Financial Fraud Detection and Prevention with Data Mining Techniques Professor Hui Xiong Rutgers Business School

Size: px
Start display at page:

Download "http://datamining.rutgers.edu Financial Fraud Detection and Prevention with Data Mining Techniques Professor Hui Xiong Rutgers Business School"

Transcription

1 Financial Fraud Detection and Prevention with Data Mining Techniques Professor Hui Xiong Rutgers Business School

2 What is Financial Fraud General Violation of Good Behavior in regards to Financial Issues Accounting Manipulation Fraud or Manipulation in the Annual Financial Report Non Compliance with Internal Controls and Procedures Misappropriation of Assets Fraudulent Statement Corruption

3 Types of Financial Fraud External Threats Investment Fraud, Credit Card Fraud, Identity Theft Internal Threats Financial Theft, False Accounting, Fraudulent Trading, Money Laundering, Mortgage Fraud, Inside Trading, Market Manipulation Almost 75% of frauds were perpetrated internally

4 What is Data Mining

5 Why Data Mining for Financial Fraud Detection Large-scale financial data are being collected and warehoused Financial Transaction Data Financial Report Bank/Credit Card transactions Computers have become cheaper and more powerful Competitive Pressure is Strong Provide automatic, customized services for an edge, e.g. automatic trading machine.

6 Data Mining Process for Fraud Detection

7 Who commits fraud? How to estimate risk probability? Source : 2008 report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners

8 Identify and Evaluate Fraud Risk Factors Identify fraud risk factors at the entity level and business process level. Consider whether each fraud risk factor indicates the existence of an incentive or pressure, opportunity or attitude and rationalisation. Identify incentives / pressures to commit fraud, opportunities to commit fraud, or attitudes / rationalizations to justify fraud. Personnel from various levels of the organization should be involved in the process. Where could the fraud occur? What would the fraud look like? What type of fraud is the area susceptible to? What are the effects on the books and records? When could the fraud occur? Consider internal and external (e.g., regulatory, industry) influences.

9 Financial Reports Annual Report Financial Statements Chairman's report CEO's report Mission statement Auditor's report on corporate governance Statement of directors' responsibilities Invitation to the company's AGM Corporate governance statement of compliance US:10-K SEC: Security and Exchange Commission

10 Financial Statements Also Include: Auditor's report on the financial statements Notes to the financial statements Accounting policies

11 Data Collection Sample Firms Type Details Sources Target (484) Bankruptcy Companies Trading Suspension Companies UCLA bankruptcy research database (BRD) US SEC trading suspension Normal (902) Matched Pair Design with Target Companies similar size, industry, lifecycle Google finance, Yahoo finance, Major financial journals Time Period:

12 Data Collection Raw Data: 10 years financial statements for each firms 126 attributes for each instance Data Source: COMPUSTAT database from WRDS (Wharton Research Data Service) Identifier (4) Company Information (10) Account Information (111) Label(2) gvkey cusip state, comn stko, exchg ACT,CEQ EBIT,COGS Target (Y) tic cik date, fyr,fyear,currtr sic, naics DlCCH, CAPX, AOLOCH EMP Normal (N)

13 Enron Network

14 Business & Economic Networks Example: ebay bidding vertices: ebay users, links: represent bidder-seller or buyer-seller fraud detection: bidding rings Example: corporate boards vertices: corporations links: between companies that share a board member Example: corporate partnerships vertices: corporations links: represent formal joint ventures Example: goods exchange networks vertices: buyers and sellers of commodities links: represent permissible transactions

15 Data Mining Process for Fraud Detection

16 Detection - Fraud indicators Receipt of tip-offs High staff turnover Low morale amongst staff Lifestyle of employees not commensurate with salary Unusual, irrational or inconsistent behaviour Holiday not taken Key financial indicators starting to slip Does the business accounting make sense and do you understand it? Dominant line management

17 A typical perpetrator: Semantic Information Gender larger and higher volume of frauds committed by men Age typically middle aged Education as the level of education rises so do the losses caused Criminal history majority of perpetrators are first time offenders Time with the company the longer employed the bigger the loss

18 Feature Transformation: Case Study Missing Value Handle eliminate data objects or attributes estimate missing values methods: based on accounting knowledge ignore the missing value during analysis Feature Construction(Domain Knowledge) extract or creation valuable attributes from original data Feature Selection( Technique Knowledge) Pearson s Correlation Classifier-based feature ranking

19 Feature Construction Identifiers (4 attributes) Financial Ratios (32 attributes) Class Label (1 attribute) Z-Score: predict a company s probability of failure ROA: indicate whether to start a project EBIT: indicate company s profitability SOLVENCY RATIO: measure company s ability to meet its long-term obligations. >20% financially healthy ACID-TEST: whether enough short-time assets to cover liabilities. <1 viewed with caution

20 Dataset 3 year statement (4620 instances 37 attributes)

21 Data Mining Process for Fraud Detection

22 Report Mining A Low-cost and High-impact Alternative USERS OF INFORMATION Hardcopy Reports Report Mining Data Mining Real-time Data Mining Report Files Data Warehouse Report Generators Report Generators OPERATIONAL DATA

23 Report Mining for Fraud Detection Test 1 Test 2 Test 3 Test 4 Test 5 Match payments against authorized suppliers list Match suppliers against employee surnames Match vendor bank account numbers to employee bank account numbers Match delivery addresses to employee addresses Identify large variances from prior years

24 Data Mining Profiling The matching or «cross-checking data»! Find your «missing traders» Know where they are buying from Indicators about fraud (activity, places, ) Evaluate the fraud The profiling (data mining) Identify quickly : Buffers, profit takers, crossed invoicers and conduit companies to put on monitoring

25 Data Mining: Confluence of Multiple Disciplines? 20x20 ~ 2^400 10^120 patterns

26 10 Data Mining Tasks Data Tid Refund Marital Status Taxable Income Cheat 1 Yes Single 125K No 2 No Married 100K No 3 No Single 70K No 4 Yes Married 120K No 5 No Divorced 95K Yes 6 No Married 60K No 7 Yes Divorced 220K No 8 No Single 85K Yes 9 No Married 75K No 10 No Single 90K Yes 11 No Married 60K No 12 Yes Divorced 220K No 13 No Single 85K Yes 14 No Married 75K No 15 No Single 90K Yes Milk

27 10 Predictive Modeling: Classification Find a model for class attribute as a function of the values of other attributes Tid Employed Level of Education # years at present address Class Credit Worthy 1 Yes Graduate 5 Yes 2 Yes High School 2 No 3 No Undergrad 1 No 4 Yes High School 10 Yes Model for predicting credit worthiness No No Employed Yes Education Graduate { High school, Undergrad } Number of years > 3 yr < 3 yr Number of years > 7 yrs < 7 yrs Yes No Yes No

28 10 10 Classification Example Tid Employed Level of Education # years at present address Credit Worthy 1 Yes Graduate 5 Yes 2 Yes High School 2 No 3 No Undergrad 1 No 4 Yes High School 10 Yes Tid Employed Level of Education # years at present address Credit Worthy 1 Yes Undergrad 7? 2 No Graduate 3? 3 Yes High School 2? Test Set Training Set Learn Classifier Model

29 Classification: Financial Application Credit Fraud Detection Goal: Predict fraudulent cases in credit card transactions. Approach: Use credit card transactions and the information on its account-holder as attributes. When does a customer buy, what does he buy, how often he pays on time, etc Label past transactions as fraud or fair transactions. This forms the class attribute. Learn a model for the class of the transactions. Use this model to detect fraud by observing credit card transactions on an account.

30 Financial Statement Analysis Top Rules Derived by Ripper ROA <= LTA >= QACL<= COSAL<= ROA <= SOLVENCY RATIO<= ROS <= ROE >= LOGDEBT >= SOLVENCY RATIO <= z-score <= EBIT <= z-score <= GM11 = 1 Label=Y

31 Clustering Finding groups of objects such that the objects in a group will be similar (or related) to one another and different from (or unrelated to) the objects in other groups Intra-cluster distances are minimized Inter-cluster distances are maximized

32 Applications of Cluster Analysis Understanding Group related documents for browsing Group genes and proteins that have similar functionality Group stocks with similar price fluctuations Discovered Clusters Applied-Matl-DOWN,Bay-Network-Down,3-COM-DOWN, Cabletron-Sys-DOWN,CISCO-DOWN,HP-DOWN, DSC-Comm-DOWN,INTEL-DOWN,LSI-Logic-DOWN, Micron-Tech-DOWN,Texas-Inst-Down,Tellabs-Inc-Down, Natl-Semiconduct-DOWN,Oracl-DOWN,SGI-DOWN, Sun-DOWN Apple-Comp-DOWN,Autodesk-DOWN,DEC-DOWN, ADV-Micro-Device-DOWN,Andrew-Corp-DOWN, Computer-Assoc-DOWN,Circuit-City-DOWN, Compaq-DOWN, EMC-Corp-DOWN, Gen-Inst-DOWN, Motorola-DOWN,Microsoft-DOWN,Scientific-Atl-DOWN Fannie-Mae-DOWN,Fed-Home-Loan-DOWN, MBNA-Corp-DOWN,Morgan-Stanley-DOWN Baker-Hughes-UP,Dresser-Inds-UP,Halliburton-HLD-UP, Louisiana-Land-UP,Phillips-Petro-UP,Unocal-UP, Schlumberger-UP Industry Group Technology1-DOWN Technology2-DOWN Financial-DOWN Oil-UP Summarization Reduce the size of large data sets

33 Bankruptcy Company Bankruptcy Bank in 2009

34 Unemployment

35 Foreclosures

36 Bankruptcy Company Bankruptcy Bank Not in 2009

37 Association Analysis Given a set of records each of which contain some number of items from a given collection Produce dependency rules which will predict occurrence of an item based on occurrences of other items. TID Items 1 Bread, Coke, Milk 2 Beer, Bread 3 Beer, Coke, Diaper, Milk 4 Beer, Bread, Diaper, Milk 5 Coke, Diaper, Milk Rules Discovered: {Milk} --> {Coke} {Diaper, Milk} --> {Beer}

38 Association Analysis: Applications Market-basket analysis Rules are used for sales promotion, shelf management, and inventory management Telecommunication alarm diagnosis Rules are used to find combination of alarms that occur together frequently in the same time period Financial Fraud Indicators Rules are used to find combination of events and observations associated with certain financial fraud

39 Deviation/Anomaly Detection Detect significant deviations from normal behavior Applications: Credit Card Fraud Detection Network Intrusion Detection

40 Anomaly Detection Challenges How many outliers are there in the data? Method is unsupervised Validation can be quite challenging (just like for clustering) Finding needle in a haystack Working assumption: There are considerably more normal observations than abnormal observations (outliers/anomalies) in the data

41 Enron Case James Chanos, the President of Kynikos Associates specializing in short selling, managing over 1 billion Kynikos Assocates manages a portfolio of overvalued securities Three Indicators Materially overstated earnings An unsustainable or operationally flawed business plan And/or engaged in outright fraud

42 Enron Case Early alert: 1999 Form 10-K, Form 10-Qs in 2000 Enron s return on capital, 7 percent before tax 7 percent is low for this type of firm (outlier) Enron s cost of capital should be close to 9% (not earning any money) Company s initiative in the telecom field not a sustainable plan Shorting Enron in Nov. of 2000 (~ $80 per share) In the spring of 2001, a number of senior executives were departing from the company, the insider selling of Enron stock continued unabated.

43 Data Mining for Financial Fraud Detection: Challenges Scalability Dimensionality Complex and Heterogeneous Data Data Quality Data Ownership and Distribution Privacy Preservation Streaming Data Data from Multi-Sources

44 Privacy and Security Issues Privacy Preserving Data Mining The main difficulty in finding a solution to the problem of privacy is the contradicting requirement of hiding sensitive data while still providing useful information content. Transaction Hiding Hiding the origin, location, movement or actual rights on a financial operation or a property transaction

45 Distributed Data Mining Multi-source Joint Learning Detecting Cross-account collaborative fraud

46 Graph Mining: Challenging Problems In- and Out- degree distributions Fraud Risk Propagation in Corporation Networks Cross-Account Collaborative Fraud Detection

47 Example: Fraud Detection In forecasting markets with prizes for the best traders as incentive, two types of fraud (behavior not consistent with market regulations) can be expected: Money transfer (ring of traders, multiple accounts) Price manipulations (in or outgoing stars, potentially with losses) (Examples by courtesy of Jan Schröder, FSM (Forecasting Strategy Markets))

48 Blackhole Patterns Detect cross-account collaborative fraud

49 Money Transfer The 2006 State Parliament Elections in Baden-Württemberg in Germany Market opening :23:44 Market close :00:00 Number of traders (at least one sell or buy transaction) 306 traders Number of traders (at least one sell transaction) 190 traders Number of traders (at least one buy transaction) 291 traders Number of transactions transactions Number of shares 7 shares Average volume per trade shares Average moneyflow per trade 2,462.1 MU Moneyflow in total 26,556,378 MU Shareflow in total 2,314,197 shares

50 And the Winners are First 8 highest ranks in the highscore for the market for the 2006 state parliament elections in Baden-Württemberg in Germany 1 elfriede herrrtie gruener MarcEichler potato joe Maio\_Shan Ritvars henning

51 Are they honest No, elfriede (#1) used 4 accounts

52 And henning (#8) used two!

53 Similarities Between Data Miners and Doctors Data Characteristics Data Mining Techniques Medical Devices

54 Literature Markus Franke, Andreas Geyer-Schulz and Bettina Hoser. Analyszing trading behaviour in transaction data of electronic election markets. Data Analysis and Decision Support. P , Springer studies in classification, data analysis and knowledge organization Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Introduction to Data Mining, Addison-Wesley, ISBN: Junjie Wu, Hui Xiong, Wu Peng, Jian Chen, Local Decomposition for Rare Class Analysis, the 13th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining (KDD 2007), pp , 2007.

55 Thank You!

56 Personal Knowledge Value Technical Knowledge Domain Knowledge Personal Knowledge Value

57 Life: A Data Mining Process Personal Knowledge Set Family Knowledge Set Decision Power The Knowledge Set of Other people you know

Data Mining: Introduction. Lecture Notes for Chapter 1. Slides by Tan, Steinbach, Kumar adapted by Michael Hahsler

Data Mining: Introduction. Lecture Notes for Chapter 1. Slides by Tan, Steinbach, Kumar adapted by Michael Hahsler Data Mining: Introduction Lecture Notes for Chapter 1 Slides by Tan, Steinbach, Kumar adapted by Michael Hahsler Why Mine Data? Commercial Viewpoint Lots of data is being collected and warehoused - Web

More information

Introduction of Information Visualization and Visual Analytics. Chapter 4. Data Mining

Introduction of Information Visualization and Visual Analytics. Chapter 4. Data Mining Introduction of Information Visualization and Visual Analytics Chapter 4 Data Mining Books! P. N. Tan, M. Steinbach, V. Kumar: Introduction to Data Mining. First Edition, ISBN-13: 978-0321321367, 2005.

More information

Quick Introduction of Data Mining Techniques

Quick Introduction of Data Mining Techniques Quick Introduction of Data Mining Techniques *Sources partially from Introduction to Data Mining, by P.-N. Tan, M. Steinbach, V. Kumar, Addison-Wesley, 2005. Main Data Mining Techniques Link Analysis Associations

More information

Data Mining. Yeow Wei Choong Anne Laurent

Data Mining. Yeow Wei Choong Anne Laurent Data Mining Yeow Wei Choong Anne Laurent Why Mine Data? Commercial Viewpoint Lots of data is being collected and warehoused Web data, e-commerce purchases at department/ grocery stores Bank/Credit Card

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:

More information

Business Intelligence and Data Mining

Business Intelligence and Data Mining Business Intelligence and Data Mining Dr. Hui Xiong Rutgers University Learning Objectives Understand the need for business intelligence systems. Know the characteristics of reporting systems. Know the

More information

Mining Big Data. Pang-Ning Tan. Associate Professor Dept of Computer Science & Engineering Michigan State University

Mining Big Data. Pang-Ning Tan. Associate Professor Dept of Computer Science & Engineering Michigan State University Mining Big Data Pang-Ning Tan Associate Professor Dept of Computer Science & Engineering Michigan State University Website: http://www.cse.msu.edu/~ptan Google Trends Big Data Smart Cities Big Data and

More information

Data Mining: Introduction

Data Mining: Introduction Data Mining: Introduction Introducing the course How the course is organized How students are evaluated Deadlines Data Mining [Chapt. 1 of course book] What is it about? The KDD process Relations to other

More information

CSE4334/5334 Data Mining Lecturer 2: Introduction to Data Mining. Chengkai Li University of Texas at Arlington Spring 2016

CSE4334/5334 Data Mining Lecturer 2: Introduction to Data Mining. Chengkai Li University of Texas at Arlington Spring 2016 CSE4334/5334 Data Mining Lecturer 2: Introduction to Data Mining Chengkai Li University of Texas at Arlington Spring 2016 Big Data http://dilbert.com/strip/2012-07-29 Big Data http://www.ibmbigdatahub.com/infographic/four-vs-big-data

More information

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will

More information

DATA MINING - 1DL105, 1Dl111

DATA MINING - 1DL105, 1Dl111 1 DATA MINING - 1DL105, 1Dl111 Fall 2006 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht06 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

Introduction to Artificial Intelligence G51IAI. An Introduction to Data Mining

Introduction to Artificial Intelligence G51IAI. An Introduction to Data Mining Introduction to Artificial Intelligence G51IAI An Introduction to Data Mining Learning Objectives Introduce a range of data mining techniques used in AI systems including : Neural networks Decision trees

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

Foundations of Artificial Intelligence. Introduction to Data Mining

Foundations of Artificial Intelligence. Introduction to Data Mining Foundations of Artificial Intelligence Introduction to Data Mining Objectives Data Mining Introduce a range of data mining techniques used in AI systems including : Neural networks Decision trees Present

More information

Data Mining System, Functionalities and Applications: A Radical Review

Data Mining System, Functionalities and Applications: A Radical Review Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially

More information

The Data Mining Process

The Data Mining Process Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

Data Mining Solutions for the Business Environment

Data Mining Solutions for the Business Environment Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over

More information

What is Data Mining? Data Mining (Knowledge discovery in database) Data mining: Basic steps. Mining tasks. Classification: YES, NO

What is Data Mining? Data Mining (Knowledge discovery in database) Data mining: Basic steps. Mining tasks. Classification: YES, NO What is Data Mining? Data Mining (Knowledge discovery in database) Data Mining: "The non trivial extraction of implicit, previously unknown, and potentially useful information from data" William J Frawley,

More information

not possible or was possible at a high cost for collecting the data.

not possible or was possible at a high cost for collecting the data. Data Mining and Knowledge Discovery Generating knowledge from data Knowledge Discovery Data Mining White Paper Organizations collect a vast amount of data in the process of carrying out their day-to-day

More information

Marta Zorrilla Universidad de Cantabria

Marta Zorrilla Universidad de Cantabria Tipos de problemas Marta Zorrilla Universidad de Cantabria Slides from Tan, P., Steinbach, M., Kumar, V. Introduction to data mining. Pearson Prentice Hall. 2006 Data Mining Tasks Prediction Methods Use

More information

Insider Threat Detection Using Graph-Based Approaches

Insider Threat Detection Using Graph-Based Approaches Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University weberle@tntech.edu Lawrence

More information

Data Mining Introduction

Data Mining Introduction Data Mining Introduction Organization Lectures Mondays and Thursdays from 10:30 to 12:30 Lecturer: Mouna Kacimi Office hours: appointment by email Labs Thursdays from 14:00 to 16:00 Teaching Assistant:

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

Data Warehousing and Data Mining for improvement of Customs Administration in India. Lessons learnt overseas for implementation in India

Data Warehousing and Data Mining for improvement of Customs Administration in India. Lessons learnt overseas for implementation in India Data Warehousing and Data Mining for improvement of Customs Administration in India Lessons learnt overseas for implementation in India Participants Shailesh Kumar (Group Leader) Sameer Chitkara (Asst.

More information

2.1. Data Mining for Biomedical and DNA data analysis

2.1. Data Mining for Biomedical and DNA data analysis Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: simmibagga12@gmail.com) Dr. G.N. Singh Department of Physics and

More information

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study

Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/

More information

1. Introduction to Data Mining

1. Introduction to Data Mining 1. Introduction to Data Mining Road Map What is data mining Steps in data mining process Data mining methods and subdomains Summary 2 Definition ([Liu 11]) Data mining is also called Knowledge Discovery

More information

Search and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov

Search and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov Search and Data Mining: Techniques Applications Anya Yarygina Boris Novikov Introduction Data mining applications Data mining system products and research prototypes Additional themes on data mining Social

More information

Big Data Analytics in Mobile Environments

Big Data Analytics in Mobile Environments 1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health

Example application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health Lecture 1: Data Mining Overview and Process What is data mining? Example applications Definitions Multi disciplinary Techniques Major challenges The data mining process History of data mining Data mining

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association

More information

OUTLIER ANALYSIS. Data Mining 1

OUTLIER ANALYSIS. Data Mining 1 OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,

More information

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate

More information

Data Mining on Social Networks. Dionysios Sotiropoulos Ph.D.

Data Mining on Social Networks. Dionysios Sotiropoulos Ph.D. Data Mining on Social Networks Dionysios Sotiropoulos Ph.D. 1 Contents What are Social Media? Mathematical Representation of Social Networks Fundamental Data Mining Concepts Data Mining Tasks on Digital

More information

Data Warehousing and Data Mining

Data Warehousing and Data Mining Data Warehousing and Data Mining Winter Semester 2010/2011 Free University of Bozen, Bolzano DW Lecturer: Johann Gamper gamper@inf.unibz.it DM Lecturer: Mouna Kacimi mouna.kacimi@unibz.it http://www.inf.unibz.it/dis/teaching/dwdm/index.html

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...

More information

Ethics, Fraud, and Internal Control

Ethics, Fraud, and Internal Control Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in

More information

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6 International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering

More information

USING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES

USING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES USING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES Irron Williams Northwestern University IrronWilliams2015@u.northwestern.edu Abstract--Data science is evolving. In

More information

Fraud Prevention Policy

Fraud Prevention Policy FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies

More information

Lecture 6 - Data Mining Processes

Lecture 6 - Data Mining Processes Lecture 6 - Data Mining Processes Dr. Songsri Tangsripairoj Dr.Benjarath Pupacdi Faculty of ICT, Mahidol University 1 Cross-Industry Standard Process for Data Mining (CRISP-DM) Example Application: Telephone

More information

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data

More information

Sentiment analysis on tweets in a financial domain

Sentiment analysis on tweets in a financial domain Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Chapter 1 The Scope of Corporate Finance

Chapter 1 The Scope of Corporate Finance Chapter 1 The Scope of Corporate Finance MULTIPLE CHOICE 1. One of the tasks for financial managers when identifying projects that increase firm value is to identify those projects where a. marginal benefits

More information

Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2

Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2 Oracle 11g DB Data Warehousing ETL OLAP Statistics Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2 Data Mining Charlie Berger Sr. Director Product Management, Data

More information

Unsupervised Outlier Detection in Time Series Data

Unsupervised Outlier Detection in Time Series Data Unsupervised Outlier Detection in Time Series Data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College of Information

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for

More information

Role of Social Networking in Marketing using Data Mining

Role of Social Networking in Marketing using Data Mining Role of Social Networking in Marketing using Data Mining Mrs. Saroj Junghare Astt. Professor, Department of Computer Science and Application St. Aloysius College, Jabalpur, Madhya Pradesh, India Abstract:

More information

K-Means Cluster Analysis. Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1

K-Means Cluster Analysis. Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 K-Means Cluster Analsis Chapter 3 PPDM Class Tan,Steinbach, Kumar Introduction to Data Mining 4/18/4 1 What is Cluster Analsis? Finding groups of objects such that the objects in a group will be similar

More information

Example: Document Clustering. Clustering: Definition. Notion of a Cluster can be Ambiguous. Types of Clusterings. Hierarchical Clustering

Example: Document Clustering. Clustering: Definition. Notion of a Cluster can be Ambiguous. Types of Clusterings. Hierarchical Clustering Overview Prognostic Models and Data Mining in Medicine, part I Cluster Analsis What is Cluster Analsis? K-Means Clustering Hierarchical Clustering Cluster Validit Eample: Microarra data analsis 6 Summar

More information

A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala

A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have

More information

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,

More information

GLOBAL PORTS INVESTMENTS PLC

GLOBAL PORTS INVESTMENTS PLC Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....

More information

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement

More information

Data Mining in Telecommunication

Data Mining in Telecommunication Data Mining in Telecommunication Mohsin Nadaf & Vidya Kadam Department of IT, Trinity College of Engineering & Research, Pune, India E-mail : mohsinanadaf@gmail.com Abstract Telecommunication is one of

More information

Module # 2 Management/Key Employee Assessment

Module # 2 Management/Key Employee Assessment Module # 2 Management/Key Employee Assessment The management/key employee assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Internal

More information

Fraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be

Fraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be Fraud Checklist Client Name Disclosing entity Prepared by Reviewed by Partner review Balance Date Close Monitoring Date Date Date How to use this checklist An initial assessment of the risk that irregularities

More information

Data Warehousing and Data Mining

Data Warehousing and Data Mining Data Warehousing and Data Mining Winter Semester 2012/2013 Free University of Bozen, Bolzano DM Lecturer: Mouna Kacimi mouna.kacimi@unibz.it http://www.inf.unibz.it/dis/teaching/dwdm/index.html Organization

More information

(b) How data mining is different from knowledge discovery in databases (KDD)? Explain.

(b) How data mining is different from knowledge discovery in databases (KDD)? Explain. Q2. (a) List and describe the five primitives for specifying a data mining task. Data Mining Task Primitives (b) How data mining is different from knowledge discovery in databases (KDD)? Explain. IETE

More information

Knowledge Discovery from Data Bases Proposal for a MAP-I UC

Knowledge Discovery from Data Bases Proposal for a MAP-I UC Knowledge Discovery from Data Bases Proposal for a MAP-I UC P. Brazdil 1, João Gama 1, P. Azevedo 2 1 Universidade do Porto; 2 Universidade do Minho; 1 Knowledge Discovery from Data Bases We are deluged

More information

Introduction to Data Mining

Introduction to Data Mining Bioinformatics Ying Liu, Ph.D. Laboratory for Bioinformatics University of Texas at Dallas Spring 2008 Introduction to Data Mining 1 Motivation: Why data mining? What is data mining? Data Mining: On what

More information

Anomaly Detection Using Unsupervised Profiling Method in Time Series Data

Anomaly Detection Using Unsupervised Profiling Method in Time Series Data Anomaly Detection Using Unsupervised Profiling Method in Time Series Data Zakia Ferdousi 1 and Akira Maeda 2 1 Graduate School of Science and Engineering, Ritsumeikan University, 1-1-1, Noji-Higashi, Kusatsu,

More information

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015 An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content

More information

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume

More information

Do broker/analyst conflicts matter? Detecting evidence from internet trading platforms

Do broker/analyst conflicts matter? Detecting evidence from internet trading platforms 1 Introduction Do broker/analyst conflicts matter? Detecting evidence from internet trading platforms Jan Hanousek 1, František Kopřiva 2 Abstract. We analyze the potential conflict of interest between

More information

III JORNADAS DE DATA MINING

III JORNADAS DE DATA MINING III JORNADAS DE DATA MINING EN EL MARCO DE LA MAESTRÍA EN DATA MINING DE LA UNIVERSIDAD AUSTRAL PRESENTACIÓN TECNOLÓGICA IBM Alan Schcolnik, Cognos Technical Sales Team Leader, IBM Software Group. IAE

More information

Centre for Corporate Governance. Sample listing of fraud schemes

Centre for Corporate Governance. Sample listing of fraud schemes Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying

More information

Learning from Big Data in

Learning from Big Data in Learning from Big Data in Astronomy an overview Kirk Borne George Mason University School of Physics, Astronomy, & Computational Sciences http://spacs.gmu.edu/ From traditional astronomy 2 to Big Data

More information

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations

More information

IGCSE Business Studies revision notes Finance Neil.elrick@tes.tp.edu.tw

IGCSE Business Studies revision notes Finance Neil.elrick@tes.tp.edu.tw IGCSE FINANCE REVISION NOTES Table of contents Table of contents... 2 SOURCES OF FINANCE... 3 CASH FLOW... 5 HOW TO CALCULATE THE CASH BALANCE... 5 HOW TO WORK OUT THE CASH AVAILABLE TO THE BUSINESS...

More information

ETHICS, FRAUD, AND INTERNAL CONTROL

ETHICS, FRAUD, AND INTERNAL CONTROL CHAPTER ETHICS, FRAUD, AND INTERNAL CONTROL The three topics of this chapter are closely related. Ethics is a hallmark of the accounting profession. The principles which guide a manager s decision making

More information

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition

More information

FINA351, Managerial Finance - Chapter 16 Notes WORKING CAPITAL. Involves current assets and liabilities in the operating cycle

FINA351, Managerial Finance - Chapter 16 Notes WORKING CAPITAL. Involves current assets and liabilities in the operating cycle FINA351, Managerial Finance - Chapter 16 Notes WORKING CAPITAL Involves current assets and liabilities in the operating cycle Is important for every business major to understand because: (1) it is where

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

Revised 05/22/14 P a g e 1

Revised 05/22/14 P a g e 1 Corporate Office 107 W. Franklin Street P.O. Box 638 Elkhart, IN 46515-0638 Phone (574) 294-7511 Fax (574) 522-5213 INTRODUCTION PATRICK INDUSTRIES, INC. CODE OF ETHICS AND BUSINESS CONDUCT As a leader

More information

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71 Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns

More information

GEOGRAPHIC COVERAGE: DATE REVISED: May 2015 1. GENERAL

GEOGRAPHIC COVERAGE: DATE REVISED: May 2015 1. GENERAL FORM / POLICY TITLE: GEOGRAPHIC COVERAGE: DOCUMENT OWNER: Insider Trading Policy Global SVP & General Counsel DATE REVISED: May 2015 1. GENERAL Generally there are laws in each jurisdiction in which Gartner

More information

DATA MINING CONCEPTS AND TECHNIQUES. Marek Maurizio E-commerce, winter 2011

DATA MINING CONCEPTS AND TECHNIQUES. Marek Maurizio E-commerce, winter 2011 DATA MINING CONCEPTS AND TECHNIQUES Marek Maurizio E-commerce, winter 2011 INTRODUCTION Overview of data mining Emphasis is placed on basic data mining concepts Techniques for uncovering interesting data

More information

Network mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon

Network mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon Network mining for crime/fraud detection FuturICT CrimEx January 26th, 2012 Jan Ramon Overview Administrative data and crime/fraud Data mining and related domains Data mining in large networks Opportunities

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Health Spring Meeting May 2008 Session # 42: Dental Insurance What's New, What's Important

Health Spring Meeting May 2008 Session # 42: Dental Insurance What's New, What's Important Health Spring Meeting May 2008 Session # 42: Dental Insurance What's New, What's Important Floyd Ray Martin, FSA, MAAA Thomas A. McInteer, FSA, MAAA Jonathan P. Polon, FSA Dental Insurance Fraud Detection

More information

Cluster Analysis: Basic Concepts and Algorithms

Cluster Analysis: Basic Concepts and Algorithms Cluster Analsis: Basic Concepts and Algorithms What does it mean clustering? Applications Tpes of clustering K-means Intuition Algorithm Choosing initial centroids Bisecting K-means Post-processing Strengths

More information

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant

More information

Minerals Technologies Inc. Summary of Policies on Business Conduct

Minerals Technologies Inc. Summary of Policies on Business Conduct Minerals Technologies Inc. Summary of Policies on Business Conduct Lawful and Ethical Behavior is Required at All Times This Summary of Policies on Business Conduct (this "Summary") provides an overview

More information

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.

More information

ECLT 5810 E-Commerce Data Mining Techniques - Introduction. Prof. Wai Lam

ECLT 5810 E-Commerce Data Mining Techniques - Introduction. Prof. Wai Lam ECLT 5810 E-Commerce Data Mining Techniques - Introduction Prof. Wai Lam Data Opportunities Business infrastructure have improved the ability to collect data Virtually every aspect of business is now open

More information

An Empirical Study of Application of Data Mining Techniques in Library System

An Empirical Study of Application of Data Mining Techniques in Library System An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani

More information

Fraud Detection & Data Analytics

Fraud Detection & Data Analytics September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics

More information

Using Data Mining and Machine Learning in Retail

Using Data Mining and Machine Learning in Retail Using Data Mining and Machine Learning in Retail Omeid Seide Senior Manager, Big Data Solutions Sears Holdings Bharat Prasad Big Data Solution Architect Sears Holdings Over a Century of Innovation A Fortune

More information

Commercial Mortgage Initial Data Capture Form. (Non regulated business only)

Commercial Mortgage Initial Data Capture Form. (Non regulated business only) Aldermore 1st Floor, Block B Western House Lynch Wood PETERBOROUGH PE2 6FZ t 01733 404500 f 0800 0664429 e info@aldermore.co.uk w aldermore.co.uk Commercial Mortgage Initial Data Capture Form. (Non regulated

More information

Advanced Analytics for Audit Case Selection

Advanced Analytics for Audit Case Selection Advanced Analytics for Audit Case Selection New York State Capitol Building Albany, New York Presented by: Tim Gardinier, Manager, Data Processing Services Audit Case Selection Putting a scientific approach

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

a. employees Company; or

a. employees Company; or Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged

More information

MBA 8473 - Data Mining & Knowledge Discovery

MBA 8473 - Data Mining & Knowledge Discovery MBA 8473 - Data Mining & Knowledge Discovery MBA 8473 1 Learning Objectives 55. Explain what is data mining? 56. Explain two basic types of applications of data mining. 55.1. Compare and contrast various

More information