1 Oracle 11g DB <Insert Picture Here> Data Warehousing ETL OLAP Statistics Anomaly and Fraud Detection with Oracle Data Mining Data Mining Charlie Berger Sr. Director Product Management, Data Mining Technologies Oracle Corporation
2 20 Ways to Detect Fraud 1. Unusual Behavior The perpetrator will often display unusual behavior, that when taken as a whole is a strong indicator of fraud. The fraudster may not ever take a vacation or call in sick in fear of being caught. He or she may not assign out work even when overloaded. Other symptoms may be changes in behavior such as increased drinking, smoking, defensiveness, and unusual irritability and suspiciousness. 2. Complaints Frequently tips or complaints will be received which indicate that a fraudulent action is going on. Complaints have been known to be some of the best sources of fraud and should be taken seriously. Although all too often, the motives of the complainant may be suspect, the allegations usually have merit that warrant further investigation. 3. Stale Items in Reconciliations In bank reconciliations, deposits or checks not included in the reconciliation could be indicative of theft. Missing deposits could mean the perpetrator absconded with the funds; missing checks could indicate one made out to a bogus payee. 4. Excessive Voids Voided sales slips could mean that the sale was rung up, the payment diverted to the use of the perpetrator, and the sales slip subsequently voided to cover the theft. 5. Missing Documents Documents which are unable to be located can be a red flag for fraud. Although it is expected that some documents will be misplaced, the auditor should look for explanations as to why the documents are missing, and what steps were taken to locate the requested items. All too often, the auditors will select an alternate item or allow the auditee to select an alternate without determining whether or not a problem exists. 6. Excessive Credit Memos Similar to excessive voids, this technique can be used to cover the theft of cash. A credit memo to a phony customer is written out, and the cash is taken to make total cash balance.
3 20 Ways to Detect Fraud 7. Common Names and Addresses for Refunds Sales employees frequently make bogus refunds to customers for merchandise. The address shown for the refund is then made to the employee's address, or to the address of a friend or co-worker. 8. Increasing Reconciling Items Stolen deposits, or bogus checks written, are frequently not removed, or covered, from the reconciliation. Hence, over a period of time, the reconciling items tend to increase. 9. General Ledger Out-of-Balance When funds, merchandise, or assets are stolen and not covered by a fictitious entry, the general ledger will be out of balance. An inventory of the merchandise or cash is needed to confirm the existence of the missing assets. 10. Adjustments to Receivables or Payables In cases where customer payments are misappropriated, adjustments to receivables can be made to cover the shortage. Where payables are adjusted, the perpetrator can use a phony billing scheme to convert cash to his or her own use. 11. Excess Purchases Excess purchases can be used to cover fraud in two ways: Fictitious payees are used to convert funds Excessive purchases may indicate a possible payoff of purchasing agent 12. Duplicate Payments Duplicate payments are sometimes converted to the use of an employee. The employee may notice the duplicate payment, then he or she may prepare a phony endorsement of the check. 13. Ghost Employees Ghost employee schemes are frequently uncovered when an auditor, fraud examiner, or other individual distributes paychecks to employees. Missing or otherwise unaccounted for employees could indicate the existence of a ghost employee scheme.
4 20 Ways to Detect Fraud 14. Employee Expense Accounts Employees frequently conceal fraud in their individual expense account reimbursements. These reimbursements should be scrutinized for reasonableness and trends, especially in the area of cash transactions on the expense account. 15. Inventory Shortages Normal shrinkage over a period of time can be computed through historical analysis. Excessive shrinkage could explain a host of fraudulent activity, from embezzlement to theft of inventory. 16. Increased Scrap In the manufacturing process, an increased amount of scrap could indicate a scheme to steal and resell this material. Scrap is a favorite target of embezzlers because it is usually subject to less scrutiny than regular inventory. 17. Large Payments to Individuals Excessively large payments to individuals may indicate instances of fraudulent disbursements. 18. Employee Overtime Employees being paid for overtime hours not worked by altering time sheets before or after management approval. 19. Write-off of Accounts Receivable Comparing the write-off of receivables by customers may lead to information indicating that the employee has absconded with customer payments. 20. Post Office Boxes as Shipping Addresses In instances where merchandise is shipped to a post office box, this may indicate that an employee is shipping to a bogus purchaser.
5 Oracle Data Mining Option
6 What is Data Mining? Automatically sifts through data to find hidden patterns, discover new insights, and make predictions Data Mining can provide valuable results: Predict customer behavior (Classification) Predict or estimate a value (Regression) Segment a population (Clustering) Identify factors more associated with a business problem (Attribute Importance) Find profiles of targeted people or items (Decision Trees) Determine important relationships and market baskets within the population (Associations) Find fraudulent or rare events (Anomaly Detection)
7 Data Mining Provides Better Information, Valuable Insights and Predictions Cell Phone Churners vs. Loyal Customers Income Segment #3: IF CUST_MO > 7 AND INCOME < $175K, THEN Prediction = Cell Phone Churner, Confidence = 83%, Support = 6/39 Insight & Prediction Segment #1: IF CUST_MO > 14 AND INCOME < $90K, THEN Prediction = Cell Phone Churner, Confidence = 100%, Support = 8/39 Customer Months Source: Inspired from Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management by Michael J. A. Berry, Gordon S. Linoff
8 Data Mining Provides Better Information, Valuable Insights and Predictions Cell Phone Fraud vs. Loyal Customers Income Customer Months Source: Inspired from Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management by Michael J. A. Berry, Gordon S. Linoff
9 Finding Needles in Haystacks Haystacks are usually BIG Needles are typically small and rare
10 Look for What is Different
11 Challenge: Finding Anomalous Records Considering one attribute at a time, each record, may look normal X 1 X 1 X 2 X 3 X 4
12 Challenge: Finding Anomalous Records Considering multiple attributes, taken collectively, a record may appear anomalous X 1 X 2 X 1 X 2 X 3 X 3 X 4 X 4
13 Oracle Data Mining Overview (Classification) Cases Input Attributes Name Income Age Jones 30, Smith 55, Lee 25, Rogers 50, Campos40,500 Horn 37,000 Habers 57,200 Berger 95,600 Historic Data New Data Target Fraud? 1 =Yes, 0 =No ???? Model Functional Relationship: Y = F(X 1, X 2,, X m ) Prediction Confidence Fraud typically requires a lot more data to find examples of rare events
14 Traditional Analytics (SAS) Environment Source Data (Oracle, DB2, SQL Server, TeraData, Ext. Tables, etc.) SAS Work Area (SAS Datasets) SAS Processing (Statistical functions/ Data mining) Process Output (SAS Work Area) Target (e.g. Oracle) SAS environment requires: Data movement Data duplication Loss of security
15 Oracle Architecture Source Data (Oracle, DB2, SQL Server, TeraData, Ext. Tables, etc.) Oracle environment: Eliminates data movement Eliminates data duplication Preserves security
16 In-Database Data Mining Traditional Analytics Data Import Data Mining Model Scoring Data Preparation and Transformation Data Mining Model Building Data Prep & Transformation Data Extraction Hours, Days or Weeks Source Data SAS Work Area SAS Proces sing Proces s Output Target Oracle Data Mining Savings Model Scoring Embedded Data Prep Model Building Data Preparation Secs, Mins or Hours Results Faster time for Data to Insights Lower TCO Eliminates Data Movement Data Duplication Maintains Security Model Scoring Data remains in the Database Embedded data preparation Cutting edge machine learning algorithms inside the SQL kernel of Database SQL Most powerful language for data preparation and transformation Data remains in the Database
17 Oracle Data Mining Algorithm Summary 11g Problem Algorithm Applicability Classification Logistic Regression (GLM) Decision Trees Naïve Bayes Embedded app Support Vector Machine Regression Anomaly Detection Attribute Importance Association Rules Clustering Feature Extraction A1 A2 A3 A4 A5 A6 A7 F1 F2 F3 F4 Multiple Regression (GLM) Support Vector Machine One Class SVM Minimum Description Length (MDL) Apriori Hierarchical K-Means Hierarchical O-Cluster NMF Classical statistical technique Popular / Rules / transparency Wide / narrow data / text Classical statistical technique Wide / narrow data / text Lack examples Attribute reduction Identify useful data Reduce data noise Market basket analysis Link analysis Product grouping Text mining Gene and protein analysis Text analysis Feature reduction
19 Oracle Data Mining and Unstructured Data Oracle Data Mining mines unstructured i.e. text data Include free text and comments in ODM models Cluster and Classify documents Oracle Text used to preprocess unstructured text
20 Fraud Prediction drop table CLAIMS_SET; exec dbms_data_mining.drop_model('claimsmodel'); create table CLAIMS_SET (setting_name varchar2(30), setting_value varchar2(4000)); insert into CLAIMS_SET values ('ALGO_NAME','ALGO_SUPPORT_VECTOR_MACHINES'); insert into CLAIMS_SET values ('PREP_AUTO','ON'); commit; POLICYNUMBER PERCENT_FRAUD RNK begin dbms_data_mining.create_model('claimsmodel', 'CLASSIFICATION', 'CLAIMS', 'POLICYNUMBER', null, 'CLAIMS_SET'); end; / -- Top 5 most suspicious fraud policy holder claims select * from (select POLICYNUMBER, round(prob_fraud*100,2) percent_fraud, rank() over (order by prob_fraud desc) rnk from (select POLICYNUMBER, prediction_probability(claimsmodel, '0' using *) prob_fraud from CLAIMS where PASTNUMBEROFCLAIMS in ('2 to 4', 'more than 4'))) where rnk <= 5 order by percent_fraud desc;
21 My Personal Experience Total purchases exceeds time period average Purchases were made in pairs of $75.00 purchases May 22 1:14 PM FOOD Monaco Café $ May 22 7:32 PM WINE Wine Bistro $28.00 Gas Station? June 14 2:05 PM MISC Mobil Mart $75.00 June 14 2:06 PM MISC Mobil Mart $75.00 June 15 11:48 AM MISC Mobil Mart $75.00 June 15 11:49 AM MISC Mobil Mart $75.00 May 22 7:32 WINE Wine Bistro $28.00 May 22 7:32 WINE Wine Bistro $28.00 June 16 11:48 AM MISC Mobil Mart $75.00 June 16 11:49 AM MISC Mobil Mart $75.00 France Pairs of $75? All same $75 amount?
22 Brief Demonstration 1. Oracle Data Mining
23 Quick Demo: Oracle Data Mining Scenario: Auto Insurance Company Business problem(s): 1. Better understand the business by looking at graphs 2. Target Fraud a. Build a predictive model to discover normal records b. Apply the model to flag most non-normal records c. View results in an OBI EE Dashboard (Entire process can be automated w/ PL/SQL and/or Java APIs)
24 Insurance Claims Fraud
25 Insurance Claims Fraud
26 Insurance Claims Fraud
27 Insurance Claims Fraud
28 Insurance Claims Fraud Oracle Data Mining creates a prioritized list of transactions that are possibly fraudulent
29 Integration with Oracle BI EE Oracle BI EE defines results for end user presentation Oracle Data Mining results available to Oracle BI EE administrators
30 Example Better Information for OBI EE Reports and Dashboards ODM s Predictions predictions & probabilities available are available in in Database the Database for Oracle for reporting BI EE and using other Oracle reporting BI EE and tools other tools
31 Integration with Oracle BI EE ODM provides likelihood of expense reporting fraud.and other important questions.
32 More Information: Oracle Data Mining 11g oracle.com/technology/products/bi/odm/index.html <Insert Picture Here> Oracle Statistical Functions Oracle Business Intelligence Solutions oracle.com/bi oracle data mining Contact Information:
33 Q U E S T I O N S A N S W E R S
34 This presentation is for informational purposes only and may not be incorporated into a contract or agreement.
Fraud and Anomaly Detection Using Oracle Advanced Analytic Option 12c Charlie Berger Sr. Director Product Management, Data Mining and Advanced Analytics firstname.lastname@example.org www.twitter.com/charliedatamine
1 Copyright 2011, Oracle and/or its affiliates. FPO In-Database Analytics: Predictive Analytics, Data Mining, Exadata & Business Intelligence Charlie Berger Sr. Director Product Management, Data Mining
Starting Smart with Oracle Advanced Analytics Great Lakes Oracle Conference Tim Vlamis Thursday, May 19, 2016 Vlamis Software Solutions Vlamis Software founded in 1992 in Kansas City, Missouri Developed
Oracle Advanced Analytics Oracle R Enterprise & Oracle Data Mining R The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Transform Big Data into Bigger Insight with Oracle Exadata and Oracle Advanced Analytics Charlie Berger, Senior Director, Product Mgt. OAA Marcos Arancibia, Product Manager, OAA Michael Bramley, Science
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
An Oracle White Paper September 2009 Data Mining with Oracle Database 11g Release 2 Competing on In-Database Analytics Executive Overview... 1 In-Database Data Mining... 1 Key Benefits of Oracle Data Mining...
An Oracle White Paper February 2012 Oracle Data Mining 11g Release 2 Competing on In-Database Analytics Disclaimer The following is intended to outline our general product direction. It is intended for
Oracle Data Mining In-Database Data Mining Made Easy! Charlie Berger Sr. Director Product Management, Data Mining and Advanced Analytics Oracle Corporation email@example.com www.twitter.com/charliedatamine
Chapter 3 Cash Larceny 1 Pop Quiz What is the difference between larceny and skimming? 2 Learning Objectives Define cash larceny. Understand how cash receipts schemes differ from fraudulent disbursements.
Big Data Analytics with Oracle Advanced Analytics In-Database Option Charlie Berger Sr. Director Product Management, Data Mining and Advanced Analytics firstname.lastname@example.org www.twitter.com/charliedatamine
OCCUPATIONAL FRAUD Gregory S Kollmeyer, CPA, CFE, MAcc Elliott, Robinson and Company, LLP WHAT IS FRAUD? FRAUD IS CRIMINAL DECEPTION INTENDED TO FINANCIALLY BENEFIT THE DECEIVER. OCCUPATIONAL FRAUD HAS
Oracle Advanced Analytics 12c & SQLDEV/Oracle Data Miner 4.0 New Features Charlie Berger, MS Eng, MBA Sr. Director Product Management, Data Mining and Advanced Analytics email@example.com www.twitter.com/charliedatamine
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
This presentation is for informational purposes only and may not be incorporated into a contract or agreement. The following is intended to outline our general product direction. It is intended for information
INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
Chapter 5 Check Tampering 1 Define check tampering. Learning Objectives Understand the five principal categories of check tampering. Detail the means by which employees fraudulently obtain company checks.
What Are They Thinking? With Oracle Application Express and Oracle Data Miner Roel Hartman Brendan Tierney Agenda Who are we The Scenario Graphs & Charts in APEX - Live Demo Oracle Data Miner & DBA tasks
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
Data Mining + Business Intelligence Integration, Design and Implementation ABOUT ME Vijay Kotu Data, Business, Technology, Statistics BUSINESS INTELLIGENCE - Result Making data accessible Wider distribution
Data Analysis with Various Oracle Business Intelligence and Analytic Tools Session ID: 108680 Prepared by: Tim and Dan Vlamis Vlamis Software Solutions www.vlamis.com @TimVlamis Agenda What we will talk
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania firstname.lastname@example.org Over
Embedding Fraud Fighting Techniques into Internal Audit Mary Breslin MBA, CIA, CFE What is Fraud? The Association of Certified Fraud Examiners defines occupational fraud as: The use of one s occupation
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
Chapter 2 Skimming 1. is the theft of cash from a victim entity prior to its entry in an accounting system. a. A fictitious disbursement b. Skimming c. Larceny d. Conversion 2. To a fraudster, the principle
Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements Economic Crime and the Online World 22 nd Annual ECI Conference November 2, 2011 Moderator: Bernard Hyman Jr., Esq. (315)
Getting Started with Oracle Data Miner 11g R2 Brendan Tierney Scene Setting This is not about DB log mining This is an introduction to ODM And how ODM can be included in OBIEE (next presentation) Domain
Oracle Business Intelligence and Analytics Platform SFOUG March 22, 2006 Shyam Varan Nath Oracle Corporation 1 Agenda Introduction to Business Intelligence A brief look into Oracle Integrated BI platform
Oracle Data Mining Concepts 11g Release 2 (11.2) E16808-07 June 2013 Oracle Data Mining Concepts, 11g Release 2 (11.2) E16808-07 Copyright 2005, 2013, Oracle and/or its affiliates. All rights reserved.
Howard Ong Principal Consultant Aurora Consulting Pty Ltd Abstract This paper introduces Data Mining to its audience by explaining Data Mining in the context of Corporate and Business Intelligence Reporting.
Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition
Tips For An Efficient And Effective Fraud Investigation Law360, New York (July 14, 2015, 12:03 PM ET) -- Internal fraud can be defined as the use of one s occupation for personal enrichment through the
ETPL Extract, Transform, Predict and Load An Oracle White Paper March 2006 ETPL Extract, Transform, Predict and Load. Executive summary... 2 Why Extract, transform, predict and load?... 4 Basic requirements
Oracle Data Mining Concepts 11g Release 2 (11.2) E16808-04 August 2010 Oracle Data Mining Concepts, 11g Release 2 (11.2) E16808-04 Copyright 2005, 2010, Oracle and/or its affiliates. All rights reserved.
CHAPTER 1 DATA MINING AND WAREHOUSING CONCEPTS 1.1 INTRODUCTION The past couple of decades have seen a dramatic increase in the amount of information or data being stored in electronic format. This accumulation
Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,
Blazing BI: the Analytic Options to the Oracle Database ODTUG Kscope 2013 Dan Vlamis Tim Vlamis Vlamis Software Solutions 816-781-2880 http://www.vlamis.com Copyright 2013, Vlamis Software Solutions, Inc.
Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
September 9 11, 2013 Anaheim, California An In-Depth Look at In-Memory Predictive Analytics for Developers Philip Mugglestone SAP Learning Points Understand the SAP HANA Predictive Analysis library (PAL)
Oracle9i Data Warehouse Review Robert F. Edwards Dulcian, Inc. Agenda Oracle9i Server OLAP Server Analytical SQL Data Mining ETL Warehouse Builder 3i Oracle 9i Server Overview 9i Server = Data Warehouse
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Oracle Data Mining Concepts 11g Release 1 (11.1) B28129-04 May 2008 Oracle Data Mining Concepts, 11g Release 1 (11.1) B28129-04 Copyright 2005, 2008, Oracle. All rights reserved. The Programs (which include
IBM SPSS Modeler Professional Make Better Decisions Through Predictive Intelligence Highlights Easily access, prepare and model structured data with this intuitive, visual data mining workbench Rapidly
Predictive Analytics Powered by SAP HANA Cary Bourgeois Principal Solution Advisor Platform and Analytics Agenda Introduction to Predictive Analytics Key capabilities of SAP HANA for in-memory predictive
extreme Datamining mit Oracle R Enterprise Oliver Bracht Managing Director eoda Matthias Fuchs Senior Consultant ISE Information Systems Engineering GmbH extreme Datamining with Oracle R Enterprise About
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Analyzing Big Data Heartland OUG Spring Conference 2014 Dan Vlamis Vlamis Software Solutions 816-781-2880 http://www.vlamis.com Copyright 2014, Vlamis Software Solutions, Inc. Copyright 2014, Vlamis Software
Forecasting, Prediction Models, and Times Series Analysis with Oracle Business Intelligence and Analytics Rittman Mead BI Forum 2013 Dan Vlamis and Tim Vlamis Vlamis Software Solutions 816-781-2880 http://www.vlamis.com
IBM SPSS Modeler Professional Make better decisions through predictive intelligence Highlights Create more effective strategies by evaluating trends and likely outcomes. Easily access, prepare and model
Bussiness Intelligence and Data Warehouse Schedule Bussiness Intelligence (BI) BI tools Oracle vs. Microsoft Data warehouse History Tools Oracle vs. Others Discussion Business Intelligence (BI) Products
Making critical connections: predictive analytics in government Improve strategic and tactical decision-making Highlights: Support data-driven decisions using IBM SPSS Modeler Reduce fraud, waste and abuse
SAP Brief SAP HANA Objectives Transform Your Future with Better Business Insight Using Predictive Analytics Dealing with the new reality Dealing with the new reality Organizations like yours can identify
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Preventing Fraud with Through Analytics Satya Bhamidipati Data Scientist Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights reserved. 2 Tax Fraud in Increasing 27%
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
This tool accompanies Lessons for Financial Success available at mgma.com/lessons. Lessons is a free, easy-to-use guide for office administrators and physicians who manage their own practices but may not
The Oracle Data Mining Machine Bundle: Zero to Predictive Analytics in Two Weeks Collaborate 15 IOUG Presentation #730 Tim Vlamis and Dan Vlamis Vlamis Software Solutions 816-781-2880 www.vlamis.com Presentation
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
IBM SPSS Modeler Professional Make better decisions through predictive intelligence Highlights Create more effective strategies by evaluating trends and likely outcomes. Easily access, prepare and model
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
Pentaho Data Mining Copyright 2007 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information, please visit our web site at www.pentaho.org
Data Mining Techniques and its Applications in Banking Sector Dr. K. Chitra 1, B. Subashini 2 1 Assistant Professor, Department of Computer Science, Government Arts College, Melur, Madurai. 2 Assistant
PAGE 1 l Teradata Magazine l Q1/2011 l 2011 Teradata Corporation l AR-6309 It s going mainstream, and it s your next opportunity. by Merv Adrian Enterprises have never had more data, and it s no surprise
Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most
Oracle Data Mining Concepts 11g Release 1 (11.1) B28129-02 September 2007 Oracle Data Mining Concepts, 11g Release 1 (11.1) B28129-02 Copyright 2005, 2007, Oracle. All rights reserved. The Programs (which
Big Data and Predictive Analytics: Fiserv Data Mining Case Study [CON8631] Data Warehouse and Big Data Miguel Barrera - Director, Risk Analytics, Fiserv, Inc. Julia Minkowski - Risk Manager, Fiserv, Inc.
Combating Fraud Pam Miller Education Director & Editor :: IOFM Fraud It s a Multi-Billion Dollar Business ACFE (Association of Certified Fraud Examiners) publishes global fraud studies every other year
+ Data Science in Action Peerapon Vateekul, Ph.D. Department of Computer Engineering, Faculty of Engineering, Chulalongkorn University + Outlines 2 Data Science & Data Scientist Data Mining Analytics with
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Introduction to Fraud Examination World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (email@example.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
White paper Loss Prevention Data Mining Using big data, predictive and prescriptive analytics to enpower loss prevention Abstract In the current economy where growth is stumpy and margins reduced, retailers
Fusion Applications Overview of Business Intelligence and Reporting components This document briefly lists the components, their common acronyms and the functionality that they bring to Fusion Applications.
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 10 AUDITING CASH AND MARKETABLE SECURITIES LEARNING OBJECTIVES
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
Automated Predictive Analysis Tomer Steinberg Analytics solutions from SAP SAP Analytics Portfolio Cloud Mobile Agile Visualization Advanced Analytics Big Data Enterprise Business Intelligence Collaboration
Predictive Analytics: Too Important to Ignore The six secrets to success with predictive analytics Webinar December 18, 2013 Sponsored by: Tony Cosentino VP & Research Director, Business Analytics Ventana
Introduction Predictive Analytics Tools: Weka Predictive Analytics Center of Excellence San Diego Supercomputer Center University of California, San Diego Tools Landscape Considerations Scale User Interface
IBM SPSS Modeler 15 In-Database Mining Guide Note: Before using this information and the product it supports, read the general information under Notices on p. 217. This edition applies to IBM SPSS Modeler