<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Bulletin of Kemerovo State University. Series: Humanities and Social Sciences</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Bulletin of Kemerovo State University. Series: Humanities and Social Sciences</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Вестник Кемеровского государственного университета. Серия: Гуманитарные и общественные науки</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2542-1840</issn>
   <issn publication-format="online">2541-9145</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">104717</article-id>
   <article-id pub-id-type="doi">10.21603/2542-1840-2025-9-3-453-461</article-id>
   <article-id pub-id-type="edn">xjypjn</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Уголовно-правовые науки</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Criminal Law</subject>
    </subj-group>
    <subj-group>
     <subject>Уголовно-правовые науки</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Digital Transformation of Payment Systems:  Fraud Issues and Detection Prospects</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Цифровая трансформация платежных систем:  проблемы мошенничества и перспективы развития  средств и методов обнаружения</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Абдурагимова</surname>
       <given-names>Татьяна Иосифовна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Abduragimova</surname>
       <given-names>Tat'yana Iosifovna</given-names>
      </name>
     </name-alternatives>
     <email>t.abduragimova@yandex.ru</email>
     <bio xml:lang="ru">
      <p>кандидат юридических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of jurisprudence sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Московский университет МВД России имени В.Я. Кикотя</institution>
     <city>москва</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Московский университет МВД России имени В.Я. Кикотя</institution>
     <city>москва</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2025-09-30T04:23:54+03:00">
    <day>30</day>
    <month>09</month>
    <year>2025</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-09-30T04:23:54+03:00">
    <day>30</day>
    <month>09</month>
    <year>2025</year>
   </pub-date>
   <volume>9</volume>
   <issue>3</issue>
   <fpage>453</fpage>
   <lpage>461</lpage>
   <history>
    <date date-type="received" iso-8601-date="2025-05-19T00:00:00+03:00">
     <day>19</day>
     <month>05</month>
     <year>2025</year>
    </date>
    <date date-type="accepted" iso-8601-date="2025-06-10T00:00:00+03:00">
     <day>10</day>
     <month>06</month>
     <year>2025</year>
    </date>
   </history>
   <self-uri xlink:href="https://jsocnet.ru/en/nauka/article/104717/view">https://jsocnet.ru/en/nauka/article/104717/view</self-uri>
   <abstract xml:lang="ru">
    <p>В условиях стремительной цифровизации всех направлений человеческой деятельности, в том числе финансового сектора, ускоренной пандемией COVID-19, проблема мошенничества с кредитными картами приобретает особую актуальность. Данное исследование посвящено комплексному анализу современных технологий обнаружения мошеннических операций, включая методы искусственного интеллекта, обработки больших данных и облачных вычислений. Цель – осветить самые последние и актуальные разработки по обнаружению мошенничества с кредитными картами, влияющие на новые технологии в этой области. Особое внимание уделяется эволюции платежных систем, переходу от традиционных методов к инновационным решениям на основе IoT-устройств и биометрических данных. Рассматриваются ключевые уязвимости существующих систем безопасности, а также перспективные направления развития средств и методов обнаружения мошенничества. Анализируются современные подходы к обработке транзакционных данных, включая распределенные вычисления и машинное обучение, с акцентом на их эффективность в условиях динамично меняющегося поведения пользователей. Исследование подчеркивает необходимость интеграции разнородных источников, данных для повышения точности обнаружения мошеннических операций. Особую значимость приобретает изучение возможностей облачных технологий для создания систем, способных оперативно реагировать на новые виды мошенничества в реальном времени. Предлагаются направления будущих исследований, включающие разработку гибридных моделей на основе данных &#13;
IoT-устройств и биометрических показателей.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The COVID-19 pandemic boosted digitalization in all areas of human activity, including finances. As a result, the problem of credit card fraud is particularly relevant today. This comprehensive analysis highlights the latest and most relevant developments in the detection of credit card fraud, e.g., artificial intelligence, big data processing, and cloud computing methods. It focuses on the evolution of payment systems, including the shift from traditional methods to innovative solutions based on IoT devices and biometric data. The existing security systems remain vulnerable and require novel fraud detection tools and methods. The modern approaches to transaction data processing include distributed computing and machine learning, which proved effective in the context of dynamically changing users’ behavior patterns. Diverse data sources are needed to improve the accuracy of fraud detection. Cloud technologies can create systems capable of prompt response to new types of fraud in real time. Promising research directions include hybrid models based on data from IoT devices and biometric indicators.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>мошенничество</kwd>
    <kwd>банковские карты</kwd>
    <kwd>цифровая трансформация</kwd>
    <kwd>цифровые платежи</kwd>
    <kwd>токенизация</kwd>
    <kwd>биометрические системы</kwd>
    <kwd>транзакции</kwd>
    <kwd>искусственный интеллект</kwd>
    <kwd>Интернет вещей (IoT)</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>fraud</kwd>
    <kwd>bank cards</kwd>
    <kwd>digital transformation</kwd>
    <kwd>digital payments</kwd>
    <kwd>tokenization</kwd>
    <kwd>biometric systems</kwd>
    <kwd>transactions</kwd>
    <kwd>artificial intelligence</kwd>
    <kwd>Internet of things (IoT)</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Liu W., Wang X., Peng W. State of the art: Secure mobile payment. IEEE Access, 2020, 8: 13898–13914. https://doi.org/10.1109/ACCESS.2019.2963480</mixed-citation>
     <mixed-citation xml:lang="en">Liu W., Wang X., Peng W. State of the art: Secure mobile payment. IEEE Access, 2020, 8: 13898–13914. https://doi.org/10.1109/ACCESS.2019.2963480</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сумина А. В. Возможности искусственного интеллекта в раскрытии, расследовании и предупреждении преступлений. Актуальные проблемы права и правоприменительной деятельности: региональные аспекты: Всерос. науч.-практ. конф. (Краснодар, 27 октября 2023 г.) Краснодар: Краснодарский университет МВД России, 2024. С. 179–181. https://elibrary.ru/yxcvqr</mixed-citation>
     <mixed-citation xml:lang="en">Sumina A. V. Possibilities of artificial intelligence in the detection, investigation, and prevention of crimes. Actual problems of law and law enforcement activity: Regional aspects: Proc. All-Russian Sci.-Prac. Conf., Krasnodar, 27 Oct 2023. Krasnodar: Krasnodar University of the MIA of Russia, 2024, 179–181. (In Russ.) https://elibrary.ru/yxcvqr</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сумина А. В. Внедрение информационных технологий в правоохранительную деятельность: возможности искусственного интеллекта в раскрытии, расследовании и предупреждении преступлений. Информационные технологии в деятельности органов внутренних дел: Междунар. науч.-практ. конф. (Москва, 18 апреля 2024 г.) М.: Московский университет МВД РФ им. В. Я. Кикотя, 2024. С. 266–268. https://elibrary.ru/hwnxbv</mixed-citation>
     <mixed-citation xml:lang="en">Sumina A. V. Introduction of information technology in law enforcement: The possibilities of artificial intelligence in the detection, investigation, and prevention of crime. Information technology in the activities of internal affairs: Proc. Intern. Sci.-Prac. Conf., Moscow, 18 Apr 2024. Moscow: V. Y. Kikotya Moscow University of the MIA of the Russian Federation, 2024, 266–268. (In Russ.) https://elibrary.ru/hwnxbv</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Васильева Ю. Д., Сумина А. В. Использование искусственного интеллекта в правоохранительной деятельности: потенциальные возможности применения для раскрытия и расследования преступлений. Право, общество, государство: проблемы истории, теории и практики: Всерос. науч.-практ. конф. (Старотеряево, 12 апреля 2024 г.) М.: Московский университет МВД России им. В. Я. Кикотя, 2024. С. 547–551. https://elibrary.ru/qmfidx</mixed-citation>
     <mixed-citation xml:lang="en">Vasilieva Y. D., Sumina A. V. Artificial intelligence in law enforcement: Potential applications for crime detection and investigation. Law, society, and state: Problems of history, theory, and practice: Proc. All-Russian Sci.-Prac. Conf., Moscow, 12 Apr 2024. Staroteryaevo: V. Y. Kikotya Moscow University of the MIA of Russia, 2024, 547–551. (In Russ.) https://elibrary.ru/qmfidx</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Абдурагимова Т. И. Раскрытие и расследование изготовления, сбыта и использования поддельных кредитных и расчетных пластиковых карт: дис. … канд. юрид. наук. М., 2001. 201 с. https://elibrary.ru/nntouz</mixed-citation>
     <mixed-citation xml:lang="en">Abduragimova T. I. Disclosure and investigation of manufacturing, sale, and use of counterfeit credit and settlement plastic cards. Cand. Law Sci. Diss. Moscow, 2001, 201. (In Russ.) https://elibrary.ru/nntouz</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сучкова Е. А. Исследование личности преступника в ходе расследования неправомерного оборота средств платежей. Научный вестник Орловского юридического института МВД России имени В. В. Лукьянова. 2024. № 3. С. 258–265. https://elibrary.ru/cvztfo</mixed-citation>
     <mixed-citation xml:lang="en">Suchkova E. A. Investigation of the identity of the perpetrator in the course of investigation of illegal circulation of means of payment. Scientific Bulletin of the Orel Law Institute of the Ministry of the Interior of Russia named after V. V. Lukyanov, 2024, (3): 258–265. (In Russ.) https://elibrary.ru/cvztfo</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Филиппов М. Н. Методика расследования краж и мошенничеств, совершенных с использованием банковских карт и их реквизитов. Ведомости уголовно-исполнительной системы. 2015. № 5. С. 26–30. https://elibrary.ru/uygmnj</mixed-citation>
     <mixed-citation xml:lang="en">Filippov M. N. Technique of investigation of thefts and frauds, committed with the use of credit cards of bank details. Vedomosti penal-executive system, 2015, (5): 26–30. (In Russ.) https://elibrary.ru/uygmnj</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Мещеряков В. А. Теоретические основы механизма следообразования в цифровой криминалистике. М.: Проспект, 2022. 176 с. https://elibrary.ru/ejfpkb</mixed-citation>
     <mixed-citation xml:lang="en">Meshcheryakov V. A. Theoretical foundations of the mechanism of trace formation in digital forensics. Moscow: Prospect, 2022, 176. (In Russ.) https://elibrary.ru/ejfpkb</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Al Hashedi K. G., Magalingam P. Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019. Computer Science Review, 2021, 40. https://doi.org/10.1016/j.cosrev.2021.100402</mixed-citation>
     <mixed-citation xml:lang="en">Al Hashedi K. G., Magalingam P. Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019. Computer Science Review, 2021, 40. https://doi.org/10.1016/j.cosrev.2021.100402</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Yvan Lucas, Johannes Jurgovsky. Credit card fraud detection using machine learning: A survey. arXiv, 2020. https://doi.org/10.48550/arXiv.2010.06479</mixed-citation>
     <mixed-citation xml:lang="en">Yvan Lucas, Johannes Jurgovsky. Credit card fraud detection using machine learning: A survey. arXiv, 2020. https://doi.org/10.48550/arXiv.2010.06479</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Popat R., Chaudhary J. A survey on credit card fraud detection using machine learning. 2018 2nd International conference on trends in electronics and informatics (ICOEI): Proc. Conf., Tirunelveli, 11–12 May 2018. IEEE, 2018, 1120–1125. https://doi.org/10.1109/ICOEI.2018.8553963</mixed-citation>
     <mixed-citation xml:lang="en">Popat R., Chaudhary J. A survey on credit card fraud detection using machine learning. 2018 2nd International conference on trends in electronics and informatics (ICOEI): Proc. Conf., Tirunelveli, 11–12 May 2018. IEEE, 2018, 1120–1125. https://doi.org/10.1109/ICOEI.2018.8553963</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kanika, Singla J. A survey of deep learning based online transactions fraud detection systems. 2020 International conference on intelligent engineering and management (ICIEM): Proc. Conf., London, 17–19 Jun 2020. IEEE, 2020, 130–136. https://doi.org/10.1109/ICIEM48762.2020.9160200</mixed-citation>
     <mixed-citation xml:lang="en">Kanika, Singla J. A survey of deep learning based online transactions fraud detection systems. 2020 International conference on intelligent engineering and management (ICIEM): Proc. Conf., London, 17–19 Jun 2020. IEEE, 2020, 130–136. https://doi.org/10.1109/ICIEM48762.2020.9160200</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mittal S., Tyagi S. Computational techniques for real-time credit card fraud detection. Handbook of computer networks and cyber security, eds. Gupta B., Perez G., Agrawal D., Gupta D. Cham: Springer, 2020. https://doi.org/10.1007/978-3-030-22277-2_26</mixed-citation>
     <mixed-citation xml:lang="en">Mittal S., Tyagi S. Computational techniques for real-time credit card fraud detection. Handbook of computer networks and cyber security, eds. Gupta B., Perez G., Agrawal D., Gupta D. Cham: Springer, 2020. https://doi.org/10.1007/978-3-030-22277-2_26</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Singh A., Jain A. An empirical study of AML approach for credit card fraud detection–financial transactions. International Journal of Computers Communications &amp; Control, 2019, 14(6): 670–690. https://doi.org/10.15837/ijccc.2019.6.3498</mixed-citation>
     <mixed-citation xml:lang="en">Singh A., Jain A. An empirical study of AML approach for credit card fraud detection–financial transactions. International Journal of Computers Communications &amp; Control, 2019, 14(6): 670–690. https://doi.org/10.15837/ijccc.2019.6.3498</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">DiGabriele J., Heitger L., Riley R. A synthesis of non-fraud forensic accounting research. Journal of Forensic Accounting Research, 2020, 5(1): 257–277. https://doi.org/10.2308/JFAR-19-034</mixed-citation>
     <mixed-citation xml:lang="en">DiGabriele J., Heitger L., Riley R. A synthesis of non-fraud forensic accounting research. Journal of Forensic Accounting Research, 2020, 5(1): 257–277. https://doi.org/10.2308/JFAR-19-034</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Hossein Motlagh N. Near field communication (NFC) – A technical overview. Dr. Diss. 2012, 73. https://doi.org/10.13140/RG.2.1.1232.0720</mixed-citation>
     <mixed-citation xml:lang="en">Hossein Motlagh N. Near field communication (NFC) – A technical overview. Dr. Diss. 2012, 73. https://doi.org/10.13140/RG.2.1.1232.0720</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Vishwakarma P. P., Tripathy A. K., Vemuru S. Fraud detection in NFC-enabled mobile payments: A comparative analysis. Innovative data communication technologies and application, eds. Raj J. S., Iliyasu A. M., Bestak R., Baig Z. A. Singapore: Springer, 2021, vol. 59, 397–403. https://doi.org/10.1007/978-981-15-9651-3_34</mixed-citation>
     <mixed-citation xml:lang="en">Vishwakarma P. P., Tripathy A. K., Vemuru S. Fraud detection in NFC-enabled mobile payments: A comparative analysis. Innovative data communication technologies and application, eds. Raj J. S., Iliyasu A. M., Bestak R., Baig Z. A. Singapore: Springer, 2021, vol. 59, 397–403. https://doi.org/10.1007/978-981-15-9651-3_34</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Pasquet M., Gerbaix S. The complexity of security studies in NFC payment system. Australian information security management conference: Proc. 8 Conf., Perth, 30 Nov 2010. Pert: Cowan University, 2010, 95–101. https://doi.org/10.4225/75/57b674cb34783</mixed-citation>
     <mixed-citation xml:lang="en">Pasquet M., Gerbaix S. The complexity of security studies in NFC payment system. Australian information security management conference: Proc. 8 Conf., Perth, 30 Nov 2010. Pert: Cowan University, 2010, 95–101. https://doi.org/10.4225/75/57b674cb34783</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Лукинский И. С., Горшенева И. А. Промт-инжиниринг в образовательном процессе и научной деятельности или к вопросу о необходимости обучения работе с искусственным интеллектом. Психология и педагогика служебной деятельности. 2024. № 4. С. 148–154. https://doi.org/10.24412/2658-638X-2024-4-148-154</mixed-citation>
     <mixed-citation xml:lang="en">Lukinsky I. S., Gorsheneva I. A. Promt engineering in the educational process and scientific activity or to the question of the necessity of training to work with artificial intelligence. Psychology and pedagogy of service activity, 2024, (4): 148–154. (In Russ.) https://doi.org/10.24412/2658-638X-2024-4-148-154</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Мирончук В. А., Золкин А. Л., Батищев А. В., Урусова А. Б. Интеграция больших данных и аналитических возможностей в современные системы поддержки принятия решений. Вестник Академии знаний. 2023. № 5. С. 227–230. https://elibrary.ru/decrqv</mixed-citation>
     <mixed-citation xml:lang="en">Mironchuk V. A., Zolkin A. L., Batishchev A. V., Urusova A. B. Integration of big data and analytical capabilities into modern decision support systems. Vestnik of the Academy of Knowledge, 2023, (5): 227–230. (In Russ.) https://elibrary.ru/decrqv</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Doko F., Miskovski I. An overview of big data analytics in banking: Approaches, challenges and issues. UBT international conference. 2019, 11–17. URL: https://knowledgecenter.ubt-uni.net/conference/2019/events/270 (accessed 3 May 2025).</mixed-citation>
     <mixed-citation xml:lang="en">Doko F., Miskovski I. An overview of big data analytics in banking: Approaches, challenges and issues. UBT international conference. 2019, 11–17. URL: https://knowledgecenter.ubt-uni.net/conference/2019/events/270 (accessed 3 May 2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Laney D. 3D data management: Controlling data volume, velocity and variety. META Group Research. 2001. URL: https://diegonogare.net/wp-content/uploads/2020/08/3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf (accessed 3 May 2025).</mixed-citation>
     <mixed-citation xml:lang="en">Laney D. 3D data management: Controlling data volume, velocity and variety. META Group Research. 2001. URL: https://diegonogare.net/wp-content/uploads/2020/08/3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf (accessed 3 May 2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Schroeck M., Shockley R., Smart J. Analytics: The real-world use of big data: How innovative enterprises extract value from uncertain data, Executive Report. 2012. URL: https://www.researchgate.net/publication/315786855_Analytics_the_real-world_use_of_big_data_How_innovative_enterprises_extract_value_from_uncertain_data_Executive_Report (accessed 13 May 2025).</mixed-citation>
     <mixed-citation xml:lang="en">Schroeck M., Shockley R., Smart J. Analytics: The real-world use of big data: How innovative enterprises extract value from uncertain data, Executive Report. 2012. URL: https://www.researchgate.net/publication/315786855_Analytics_the_real-world_use_of_big_data_How_innovative_enterprises_extract_value_from_uncertain_data_Executive_Report (accessed 13 May 2025).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Gandomi A., Haider M. Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 2015, 35(2): 137–144. https://doi.org/10.1016/j.ijinfomgt.2014.10.007</mixed-citation>
     <mixed-citation xml:lang="en">Gandomi A., Haider M. Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 2015, 35(2): 137–144. https://doi.org/10.1016/j.ijinfomgt.2014.10.007</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Jeffrey Dean, Sanjay Ghemawat. MapReduce: Simplified data processing on large clusters. Communications of the ACM, 2008, 51(1): 107– 113. https://doi.org/10.1145/1327452.1327492</mixed-citation>
     <mixed-citation xml:lang="en">Jeffrey Dean, Sanjay Ghemawat. MapReduce: Simplified data processing on large clusters. Communications of the ACM, 2008, 51(1): 107– 113. https://doi.org/10.1145/1327452.1327492</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Nawsher Khan, Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Zakira Inayat, Waleed Kamaleldin Mahmoud Ali, Muhammad Alam, Muhammad Shiraz, Abdullah Gani. Big Data: Survey, technologies, opportunities, and challenges. The Scientific World Journal, 2014, 2014(1): 1–18. https://doi.org/10.1155/2014/712826</mixed-citation>
     <mixed-citation xml:lang="en">Nawsher Khan, Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Zakira Inayat, Waleed Kamaleldin Mahmoud Ali, Muhammad Alam, Muhammad Shiraz, Abdullah Gani. Big Data: Survey, technologies, opportunities, and challenges. The Scientific World Journal, 2014, 2014(1): 1–18. https://doi.org/10.1155/2014/712826</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Dean J., Ghemawat S. MapReduce: A flexible data processing tool. Communications of the ACM, 2019, 53(1): 72–77. https://doi.org/10.1145/1629175.1629198</mixed-citation>
     <mixed-citation xml:lang="en">Dean J., Ghemawat S. MapReduce: A flexible data processing tool. Communications of the ACM, 2019, 53(1): 72–77. https://doi.org/10.1145/1629175.1629198</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B28">
    <label>28.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Shvachko K. V., Kuang H., Radia S. R., Chansler R. J. The hadoop distributed file system. 2010 IEEE 26th Symposium on mass storage systems and technologies (MSST): Proc. Conf., Incline Village, NV, 3–7 May 2010. IEEE, 2010, 1–10. https://doi.org/10.1109/MSST.2010.5496972</mixed-citation>
     <mixed-citation xml:lang="en">Shvachko K. V., Kuang H., Radia S. R., Chansler R. J. The hadoop distributed file system. 2010 IEEE 26th Symposium on mass storage systems and technologies (MSST): Proc. Conf., Incline Village, NV, 3–7 May 2010. IEEE, 2010, 1–10. https://doi.org/10.1109/MSST.2010.5496972</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B29">
    <label>29.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Vavilapalli V. K., Murthy A. C., Douglas C., Agarwal S., Konar M., Evans R., Graves T., Lowe J., Shah H., Seth S., Saha B., Curino C., O’Malley O., Radia S., Reed B., Baldeschwieler E. Apache Hadoop YARN: Yet another resource negotiator. SOCC '13: ACMsymposium on cloud computing: Proc. conf., California, 1–3 Oct 2013. NY: Association for Computing Machinery, 2013, 1–16. https://doi.org/10.1145/2523616.2523633</mixed-citation>
     <mixed-citation xml:lang="en">Vavilapalli V. K., Murthy A. C., Douglas C., Agarwal S., Konar M., Evans R., Graves T., Lowe J., Shah H., Seth S., Saha B., Curino C., O’Malley O., Radia S., Reed B., Baldeschwieler E. Apache Hadoop YARN: Yet another resource negotiator. SOCC '13: ACMsymposium on cloud computing: Proc. conf., California, 1–3 Oct 2013. NY: Association for Computing Machinery, 2013, 1–16. https://doi.org/10.1145/2523616.2523633</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B30">
    <label>30.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Madhavi A., Sivaramireddy T. Real-Time credit card fraud detection using spark framework. Machine learning technologies and applications, eds. Kiran Mai C., Brahmananda Reddy A., Srujan Raju K. Springer, 2021, 287–298. https://doi.org/10.1007/978-981-33-4046-6_28</mixed-citation>
     <mixed-citation xml:lang="en">Madhavi A., Sivaramireddy T. Real-Time credit card fraud detection using spark framework. Machine learning technologies and applications, eds. Kiran Mai C., Brahmananda Reddy A., Srujan Raju K. Springer, 2021, 287–298. https://doi.org/10.1007/978-981-33-4046-6_28</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B31">
    <label>31.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zhou H., Sun G., Fu S., Wang L., Hu J., Gao Y. Internet financial fraud detection based on a distributed big data approach with Node2vec. IEEE Access, 2021, 9: 43378–43386. https://doi.org/10.1109/ACCESS.2021.3062467</mixed-citation>
     <mixed-citation xml:lang="en">Zhou H., Sun G., Fu S., Wang L., Hu J., Gao Y. Internet financial fraud detection based on a distributed big data approach with Node2vec. IEEE Access, 2021, 9: 43378–43386. https://doi.org/10.1109/ACCESS.2021.3062467</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B32">
    <label>32.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Мирончук В. А., Золкин А. Л., Мекшенева Ж. В., Поскряков И. А. Современные компьютерные системы поддержки принятия решений. Естественно-гуманитарные исследования. 2023. № 4. С. 228–231. https://elibrary.ru/ebeehk</mixed-citation>
     <mixed-citation xml:lang="en">Mironchuk V. A., Zolkin A. L., Meksheneva Zh. V., Poskryakov I. A. Modern computer decision support systems. Natural and Humanitarian Research, 2023, (4): 228–231. (In Russ.) https://elibrary.ru/ebeehk</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B33">
    <label>33.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Wischik D., Handley M., Braun M. B. The resource pooling principle. ACM SIGCOMM Computer Communication Review, 2008, 38(5): 47–52. https://doi.org/10.1145/1452335.1452342</mixed-citation>
     <mixed-citation xml:lang="en">Wischik D., Handley M., Braun M. B. The resource pooling principle. ACM SIGCOMM Computer Communication Review, 2008, 38(5): 47–52. https://doi.org/10.1145/1452335.1452342</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B34">
    <label>34.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Galante G., de Bona L. C. E. A survey on cloud computing elasticity. 2012 IEEE fifth international conference on utility and cloud computing: Proc. conf., Chicago, 5–8 Nov 2012. IEEE, 2012, 263–270. https://doi.org/10.1109/UCC.2012.30</mixed-citation>
     <mixed-citation xml:lang="en">Galante G., de Bona L. C. E. A survey on cloud computing elasticity. 2012 IEEE fifth international conference on utility and cloud computing: Proc. conf., Chicago, 5–8 Nov 2012. IEEE, 2012, 263–270. https://doi.org/10.1109/UCC.2012.30</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B35">
    <label>35.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kumari P., Mishra S. P. Analysis of credit card fraud detection using fusion classifiers. Computational intelligence in data mining, eds. Behera H., Nayak J., Naik B., Abraham A. Singapore: Springer, 2019, vol. 711, 111–122. https://doi.org/10.1007/978-981-10-8055-5_11</mixed-citation>
     <mixed-citation xml:lang="en">Kumari P., Mishra S. P. Analysis of credit card fraud detection using fusion classifiers. Computational intelligence in data mining, eds. Behera H., Nayak J., Naik B., Abraham A. Singapore: Springer, 2019, vol. 711, 111–122. https://doi.org/10.1007/978-981-10-8055-5_11</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B36">
    <label>36.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Wiścicka-Fernando M. 2021. The use of mobile technologies in online shopping during the covid-19 pandemic – an empirical study. Procedia Computer Science, 2021, 192: 3413–3422. https://doi.org/10.1016/j.procs.2021.09.114</mixed-citation>
     <mixed-citation xml:lang="en">Wiścicka-Fernando M. 2021. The use of mobile technologies in online shopping during the covid-19 pandemic – an empirical study. Procedia Computer Science, 2021, 192: 3413–3422. https://doi.org/10.1016/j.procs.2021.09.114</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B37">
    <label>37.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Лукинский И. С. Типология промышленных революций и их классификаций через призму инноваций в области технико-криминалистического обеспечения. Вестник Кемеровского государственного университета. Серия: Гуманитарные и общественные науки. 2023. Т. 7. № 4. С. 505–511. https://doi.org/10.21603/2542-1840-2023-7-4-505-511</mixed-citation>
     <mixed-citation xml:lang="en">Lukinsky I. S. Typology of industrial revolutions and their classifications through the prism of innovations in the field of technical and forensic support. Vestnik Kemerovskogo gosudarstvennogo universiteta. Seriia: Gumanitarnye i obshchestvennye nauki, 2023, 7(4): 505–511. (In Russ.) https://doi.org/10.21603/2542-1840-2023-7-4-505-511</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
