Financial Fraud Detection and Prevention with Data Mining Techniques Professor Hui Xiong Rutgers Business School
|
|
- Cecily Gilbert
- 8 years ago
- Views:
Transcription
1 Financial Fraud Detection and Prevention with Data Mining Techniques Professor Hui Xiong Rutgers Business School
2 What is Financial Fraud General Violation of Good Behavior in regards to Financial Issues Accounting Manipulation Fraud or Manipulation in the Annual Financial Report Non Compliance with Internal Controls and Procedures Misappropriation of Assets Fraudulent Statement Corruption
3 Types of Financial Fraud External Threats Investment Fraud, Credit Card Fraud, Identity Theft Internal Threats Financial Theft, False Accounting, Fraudulent Trading, Money Laundering, Mortgage Fraud, Inside Trading, Market Manipulation Almost 75% of frauds were perpetrated internally
4 What is Data Mining
5 Why Data Mining for Financial Fraud Detection Large-scale financial data are being collected and warehoused Financial Transaction Data Financial Report Bank/Credit Card transactions Computers have become cheaper and more powerful Competitive Pressure is Strong Provide automatic, customized services for an edge, e.g. automatic trading machine.
6 Data Mining Process for Fraud Detection
7 Who commits fraud? How to estimate risk probability? Source : 2008 report to the Nation on Occupational Fraud and Abuse, Association of Certified Fraud Examiners
8 Identify and Evaluate Fraud Risk Factors Identify fraud risk factors at the entity level and business process level. Consider whether each fraud risk factor indicates the existence of an incentive or pressure, opportunity or attitude and rationalisation. Identify incentives / pressures to commit fraud, opportunities to commit fraud, or attitudes / rationalizations to justify fraud. Personnel from various levels of the organization should be involved in the process. Where could the fraud occur? What would the fraud look like? What type of fraud is the area susceptible to? What are the effects on the books and records? When could the fraud occur? Consider internal and external (e.g., regulatory, industry) influences.
9 Financial Reports Annual Report Financial Statements Chairman's report CEO's report Mission statement Auditor's report on corporate governance Statement of directors' responsibilities Invitation to the company's AGM Corporate governance statement of compliance US:10-K SEC: Security and Exchange Commission
10 Financial Statements Also Include: Auditor's report on the financial statements Notes to the financial statements Accounting policies
11 Data Collection Sample Firms Type Details Sources Target (484) Bankruptcy Companies Trading Suspension Companies UCLA bankruptcy research database (BRD) US SEC trading suspension Normal (902) Matched Pair Design with Target Companies similar size, industry, lifecycle Google finance, Yahoo finance, Major financial journals Time Period:
12 Data Collection Raw Data: 10 years financial statements for each firms 126 attributes for each instance Data Source: COMPUSTAT database from WRDS (Wharton Research Data Service) Identifier (4) Company Information (10) Account Information (111) Label(2) gvkey cusip state, comn stko, exchg ACT,CEQ EBIT,COGS Target (Y) tic cik date, fyr,fyear,currtr sic, naics DlCCH, CAPX, AOLOCH EMP Normal (N)
13 Enron Network
14 Business & Economic Networks Example: ebay bidding vertices: ebay users, links: represent bidder-seller or buyer-seller fraud detection: bidding rings Example: corporate boards vertices: corporations links: between companies that share a board member Example: corporate partnerships vertices: corporations links: represent formal joint ventures Example: goods exchange networks vertices: buyers and sellers of commodities links: represent permissible transactions
15 Data Mining Process for Fraud Detection
16 Detection - Fraud indicators Receipt of tip-offs High staff turnover Low morale amongst staff Lifestyle of employees not commensurate with salary Unusual, irrational or inconsistent behaviour Holiday not taken Key financial indicators starting to slip Does the business accounting make sense and do you understand it? Dominant line management
17 A typical perpetrator: Semantic Information Gender larger and higher volume of frauds committed by men Age typically middle aged Education as the level of education rises so do the losses caused Criminal history majority of perpetrators are first time offenders Time with the company the longer employed the bigger the loss
18 Feature Transformation: Case Study Missing Value Handle eliminate data objects or attributes estimate missing values methods: based on accounting knowledge ignore the missing value during analysis Feature Construction(Domain Knowledge) extract or creation valuable attributes from original data Feature Selection( Technique Knowledge) Pearson s Correlation Classifier-based feature ranking
19 Feature Construction Identifiers (4 attributes) Financial Ratios (32 attributes) Class Label (1 attribute) Z-Score: predict a company s probability of failure ROA: indicate whether to start a project EBIT: indicate company s profitability SOLVENCY RATIO: measure company s ability to meet its long-term obligations. >20% financially healthy ACID-TEST: whether enough short-time assets to cover liabilities. <1 viewed with caution
20 Dataset 3 year statement (4620 instances 37 attributes)
21 Data Mining Process for Fraud Detection
22 Report Mining A Low-cost and High-impact Alternative USERS OF INFORMATION Hardcopy Reports Report Mining Data Mining Real-time Data Mining Report Files Data Warehouse Report Generators Report Generators OPERATIONAL DATA
23 Report Mining for Fraud Detection Test 1 Test 2 Test 3 Test 4 Test 5 Match payments against authorized suppliers list Match suppliers against employee surnames Match vendor bank account numbers to employee bank account numbers Match delivery addresses to employee addresses Identify large variances from prior years
24 Data Mining Profiling The matching or «cross-checking data»! Find your «missing traders» Know where they are buying from Indicators about fraud (activity, places, ) Evaluate the fraud The profiling (data mining) Identify quickly : Buffers, profit takers, crossed invoicers and conduit companies to put on monitoring
25 Data Mining: Confluence of Multiple Disciplines? 20x20 ~ 2^400 10^120 patterns
26 10 Data Mining Tasks Data Tid Refund Marital Status Taxable Income Cheat 1 Yes Single 125K No 2 No Married 100K No 3 No Single 70K No 4 Yes Married 120K No 5 No Divorced 95K Yes 6 No Married 60K No 7 Yes Divorced 220K No 8 No Single 85K Yes 9 No Married 75K No 10 No Single 90K Yes 11 No Married 60K No 12 Yes Divorced 220K No 13 No Single 85K Yes 14 No Married 75K No 15 No Single 90K Yes Milk
27 10 Predictive Modeling: Classification Find a model for class attribute as a function of the values of other attributes Tid Employed Level of Education # years at present address Class Credit Worthy 1 Yes Graduate 5 Yes 2 Yes High School 2 No 3 No Undergrad 1 No 4 Yes High School 10 Yes Model for predicting credit worthiness No No Employed Yes Education Graduate { High school, Undergrad } Number of years > 3 yr < 3 yr Number of years > 7 yrs < 7 yrs Yes No Yes No
28 10 10 Classification Example Tid Employed Level of Education # years at present address Credit Worthy 1 Yes Graduate 5 Yes 2 Yes High School 2 No 3 No Undergrad 1 No 4 Yes High School 10 Yes Tid Employed Level of Education # years at present address Credit Worthy 1 Yes Undergrad 7? 2 No Graduate 3? 3 Yes High School 2? Test Set Training Set Learn Classifier Model
29 Classification: Financial Application Credit Fraud Detection Goal: Predict fraudulent cases in credit card transactions. Approach: Use credit card transactions and the information on its account-holder as attributes. When does a customer buy, what does he buy, how often he pays on time, etc Label past transactions as fraud or fair transactions. This forms the class attribute. Learn a model for the class of the transactions. Use this model to detect fraud by observing credit card transactions on an account.
30 Financial Statement Analysis Top Rules Derived by Ripper ROA <= LTA >= QACL<= COSAL<= ROA <= SOLVENCY RATIO<= ROS <= ROE >= LOGDEBT >= SOLVENCY RATIO <= z-score <= EBIT <= z-score <= GM11 = 1 Label=Y
31 Clustering Finding groups of objects such that the objects in a group will be similar (or related) to one another and different from (or unrelated to) the objects in other groups Intra-cluster distances are minimized Inter-cluster distances are maximized
32 Applications of Cluster Analysis Understanding Group related documents for browsing Group genes and proteins that have similar functionality Group stocks with similar price fluctuations Discovered Clusters Applied-Matl-DOWN,Bay-Network-Down,3-COM-DOWN, Cabletron-Sys-DOWN,CISCO-DOWN,HP-DOWN, DSC-Comm-DOWN,INTEL-DOWN,LSI-Logic-DOWN, Micron-Tech-DOWN,Texas-Inst-Down,Tellabs-Inc-Down, Natl-Semiconduct-DOWN,Oracl-DOWN,SGI-DOWN, Sun-DOWN Apple-Comp-DOWN,Autodesk-DOWN,DEC-DOWN, ADV-Micro-Device-DOWN,Andrew-Corp-DOWN, Computer-Assoc-DOWN,Circuit-City-DOWN, Compaq-DOWN, EMC-Corp-DOWN, Gen-Inst-DOWN, Motorola-DOWN,Microsoft-DOWN,Scientific-Atl-DOWN Fannie-Mae-DOWN,Fed-Home-Loan-DOWN, MBNA-Corp-DOWN,Morgan-Stanley-DOWN Baker-Hughes-UP,Dresser-Inds-UP,Halliburton-HLD-UP, Louisiana-Land-UP,Phillips-Petro-UP,Unocal-UP, Schlumberger-UP Industry Group Technology1-DOWN Technology2-DOWN Financial-DOWN Oil-UP Summarization Reduce the size of large data sets
33 Bankruptcy Company Bankruptcy Bank in 2009
34 Unemployment
35 Foreclosures
36 Bankruptcy Company Bankruptcy Bank Not in 2009
37 Association Analysis Given a set of records each of which contain some number of items from a given collection Produce dependency rules which will predict occurrence of an item based on occurrences of other items. TID Items 1 Bread, Coke, Milk 2 Beer, Bread 3 Beer, Coke, Diaper, Milk 4 Beer, Bread, Diaper, Milk 5 Coke, Diaper, Milk Rules Discovered: {Milk} --> {Coke} {Diaper, Milk} --> {Beer}
38 Association Analysis: Applications Market-basket analysis Rules are used for sales promotion, shelf management, and inventory management Telecommunication alarm diagnosis Rules are used to find combination of alarms that occur together frequently in the same time period Financial Fraud Indicators Rules are used to find combination of events and observations associated with certain financial fraud
39 Deviation/Anomaly Detection Detect significant deviations from normal behavior Applications: Credit Card Fraud Detection Network Intrusion Detection
40 Anomaly Detection Challenges How many outliers are there in the data? Method is unsupervised Validation can be quite challenging (just like for clustering) Finding needle in a haystack Working assumption: There are considerably more normal observations than abnormal observations (outliers/anomalies) in the data
41 Enron Case James Chanos, the President of Kynikos Associates specializing in short selling, managing over 1 billion Kynikos Assocates manages a portfolio of overvalued securities Three Indicators Materially overstated earnings An unsustainable or operationally flawed business plan And/or engaged in outright fraud
42 Enron Case Early alert: 1999 Form 10-K, Form 10-Qs in 2000 Enron s return on capital, 7 percent before tax 7 percent is low for this type of firm (outlier) Enron s cost of capital should be close to 9% (not earning any money) Company s initiative in the telecom field not a sustainable plan Shorting Enron in Nov. of 2000 (~ $80 per share) In the spring of 2001, a number of senior executives were departing from the company, the insider selling of Enron stock continued unabated.
43 Data Mining for Financial Fraud Detection: Challenges Scalability Dimensionality Complex and Heterogeneous Data Data Quality Data Ownership and Distribution Privacy Preservation Streaming Data Data from Multi-Sources
44 Privacy and Security Issues Privacy Preserving Data Mining The main difficulty in finding a solution to the problem of privacy is the contradicting requirement of hiding sensitive data while still providing useful information content. Transaction Hiding Hiding the origin, location, movement or actual rights on a financial operation or a property transaction
45 Distributed Data Mining Multi-source Joint Learning Detecting Cross-account collaborative fraud
46 Graph Mining: Challenging Problems In- and Out- degree distributions Fraud Risk Propagation in Corporation Networks Cross-Account Collaborative Fraud Detection
47 Example: Fraud Detection In forecasting markets with prizes for the best traders as incentive, two types of fraud (behavior not consistent with market regulations) can be expected: Money transfer (ring of traders, multiple accounts) Price manipulations (in or outgoing stars, potentially with losses) (Examples by courtesy of Jan Schröder, FSM (Forecasting Strategy Markets))
48 Blackhole Patterns Detect cross-account collaborative fraud
49 Money Transfer The 2006 State Parliament Elections in Baden-Württemberg in Germany Market opening :23:44 Market close :00:00 Number of traders (at least one sell or buy transaction) 306 traders Number of traders (at least one sell transaction) 190 traders Number of traders (at least one buy transaction) 291 traders Number of transactions transactions Number of shares 7 shares Average volume per trade shares Average moneyflow per trade 2,462.1 MU Moneyflow in total 26,556,378 MU Shareflow in total 2,314,197 shares
50 And the Winners are First 8 highest ranks in the highscore for the market for the 2006 state parliament elections in Baden-Württemberg in Germany 1 elfriede herrrtie gruener MarcEichler potato joe Maio\_Shan Ritvars henning
51 Are they honest No, elfriede (#1) used 4 accounts
52 And henning (#8) used two!
53 Similarities Between Data Miners and Doctors Data Characteristics Data Mining Techniques Medical Devices
54 Literature Markus Franke, Andreas Geyer-Schulz and Bettina Hoser. Analyszing trading behaviour in transaction data of electronic election markets. Data Analysis and Decision Support. P , Springer studies in classification, data analysis and knowledge organization Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Introduction to Data Mining, Addison-Wesley, ISBN: Junjie Wu, Hui Xiong, Wu Peng, Jian Chen, Local Decomposition for Rare Class Analysis, the 13th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining (KDD 2007), pp , 2007.
55 Thank You!
56 Personal Knowledge Value Technical Knowledge Domain Knowledge Personal Knowledge Value
57 Life: A Data Mining Process Personal Knowledge Set Family Knowledge Set Decision Power The Knowledge Set of Other people you know
Data Mining: Introduction. Lecture Notes for Chapter 1. Slides by Tan, Steinbach, Kumar adapted by Michael Hahsler
Data Mining: Introduction Lecture Notes for Chapter 1 Slides by Tan, Steinbach, Kumar adapted by Michael Hahsler Why Mine Data? Commercial Viewpoint Lots of data is being collected and warehoused - Web
More informationIntroduction of Information Visualization and Visual Analytics. Chapter 4. Data Mining
Introduction of Information Visualization and Visual Analytics Chapter 4 Data Mining Books! P. N. Tan, M. Steinbach, V. Kumar: Introduction to Data Mining. First Edition, ISBN-13: 978-0321321367, 2005.
More informationQuick Introduction of Data Mining Techniques
Quick Introduction of Data Mining Techniques *Sources partially from Introduction to Data Mining, by P.-N. Tan, M. Steinbach, V. Kumar, Addison-Wesley, 2005. Main Data Mining Techniques Link Analysis Associations
More informationData Mining. Yeow Wei Choong Anne Laurent
Data Mining Yeow Wei Choong Anne Laurent Why Mine Data? Commercial Viewpoint Lots of data is being collected and warehoused Web data, e-commerce purchases at department/ grocery stores Bank/Credit Card
More informationIntroduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
More informationBusiness Intelligence and Data Mining
Business Intelligence and Data Mining Dr. Hui Xiong Rutgers University Learning Objectives Understand the need for business intelligence systems. Know the characteristics of reporting systems. Know the
More informationMining Big Data. Pang-Ning Tan. Associate Professor Dept of Computer Science & Engineering Michigan State University
Mining Big Data Pang-Ning Tan Associate Professor Dept of Computer Science & Engineering Michigan State University Website: http://www.cse.msu.edu/~ptan Google Trends Big Data Smart Cities Big Data and
More informationData Mining: Introduction
Data Mining: Introduction Introducing the course How the course is organized How students are evaluated Deadlines Data Mining [Chapt. 1 of course book] What is it about? The KDD process Relations to other
More informationCSE4334/5334 Data Mining Lecturer 2: Introduction to Data Mining. Chengkai Li University of Texas at Arlington Spring 2016
CSE4334/5334 Data Mining Lecturer 2: Introduction to Data Mining Chengkai Li University of Texas at Arlington Spring 2016 Big Data http://dilbert.com/strip/2012-07-29 Big Data http://www.ibmbigdatahub.com/infographic/four-vs-big-data
More informationData Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will
More informationDATA MINING - 1DL105, 1Dl111
1 DATA MINING - 1DL105, 1Dl111 Fall 2006 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht06 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
More informationIntroduction to Artificial Intelligence G51IAI. An Introduction to Data Mining
Introduction to Artificial Intelligence G51IAI An Introduction to Data Mining Learning Objectives Introduce a range of data mining techniques used in AI systems including : Neural networks Decision trees
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationFoundations of Artificial Intelligence. Introduction to Data Mining
Foundations of Artificial Intelligence Introduction to Data Mining Objectives Data Mining Introduce a range of data mining techniques used in AI systems including : Neural networks Decision trees Present
More informationData Mining System, Functionalities and Applications: A Radical Review
Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially
More informationThe Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
More informationUsing Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationWhat is Data Mining? Data Mining (Knowledge discovery in database) Data mining: Basic steps. Mining tasks. Classification: YES, NO
What is Data Mining? Data Mining (Knowledge discovery in database) Data Mining: "The non trivial extraction of implicit, previously unknown, and potentially useful information from data" William J Frawley,
More informationnot possible or was possible at a high cost for collecting the data.
Data Mining and Knowledge Discovery Generating knowledge from data Knowledge Discovery Data Mining White Paper Organizations collect a vast amount of data in the process of carrying out their day-to-day
More informationMarta Zorrilla Universidad de Cantabria
Tipos de problemas Marta Zorrilla Universidad de Cantabria Slides from Tan, P., Steinbach, M., Kumar, V. Introduction to data mining. Pearson Prentice Hall. 2006 Data Mining Tasks Prediction Methods Use
More informationInsider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University weberle@tntech.edu Lawrence
More informationData Mining Introduction
Data Mining Introduction Organization Lectures Mondays and Thursdays from 10:30 to 12:30 Lecturer: Mouna Kacimi Office hours: appointment by email Labs Thursdays from 14:00 to 16:00 Teaching Assistant:
More informationFraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
More informationData Warehousing and Data Mining for improvement of Customs Administration in India. Lessons learnt overseas for implementation in India
Data Warehousing and Data Mining for improvement of Customs Administration in India Lessons learnt overseas for implementation in India Participants Shailesh Kumar (Group Leader) Sameer Chitkara (Asst.
More information2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: simmibagga12@gmail.com) Dr. G.N. Singh Department of Physics and
More informationBusiness Process Mining for Internal Fraud Risk Reduction: Results of a Case Study
Business Process Mining for Internal Fraud Risk Reduction: Results of a Case Study Mieke Jans, Nadine Lybaert, and Koen Vanhoof Hasselt University, Agoralaan Building D, 3590 Diepenbeek, Belgium http://www.uhasselt.be/
More information1. Introduction to Data Mining
1. Introduction to Data Mining Road Map What is data mining Steps in data mining process Data mining methods and subdomains Summary 2 Definition ([Liu 11]) Data mining is also called Knowledge Discovery
More informationSearch and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov
Search and Data Mining: Techniques Applications Anya Yarygina Boris Novikov Introduction Data mining applications Data mining system products and research prototypes Additional themes on data mining Social
More informationBig Data Analytics in Mobile Environments
1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,
More informationDan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
More informationExample application (1) Telecommunication. Lecture 1: Data Mining Overview and Process. Example application (2) Health
Lecture 1: Data Mining Overview and Process What is data mining? Example applications Definitions Multi disciplinary Techniques Major challenges The data mining process History of data mining Data mining
More informationPresented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
More informationIntroduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
More informationOUTLIER ANALYSIS. Data Mining 1
OUTLIER ANALYSIS Data Mining 1 What Are Outliers? Outlier: A data object that deviates significantly from the normal objects as if it were generated by a different mechanism Ex.: Unusual credit card purchase,
More informationDATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate
More informationData Mining on Social Networks. Dionysios Sotiropoulos Ph.D.
Data Mining on Social Networks Dionysios Sotiropoulos Ph.D. 1 Contents What are Social Media? Mathematical Representation of Social Networks Fundamental Data Mining Concepts Data Mining Tasks on Digital
More informationData Warehousing and Data Mining
Data Warehousing and Data Mining Winter Semester 2010/2011 Free University of Bozen, Bolzano DW Lecturer: Johann Gamper gamper@inf.unibz.it DM Lecturer: Mouna Kacimi mouna.kacimi@unibz.it http://www.inf.unibz.it/dis/teaching/dwdm/index.html
More informationINTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
More informationEthics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
More informationInternational Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
More informationUSING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES
USING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES Irron Williams Northwestern University IrronWilliams2015@u.northwestern.edu Abstract--Data science is evolving. In
More informationFraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
More informationLecture 6 - Data Mining Processes
Lecture 6 - Data Mining Processes Dr. Songsri Tangsripairoj Dr.Benjarath Pupacdi Faculty of ICT, Mahidol University 1 Cross-Industry Standard Process for Data Mining (CRISP-DM) Example Application: Telephone
More informationData Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
More informationSentiment analysis on tweets in a financial domain
Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International
More information716 West Ave Austin, TX 78701-2727 USA
How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationChapter 1 The Scope of Corporate Finance
Chapter 1 The Scope of Corporate Finance MULTIPLE CHOICE 1. One of the tasks for financial managers when identifying projects that increase firm value is to identify those projects where a. marginal benefits
More informationAnomaly and Fraud Detection with Oracle Data Mining 11g Release 2
Oracle 11g DB Data Warehousing ETL OLAP Statistics Anomaly and Fraud Detection with Oracle Data Mining 11g Release 2 Data Mining Charlie Berger Sr. Director Product Management, Data
More informationUnsupervised Outlier Detection in Time Series Data
Unsupervised Outlier Detection in Time Series Data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College of Information
More informationINTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
More informationRole of Social Networking in Marketing using Data Mining
Role of Social Networking in Marketing using Data Mining Mrs. Saroj Junghare Astt. Professor, Department of Computer Science and Application St. Aloysius College, Jabalpur, Madhya Pradesh, India Abstract:
More informationK-Means Cluster Analysis. Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1
K-Means Cluster Analsis Chapter 3 PPDM Class Tan,Steinbach, Kumar Introduction to Data Mining 4/18/4 1 What is Cluster Analsis? Finding groups of objects such that the objects in a group will be similar
More informationExample: Document Clustering. Clustering: Definition. Notion of a Cluster can be Ambiguous. Types of Clusterings. Hierarchical Clustering
Overview Prognostic Models and Data Mining in Medicine, part I Cluster Analsis What is Cluster Analsis? K-Means Clustering Hierarchical Clustering Cluster Validit Eample: Microarra data analsis 6 Summar
More informationA STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala
A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have
More informationHYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
More informationGLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
More informationHOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement
More informationData Mining in Telecommunication
Data Mining in Telecommunication Mohsin Nadaf & Vidya Kadam Department of IT, Trinity College of Engineering & Research, Pune, India E-mail : mohsinanadaf@gmail.com Abstract Telecommunication is one of
More informationModule # 2 Management/Key Employee Assessment
Module # 2 Management/Key Employee Assessment The management/key employee assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Internal
More informationFraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be
Fraud Checklist Client Name Disclosing entity Prepared by Reviewed by Partner review Balance Date Close Monitoring Date Date Date How to use this checklist An initial assessment of the risk that irregularities
More informationData Warehousing and Data Mining
Data Warehousing and Data Mining Winter Semester 2012/2013 Free University of Bozen, Bolzano DM Lecturer: Mouna Kacimi mouna.kacimi@unibz.it http://www.inf.unibz.it/dis/teaching/dwdm/index.html Organization
More information(b) How data mining is different from knowledge discovery in databases (KDD)? Explain.
Q2. (a) List and describe the five primitives for specifying a data mining task. Data Mining Task Primitives (b) How data mining is different from knowledge discovery in databases (KDD)? Explain. IETE
More informationKnowledge Discovery from Data Bases Proposal for a MAP-I UC
Knowledge Discovery from Data Bases Proposal for a MAP-I UC P. Brazdil 1, João Gama 1, P. Azevedo 2 1 Universidade do Porto; 2 Universidade do Minho; 1 Knowledge Discovery from Data Bases We are deluged
More informationIntroduction to Data Mining
Bioinformatics Ying Liu, Ph.D. Laboratory for Bioinformatics University of Texas at Dallas Spring 2008 Introduction to Data Mining 1 Motivation: Why data mining? What is data mining? Data Mining: On what
More informationAnomaly Detection Using Unsupervised Profiling Method in Time Series Data
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data Zakia Ferdousi 1 and Akira Maeda 2 1 Graduate School of Science and Engineering, Ritsumeikan University, 1-1-1, Noji-Higashi, Kusatsu,
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationHow to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning
How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume
More informationDo broker/analyst conflicts matter? Detecting evidence from internet trading platforms
1 Introduction Do broker/analyst conflicts matter? Detecting evidence from internet trading platforms Jan Hanousek 1, František Kopřiva 2 Abstract. We analyze the potential conflict of interest between
More informationIII JORNADAS DE DATA MINING
III JORNADAS DE DATA MINING EN EL MARCO DE LA MAESTRÍA EN DATA MINING DE LA UNIVERSIDAD AUSTRAL PRESENTACIÓN TECNOLÓGICA IBM Alan Schcolnik, Cognos Technical Sales Team Leader, IBM Software Group. IAE
More informationCentre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
More informationLearning from Big Data in
Learning from Big Data in Astronomy an overview Kirk Borne George Mason University School of Physics, Astronomy, & Computational Sciences http://spacs.gmu.edu/ From traditional astronomy 2 to Big Data
More informationIs There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
More informationIGCSE Business Studies revision notes Finance Neil.elrick@tes.tp.edu.tw
IGCSE FINANCE REVISION NOTES Table of contents Table of contents... 2 SOURCES OF FINANCE... 3 CASH FLOW... 5 HOW TO CALCULATE THE CASH BALANCE... 5 HOW TO WORK OUT THE CASH AVAILABLE TO THE BUSINESS...
More informationETHICS, FRAUD, AND INTERNAL CONTROL
CHAPTER ETHICS, FRAUD, AND INTERNAL CONTROL The three topics of this chapter are closely related. Ethics is a hallmark of the accounting profession. The principles which guide a manager s decision making
More informationIntroduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing
Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition
More informationFINA351, Managerial Finance - Chapter 16 Notes WORKING CAPITAL. Involves current assets and liabilities in the operating cycle
FINA351, Managerial Finance - Chapter 16 Notes WORKING CAPITAL Involves current assets and liabilities in the operating cycle Is important for every business major to understand because: (1) it is where
More informationWhy is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
More informationRevised 05/22/14 P a g e 1
Corporate Office 107 W. Franklin Street P.O. Box 638 Elkhart, IN 46515-0638 Phone (574) 294-7511 Fax (574) 522-5213 INTRODUCTION PATRICK INDUSTRIES, INC. CODE OF ETHICS AND BUSINESS CONDUCT As a leader
More informationInvoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71
Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns
More informationGEOGRAPHIC COVERAGE: DATE REVISED: May 2015 1. GENERAL
FORM / POLICY TITLE: GEOGRAPHIC COVERAGE: DOCUMENT OWNER: Insider Trading Policy Global SVP & General Counsel DATE REVISED: May 2015 1. GENERAL Generally there are laws in each jurisdiction in which Gartner
More informationDATA MINING CONCEPTS AND TECHNIQUES. Marek Maurizio E-commerce, winter 2011
DATA MINING CONCEPTS AND TECHNIQUES Marek Maurizio E-commerce, winter 2011 INTRODUCTION Overview of data mining Emphasis is placed on basic data mining concepts Techniques for uncovering interesting data
More informationNetwork mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon
Network mining for crime/fraud detection FuturICT CrimEx January 26th, 2012 Jan Ramon Overview Administrative data and crime/fraud Data mining and related domains Data mining in large networks Opportunities
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationHealth Spring Meeting May 2008 Session # 42: Dental Insurance What's New, What's Important
Health Spring Meeting May 2008 Session # 42: Dental Insurance What's New, What's Important Floyd Ray Martin, FSA, MAAA Thomas A. McInteer, FSA, MAAA Jonathan P. Polon, FSA Dental Insurance Fraud Detection
More informationCluster Analysis: Basic Concepts and Algorithms
Cluster Analsis: Basic Concepts and Algorithms What does it mean clustering? Applications Tpes of clustering K-means Intuition Algorithm Choosing initial centroids Bisecting K-means Post-processing Strengths
More informationA STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
More informationMinerals Technologies Inc. Summary of Policies on Business Conduct
Minerals Technologies Inc. Summary of Policies on Business Conduct Lawful and Ethical Behavior is Required at All Times This Summary of Policies on Business Conduct (this "Summary") provides an overview
More informationPREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
More informationECLT 5810 E-Commerce Data Mining Techniques - Introduction. Prof. Wai Lam
ECLT 5810 E-Commerce Data Mining Techniques - Introduction Prof. Wai Lam Data Opportunities Business infrastructure have improved the ability to collect data Virtually every aspect of business is now open
More informationAn Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
More informationFraud Detection & Data Analytics
September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics
More informationUsing Data Mining and Machine Learning in Retail
Using Data Mining and Machine Learning in Retail Omeid Seide Senior Manager, Big Data Solutions Sears Holdings Bharat Prasad Big Data Solution Architect Sears Holdings Over a Century of Innovation A Fortune
More informationCommercial Mortgage Initial Data Capture Form. (Non regulated business only)
Aldermore 1st Floor, Block B Western House Lynch Wood PETERBOROUGH PE2 6FZ t 01733 404500 f 0800 0664429 e info@aldermore.co.uk w aldermore.co.uk Commercial Mortgage Initial Data Capture Form. (Non regulated
More informationAdvanced Analytics for Audit Case Selection
Advanced Analytics for Audit Case Selection New York State Capitol Building Albany, New York Presented by: Tim Gardinier, Manager, Data Processing Services Audit Case Selection Putting a scientific approach
More informationA Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
More informationa. employees Company; or
Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged
More informationMBA 8473 - Data Mining & Knowledge Discovery
MBA 8473 - Data Mining & Knowledge Discovery MBA 8473 1 Learning Objectives 55. Explain what is data mining? 56. Explain two basic types of applications of data mining. 55.1. Compare and contrast various
More information