Detecting patterns of fraudulent behavior in forensic accounting *
|
|
|
- Corey Benson
- 10 years ago
- Views:
Transcription
1 Detecting patterns of fraudulent behavior in forensic accounting * Boris Kovalerchuk 1, Evgenii Vityaev 2 1 Dept. of Computer Science, Central Washington University Ellensburg, WA 98926, USA [email protected] 2 Institute of Mathematics, Russian Academy of Sciences, Novosibirsk, , Russia [email protected] Abstract. Often evidence from a single case does not reveal any suspicious patterns to aid investigations in forensic accounting and other forensic fields. In contrast, correlation of sets of evidence from several cases with suitable background knowledge may reveal suspicious patterns. Link Discovery (LD) has recently emerged as a promising new area for such tasks. Currently LD mostly relies on deterministic graphical techniques. Other relevant techniques are Bayesian probabilistic and causal networks. These techniques need further development to handle rare events. This paper combines first-order logic (FOL) and probabilistic semantic inference (PSI) to address this challenge. Previous research has shown this approach is computationally efficient and complete for statistically significant patterns. This paper shows that a modified method can be successful for discovering rare patterns. The method is illustrated with an example of discovery of suspicious patterns. 1. Introduction Forensic accounting is a field that deals with possible illegal and fraudulent financial transactions [3]. One current focus in this field is the analysis of funding mechanisms for terrorism where clean money (e.g., charity money) and laundered money are both used [1] for a variety of activities including acquisition and production of weapons and their precursors. In contrast, traditional illegal businesses and drug trafficking make dirty money appear clean [1]. There are many indicators of possible suspicious (abnormal) transactions in traditional illegal business. These include (1) the use of several related and/or unrelated accounts before money is moved offshore, (2) a lack of account holder concern with commissions and fees [2], (3) correspondent banking transactions to offshore shell banks [2], (4) transferor insolvency after the transfer or insolvency at the time of * Kovalerchuk, B., Vityaev, E., Detecting patterns of fraudulent behavior in forensic accounting, In Proc. of the Seventh International Conference Knowledge-based Intelligent Information and Engineering on Systems, Oxford, UK, Sept, 2003, part 1, pp
2 transfer, (5) wire transfers to new places [4], (6) transactions without identifiable business purposes, and (7) transfers for less than reasonably equivalent value [5]. Some of these indicators can be easily implemented as simple flags in software. However, indicators such as wire transfers to new places produce a large number of 'false positive' suspicious transactions. Thus, the goal is to develop more sophisticated mechanisms based on interrelations among many indicators. To meet these challenges link analysis software for forensic accountants, attorneys and fraud examiners such as NetMap, Analyst's Notebook and others [4-7] have been and are being developed. Here we concentrate on fraudulent activities that are closely related to terrorism such as transactions without identifiable business purposes. The problem is that often an individual transaction does not reveal that it has no identifiable business purpose or that it was done for no reasonably equivalent value. Thus, we develop a technique that searches for suspicious patterns in the form of more complex combinations of transactions and other evidence using background knowledge. The specific tasks in automated forensic accounting related to transaction monitoring systems are the identification of suspicious and unusual electronic transactions and the reduction in the number of 'false positive' suspicious transactions by using inexpensive, simple rule-based systems, customer profiling, statistical techniques, neural networks, fuzzy logic and genetic algorithms [1]. This paper combines the advantages of first-order logic (FOL) and probabilistic semantic inference (PSI) [8] for these tasks. We discover the following transaction patterns from ordinary or distributed databases that are related to terrorism and other illegal activities: a normal pattern (NP) a Manufacturer Buys a Precursor & Sells the Result of manufacturing (MBPSR); a suspicious (abnormal) pattern (SP) a Manufacturer Buys a Precursor & Sells the same Precursor (MBPSP); a suspicious pattern (SP) a Trading Co. Buys a Precursor and Sells the same Precursor Cheaper (TBPSPC ); a normal pattern (NP) -- a Conglomerate Buys a Precursor & Sells the Result of manufacturing (CBPSR). 2. Example Consider the following example. Table 1 contains transactions with the attributes seller, buyer, item sold, amount, cost and date and Table 2 describes the types of companies and items sold. Table 1. Transactions records Record ID Seller Buyer Item sold Amount Cost Date 1 Aaa Ttt Td 1t $100 03/05/99 2 Bbb Ccc Td 2t $100 04/06/98 3 Ttt Qqq Td 1t $100 05/05/99 4 Qqq Ccc Pd 1.5t $100 05/05/99 5 Ccc Ddd Td 2.0t $200 08/18/98 6 Ddd Ccc Pd 3.0t $400 09/18/98
3 We assemble a new Table 3 from Tables 1 and 2 to look for suspicious patterns. For instance, row 1 in Table 3 is a combination of row 1 from Table 1 and rows 1 and 4 from Table 2 that contain types of companies and items. Table 3 does not indicate suspicious patterns immediately, but we can generate pairs of records from Table 3 that can be mapped to patterns listed above using a pattern-matching algorithm A. The algorithm A analyzes pairs of records in Table 3. For simplicity, we can assume that a new table with 18 attributes is formed to represent pairs of records from Table 3. Each record in Table 3 contains nine attributes. Table 2. Company types and item types Record ID Company name Company type Item Item type in process PP (seller/buyer) 1 Aaa Trading Td Precursor 2 Bbb Unknown Pd Product 3 Ccc Trading Rd Precursor 4 Ttt Manufacturing 5 Ddd Manufacturing 6 Qqq Conglomerate Table 3. Combined data records Record ID Seller Seller type Buyer Buyer type Item sold Item type Amount Price Date Aaa trading Ttt Manuf. Td Precursor 1t $100 03/05/99 2 Bbb unknown Ccc Trading Td Precursor 2t $100 04/06/98 3 Ttt manuf. Qqq Congl. Td Precursor 1t $100 05/05/99 4 Qqq Congl. Ccc Trading pd Product 1.5t $100 06/23/99 5 Ccc Trading Ddd Manuf. td Precursor 2.0t $200 08/18/98 6 Ddd Manuf Ccc Trading pd Product 3.0t $400 09/18/98 Thus, we map pairs of records in Table 3 into patterns: A(#5,#6)=MBPSR, that is a pair of records #5 and #6 from Table 3 indicates a normal pattern -- a manufacturer bought a precursor and sold product ; In contrast, two other pairs indicate suspicious patterns: A(#1,#3)= MBPSP, that is a manufacturer bought a precursor and sold the same precursor; A(#2,#5)= TBPSPC, that is a trading company bought a precursor and sold the same precursor cheaper. Now let us assume that we have a database of 10 5 transactions as in Table 1. Then Table 3 will have all pairs of them, i.e., about 5*10 9. Statistical computations can reveal a distribution of these pairs into patterns as shown in Table 4. Table 4. Statistical characteristics Pattern Type Frequency, % Approximate number of cases MBPSR normal *5*10 9
4 MBPSP suspicious CBPSR normal *5*10 9 TBPSPC suspicious Thus, we have 300 suspicious transactions. This is 0.3% of the total number of transactions and about 6*10-6 % of the total number of pairs analyzed. It shows that finding such transactions is like finding a needle in a haystack. The automatic generation of patterns/hypotheses descriptions is a major challenge. This includes generating MBPSP and TBPSPC descriptions automatically. We do not assume that we already know that MBPSP and TBPSPC are suspicious. One can ask: Why do we need to discover these definitions (rules) automatically? A manual way can work if the number of types of suspicious patterns is small and an expert is available. For multistage money-laundering transactions, this is difficult to accomplish manually. It is possible that many laundering transactions were processed before money went offshore or was used for illegal purposes. Our approach to identify suspicious patterns is to discover highly probable patterns and then negate them. We suppose that a highly probable pattern should be normal. In more formal terms, the main hypothesis (MH) is: If Q is a highly probable pattern (>0.9) then Q constitutes a normal pattern and not(q) can constitute a suspicious (abnormal) pattern. Table 5 outlines an algorithm based on this hypothesis to find suspicious patterns. The algorithm is based first-order logic and probabilistic semantic inference [8]. Table 5. Algorithm steps for finding suspicious patterns based on the main hypotheis (MH) 1 Discover patterns in a database such as MBPSR in a form MBP SR, that is, as a Horn clause A 1 &A 2 & &A n-1 A n (see [8] for mathematical detail). 1.1.Generate a set of predicates Q={Q 1,Q 2,,Q m } and first order logic sentences A 1,A 2,,A n based on those predicates. For instance, Q 1 and A 1 could be defined as follows: Q 1 (x)=1 x is a trading company and A 1 (a,b)= Q 1 (a)& Q 1 (b), where a and b are companies Compute a probability P that pattern A 1 &A 2 & &A n-1 A n is true on a given database. This probability is computed as a conditional probability of conclusion A n under assumption that If-part A 1 &A 2 & &A n-1 is true, that is P(A n /A 1 &A 2 & &A n-1 )= =N(A n /A 1 &A 2 & &A n-1 )/N(A 1 &A 2 & &A n-1 &A n ), where N(A n /A 1 &A 2 & &A n-1 ) is the number of A n /A 1 &A 2 & &A n-1 cases and N(A 1 &A 2 & &A n-1 &A n ) is the number of A 1 &A 2 & &A n-1 &A n cases Compare P(A 1 &A 2 & &A n-1 A n ) with a threshold T, say T=0.9. If P(A 1 &A 2 & &A n-1 A n )>T then a database is normal. A user can select another value of threshold T, e.g., T=0.98. If P(MBP SR)=0.998, then DB is normal for 0.98 too Test statistical significance of P(A 1 &A 2 & &A n-1 A n ). We use the Fisher criterion [8] to test statistical significance. 2 Negate patterns. If database is normal (P(A 1 &A 2 & &A n-1 A n ) >T=0.9 and A 1 &A 2 & &A n-1 A n is statistically significant then negate A 1 &A 2 & &A n-1 A n to produce a negated pattern A 1 &A 2 & &A n-1 A n. 3 Compute the probability of the negated pattern P(A 1 &A 2 & &A n-1 A n ) = 1- P( A 1 &A 2 & &A n-1 A n ). In the example above, it is =0.002.
5 4 Analyze database records that satisfy A 1 &A 2 & &A n-1 & A n. for possible false alarm. Really suspicious records satisfy the property A 1 &A 2 & &A n- & A n, but normal records also can satisfy this property. To minimize computations we generate randomly a representative part of all possible pairs of records such as shown in Table 4. Then an algorithm finds highly probable (P>T) Horn clauses. Next, these clauses are negated as described in Table 5. After that, a full search of records in the database is performed to find records that satisfy the negated clauses. According to our main hypothesis (MH) this set of records will contain suspicious records and the search for red flag transactions will be significantly narrowed. Use of the property of monotonicity is another tool we use to minimize computations. The idea is based on a simple observation: If A1&A 2 & &A n-1 B represents a suspicious pattern then A 1 &A 2 & &A n-1 &A n B is suspicious too. Thus, one does not need to test clause A 1 &A 2 & &A n-1 &A n B if A 1 &A 2 & &A n-1 B is already satisfied. 3. Hypothesis Testing One of the technical aims of this paper is to design tests and simulation experiments for this thesis. We designed two test experiments: 1. Test 1: Generate a relatively large Table 4 that includes a few suspicious records MBPSP and TBPSPC. Run a data-mining algorithm (MMDR [8]) to discover as many highly probable patterns as possible. Check that patterns MBPSR and CBPSR are among them. Negate MBPSR and CBPSR to produce patterns MBPSP and TBPSPC. Run patterns MBPSP and TBPSPC to find all suspicious records consistent with them. 2. Test 2: Check that other highly probable patterns found are normal; check that their negations are suspicious patterns (or contain suspicious patterns). A positive result of Test 1 will confirm our hypothesis (statement) for MBPSR and CBPSR and their negations. Test 2 will confirm our statement for a wider set of patterns. In this paper we report results of conducting Test 1. The word can is the most important in our statement/hypothesis. If the majority of not(q) patterns are consistent with an informal and intuitive concept of suspicious pattern then this hypothesis will be valid. If only a few of the not(q) rules (patterns) are intuitively suspicious then the hypothesis will not be of much use even if it is formally valid. A method for Test 1 contains several steps: Create a Horn clause: MBP SR. Compute a probability that MBP SR is true on a given database. Probability P(MBP SR) is computed as a conditional probability P(SR/MBP) = N(SR/MBP)/N(MBP), where N(SR/MBP) is the number of MBPSR cases and N(MBP) is the number of MBP cases. Compare P(MBP SR) with 0.9. If P(MBP SR)>0.9 then a database is normal. For instance, P(SR/MBP) can be Test the statistical significance of P(MBP SR). We use Fisher criterion [8] to test statistical significance.
6 If the database is normal (P(MBP SR) >T=0.9) and if P(MBP SR) is statistically significant then negate MBP=>SR to produce (MBP SR). Threshold T can have another value too. Compute probability for a negated pattern P(MBP (SR)). In the example above it is = Analyze database records that satisfy MBP and (SR). For instance, really suspicious MBPSP records satisfy property MBP and (SR), but other records also can satisfy this property too. For instance, MBPBP records (a manufacturer bought a precursor twice) can be less suspicious than MBPSP. Thus, if the probability P(SR/MBP) is high (0.9892) and statistically significant then a normal pattern MBPSR is discovered. Then suspicious cases are among the cases where MBP is true but the conclusion SR is not true. We collect these cases and analyze the actual content of the then-part of the clause MBP =>SR. The set SR can contain a variety of entities. Some of them can be very legitimate cases. Therefore, this approach does not guarantee that we find only suspicious cases, but the method narrows the search to a much smaller set of records. In the example above the search is narrowed to 0.2% of the total cases. 4. Experiment We generated two synthesized databases with attributes shown in Table 4. The first one does not have suspicious records MBPSP and TBPSPC. A second database contains few such records. Using a Machine Method for Discovery Regularities (MMDR) [8] we were able to discover MBPSR and CBPSR normal patterns in both databases. Table 6. Database with suspicious cases Pattern Probability P(A 1 &A 2 & &A n-1 A n ) In database without suspicious cases In database with suspicious cases Normal pattern, MBP SR > 0.95 >0. 9 Negated pattern MBP (SR) < < 0.1 Normal pattern CBP=> SR >0.95 > 0.9 Negated pattern CBP (SR) <0.05 < 0.05 The MMDR method worked without any advanced information that these patterns are in data. In the database without suspicious cases, negated patterns MBP (SR) and CBP (SR) contain cases that are not suspicious. For instance, MBP BP, that is, a manufacturer that already bought precursors (transaction record 1) bought them again (transaction record 2). The difference in probabilities for MBP (SR) in the two databases points out actually suspicious cases. In our computational experiments, the total number of regularities found is 41. The number of triples of companies (i.e., pairs of transactions) captured by regularities is 1531 out of total 2772 tri-
7 ples generated in the experiment. Table 7 depicts some statistically significant regularities found. Attributes New_Buyer type and New_Item_type belong to the second record in a pair of records (R1,R2). Individual records are depicted in table 3. Table 7. Computational experiment: examples of discovered regularities # Discovered regularity Frequency 1 IF Seller_type = Manufacturing AND Buyer type = Manufacturing THEN New_Item_type = product 2 IF Seller_type = Manufacturing AND New_Buyer type = Manufacturing THEN New_Item_type = product 3 IF Seller_type = Manufacturing AND Item_type = precursor THEN New_Item_type = product 4 IF Seller_type = Manufacturing AND Price_Compare = 1 AND New_Buyer type = Trading THEN New_Item_type = product 5 IF Seller_type = Manufacturing AND Price_Compare = 1 AND Item_type = precursor THEN New_Item_type = product 72 / (6 + 72) = / (6 + 72) = / ( ) = / (2 + 47) = / (5 + 79) = Conclusion The method outlined in this paper advances pattern discovery methods that deal with complex (non-numeric) evidences and involve structured objects, text and data in a variety of discrete and continuous scales (nominal, order, absolute and so on). The paper shows potential application of the technique for forensic accounting. The technique combines first-order logic (FOL) and probabilistic semantic inference (PSI). The approach has been illustrated with an example of discovery of suspicious patterns in forensic accounting. References 1. Prentice, M., Forensic Services - tracking terrorist networks,2002, Ernst & Young LLP, UK, tracking_terrorist_networks 2. Don Vangel and Al James Terrorist Financing: Cleaning Up a Dirty Business, the issue of Ernst & Young's financial services quarterly, Spring Terrorist_Financing_Cleaning_Up_a_Dirty_Business 3. IRS forensic accounting by TPI, 2002, 4. Chabrow, E. Tracking The Terrorists, Information week, Jan. 14, 2002, 5. How Forensic Accountants Support Fraud Litigation, 2002, 6. i2 Applications-Fraud Investigation Techniques,
8 7. Evett, IW., Jackson, G. Lambert, JA, McCrossan, S. The impact of the principles of evidence interpretation on the structure and content of statements. Science & Justice 2000; 40: Kovalerchuk, B., Vityaev, E., Data Mining in Finance: Advances in Relational and Hybrid Methods, Kluwer, 2000
Correlation of Complex Evidence in Forensic Accounting Using Data Mining
Journal of Forensic Accounting 1524-5586 / Vol.VIII (2007), pp. 2007 R.T. Edwards, Inc. Printed in U.S.A. Correlation of Complex Evidence in Forensic Accounting Using Data Mining Boris Kovalerchuk, 1*
DATA MINING IN FINANCE
DATA MINING IN FINANCE Advances in Relational and Hybrid Methods by BORIS KOVALERCHUK Central Washington University, USA and EVGENII VITYAEV Institute of Mathematics Russian Academy of Sciences, Russia
Machine Learning and Data Mining. Fundamentals, robotics, recognition
Machine Learning and Data Mining Fundamentals, robotics, recognition Machine Learning, Data Mining, Knowledge Discovery in Data Bases Their mutual relations Data Mining, Knowledge Discovery in Databases,
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
Unsupervised Outlier Detection in Time Series Data
Unsupervised Outlier Detection in Time Series Data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College of Information
Big Data s Big Impact In Financial Investigations
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Big Data s Big Impact In Financial Investigations
Presented By Greg Baldwin
ANTI-MONEY LAUNDERING COMPLIANCE OFFICER TRAINING Presented By Greg Baldwin THE ANTI-MONEY LAUNDERING COMPLIANCE OFFICER We re going to cover: Basis for the requirement to have a Compliance Officer The
Medical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud
Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)
Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
Dan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications
Symbolic Methodology in Numeric Data Mining: Relational Techniques for Financial Applications Boris Kovalerchuk Central Washington University, Ellensburg, WA, USA, [email protected] Evgenii Vityaev Institute
Data Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
ECLT 5810 E-Commerce Data Mining Techniques - Introduction. Prof. Wai Lam
ECLT 5810 E-Commerce Data Mining Techniques - Introduction Prof. Wai Lam Data Opportunities Business infrastructure have improved the ability to collect data Virtually every aspect of business is now open
CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System
CASE STUDIES Examples of analytical experiences detecting fraud and abuse with RiskTracker Account Activity Analysis System The following are descriptions of actual situations encountered by BANKDetect
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Data Mining Part 5. Prediction
Data Mining Part 5. Prediction 5.1 Spring 2010 Instructor: Dr. Masoud Yaghini Outline Classification vs. Numeric Prediction Prediction Process Data Preparation Comparing Prediction Methods References Classification
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
FRAUD DETECTION IN MOBILE TELECOMMUNICATION
FRAUD DETECTION IN MOBILE TELECOMMUNICATION Fayemiwo Michael Adebisi 1* and Olasoji Babatunde O 1. 1 Department of Mathematical Sciences, College of Natural and Applied Science, Oduduwa University, Ipetumodu,
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of
The HUGIN FRAUD DETECTION MANAGEMENT (FDM) Solution
The HUGIN FRAUD DETECTION MANAGEMENT (FDM) Solution Prevent insurance fraud with advanced, predictive analytics from HUGIN EXPERT Fraud - an expensive and unrelenting challenge................... 1 THE
Chapter 11. Managing Knowledge
Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion. Video Case 2: Tour: Alfresco: Open Source Document Management System Video Case 3: L'Oréal: Knowledge
Recognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
UNDERSTANDING MONEY LAUNDERING
UNDERSTANDING MONEY LAUNDERING Preface In light of the international concerns growing on money laundering and the financing of terrorist activities, many countries have taken rigorous measures to curb
Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
High Frequency Trading using Fuzzy Momentum Analysis
Proceedings of the World Congress on Engineering 2 Vol I WCE 2, June 3 - July 2, 2, London, U.K. High Frequency Trading using Fuzzy Momentum Analysis A. Kablan Member, IAENG, and W. L. Ng. Abstract High
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Application of Hidden Markov Model in Credit Card Fraud Detection
Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, 400011 Email: [email protected]
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
Real Estate Customer Relationship Management using Data Mining Techniques
Real Estate Customer Relationship Management using Data Mining Techniques Tianya Hou and Andy K.D. WONG (852) 27667805 [email protected] and [email protected] Department of Building and Real
TYPOLOGY 13 MONEY LAUNDERING THROUGH CASINOS APPROVED BY THE DECISION OF THE GOVERNOR OF THE CENTRAL BANK OF ARMENIA NO 1/41A FROM JANUARY 24, 2014
APPROVED BY THE DECISION OF THE GOVERNOR OF THE CENTRAL BANK OF ARMENIA NO 1/41A FROM JANUARY 24, 2014 ANNEX TYPOLOGY 13 MONEY LAUNDERING THROUGH CASINOS YEREVAN 2014 1 Contents Chapter 1: Scope of Application...
Neural Network Stock Trading Systems Donn S. Fishbein, MD, PhD Neuroquant.com
Neural Network Stock Trading Systems Donn S. Fishbein, MD, PhD Neuroquant.com There are at least as many ways to trade stocks and other financial instruments as there are traders. Remarkably, most people
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
SPC Data Visualization of Seasonal and Financial Data Using JMP WHITE PAPER
SPC Data Visualization of Seasonal and Financial Data Using JMP WHITE PAPER SAS White Paper Table of Contents Abstract.... 1 Background.... 1 Example 1: Telescope Company Monitors Revenue.... 3 Example
Recognizing Informed Option Trading
Recognizing Informed Option Trading Alex Bain, Prabal Tiwaree, Kari Okamoto 1 Abstract While equity (stock) markets are generally efficient in discounting public information into stock prices, we believe
Unsupervised Fraud Detection in Time Series data
DEWS26 4A-i13 Unsupervised Fraud Detection in Time Series data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College
SAS Fraud Framework for Banking
SAS Fraud Framework for Banking Including Social Network Analysis John C. Brocklebank, Ph.D. Vice President, SAS Solutions OnDemand Advanced Analytics Lab SAS Fraud Framework for Banking Agenda Introduction
Managing Knowledge and Collaboration
Chapter 11 Managing Knowledge and Collaboration 11.1 2010 by Prentice Hall LEARNING OBJECTIVES Assess the role of knowledge management and knowledge management programs in business. Describe the types
Artificial Intelligence and Asymmetric Information Theory. Tshilidzi Marwala and Evan Hurwitz. [email protected], hurwitze@gmail.
Artificial Intelligence and Asymmetric Information Theory Tshilidzi Marwala and Evan Hurwitz [email protected], [email protected] University of Johannesburg Abstract When human agents come together to
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:
Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires
Data Mining for Fun and Profit
Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools
Machine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer
Machine Learning Chapter 18, 21 Some material adopted from notes by Chuck Dyer What is learning? Learning denotes changes in a system that... enable a system to do the same task more efficiently the next
Data Mining: Overview. What is Data Mining?
Data Mining: Overview What is Data Mining? Recently * coined term for confluence of ideas from statistics and computer science (machine learning and database methods) applied to large databases in science,
A FUZZY LOGIC APPROACH FOR SALES FORECASTING
A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many
How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network
2012 Payment Card Threat Report The second annual study of unencrypted payment card storage Automated Attacks and Card Data Handling In 2011, data breaches increased 42% and as such, last year was reported
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
Direct Marketing of Insurance. Integration of Marketing, Pricing and Underwriting
Direct Marketing of Insurance Integration of Marketing, Pricing and Underwriting As insurers move to direct distribution and database marketing, new approaches to the business, integrating the marketing,
Predictive modelling around the world 28.11.13
Predictive modelling around the world 28.11.13 Agenda Why this presentation is really interesting Introduction to predictive modelling Case studies Conclusions Why this presentation is really interesting
NEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
Relational Methodology for Data Mining and Knowledge Discovery
Relational Methodology for Data Mining and Knowledge Discovery Vityaev E.E.* 1, Kovalerchuk B.Y. 2 1 Sobolev Institute of Mathematics SB RAS, Novosibirsk State University, Novosibirsk, 630090, Russia.
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
AML & Mortgage Fraud Compliance Program v. 08.2013 ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM
ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM Version: 2.0 dated 08.2013 TABLE OF CONTENTS AML & Mortgage Fraud Compliance Program 1.0 PURPOSE AND SCOPE... 3 2.0 APPLICABLE REGULATIONS AND
FIUs AND TERRORIST FINANCING ANALYSIS - A review by the Egmont Group of sanitised cases related to Terrorist Financing
FIUs AND TERRORIST FINANCING ANALYSIS - A review by the Egmont Group of sanitised cases related to Terrorist Financing Overview This document contains indicators of suspicious transactions that might be
Graph Mining for Detection of a Large Class of Financial Crimes
Graph Mining for Detection of a Large Class of Financial Crimes Czeslaw Jedrzejek 1, Maciej Falkowski 1, Jaroslaw Bak 1 Poznan University of Technology, Institute of Control and Information Engineering,
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
FFIEC BSA/AML Examination Manual. Four Key Components of a Suspicious Activity Monitoring Program
FFIEC BSA/AML Examination Manual Four Key Components of a Suspicious Activity Monitoring Program 1 2 IDENTIFICATION OF SUSPICIOUS ACTIVITY 3 Unusual Activity Identification Employee Identification Law
Predictive Modeling in Workers Compensation 2008 CAS Ratemaking Seminar
Predictive Modeling in Workers Compensation 2008 CAS Ratemaking Seminar Prepared by Louise Francis, FCAS, MAAA Francis Analytics and Actuarial Data Mining, Inc. www.data-mines.com [email protected]
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
Life Settlements. Life Settlements Presentation
Life Settlements Brian Forman Actuaries Club of the Southwest June 10, 2010 Life Settlements Presentation History Sale of Policies Mathematics of Life Settlements Pricing of Life Settlements Current Marketplace
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
Boris Kovalerchuk Dept. of Computer Science Central Washington University USA [email protected]
Boris Kovalerchuk Dept. of Computer Science Central Washington University USA [email protected] 1 I support the optimistic view: Scientific rigor is compatible with the high uncertainty and the combination
Data Mining and KDD: A Shifting Mosaic. Joseph M. Firestone, Ph.D. White Paper No. Two. March 12, 1997
1 of 11 5/24/02 3:50 PM Data Mining and KDD: A Shifting Mosaic By Joseph M. Firestone, Ph.D. White Paper No. Two March 12, 1997 The Idea of Data Mining Data Mining is an idea based on a simple analogy.
(NASDAQ: MNGA) Magnegas Corporation. Bullish. Investment Highlights
(NASDAQ: MNGA) Bullish Overview Recent Price $1.41 52 Week Range $0.40 - $2.45 1 Month Range $1.16 - $1.70 Avg Daily Volume 2.97MM PE Ratio n/a Earnings Per Share Year EPS 2014(E) n/a Capitalization Shares
EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data Zakia Ferdousi 1 and Akira Maeda 2 1 Graduate School of Science and Engineering, Ritsumeikan University, 1-1-1, Noji-Higashi, Kusatsu,
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Data Mining Report. DHS Privacy Office Response to House Report 108-774
Data Mining Report Response to House Report 108-774 Report to Congress on the Impact of Data Mining Technologies on Privacy and Civil Liberties Respectfully submitted Maureen Cooney Acting Chief Privacy
A Software Tool for. Automatically Veried Operations on. Intervals and Probability Distributions. Daniel Berleant and Hang Cheng
A Software Tool for Automatically Veried Operations on Intervals and Probability Distributions Daniel Berleant and Hang Cheng Abstract We describe a software tool for performing automatically veried arithmetic
How To Get A Computer Engineering Degree
COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME
Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics
Paper 3323-2015 Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics ABSTRACT Stephen Overton, Ben Zenick, Zencos Consulting Network diagrams in SAS
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
An Introduction to Advanced Analytics and Data Mining
An Introduction to Advanced Analytics and Data Mining Dr Barry Leventhal Henry Stewart Briefing on Marketing Analytics 19 th November 2010 Agenda What are Advanced Analytics and Data Mining? The toolkit
ElegantJ BI. White Paper. The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis
ElegantJ BI White Paper The Competitive Advantage of Business Intelligence (BI) Forecasting and Predictive Analysis Integrated Business Intelligence and Reporting for Performance Management, Operational
