Assessment of binary prediction of fraudulent advertisements in ATS candidate tracking cloud systems
https://doi.org/10.37493/2307-910X.2024.1.3
Abstract
The abstract describes the construction of a binary classification model for predicting the type of job advertisement in cloud-based ATS (Applicant Tracking Systems) as either legitimate or fraudulent. Various machine learning algorithms can be employed to address this issue. Traditional classification algorithms, including LSVC (Support Vector Machine), GBT (Gradient Boosting Tree), and RF (Random Forest), have been chosen for this study. One approach to building such a model involves identifying and collecting relevant attributes or features that can help distinguish fraudulent job advertisements from legitimate ones. Some features that could be useful in detecting fraudulent job ads include job location, job description, job requirements, job responsibilities, company information, and recruiter data. Subsequently, different machine learning algorithms can be trained on prepared datasets using standard methods such as cross-validation to assess their performance. The performance of the trained models can be evaluated using various metrics such as accuracy, precision, and recall. Ultimately, the most effective model can be selected based on these evaluation metrics and deployed in a production environment, where it can classify job advertisements as fraudulent or legitimate. It's important to note that the model should also undergo continuous evaluation and updates over time to ensure its reliability and effectiveness. Based on the evaluation metrics, it was concluded that the GBT classifier exhibits higher performance and accuracy compared to the LinearSVC and RF classifiers on the given dataset. However, it should be considered that the GBT classifier requires more time for training and prediction; GBT takes 208.738579 seconds, while LSVC and RF take 64.267132 and 71.024914 seconds, respectively. Taking into account the evaluation results, the GBT model was utilized for the operational aspect of the program. For implementation of the prediction, machine learning was performed on GBT, RF, and LSVC using a custom dataset called "Job_Fraud," created based on the publicly available EMSCAD dataset. To address the significant data imbalance, an implementation of the Synthetic Minority Over-sampling Technique (SMOTE) from a library was utilized. Initially, a model was obtained and trained on the data using a classifier, removing stop-words through TFIDFVectorizer in the vector space. Then, after reducing the dimensionality of the data, the data was reloaded, and both the model and vectorizer were retrained before being used for prediction. The tkinter module was used for the graphical interface. The predict() function utilizes the trained model for predictions based on the feature vector.
About the Authors
V. V. Ligi-GoryaevRussian Federation
Vladimir V. Ligi-Goryaev – Head of the Digital Department
Elista
+79371935125
G. A. Mankaeva
Russian Federation
Galina A. Mankaeva – Senior Lecturer at the Department of Theoretical Physics
Elista
+79061764200
T. B. Goldvarg
Russian Federation
Tatyana B. Goldvarg – Associate Professor of the Department of Experimental Physics
Elista
+79093974451
S. S. Muchkaeva
Russian Federation
Svetlana S. Muchkaeva – Associate Professor of the Department of Algebra and Analysis
Elista
+79054007024
V. V. Dzhakhnaev
Russian Federation
Viktor V. Dzhakhnaev – 2nd year undergraduate, Direction "Mathematical Analysis",
Elista
+79886836554
References
1. Customizable workflows in cloud PBX in Russia [Electronic resource]. Available from: https://huntflow.ru/ [Accessed 14 August 2023]. (In Russ.).
2. Market research of recruiting systems: functionality of cloud ATS in Russia. 02.11.2021. [Electronic resource]. Available from: https://www.tadviser.ru/a/578060 [Accessed 14 August 2023]. (In Russ.).
3. Screening call with a recruiter: questions that are most likely to be asked [Electronic resource]. Available from: https://habr.com/ru/articles/689564//resume analysis and screening in cloud PBX in Russia [Accessed 14 August 2023]. (In Russ.).
4. Swetha K, Sravani K. Fake job detection using machine learning approach. Journal of Engineering Sciences. 2023;14(02):67-74. (In Russ.).
5. Bondarchuk DV. Choosing the optimal method of data mining for job selection. Information technologies of modeling and management. 2013;84(6):504-513. (In Russ.).
6. Kudryavtsev RV. Organization of activities for the disclosure of remote fraud. A young scientist. 2019;24(262):218- 221. Available from: https://moluch.ru/archive/262/60528/ [Accessed 14 August 2023]. (In Russ.).
7. Goryaev VM, Burlykov VD, Proshkin SN, Ligi-Garyaev VV, Dzhakhnaeva EN. ROC curve and confusion matrix as an effective tool for optimizing machine learning classifiers. Bulletin of Bashkir University. 2023;28(1):22-28. (In Russ.).
8. Laboratory of Information and Communication Systems, Aegean University, Samos, Greece. The EMSCAD dataset on employment fraud in the Aegean region. 2016. Available from: http://icsdweb.aegean.gr/emscad [Accessed 22 August 2023]. (In Russ.).
9. Goryaev VM, Basangova EO, Bembitov DB, Muchkaeva SS, Sangadzhieva SV. Performance study of various machine learning models for noninvasive blood pressure measurement based on PPG and ECG signals. Bulletin of Bashkir University. 2023;28(1):36-44. (In Russ.).
10. Wong Y, Kamel A. Classification of imbalanced data: a review. International Journal of Pattern Recognition and Artificial Intelligence. 2011. https://doi.org/23.10.1142/S0218001409007326
11. Tabassum H, Ghosh G. Detecting Online Recruitment Fraud Using Machine Learning, 2021 9th Int. Conf. Inf. Commun. Technol. ICoICT 2021. 2021. P. 472–477. https://doi.org/10.1109/ICoICT52021.2021.9527477
12. Borisov ES. Classifier of texts in natural language. Available from: http://mechanoid.kiev.ua/neural-net-classifiertext.html [Accessed 14 August 2023]. (In Russ.).
13. Coelho LP, Richart V. Building machine learning systems in Python. 2nd edition. Translated from English. Slinkin A. A.- M.: DMK Press, 2016. 302 p. (In Russ.).
14. Goryaev VM. Development of a methodology for professional and psychological recruitment of personnel in an organization, taking into account aspects of information security. Modern high-tech technologies. 2021;12-2:342-347. (In Russ.).
Review
For citations:
Ligi-Goryaev V.V., Mankaeva G.A., Goldvarg T.B., Muchkaeva S.S., Dzhakhnaev V.V. Assessment of binary prediction of fraudulent advertisements in ATS candidate tracking cloud systems. Modern Science and Innovations. 2024;(1):32-41. (In Russ.) https://doi.org/10.37493/2307-910X.2024.1.3