SlideShare a Scribd company logo
1 of 8
Download to read offline
fraud at the door




Identify fraud at the first point of contact


          Risk Assessment Solution
Leveraging the RA7 system
    RA7 is a general name for a set of software tools and processes based on Nemesysco’s proprietary Layered
    Voice Analysis technology (LVA™), designed to detect and measure changes in the evaluated party’s emotional
    reactions.
    Leveraging 14 years of research
    and technology development, RA7
    system offers:
    •	 1 Complete solution - A multilevel
       centralized fraud prevention system
       providing dedicated interfaces to
       each user in your organization.
    •	 1 day agent’s training - Contact
       center agents are not required to
       become professional investigators
       - Agent’s training is as simple
       as “follow these onscreen
       instructions…”
    •	 100 % calls coverage - Capture        RA7 system is the first line of defense, designed to protect against
       and screen through ALL                most of the fraud attempts your organization is facing, with three goals
       telephone calls right where they      in mind:
       start, at the contact center level.
    •	 Streamline & standardize              To have a significant effect on your bottom line by saving on unrightfully
       investigation procedures - Ensure     paid claims, reducing your exposure with new customers and focusing
                                             investigation resources.
       all cases are initially treated the
       same, following internal protocols
                                             To improve customer service by reducing your legitimate customers’
       and guidelines you create and         wait time and provide superior service at their time of need.
       we operationalize..
    •	 Unbiased. Informing. Precise. -       To streamline the investigation process from the contact center agent
       Make impartial decisions based        to the decision makers - providing focused and accurate reporting
       on repeating, verifiable and          for the case review and investigation processes, all with as little as
       precise information.                  possible changes to the current procedures.



            RA7 IS
     AN INVESTIGATION                                                                        Topic 1         Topic 3

        FOCUS TOOL,                                                                          Topic 2          Question 1



             NOT
                                                                                                              Question 2
                                                                                             Topic 3
                                                                                                              Question 3
                                                                                             Topic 4


2     A “LIE DETECTOR”
                                                                                                              Question 4
Multilevel architecture
RA7 system is designed to streamline and expedite any risk analysis                                   Nemesysco’s RA7
process by providing (where applicable) different RA7 interfaces and tools
for your contact center agents, underwriters, claims adjusters, investigators
                                                                                                     can be used in many
and managers.                                                                                          financial fields:
The contact center level tools will guide the agent through proper interview                      •	 Insurance underwriting - Conduct
scripts1 designed to cross check and validate different relevant topics.                             a risk assessment and screening
Once the call has ended, full analysis is automatically performed on the
                                                                                                     in order to avoid in advance
recorded call and the Risk Report is generated.
                                                                                                     issuing inaccurate or high risk
The Claims ManagerUnderwriter screens will easily point to the irregular                            policies.
cases, highlighting the topics that are worthy of further investigation. Any                      •	 Claim submission and processing
case NOT identified as irregular (Low Risk cases) can be forwarded to the                            - Initial screening providing an
Fast Track process. Medium Risk cases, in which most likely the base story                           almost automatic decision.
is true but some of the details are inaccurate, can often be settled with a                       •	 Periodic “over the phone” status
follow-up call over the phone.                                                                       verification - Identify cases
                                                                                                     where a change of circumstances
If a case is determined to be High Risk it will undergo a third review
                                                                                                     occurred.
by professional investigators in the RA7 system. Investigators’ interface
                                                                                                  •	 Credit risk assessment - Verify
displays precise analysis for each voice segment, identifying the exact
topics to be clarified. In most cases, a direct phone call for clarification or                      the intentions and true financial
a short field visit can reveal relevant information that will determine the                          capabilities of your applicant.
actual case status and the fraud level it contains.


                                                                                                     Contact center level
                                                                                                          5-10 Minutes



                                                                                                       Management level
                                                                                                          1-5 Minutes


                                                                                                              Settlement
       Formal                         30 minutes                          Fast-track
    Investigation                (adjusting the claim)                     payment                                                                3
1
  “Proper” scripts are compiled based on Nemesysco’s questioning methodology in combination with your internal investigation department inputs,
made to collect an optimal first recorded account.
Conversation Scripts Design concept and use
    A typical case scenario
      in the RA7 system



                                                                 Agent’s display during a test session

    STEP 1: RA7 system is designed to      In order to achieve optimal analysis and automated report generation
    stop fraud at the door; meaning 100%   at the contact center level, RA7 utilizes carefully designed conversation
    of the relevant incoming calls will    scripts mechanism to guide the agent through the different expected
    be screened using the RA7 Agent’       scenarios. These scripts are custom made for each implementation, taking
    Real-Time mode. Once the test          into account the type of risks you face and your investigation unit needs.
    ends, the case report and analysis
    are created automatically and are
    added to the main database.            For each type of conversation scenario there will be a preplanned script
                                           design that is comprised of 2 elements:
                                           •	 Topics to be covered in the conversation
                                           •	 Investigative questions relating to each topic


                                                                 RA7 Automated Report Logic

    STEP 2: The relevant manager
    reviews the cases in the database                             Topic 1           Question 1
    and makes his decision about
    the cases that should be further                                                Question 2

    investigated. A case can be assigned                                            Question 3

    to any specific investigator in the
    system with a one-click operation
                                                                  Topic 2
    or can be sent to anyone outside                                                Question 1

    the local RA7 network using                                                     Question 2
    encrypted email.                                                                Question 3




                                                                  Topic 3           Question 1

                                                                                    Question 2

                                                                                    Question 3



    STEP 3: If the case is forwarded
    to investigation, it will now appear   The RA7 analysis report is automatically generated based on the emotional
    in the selected investigator’s         content of the answers given in response to the script’s questions.
    database. The investigator can now
    replay the recordings, review the
    comments and use the RA7 deep          Using the conversation scripts ensures that all the essential information is
4   analysis tools to find the ways to     gathered by the contact center agent and provides uniformity to the facts
    better counter the fraudulent case.    gathering process.
Implementing RA7 in your organization
Needs, IT and installation:
Every RA7 project begins with a preparation meeting designed to learn
about your organization unique needs. This meeting will prepare the
ground for our joint work, and together we’ll design the process in which
RA7 can be of use to meet your expectation.

•	 We will learn current business process and methodology in detecting &
   handling fraud.
•	 Understand PR, Legal and IT operational concerns.
•	 Provide the basis for the “conversation scripts” design to be used. Our
   experts will take it from there.

Training & Mentoring
Our instructors will prepare a training program for each level of users
in the RA7 system to ensure proper use and efficiency. We will train
relevant staff and investigators as future trainers, to ensure knowledge can
be shared easily inside your organization. Further training and mentoring
plans will be coordinated as needed.

Follow-up and support
Nemesysco and its local representatives are always happy to take your
call, work with you on new scripts and update procedures as may be
needed.



                             Basic report display




                                                                               5
RA7 Case studies
                                                 European insurance company “A”
      Risk by total claims opened
                                                 “A” is a medium-large company with substantial presence mainly in Europe
                                     High Risk
                                        5%       and Latin America that covers all fields of the insurance business. The
                                                 company is using Nemesysco’s professional systems for few years now
                                                 to manage internal security and special investigations. Once RA7 was
                            Med. Risk
                              22%                released it started a pilot for underwriting of new vehicle policies.

              Low Risk                           •	 200 double-verified policies were analyzed by RA7.
                73%
                                                 •	 RA7 risk analysis achieved well above 90% accuracy with actual customer
                                                    status.
                                                 •	 Pilot costs were covered within the first week of use!
           Total claims by type
                         Vehicle
                         Liability
          Property       10%
          Damage              Vehicle
            37%              Full cover
                                27%


     Fire 1% Vehicle theft      Burglary 6%
                 19%


     High Risk calls by claim type

                         Vehicle
                         Liability
           Property      14%                                                 Management screen
           Damage
             24%              Vehicle
                             Full cover
                                                 European insurance company “B”
                                24%              “B” is active as a European insurance group in twenty regional markets.
         Vehicle theft
             33%                                 The company decided to trial RA7 system in its newly established contact
                                                 center in one of its territories, and initiate the development of its fraud
                                 Burglary 5%
                                                 prevention mechanism. RA7 was used in the contact center with all types
                                                 of vehicle and property claims.
     Med. Risk calls by claim type
                                     Vehicle     •	 Over 500 claims reviewed and analyzed
                                     Liability
                                        7%       •	 High Risk detected in 5% of all claims and additional 22% of claims
                              Vehicle               contained elements of fraud.
           Property          Full cover
           Damage               21%              •	 Few fields of insurance were identified as more susceptible to fraud
             39%
                             Burglary               than others.
                               11%
                Vehicle theft
                    22%                          During the initial implementation process, the company successfully
6                                                implemented a call-back procedure to customers for re-adjusting claims
                                                 to their proper values.
About LVA Technology
LVA technology is based on a proprietary set of vocal parameters found, through field & academic research, to
correlate with key human emotions and in various combinations to be able to identify deceptive intentions in
“real life” scenarios. These vocal parameters were identified from a large repository of audio files captured in
different languages and a numerous life situations, from police interrogations, through contact centers to controlled
experiments. Many of the parameters Nemesysco’s technology uses are new to the world of phonetics, and focus
on the uncontrolled and, as yet, phonetically unexplained properties of the human voice.

LVA is a security-level technology designed to serve professional investigators in their line of work, by providing
indications that further directs the investigation procedure to the relevant path. LVA analyses can be performed
in real-time (using a microphone or on a telephone conversation) as well as off-line on previously recorded
material. RA7 system is using the LVA technology in a highly controlled manner using scripted conversations,
which enables the system to “understand” what emotional reactions are expected in each part of the call (as well
as which emotional reactions are not).




Legal note
Fraud detection using LVA technology has been found to be effective in reducing unlawful claims and deter
fraudsters; however, this kind of testing should only be performed in accordance with the pertinent local laws
and regulations.

Please consult with your legal advisors for the applicable regulations and implementation necessities.




                                                                                                                        7
About Nemesysco
                Nemesysco Ltd. is the leading provider of voice analysis
                and emotion detection technologies, for defense and
                                     civilian markets.
                Nemesysco’s LVA (Layered Voice Analysis) technology
                detects the emotional content of a conversation, in
                real-time or from recorded materials, enabling analysis
                of different types of stress, cognitive processes and
                               various emotional reactions.
                Nemesysco’s products are implemented in a wide
                variety of applications for law enforcement, homeland
                security, insurance and banks fraud prevention, employee
                screening, call center quality monitoring, healthcare and
                                      entertainment.
                Nemesysco is a privately held company, founded in
                     2000 and is headquartered in Netanya, Israel.




                                      Nemesysco Ltd.
Tel: +972-9-885-3864 | Fax: +972-9-885-3782 | bizdev@nemesysco.com | www.nemesysco.com
             6 Hagavish St. POB 8747 Sapir Industrial Park Netanya, Israel 42504

                   © Copyright 2011 Nemesysco Ltd. All rights reserved.

More Related Content

Similar to Nemesysco

LEXForensica (003)
LEXForensica (003)LEXForensica (003)
LEXForensica (003)Johan Nel
 
Domain management methdology
Domain management methdologyDomain management methdology
Domain management methdologyRob Mattison
 
CallMiner_Automatic_Scorecards_Agent_Performance
CallMiner_Automatic_Scorecards_Agent_PerformanceCallMiner_Automatic_Scorecards_Agent_Performance
CallMiner_Automatic_Scorecards_Agent_PerformanceVictor Carrasco
 
Lva I Brochure
Lva I BrochureLva I Brochure
Lva I BrochureNSCAfrica
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSathishKumar960827
 
Nemesysco
NemesyscoNemesysco
NemesyscoMervM
 
Amir liberman
Amir libermanAmir liberman
Amir libermanJohnC01
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxImXaib
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management Sreedhar Roddam
 
March 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 ApproachMarch 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 ApproachIT Service and Support
 
технология анализа голоса Nemesysco eng
технология анализа голоса Nemesysco engтехнология анализа голоса Nemesysco eng
технология анализа голоса Nemesysco engMMI Group
 
Dream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management SystemDream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management SystemSalesforce Engineering
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlationfrantzyv
 
Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...SM2 Strategic
 
Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...SM2 Strategic
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsPivotPointSecurity
 
Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...
Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...
Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...AlexHill876665
 
Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]bradau1
 

Similar to Nemesysco (20)

LEXForensica (003)
LEXForensica (003)LEXForensica (003)
LEXForensica (003)
 
Domain management methdology
Domain management methdologyDomain management methdology
Domain management methdology
 
CallMiner_Automatic_Scorecards_Agent_Performance
CallMiner_Automatic_Scorecards_Agent_PerformanceCallMiner_Automatic_Scorecards_Agent_Performance
CallMiner_Automatic_Scorecards_Agent_Performance
 
Lva I Brochure
Lva I BrochureLva I Brochure
Lva I Brochure
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
Nemesysco
NemesyscoNemesysco
Nemesysco
 
Amir liberman
Amir libermanAmir liberman
Amir liberman
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management Sreedhar CV_PKI - Certificate Management
Sreedhar CV_PKI - Certificate Management
 
March 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 ApproachMarch 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 Approach
 
технология анализа голоса Nemesysco eng
технология анализа голоса Nemesysco engтехнология анализа голоса Nemesysco eng
технология анализа голоса Nemesysco eng
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Dream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management SystemDream of the (blue) Effective Case Management System
Dream of the (blue) Effective Case Management System
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...
 
Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...Telephone improvement project a skills assessment of refractive surgery provi...
Telephone improvement project a skills assessment of refractive surgery provi...
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
 
Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...
Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...
Proactively Identify and Prioritize Potential Threats. Stay Compliant and Sec...
 
Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]Lea Dit 2010 Td Presentation Au Email[1]
Lea Dit 2010 Td Presentation Au Email[1]
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Nemesysco

  • 1. fraud at the door Identify fraud at the first point of contact Risk Assessment Solution
  • 2. Leveraging the RA7 system RA7 is a general name for a set of software tools and processes based on Nemesysco’s proprietary Layered Voice Analysis technology (LVA™), designed to detect and measure changes in the evaluated party’s emotional reactions. Leveraging 14 years of research and technology development, RA7 system offers: • 1 Complete solution - A multilevel centralized fraud prevention system providing dedicated interfaces to each user in your organization. • 1 day agent’s training - Contact center agents are not required to become professional investigators - Agent’s training is as simple as “follow these onscreen instructions…” • 100 % calls coverage - Capture RA7 system is the first line of defense, designed to protect against and screen through ALL most of the fraud attempts your organization is facing, with three goals telephone calls right where they in mind: start, at the contact center level. • Streamline & standardize To have a significant effect on your bottom line by saving on unrightfully investigation procedures - Ensure paid claims, reducing your exposure with new customers and focusing investigation resources. all cases are initially treated the same, following internal protocols To improve customer service by reducing your legitimate customers’ and guidelines you create and wait time and provide superior service at their time of need. we operationalize.. • Unbiased. Informing. Precise. - To streamline the investigation process from the contact center agent Make impartial decisions based to the decision makers - providing focused and accurate reporting on repeating, verifiable and for the case review and investigation processes, all with as little as precise information. possible changes to the current procedures. RA7 IS AN INVESTIGATION Topic 1 Topic 3 FOCUS TOOL, Topic 2 Question 1 NOT Question 2 Topic 3 Question 3 Topic 4 2 A “LIE DETECTOR” Question 4
  • 3. Multilevel architecture RA7 system is designed to streamline and expedite any risk analysis Nemesysco’s RA7 process by providing (where applicable) different RA7 interfaces and tools for your contact center agents, underwriters, claims adjusters, investigators can be used in many and managers. financial fields: The contact center level tools will guide the agent through proper interview • Insurance underwriting - Conduct scripts1 designed to cross check and validate different relevant topics. a risk assessment and screening Once the call has ended, full analysis is automatically performed on the in order to avoid in advance recorded call and the Risk Report is generated. issuing inaccurate or high risk The Claims ManagerUnderwriter screens will easily point to the irregular policies. cases, highlighting the topics that are worthy of further investigation. Any • Claim submission and processing case NOT identified as irregular (Low Risk cases) can be forwarded to the - Initial screening providing an Fast Track process. Medium Risk cases, in which most likely the base story almost automatic decision. is true but some of the details are inaccurate, can often be settled with a • Periodic “over the phone” status follow-up call over the phone. verification - Identify cases where a change of circumstances If a case is determined to be High Risk it will undergo a third review occurred. by professional investigators in the RA7 system. Investigators’ interface • Credit risk assessment - Verify displays precise analysis for each voice segment, identifying the exact topics to be clarified. In most cases, a direct phone call for clarification or the intentions and true financial a short field visit can reveal relevant information that will determine the capabilities of your applicant. actual case status and the fraud level it contains. Contact center level 5-10 Minutes Management level 1-5 Minutes Settlement Formal 30 minutes Fast-track Investigation (adjusting the claim) payment 3 1 “Proper” scripts are compiled based on Nemesysco’s questioning methodology in combination with your internal investigation department inputs, made to collect an optimal first recorded account.
  • 4. Conversation Scripts Design concept and use A typical case scenario in the RA7 system Agent’s display during a test session STEP 1: RA7 system is designed to In order to achieve optimal analysis and automated report generation stop fraud at the door; meaning 100% at the contact center level, RA7 utilizes carefully designed conversation of the relevant incoming calls will scripts mechanism to guide the agent through the different expected be screened using the RA7 Agent’ scenarios. These scripts are custom made for each implementation, taking Real-Time mode. Once the test into account the type of risks you face and your investigation unit needs. ends, the case report and analysis are created automatically and are added to the main database. For each type of conversation scenario there will be a preplanned script design that is comprised of 2 elements: • Topics to be covered in the conversation • Investigative questions relating to each topic RA7 Automated Report Logic STEP 2: The relevant manager reviews the cases in the database Topic 1 Question 1 and makes his decision about the cases that should be further Question 2 investigated. A case can be assigned Question 3 to any specific investigator in the system with a one-click operation Topic 2 or can be sent to anyone outside Question 1 the local RA7 network using Question 2 encrypted email. Question 3 Topic 3 Question 1 Question 2 Question 3 STEP 3: If the case is forwarded to investigation, it will now appear The RA7 analysis report is automatically generated based on the emotional in the selected investigator’s content of the answers given in response to the script’s questions. database. The investigator can now replay the recordings, review the comments and use the RA7 deep Using the conversation scripts ensures that all the essential information is 4 analysis tools to find the ways to gathered by the contact center agent and provides uniformity to the facts better counter the fraudulent case. gathering process.
  • 5. Implementing RA7 in your organization Needs, IT and installation: Every RA7 project begins with a preparation meeting designed to learn about your organization unique needs. This meeting will prepare the ground for our joint work, and together we’ll design the process in which RA7 can be of use to meet your expectation. • We will learn current business process and methodology in detecting & handling fraud. • Understand PR, Legal and IT operational concerns. • Provide the basis for the “conversation scripts” design to be used. Our experts will take it from there. Training & Mentoring Our instructors will prepare a training program for each level of users in the RA7 system to ensure proper use and efficiency. We will train relevant staff and investigators as future trainers, to ensure knowledge can be shared easily inside your organization. Further training and mentoring plans will be coordinated as needed. Follow-up and support Nemesysco and its local representatives are always happy to take your call, work with you on new scripts and update procedures as may be needed. Basic report display 5
  • 6. RA7 Case studies European insurance company “A” Risk by total claims opened “A” is a medium-large company with substantial presence mainly in Europe High Risk 5% and Latin America that covers all fields of the insurance business. The company is using Nemesysco’s professional systems for few years now to manage internal security and special investigations. Once RA7 was Med. Risk 22% released it started a pilot for underwriting of new vehicle policies. Low Risk • 200 double-verified policies were analyzed by RA7. 73% • RA7 risk analysis achieved well above 90% accuracy with actual customer status. • Pilot costs were covered within the first week of use! Total claims by type Vehicle Liability Property 10% Damage Vehicle 37% Full cover 27% Fire 1% Vehicle theft Burglary 6% 19% High Risk calls by claim type Vehicle Liability Property 14% Management screen Damage 24% Vehicle Full cover European insurance company “B” 24% “B” is active as a European insurance group in twenty regional markets. Vehicle theft 33% The company decided to trial RA7 system in its newly established contact center in one of its territories, and initiate the development of its fraud Burglary 5% prevention mechanism. RA7 was used in the contact center with all types of vehicle and property claims. Med. Risk calls by claim type Vehicle • Over 500 claims reviewed and analyzed Liability 7% • High Risk detected in 5% of all claims and additional 22% of claims Vehicle contained elements of fraud. Property Full cover Damage 21% • Few fields of insurance were identified as more susceptible to fraud 39% Burglary than others. 11% Vehicle theft 22% During the initial implementation process, the company successfully 6 implemented a call-back procedure to customers for re-adjusting claims to their proper values.
  • 7. About LVA Technology LVA technology is based on a proprietary set of vocal parameters found, through field & academic research, to correlate with key human emotions and in various combinations to be able to identify deceptive intentions in “real life” scenarios. These vocal parameters were identified from a large repository of audio files captured in different languages and a numerous life situations, from police interrogations, through contact centers to controlled experiments. Many of the parameters Nemesysco’s technology uses are new to the world of phonetics, and focus on the uncontrolled and, as yet, phonetically unexplained properties of the human voice. LVA is a security-level technology designed to serve professional investigators in their line of work, by providing indications that further directs the investigation procedure to the relevant path. LVA analyses can be performed in real-time (using a microphone or on a telephone conversation) as well as off-line on previously recorded material. RA7 system is using the LVA technology in a highly controlled manner using scripted conversations, which enables the system to “understand” what emotional reactions are expected in each part of the call (as well as which emotional reactions are not). Legal note Fraud detection using LVA technology has been found to be effective in reducing unlawful claims and deter fraudsters; however, this kind of testing should only be performed in accordance with the pertinent local laws and regulations. Please consult with your legal advisors for the applicable regulations and implementation necessities. 7
  • 8. About Nemesysco Nemesysco Ltd. is the leading provider of voice analysis and emotion detection technologies, for defense and civilian markets. Nemesysco’s LVA (Layered Voice Analysis) technology detects the emotional content of a conversation, in real-time or from recorded materials, enabling analysis of different types of stress, cognitive processes and various emotional reactions. Nemesysco’s products are implemented in a wide variety of applications for law enforcement, homeland security, insurance and banks fraud prevention, employee screening, call center quality monitoring, healthcare and entertainment. Nemesysco is a privately held company, founded in 2000 and is headquartered in Netanya, Israel. Nemesysco Ltd. Tel: +972-9-885-3864 | Fax: +972-9-885-3782 | bizdev@nemesysco.com | www.nemesysco.com 6 Hagavish St. POB 8747 Sapir Industrial Park Netanya, Israel 42504 © Copyright 2011 Nemesysco Ltd. All rights reserved.