Business Case Development for Credit and Debit Card Fraud Re- Scoring Models



Similar documents
Performance Measures for Machine Learning

Evaluation & Validation: Credibility: Evaluating what has been learned

Knowledge Discovery and Data Mining

Health Care and Life Sciences

FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS

Performance Measures in Data Mining

Online Performance Anomaly Detection with

System Aware Cyber Security Architecture

Dynamic Predictive Modeling in Claims Management - Is it a Game Changer?

Plastic Card Fraud Detection using Peer Group analysis

Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

MACHINE LEARNING IN HIGH ENERGY PHYSICS

ViviSight: A Sophisticated, Data-driven Business Intelligence Tool for Churn and Loan Default Prediction

CSC574 - Computer and Network Security Module: Intrusion Detection

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

1. Classification problems

Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World

FICO Falcon Fraud Manager for Retail Banking

Credit Analyzer. Potential score change: /10/2009. CreditXpert Credit Score Summary. Actions

Data Mining - The Next Mining Boom?

Take Charge of Credit Cards Note Taking Guide

How To Cluster

Data Mining Practical Machine Learning Tools and Techniques

PREDICTING SUCCESS IN THE COMPUTER SCIENCE DEGREE USING ROC ANALYSIS

BBM467 Data Intensive ApplicaAons

- centred on human factors (ie. ergonomics, desire to have a new computer system) - Are there unused computer terminals in the company now?

Performance Metrics. number of mistakes total number of observations. err = p.1/1

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank

STATISTICA Formula Guide: Logistic Regression. Table of Contents

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

The nuts and bolts of Agile practices, terms and metrics. Agile Primer Rally So5ware Development, Inc.

Projektgruppe. Categorization of text documents via classification

How Eastern Bank Uses Big Data to Better Serve & Protect its Customers!

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Scoring (manual, automated, automated with manual review)

ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE

FIS Virtual Back-Office. Dean H. Scholl

Reacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska

Mining the Software Change Repository of a Legacy Telephony System

Detecting Credit Card Fraud

Measuring Intrusion Detection Capability: An Information-Theoretic Approach

Execu&ve Coaching Program Design Checklist

Products Currency Supply Chain Management

CASE STUDIES. Examples of analytical experiences detecting fraud and abuse with. RiskTracker. Account Activity Analysis System

with CO-OP Total Revelation.

Data Mining Algorithms Part 1. Dejan Sarka

Quality and Complexity Measures for Data Linkage and Deduplication

Recruitment Process Outsourcing

The Relationship Between Precision-Recall and ROC Curves

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

Data Mining - Evaluation of Classifiers

FFIEC CONSUMER GUIDANCE

The Total Economic Impact of iovation ReputationManager

Datamining. Gabriel Bacq CNAMTS

Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance

1. If you wish to accumulate $140,000 in 13 years, how much must you deposit today in an account that pays an annual interest rate of 14%?

Agenda. Announcement: Verint Acquires Victrio Victrio Solutions Client Results in Deployment Critical Success Factors Verint + Victrio Synergy

Oklahoma MasterCard Debit Card. SMART for You. Foster Care Program. Smart for Who? Smart for You. Oklahoma MasterCard Debit Card

Fraud Detection for Online Retail using Random Forests

MAXIMIZING RETURN ON DIRECT MARKETING CAMPAIGNS

Enabling Delivery of Enterprise Applications for Financial Services Companies

Risk Management of the financial Sector. Periklis Dontas Executive Director, Calculus Global Services Aybike Aker - Senior Consultant, FICO

The Total Economic Impact Of SAS Customer Intelligence Solutions Real-Time Decision Manager

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

BBM467 Data Intensive ApplicaAons

Department of Financial Services Superintendent s Regulations

To comment on these KPIs:

Answers for Merchant Service RFP Questions

An Approach to Detect Spam s by Using Majority Voting

TOP TRUMPS Comparisons of how to pay for goods and services online

HIGH YIELD CHECKING. EXPLANATION OF SOME OF OUR KEY SERVICES AND CHARGES Here are details about High Yield Checking services.

Solutions. Item Processing Solutions Streamlined Check Processing From Capture to Clearing

Chapter 6. The stacking ensemble approach

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

BREAK-EVEN ANALYSIS. In your business planning, have you asked questions like these?

SAP, Credit Cards and the Bird that Talks Too Much. Ertunga Arsal

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing Classifier

Voyager Network Fleet Card <PARTNER> Add Partner logo here

Transcription:

Business Case Development for Credit and Debit Card Fraud Re- Scoring Models Kurt Gutzmann Managing Director & Chief ScienAst GCX Advanced Analy.cs LLC www.gcxanalyacs.com October 20, 2011 www.gcxanalyacs.com 1

IntroducAon & Topic List We will discuss how to develop a business case for payment card fraud detecaon analyacs, illustrated by a case studies with re- scoring models Topics Part I Performance Measures & Business Case Principles 1. Fraud detecaon as a binary classifier problem 2. Performance measures of classifiers 3. The Receiver OperaAng CharacterisAc Curve (ROC) and Area Under the Curve 4. Cost / Benefit FuncAon and the Payoff Matrix of a Fraud Detector Part II Two Case Studies of Re- Scoring Model Performance 1. Re- Scoring Models for Credit and Debit Card transacaons 2. Case Study 1: Endogenous Debit Card Re- Scoring Model Performance and Benefits 3. Case Study 2: Exogenous / MulA- Channel Credit Card Re- Scoring Model Performance and Benefits 4. OperaAonal Deployment of Re- Scoring Models in Card Fraud Scoring System Architectures 5. QuesAons & Answers October 20, 2011 www.gcxanalyacs.com 2

Fraud detection as a binary classifier problem There are two major types of fraud VicAm Fraud, a 3 rd party takes money or assets from a bank customer or the bank Stolen credit card usage Internet banking account takeovers First Party or Swindler Fraud, a criminal directly interacts with the bank to extract assets or money Fraudulent loan applicaaons Worthless items deposited at ATMs (empty envelopes) In this presentaaon, we are detecang vicam fraud in consumer credit card and debit card transacaons A transacaon must be classified into one of two categories, Fraud or Not Fraud This is a binary classifier problem October 20, 2011 www.gcxanalyacs.com 3

ConAngency Tables of Classifiers The operaaon of the binary classifier produces four possible outcomes A transacaon classified as fraud generates a fraud alert (possibly declining the transacaon) A transacaon classified as good is accepted as business as usual A conangency table represents the outcomes ConAngency table notaaon: TP : True PosiAve, a fraudulent transacaon correctly classified as a fraud FP : False PosiAve, a good transacaon incorrectly classified as a fraud FN : False NegaAve, a fraudulent transacaon incorrectly classified as a good one TN : True NegaAve, a good transacaon correctly classified as a good one Various Sums, TPFP = TP + FP = P etc. Frauds Not Totals Frauds Alerts TP FP TP+FP = P Not Alerted FN TN FN+TN = N Totals TP+FN FP+TN TP+FP+TN+FN October 20, 2011 www.gcxanalyacs.com 4

Performance Measures of Classifiers True posiave rate (TPR) is also called the detec.on rate If measured in dollars, it is the dollar detec.on rate Other performance measures are available, e.g. accuracy, misclassificaaon rate, posiave predicave value, negaave predicave value, and specificity, but are not generally meaningful in the fraud detecaon domain October 20, 2011 www.gcxanalyacs.com 5

Receiver OperaAng CharacterisAc (ROC) Curves The ROC is a plot in unit space [0,1], [0,1] of the true posiave rate (detecaon rate) on the y- axis versus the false posiave rate on the x- axis Scoring classifiers generate ROCs Rule- based classifiers do not have a ROC per se, but only a single operaang point The ROC generates a curve that for any reasonable classifier will capture an area of at least 0.5 This is the area under curve (AUC) metric of a ROC curve A classifier is considered predicave if AUC > 0.75 All else equal, a classifier with a greater AUC is generally preferred to another For fraud detectors, the AUC below an FPR of 0.05 is most important October 20, 2011 www.gcxanalyacs.com 6

Cost / Benefit FuncAon and the Payoff Matrix of a Fraud Detector $1,390.88 ($9.12) ($1,400.00) $0.05 149 1528 69 4998254 $207,241.12 ($13,935.36) $193,305.76 ($96,600.00) $249,912.70 $153,312.70 $110,641.12 $235,977.34 $346,618.46 Outcome Costs or Benefits Unit Payoff Matrix ConAngency Table Example $303,841.12 of apempted fraud Payoff matrix as shown at leq DetecAon rate is 149/ (149+69) = 68% OperaAonal cost of the detector is $110K Benefit is $207K Net Benefit is $346K Do Nothing alternaave net benefit is - $69K Net Benefit October 20, 2011 www.gcxanalyacs.com 7

Economic OpAmizaAon of the Alert Score Threshold Various alert score thresholds allocate TP, FP, FN, TN in differing proporaons to the conangency table Combined with the payoff matrix, this generates a cost/benefit curve that can be opamized with respect to the alert threshold score OperaAonal constraints must also be considered, however October 20, 2011 www.gcxanalyacs.com 8

Determining the Best Business Case by Net Present Value 1. Develop the ROC of the detector 2. IdenAfy the op.mal score threshold by inspecaon 3. Establish the payoff matrix for outcomes 4. Tabulate the conangency table at the opamal threshold 5. Compute the periodic net economic benefit (e.g. monthly) 6. Establish the planning horizon (e.g. 3 years) 7. Establish the cash flow discount rate (e.g. 10%) 8. EsAmate system implementaaon one- Ame costs 9. EsAmate other system operaaonal recurring costs 10. Develop the cash flow series 11. Compute the NPV of the cash flow series 12. Perform sensiavity analyses to determine robustness of the business case Example Cash Flow Profile October 20, 2011 www.gcxanalyacs.com 9

CASE STUDIES 1. Debit Card Rescoring 2. Credit Card MulAchannel Data October 20, 2011 www.gcxanalyacs.com Kurt Gutzmann Managing Director GCX Advanced Analy.cs LLC www.gcxanalyacs.com 10

TransacAon Classifiers, Authorizers, and Re- Scoring Models Basic Scoring System TransacAon Primary Fraud Scoring Engine TransacAon Advice Accept Reject Other Re- Scoring System Improved Score TransacAon Primary Fraud Scoring Engine Improved TransacAon Advice Accept Addi.onal Data Re- Scoring Model Reject Other October 20, 2011 www.gcxanalyacs.com 11

Case 1: Re- Scoring Model Performance Improvement versus ExisAng Debit Card ExisAng Dollar DetecAon Rate was 44%, Improved to 60% at the same False PosiAve Rate Re- Scoring model provided a wide range of operaaonal points to trade off alert volume vs detecaon rate Re- Scoring reduced fraud dollar losses by 32% versus the previous model Savings are proporaonal to business volume; for this regional bank this model generated a net benefit of $6M over a two year planning horizon October 20, 2011 www.gcxanalyacs.com 12

Case 2: MulAchannel Credit Card Residual Model Performance Model uses enterprise customer data in addiaon to credit card transacaon data DetecAon performance is on the residual fraud, so all detecaon is incremental improvement Model detects 78% of fraud otherwise undetected by exisang system at FPR of 3%, AUC = 0.92 Other risk score vectors for debit card and DDA arise from this mulachannel approach Annual increase in fraud dollars detected across debit card, credit card, and DDA was $48M October 20, 2011 www.gcxanalyacs.com 13

Simple OperaAonal Deployment of Rescoring Models Most vendor soluaons for card fraud detecaon have a business rules engine, business rules management system, or policy management component for ad hoc applicaaon of rules aqer the iniaal score is generated The BRMS usually has the capability to call a web service, a library funcaon, or shared object, as well The rescoring model is placed into the BRMS as a final rule that adjusts the score of the transacaon and provides the advice Deployment is simple and straighvorward Leverages exisang risk scoring applicaaon features BRMS October 20, 2011 www.gcxanalyacs.com 14

Summary 1. The ROC shows the performance envelope of a fraud detector 2. The payoff matrix and ROC generate the business case for the detector 3. Rescoring model deployment is straighvorward, leveraging the exisang fraud plavorm 4. Rescoring models for card payments have economically apracave business cases Q&A October 20, 2011 www.gcxanalyacs.com 15