(t5∗ )
−γ2 t g(t ) + δ (1 − r )g(t ) = [δ (1 − r ) − γ2 t ]g(t ). If δ (1 − r ) − γ2 t > 0, (A20)
)δ ∂ π53 (t ) +cμ (1 − r )(1 − θ ) f1 p(t5∗ ).
we have t < (1−r ∗
γ2 = t5 and ∂t > 0. Since π 53 (t) increases
with t, then π53 (t ) ≥ π53 (0 ) = 0. Therefore, Strategy 5 domi- Let θ̄ be the breakeven value. Solving (A20) = 0 with respect to θ ,
nates Strategy 3 if t < t5∗ . ρ r f0 v(t5∗ )−(1−r )cμ f1 p(t5∗ )
we obtain θ̄ = . Then we have π5I (t5∗ ) − π2I ≥ 0
When δ ≥ δ 23 , Proposition 1 gives Strategy 2 dominates Strategy (1−r )[ρv(t5∗ )−cμ p(t5∗ )] f1
3, where π 2 ≥ π 3 . Therefore, Strategy 5 dominates Strategy 3 for if and only if θ ≥ θ̄ . 
any t.
Proof of Lemma 5. Let δ = c2v + be the consumers’ incentive,
In addition, setting π52 (t ) = 0, which leads to:
where ≥ 0 indicating the extra incentive. Therefore, the total ex-
v(t ) tra incentive is (1 − r ) p(t5∗ ) for Strategy 5. In order to keep a non-
− t5∗ = 0. (A14)
p(t ) negative profit for the merchant who switches from Strategy 2 to
Strategy 5, we have:
Let t5 be the solution for (A14), we can obtain π 52 (t) ≥ 0 if t 5 ≤
t ≤ vmax . π52 − (1 − r ) p(t5∗ ) ≥ 0. (A21)

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

16 D. Wang et al. / Omega 000 (2018) 1–17

 
v(t5∗ ) γ2
Reorganizing (A21), we obtain ≤ ∗ − t5 . Therefore, ≥ 0
∗ [2] Aite Group. Card-not-present fraud in a post-EMV environment: com-
p(t5 )∗
1−r bating the fraud spike. 2014. https://www.rsa.com/en-us/resources/

γ2 v(t5 ) ∗ , we have that
card- not- present- fraud- post- emv- environment- combating.
(see Lemma 1), and let c̄2v = c2v + 1−r ∗
p(t5 )
− t 5 [3] Aite Group. 3-d secure: the force for CNP fraud prevention awakens. 2016.
https://community.rsa.com/docs/DOC-41224.
as long as δ ∈ [c2v , c̄2v ], both the merchant’s profit and the con- [4] Aloul F, Zahidi S, El-Hajj W. Two factor authentication using mobile phones.
sumer’s surplus are positive.  In: Proceedings of the IEEE/ACS international conference on computer systems
and applications 2009:641–644.
Proof of Proposition 4. Taking the first order derivative of [5] Bakker E. The false declines report: the $ 8.6 billion problem under-
∂π5S (t ) mining ecommerce merchants’ fraud prevention strategies. 2016. Busi-
(20) w.r.t. t, we have: ∂ t = −[(1 − c )(1 − r )θ f 1 + cr f 0 ]t g(t ) + ness Insider. http://www.businessinsider.com/the- false- declines- report- the
∂π S (t ) - 86- billion- problem- undermining- e- commerce- merchants- fraud- prevention-
[δ − cμ (1 − θ ) f1 ](1 − r )g(t ). Setting ∂5t = 0, then we have t ∗ = strategies- 2016- 7.
(1−r )[δ −cμ (1−θ ) f1 ] [6] Barclays. Barclay’s security in payments: a look into fraud, fraud
(1−c )(1−r )θ f1 +cr f0 . It is easy to prove that the second order deriva- prevention, & the future. 2015. http://www.nasdaq.com/article/
∂ 2 π5S (t )
tive ∂t2
< 0. Therefore, t∗ is proved the optimal threshold. credit- card- fraud- and- id- theft- statistics-cm520388.
[7] Berger P, Bechwati N. The allocation of promotion budget to maximize cus-
Then, we have t∗ > 0, if δ > δ 0 = cμ (1 − θ ) f1 ; and t ∗ < vmax , if
  tomer equity. Omega (Westport) 2001;29(1):49–61.
δ < δ̄0 = cμ (1 − θ ) f1 + (1 − c )θ f1 + cr f0
1−r vmax . [8] Bhattacharyya S, Jha S, Tharakunnel K, Westland C. Data mining for credit card
fraud: a comparative study. Decis Support Syst 2011;50(3):602–13.
Comparing π5S (t ∗ ) with π5S (t5∗ ), with (20), we obtain: [9] Chan P, Fan W, Prodromidis A, Stolfo S. Distributed data mining in credit card
fraud detection. IEEE Intel Syst and Their Appli 14(6) 1999:67–74.
π = π (t ) − π ( )
S
5
S
5
∗ S
5 t5∗ [10] Chellappa R, Pavlou P. Perceived information security, financial liability
and consumer trust in electronic commerce transactions. Logist Inf Manag
= [(1 − c )(1 − r )θ f1 + cr f0 ][v(t ∗ ) − v(t5∗ )] 2002;15(5):358–68.
[11] Chen J. The impact of sharing the customer returns information in a supply
−(1 − r )[δ − cμ (1 − θ ) f1 ][ p(t ∗ ) − p(t5∗ )]. (A22) chain with and without a buyback policy. Eur J Oper Res 2011;213(3):478488.
[12] CyberSource, U. K. fraud report series: Part 2. 2015. http://forms.cybersource.
If t ∗ < t5∗ , (A22) can be rewritten as: com/LP=1243?&dcid=701F0 0 0 0 0 01IjVO&gclid=EAIaIQobChMI8cLq46_
π5S = [(1 − c )(1 − r )θ f1 + cr f0 ] 22AIV1DqBCh1PgATpEAAYASAAEgICk_D_BwE.
[13] CyberSource. Annual fraud benchmark report: a balancing act. 2016.
 t5∗  t5∗ https://www.cybersource.com/content/dam/cybersource/NA_2016_Fraud_
× v g ( v ) d v − ( 1 − r )[ δ − c μ ( 1 − θ ) f 1 ] g( v ) d v Benchmark_Report.pdf.
t∗ t∗ [14] Delamaire L, Abdou H, Pointon J. Credit card fraud and detection techniques: a
 t5∗ review. Banks Bank Syst 2009;4(2):57–68.
= {[(1 − c )(1 − r )θ f1 + cr f0 ]v [15] Demirel N, Ozceylan E, Paksoy T, Gokcen H. A genetic algorithm approach for
t∗ optimizing a closed-loop supply chain network with crisp and fuzzy objectives.
− ( 1 − r )[ δ − c μ ( 1 − θ ) f 1 ] } g ( v ) d v Int J Prod Res 2014;52(12):3637–64.
[16] EMVCo. A guide to EMV chip technology. 2014. https://www.emvco.
 t∗ com/wp-content/uploads/2017/05/A_Guide_to_EMV_Chip_Technology_v2.
5
≥ {[(1 − c )(1 − r )θ f1 + cr f0 ]t ∗ 0_20141120122132753.pdf.
t∗ [17] Feldmann M, Muller S. An incentive scheme for true information providing in
− ( 1 − r )[ δ − c μ ( 1 − θ ) f 1 ] } g ( v ) d v = 0 . supply chains. Omega (Westport) 2003;31:63–73.
[18] Gama J, Žliobaitė I, Bifet A, Pechenizkiy M, Bouchachia A. A survey on concept
If t ∗ ≥ t5∗ , (A22) can be rewritten as: drift adaptation. ACM Comput Surv (CSUR) 2014;46(4):44.
 [19] Ghosh S., Reilly D. Credit card fraud detection with a neural-network. In: Pro-
t∗
ceedings of the 27th annual hawaii international conference on system science
π5S = −[(1 − c )(1 − r )θ f1 + cr f0 ] vg(v ) dv + (1 − r )[δ − cμ (1 − θ ) f1 ] 1994; 3:621–630.
t5∗
 [20] Hayashi F, Moore T, Sullivan R. The economics of retail payments security.
t∗
2015. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.725.970.
× g( v ) d v [21] He H, Garcia E. Learning from imbalanced data. IEEE Trans Knowl Data Eng
t5∗
 2009;21(9):1263–84.
t∗
[22] Hermon I. The merchant dilemma. 2012. https://blog.thalesesecurity.com/2012/
= {(1 − r )[δ − cμ (1 − θ ) f1 ] − [(1 − c )(1 − r )θ f1 + cr f0 ]v}g(v ) dv 05/31/the- merchant- dilemma/.
t5∗
[23] Jin A, Ling D, Goh A. Biohashing: two factor authentication featur-
 t∗ ing fingerprint data and tokenised random number. Pattern Recognit
≥ {(1 − r )[δ − cμ (1 − θ ) f1 ] − [(1 − c )(1 − r )θ f1 + cr f0 ]t ∗ } 2004;37(11):2245–55.
t5∗
[24] Morgan JP. Payments fraud and control survey. 2016. https://www.afponline.
× g( v ) d v = 0 . org/publications- data- tools/reports/survey-research-economic-data/Details/
payments-fraud-2016.
Therefore, we have π5S ≥ 0; and when setting t = t ∗ , the system [25] Kaggle.com. 2016. https://www.kaggle.com/dalpozz/creditcardfraud.
profit is enhanced.  [26] Knieff B. Global consumer card fraud: where card fraud is coming
from. 2016; ACI Universial Payments https://www.aciworldwide.com/lp/
Proof of Proposition 5. Since t∗ and t5∗ are both piecewise func- fraud-survey/results.
[27] Kokkinaki A. On atypical database transactions: identification of probable
tions, we discuss all possible scenarios. frauds using machine learning for user profiling. In: Proceedings of the IEEE
When r = 1 and t ∗ = t5∗ = 0, then Strategy 5 reduces to Strat- knowledge and data engineering exchange workshop; 1997. p. 107–13.
γ
egy 3; when r = 1 and δ̄0 ≥ 1−r
2
vmax , t ∗ = t5∗ = vmax , then Strategy [28] Laroche M, Pons F, Zgolli N, Cervellon M, Kim C. A model of consumer re-
sponse to two retail sales promotion techniques. J Bus Res 2003;56:513–22.
5 reduces to Strategy 2. [29] Liao S, Shen Y, Chu C. The effects of sales promotion strategy, product appeal
γ2
When r = 1 and δ̄0 < 1−r vmax , solving t ∗ = t5∗ , and letting ρ ∗ be and consumer traits on reminder impulse buying behavior. Int J Consum Stud
2009;33:274–84.
the breakeven value, we obtain:
[30] Liao Y, Wang S. A secure dynamic ID based remote user authentication scheme
cμ (1 − θ ) f1 [cr f0 + (1 − c )(1 − r )θ f1 ] for multi-server environment. Comput Stand Interfaces 2009;31(1):24–9.
ρ∗ = > 0 and
[δ − cμ (1 − θ ) f1 ][r f0 − (1 − r )θ f1 ]
[31] Maes S., Tuyls K., Vanschoenwinkel B., Manderick B. Credit card fraud detection
using Bayesian and neural networks. In: Proceedings of the 1st international
α∗ = 1−c−ρ . ∗ NAISO congress on neuro fuzzy technologies 2002:261–270.
[32] Magder L, Hughes J. Logistic regression when the outcome is measured with
 uncertainty. Am J Epidemiol 1997;146:195–203.
[33] Orzechowski, Walker. Debit card fraud: the impact of proposed regulations
References on the food retailing industry. 2012. https://www.fmi.org/docs/interchange/
fmi- report- on- debit- card- fraud.pdf.
[1] Adyen.com. Worldwide impact of 3d secure on transaction conversion [34] Paasch C. Credit card fraud detection using artificial neural networks tuned
rates. 2014. https://www.adyen.com/fr_FR/presse- et- medias/press- releases/ by genetic algorithms. Hong Kong University of Science and Technology (Hong
press-release-detail/2014/adyen-analysis-reveals-worldwide-impact-of-3d- Kong); 2008.
secure- on- transaction- conversion- rates.

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001
JID: OME
ARTICLE IN PRESS [m5G;July 20, 2018;2:29]

D. Wang et al. / Omega 000 (2018) 1–17 17

[35] Pascual A. Future proofing card authorization. 2015. https://www. [44] Thompson P, Noordewier T. Estimating the effects of consumer incentive pro-
javelinstrategy.com/coverage-area/future-proofing-card-authorization. grams on domestic automobile sales. J Bus Econ Stat 1992;10(4):409–17.
[36] Phua C., Lee V., Smith K., Gayler R. A comprehensive survey of data mining- [45] US payments forum. Card-not-present fraud around the world. 2017.
based fraud detection research. 2010. arXiv:1009.6119 https://www.uspaymentsforum.org/wp-content/uploads/2017/03/CNP-Fraud-
[37] Pozzolo DA, Caelen O, Le B, Yann A, Waterschoot S, Bontempi G. Learned Around-the-World-WP-FINAL-Mar-2017.pdf.
lessons in credit card fraud detection from a practitioner perspective. Expert [46] Van Vlasselaer V, Eliassi-Rad T, Akoglu L, Snoeck M, Baesens B. GOTCHA!
Syst Appl 2014;41(10):4915–28. Network-based fraud detection for social security fraud. Manage Sci
[38] Pozzolo DA. Adaptive machine learning for credit card fraud detection. Univer- 2017;63(9):3090–110.
sité libre de Bruxelles; 2015. [47] Verifi Inc. What every card not present merchant should know. 2014. https:
[39] Raj S, Portia A. Analysis on credit card fraud detection methods 2011 interna- //www.verifi.com/wp-content/uploads/2014/05/Verifi_eBook_web_noCNP.pdf.
tional conference on computer. Commun Electr Technol (ICCCET) 2011:152–6. [48] VISA Inc. Card acceptance guidelines for visa merchants. 2015.
[40] Robertson D. The Nilson report. 2016. https://www.nilsonreport.com/upload/ https://usa.visa.com/dam/VCOM/global/support-legal/documents/
content_promo/The_Nilson_Report_10- 17- 2016.pdf. card- acceptance- guidelines- visa- merchants.pdf.
[41] Sahin Y, Duman E. Detecting credit card fraud by ANN and logistic regression. [49] Whitrow C, Hand D, Juszczak P, Weston D, Adams N. Transaction aggrega-
In: Proceedings of the International Symposium Innovations in Intelligent Sys- tion as a strategy for credit card fraud detection. Data Min Knowl Discov
tems and Applications (INISTA). IEEE; 2011. p. 315–19. 2009;18(1):30–55.
[42] Sahin Y, Duman E. Detecting credit card fraud by decision trees and support [50] Wu J, Zhai X, Huang Z. Incentives for information sharing in duopoly with ca-
vector machines. In: Proceedings of the International Multi Conference of En- pacity constraints. Omega (Westport) 2008;36:963–75.
gineers and Computer Scientists (IMECS); 2011. [51] Yang G, Wong D, Wang H, Deng X. Two-factor mutual authentication based on
[43] Taylor T. Supply chain coordination under channel rebates with sales effort smart cards and passwords. J Comput Syst Sci 2008;74(7):1160–72.
effects. Manage Sci 20 02;48(8):992–10 07.

Please cite this article as: D. Wang et al., Credit card fraud detection strategies with consumer incentives, Omega (2018),
https://doi.org/10.1016/j.omega.2018.07.001

Vous aimerez peut-être aussi