SlideShare a Scribd company logo
1 of 12
FRAUD ANALYSIS
By: Smriti Tikoo
Agenda
• Introduction
• Fraud Analysis
• Process of Analysis
• Fraud Analyst
• Types of Fraud
• Importance of Fraud Analysis
• Potential Benefits
• Detection Techniques
FRAUD ANALYSIS
• Combination of analytic technology and
detection techniques with human interaction
to help detect potential improper
transactions, such as those based on fraud
and/or bribery, either before the transactions
are completed or after they occur.
Process of Analysis
• Gathering and storing relevant data and
mining it for patterns, discrepancies, and
anomalies.
• The findings are then translated into insights
that can allow a company to manage potential
threats before they occur as well as develop a
proactive fraud and bribery detection
environment.
Step wise procedure
• Create a profile that includes all the areas where fraud is expected
to occur and the possible types of fraud in those areas.
• Measure the risk of fraud and the overall exposure to the
organization. Prioritize the risks based on fraud.
• Follow Ad-hoc testing method to find for indicators of fraud in
particular areas of organization
• Establish risk assessment and decide where to pay closer attention
• Monitor the activity and communicate it throughout the
organization so that employees in the organization are aware about
the happening in the organization
• If there is any fraud found out, inform the management
immediately to solve out the issue and to find out why it happened
• Fix any broken controls
• Segregation of duties is very essential
• Expand the scope of the program and repeat the process
Need for Fraud Analysis
• Use of new tools and technologies for fraud
prevention to harness their data to sniff out instances
of fraud, potentially before they fully unfold.
• This development couldn’t occur at a better time, as
events and regulators alike are challenging the controls
organizations have used for years.
• In areas of anti-fraud, anti-bribery, and anti-money
laundering, the regulatory environment has tightened.
At the same time, fraud, corruption, and abuse are
unrelenting—and constantly evolving.
Role of Fraud Analyst
• Who investigates forgery and theft within
customers' accounts and transactions on
behalf of a bank or a financial institution.
• They track and monitor the bank's
transactions and activity that comes through
the customers' accounts.
Types of Fraud
• Financial Statement
• Asset misappropriation
• Skimming of Cash and Cash Larceny
• Misuse of company assets
• Theft of intellectual property and trade
secrets .
• Healthcare, Insurance and banking.
• Consumer Fraud
Importance
• More data, more opportunities .
• Anomaly detection and rules-based methods have been in
widespread use to combat fraud, corruption, and abuse for
more than 20 years.
• They’re powerful tools, but they still have their limits.
Adding analytics to this mix can significantly expand fraud
detection capabilities, enhancing the “white box” approach
of the rules-based method.
• Not only can analytics tools enhance rules-based testing
methods, but they can also help measure performance to
standardize and help fine tune controls for constant
improvement. That’s a big deal for companies awash in
data— data that could be put to better use.
Potential Benefits
• Identify hidden patterns :Unsupervised or non-rules-based
analyses driven by analytics technology can uncover new
patterns, trends, fraudulent schemes, and scenarios that
traditional approaches miss.
• Enhance and extend existing efforts Analytics need not
replace what you’re already doing—it can be an extra layer
to add punch to your existing efforts.
• Cross the divide Fraud analytics can pull data from across
your organization into one central platform, helping create
a true, enterprise-wide approach.
• Measure and improve performance What’s working?
What’s not? With fraud analytics in place, you don’t have to
guess. The data tells the story
Statistical detection techniques
• Techniques used for fraud detection fall into two primary classes: statistical
techniques and artificial intelligence. Examples of statistical data analysis
techniques are:
• Data preprocessing techniques for detection, validation, error correction, and
filling up of missing or incorrect data.
• Calculation of various statistical parameters such as averages, quintiles,
performance metrics, probability distributions, and so on. For example, the
averages may include average length of call, average number of calls per month
and average delays in bill payment.
• Models and probability distributions of various business activities either in terms
of various parameters or probability distributions.
• Computing user profiles.
• Time-series analysis of time-dependent data.
• Clustering and classification to find patterns and associations among groups of
data.
• Matching algorithms to detect anomalies in the behavior of transactions or users
as compared to previously known models and profiles. Techniques are also needed
to eliminate false alarms, estimate risks, and predict future of current transactions
or users.
Artificial Intelligence Techniques
• The main AI techniques used for fraud management include:
• Data mining to classify, cluster, and segment the data and
automatically find associations and rules in the data that may
signify interesting patterns, including those related to fraud.
• Expert systems to encode expertise for detecting fraud in the form
of rules.
• Pattern recognition to detect approximate classes, clusters, or
patterns of suspicious behavior either automatically (unsupervised)
or to match given inputs.
• Machine learning techniques to automatically identify
characteristics of fraud.
• Neural networks that can learn suspicious patterns from samples
and used later to detect them.
• Other techniques such as link analysis, Bayesian networks, decision
theory, and sequence matching are also used for fraud detection

More Related Content

What's hot

Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptxjaramulat
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksAbinash Mandilwar
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Processaccenture
 
Fraud detection ML
Fraud detection MLFraud detection ML
Fraud detection MLMaatougSelim
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slidesZeeshan Shahid
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomermohitronnie
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Showvikas_k
 

What's hot (20)

Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Fraud Management ppt.pptx
Fraud Management ppt.pptxFraud Management ppt.pptx
Fraud Management ppt.pptx
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Fraud Analytics
Fraud AnalyticsFraud Analytics
Fraud Analytics
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banks
 
Anti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment ProcessAnti-Money Laundering (AML) Risk Assessment Process
Anti-Money Laundering (AML) Risk Assessment Process
 
Fraud detection ML
Fraud detection MLFraud detection ML
Fraud detection ML
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud investigations session 2 slides
Fraud investigations session 2 slidesFraud investigations session 2 slides
Fraud investigations session 2 slides
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Aml basics
Aml basicsAml basics
Aml basics
 
Risk Assessment1.ppt
Risk Assessment1.pptRisk Assessment1.ppt
Risk Assessment1.ppt
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 

Similar to Fraud analysis

CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseAlessa
 
Fraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptxFraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptxdhaval3100013
 
Process of Forensic Accounting
Process of Forensic AccountingProcess of Forensic Accounting
Process of Forensic Accountinginfantemiliya
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
How data analytics queries can be used to extract employee fraud
How data analytics queries can be used to extract employee fraudHow data analytics queries can be used to extract employee fraud
How data analytics queries can be used to extract employee fraudMacbollan Gasseler
 
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Alessa
 
A Paradigm Shift in Audit Process
A Paradigm Shift in Audit ProcessA Paradigm Shift in Audit Process
A Paradigm Shift in Audit ProcessPadmapriya V
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptxAryanGour1
 
Four stage business analytics model
Four stage business analytics modelFour stage business analytics model
Four stage business analytics modelAnitha Velusamy
 
Introduction to data science
Introduction to data scienceIntroduction to data science
Introduction to data scienceSpartan60
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsBharath Rao
 

Similar to Fraud analysis (20)

Fraud detection analysis
Fraud detection analysis Fraud detection analysis
Fraud detection analysis
 
CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 Release
 
Fraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptxFraud Detection and Risk Management in Finance.pptx
Fraud Detection and Risk Management in Finance.pptx
 
Process of Forensic Accounting
Process of Forensic AccountingProcess of Forensic Accounting
Process of Forensic Accounting
 
Predictive analysis
Predictive analysisPredictive analysis
Predictive analysis
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
How data analytics queries can be used to extract employee fraud
How data analytics queries can be used to extract employee fraudHow data analytics queries can be used to extract employee fraud
How data analytics queries can be used to extract employee fraud
 
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
Webinar: Strategies to Enhance your Screening and Transaction Monitoring Proc...
 
Kick Start Your Fraud Prevention
Kick Start Your Fraud PreventionKick Start Your Fraud Prevention
Kick Start Your Fraud Prevention
 
Kick Start Your Fraud Prevention
Kick Start Your Fraud PreventionKick Start Your Fraud Prevention
Kick Start Your Fraud Prevention
 
A Paradigm Shift in Audit Process
A Paradigm Shift in Audit ProcessA Paradigm Shift in Audit Process
A Paradigm Shift in Audit Process
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptx
 
unit 1 -DSP-4 analytics.pptx
unit 1 -DSP-4 analytics.pptxunit 1 -DSP-4 analytics.pptx
unit 1 -DSP-4 analytics.pptx
 
Four stage business analytics model
Four stage business analytics modelFour stage business analytics model
Four stage business analytics model
 
Fraud detection guide
Fraud detection guideFraud detection guide
Fraud detection guide
 
Introduction to data science
Introduction to data scienceIntroduction to data science
Introduction to data science
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
Analytics 2
Analytics 2Analytics 2
Analytics 2
 

More from Smriti Tikoo

A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...Smriti Tikoo
 
Minor projct(Broadband )
Minor projct(Broadband )Minor projct(Broadband )
Minor projct(Broadband )Smriti Tikoo
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
Video conferencing services
Video conferencing servicesVideo conferencing services
Video conferencing servicesSmriti Tikoo
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspSmriti Tikoo
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrateSmriti Tikoo
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrateSmriti Tikoo
 
Embracing the singlehood
Embracing the singlehoodEmbracing the singlehood
Embracing the singlehoodSmriti Tikoo
 
Affect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of todayAffect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of todaySmriti Tikoo
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paperSmriti Tikoo
 
Broadband Powerline Communication
Broadband Powerline CommunicationBroadband Powerline Communication
Broadband Powerline CommunicationSmriti Tikoo
 

More from Smriti Tikoo (18)

A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...
 
Minor projct(Broadband )
Minor projct(Broadband )Minor projct(Broadband )
Minor projct(Broadband )
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Smriti
SmritiSmriti
Smriti
 
Video conferencing services
Video conferencing servicesVideo conferencing services
Video conferencing services
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dsp
 
Internship report
Internship reportInternship report
Internship report
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrate
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrate
 
Embracing the singlehood
Embracing the singlehoodEmbracing the singlehood
Embracing the singlehood
 
Affect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of todayAffect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of today
 
Ijarcce 27
Ijarcce 27Ijarcce 27
Ijarcce 27
 
face detection
face detectionface detection
face detection
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
 
GSM WHITE SPACES
GSM WHITE SPACESGSM WHITE SPACES
GSM WHITE SPACES
 
Broadband Powerline Communication
Broadband Powerline CommunicationBroadband Powerline Communication
Broadband Powerline Communication
 

Recently uploaded

1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxBoston Institute of Analytics
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 

Recently uploaded (20)

1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 

Fraud analysis

  • 2. Agenda • Introduction • Fraud Analysis • Process of Analysis • Fraud Analyst • Types of Fraud • Importance of Fraud Analysis • Potential Benefits • Detection Techniques
  • 3. FRAUD ANALYSIS • Combination of analytic technology and detection techniques with human interaction to help detect potential improper transactions, such as those based on fraud and/or bribery, either before the transactions are completed or after they occur.
  • 4. Process of Analysis • Gathering and storing relevant data and mining it for patterns, discrepancies, and anomalies. • The findings are then translated into insights that can allow a company to manage potential threats before they occur as well as develop a proactive fraud and bribery detection environment.
  • 5. Step wise procedure • Create a profile that includes all the areas where fraud is expected to occur and the possible types of fraud in those areas. • Measure the risk of fraud and the overall exposure to the organization. Prioritize the risks based on fraud. • Follow Ad-hoc testing method to find for indicators of fraud in particular areas of organization • Establish risk assessment and decide where to pay closer attention • Monitor the activity and communicate it throughout the organization so that employees in the organization are aware about the happening in the organization • If there is any fraud found out, inform the management immediately to solve out the issue and to find out why it happened • Fix any broken controls • Segregation of duties is very essential • Expand the scope of the program and repeat the process
  • 6. Need for Fraud Analysis • Use of new tools and technologies for fraud prevention to harness their data to sniff out instances of fraud, potentially before they fully unfold. • This development couldn’t occur at a better time, as events and regulators alike are challenging the controls organizations have used for years. • In areas of anti-fraud, anti-bribery, and anti-money laundering, the regulatory environment has tightened. At the same time, fraud, corruption, and abuse are unrelenting—and constantly evolving.
  • 7. Role of Fraud Analyst • Who investigates forgery and theft within customers' accounts and transactions on behalf of a bank or a financial institution. • They track and monitor the bank's transactions and activity that comes through the customers' accounts.
  • 8. Types of Fraud • Financial Statement • Asset misappropriation • Skimming of Cash and Cash Larceny • Misuse of company assets • Theft of intellectual property and trade secrets . • Healthcare, Insurance and banking. • Consumer Fraud
  • 9. Importance • More data, more opportunities . • Anomaly detection and rules-based methods have been in widespread use to combat fraud, corruption, and abuse for more than 20 years. • They’re powerful tools, but they still have their limits. Adding analytics to this mix can significantly expand fraud detection capabilities, enhancing the “white box” approach of the rules-based method. • Not only can analytics tools enhance rules-based testing methods, but they can also help measure performance to standardize and help fine tune controls for constant improvement. That’s a big deal for companies awash in data— data that could be put to better use.
  • 10. Potential Benefits • Identify hidden patterns :Unsupervised or non-rules-based analyses driven by analytics technology can uncover new patterns, trends, fraudulent schemes, and scenarios that traditional approaches miss. • Enhance and extend existing efforts Analytics need not replace what you’re already doing—it can be an extra layer to add punch to your existing efforts. • Cross the divide Fraud analytics can pull data from across your organization into one central platform, helping create a true, enterprise-wide approach. • Measure and improve performance What’s working? What’s not? With fraud analytics in place, you don’t have to guess. The data tells the story
  • 11. Statistical detection techniques • Techniques used for fraud detection fall into two primary classes: statistical techniques and artificial intelligence. Examples of statistical data analysis techniques are: • Data preprocessing techniques for detection, validation, error correction, and filling up of missing or incorrect data. • Calculation of various statistical parameters such as averages, quintiles, performance metrics, probability distributions, and so on. For example, the averages may include average length of call, average number of calls per month and average delays in bill payment. • Models and probability distributions of various business activities either in terms of various parameters or probability distributions. • Computing user profiles. • Time-series analysis of time-dependent data. • Clustering and classification to find patterns and associations among groups of data. • Matching algorithms to detect anomalies in the behavior of transactions or users as compared to previously known models and profiles. Techniques are also needed to eliminate false alarms, estimate risks, and predict future of current transactions or users.
  • 12. Artificial Intelligence Techniques • The main AI techniques used for fraud management include: • Data mining to classify, cluster, and segment the data and automatically find associations and rules in the data that may signify interesting patterns, including those related to fraud. • Expert systems to encode expertise for detecting fraud in the form of rules. • Pattern recognition to detect approximate classes, clusters, or patterns of suspicious behavior either automatically (unsupervised) or to match given inputs. • Machine learning techniques to automatically identify characteristics of fraud. • Neural networks that can learn suspicious patterns from samples and used later to detect them. • Other techniques such as link analysis, Bayesian networks, decision theory, and sequence matching are also used for fraud detection