Fraud - Consequences of Cutting Edge Solutions

Size: px
Start display at page:

Download "Fraud - Consequences of Cutting Edge Solutions"

Transcription

1 Detection using Peer Group analysis David Weston, Niall Adams, David Hand, Christopher Whitrow, Piotr Juszczak 19 September, /09/07 1 / 69

2 EPSRC Think Crime Peer Group Crime Prevention & Detection Funding 12 projects Also feasibilty studies and more Think Crime Project Develop Fraud Detection Tools Real Data 19/09/07 2 / 69

3 ThinkCrime Team Peer Group Members of the team are David Hand Niall Adams Christopher Whitrow Piotr Juszczak David Weston Gordon Blunt Collaborating banks Abbey National, Alliance and Leicester, Capital One, Lloyds TSB 19/09/07 3 / 69

4 Overview Peer Group Peer Group Applied to Time-Aligned Multivariate Continuous Data Peer Group Applied to Credit Card Transaction Data 19/09/07 4 / 69

5 Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group 19/09/07 5 / 69

6 Consequences of Fraud Consequences of Fraud Financial Consequences Financial Consequences UK: 428.0m Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group 19/09/07 6 / 69

7 Consequences of Fraud Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group Financial Consequences Financial Consequences UK: 428.0m Consumer Consequences Customer Inconvenience Fraud Detection Transactions falsely flagged as fraudulent 19/09/07 6 / 69

8 Patterns Of Fraud Fraud evolves to evade detection Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group 19/09/07 7 / 69

9 Patterns Of Fraud Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Fraud evolves to evade detection APACS 14/03/07 UK card fraud 309.8m ( 13%) Fraud abroad 118.2m (+43%) Peer Group 19/09/07 7 / 69

10 Patterns Of Fraud Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group Fraud evolves to evade detection APACS 14/03/07 UK card fraud 309.8m ( 13%) Fraud abroad 118.2m (+43%) The introduction of chip and PIN has made it more difficult for fraudsters to commit card fraud in the UK... create counterfeit magnetic stripe cards that can potentially be used in countries that haven t upgraded to chip and PIN. This has caused the increase in fraud abroad losses over the last 12 months. 19/09/07 7 / 69

11 Determining when Fraud has occurred Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Issuing Bank determines if fraud has taken place Can take several months Not necessarily correct Peer Group 19/09/07 8 / 69

12 Determining when Fraud has occurred Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Issuing Bank determines if fraud has taken place Can take several months Not necessarily correct Bad Debt Bankruptcy Peer Group 19/09/07 8 / 69

13 Determining when Fraud has occurred Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Issuing Bank determines if fraud has taken place Can take several months Not necessarily correct Bad Debt Bankruptcy Friendly Fraud Peer Group 19/09/07 8 / 69

14 Determining when Fraud has occurred Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group Issuing Bank determines if fraud has taken place Can take several months Not necessarily correct Bad Debt Bankruptcy Friendly Fraud 2001 US Banker magazine: over half online fraudulent transactions Account Holder declares a transaction they have performed is fraudulent 19/09/07 8 / 69

15 Challenges of Fraud Detection Fraud Evolution Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group 19/09/07 9 / 69

16 Challenges of Fraud Detection Consequences of Fraud Patterns Of Fraud Determining when Fraud has occurred Challenges of Fraud Detection Peer Group Fraud Evolution Data streams Timeliness Online System Back Office Imbalanced Classes Fraud as % of total value of number of transactions % (credit card, Australia) 19/09/07 9 / 69

17 Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Group 19/09/07 10 / 69

18 Approaches to Fraud Detection Broadly 2 approaches to statistical fraud detection Supervised or Anomaly Detection Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Group 19/09/07 11 / 69

19 Approaches to Fraud Detection Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Broadly 2 approaches to statistical fraud detection Supervised or Anomaly Detection Supervised Historical Instances of Fraud Less likely to falsely flag a transaction as fraudulent Approach Chris is taking Peer Group 19/09/07 11 / 69

20 Anomaly Detection Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Does not use historical Instances of Fraud Build a profile of usual behaviour Significant deviations considered as potential frauds More likely to falsely flag a transaction as fraudulent Potential to adapt to changing fraud patterns Approach Piotr is taking Peer Group 19/09/07 12 / 69

21 Peer Group Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Similar to anomaly detection methods Do not need to build a model of usual behaviour for account holder Determine a peer group Find other accounts that you expect will behave similarly to the account holder Find accounts that have behaved similarly in the past Monitor account holder s behaviour with respect to peer group Anomalous behaviour, should account holder deviate strongly from peer group Peer Group 19/09/07 13 / 69

22 Anomaly Detection to Peer Groups I Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example The weekly amount spent on a credit card for a particular account Week 1 to Week n y 1,...,y n 1,y n Target Account Wish to determine if the amount spent in week n is anomalous Anomaly Detection based on account profile y 1 y 2 y n 1 y n Peer Group 19/09/07 14 / 69

23 Anomaly Detection to Peer Groups II Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Population Normalised Anomaly Detection x m,1 x m,2 x m,n 1 x m,n. x 2,1 x 2,2 x 2,n 1 x 2,n x 1,1 x 1,2 x 1,n 1 x 1,n y 1 y 2 y n 1 y n Peer Group 19/09/07 15 / 69

24 Anomaly Detection to Peer Groups III Approaches to Fraud Detection Anomaly Detection Peer Group Anomaly Detection to Peer Groups I Anomaly Detection to Peer Groups II Anomaly Detection to Peer Groups III Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Groups Example Peer Group Sort accounts in order of decreasing similarity, π(i) x π(m),1 x π(m),2 x π(m),n 1 x π(m),n. x π(k),1 x π(k),2 x π(k),n 1 x π(k),n. x π(2),1 x π(2),2 x π(2),n 1 x π(2),n x π(1),1 x π(1),2 x π(1),n 1 x π(1),n y 1 y 2 y n 1 y n Peer Group size k. 19/09/07 16 / 69

25 Peer Groups Example /09/07 17 / 69

26 Peer Groups Example /09/07 18 / 69

27 Peer Groups Example /09/07 19 / 69

28 Peer Groups Example /09/07 20 / 69

29 Peer Groups Example /09/07 21 / 69

30 Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Peer Group Quality Whitening the Population 19/09/07 22 / 69

31 Detecting Anomalies Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population Assuming we already have a peer group set of accounts for our target account. y n is multivariate (column vector) and continuous Mahalanobis distance of the target from the mean of its peer group µ is mean of x π(1),n,...,x π(k),n C is covariance matrix of x π(1),n,...,x π(k),n Mahalanobis distance of a target from its peer group (y n µ) T C 1 (y n µ) 19/09/07 23 / 69

32 Detecting Anomalies If the distance is above an externally selected threshold, then we flag the target as fraudulent. Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population Peer Group Target /09/07 24 / 69

33 Robustifying Peer Groups Peer Group contaminated by fraudulent transactions Outlier Masking Outlier Swamping Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population Peer Group Target /09/07 25 / 69

34 Robustifying Peer Groups Robustify the covariance matrix for the Mahalanobis Distance evaluation Use Heuristic Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population 19/09/07 26 / 69

35 Robustifying Peer Groups Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population Robustify the covariance matrix for the Mahalanobis Distance evaluation Use Heuristic An account that has deviated strongly from its peer group at time t should not contribute to any peer group at time t 19/09/07 26 / 69

36 Robustifying Peer Groups Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population Robustify the covariance matrix for the Mahalanobis Distance evaluation Use Heuristic An account that has deviated strongly from its peer group at time t should not contribute to any peer group at time t For each peer group select p% closest to their own peer groups 19/09/07 26 / 69

37 Peer Group Quality Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population It is not necessarily the case that peer group analysis can be successfully deployed on all accounts. q t = 1 k k (y t x π(i),t ) T (y t x π(i),t ) (1) i=1 where T is the transpose. This is a simple measure of how close the members of the peer group are to the target. A good quality peer group is one that closely follows the target over time. Q s,e = 1 t e t s t e t=t s q t. (2) 19/09/07 27 / 69

38 Whitening the Population Whitening the population to make the scatter of a peer group (of size 2) commensurate across time The smaller the value of Q s,e the better the peer group tracks the target over time. Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Members Population Target Peer Group Quality Whitening the Population t=1 t=2 t=3 19/09/07 28 / 69

39 Building Peer Groups Peer Group Detecting Anomalies Detecting Anomalies Robustifying Peer Groups Robustifying Peer Groups Peer Group Quality Whitening the Population Possible to know apriori the peer group membership Employee fraud detection, people with the same job description can be naturally grouped together. IBM FAMS. Health care fraud. Geography, speciality Infer peer group membership from the time series itself Measuring similarity of time series 19/09/07 29 / 69

40 Peer Group Real Data Transaction Details Merchant Category Codes 19/09/07 30 / 69

41 Real Data Peer Group Real credit card transaction history 4 month period Selected approximately 50,000 accounts No static data about the account holder Each account is a list of transactions Real Data Transaction Details Merchant Category Codes 19/09/07 31 / 69

42 Transaction Details Peer Group Real Data Transaction Details Merchant Category Codes Each Transaction is a record that includes Amount Time transaction took place Type of transaction, e.g. change pin code ATM or POS Card present / not present A Fraud flag was provided that gave the date (to the nearest day) when fraudulent behaviour began. 19/09/07 32 / 69

43 Merchant Category Codes Peer Group Real Data Transaction Details Merchant Category Codes Identify in which market segment the transaction was performed For example Book stores 4 digit number Fewer than 10,000 codes in use Merchant Category Groups 19/09/07 33 / 69

44 Peer Group Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts 19/09/07 34 / 69

45 Time Alignment & Feature Extraction Peer Group Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts Accounts transactions are asynchronous data streams Synchronise account time series by extracting features from the data streams at regular time intervals M(s, e, A) summarise transactions of account A occurring from day s to day e inclusive Mean amount spent Number of transactions Entropy of Merchant Category Groups 16 Groups +1 for ATMs Returns 1 point in 3 dimensional space 19/09/07 35 / 69

46 Time Alignment & Feature Extraction 100 Account A Amount Withdrawn Amount Withdrawn Day M(7,10,A) Account B Day M(7,10,B) 19/09/07 36 / 69

47 Outlier Detection from Peer Groups Peer Group Once a day at midnight Summary statistic for day t, behaviour of the past d days M(t d + 1,t,A) Smaller d, the more sensitive to new transactions Mahalanobis distance in 3 dimensional space Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts 19/09/07 37 / 69

48 Active and Inactive Accounts Peer Group Account inactive on day t if it has not performed any transactions on that day Do not test for outlierness for inactive accounts Unusually long periods of inactivity will not be considered fraudulent Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts 19/09/07 38 / 69

49 Active and Inactive Accounts Peer Group Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts Account inactive on day t if it has not performed any transactions on that day Do not test for outlierness for inactive accounts Unusually long periods of inactivity will not be considered fraudulent Account not active over entire summary statistic window Active peer group members. Closest k accounts that are active on at least one day of the summary statistic window 19/09/07 38 / 69

50 Building Peer Groups Peer Group Subdivide training data into n non-overlapping windows M(1, L n,a),...,m((n 1)L n + 1,L,A) Point in 3n dimensional space Complication, potential for bias Standardise each window by whitening Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts 19/09/07 39 / 69

51 Building Peer Groups 100 Account A Amount Withdrawn M(1,3 1 M(6 2 3,A) M(3 1 3,6 2 3,A) 3,10,A) 100 Account B Amount Withdrawn M(1,3 1 3,B) M(3 1 3,6 2 3,B) M(6 2 3,10,B) 19/09/07 40 / 69

52 Building Peer Groups Peer Group Find k nearest neighbours Large number of accounts Accounts that have high volume of transactions unlikely to be tracked by accounts with low volume First sort by number of transactions in training data Time Alignment & Feature Extraction Time Alignment & Feature Extraction Outlier Detection from Peer Groups Active and Inactive Accounts 19/09/07 41 / 69

53 Peer Group Performance Criteria Performance Metric Performance Curve Average Performance Curve 19/09/07 42 / 69

54 Performance Criteria Peer Group Reduce total amount lost to fraud Reduce number of fraudulent transactions Reduce the time between fraud starting and fraud detection Reduce the number of account holders affected by flagging legitimate transactions as fraud Number of possible performance metrics Performance Criteria Performance Metric Performance Curve Average Performance Curve 19/09/07 43 / 69

55 Performance Metric Peer Group Performance Criteria Performance Metric Performance Curve Average Performance Curve If an account has been flagged as containing fraudulent transactions. The card issuer would need to investigate this account. minimise the amount of fraud given the number of investigations the card company can make Performance Curve x-axis number of fraudulent accounts missed as a proportion of the number of fraudulent accounts y-axis number of fraud flags raised as a proportion of the number of accounts Different to ROC curve. The smaller the area under the curve the better the performance. Random classification is represented by a diagonal line from the top left to the bottom right. 19/09/07 44 / 69

56 Performance Curve 1 Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds not found The lower the curve the better the performance. Twice Area under Curve [0,1], smaller the area the better the performance 19/09/07 45 / 69

57 Average Performance Curve Produce one curve for each day Take the average of the curves. For a given proportion of fraud flags raised 1 Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds not found 19/09/07 46 / 69

58 Peer Group Experiments Effect of Fraud Contamination using an Oracle Effect of Fraud Contamination using an Oracle Varying Length of Summary Statistic 19/09/07 47 / 69 Window

59 Experiments Peer Group Data 4 months of data Accounts with > 80 transactions and fraud free for first 3 months. About 4000 accounts 6% defrauded in final month Performed Peer Group once a day for the remaining month Experiments Effect of Fraud Contamination using an Oracle Effect of Fraud Contamination using an Oracle Parameters Peer Group building 8 segments Summary Statistic window size 7 days Active Peer Group Size 100 Robustifying Peer Groups not used Varying Length of Summary Statistic 19/09/07 48 / 69 Window

60 Effect of Fraud Contamination using an Oracle With Fraud Contamination Twice Area Under Curve Peer Group Size 19/09/07 49 / 69

61 Effect of Fraud Contamination using an Oracle With Fraud Contamination Without Fraud Contamination Twice Area Under Curve Peer Group Size 19/09/07 50 / 69

62 Building Peer Groups The effect of changing the granularity of the description of the Peer Group building data. Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds Not Found 1 19/09/07 51 / 69

63 Building Peer Groups The effect of changing the granularity of the description of the Peer Group building data. Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds Not Found /09/07 52 / 69

64 Building Peer Groups The effect of changing the granularity of the description of the Peer Group building data. Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds Not Found /09/07 53 / 69

65 Building Peer Groups The effect of changing the granularity of the description of the Peer Group building data. Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds Not Found /09/07 54 / 69

66 Building Peer Groups The effect of changing the granularity of the description of the Peer Group building data. Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds Not Found /09/07 55 / 69

67 Varying Length of Summary Statistic Window day Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds not Found 19/09/07 56 / 69

68 Varying Length of Summary Statistic Window day 3 days Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds not Found 19/09/07 57 / 69

69 Varying Length of Summary Statistic Window Number of Fraud Flags Raised per Day as a Proportion of the Population day 3 days 5 days Proportion of Frauds not Found 19/09/07 58 / 69

70 Varying Length of Summary Statistic Window Number of Fraud Flags Raised per Day as a Proportion of the Population day 3 days 5 days 7 days Proportion of Frauds not Found 19/09/07 59 / 69

71 Varying Length of Summary Statistic Window Number of Fraud Flags Raised per Day as a Proportion of the Population day 3 days 5 days 7 days 14 days Proportion of Frauds not Found 19/09/07 60 / 69

72 Global Outlier Detector Is peer group analysis doing nothing more than finding outliers to the population? Special case, use largest possible peer group All accounts apart from target account Peer Group Experiments Effect of Fraud Contamination using an Oracle Effect of Fraud Contamination using an Oracle Varying Length of Summary Statistic 19/09/07 61 / 69 Window

73 Peer Groups Performance Non Robust Number of Fraud Flags Raised per Day as a Proportion of the Population Proportion of Frauds Not Found 19/09/07 62 / 69

74 Peer Groups Performance Number of Fraud Flags Raised per Day as a Proportion of the Population Non Robust Non Robust without Fraud Contamination Proportion of Frauds Not Found 19/09/07 63 / 69

75 Peer Groups Performance Number of Fraud Flags Raised per Day as a Proportion of the Population Non Robust Non Robust without Fraud Contamination Robust Proportion of Frauds Not Found 19/09/07 64 / 69

76 Peer Groups Performance Number of Fraud Flags Raised per Day as a Proportion of the Population Non Robust Non Robust without Fraud Contamination Robust Global Proportion of Frauds Not Found 19/09/07 65 / 69

77 Peer Groups Versus Global Outlier Detector Performance of the peer group analysis compared with global population outlier detector. Performance Difference Robustified Peer Group Peer Group Number of Fraud Flags Raised per Day as a Proportion of the Population 19/09/07 66 / 69

78 Peer Groups Versus Global Outlier Detector Performance of the robustified peer group analysis compared with global population outlier detector on screened data Performance Difference Number of Fraud Flags Raised per Day as a Proportion of the Population 19/09/07 67 / 69

79 Peer Group Conclusions 19/09/07 68 / 69

80 Conclusions Peer Group We have demonstrated there exist credit card transaction accounts that evolve sufficiently closely to enable fraudulent behaviour to be detected. Finding frauds that are not global outliers to the population. Current work Combining Methods Conclusions 19/09/07 69 / 69

Plastic Card Fraud Detection using Peer Group analysis

Plastic Card Fraud Detection using Peer Group analysis Plastic Card Fraud Detection using Peer Group analysis David Weston, Niall Adams, David Hand, Christopher Whitrow, Piotr Juszczak 29 August, 2007 29/08/07 1 / 54 EPSRC Think Crime Peer Group - Peer Group

More information

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

Anomaly detection. Problem motivation. Machine Learning

Anomaly detection. Problem motivation. Machine Learning Anomaly detection Problem motivation Machine Learning Anomaly detection example Aircraft engine features: = heat generated = vibration intensity Dataset: New engine: (vibration) (heat) Density estimation

More information

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 The most significant trend is decreasing paper payments and increasing electronic payments. Many organizations are also seeing

More information

Improving Credit Card Fraud Detection with Calibrated Probabilities

Improving Credit Card Fraud Detection with Calibrated Probabilities Improving Credit Card Fraud Detection with Calibrated Probabilities Alejandro Correa Bahnsen, Aleksandar Stojanovic, Djamila Aouada and Björn Ottersten Interdisciplinary Centre for Security, Reliability

More information

Understand the Business Impact of EMV Chip Cards

Understand the Business Impact of EMV Chip Cards Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability

More information

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,

More information

FICO Falcon Fraud Manager for Retail Banking

FICO Falcon Fraud Manager for Retail Banking FICO Falcon Fraud Manager for Retail Banking What can you do to protect the current account against fraud attacks? Martin Warwick Principal Consultant Fraud Solutions FICO May 2010 1 2010 Fair Isaac Corporation.

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

Credit Card Market Study Interim Report: Annex 4 Switching Analysis

Credit Card Market Study Interim Report: Annex 4 Switching Analysis MS14/6.2: Annex 4 Market Study Interim Report: Annex 4 November 2015 This annex describes data analysis we carried out to improve our understanding of switching and shopping around behaviour in the UK

More information

How Fraud Can Be a Great Customer Experience

How Fraud Can Be a Great Customer Experience How Fraud Can Be a Great Customer Experience Martin Warwick Biography Martin Warwick is Principal Consultant at FICO with specific responsibilities in Fraud Consulting a position he has held since 2007.

More information

Unsupervised Profiling Methods for Fraud Detection

Unsupervised Profiling Methods for Fraud Detection Unsupervised Profiling Methods for Fraud Detection Richard J. Bolton and David J. Hand Department of Mathematics Imperial College London {r.bolton, d.j.hand}@ic.ac.uk Abstract Credit card fraud falls broadly

More information

An effective approach to preventing application fraud. Experian Fraud Analytics

An effective approach to preventing application fraud. Experian Fraud Analytics An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing

More information

Conclusions and Future Directions

Conclusions and Future Directions Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions

More information

Bust-out fraud. Knowing what to look for can safeguard the bottom line. An Experian white paper

Bust-out fraud. Knowing what to look for can safeguard the bottom line. An Experian white paper Knowing what to look for can safeguard the bottom line An Experian white paper Executive summary Bust-out is a growing area of fraud for the financial services industry. For organizations across the globe,

More information

Detecting Network Anomalies. Anant Shah

Detecting Network Anomalies. Anant Shah Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

Payments Transformation - EMV comes to the US

Payments Transformation - EMV comes to the US Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Statistical techniques for fraud detection, prevention, and evaluation

Statistical techniques for fraud detection, prevention, and evaluation Statistical techniques for fraud detection, prevention, and evaluation David J. Hand Imperial College September 2007 Imperial College NATO ASI: Mining Massive Data sets for Security 1 Research group: Niall

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

ATM FRAUD AND COUNTER MEASURES

ATM FRAUD AND COUNTER MEASURES ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility

More information

Fraud Detection In Insurance Claims. Bob Biermann Bob_Biermann@Yahoo.com April 15, 2013

Fraud Detection In Insurance Claims. Bob Biermann Bob_Biermann@Yahoo.com April 15, 2013 Fraud Detection In Insurance Claims Bob Biermann Bob_Biermann@Yahoo.com April 15, 2013 1 Background Fraud is common and costly for the insurance industry. According to the Federal Bureau of Investigations,

More information

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System CASE STUDIES Examples of analytical experiences detecting fraud and abuse with RiskTracker Account Activity Analysis System The following are descriptions of actual situations encountered by BANKDetect

More information

Credit Card PIN & PAY Frequently Asked Questions (FAQ)

Credit Card PIN & PAY Frequently Asked Questions (FAQ) Credit Card PIN & PAY Frequently Asked Questions (FAQ) 1. What is a PIN & PAY card? PIN & PAY card is a PIN - enabled card that allows you to make purchase by keying in a 6-digit PIN, with no signature

More information

Business Case Development for Credit and Debit Card Fraud Re- Scoring Models

Business Case Development for Credit and Debit Card Fraud Re- Scoring Models Business Case Development for Credit and Debit Card Fraud Re- Scoring Models Kurt Gutzmann Managing Director & Chief ScienAst GCX Advanced Analy.cs LLC www.gcxanalyacs.com October 20, 2011 www.gcxanalyacs.com

More information

IBM's Fraud and Abuse, Analytics and Management Solution

IBM's Fraud and Abuse, Analytics and Management Solution Government Efficiency through Innovative Reform IBM's Fraud and Abuse, Analytics and Management Solution Service Definition Copyright IBM Corporation 2014 Table of Contents Overview... 1 Major differentiators...

More information

OUTLIER ANALYSIS. Data Mining 1

OUTLIER ANALYSIS. Data Mining 1 OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,

More information

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon UMACHA Navigating Payments 2014 October 8, 2014 Who We Are Claudia

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

What Merchants Need to Know About EMV

What Merchants Need to Know About EMV Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the

More information

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 Clustering Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 1 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate data attributes with

More information

Data Mining Application for Cyber Credit-card Fraud Detection System

Data Mining Application for Cyber Credit-card Fraud Detection System , July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved

More information

Target Security Breach

Target Security Breach Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

Using multiple models: Bagging, Boosting, Ensembles, Forests

Using multiple models: Bagging, Boosting, Ensembles, Forests Using multiple models: Bagging, Boosting, Ensembles, Forests Bagging Combining predictions from multiple models Different models obtained from bootstrap samples of training data Average predictions or

More information

How To Understand The Benefits Of It/Is

How To Understand The Benefits Of It/Is THE ROLE OF IT/IS IN COMBATING FRAUD IN THE PAYMENT CARD INDUSTRY Jan Devos, Ghent University Association, Howest Kortrijk, Belgium Igor Pipan, Ss. Cyril and Methodius University in Skopje, Macedonia Abstract

More information

EMV EMV TABLE OF CONTENTS

EMV EMV TABLE OF CONTENTS 2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.

More information

How to gather and evaluate information

How to gather and evaluate information 09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic

More information

A MULTIVARIATE OUTLIER DETECTION METHOD

A MULTIVARIATE OUTLIER DETECTION METHOD A MULTIVARIATE OUTLIER DETECTION METHOD P. Filzmoser Department of Statistics and Probability Theory Vienna, AUSTRIA e-mail: P.Filzmoser@tuwien.ac.at Abstract A method for the detection of multivariate

More information

Data Mining - The Next Mining Boom?

Data Mining - The Next Mining Boom? Howard Ong Principal Consultant Aurora Consulting Pty Ltd Abstract This paper introduces Data Mining to its audience by explaining Data Mining in the context of Corporate and Business Intelligence Reporting.

More information

Consumer Enthusiasm and Desire for Chip Cards Growing

Consumer Enthusiasm and Desire for Chip Cards Growing Consumer Enthusiasm and Desire for Chip Cards Growing Consumers Asking for Specifics on Chip Card Functionality and Availability: How Does It Work and When Can I Get It? 2,000+ CONSUMERS SURVEYED As chip

More information

Protecting the POS Answers to Your Frequently Asked Questions

Protecting the POS Answers to Your Frequently Asked Questions Protecting the POS Answers to Your Frequently Asked Questions PROTECTING THE POS What is skimming? Skimming is the transfer of electronic data from one magnetic stripe to another for fraudulent purposes.

More information

Secure Payments Framework Workgroup

Secure Payments Framework Workgroup Secure Payments Framework Workgroup EMV for the US Hospitality Industry Version 1.0 About HTNG Hotel Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration

More information

Dynamic Planner ACE Fund Ratings Service. Technical Guide

Dynamic Planner ACE Fund Ratings Service. Technical Guide Dynamic Planner ACE Fund Ratings Service Technical Guide Dynamic Planner ACE Ratings Technical Guide Contents Introduction 3 Fund Classification 4 The Initial Quantitative Screen 8 Post Quantitative Screen

More information

with CO-OP Total Revelation.

with CO-OP Total Revelation. CO-OP Total Revelation Understand and influence debit behavior with CO-OP Total Revelation. Improve the profitability of your debit and ATM portfolios by uncovering hidden opportunities right in your own

More information

How To Cluster

How To Cluster Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

PREPARING FOR THE MIGRATION TO EMV IN

PREPARING FOR THE MIGRATION TO EMV IN PREPARING FOR THE MIGRATION TO EMV IN THE U.S. A Mercator Advisory Group Research Brief Sponsored by Merchant Warehouse 2010 Mercator Advisory Group, Inc. 8 Clock Tower Place, Suite 420 Maynard, MA 01754

More information

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed

More information

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group Abstract: Visa Inc. and MasterCard recently announced plans to accelerate chip migration in the

More information

Evaluating the impact of the Corporate Debt Restructuring scheme

Evaluating the impact of the Corporate Debt Restructuring scheme Evaluating the impact of the Corporate Debt Restructuring scheme Sargam Jain Kanwalpreet Singh Susan Thomas Finance Research Group Indira Gandhi Institute of Development Research, Bombay Presentation at

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

There are a number of different methods that can be used to carry out a cluster analysis; these methods can be classified as follows:

There are a number of different methods that can be used to carry out a cluster analysis; these methods can be classified as follows: Statistics: Rosie Cornish. 2007. 3.1 Cluster Analysis 1 Introduction This handout is designed to provide only a brief introduction to cluster analysis and how it is done. Books giving further details are

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

An Oracle White Paper July 2010 U.S. CARD FRAUD

An Oracle White Paper July 2010 U.S. CARD FRAUD An Oracle White Paper July 2010 U.S. CARD FRAUD Contents Card fraud can be placed into six categories:... 3 2 Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year. Although

More information

Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail.

Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail. Soft Computing Tools in Credit card fraud & Detection Rashmi G.Dukhi G.H.Raisoni Institute of Information & Technology, Nagpur rashmidukhi25@gmail.com Abstract Fraud is one of the major ethical issues

More information

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone!

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone! ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone! Presenters: Cliff Gray Senior Associate of The Strawhecker Group Jon Bonham CISA, Coalfire The opinions of the contributors

More information

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org

More information

Chapter 12 Discovering New Knowledge Data Mining

Chapter 12 Discovering New Knowledge Data Mining Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to

More information

Joint Media Release. Payments Technology

Joint Media Release. Payments Technology Joint Media Release Payments Technology Sydney, 13 October, 2006: The Australian Bankers Association (ABA) and Australian Payments Clearing Association (APCA) are releasing today the joint letter that

More information

A Statistical Method for Profiling Network Traffic

A Statistical Method for Profiling Network Traffic THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the Workshop on Intrusion Detection and Network Monitoring Santa Clara, California, USA, April

More information

STATISTICA Formula Guide: Logistic Regression. Table of Contents

STATISTICA Formula Guide: Logistic Regression. Table of Contents : Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary

More information

Local outlier detection in data forensics: data mining approach to flag unusual schools

Local outlier detection in data forensics: data mining approach to flag unusual schools Local outlier detection in data forensics: data mining approach to flag unusual schools Mayuko Simon Data Recognition Corporation Paper presented at the 2012 Conference on Statistical Detection of Potential

More information

Datamining. Gabriel Bacq CNAMTS

Datamining. Gabriel Bacq CNAMTS Datamining Gabriel Bacq CNAMTS In a few words DCCRF uses two ways to detect fraud cases: one which is fully implemented and another one which is experimented: 1. Database queries (fully implemented) Example:

More information

Preventing fraud in credit and debit card transactions

Preventing fraud in credit and debit card transactions IBM Software WebSphere Thought Leadership White Paper Preventing fraud in credit and debit card transactions Look beyond packaged solutions for a holistic approach 2 Preventing fraud in credit and debit

More information

A Guide to Contactless Cards

A Guide to Contactless Cards A Guide to Contactless Cards 1 Guide to Contactless Cards Ever since they were first introduced to the UK market over 50 years ago, credit cards have been in a constant state of evolution, as card issuers

More information

Bank of Scotland Private Banking Savings Accounts

Bank of Scotland Private Banking Savings Accounts Bank of Scotland Private Banking Savings Accounts Terms and Conditions Applicable to: Premier Investment Account Premier Reserve Account (for Personal Customers) Premier Reserve Account (for Trusts) 3

More information

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations

More information

Robust Outlier Detection Technique in Data Mining: A Univariate Approach

Robust Outlier Detection Technique in Data Mining: A Univariate Approach Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,

More information

Mitigating Fraud Risk Through Card Data Verification

Mitigating Fraud Risk Through Card Data Verification Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,

More information

Tax administration changes to raise additional revenue over time

Tax administration changes to raise additional revenue over time Tax administration changes to raise additional revenue over time Background paper for Session 3 of the Victoria University of Wellington Tax Working Group September 2009 Prepared by officials from the

More information

Frequently asked questions - Visa paywave

Frequently asked questions - Visa paywave Frequently asked questions - Visa paywave What is Visa paywave? Visa paywave is a new contactless method of payment - the latest evolution in Visa payments. It is a simple, secure and quick payment method

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar

More information

Neil Meikle, Associate Director, Forensic Technology, PwC

Neil Meikle, Associate Director, Forensic Technology, PwC Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England

More information

Introducing the Credit Card Answer Guides

Introducing the Credit Card Answer Guides Introducing the Credit Card Answer Guides The answers below correspond to the exercises in Introducing the Credit Card. The correct ones are bolded for convenience, with detailed explanations where applicable.

More information

Practically Thinking: What Small Merchants Should Know about EMV

Practically Thinking: What Small Merchants Should Know about EMV Practically Thinking: What Small Merchants Should Know about EMV 1 Practically Thinking: What Small Merchants Should Know About EMV Overview Savvy business owners know that payments are about more than

More information

Fraud Prevention & I.T. Security

Fraud Prevention & I.T. Security Fraud Prevention & I.T. Security Using Huntsman to align fraud prevention and IT security Fraud prevention is an increasingly important issue, particularly for organisations with an online presence. Large

More information

FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2

FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2 FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2 TABLE OF CONTENTS 1. Fraud: The Bad and the Ugly... 03 2. A New Opportunity for Fraud Detection... 03

More information

TOP TRUMPS Comparisons of how to pay for goods and services online

TOP TRUMPS Comparisons of how to pay for goods and services online Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face

More information

System for Denial-of-Service Attack Detection Based On Triangle Area Generation

System for Denial-of-Service Attack Detection Based On Triangle Area Generation System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,

More information

Payment systems. Tuomas Aura T-110.4206 Information security technology

Payment systems. Tuomas Aura T-110.4206 Information security technology Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit

More information

Discussion Paper On the validation and review of Credit Rating Agencies methodologies

Discussion Paper On the validation and review of Credit Rating Agencies methodologies Discussion Paper On the validation and review of Credit Rating Agencies methodologies 17 November 2015 ESMA/2015/1735 Responding to this paper The European Securities and Markets Authority (ESMA) invites

More information

International students opening a UK bank account

International students opening a UK bank account International students opening a UK bank account I am a student from outside the UK and I am about to start studying at a UK university/college/school. How do I choose which bank is best for me? You should

More information

Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud Spike

Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud Spike Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud Spike Prepared for: 2014 RSA. All rights reserved. Reproduction of this white paper by any means is strictly prohibited. TABLE OF CONTENTS

More information

MACHINE LEARNING IN HIGH ENERGY PHYSICS

MACHINE LEARNING IN HIGH ENERGY PHYSICS MACHINE LEARNING IN HIGH ENERGY PHYSICS LECTURE #1 Alex Rogozhnikov, 2015 INTRO NOTES 4 days two lectures, two practice seminars every day this is introductory track to machine learning kaggle competition!

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

The Data Mining Process

The Data Mining Process Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data

More information

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij

More information

How To Change A Bank Card To A Debit Card

How To Change A Bank Card To A Debit Card The Evolution of EFT Networks from ATMs to New On-Line Debit Payment Products * Stan Sienkiewicz April 2002 Summary: On June 15, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia

More information

The Value of Negative Credit Bureau Alerts to Credit Card Issuers

The Value of Negative Credit Bureau Alerts to Credit Card Issuers The Value of Negative Credit Bureau Alerts to Credit Card Issuers Authors: Chris Slater & Nick Gudde Release Date: October 2012 About The International Risk Partnership The International Risk Partnership

More information

Review Jeopardy. Blue vs. Orange. Review Jeopardy

Review Jeopardy. Blue vs. Orange. Review Jeopardy Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?

More information

The Canadian Migration to EMV. Prepared By:

The Canadian Migration to EMV. Prepared By: The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced

More information

Be Safe, Smart and Secure: Simple Ways to Protect Your Identity and Your Money

Be Safe, Smart and Secure: Simple Ways to Protect Your Identity and Your Money Be Safe, Smart and Secure: Simple Ways to Protect Your Identity and Your Money Cards protect you and your money Electronic payment cards are one of the safest and most secure ways to purchase goods and

More information

The In-Depth Guide to Fraud Prevention in International E-commerce

The In-Depth Guide to Fraud Prevention in International E-commerce The In-Depth Guide to Fraud Prevention in International E-commerce The Evolution of Fraud Cyberattacks are not a new threat, yet the rise in high-profile hacking cases has merchants rightfully concerned

More information

Visa Canada Interchange Reimbursement Fees

Visa Canada Interchange Reimbursement Fees Visa Canada The following tables set forth the interchange reimbursement fees applied on Visa financial transactions completed in Canada. 1 Visa uses interchange reimbursement fees as transfer fees between

More information