{"id":298,"date":"2021-10-12T12:09:26","date_gmt":"2021-10-12T12:09:26","guid":{"rendered":""},"modified":"2026-01-02T15:21:54","modified_gmt":"2026-01-02T15:21:54","slug":"financial-fraud-benfords-law-2187","status":"publish","type":"post","link":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php","title":{"rendered":"Fighting Credit Card Fraud"},"content":{"rendered":"<h2>Introduction<\/h2>\n<p>As we become ever closer to a cashless society, the use of credit cards has become fundamental in everyday life. However, due to the increasing distribution of cards to UK residents, 158.9 million in 2018 rising to 159.2 million has given a proportional opportunity of credit card fraud. [1]<\/p>\n<p>In the UK, fraud losses totalled to \u00a3620.6 million in 2019, with a total spend on all debit and credit cards reaching \u00a3829 billion in 2019 through 22 billion transactions made during the year. A key focus for banks and law enforcement is to prevent such fraud occurring as much as possible. Banks and card companies stopped \u00a3999.2 million of card fraud in 2019. This is equivalent to \u00a36.17 in every \u00a310 of attempted card fraud being prevented. [1]<\/p>\n<p>Within the Transactions Industry, fraud occurs through illegal usage of credit card details without the real cardholder&#8217;s knowledge. Fraudulent transactions usually occur through counterfeit or stolen Credit Cards . Once a payment transaction has been spotted which the account holder did not make, they have the right to dispute the charge by contacting his\/her bank. The bank or credit card company conducts an investigation (12). Within Mathematics lie an extensive list of credit card fraud detection methods such as Decision Trees, Genetic Algorithms &#038; Neural Networks. (13)<\/p>\n<p>To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud &#8211; here we will be focusing on the use of Benford&#8217;s Law. [2]<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017001.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<h2>What is Benford&#8217;s Law?<\/h2>\n<p>If I asked you how the occurrence of the first significant digits of a set of random numbers are distributed, most would feel (Fig. A) the Gendankan test portrays how it would be. However, the truth is that the lower the number, the more frequently it will occur (Fig, B). This is applicable to anything from numbers on the front page of the financial times, to the number of views of every video on Tik Tok; this is due to Benford&#8217;s Law.<\/p>\n<p>Benford&#8217;s Law (The First Digit Law) states that the first significant digits are not uniformly distributed as expected. Instead they follow a logarithmic distribution asserting that the first significant digit (<em>D<\/em><sub>1<\/sub> ) does not have an equal probability of being one of nine possible digits 1, 2, \u2026, 9. However 30% of the time, <em>D<\/em>\u200b \u200b<em>1<\/em> will be 1, 17% of the time <em>D<\/em>\u200b \u200b<em>1<\/em> will be 2, and this continues to <em>D<\/em>\u200b \u200b<em>1<\/em> being 9 under 5% of the time with probabilities decreasing monotonically inbetween.<\/p>\n<h3>How does Benford&#8217;s Law Work?<\/h3>\n<p>This surprising law which applies to all aspects of life, is given from this equation of probability:<\/p>\n<p><strong>Pr(D<\/strong>\u200b<strong>1=<\/strong>\u200b <strong><em>d<\/em><\/strong>\u200b \u200b<strong>) = log<\/strong>\u200b<strong>10(1<\/strong>\u200b <strong>+<\/strong> <u><sup>1<\/sup><\/u><em><sub>d<\/sub><\/em> <strong>) for <em>d<\/em><\/strong>\u200b \u200b\u2208 <strong>{1,2,&#8230;,9} <\/strong> (6)\u200b<\/p>\n<p>Here is the logarithmic equation for the probability of our first significant digit being D\u200b1. Seeing this equation can be confusing as an explanation of why Pr(D\u200b1 = 1) = 30.1%, Pr(D\u200b1 = 2) = 17.6% and so on, this is down to the concept of\u00a0<strong>Scale Invariance<\/strong>. (3)\u200b<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017002.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p>Scale Invariance can be best visualised through a pencil with a length of one unit:<\/p>\n<p>If we then increased the pencil&#8217;s length, until we have doubled the length (increased 100%) it will be 1.<em>x<\/em>units long until the first significant digit <em>D<\/em> <sub>1<\/sub> changes from 1 to 2.<\/p>\n<p>\u200bHowever, changing the length from <em>D<\/em>\u200b \u200b<em>1<\/em>= 2 to <em>D<\/em>\u200b \u200b<em>1<\/em> = 3 the increase is only 50%. Best visualized on a logarithmic scale (Fig. C):<\/p>\n<p><img decoding=\"async\" alt=\"\" id=\"Group8027\" src=\"https:\/\/images.ukessays.com\/111021\/0968017003.jpg\" \/><\/p>\n<p>This logarithmic scale shows moving along the scale, the distance between each subsequent mark becomes shorter until the next magnitude is achieved, showing the invariance of scale. Before a new magnitude, changing from D\u200b1= 9 requires only an 11% change is required to change the value. However you can see the percentage of time that <em>D<\/em><sub>1<\/sub> = 1 is 30.1% of the time (the light grey area). (3)<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017004.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p>Therefore, when finding the probability of the first significant digit <em>d<\/em>\u200b \u200b, it will be in the interval of<\/p>\n<p><em>log<\/em>(<em>d<\/em> + 1) \u2212 <em>log<\/em>(<em>d<\/em>) which gives us <em>log<\/em><img decoding=\"async\" alt=\"\" id=\"Picture9678\" src=\"https:\/\/images.ukessays.com\/111021\/0968017005.jpg\" \/> &#8211;<\/p>\n<p>our formula for the probability of <em>D<\/em>\u200b \u200b<em>1<\/em><sub>\u200b<\/sub>. Inputting <em>d<\/em>\u200b \u2208 <em>{1,2,&#8230;,9}<\/em> \u200bgives our probabilities:<\/p>\n<p>Therefore for data to conform to Benford&#8217;s Law it must be scale invariant. If we represent numbers in a scale invariant set of data as\u00a0<em>D<\/em><sub>1<\/sub>\u00b7 10<em><sup>k<\/sup><\/em> and multiply by a constant \u03b1 which should not alter the distribution, where <em>D<\/em><sub>1<\/sub> is our first significant digit &#038; 10<em><sup>k<\/sup><\/em> is the exponent. Giving us \u03b1 \u00b7 <em>D<\/em><sub>1<\/sub> \u00b7 10<em><sup>k<\/sup><\/em> , we can take logarithms: <em>log<\/em>(\u03b1 \u00b7 <em>D<\/em><sub>1<\/sub> \u00b7 10<em><sup>k<\/sup><\/em>) = <em>log<\/em>(\u03b1) + <em>log<\/em>(<em>D<\/em><sub>1<\/sub>) + 10<em><sup>k<\/sup><\/em> which shows the uniform distribution on a logarithmic scale.<\/p>\n<p>Scale Invariance is also proven through splitting the base 10 logarithm into their exponent and mantissa. Take x as a real positive number written in the form of <em>x<\/em> \u00b7 <em>y<\/em> \u00b7 10<em><sup>n<\/sup><\/em> , where <em>y<\/em> <img decoding=\"async\" alt=\"\" id=\"Picture9679\" src=\"https:\/\/images.ukessays.com\/111021\/0968017006.jpg\" \/> is the mantissa &#038; <em>n<\/em> \u2208\u2124 is the exponent (base 10), taking logs (base 10) gives<em>log<\/em>(<em>x<\/em>) = <em>log<\/em>(<em>y<\/em>) + <em>n<\/em> , now let&#8217;s use 3.45, <em>log<\/em>(3.45) = 0.537819 . (10)<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017007.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p>As you can see, our mantissa (fractional part) repeats itself over all magnitudes, the first significant digit (<em>D<\/em><sub>1<\/sub> ) of our mantissa in this example is 5. If we plotted D1 of the mantissa of a common logarithm against a logarithmic scale &#8211; we have:<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017008.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p>As you can see, the distribution results in <em>D<\/em><sub>1<\/sub> equalling 1 having the largest interval over the interval of <em>D<\/em><sub>1<\/sub> = 2, 3, \u2026, 9.<\/p>\n<h3>Does it apply for the Second Digit?<\/h3>\n<p>If a distribution for the first digit exists, this would naturally lead to a distribution for the second digit existing. There is in fact a distribution for any digit. So the probability, for example, of the second digit being a 4 is just the sum of the probabilities of the number being 1.4, 2.4, 3.4 \u2026 all the way up to 9.3. (4)<\/p>\n<p>This is stated as the joint distribution \u2013 the probability of the second digit having a particular value is given that the first digit has another value thus this probability not being independent. Therefore giving us the General Significant Digit Law:<\/p>\n<p>\u22121 <em>k<\/em><\/p>\n<p><em>P<\/em>(<em>D<\/em><sub>1<\/sub> = <em>d<\/em><sub>1,&#8230;,<\/sub><em>D<sub>k<\/sub><\/em> = <em>d<sub>k<\/sub><\/em>) = <em>log<\/em><sub>10<\/sub>(1 + (\u2211 <em>d<sub>i<\/sub><\/em>10<em><sup>k<\/sup><\/em><sup>\u2212<em>i<\/em><\/sup>) for <em>d<\/em><sub>1<\/sub> = 0&#8230;9 , <em>k<\/em> \u2208 <em>N<\/em> ,<em>d<sub>j<\/sub><\/em> = 0&#8230;9 ,<em>j<\/em> = 2&#8230;<em>k<\/em> (6)<\/p>\n<p><em>i<\/em>=1<\/p>\n<p>For example, if digits follow the Benford distribution, the combination of significant digits 1129 (e.g. 0.001129) is expected with probability <em>log<\/em><sub>10<\/sub>[1 + <img decoding=\"async\" alt=\"\" id=\"Picture9680\" src=\"https:\/\/images.ukessays.com\/111021\/0968017009.jpg\" \/>] . This &#8220;general significant-digit law&#8221;allows the occurrence of the marginal distributions of second-order and higher-order digits. (4)<\/p>\n<h2>So how can Benford&#8217;s Law be used in Finance?<\/h2>\n<p>Within foreign exchange &#038; stock pricing, converting from Dollars Per stock to Pesos Per Stock will retain similar first digit frequencies irrespective of the first digit of the stock prices changing radically. This is also apparent if changing stock pricing from Dollars Per Stock to Stocks Per Dollar, however if we applied this to stock tables not close to Benford&#8217;s Law (such as uniformly distributed prices), we would see a clear change in <em>D<\/em><sub>1<\/sub> frequencies. (6)<\/p>\n<p>Purchases can range from negligible penny transactions amounts to mortgage repayments all the way to buying homes outright. Due to scale invariance these transactions would span several magnitudes when expressed as \u03b1 &#8211; <em>D<\/em><sub>1<\/sub> &#8211; 10<em><sup>k<\/sup><\/em> therefore creating a broad probability distribution that would make it possible for financial &#038; Credit Card Statements to conform to Benford&#8217;s Law.<\/p>\n<p>Benford&#8217;s Law is used extensively in the testing of fabricated data, only applicable to data that spreads over large magnitudes &#8211; which is shown by the proof through a logarithmic scale. We can look at two sets of data which satisfy the conditions for being tested against Benford&#8217;s Law:<\/p>\n<h2>Putting Benford&#8217;s Law To The Test<\/h2>\n<p>Due to the strength and versatility of Benford&#8217;s Law, we have seen that financial data can span magnitudes and obey scale invariance. Therefore we are able to analyse two examples of credit card data: fraudulent and non-fraudulent. Using Benford&#8217;s Law to detect fraudulent data, we will analyse a plot against Benford&#8217;s Law and then a statistical to find the goodness-of-fit to Benford&#8217;s Distribution to test against our null and alternative hypotheses. Using Google Sheets we are able to compute the given value for the following tests using the LEFT and COUNTIF functions to find <em>D<\/em><sub>1<\/sub> of each value and sum up the number of observations. (7) <strong>Statistical Test: Chi-Squared Goodness-of-fit<\/strong><\/p>\n<p>Due to looking into if data is compliant with Benford&#8217;s Distribution, the chi &#8211; squared goodness-of-fit is the ideal hypothesis test<sup>.<\/sup> \u200b We\u200b will calculate our chi &#8211; squared statistic using this formula:<\/p>\n<p>9 <sub>2<\/sub><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017010.jpg\" style=\"margin: 0px 12px;\" \/> \u03c72 = <sub>\u2211<\/sub> <img decoding=\"async\" alt=\"\" id=\"Group8388\" src=\"https:\/\/images.ukessays.com\/111021\/0968017011.jpg\" \/>(<em>O<sub>d<\/sub><\/em> <em><sub>E<\/sub><\/em>\u2212 <em>d<\/em><em>E<sub>d<\/sub><\/em>)<\/p>\n<p><em>d<\/em>=1<\/p>\n<p>Producing our null &#038; alternative hypotheses:<\/p>\n<p><em>H<\/em><sub>0<\/sub> : \u03c7<sup>2<\/sup> \u2264 20.09- The first significant digits in this set of data obey Benford&#8217;s Law.<\/p>\n<p><em>H<\/em><sub>1<\/sub> : \u03c7<sup>2<\/sup> > 20.09- The first significant digits in this set of data do not obey Benford&#8217;s Law.<\/p>\n<p>For each example, through Google Sheets we have computed each step of our chi-squared hypothesis test, finding the frequency of each first significant digit, the expected occurrence of this digit in relation to Benford&#8217;s distribution, finally plugging our values into our chi-squared formula. Finally summing up our final column to give our critical value:<\/p>\n<h3>1) State of Arizona v. Wayne James Nelson (CV92-18841)<\/h3>\n<p>In 1993, in State of Arizona v. Wayne James Nelson (CV92-18841), the accused was found guilty of trying to defraud the state of nearly $2 million, by diverting funds to a bogus vendor. (8)<\/p>\n<p><strong>Graphical &#038; Numerical Analysis<\/strong><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017012.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017013.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p>Here the first significant digits being 1 and 9 at 5% and 38% respectively, there is also a clear gap of 0% for first significant digits being 3 to 6. This clearly does not conform to Benford&#8217;s Law due to no correlation. The data does span magnitudes and expresses scale invariance, however the fraudulent values do not conform to Benford&#8217;s Law. (Fig E)<\/p>\n<p><strong>Statistical Test<\/strong><\/p>\n<p>\u03c7<sup>2<\/sup> = 4.75 + 2.16 + &#8230; + 55.44 = 135.94<\/p>\n<p>As \u03c7<sup>2<\/sup> > 20.09, we are able to reject H <sub>0<\/sub>\u200b and accept H<sub>\u200b <\/sub> \u200b1<sub>\u200b<\/sub> Therefore sufficient\u200b evidence that this data does not conform to Benford&#8217;s Law and may be subjected to tampering.<\/p>\n<h3>2) Credit Card Users v Expenditure Per User<\/h3>\n<p>Here we have a set of 187 Credit Card users and their expenditure over a set period of time. Due to being scale invariant, spanning magnitudes and randomly collected &#8211; we expect this set of data to conform to Benford&#8217;s Law. (9)<\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017014.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/images.ukessays.com\/111021\/0968017015.jpg\" style=\"margin: 0px 12px;\" \/><\/p>\n<p><strong>Graphical &#038; Numerical Analysis<\/strong><\/p>\n<p>In this set of data, it is clear that the first significant digit equalling 1 occurs more frequently than all other digits. Like Benford&#8217;s Law, the occurrence of each first significant digit, decreases as <em>D<\/em>\u200b \u200b<em>1<\/em><sub>\u200b<\/sub>\u200bincreases. (Fig F)<\/p>\n<p><strong>Statistical Test<\/strong><\/p>\n<p>\u03c7<sup>2<\/sup> = 0.24 + 1.91 + &#8230; + 1.48 = 10.18<\/p>\n<p>As \u03c7<sup>2<\/sup> < 20.09, there is sufficient evidence to accept H <sub>0<\/sub>\u200b thus rejecting H<sub>\u200b <\/sub> 1\u200b ,<sub>\u200b<\/sub> proving that this data conforms to Benford&#8217;s Law.<\/p>\n<h2>Overall Thoughts &#038; Conclusion<\/h2>\n<p>As we have seen, data that does meet the given requirements of testing against Benford&#8217;s Law will give a clear indication of the validity of the data we are looking at. However, financial data will not always meet the requirements such as spanning numerous magnitudes; nor will this law help spot which values are fraudulent, but instead the presence. For this reason Benford&#8217;s Law must not be used as a primary test to determine the validity of Financial Data, but should be used more as a supporting test. We can also use our Chi &#8211; Squared tested in correspondence with the further digits using the general significant digit distribution we looked at earlier, thus giving a more effective use of Benford&#8217;s Law in testing for the presence of fraudulent data.<\/p>\n<h2>References<\/h2>\n<p>(1) Fraud, the Facts &#8211; UK Finance 2020: https:\/\/www.ukfinance.org.uk\/policy-and-guidance\/reports-publications\/fraud-facts-2020<\/p>\n<p>(2) 15 Disturbing Credit Card Facts 2021:<\/p>\n<p><a href=\"https:\/\/www.cardrates.com\/advice\/credit-card-fraud-statistics\/\" rel=\"nofollow noopener\">https:\/\/www.cardrates.com\/advice\/credit-card-fraud-statistics\/<\/a><\/p>\n<p>(3) Data Genetics: Benford&#8217;s Law: https:\/\/www.datagenetics.com\/blog\/march52012\/index.html<\/p>\n<p>(4) Second Digit Phenomenon:<\/p>\n<p>https:\/\/econwpa.ub.uni-muenchen.de\/econ-wp\/othr\/papers\/0507\/0507001.pdf<\/p>\n<p>(5) Barrow, P. J. (2011, February Tuesday). Benford&#8217;s Very Strange Law. Retrieved from Gresham College:<\/p>\n<p>www.gresham.ac.uk\/lectures-and-events\/benfords-very-strange-law<\/p>\n<p>(6) Encyclopedia of Mathematics: Benford&#8217;s Law:<\/p>\n<p>https:\/\/encyclopediaofmath.org\/wiki\/Benford_law<\/p>\n<p>(7) Detecting Numeric Irregularities with Benford&#8217;s Law:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"vnhyuOIsgD\"><p><a href=\"https:\/\/blog.bigml.com\/2015\/05\/15\/detecting-numeric-irregularities-with-benfords-law\/\">Detecting numeric irregularities with Benford&#8217;s&nbsp;Law<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Detecting numeric irregularities with Benford&#8217;s&nbsp;Law&#8221; &#8212; The Official Blog of BigML.com\" src=\"https:\/\/blog.bigml.com\/2015\/05\/15\/detecting-numeric-irregularities-with-benfords-law\/embed\/#?secret=J3eOKiO2tK#?secret=vnhyuOIsgD\" data-secret=\"vnhyuOIsgD\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>(8) How to Commit Tax Fraud: http:\/\/alfre.dk\/how-to-commit-tax-fraud\/<\/p>\n<p>(9) Credit Card Client Data:<\/p>\n<p>https:\/\/www.kaggle.com\/mariosfish\/default-of-credit-card-clients<\/p>\n<p>(10) Stack Exchange &#8211; How does Benford&#8217;s Law Work, Rob John, January<\/p>\n<p>2013:https:\/\/math.stackexchange.com\/questions\/781\/why-does-benfords-law-or-zipfs-law-hold\/291662#291662<\/p>\n<p>(11) Hills, T. (1998). The First Digit Phenomenon. American Scientist 86,:<\/p>\n<p>https:\/\/hill.math.gatech.edu\/publications\/PAPER%20PDFS\/TheFirstDigitPhenomenonAmericanScientist1996.pdf<\/p>\n<p>(12) What is a Fraudulent Transaction? &#8211; Cardinality:<\/p>\n<p>https:\/\/cardinity.com\/faq\/what-is-a-fraudulent-transaction<\/p>\n<p>(13) http:\/\/usir.salford.ac.uk\/id\/eprint\/2595\/1\/BBS.pdf &#8211; Credit card fraud and detection techniques : a review (Delamaire, L, Abdou, HAH and Pointon, J, 2009)<\/p>\n<h2>Figures<\/h2>\n<p>(A) https:\/\/www.datagenetics.com\/blog\/march52012\/index.html (B) https:\/\/www.datagenetics.com\/blog\/march52012\/index.html<\/p>\n<p>(C) <a href=\"https:\/\/www.datagenetics.com\/blog\/march52012\/index.html\" rel=\"nofollow noopener\">https:\/\/www.datagenetics.com\/blog\/march52012\/index.html<\/a><\/p>\n<p>(D) <a href=\"https:\/\/math.stackexchange.com\/questions\/781\/why-does-benfords-law-or-zipfs-law-hold\/291662#291662\" rel=\"nofollow noopener\">https:\/\/math.stackexchange.com\/questions\/781\/why-does-benfords-law-or-zipfs-law-hold\/291662#291662<\/a><\/p>\n<p>(E) <a href=\"http:\/\/alfre.dk\/how-to-commit-tax-fraud\/\" rel=\"nofollow noopener\">http:\/\/alfre.dk\/how-to-commit-tax-fraud\/<\/a><\/p>\n<p>(F) http:\/\/alfre.dk\/how-to-commit-tax-fraud\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud &#8211; here we will be focusing on the use of Benford&#8217;s Law.<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[],"class_list":["post-298","post","type-post","status-publish","format-standard","hentry","category-essaysfinance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fighting Credit Card Fraud | UKEssays.com<\/title>\n<meta name=\"description\" content=\"To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud - here we will be focusing on the use of Benford&#039;s Law.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting Credit Card Fraud | UKEssays.com\" \/>\n<meta property=\"og:description\" content=\"To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud - here we will be focusing on the use of Benford&#039;s Law. - only from UKEssays.com .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\" \/>\n<meta property=\"og:site_name\" content=\"UKEssays.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UKEssays\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-12T12:09:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-02T15:21:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ukessays.com\/111021\/0968017001.jpg\" \/>\n<meta name=\"author\" content=\"Matt Swarbrick\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@UKEssays\" \/>\n<meta name=\"twitter:site\" content=\"@UKEssays\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matt Swarbrick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ScholarlyArticle\",\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\"},\"author\":{\"name\":\"Matt Swarbrick\",\"@id\":\"https:\/\/www.ukessays.com\/#\/schema\/person\/a89c6b41d73b625b53907f4ed5c1b7fe\"},\"headline\":\"Fighting Credit Card Fraud\",\"datePublished\":\"2021-10-12T12:09:26+00:00\",\"dateModified\":\"2026-01-02T15:21:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\"},\"wordCount\":2054,\"image\":{\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.ukessays.com\/111021\/0968017001.jpg\",\"articleSection\":[\"Finance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\",\"url\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\",\"name\":\"Fighting Credit Card Fraud | UKEssays.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.ukessays.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.ukessays.com\/111021\/0968017001.jpg\",\"datePublished\":\"2021-10-12T12:09:26+00:00\",\"dateModified\":\"2026-01-02T15:21:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.ukessays.com\/#\/schema\/person\/a89c6b41d73b625b53907f4ed5c1b7fe\"},\"description\":\"To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud - here we will be focusing on the use of Benford's Law.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage\",\"url\":\"https:\/\/images.ukessays.com\/111021\/0968017001.jpg\",\"contentUrl\":\"https:\/\/images.ukessays.com\/111021\/0968017001.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ukessays.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fighting Credit Card Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ukessays.com\/#website\",\"url\":\"https:\/\/www.ukessays.com\/\",\"name\":\"UKEssays.com\",\"description\":\"True ROI on Academic Writing Expertise\",\"alternateName\":\"UK Essays\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ukessays.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ukessays.com\/#\/schema\/person\/a89c6b41d73b625b53907f4ed5c1b7fe\",\"name\":\"Matt Swarbrick\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5c637203fec22da06da2731282777f600a6b7197710af91fea49a5f959fc792f?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c637203fec22da06da2731282777f600a6b7197710af91fea49a5f959fc792f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c637203fec22da06da2731282777f600a6b7197710af91fea49a5f959fc792f?s=96&d=mm&r=g\",\"caption\":\"Matt Swarbrick\"},\"description\":\"Matt holds a BA and MA certificate from Cambridge, and is an subject-matter expert in Business and Management. Matt also writes about subjects like Finance, Economics and Computing\/ICT.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/matt-swarbrick-6a9b671\"],\"url\":\"https:\/\/www.ukessays.com\/author\/matt-swarbrick\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fighting Credit Card Fraud | UKEssays.com","description":"To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud - here we will be focusing on the use of Benford's Law.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php","og_locale":"en_US","og_type":"article","og_title":"Fighting Credit Card Fraud | UKEssays.com","og_description":"To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud - here we will be focusing on the use of Benford's Law. - only from UKEssays.com .","og_url":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php","og_site_name":"UKEssays.com","article_publisher":"https:\/\/www.facebook.com\/UKEssays","article_published_time":"2021-10-12T12:09:26+00:00","article_modified_time":"2026-01-02T15:21:54+00:00","og_image":[{"url":"https:\/\/images.ukessays.com\/111021\/0968017001.jpg","type":"","width":"","height":""}],"author":"Matt Swarbrick","twitter_card":"summary_large_image","twitter_creator":"@UKEssays","twitter_site":"@UKEssays","twitter_misc":{"Written by":"Matt Swarbrick","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ScholarlyArticle","@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#article","isPartOf":{"@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php"},"author":{"name":"Matt Swarbrick","@id":"https:\/\/www.ukessays.com\/#\/schema\/person\/a89c6b41d73b625b53907f4ed5c1b7fe"},"headline":"Fighting Credit Card Fraud","datePublished":"2021-10-12T12:09:26+00:00","dateModified":"2026-01-02T15:21:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php"},"wordCount":2054,"image":{"@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage"},"thumbnailUrl":"https:\/\/images.ukessays.com\/111021\/0968017001.jpg","articleSection":["Finance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php","url":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php","name":"Fighting Credit Card Fraud | UKEssays.com","isPartOf":{"@id":"https:\/\/www.ukessays.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage"},"image":{"@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage"},"thumbnailUrl":"https:\/\/images.ukessays.com\/111021\/0968017001.jpg","datePublished":"2021-10-12T12:09:26+00:00","dateModified":"2026-01-02T15:21:54+00:00","author":{"@id":"https:\/\/www.ukessays.com\/#\/schema\/person\/a89c6b41d73b625b53907f4ed5c1b7fe"},"description":"To show a present time effect of credit card fraud being capitalised upon, through the COVID-19 pandemic, attempted fraudulent transactions rose by 35% in April 2020 in the United States. With an increase happening, there are numerous methods of tackling fraud - here we will be focusing on the use of Benford's Law.","breadcrumb":{"@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#primaryimage","url":"https:\/\/images.ukessays.com\/111021\/0968017001.jpg","contentUrl":"https:\/\/images.ukessays.com\/111021\/0968017001.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ukessays.com\/essays\/finance\/financial-fraud-benfords-law-2187.php#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ukessays.com\/"},{"@type":"ListItem","position":2,"name":"Fighting Credit Card Fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.ukessays.com\/#website","url":"https:\/\/www.ukessays.com\/","name":"UKEssays.com","description":"True ROI on Academic Writing Expertise","alternateName":"UK Essays","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ukessays.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ukessays.com\/#\/schema\/person\/a89c6b41d73b625b53907f4ed5c1b7fe","name":"Matt Swarbrick","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5c637203fec22da06da2731282777f600a6b7197710af91fea49a5f959fc792f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5c637203fec22da06da2731282777f600a6b7197710af91fea49a5f959fc792f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c637203fec22da06da2731282777f600a6b7197710af91fea49a5f959fc792f?s=96&d=mm&r=g","caption":"Matt Swarbrick"},"description":"Matt holds a BA and MA certificate from Cambridge, and is an subject-matter expert in Business and Management. Matt also writes about subjects like Finance, Economics and Computing\/ICT.","sameAs":["https:\/\/www.linkedin.com\/in\/matt-swarbrick-6a9b671"],"url":"https:\/\/www.ukessays.com\/author\/matt-swarbrick"}]}},"_links":{"self":[{"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/posts\/298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":1,"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":93689,"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/posts\/298\/revisions\/93689"}],"wp:attachment":[{"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ukessays.com\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}