Research Article

A Victim-Based Framework for Telecom Fraud Analysis: A Bayesian Network Model

Table 2

Design of Bayesian network nodes for telecom fraud.

Nodes typeNodes (BN variables)States of Bayesian nodes

Portrait(A) Sex(1) Male, (2) female
(B) Age(1) Youth, (2) middle age, (3) old age
(C) Marriage(1) Married (2) unmarried
(D) Work(1) Company, (2) school, (3) selfemployed person, (4) government
(E) Knowledge(1) High, (2) low

Fraud process(F) Cheat type(1) Identity fraud, (2) shopping fraud, (3) inducement fraud, (4) fictional dangerous situation fraud, (5) daily consumption fraud, (6) phishing and Trojan virus fraud, (7) other types of cheat
(G) Community type(1) Phone, (2) message, (3) social software
(H) Suspect during cheat(1) Yes, (2) no
(I) Call the police(1) Yes, (2) no

Scam results(J) Property loss(1) 0–1000; (2) 1000–5000; (3) 5000–20000; (4) 20000–50000; (5) 50000+