Your SlideShare is downloading. ×
Fraud Detection Presentation Forum
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Fraud Detection Presentation Forum

600
views

Published on

Supervised, unsupervised & hybrid techniques …

Supervised, unsupervised & hybrid techniques
Quality data
Design, implementation and evaluation
Visualization tools
E-business transactions
Best practices

Published in: Economy & Finance

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
600
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
24
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Fraud DetectionHernan Huwyler Madrid, Spain Fraud Risk Forum January 2013
  • 2. Who detects fraud? 33% 18% 14% 13% 6% • Fraud Risk • Internal Audit Management FRM • Suspicions• Tipoff • By ·chance” Transaction Reporting Controls PwCs Global economic crime survey 2012
  • 3. legitimate recordlegitimate record legitimate record fraudulent record out of 9 system flags
  • 4. Objective:maximize correct predictions and maintain incorrect predictions at an acceptable level
  • 5. Data Analysis Identify AnalyticsInternal Data Apply Analytics to DataIndustry Data Leads Refine
  • 6. Data Analysis 1 Branch A Branch C Invigilation Branch B HQ Branch D Business Branch A BI Branch C Intiligence Branch B Branch D
  • 7. Data Cleansing Algorithms Poor initial data conversion Factiva World Check System consolidations World Compliance Manual data entry Interfaces and Customized data baches cleansing rules
  • 8. Demos Vendors / Employees - Conflicts of interests Vendor Activity – Sequentiality and fetching Treasury – Unrecorded Payments Treasury – Abnormalities and triangulations Several sources of data Combined attributes Normalization
  • 9. Some techniques Statistical data modeling Data preprocessing Matching algorithms Peer group outliers and covariance Time-series analysis
  • 10. Open discussions Supervised, unsupervised & hybrid techniques Quality data Design, implementation and evaluation Visualization tools E-business transactions Best practices