Detecting Money Laundering Actions Using Data Mining and Expert Systems
|
|
|
- Dwight Lucas
- 10 years ago
- Views:
Transcription
1 Detecting Money Laundering Actions Using Data Mining and Expert Systems Ekrem Duman Dogus University Industrial Engineering Department Istanbul, TURKEY Joint work with Ayse Buyukkaya
2 Outline Our experience in Banking Introduction Success Factors in predictive modeling Motivation for AML Why AML is important? Existing solutions Motivation for a better solution Suggested AML Framework Exploratory data analysis Inferential data analysis Expert system 2
3 Introduction Basic Objectives in Using DM: 1. Descriptive Clustering / Segmentation Basket (association) analysis Sequence (pattern) analysis 2. Predictive Classification Time series analysis - regression 3
4 Introduction Some of the DM projects we made: Clustering / Segmentation Product specific cross and up sell models Sequence analysis Customer churn CC, Loan and OD behavior scorecards Suspicious transactions 4
5 Success Factors Some technical factors that can affect the success of a project: The adequacy of data Selecting input variables The way of using input variables Forming the training set Determining model application period Algorithm selection Determining model assessment criteria Feeding the campaign results back 5
6 Success Factors Everything is the same but two factors are handled differently; 80% 80% 80% SA %* OA %* Ratio PROD A PROD B PROD C PROD D PROD E PROD F PROD G * All models are built by CART Average Avg Target A B C D E F SA - Standard Approach OA - Our Approach G *The percentage of actual buyers in the model target list within the following month Need for developing specific models for each product! 6
7 Success Factors Some technical factors that can affect the success of a project: The adequacy of data Selecting input variables The way of using input variables Forming the training set Determining model application period Algorithm selection Determining model assessment criteria Feeding the campaign results back 7
8 Success Factors The adequacy of data Do we have the necessary and sufficient variables in data mart? Are the data complete? How should we handle the missing data? What is the data quality? 8
9 Success Factors Selecting input variables Few variables interpretable, fast, less accurate (?) models Moderate number of variables? Many variables non-interpretable, slow, highly accurate (?) models How can we determine the right variables? Our Experience: NN DT few variables many variables 9
10 Success Factors The way of using input variables In original form? Transformed? Log Categorization Other Our Experience: Clustering Cross Sell Categorization Original Average balance in current account Range($) Value
11 Success Factors Forming the training set Who should take place in the training set? Whole customer base? Some clusters only? How to cluster customers? What should be the ratio of positive to negative samples in the training set? Our Experience: Cross Sell 1-1 Scorecard 1 - k (k>1) 11
12 Success Factors Determining model application period What is the campaign period? What is to be done for campaign timing to meet the needs of business? In which period the customer behavior will be anlyzed? Our Experience: Asset Liability 1 month 3 months 12
13 Success Factors Algorithm selection Neural networks: slow and difficult to understand Regression: faster, understandable Decision trees: fast, understandable The ones working better with symbolic variables The ones working better with continous variables 13
14 Success Factors Determining model assessment criteria Accuracy (confusion) matrix - ROC Hit rate Capture rate LIFT 14
15 Success Factors Algorithm Conf. Hit % Capture % LIFT Accuracy (0, 1) CART C ECHAID QUEST C ECHAID Avg (70%) Avg (80%)
16 Success Factors (CROSS SELL) Feeding the campaign results back 16
17 Success Factors After some improvement studies: Old New 80% 80% 80% 80% 90% 80% 90% SA % OA % Ratio OA % OA % Ratio Ratio PROD A PROD A PROD B PROD B PROD C PROD D PROD E PROD F PROD G Average
18 Some Campaigns We Made First Term Deposit (TD) Model and Campaign: The customers who did not have a TD are targeted Sales/reached = 26% (lift effect = 45) Avg account size = 2.5 times the general avg Second Term Deposit Model and Campaign: The customers who did not have a TD are targeted Sales/reached = 40% (lift effect = 98) Avg account size = 2.5 times the general avg 18
19 Some Campaigns We Made Bill Payment Order Campaign: The customers who did not have a payment order before are targeted Sales/reached = 6% (lift effect = 30) One more bill payment order, differentiated by the sales to lower segments Overdraft Campaign: Sales/reached = 38% (lift effect = 55) The actual users in the first three months are 12% more than the general average 19
20 Outline Our experience in Banking Introduction Success Factors in predictive modeling Motivation for AML Why AML is important? Existing solutions Motivation for a better solution Suggested AML Framework Exploratory data analysis Inferential data analysis Expert system 20
21 Motivation for AML Terrorism is the main threat to everybody. Before 9/11 it was related to underdeveloped countries. After 9/11 it was understood that it threatens everybody One of the ways of struggling terrorism is to block their financial activities. Terrorism finance is a type of black money and AML (anti money laundering) techniques can be used to combat it. (e.g. Kurdish terrorist group PKK and its revenues from illegal drugs) 21
22 Motivation for AML There are many commercial packages available for AML They perform standard checks Is the account holder on OFAC list? They are mostly rule based. Look at the (past) transactions Identify irregularities by some predefined rules Which customers made EFT more than 50 times last month? 22
23 Motivation for AML Basic deficiency of AML commercial packages: Too few AND rules list is too big to inspect Too many AND rules an actually fraudulent transaction/person could be missed 23
24 Motivation for AML Money laundering actions can be inspected at two levels: Individual account/person level look at the (past) transactions of an account/person and identify irregularities Netwok Level look at all accounts/customers and identify suspicious loops Account/ person 24
25 Motivation for AML Money laundering actions can be inspected at two levels: Individual account/person level look at the (past) transactions of an account/person and identify irregularities Netwok Level look at all accounts/customers and identify suspicious loops Account/ person 25
26 Suggested Framework A three phase AML solution framework: exploratory data analysis descriptive data mining (DM) to determine unusualities inferential data analysis predictive DM to determine cases that need to be inspected expert system coding the inspection process 26
27 Suggested Framework I - Exploratory data analysis phase: used to narrow down the search list customers/accounts are clustered wrt some behavioral variables we prefer to consolidate all accounts of a customer and work on customer list Customers who are close to cluster center are taken as normal and not inspected anymore 27
28 Suggested Framework I - Exploratory data analysis phase: How can we decide that a customer showed unusual behavior? Is a customer who made 50 EFTs unusual? It could be If he owns a small business it may be normal If he always does this it may be normal To judge we need to know; the average value in the demographic/behavioral segment of the customer the routine (historic) behavior of the customer 28
29 Suggested Framework I - Exploratory data analysis phase: The clustering to be made should take both aspects into account First aspect is handled automatically For the second aspect, we calculated the deviation values and used them in clustering Deviation = (value in last month avg of the last six months) / std. dev. in the last six months 29
30 Suggested Framework I - Exploratory data analysis phase: Variables should be selected in accordance with the purpose: BD_CA_NUM_CRD_TRX BD_CA_NUM_CRD_TRX_DEV BD_CA_NUM_ACCT_TL_OP BD_CA_NUM_ACCT_TL_OP_DEV BD_DBC_NUM_TRX BD_DBC_NUM_TRX_DEV BD_INT_LOGON_NUM BD_INT_NUM_TRX EFT_IN_TRX_NUM EFT_OUT_TRX_NUM 30
31 Suggested Framework I - Exploratory data analysis phase: For a clustering with k variables and n clusters; Cluster centers are determined This is a point in k dimensional space which take averages of all customers in that cluster All customers in the cluster have some deviation from the center Variable Deviation k = dev of the customer s variable k value from cluster center value Customer Deviation = total of the variable deviations 31
32 Suggested Framework I - Exploratory data analysis phase: Customer anomaly index = (customer deviation) / (average customer deviation in the cluster) Customers are sorted with a non-increasing value of anomaly index values; The lower part of this list is the normal or usual part The upper part can be inspected more 32
33 Suggested Framework I - Exploratory data analysis phase: Variable contribution measure (VCM) = variable deviation / customer deviation 33
34 Suggested Framework II - Inferential data analysis phase: It would be very nice to have a training set to learn who are laundering money. The known cases are too few which is far beyond being sufficient. Let the inspectors look at the anomaly indexes and decide which ones to inspect; 34
35 Suggested Framework II - Inferential data analysis phase: Anomaly List: The list produced by anomaly indexes Inspect List: The ones that the inspectors see the need to inspect Anomaly List Training Set Inspect List 35
36 Suggested Framework III - Expert system phase: Inspection process is too time consuming. An expert system could be developed to help the inspection process. The inspectors can focus on the few cases that the expert system finds suspicious. 36
37 Summary and Conclusions Combating ML is very important. Available solutions have some drawbacks. A three phase solution framework is suggested. exploratory data analysis inferential data analysis expert system 37
38 Future Work To mature and implement our solution framework. To find solutions for the network level problems. Account/ person We are open to collaboration 38
39 Any Questions? Thank you for listening to us. 39
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Data Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
Discovering, Not Finding. Practical Data Mining for Practitioners: Level II. Advanced Data Mining for Researchers : Level III
www.cognitro.com/training Predicitve DATA EMPOWERING DECISIONS Data Mining & Predicitve Training (DMPA) is a set of multi-level intensive courses and workshops developed by Cognitro team. it is designed
Data Mining + Business Intelligence. Integration, Design and Implementation
Data Mining + Business Intelligence Integration, Design and Implementation ABOUT ME Vijay Kotu Data, Business, Technology, Statistics BUSINESS INTELLIGENCE - Result Making data accessible Wider distribution
Ramco MDM A foundation for Anti Money Laundering (AML) A Ramco White Paper. Co-create. Innovate. Win.
Ramco MDM A foundation for Anti Money Laundering (AML) A Ramco White Paper Co-create. Innovate. Win. 1 2009 Ramco Systems Ltd. All rights reserved. All trademarks acknowledged. This document is published
Potential Value of Data Mining for Customer Relationship Marketing in the Banking Industry
Advances in Natural and Applied Sciences, 3(1): 73-78, 2009 ISSN 1995-0772 2009, American Eurasian Network for Scientific Information This is a refereed journal and all articles are professionally screened
SAS Fraud Framework for Banking
SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Data Mining: Overview. What is Data Mining?
Data Mining: Overview What is Data Mining? Recently * coined term for confluence of ideas from statistics and computer science (machine learning and database methods) applied to large databases in science,
Data Mining: An Introduction
Data Mining: An Introduction Michael J. A. Berry and Gordon A. Linoff. Data Mining Techniques for Marketing, Sales and Customer Support, 2nd Edition, 2004 Data mining What promotions should be targeted
Data Mining Techniques in CRM
Data Mining Techniques in CRM Inside Customer Segmentation Konstantinos Tsiptsis CRM 6- Customer Intelligence Expert, Athens, Greece Antonios Chorianopoulos Data Mining Expert, Athens, Greece WILEY A John
not possible or was possible at a high cost for collecting the data.
Data Mining and Knowledge Discovery Generating knowledge from data Knowledge Discovery Data Mining White Paper Organizations collect a vast amount of data in the process of carrying out their day-to-day
Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance
Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering
Chapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
Microsoft Azure Machine learning Algorithms
Microsoft Azure Machine learning Algorithms Tomaž KAŠTRUN @tomaz_tsql [email protected] http://tomaztsql.wordpress.com Our Sponsors Speaker info https://tomaztsql.wordpress.com Agenda Focus on explanation
OLAP and Data Mining. Data Warehousing and End-User Access Tools. Introducing OLAP. Introducing OLAP
Data Warehousing and End-User Access Tools OLAP and Data Mining Accompanying growth in data warehouses is increasing demands for more powerful access tools providing advanced analytical capabilities. Key
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
An investigation into Data Mining approaches for Anti Money Laundering
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore An investigation into Data Mining approaches for Anti Money Laundering Nhien An
How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK
How Organisations Are Using Data Mining Techniques To Gain a Competitive Advantage John Spooner SAS UK Agenda Analytics why now? The process around data and text mining Case Studies The Value of Information
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
III JORNADAS DE DATA MINING
III JORNADAS DE DATA MINING EN EL MARCO DE LA MAESTRÍA EN DATA MINING DE LA UNIVERSIDAD AUSTRAL PRESENTACIÓN TECNOLÓGICA IBM Alan Schcolnik, Cognos Technical Sales Team Leader, IBM Software Group. IAE
INTERNATIONAL CORRESPONDENT BANKS. Knowing Your Customer (KYC) Anti-Money Laundering Prevention of Terrorist Financing
INTERNATIONAL CORRESPONDENT BANKS Registered Name Commercial name (if applicable) Full address of the registered office of the financial institution (Street, town and country) VAT number BIC code Website:
HIGH-RISK COUNTRIES IN AML MONITORING
HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References
Data Mining Applications in Manufacturing
Data Mining Applications in Manufacturing Dr Jenny Harding Senior Lecturer Wolfson School of Mechanical & Manufacturing Engineering, Loughborough University Identification of Knowledge - Context Intelligent
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
Data Mining for Fun and Profit
Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools
TNS EX A MINE BehaviourForecast Predictive Analytics for CRM. TNS Infratest Applied Marketing Science
TNS EX A MINE BehaviourForecast Predictive Analytics for CRM 1 TNS BehaviourForecast Why is BehaviourForecast relevant for you? The concept of analytical Relationship Management (acrm) becomes more and
Statistical Challenges with Big Data in Management Science
Statistical Challenges with Big Data in Management Science Arnab Kumar Laha Indian Institute of Management Ahmedabad Analytics vs Reporting Competitive Advantage Reporting Prescriptive Analytics (Decision
DATA MINING AND CUSTOMER RELATIONSHIP MANAGEMENT FOR CLIENTS SEGMENTATION
DATA MINING AND CUSTOMER RELATIONSHIP MANAGEMENT FOR CLIENTS SEGMENTATION Ionela-Catalina Tudorache (Zamfir) 1, Radu-Ioan Vija 2 1), 2) The Bucharest University of Economic Studies, Economic Cybernetics
What is Customer Relationship Management? Customer Relationship Management Analytics. Customer Life Cycle. Objectives of CRM. Three Types of CRM
Relationship Management Analytics What is Relationship Management? CRM is a strategy which utilises a combination of Week 13: Summary information technology policies processes, employees to develop profitable
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
Data Mining System, Functionalities and Applications: A Radical Review
Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially
Business Analytics and Credit Scoring
Study Unit 5 Business Analytics and Credit Scoring ANL 309 Business Analytics Applications Introduction Process of credit scoring The role of business analytics in credit scoring Methods of logistic regression
Product recommendations and promotions (couponing and discounts) Cross-sell and Upsell strategies
WHITEPAPER Today, leading companies are looking to improve business performance via faster, better decision making by applying advanced predictive modeling to their vast and growing volumes of data. Business
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Safe Harbor Statement
Defining a Roadmap to Big Data Success Robert Stackowiak, Oracle Vice President, Big Data 17 November 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is
Customer Analytics. Turn Big Data into Big Value
Turn Big Data into Big Value All Your Data Integrated in Just One Place BIRT Analytics lets you capture the value of Big Data that speeds right by most enterprises. It analyzes massive volumes of data
Prerequisites. Course Outline
MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,
Analyze It use cases in telecom & healthcare
Analyze It use cases in telecom & healthcare Chung Min Chen, VP of Data Science The views and opinions expressed in this presentation are those of the author and do not necessarily reflect the position
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies The USA PATRIOT Act includes provisions intended to prevent the financial services
Predictive Modeling in Workers Compensation 2008 CAS Ratemaking Seminar
Predictive Modeling in Workers Compensation 2008 CAS Ratemaking Seminar Prepared by Louise Francis, FCAS, MAAA Francis Analytics and Actuarial Data Mining, Inc. www.data-mines.com [email protected]
TEMPLATE FOR REFERENCE ONLY
TEMPLATE FOR REFERENCE ONLY According to the Anti-Money Laundering and Counter-Terrorist Financing (Financial Institutions) Ordinance, Chapter 615, Laws of Hong Kong, it is the responsibility of each financial
Journée Thématique Big Data 13/03/2015
Journée Thématique Big Data 13/03/2015 1 Agenda About Flaminem What Do We Want To Predict? What Is The Machine Learning Theory Behind It? How Does It Work In Practice? What Is Happening When Data Gets
Data Mining for Digital Forensics
Digital Forensics - CS489 Sep 15, 2006 Topical Paper Mayuri Shakamuri Data Mining for Digital Forensics Introduction "Data mining is the analysis of (often large) observational data sets to find unsuspected
from Larson Text By Susan Miertschin
Decision Tree Data Mining Example from Larson Text By Susan Miertschin 1 Problem The Maximum Miniatures Marketing Department wants to do a targeted mailing gpromoting the Mythic World line of figurines.
Index Contents Page No. Introduction . Data Mining & Knowledge Discovery
Index Contents Page No. 1. Introduction 1 1.1 Related Research 2 1.2 Objective of Research Work 3 1.3 Why Data Mining is Important 3 1.4 Research Methodology 4 1.5 Research Hypothesis 4 1.6 Scope 5 2.
CRM project. Business impact and technology challenges
CRM project Business impact and technology challenges 18/10/2012, Ms P. Koleva (Head of IT) & Mr. J. Stoyanov (Head of Change and Portfolio Management) Business case Build on: Improved cross selling; Improved
CONTENTS PREFACE 1 INTRODUCTION 1 2 DATA VISUALIZATION 19
PREFACE xi 1 INTRODUCTION 1 1.1 Overview 1 1.2 Definition 1 1.3 Preparation 2 1.3.1 Overview 2 1.3.2 Accessing Tabular Data 3 1.3.3 Accessing Unstructured Data 3 1.3.4 Understanding the Variables and Observations
Predictive modelling around the world 28.11.13
Predictive modelling around the world 28.11.13 Agenda Why this presentation is really interesting Introduction to predictive modelling Case studies Conclusions Why this presentation is really interesting
EXPLORING & MODELING USING INTERACTIVE DECISION TREES IN SAS ENTERPRISE MINER. Copyr i g ht 2013, SAS Ins titut e Inc. All rights res er ve d.
EXPLORING & MODELING USING INTERACTIVE DECISION TREES IN SAS ENTERPRISE MINER ANALYTICS LIFECYCLE Evaluate & Monitor Model Formulate Problem Data Preparation Deploy Model Data Exploration Validate Models
ANTI - MONEY LAUNDERING POLICY
BANK M TANZANIA LTD POLICY DOCUMENT ANTI - MONEY LAUNDERING POLICY FEBRUARY 2007 Page 1 of 8 AML POLICY TABLE OF CONTENTS NO. PARTICULARS PAGE NO. 1 INTRODUCTION 3 2 DEFINITIONS 3-4 3 SCOPE OF THE POLICY
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
Data Mining. SPSS Clementine 12.0. 1. Clementine Overview. Spring 2010 Instructor: Dr. Masoud Yaghini. Clementine
Data Mining SPSS 12.0 1. Overview Spring 2010 Instructor: Dr. Masoud Yaghini Introduction Types of Models Interface Projects References Outline Introduction Introduction Three of the common data mining
Free Trial - BIRT Analytics - IAAs
Free Trial - BIRT Analytics - IAAs 11. Predict Customer Gender Once we log in to BIRT Analytics Free Trial we would see that we have some predefined advanced analysis ready to be used. Those saved analysis
TEXT ANALYTICS INTEGRATION
TEXT ANALYTICS INTEGRATION A TELECOMMUNICATIONS BEST PRACTICES CASE STUDY VISION COMMON ANALYTICAL ENVIRONMENT Structured Unstructured Analytical Mining Text Discovery Text Categorization Text Sentiment
Importance or the Role of Data Warehousing and Data Mining in Business Applications
Journal of The International Association of Advanced Technology and Science Importance or the Role of Data Warehousing and Data Mining in Business Applications ATUL ARORA ANKIT MALIK Abstract Information
INTRODUCTION TO DATA MINING SAS ENTERPRISE MINER
INTRODUCTION TO DATA MINING SAS ENTERPRISE MINER Mary-Elizabeth ( M-E ) Eddlestone Principal Systems Engineer, Analytics SAS Customer Loyalty, SAS Institute, Inc. AGENDA Overview/Introduction to Data Mining
Application of SAS! Enterprise Miner in Credit Risk Analytics. Presented by Minakshi Srivastava, VP, Bank of America
Application of SAS! Enterprise Miner in Credit Risk Analytics Presented by Minakshi Srivastava, VP, Bank of America 1 Table of Contents Credit Risk Analytics Overview Journey from DATA to DECISIONS Exploratory
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Insurance Analytics - analýza dat a prediktivní modelování v pojišťovnictví. Pavel Kříž. Seminář z aktuárských věd MFF 4.
Insurance Analytics - analýza dat a prediktivní modelování v pojišťovnictví Pavel Kříž Seminář z aktuárských věd MFF 4. dubna 2014 Summary 1. Application areas of Insurance Analytics 2. Insurance Analytics
IBM SPSS Modeler Premium
IBM SPSS Modeler Premium Improve model accuracy with structured and unstructured data, entity analytics and social network analysis Highlights Solve business problems faster with analytical techniques
Dynamic Predictive Modeling in Claims Management - Is it a Game Changer?
Dynamic Predictive Modeling in Claims Management - Is it a Game Changer? Anil Joshi Alan Josefsek Bob Mattison Anil Joshi is the President and CEO of AnalyticsPlus, Inc. (www.analyticsplus.com)- a Chicago
Data Mining Part 5. Prediction
Data Mining Part 5. Prediction 5.1 Spring 2010 Instructor: Dr. Masoud Yaghini Outline Classification vs. Numeric Prediction Prediction Process Data Preparation Comparing Prediction Methods References Classification
Data Mining Techniques Chapter 6: Decision Trees
Data Mining Techniques Chapter 6: Decision Trees What is a classification decision tree?.......................................... 2 Visualizing decision trees...................................................
Operationalising Predictive Insights
Operationalising Predictive Insights To Impact the Bottom Line Ali Rahim Advanced Analytics Product Manager Agenda 2 1. Predictive Analytics 2. Why RStat 3. Step through the Predictive process 4. RStat
Insurance Fraud Detection: MARS versus Neural Networks?
Insurance Fraud Detection: MARS versus Neural Networks? Louise A Francis FCAS, MAAA [email protected] 1 Objectives Introduce a relatively new data mining method which can be used as an alternative
Data Mining and Predictive Modeling with Excel 2007
Spyridon Ganas Abstract With the release of Excel 2007 and SQL Server 2008, Microsoft has provided actuaries with a powerful and easy to use predictive modeling platform. This paper provides a brief overview
Fluency With Information Technology CSE100/IMT100
Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999
Role of Customer Response Models in Customer Solicitation Center s Direct Marketing Campaign
Role of Customer Response Models in Customer Solicitation Center s Direct Marketing Campaign Arun K Mandapaka, Amit Singh Kushwah, Dr.Goutam Chakraborty Oklahoma State University, OK, USA ABSTRACT Direct
ANALYTICS CENTER LEARNING PROGRAM
Overview of Curriculum ANALYTICS CENTER LEARNING PROGRAM The following courses are offered by Analytics Center as part of its learning program: Course Duration Prerequisites 1- Math and Theory 101 - Fundamentals
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Anti-Money Laundering Facts
Anti-Money Laundering Facts Security Benefit Life Insurance Company (SBL) has implemented a formal anti-money laundering (AML) program in response to the Financial Crimes Enforcement Network s (FinCEN)
INTERNATIONAL CORRESPONDENT BANKING
INTERNATIONAL CORRESPONDENT BANKING Know your Customer (KYC) Prevention of Money Laundering and the Financing of Terrorism General Information on the Financial Institution Registered Name Commercial name
A Basic Guide to Modeling Techniques for All Direct Marketing Challenges
A Basic Guide to Modeling Techniques for All Direct Marketing Challenges Allison Cornia Database Marketing Manager Microsoft Corporation C. Olivia Rud Executive Vice President Data Square, LLC Overview
WHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk
WHITEPAPER Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk Overview Angoss is helping its clients achieve significant revenue growth and measurable return
MBA 8473 - Data Mining & Knowledge Discovery
MBA 8473 - Data Mining & Knowledge Discovery MBA 8473 1 Learning Objectives 55. Explain what is data mining? 56. Explain two basic types of applications of data mining. 55.1. Compare and contrast various
Data Mining Techniques and its Applications in Banking Sector
Data Mining Techniques and its Applications in Banking Sector Dr. K. Chitra 1, B. Subashini 2 1 Assistant Professor, Department of Computer Science, Government Arts College, Melur, Madurai. 2 Assistant
Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions
Fighting Identity Fraud with Data Mining Groundbreaking means to prevent fraud in identity management solutions Contents Executive summary Executive summary 3 The impact of identity fraud? 4 The forgery
Maximize Revenues on your Customer Loyalty Program using Predictive Analytics
Maximize Revenues on your Customer Loyalty Program using Predictive Analytics 27 th Feb 14 Free Webinar by Before we begin... www Q & A? Your Speakers @parikh_shachi Technical Analyst @tatvic Loves js
Machine learning for algo trading
Machine learning for algo trading An introduction for nonmathematicians Dr. Aly Kassam Overview High level introduction to machine learning A machine learning bestiary What has all this got to do with
What is Data mining?
STAT : DATA MIIG Javier Cabrera Fall Business Question Answer Business Question What is Data mining? Find Data Data Processing Extract Information Data Analysis Internal Databases Data Warehouses Internet
Marketing Research Core Body Knowledge (MRCBOK ) Learning Objectives
Fulfilling the core market research educational needs of individuals and companies worldwide Presented through a unique partnership between How to Contact Us: Phone: +1-706-542-3537 or 1-800-811-6640 (USA
Review of banks anti-money laundering systems and controls
Review of banks anti-money laundering systems and controls Stewart McGlynn Anti-Money Laundering Banking Supervision Department Hong Kong Monetary Authority 22 & 23 April 2013 Disclaimer This presentation
CoolaData Predictive Analytics
CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an
Data mining as a tool of revealing the hidden connection of the plant
Data mining as a tool of revealing the hidden connection of the plant Honeywell AIDA Advanced Interactive Data Analysis Introduction What is AIDA? AIDA: Advanced Interactive Data Analysis Developped in
COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
ANTI MONEY LAUNDERING & COUNTER TERRORIST FINANCING POLICY
ANTI MONEY LAUNDERING & COUNTER TERRORIST FINANCING POLICY DECEMBER 2014 TÜRKİYE CUMHURİYETİ ZİRAAT BANKASI A.Ş. ANTI MONEY LAUNDERING & COUNTER TERRORIST FINANCING (AML/CTF) POLICY It is the policy of
MBA - INFORMATION TECHNOLOGY MANAGEMENT (MBAITM) Term-End Examination December, 2014 MBMI-012 : BUSINESS INTELLIGENCE SECTION I
No. of Printed Pages : 8 I MBMI-012 I MBA - INFORMATION TECHNOLOGY MANAGEMENT (MBAITM) Term-End Examination December, 2014 Time : 3 hours Note : (i) (ii) (iii) (iv) (v) MBMI-012 : BUSINESS INTELLIGENCE
STATISTICA. Financial Institutions. Case Study: Credit Scoring. and
Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT
DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate
Past, present, and future Analytics at Loyalty NZ. V. Morder SUNZ 2014
Past, present, and future Analytics at Loyalty NZ V. Morder SUNZ 2014 Contents Visions The undisputed customer loyalty experts To create, maintain and motivate loyal customers for our Participants Win
