Methodology for the optimization of resources in the detection of computer fraud