PRESENTING A DECISION TREE-BASED DATA MINING MODEL TO INCREASE THE SECURITY OF USERS' INFORMATION IN THE USE OF ELECTRONIC SERVICES CONSIDERING INTERNET BANKING SYSTEM
Corresponding author:
[email protected]
Received
29 December 2022
Revised
4 February 2023
Accepted
07 March 2023
Available Online
15 March 2023
Abstract
THE MAIN GOAL OF THIS RESEARCH STUDY IS TO PRESENT A DATA MINING MO DEL BASED ON A DECISION TREE TO INCREASE THE SECURITY OF USERS' INFORMATION IN THE USE OF ELECTRONIC SERVICES. TO DETERMINE THE SECURITY OF USERS' INFORMATION IN THE USE OF ELECTRONIC SERVICES. THEREFORE, BASED ON THE DATA AVAILABLE IN THE DATABASE OF 4376 CUSTOMERS OF ELECTRONIC SERVICES IN THE BANK OF AGRICULTURE, THE DATA WAS ANALYZED IN THE DATA MINING MODELS OF CLASSICAL DECISION TREE, NAIVE BIZ, RANDOM FOREST, ROOT TREE, DEEP LEARNING AND NEURAL NETWORK. THEREFORE, BY RUNNING THE RAPIDMINER SOFTWARE, THE OUTPUT OF THE MODEL WAS ANALYZED IN THE PARAMETERS OF ACCURACY, CLASSIFICATION ERROR PERCENTAGE, KAPPA COEFFICIENT AND ABSOLUTE ERROR, AND THE RESULTS SHO WED THAT THE CLASSIC DECISION TREE MODEL AND THE RANDOM FOREST MODEL WERE THE BEST WITH 99.42 PERC ENT EACH. HAVE WHILE THE ROOT TREE IS NOT IN A GOOD CONDITION WITH 87.88, IN RELATION TO THE CLASSIFICATION ERROR, THE CONDITIONS OF THE CLASSIC DECISION TREE AND DECISION FOREST MODELS AND THEN THE NEURAL NETWORK MODEL WERE FOUND TO BE MORE SUITABLE THAN OTHER DATA MINING MODELS; IN RELATION TO THE KAPPA ERROR, THE CLASSICAL DECISION TREE AND RANDOM FOREST OBTAINED A MORE FAVORABLE SITUATION THAN OTHER METHODS WITH 0.989, ALSO IN RELATION TO THE ABSOLUTE NORMAL ERROR, THE CLASSICAL DECISION TREE AND RANDOM FOREST EACH SHOWED A LOWER ERROR WITH A RATE OF 0.039.
Keywords
DATA MINING
DECISION TREE
ELECTRONIC BANKING
USER INFORMATION
Full Text
The body of this article is intentionally hidden on the public page. Please use the PDF reader or the PDF download for the complete text.
References
[1]
Birau, R., Sp ulbar, C., Karbassi Yazdi, A., ShahrAeini, S.A., (2021) Critical success factors for CRM implementation in the Iranian banking sector: A conceptual analysis, Revista de Științe Politice. Revue des Sciences Politiques, No. 69, 32 – 45.
[2]
Samartha, V., Shenoy Basthikar, S., Hawaldar, I.T., Spulbar, C., Birau, R., F ilip, R.D. (2022) A Study on the Acceptance of Mobile -Banking Applications in India - Unified Theory of Acceptance and Sustainable Use of Technology Model (UTAUT), Sustainability, 14(21): 14506. https://doi.org/10.3390/su142114506.
[3]
Mouratidis, H., Shei, S., Delaney, A. (2020). A security requirements modelling language for cloud computing environments. Software and Systems Modeling, 19(2), 271-295.
[4]
Karbassi Yazdi, A., Spulbar, C., Hanne, T., Birau, R. (2022) Ranking performance indicators related to banking by using hybrid multicriteria methods in an uncertain environment: a case study for Iran under COVID-19 conditions, Systems Science & Control Engineering, 10:1, 166 -180, DOI: 10.1080/21642583.2022.2052996.
[5]
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konw inski, A., Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
[6]
El Sibai, R., Gemayel, N., Bo u Abdo, J., Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies, 31(2), e3720.
[7]
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I. (2009 ). Cloud computing and emerging IT platforms: Vision , hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.
[8]
Gilpin, K., Lawler, E. (2019). U.S. Patent No. 10,397,213. Washington, DC: U.S. Patent and Trademark Office.
[9]
Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications, 40, 325-344.
[10]
Li, H., Dai, Y., Tian, L., Yang, H. (2009). Identity -based authentication for cloud computing. Cloud computing, 157-166.
[11]
Ullal, M. S., Nayak, P. M., Dais, R. T., Spulbar, C., Birau, R. (2022). Investigating the nexus between Artificial Intelligence and machine learning technologies in the case of Indian services industry. Business: Theory and Practice, 23(2), 323–333. https://doi.org/10.3846/ btp.2022.15366.
[12]
Brumă, L. M. (2020). Data Security Methods in Cloud Computing. Informatica Economica, 2 4(1), 48-60.
[13]
Jones, S., Irani, Z., Sivarajah, U., Love, P.E. (2019). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information systems frontiers, 1-24.
[14]
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98 -115.
[15]
Attaran, M., Woods, J. (2019). Cloud computing technology: improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 31(6), 495-519.
[16]
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371 -386.
[17]
Garg, S. K., Versteeg, S. , Buyya, R. (2013). A framework for ranking of cloud computing ser vices. Future Generation Computer Systems, 29(4), 1012-1023.
[18]
Botta, A., De Donato, W., Persico, V., Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
[19]
Mehdiabadi, A., Shahabi, V., Shamsine jad, S., Amiri, M., Spulbar, C., Birau, R. (2022) Investigating Industry 5.0 and Its Impact on the Banking Industry: Requirements, Approaches and Communications, Applied Sciences, 12(10), 5126, https://doi.org/10.3390/ app12105126
[20]
Ehsanifar, M., Dekamini, F., Spulbar, C., Birau, R., Bajelan, M., Ghadbeykloo, D., Mendon, S., Calotă, A.M. (2022) Analysing the ne xus between artificial neural networks and ARIMA models in predicting customer lifetime value (CLV) for complex development o f society and industrial activities, Industria Textila, 73, 3, 249–258, http://doi.org/10.35530/IT.073.03.20 2142.
[21]
Suherman, A. G., Simatupang, T. M. (2017). The network business model of cloud computing for end-to- end supply chain visibility. International Journal of Value Chain Management, 8(1), 22 -39.
[22]
Salleh, N. A., Hussin, H. (2016). A Conceptual Model on Cloud C omputing and SME Performance: Resource-Based View. In Information and Communication Technology for The Muslim World (ICT4M), 2016 6th International Conference, pp. 105-111, IEEE.
[23]
Ross, P.K., Blumenstein, M. (2015). Cloud computing as a facilitator of SME entrepreneurship. Technology Analysis & Strategic Management, 27(1), 87-101.
[24]
Alshamaila, Y., Papagiannidis, S., Li, F. (2013). Cloud computing adoption by SMEs in the north east of England: A multi -perspective framework. Journal of Enterprise Info rmation Management, 26(3), 250 - 275.