10 resultados para Fraud detection

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development and application of computational data mining techniques in financial fraud detection and business failure prediction has become a popular cross-disciplinary research area in recent times involving financial economists, forensic accountants and computational modellers. Some of the computational techniques popularly used in the context of - financial fraud detection and business failure prediction can also be effectively applied in the detection of fraudulent insurance claims and therefore, can be of immense practical value to the insurance industry. We provide a comparative analysis of prediction performance of a battery of data mining techniques using real-life automotive insurance fraud data. While the data we have used in our paper is US-based, the computational techniques we have tested can be adapted and generally applied to detect similar insurance frauds in other countries as well where an organized automotive insurance industry exists.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper describes a rapid technique: communal analysis suspicion scoring (CASS), for generating numeric suspicion scores on streaming credit applications based on implicit links to each other, over both time and space. CASS includes pair-wise communal scoring of identifier attributes for applications, definition of categories of suspiciousness for application-pairs, the incorporation of temporal and spatial weights, and smoothed k-wise scoring of multiple linked application-pairs. Results on mining several hundred thousand real credit applications demonstrate that CASS reduces false alarm rates while maintaining reasonable hit rates. CASS is scalable for this large data sample, and can rapidly detect early symptoms of identity crime. In addition, new insights have been observed from the relationships between applications.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Investigation of the role of hypothesis formation in complex (business) problem solving has resulted in a new approach to hypothesis generation. A prototypical hypothesis generation paradigm for management intelligence has been developed, reflecting a widespread need to support management in such areas as fraud detection and intelligent decision analysis. This dissertation presents this new paradigm and its application to goal directed problem solving methodologies, including case based reasoning. The hypothesis generation model, which is supported by a dynamic hypothesis space, consists of three components, namely, Anomaly Detection, Abductive Reasoning, and Conflict Resolution models. Anomaly detection activates the hypothesis generation model by scanning anomalous data and relations in its working environment. The respective heuristics are activated by initial indications of anomalous behaviour based on evidence from historical patterns, linkages with other cases, inconsistencies, etc. Abductive reasoning, as implemented in this paradigm, is based on joining conceptual graphs, and provides an inference process that can incorporate a new observation into a world model by determining what assumptions should be added to the world, so that it can explain new observations. Abductive inference is a weak mechanism for generating explanation and hypothesis. Although a practical conclusion cannot be guaranteed, the cues provided by the inference are very beneficial. Conflict resolution is crucial for the evaluation of explanations, especially those generated by a weak (abduction) mechanism.The measurements developed in this research for explanation and hypothesis provide an indirect way of estimating the ‘quality’ of an explanation for given evidence. Such methods are realistic for complex domains such as fraud detection, where the prevailing hypothesis may not always be relevant to the new evidence. In order to survive in rapidly changing environments, it is necessary to bridge the gap that exists between the system’s view of the world and reality.Our research has demonstrated the value of Case-Based Interaction, which utilises an hypothesis structure for the representation of relevant planning and strategic knowledge. Under, the guidance of case based interaction, users are active agents empowered by system knowledge, and the system acquires its auxiliary information/knowledge from this external source. Case studies using the new paradigm and drawn from the insurance industry have attracted wide interest. A prototypical system of fraud detection for motor vehicle insurance based on an hypothesis guided problem solving mechanism is now under commercial development. The initial feedback from claims managers is promising.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Artificial neural networks and statistical techniques like decision trees, discriminant analysis, logistic regression and survival analysis play a crucial role in Business Intelligence. These predictive analytical tools exploit patterns found in historical data to make predictions about future events. In this paper we have shown some recent developments of a few of these techniques in financial and business intelligence applications like fraud detection, bankruptcy prediction and credit rating scoring.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is on adaptive real-time searching of credit application data streams for identity crime with many search parameters. Specifically, we concentrated on handling our domain-specific adversarial activity problem with the adaptive Communal Analysis Suspicion Scoring (CASS) algorithm. CASS's main novel theoretical contribution is in the formulation of State-of- Alert (SoA) which sets the condition of reduced, same, or heightened watchfulness; and Parameter-of-Change (PoC) which improves detection ability with pre-defined parameter values for each SoA. With pre-configured SoA policy and PoC strategy, CASS determines when, what, and how much to adapt its search parameters to ongoing adversarial activity. The above approach is validated with three sets of experiments, where each experiment is conducted on several million real credit applications and measured with three appropriate performance metrics. Significant improvements are achieved over previous work, with the discovery of some practical insights of adaptivity into our domain.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Forged and tempered digital images become increasingly common on Facebook to aid computer frauds. The situation is worsened as many users can use a phone to take a photo and upload it to Facebook within two clicks, which highlights the need of image forensics for the cyber fraud cases. In this paper, we show the existence of the Facebook image filter which automatically changes the Facebook photos and consequently challenges the validity of forensic results. We aim to enable forensic investigators to relate a seized camera and a Facebook image. Specifically, we utilize intrinsic sensor pattern noise produced by a camera's lens to derive forensically useful information as Photo Response Non-Uniformity (PRNU) patterns. We propose to compare the PRNU patterns of a Facebook image and the flat field images produced by the candidate cameras. And we conclude this method to be effective by successfully identifying the correct iPhone from a list of four for a given Face book image.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The extent and type of financial fraud committed by listed firms in China, stock market reaction to the detection and announcement of fraud, and the association between institutional ownership and financial fraud are the subjects of this article. Using fraud data from the period between 2001 and 2011, the authors find wide occurrences of fraud and a strong negative market reaction on the announcement date, particularly in cases of serious fraud. Fraud is more likely to occur at firms that have a smaller proportion of independent directors and at poorly performing firms. Firms with higher mutual fund ownership subsequently have fewer incidences of fraud. Our results reports by the authors indicate that ownership by independent institutions, such as mutual funds, serves as an effective monitoring mechanism, deterring fraud and enhancing corporate governance in Chinese capital markets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this paper is to examine whether anonymous reporting channels (ARCs) are effective in detecting fraud against companies. Fraud, which comprises predominantly asset misappropriation, represents a key operational risk and a major cost to organisations (ACFE, http://www.acfe.com/uploadedFiles/ACFE_Website/Content/rttn/2012-report-to-nations.pdf, 2012; KPMG, http://www.kpmg.com/AU/en/IssuesAndInsights/ArticlesPublications/Fraud-Survey/Documents/fraud-bribery-corruption-survey-2012v2.pdf, 2012). The fraud triangle (incentives, opportunities and attitudes) provides a framework for developing our understanding of how ARCs can increase detection of fraud. Using publicly listed company survey data collected by KPMG in Australia—where ARCs are not mandated—we find a positive association between ARCs and reported fraud. These results indicate that ARCs are effective in detecting fraud. Additional analysis reveals that small firms derive the greatest benefit from adopting ARCs. We also find that independent boards do not directly influence the detection of fraud, but companies with independent boards detect more fraud because they implement ARCs.