E-Banking Integrated Data Utilization Platform WINBANK Case Study
|
|
|
- Everett Summers
- 10 years ago
- Views:
Transcription
1 E-Banking Integrated Data Utilization Platform WINBANK Case Study Vasilis Aggelis Senior Business Analyst, PIRAEUSBANK SA, Abstract we all are living in information society. Companies and Organizations have many information networks. But when we talk about information, we talk about a wide notion. Scope of modern organizations is not only having data. Their target is to gain competitive advantages from them. The basic means to achieve their target are the use of modern and steady methodologies and systems depend on them, in order to find hidden patterns or models. Our platform is an innovative one. We specify our methodology taking into account human factor and we build an integrated data utilization system. In the next paragraphs, we introduce our techniques and system. Keywords e-banking, knowledge utilization, data mining, internet banking fraud detection. I. INTRODUCTION Electronic banking adoption is grown rapidly the last years. E-Banking nowadays offers a complete range of services and products facilitating not only the retail customers but also institutional ones to conduct their transactions easily and securely [1]. WINBANK is the electronic banking division of Piraeus Bank. This unit is responsible for bank s alternative channels, such as internet banking, mobile banking, phone banking and ATMs. WINBANK has the most innovative electronic services in Greek e-banking market and keeps a very strong portfolio of services in comparison with other banks worldwide. Last year WINBANK took winning prize in all awards which participated in. Those prizes prove WINBANK s leadership in electronic banking market. Apart from prizes, increasing customer satisfaction annually certifies leading position. Those factors increase our concern and make us working harder in order to keep top quality of our services and customer satisfaction in high level. WINBANK s big challenge was data and knowledge utilization [10, 11, 14, 15]. From this point of view, we designed, implemented and established in-house two major systems. The first one is for knowledge utilization in order to gain advantages both bank and customers. The second one is for data utilization in order to detect and prevent internet banking fraud. In the next sections we describe briefly our integrated data utilization platform. Section 2 contains K.R.I.O.S. system and its use, while in section 3 internet banking fraud detection system is described. Finally section 4 contains the impacts of our integrated platform. II. WINBANK K.R.I.O.S. SYSTEM K.R.I.O.S. is an innovative smart knowledge returning system [3]. The system has dual goal (Figure 1). It serves winbank s business needs, but it is also serves our customer. We take advantage form K.R.I.O.S. in order to build a steady and healthy relationship with users. As a first step we offer personalized services for each user. Moreover, taking into account many parameters, our internet banking service returns knowledge to user during his/her navigation in our site. In order to implement the main functions of the systems, there are many cooperating parts of K.R.I.O.S (Figure 2). These parts are: Data Warehouse: All electronic transactions (both informational and financial), all transactions from other channels (cashier, ATMs, Automatic Payment Systems, etc.) and web log from secure internet banking site are stored in Data Warehouse. All this information is updated in weekly basis. Modeler: Modeler is the subsystem which consist data mining [12], business intelligence, predictive analytics and ETL (Extract-Transform-Load) tools. This subsystem is responsible for data processing. In addition, modeler creates and educates models and patterns [4, 5, 6], which, in most cases, stored in Knowledge Base. Knowledge Base: Our Knowledge Base is the main knowledge repository. Every single information represented to users, is exported from this Base. Knowledge Base is updated from Data Warehouse, Modeler and User s interaction. Smart Agent (optional): This is an optional tool. Its usefulness based on contributing in a more friendly and familiar interface. III. WINBANK FRAUD DETECTION SYSTEM WINBANK takes into consideration all parameters which lead in internet banking fraud. Analysts established many detection rules [9]. Apart from the initial ones, new rules are added, when analysis finds out suspect patterns [16] and behaviors. Those rules enhanced in an offline fraud detection system [2].
2 FIGURE 1 System s Dual Goal FIGURE 2 WINBANK K.R.I.O.S.
3 System is offline because of its database update. New data are imported in database in constant time frames, not in real time. For time being there is no immediate need to upgrade system in online mode. Analysis, design and implementation of the system took part in-house. Due to the bank s data sensitivity, one of the prerequisites was in-house set up and function of such system. Data mining [8] and predictive analytics tools contributed in all phases of project and they are part of the system. Pilot operation period proved system s reliability, accuracy and success. Moreover pilot period helped bank scanning system s bugs, faults and defects. After that period, fraud detection system began to operate in production environment. Figure 3 shows the fraud detection daily process Suspect transactions are graduated. Accordingly to their risk, they are signed as high, medium and low risk (Figure 4). Probability of fraud is very low, less than 1% [7]. So the great majority of suspect transactions are not fraudulent. Nevertheless, bank obligates to search all suspect transactions (Figure 5). Apparently the final target is the online implementation of above described system. IV. IMPACTS K.R.I.O.S. [3] offers advantages as the following: Good knowledge of the relationships [4, 13] between different types of electronic transactions. Description and establishment of most popular internet transactions The electronic services become more easily familiar to the public since specific groups of customers are approached, that uses specific payment manners. Customer approach is well designed with higher possibility of successful engagement. The improvement of already offered bank services is classified as to those used more frequently. Redesign internet transaction structures for those which used rarely Reconsidering of the usefulness of products exhibiting little or no contribution to the rules. Personalized menus through preference mining Customer views returning information via internet banking site In the other hand, offline internet banking fraud detection system [2] offers many benefits to both bank and customers. Fraud detection system gives added value to e-banking. Especially, nowadays, where fraudsters attacks are increased considerably in our country, such system differentiate bank owner from other bank competitors. Bank takes lead. Such in-house system implementations, which are set up for customer benefit, are infrequent in local market. Fraud detection system indicates quality of e-banking services. Quality depends on user friendly interface, on a full of electronic transactions portfolio, but also depends on user protection and guarantee. A significant number of users have the sense of care and protection from their bank. This sense helps customer loyalty escalation. Official fraud victims informed from the bank itself as soon as fraud detected. Customers feel that their bank stands by them and that fact strengthens mutual relation. FIGURE 3 Fraud detection daily process
4 FIGURE 4 Main fraud detection report FIGURE 5 Fraud detection specific report REFERENCES [1] V. Aggelis, The e-banking bible, New Technologies Publications, Athens, Greece, [2] V. Aggelis, Offline Internet Banking Fraud Detection, 1 st International Conference on Availability, Reliability and Security (ARES 2006), IEEE Press 2006, pp [3] V. Aggelis, A Smart Knowledge Returning System, 2 nd International Conference on Business Management and Economics, 2006.
5 [4] V. Aggelis, e-trans Association Rules Re-visited, 4 th International Multiconference on Computer Science and Information Technology, [5] V. Aggelis, and D Christodoulakis, Association Rules and Predictive Models for e-banking Services 1 st Balkan Conference on Informatics 2003, Salonica, Greece. [6] V. Aggelis, Data Mining for Decision Support in e-banking area (II) 1 st International Conference on Knowledge Engineering and Decision Support 2004, Porto, Portugal. [7] R. Brause, T. Langsdorf and M. Hepp, Neural Data Mining for Credit card Fraud Detection, IEEE International Conference on Tools with Artificial Intelligence ICTAI-99, IEEE Press 1999, pp [8] Using data mining to detect fraud, SPSS technical report, [9] C. Phua, V. Lee, K. Smith, and R. Gayler, A Comprehensive Survey of Data Mining-based Fraud detection Research, Artificial Intelligence Review, [10] M.J.Zaki, S. Parthasarathy, W. Li, and M. Ogihara. Evaluation of Sampling for Data Mining of Association Rules, 7th Workshop Research Iss. Data Engg., 1997 [11] R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, and A.I. Verkamo. Fast discovery of associations rules, Advances in Knowledge Discovery and Data Mining, 1996 [12] Clementine 7.0 Users s Guide. Integral solutions Limited, [13] S. Brin, R. Motwani, and C. Silverstein. Beyond Market Baskets: Generalizing Association Rules to Correlations, Proceedings ACM SIGMOD Conf. on Management of Data, 1997 [14] M. Chen, J. Han, and P. Yu. Data Mining: An Overview from Database Perspective, Ieee Trans. On Knowledge And Data Engineering, 1997 [15] R. Hilderman, and H. Hmailton. Knowledge Discovery and Interestingness Measures: A Survey, Technical Report CS 99-04, Department of Computer Science, University of Regina,1999 [16] H. Toivonen. Discovery of Frequent Patterns in Large Data Collections, Technical Report A , Department of Computer Science, University of Helsinki, 1996 FRONTIERS OF E-BUSINESS RESEARCH 2006
Mining an Online Auctions Data Warehouse
Proceedings of MASPLAS'02 The Mid-Atlantic Student Workshop on Programming Languages and Systems Pace University, April 19, 2002 Mining an Online Auctions Data Warehouse David Ulmer Under the guidance
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model
A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model ABSTRACT Mrs. Arpana Bharani* Mrs. Mohini Rao** Consumer credit is one of the necessary processes but lending bears
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Fraud Detection in Online Banking Using HMM
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Fraud Detection in Online Banking Using HMM Sunil Mhamane + and L.M.R.J
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Competing with SPSS Predictive Analytics
Competing with SPSS Predictive Analytics Ioanna Koutrouvis Managing Director SPSS BI GREECE SA Athens, April 10 th 2008 Agenda Definition of Predictive Analytics and Brief Historical overview Why competing
Credit Card Fraud Detection Using Hidden Markov Model
International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online
EFFECTIVE USE OF THE KDD PROCESS AND DATA MINING FOR COMPUTER PERFORMANCE PROFESSIONALS
EFFECTIVE USE OF THE KDD PROCESS AND DATA MINING FOR COMPUTER PERFORMANCE PROFESSIONALS Susan P. Imberman Ph.D. College of Staten Island, City University of New York [email protected] Abstract
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
Mining Association Rules: A Database Perspective
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology
Session 10 : E-business models, Big Data, Data Mining, Cloud Computing
INFORMATION STRATEGY Session 10 : E-business models, Big Data, Data Mining, Cloud Computing Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Internet
2.1. The Notion of Customer Relationship Management (CRM)
Int. J. Innovative Ideas (IJII) www.publishtopublic.com A Review on CRM and CIS: A Service Oriented Approach A Review on CRM and CIS: A Service Oriented Approach Shadi Hajibagheri 1, *, Babak Shirazi 2,
College information system research based on data mining
2009 International Conference on Machine Learning and Computing IPCSIT vol.3 (2011) (2011) IACSIT Press, Singapore College information system research based on data mining An-yi Lan 1, Jie Li 2 1 Hebei
KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH
KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH Shi-Ming Huang and Tsuei-Chun Hu* Department of Accounting and Information Technology *Department of Information Management
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
Overview Applications of Data Mining In Health Care: The Case Study of Arusha Region
International Journal of Computational Engineering Research Vol, 03 Issue, 8 Overview Applications of Data Mining In Health Care: The Case Study of Arusha Region 1, Salim Diwani, 2, Suzan Mishol, 3, Daniel
Mining various patterns in sequential data in an SQL-like manner *
Mining various patterns in sequential data in an SQL-like manner * Marek Wojciechowski Poznan University of Technology, Institute of Computing Science, ul. Piotrowo 3a, 60-965 Poznan, Poland [email protected]
Certified E-commerce Consultant (CEC)
Certified E-commerce Consultant (CEC) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of
Association rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, [email protected] Tanja Krunić, The
Effect of Information Technology Outsourcing on the Performance of Banks in Kenya: Application of the Balanced Scorecard Purpose:
IOSR Journal of Business and Management (IOSR-JBM) e-issn: 2278-487X, p-issn: 2319-7668. Volume 17, Issue 3.Ver. II (Mar. 2015), PP 83-89 www.iosrjournals.org Effect of Information Technology Outsourcing
Mining changes in customer behavior in retail marketing
Expert Systems with Applications 28 (2005) 773 781 www.elsevier.com/locate/eswa Mining changes in customer behavior in retail marketing Mu-Chen Chen a, *, Ai-Lun Chiu b, Hsu-Hwa Chang c a Department of
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
, 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,
Comparison of Data Mining Techniques for Money Laundering Detection System
Comparison of Data Mining Techniques for Money Laundering Detection System Rafał Dreżewski, Grzegorz Dziuban, Łukasz Hernik, Michał Pączek AGH University of Science and Technology, Department of Computer
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Efficient Integration of Data Mining Techniques in Database Management Systems
Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France
A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH
205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
BUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining
BUSINESS INTELLIGENCE Bogdan Mohor Dumitrita 1 Abstract A Business Intelligence (BI)-driven approach can be very effective in implementing business transformation programs within an enterprise framework.
Five Predictive Imperatives for Maximizing Customer Value
Executive Brief Five Predictive Imperatives for Maximizing Customer Value Applying Predictive Analytics to enhance customer relationship management Table of contents Executive summary...2 The five predictive
American International Journal of Research in Humanities, Arts and Social Sciences
American International Journal of Research in Humanities, Arts and Social Sciences Available online at http://www.iasir.net ISSN (Print): 2328-3734, ISSN (Online): 2328-3696, ISSN (CD-ROM): 2328-3688 AIJRHASS
2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: [email protected]) Dr. G.N. Singh Department of Physics and
Data Mining Applications in Higher Education
Executive report Data Mining Applications in Higher Education Jing Luan, PhD Chief Planning and Research Officer, Cabrillo College Founder, Knowledge Discovery Laboratories Table of contents Introduction..............................................................2
Fraud Solution for Financial Services
Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
Study on Business Model and Mobile Marketing Strategy of Online to Offline
Study on Business Model and Mobile Marketing Strategy of Online to Offline Houchun Ding 1 *, Li Jiang 2 1 Business School, Huanggang Normal College, Huanggang, China, 438000. 2 Business School, Huanggang
Meta Learning Algorithms for Credit Card Fraud Detection
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection
Online Credit Card Application and Identity Crime Detection
Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due
Journal of Management Systems
27 Journal of Management Systems ISSN #1041-2808 A Publication of the Association of Management to Mitigate Account Outflows for Finance Companies Stephan Kudyba and Jerry Fjermestad School of Management
To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized
S.Thiripura Sundari*, Dr.A.Padmapriya**
Structure Of Customer Relationship Management Systems In Data Mining S.Thiripura Sundari*, Dr.A.Padmapriya** *(Department of Computer Science and Engineering, Alagappa University, Karaikudi-630 003 **
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Five predictive imperatives for maximizing customer value
Five predictive imperatives for maximizing customer value Applying predictive analytics to enhance customer relationship management Contents: 1 Introduction 4 The five predictive imperatives 13 Products
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
Data Mining and Database Systems: Where is the Intersection?
Data Mining and Database Systems: Where is the Intersection? Surajit Chaudhuri Microsoft Research Email: [email protected] 1 Introduction The promise of decision support systems is to exploit enterprise
An effective approach to preventing application fraud. Experian Fraud Analytics
An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3 1 P.G. Student, Department of CSE, Govt.College of Engineering, Thirunelveli, India.
KNOWLEDGE BASE DATA MINING FOR BUSINESS INTELLIGENCE
KNOWLEDGE BASE DATA MINING FOR BUSINESS INTELLIGENCE Dr. Ruchira Bhargava 1 and Yogesh Kumar Jakhar 2 1 Associate Professor, Department of Computer Science, Shri JagdishPrasad Jhabarmal Tibrewala University,
Web Mining as a Tool for Understanding Online Learning
Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA [email protected] James Laffey University of Missouri Columbia Columbia, MO USA [email protected]
A Survey on Web Research for Data Mining
A Survey on Web Research for Data Mining Gaurav Saini 1 [email protected] 1 Abstract Web mining is the application of data mining techniques to extract knowledge from web data, including web documents,
Hybrid Website, Based on Web Usage Mining Technique and Using Association Rules
Hybrid Website, Based on Web Usage Mining Technique and Using Association Rules Ali Seyed Shirkhorshidi, Hema Latha Krishna Nair, Yahya AL-Murtadha Asia Pacific University of Technology and Innovation
Association Rules Mining: A Recent Overview
GESTS International Transactions on Computer Science and Engineering, Vol.32 (1), 2006, pp. 71-82 Association Rules Mining: A Recent Overview Sotiris Kotsiantis, Dimitris Kanellopoulos Educational Software
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
"BIG DATA A PROLIFIC USE OF INFORMATION"
Ojulari Moshood Cameron University - IT4444 Capstone 2013 "BIG DATA A PROLIFIC USE OF INFORMATION" Abstract: The idea of big data is to better use the information generated by individual to remake and
Overview, Goals, & Introductions
Improving the Retail Experience with Predictive Analytics www.spss.com/perspectives Overview, Goals, & Introductions Goal: To present the Retail Business Maturity Model Equip you with a plan of attack
Maintaining a Competitive Edge with Interaction Analysis
Explore Maintaining a Competitive Edge with Interaction Analysis Winner of the Frost & Sullivan 2007 Product Innovation Award Autonomy etalk White Paper Maintaining a Competitive Edge with Interaction
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
Top 5 Reasons to Outsource MORE!
Top 5 Reasons to Outsource MORE! This report is available for download on Teleperformance s website. For more information about articles and white papers, go to: www.teleperformance.com Why Companies Are
E-business Management System Based on Coordinated Center for Dealer
The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 533 E-business Based on Coordinated Center for Dealer Ding Zhang 1, Jingwen An 1, Zhongqing Cheng 2 1 School of Management,
Utility-Based Fraud Detection
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Utility-Based Fraud Detection Luis Torgo and Elsa Lopes Fac. of Sciences / LIAAD-INESC Porto LA University of
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Data Mining to Recognize Fail Parts in Manufacturing Process
122 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.7, NO.2 August 2009 Data Mining to Recognize Fail Parts in Manufacturing Process Wanida Kanarkard 1, Danaipong Chetchotsak
Applying CRM in Information Product Pricing
Applying CRM in Information Product Pricing Wenjing Shang, Hong Wu and Zhimin Ji School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing100876, P.R. China [email protected]
Warranty Fraud Detection & Prevention
Warranty Fraud Detection & Prevention Venky Rao North American Predictive Analytics Segment Leader Agenda IBM SPSS Predictive Analytics for Warranties: Case Studies Why address the Warranties process:
A Data Mining Framework for Optimal Product Selection in Retail Supermarket Data: The Generalized PROFSET Model
arxiv:cs.db/0112013 v1 11 Dec 2001 A Data Mining Framework for Optimal Product Selection in Retail Supermarket Data: The Generalized PROFSET Model Tom Brijs Bart Goethals Gilbert Swinnen Koen Vanhoof Geert
MBA 8473 - Data Mining & Knowledge Discovery
MBA 8473 - Data Mining & Knowledge Discovery MBA 8473 1 Learning Objectives 55. Explain what is data mining? 56. Explain two basic types of applications of data mining. 55.1. Compare and contrast various
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
Business Intelligence
Business Intelligence Data Mining and Data Warehousing Dominik Ślęzak [email protected] www.infobright.com Research Interests Data Warehouses, Knowledge Discovery, Rough Sets Machine Intelligence,
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH Ali Ahmadian Ramaki 1, Reza Asgari 2 and Reza Ebrahimi Atani 3 1 Department of Computer Engineering, Guilan University, Rasht, Iran [email protected]
Brand Loyalty in Insurance Companies
Journal of Economic Development, Management, IT, Finance and Marketing, 4(1), 12-26, March 2012 12 Brand Loyalty in Insurance Companies Sancharan Roy, (B.E., MBA) Assistant Professor, St. Joseph's College
5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK
5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK CUSTOMER JOURNEY Technology is radically transforming the customer journey. Today s customers are more empowered and connected
Solve Your Toughest Challenges with Data Mining
IBM Software Business Analytics IBM SPSS Modeler Solve Your Toughest Challenges with Data Mining Use predictive intelligence to make good decisions faster Solve Your Toughest Challenges with Data Mining
Business and Process Improvement Specialists. Ai Virtual Assistant Sourcing and Operational Delivery. Sales & Service Centre Efficiency & Performance
DELIVER GREAT SERVICE THAT COSTS LESS Business and Process Improvement Specialists Ai Virtual Assistant Sourcing and Operational Delivery Sales & Service Centre Efficiency & Performance Working in Partnership
Potential Value of Data Mining for Customer Relationship Marketing in the Banking Industry
Advances in Natural and Applied Sciences, 3(1): 73-78, 2009 ISSN 1995-0772 2009, American Eurasian Network for Scientific Information This is a refereed journal and all articles are professionally screened
Integrating Pattern Mining in Relational Databases
Integrating Pattern Mining in Relational Databases Toon Calders, Bart Goethals, and Adriana Prado University of Antwerp, Belgium {toon.calders, bart.goethals, adriana.prado}@ua.ac.be Abstract. Almost a
Safe Harbor Statement
Defining a Roadmap to Big Data Success Robert Stackowiak, Oracle Vice President, Big Data 17 November 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is
Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
Enhancing Education Quality Assurance Using Data Mining. Case Study: Arab International University Systems.
Enhancing Education Quality Assurance Using Data Mining Case Study: Arab International University Systems. Faek Diko Arab International University Damascus, Syria [email protected] Zaidoun Alzoabi Arab
How the Past Changes the Future of Fraud
How the Past Changes the Future of Fraud Addressing payment card fraud with models that evaluate multiple risk dimensions through intelligence Card fraud costs the U.S. card payments industry an estimated
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
