SlideShare a Scribd company logo
1 of 12
USE OF SOCIAL NETWORK
IN DETECTING
FINANCIAL FRAUDS
SARTHAK DASGUPTA
RAHUL KUMAR SHIRNET
ROHIT KUMAR SINGH
INTRODUCTION
➢ Financial fraud happens when someone misleads you into some malicious and deceptive scheme
and harms your financial well being by acquiring important details to take your money. Most
victims who loose their money are unable to recover it. That is why taking serious measures to
curb this kind of activities has become imperative.
➢ The impact of fraud on organizations is becoming increasingly costly. Every year financial
institutions lose millions of dollars in revenue to systematic fraud. The emergence of new
technologies and forms of payments, as well as sophistication in fraud, complicate the challenges
faced by organizations in creating effective fraud detection strategies.
CLASSICAL APPROACH
The ability to link multiple data sources, analyze large volumes of data, and apply newer algorithms on
the transactions, provide organizations an opportunity to capture, and sometimes predict, fraud in a
more efficient manner. This is called the classical approach. The classical approach to fraud
identification relies on creation of explicit rules (IF-THEN-ELSE IF-…) based on the recommendation
of experts. These rules are developed and modified through their collective field experiences..
SOCIAL NETWORK ANALYSIS METHOD
➢ The optimal way to stop such crimes is to discern them before it finds its next victim. To do so
FRAUD DETECTION and ANALYSIS comes into picture. It is imperative for the investigator to
draw out the network using such connections to get to the root of this fraud. Rarely does an
investigator look across product lines to identify fraudulent connections.
➢ However, with the introduction of social network analysis (SNA), investigators are now able to
detect data patterns. Social Network Analysis is a technique which represents the entities as nodes
and relationships between the entities as links. Representing the relationships reveals a lot more
information than simply listing out the properties of the entities.
SOCIAL NETWORK ANALYSIS METHOD
At a basic level, a social network consists of nodes (vertices) that are connected to other related
nodes by links (relationships). The connection between two nodes is called an edge. If all the nodes
in a social network are connected to each other, it is called a fully-connected network. A path refers
to a collection of nodes that are connected by a link. The diagrams below show three simple
variations of a financial fraud social network
SOCIAL NETWORK ANALYSIS METHOD
Density and Centrality
● Density is the general level of linkage among the social network nodes. It is defined as the
number of edges in a portion of a social network to the maximum number of edges that
theoretically make up the social network.
Density= C/(n (n-1)/2)
● The following formula is used to calculate the relative density of a portion of a social network.
C is the number of observed edges and n the total number of nodes in the social network. n(n-
1)/2 gives us the theoretical maximum number of edges that are possible in a given social
network.
Density measures can take any value between [0,1], with 0 representing the least
density and 1 the maximum density.
SOCIAL NETWORK ANALYSIS METHOD
Centrality
Centrality is the measure of closeness of a node to the center(s) of high
activity in a network and implies the structural importance of the node in the
network. Centrality can be measured by degree, closeness and betweenness
❖ Degree is the direct count of the number of connections a node has to
other nodes. A higher degree value compared to peers denotes higher
influence in the network.
❖ Closeness focuses on the overall closeness of a node to all other nodes
in the network. The closeness of a node gives it quicker access to all
other nodes in the network.
❖ Betweenness measures the extent of a node’s placement on the shortest
path between other pairs of nodes in the network.
HOW SNA IS IMPLEMENTED
A Bank specializes in financing vehicle dealers and charges an interest whose
rate progresses from 3, 6, 12, 24 and 36 months for each financed account
Bank Observations:
● The bank identified that most dealers closed their accounts between 3rd and
the 6th month.
● Further investigation showed that the cars associated with the closed
accounts appeared again in new accounts opened by other dealers following
a short time gap.
● It became obvious that there was an elaborate system of collaboration
between the dealers to avoid paying higher interest rates
HOW SNA IS IMPLEMENTED
1. Nodes: These are the suspect dealers which are selected based on the criteria
mentioned.
1. Linkages: This was recursively expanded using the snowball method to include all their
accounts and the cars involved.
1. Clusters: After diffusing the account and car nodes, the fraudulent relationships between
dealers were identified as clusters.
HOW SNA IS IMPLEMENTED
How SNA was used here
1. Density measures were applied to the network component to identify the clusters with
high fraudulent activity.
1. The identified clusters were subjected to centrality measures to identify key actors
within each cluster.
1. As a mitigating measure the bank took a proactive step to confront the involved
dealers and break up the identified fraud clusters.
1. A new dealer can now be easily placed in a cluster depending on his fraudulent
nature
NEO4J GRAPH ALGORITHM
NEO4J Graph algorithms provide one of the most potent approaches to analyzing
connected data because their mathematical calculations are specifically built to operate
on relationships. Its Data science library consists implementation of:
● Path Finding - these algorithms help find the shortest path or evaluate the availability and
quality of routes
● Centrality - these algorithms determine the importance of distinct nodes in a network
● Community Detection - these algorithms evaluate how a group is clustered or
partitioned, as well as its tendency to strengthen or break apart
● Similarity - these algorithms help calculate the similarity of nodes
● Link Prediction - these algorithms determine the closeness of pairs of nodes
● Node Embeddings - these algorithms compute vector representations of nodes in a
graph.
● Node Classification - this algorithm uses machine learning to predict the classification of
nodes.
THANK YOU

More Related Content

Similar to Use of social network in detecting financial frauds

An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
eSAT Publishing House
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
rahulmonikasharma
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
Editor IJMTER
 
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...
Asoka Korale
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
ITIIIndustries
 

Similar to Use of social network in detecting financial frauds (20)

A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
 
H030101043047
H030101043047H030101043047
H030101043047
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
 
Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection Analysis
 
Detecting Suspicious Accounts in Money Laundering
Detecting Suspicious Accounts in Money LaunderingDetecting Suspicious Accounts in Money Laundering
Detecting Suspicious Accounts in Money Laundering
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in manet
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
Graph Data Science DEMO for fraud analysis
Graph Data Science DEMO for fraud analysisGraph Data Science DEMO for fraud analysis
Graph Data Science DEMO for fraud analysis
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Agent basedqos
Agent basedqosAgent basedqos
Agent basedqos
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
Cyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdfCyber bullying detection and analysis.ppt.pdf
Cyber bullying detection and analysis.ppt.pdf
 
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...
ATC full paper format-2014 Social Networks in Telecommunications Asoka Korale...
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Survey
 

Recently uploaded

如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
jk0tkvfv
 
sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444
saurabvyas476
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
zifhagzkk
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
ppy8zfkfm
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
pwgnohujw
 
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
siskavia95
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
siskavia95
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
great91
 

Recently uploaded (20)

如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
 
sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 

Use of social network in detecting financial frauds

  • 1. USE OF SOCIAL NETWORK IN DETECTING FINANCIAL FRAUDS SARTHAK DASGUPTA RAHUL KUMAR SHIRNET ROHIT KUMAR SINGH
  • 2. INTRODUCTION ➢ Financial fraud happens when someone misleads you into some malicious and deceptive scheme and harms your financial well being by acquiring important details to take your money. Most victims who loose their money are unable to recover it. That is why taking serious measures to curb this kind of activities has become imperative. ➢ The impact of fraud on organizations is becoming increasingly costly. Every year financial institutions lose millions of dollars in revenue to systematic fraud. The emergence of new technologies and forms of payments, as well as sophistication in fraud, complicate the challenges faced by organizations in creating effective fraud detection strategies.
  • 3. CLASSICAL APPROACH The ability to link multiple data sources, analyze large volumes of data, and apply newer algorithms on the transactions, provide organizations an opportunity to capture, and sometimes predict, fraud in a more efficient manner. This is called the classical approach. The classical approach to fraud identification relies on creation of explicit rules (IF-THEN-ELSE IF-…) based on the recommendation of experts. These rules are developed and modified through their collective field experiences..
  • 4. SOCIAL NETWORK ANALYSIS METHOD ➢ The optimal way to stop such crimes is to discern them before it finds its next victim. To do so FRAUD DETECTION and ANALYSIS comes into picture. It is imperative for the investigator to draw out the network using such connections to get to the root of this fraud. Rarely does an investigator look across product lines to identify fraudulent connections. ➢ However, with the introduction of social network analysis (SNA), investigators are now able to detect data patterns. Social Network Analysis is a technique which represents the entities as nodes and relationships between the entities as links. Representing the relationships reveals a lot more information than simply listing out the properties of the entities.
  • 5. SOCIAL NETWORK ANALYSIS METHOD At a basic level, a social network consists of nodes (vertices) that are connected to other related nodes by links (relationships). The connection between two nodes is called an edge. If all the nodes in a social network are connected to each other, it is called a fully-connected network. A path refers to a collection of nodes that are connected by a link. The diagrams below show three simple variations of a financial fraud social network
  • 6. SOCIAL NETWORK ANALYSIS METHOD Density and Centrality ● Density is the general level of linkage among the social network nodes. It is defined as the number of edges in a portion of a social network to the maximum number of edges that theoretically make up the social network. Density= C/(n (n-1)/2) ● The following formula is used to calculate the relative density of a portion of a social network. C is the number of observed edges and n the total number of nodes in the social network. n(n- 1)/2 gives us the theoretical maximum number of edges that are possible in a given social network. Density measures can take any value between [0,1], with 0 representing the least density and 1 the maximum density.
  • 7. SOCIAL NETWORK ANALYSIS METHOD Centrality Centrality is the measure of closeness of a node to the center(s) of high activity in a network and implies the structural importance of the node in the network. Centrality can be measured by degree, closeness and betweenness ❖ Degree is the direct count of the number of connections a node has to other nodes. A higher degree value compared to peers denotes higher influence in the network. ❖ Closeness focuses on the overall closeness of a node to all other nodes in the network. The closeness of a node gives it quicker access to all other nodes in the network. ❖ Betweenness measures the extent of a node’s placement on the shortest path between other pairs of nodes in the network.
  • 8. HOW SNA IS IMPLEMENTED A Bank specializes in financing vehicle dealers and charges an interest whose rate progresses from 3, 6, 12, 24 and 36 months for each financed account Bank Observations: ● The bank identified that most dealers closed their accounts between 3rd and the 6th month. ● Further investigation showed that the cars associated with the closed accounts appeared again in new accounts opened by other dealers following a short time gap. ● It became obvious that there was an elaborate system of collaboration between the dealers to avoid paying higher interest rates
  • 9. HOW SNA IS IMPLEMENTED 1. Nodes: These are the suspect dealers which are selected based on the criteria mentioned. 1. Linkages: This was recursively expanded using the snowball method to include all their accounts and the cars involved. 1. Clusters: After diffusing the account and car nodes, the fraudulent relationships between dealers were identified as clusters.
  • 10. HOW SNA IS IMPLEMENTED How SNA was used here 1. Density measures were applied to the network component to identify the clusters with high fraudulent activity. 1. The identified clusters were subjected to centrality measures to identify key actors within each cluster. 1. As a mitigating measure the bank took a proactive step to confront the involved dealers and break up the identified fraud clusters. 1. A new dealer can now be easily placed in a cluster depending on his fraudulent nature
  • 11. NEO4J GRAPH ALGORITHM NEO4J Graph algorithms provide one of the most potent approaches to analyzing connected data because their mathematical calculations are specifically built to operate on relationships. Its Data science library consists implementation of: ● Path Finding - these algorithms help find the shortest path or evaluate the availability and quality of routes ● Centrality - these algorithms determine the importance of distinct nodes in a network ● Community Detection - these algorithms evaluate how a group is clustered or partitioned, as well as its tendency to strengthen or break apart ● Similarity - these algorithms help calculate the similarity of nodes ● Link Prediction - these algorithms determine the closeness of pairs of nodes ● Node Embeddings - these algorithms compute vector representations of nodes in a graph. ● Node Classification - this algorithm uses machine learning to predict the classification of nodes.