Business Case Development for Credit and Debit Card Fraud Re- Scoring Models

Size: px
Start display at page:

Download "Business Case Development for Credit and Debit Card Fraud Re- Scoring Models"

Transcription

1 Business Case Development for Credit and Debit Card Fraud Re- Scoring Models Kurt Gutzmann Managing Director & Chief ScienAst GCX Advanced Analy.cs LLC October 20,

2 IntroducAon & Topic List We will discuss how to develop a business case for payment card fraud detecaon analyacs, illustrated by a case studies with re- scoring models Topics Part I Performance Measures & Business Case Principles 1. Fraud detecaon as a binary classifier problem 2. Performance measures of classifiers 3. The Receiver OperaAng CharacterisAc Curve (ROC) and Area Under the Curve 4. Cost / Benefit FuncAon and the Payoff Matrix of a Fraud Detector Part II Two Case Studies of Re- Scoring Model Performance 1. Re- Scoring Models for Credit and Debit Card transacaons 2. Case Study 1: Endogenous Debit Card Re- Scoring Model Performance and Benefits 3. Case Study 2: Exogenous / MulA- Channel Credit Card Re- Scoring Model Performance and Benefits 4. OperaAonal Deployment of Re- Scoring Models in Card Fraud Scoring System Architectures 5. QuesAons & Answers October 20,

3 Fraud detection as a binary classifier problem There are two major types of fraud VicAm Fraud, a 3 rd party takes money or assets from a bank customer or the bank Stolen credit card usage Internet banking account takeovers First Party or Swindler Fraud, a criminal directly interacts with the bank to extract assets or money Fraudulent loan applicaaons Worthless items deposited at ATMs (empty envelopes) In this presentaaon, we are detecang vicam fraud in consumer credit card and debit card transacaons A transacaon must be classified into one of two categories, Fraud or Not Fraud This is a binary classifier problem October 20,

4 ConAngency Tables of Classifiers The operaaon of the binary classifier produces four possible outcomes A transacaon classified as fraud generates a fraud alert (possibly declining the transacaon) A transacaon classified as good is accepted as business as usual A conangency table represents the outcomes ConAngency table notaaon: TP : True PosiAve, a fraudulent transacaon correctly classified as a fraud FP : False PosiAve, a good transacaon incorrectly classified as a fraud FN : False NegaAve, a fraudulent transacaon incorrectly classified as a good one TN : True NegaAve, a good transacaon correctly classified as a good one Various Sums, TPFP = TP + FP = P etc. Frauds Not Totals Frauds Alerts TP FP TP+FP = P Not Alerted FN TN FN+TN = N Totals TP+FN FP+TN TP+FP+TN+FN October 20,

5 Performance Measures of Classifiers True posiave rate (TPR) is also called the detec.on rate If measured in dollars, it is the dollar detec.on rate Other performance measures are available, e.g. accuracy, misclassificaaon rate, posiave predicave value, negaave predicave value, and specificity, but are not generally meaningful in the fraud detecaon domain October 20,

6 Receiver OperaAng CharacterisAc (ROC) Curves The ROC is a plot in unit space [0,1], [0,1] of the true posiave rate (detecaon rate) on the y- axis versus the false posiave rate on the x- axis Scoring classifiers generate ROCs Rule- based classifiers do not have a ROC per se, but only a single operaang point The ROC generates a curve that for any reasonable classifier will capture an area of at least 0.5 This is the area under curve (AUC) metric of a ROC curve A classifier is considered predicave if AUC > 0.75 All else equal, a classifier with a greater AUC is generally preferred to another For fraud detectors, the AUC below an FPR of 0.05 is most important October 20,

7 Cost / Benefit FuncAon and the Payoff Matrix of a Fraud Detector $1, ($9.12) ($1,400.00) $ $207, ($13,935.36) $193, ($96,600.00) $249, $153, $110, $235, $346, Outcome Costs or Benefits Unit Payoff Matrix ConAngency Table Example $303, of apempted fraud Payoff matrix as shown at leq DetecAon rate is 149/ (149+69) = 68% OperaAonal cost of the detector is $110K Benefit is $207K Net Benefit is $346K Do Nothing alternaave net benefit is - $69K Net Benefit October 20,

8 Economic OpAmizaAon of the Alert Score Threshold Various alert score thresholds allocate TP, FP, FN, TN in differing proporaons to the conangency table Combined with the payoff matrix, this generates a cost/benefit curve that can be opamized with respect to the alert threshold score OperaAonal constraints must also be considered, however October 20,

9 Determining the Best Business Case by Net Present Value 1. Develop the ROC of the detector 2. IdenAfy the op.mal score threshold by inspecaon 3. Establish the payoff matrix for outcomes 4. Tabulate the conangency table at the opamal threshold 5. Compute the periodic net economic benefit (e.g. monthly) 6. Establish the planning horizon (e.g. 3 years) 7. Establish the cash flow discount rate (e.g. 10%) 8. EsAmate system implementaaon one- Ame costs 9. EsAmate other system operaaonal recurring costs 10. Develop the cash flow series 11. Compute the NPV of the cash flow series 12. Perform sensiavity analyses to determine robustness of the business case Example Cash Flow Profile October 20,

10 CASE STUDIES 1. Debit Card Rescoring 2. Credit Card MulAchannel Data October 20, Kurt Gutzmann Managing Director GCX Advanced Analy.cs LLC 10

11 TransacAon Classifiers, Authorizers, and Re- Scoring Models Basic Scoring System TransacAon Primary Fraud Scoring Engine TransacAon Advice Accept Reject Other Re- Scoring System Improved Score TransacAon Primary Fraud Scoring Engine Improved TransacAon Advice Accept Addi.onal Data Re- Scoring Model Reject Other October 20,

12 Case 1: Re- Scoring Model Performance Improvement versus ExisAng Debit Card ExisAng Dollar DetecAon Rate was 44%, Improved to 60% at the same False PosiAve Rate Re- Scoring model provided a wide range of operaaonal points to trade off alert volume vs detecaon rate Re- Scoring reduced fraud dollar losses by 32% versus the previous model Savings are proporaonal to business volume; for this regional bank this model generated a net benefit of $6M over a two year planning horizon October 20,

13 Case 2: MulAchannel Credit Card Residual Model Performance Model uses enterprise customer data in addiaon to credit card transacaon data DetecAon performance is on the residual fraud, so all detecaon is incremental improvement Model detects 78% of fraud otherwise undetected by exisang system at FPR of 3%, AUC = 0.92 Other risk score vectors for debit card and DDA arise from this mulachannel approach Annual increase in fraud dollars detected across debit card, credit card, and DDA was $48M October 20,

14 Simple OperaAonal Deployment of Rescoring Models Most vendor soluaons for card fraud detecaon have a business rules engine, business rules management system, or policy management component for ad hoc applicaaon of rules aqer the iniaal score is generated The BRMS usually has the capability to call a web service, a library funcaon, or shared object, as well The rescoring model is placed into the BRMS as a final rule that adjusts the score of the transacaon and provides the advice Deployment is simple and straighvorward Leverages exisang risk scoring applicaaon features BRMS October 20,

15 Summary 1. The ROC shows the performance envelope of a fraud detector 2. The payoff matrix and ROC generate the business case for the detector 3. Rescoring model deployment is straighvorward, leveraging the exisang fraud plavorm 4. Rescoring models for card payments have economically apracave business cases Q&A October 20,

Performance Measures for Machine Learning

Performance Measures for Machine Learning Performance Measures for Machine Learning 1 Performance Measures Accuracy Weighted (Cost-Sensitive) Accuracy Lift Precision/Recall F Break Even Point ROC ROC Area 2 Accuracy Target: 0/1, -1/+1, True/False,

More information

Evaluation & Validation: Credibility: Evaluating what has been learned

Evaluation & Validation: Credibility: Evaluating what has been learned Evaluation & Validation: Credibility: Evaluating what has been learned How predictive is a learned model? How can we evaluate a model Test the model Statistical tests Considerations in evaluating a Model

More information

Knowledge Discovery and Data Mining

Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining Lecture 15 - ROC, AUC & Lift Tom Kelsey School of Computer Science University of St Andrews http://tom.home.cs.st-andrews.ac.uk [email protected] Tom Kelsey ID5059-17-AUC

More information

Health Care and Life Sciences

Health Care and Life Sciences Sensitivity, Specificity, Accuracy, Associated Confidence Interval and ROC Analysis with Practical SAS Implementations Wen Zhu 1, Nancy Zeng 2, Ning Wang 2 1 K&L consulting services, Inc, Fort Washington,

More information

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,

More information

Performance Measures in Data Mining

Performance Measures in Data Mining Performance Measures in Data Mining Common Performance Measures used in Data Mining and Machine Learning Approaches L. Richter J.M. Cejuela Department of Computer Science Technische Universität München

More information

Online Performance Anomaly Detection with

Online Performance Anomaly Detection with ΘPAD: Online Performance Anomaly Detection with Tillmann Bielefeld 1 1 empuxa GmbH, Kiel KoSSE-Symposium Application Performance Management (Kieker Days 2012) November 29, 2012 @ Wissenschaftszentrum Kiel

More information

System Aware Cyber Security Architecture

System Aware Cyber Security Architecture System Aware Cyber Security Architecture Rick A. Jones October, 2011 Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system

More information

Dynamic Predictive Modeling in Claims Management - Is it a Game Changer?

Dynamic Predictive Modeling in Claims Management - Is it a Game Changer? Dynamic Predictive Modeling in Claims Management - Is it a Game Changer? Anil Joshi Alan Josefsek Bob Mattison Anil Joshi is the President and CEO of AnalyticsPlus, Inc. (www.analyticsplus.com)- a Chicago

More information

Plastic Card Fraud Detection using Peer Group analysis

Plastic Card Fraud Detection using Peer Group analysis Plastic Card Fraud Detection using Peer Group analysis David Weston, Niall Adams, David Hand, Christopher Whitrow, Piotr Juszczak 29 August, 2007 29/08/07 1 / 54 EPSRC Think Crime Peer Group - Peer Group

More information

Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham

Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham Copyright 2014 Splunk Inc. Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham Head of Grid CompuAng OperaAons & Support Credit Suisse Disclaimer During the course of this presentaaon, we may make forward-

More information

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,

More information

MACHINE LEARNING IN HIGH ENERGY PHYSICS

MACHINE LEARNING IN HIGH ENERGY PHYSICS MACHINE LEARNING IN HIGH ENERGY PHYSICS LECTURE #1 Alex Rogozhnikov, 2015 INTRO NOTES 4 days two lectures, two practice seminars every day this is introductory track to machine learning kaggle competition!

More information

ViviSight: A Sophisticated, Data-driven Business Intelligence Tool for Churn and Loan Default Prediction

ViviSight: A Sophisticated, Data-driven Business Intelligence Tool for Churn and Loan Default Prediction ViviSight: A Sophisticated, Data-driven Business Intelligence Tool for Churn and Loan Default Prediction Barun Paudel 1, T.H. Gopaluwewa 1, M.R.De. Waas Gunawardena 1, W.C.H. Wijerathna 1, Rohan Samarasinghe

More information

CSC574 - Computer and Network Security Module: Intrusion Detection

CSC574 - Computer and Network Security Module: Intrusion Detection CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

1. Classification problems

1. Classification problems Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification

More information

Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World

Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World SpinifexIT Webinar Danielle Larocca, SpinifexIT Copyright 2014 SpinifexIT Pty Ltd. Questions How to submit a

More information

FICO Falcon Fraud Manager for Retail Banking

FICO Falcon Fraud Manager for Retail Banking FICO Falcon Fraud Manager for Retail Banking What can you do to protect the current account against fraud attacks? Martin Warwick Principal Consultant Fraud Solutions FICO May 2010 1 2010 Fair Isaac Corporation.

More information

Credit Analyzer. Potential score change: +19 12/10/2009. CreditXpert Credit Score Summary. Actions

Credit Analyzer. Potential score change: +19 12/10/2009. CreditXpert Credit Score Summary. Actions Page 1 of 8 Credit Analyzer Reports available for: TransUnion Experian Equifax Results for TransUnion For: Provided By: Mode: Rapid Rescore (Timeframe: Immediate) Credit Report Date: 12/03/2009 Disposable

More information

Data Mining - The Next Mining Boom?

Data Mining - The Next Mining Boom? Howard Ong Principal Consultant Aurora Consulting Pty Ltd Abstract This paper introduces Data Mining to its audience by explaining Data Mining in the context of Corporate and Business Intelligence Reporting.

More information

Take Charge of Credit Cards Note Taking Guide

Take Charge of Credit Cards Note Taking Guide 2.4.1.L1 Note taking guide Take Charge of Credit Cards Note Taking Guide Total Points Earned Total Points Possible Percentage What is credit? A credit card is a form of credit! What is interest? What is

More information

How To Cluster

How To Cluster Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main

More information

Data Mining Practical Machine Learning Tools and Techniques

Data Mining Practical Machine Learning Tools and Techniques Credibility: Evaluating what s been learned Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 5 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Issues: training, testing,

More information

PREDICTING SUCCESS IN THE COMPUTER SCIENCE DEGREE USING ROC ANALYSIS

PREDICTING SUCCESS IN THE COMPUTER SCIENCE DEGREE USING ROC ANALYSIS PREDICTING SUCCESS IN THE COMPUTER SCIENCE DEGREE USING ROC ANALYSIS Arturo Fornés [email protected], José A. Conejero [email protected] 1, Antonio Molina [email protected], Antonio Pérez [email protected],

More information

BBM467 Data Intensive ApplicaAons

BBM467 Data Intensive ApplicaAons Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] Problem How do you scale up applicaaons? Run jobs processing 100 s of terabytes

More information

- centred on human factors (ie. ergonomics, desire to have a new computer system) - Are there unused computer terminals in the company now?

- centred on human factors (ie. ergonomics, desire to have a new computer system) - Are there unused computer terminals in the company now? Feasibility and Cost-Benefit Analysis Feasibility Operational Feasibility - centred on human factors (ie. ergonomics, desire to have a new computer system) - Is the problem worth solving? - How do the

More information

Performance Metrics. number of mistakes total number of observations. err = p.1/1

Performance Metrics. number of mistakes total number of observations. err = p.1/1 p.1/1 Performance Metrics The simplest performance metric is the model error defined as the number of mistakes the model makes on a data set divided by the number of observations in the data set, err =

More information

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business

More information

STATISTICA Formula Guide: Logistic Regression. Table of Contents

STATISTICA Formula Guide: Logistic Regression. Table of Contents : Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary

More information

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University

More information

The nuts and bolts of Agile practices, terms and metrics. Agile Primer. www.rallydev.com. 2013 Rally So5ware Development, Inc.

The nuts and bolts of Agile practices, terms and metrics. Agile Primer. www.rallydev.com. 2013 Rally So5ware Development, Inc. Agile Primer The nuts and bolts of Agile practices, terms and metrics 1 What is All the Buzz About? Agile is documented to help large projects cut Ame- to- market by 50% and increase producavity by 25%

More information

Projektgruppe. Categorization of text documents via classification

Projektgruppe. Categorization of text documents via classification Projektgruppe Steffen Beringer Categorization of text documents via classification 4. Juni 2010 Content Motivation Text categorization Classification in the machine learning Document indexing Construction

More information

How Eastern Bank Uses Big Data to Better Serve & Protect its Customers!

How Eastern Bank Uses Big Data to Better Serve & Protect its Customers! How Eastern Bank Uses Big Data to Better Serve & Protect its Customers! Brian Griffith Principal Data Engineer Agenda! Introduction Eastern Bank & the banking industry Data architecture and our big data

More information

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections

More information

Scoring (manual, automated, automated with manual review)

Scoring (manual, automated, automated with manual review) A. Source and Extractor Author, Year Reference test PMID RefID Index test 1 Key Question(s) Index test 2 Extractor B. Study description Sampling population A Recruitment Multicenter? Enrollment method

More information

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose This document explains the benefits of using Risk Based Authentication (RBA) a dynamic method of cardholder authentication

More information

FIS Virtual Back-Office. Dean H. Scholl

FIS Virtual Back-Office. Dean H. Scholl FIS Virtual Back-Office Dean H. Scholl FIS Virtual Back-Office Overview FIS Virtual Back-Office is an end to end outsourced delivery model FIS Virtual Back-Office can help mitigate variable costs FIS Virtual

More information

Reacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska

Reacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska Reacting to the Challenges: Business Strategies for Future Success Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska Adams Bank & Trust Family Owned for 95 Years $525 Million

More information

Mining the Software Change Repository of a Legacy Telephony System

Mining the Software Change Repository of a Legacy Telephony System Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,

More information

Detecting Credit Card Fraud

Detecting Credit Card Fraud Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within

More information

Measuring Intrusion Detection Capability: An Information-Theoretic Approach

Measuring Intrusion Detection Capability: An Information-Theoretic Approach Measuring Intrusion Detection Capability: An Information-Theoretic Approach Guofei Gu, Prahlad Fogla, David Dagon, Boris Škorić Wenke Lee Philips Research Laboratories, Netherlands Georgia Institute of

More information

Execu&ve Coaching Program Design Checklist

Execu&ve Coaching Program Design Checklist Execu&ve Coaching Program Design Checklist Anyone responsible for execu1ve coaching in his/her organiza1on will benefit from this checklist. We have compiled all the key ques1ons that must be asked for

More information

Products Currency Supply Chain Management

Products Currency Supply Chain Management Products Currency Supply Chain Management Today s Enterprises Need Intelligent and Integrated Solutions to Optimize Currency Levels, Reduce Expenses and Improve Control Products The financial services

More information

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System CASE STUDIES Examples of analytical experiences detecting fraud and abuse with RiskTracker Account Activity Analysis System The following are descriptions of actual situations encountered by BANKDetect

More information

with CO-OP Total Revelation.

with CO-OP Total Revelation. CO-OP Total Revelation Understand and influence debit behavior with CO-OP Total Revelation. Improve the profitability of your debit and ATM portfolios by uncovering hidden opportunities right in your own

More information

Data Mining Algorithms Part 1. Dejan Sarka

Data Mining Algorithms Part 1. Dejan Sarka Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses

More information

Quality and Complexity Measures for Data Linkage and Deduplication

Quality and Complexity Measures for Data Linkage and Deduplication Quality and Complexity Measures for Data Linkage and Deduplication Peter Christen and Karl Goiser Department of Computer Science, Australian National University, Canberra ACT 0200, Australia {peter.christen,karl.goiser}@anu.edu.au

More information

Recruitment Process Outsourcing

Recruitment Process Outsourcing Recruitment Process Outsourcing What, When and Why Some ideas to get you thinking about RPO What is Recruitment Process Outsourcing (RPO)? 2 What is Recruitment Process Outsourcing (RPO)? A client- centric

More information

The Relationship Between Precision-Recall and ROC Curves

The Relationship Between Precision-Recall and ROC Curves Jesse Davis [email protected] Mark Goadrich [email protected] Department of Computer Sciences and Department of Biostatistics and Medical Informatics, University of Wisconsin-Madison, 2 West Dayton Street,

More information

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon UMACHA Navigating Payments 2014 October 8, 2014 Who We Are Claudia

More information

Data Mining - Evaluation of Classifiers

Data Mining - Evaluation of Classifiers Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

The Total Economic Impact of iovation ReputationManager

The Total Economic Impact of iovation ReputationManager Prepared for iovation The Total Economic Impact of iovation ReputationManager Single Company Analysis Financial Services Project Directors: Jon Erickson and Michelle Salazar TABLE OF CONTENTS Executive

More information

Datamining. Gabriel Bacq CNAMTS

Datamining. Gabriel Bacq CNAMTS Datamining Gabriel Bacq CNAMTS In a few words DCCRF uses two ways to detect fraud cases: one which is fully implemented and another one which is experimented: 1. Database queries (fully implemented) Example:

More information

Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance

Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance Jesús M. Pérez, Javier Muguerza, Olatz Arbelaitz, Ibai Gurrutxaga, and José I. Martín Dept. of Computer

More information

1. If you wish to accumulate $140,000 in 13 years, how much must you deposit today in an account that pays an annual interest rate of 14%?

1. If you wish to accumulate $140,000 in 13 years, how much must you deposit today in an account that pays an annual interest rate of 14%? Chapter 2 - Sample Problems 1. If you wish to accumulate $140,000 in 13 years, how much must you deposit today in an account that pays an annual interest rate of 14%? 2. What will $247,000 grow to be in

More information

Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy

Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy 1 Agenda Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy 2 October 29: Verint Acquires Victrio Who is Verint? (NASDAQ:VRNT)

More information

Oklahoma MasterCard Debit Card. SMART for You. Foster Care Program. Smart for Who? Smart for You. Oklahoma MasterCard Debit Card

Oklahoma MasterCard Debit Card. SMART for You. Foster Care Program. Smart for Who? Smart for You. Oklahoma MasterCard Debit Card Oklahoma MasterCard Debit Card SMART for You Foster Care Program Smart for Who? Smart for You. Oklahoma MasterCard Debit Card Frequently Asked Questions about the Oklahoma Department of Human Services

More information

Fraud Detection for Online Retail using Random Forests

Fraud Detection for Online Retail using Random Forests Fraud Detection for Online Retail using Random Forests Eric Altendorf, Peter Brende, Josh Daniel, Laurent Lessard Abstract As online commerce becomes more common, fraud is an increasingly important concern.

More information

MAXIMIZING RETURN ON DIRECT MARKETING CAMPAIGNS

MAXIMIZING RETURN ON DIRECT MARKETING CAMPAIGNS MAXIMIZING RETURN ON DIRET MARKETING AMPAIGNS IN OMMERIAL BANKING S 229 Project: Final Report Oleksandra Onosova INTRODUTION Recent innovations in cloud computing and unified communications have made a

More information

Enabling Delivery of Enterprise Applications for Financial Services Companies

Enabling Delivery of Enterprise Applications for Financial Services Companies Enabling Delivery of Enterprise Applications for Financial Services Companies Executive Summary Computing platforms revolutionize the way we work. Mainframes The First Platform - 1955 to 1980 Personal

More information

Risk Management of the financial Sector. Periklis Dontas Executive Director, Calculus Global Services Aybike Aker - Senior Consultant, FICO

Risk Management of the financial Sector. Periklis Dontas Executive Director, Calculus Global Services Aybike Aker - Senior Consultant, FICO Risk Management of the financial Sector Periklis Dontas Executive Director, Calculus Global Services Aybike Aker - Senior Consultant, FICO Agenda Advisory Services - The future of the financial sector

More information

The Total Economic Impact Of SAS Customer Intelligence Solutions Real-Time Decision Manager

The Total Economic Impact Of SAS Customer Intelligence Solutions Real-Time Decision Manager A Forrester Total Economic Impact Study Commissioned By SAS Project Director: Dean Davison May 2014 The Total Economic Impact Of SAS Customer Intelligence Solutions Real-Time Decision Manager Table Of

More information

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]

More information

BBM467 Data Intensive ApplicaAons

BBM467 Data Intensive ApplicaAons Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] Why Graphs? Why now? Big Data is the trend! NOSQL is the answer. Everyone is Talking

More information

Department of Financial Services Superintendent s Regulations

Department of Financial Services Superintendent s Regulations Department of Financial Services Superintendent s Regulations Part 504 BANKING DIVISION TRANSACTION MONITORING AND FILTERING PROGRAM REQUIREMENTS AND CERTIFICATIONS (Statutory authority: Banking Law 37(3)(4)

More information

To comment on these KPIs: email [email protected]

To comment on these KPIs: email abeers@aicpa.org GARTNER/EBRC KPI INITIATIVE This initiative will identify and develop industry standard measures that are predictive of corporate performance. There is a difference between identifying such measures and

More information

Answers for Merchant Service RFP Questions

Answers for Merchant Service RFP Questions Answers for Merchant Service RFP Questions The Will County Treasurer s Office has received several questions concerning our RFP for Merchant Services and Credit Card Processing. Here are our replies. We

More information

An Approach to Detect Spam Emails by Using Majority Voting

An Approach to Detect Spam Emails by Using Majority Voting An Approach to Detect Spam Emails by Using Majority Voting Roohi Hussain Department of Computer Engineering, National University of Science and Technology, H-12 Islamabad, Pakistan Usman Qamar Faculty,

More information

TOP TRUMPS Comparisons of how to pay for goods and services online

TOP TRUMPS Comparisons of how to pay for goods and services online Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face

More information

HIGH YIELD CHECKING. EXPLANATION OF SOME OF OUR KEY SERVICES AND CHARGES Here are details about High Yield Checking services.

HIGH YIELD CHECKING. EXPLANATION OF SOME OF OUR KEY SERVICES AND CHARGES Here are details about High Yield Checking services. EXPLANATION OF SOME OF OUR KEY SERVICES AND CHARGES Here are details about High Yield Checking services. KEY ACCOUNT TERMS AND CHARGES: Monthly Service Charge: No monthly service charge. Includes free

More information

Solutions. Item Processing Solutions Streamlined Check Processing From Capture to Clearing

Solutions. Item Processing Solutions Streamlined Check Processing From Capture to Clearing Solutions Item Processing Solutions Streamlined Check Processing From Capture to Clearing Solutions The continued migration to image-based processing, combined with the need for cost reduction and risk

More information

Chapter 6. The stacking ensemble approach

Chapter 6. The stacking ensemble approach 82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The government agency that oversees the banking system and is responsible for the conduct

More information

BREAK-EVEN ANALYSIS. In your business planning, have you asked questions like these?

BREAK-EVEN ANALYSIS. In your business planning, have you asked questions like these? BREAK-EVEN ANALYSIS In your business planning, have you asked questions like these? How much do I have to sell to reach my profit goal? How will a change in my fixed costs affect net income? How much do

More information

SAP, Credit Cards and the Bird that Talks Too Much. Ertunga Arsal

SAP, Credit Cards and the Bird that Talks Too Much. Ertunga Arsal SAP, Credit Cards and the Bird that Talks Too Much Ertunga Arsal Agenda Business Processes SAP Systems Exploit Demo SAP Credit Cards and Birds External Payment SoluAons on SAP How to Stay Secure About

More information

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing

More information

Voyager Network Fleet Card <PARTNER> Add Partner logo here

Voyager Network Fleet Card <PARTNER> Add Partner logo here Voyager Network Fleet Card FLEET July 30, 2013 CARD PROGRAM Add Partner logo here Add Partner logo here FLEET CARD PROGRAM July 30, 2013 Fleet Card Industry Trends Fleet Managers want

More information