This document discusses whiplash for cash fraud schemes and how graph databases can help detect fraud rings. It describes how fraudsters stage fake car accidents to collect insurance payouts. Investigating claims data as a graph makes it easier to identify connections between individuals and accidents that may indicate an organized fraud ring. Queries can find people involved in multiple accidents and identify closely connected groups that deserve further investigation. Representing data as a graph allows insurers to automatically detect suspicious patterns indicative of fraud.
3 types of fraud graph analytics can help defeatLinkurious
Organizations across industries are adopting graph analytics to reinforce their anti-fraud programs. In this presentation, we examine three types of fraud graph analytics can help investigators combat. Blog post: https://linkurio.us/blog/3-fraud-graph-analytics-help-defeat/
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Forter
EMV is nearly here - which is great news for card present fraud. Not such great news for online retailers, who will be facing more fraud from more fraudsters, as theft attempts move online.
How do you prepare your company for this threat? Make sure you're checking off these 5 crucial steps.
3 types of fraud graph analytics can help defeatLinkurious
Organizations across industries are adopting graph analytics to reinforce their anti-fraud programs. In this presentation, we examine three types of fraud graph analytics can help investigators combat. Blog post: https://linkurio.us/blog/3-fraud-graph-analytics-help-defeat/
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Forter
EMV is nearly here - which is great news for card present fraud. Not such great news for online retailers, who will be facing more fraud from more fraudsters, as theft attempts move online.
How do you prepare your company for this threat? Make sure you're checking off these 5 crucial steps.
FinTech & InsurTech: Company presentation by Michael Reitblat, Co-Founder & CEO of Forter at the NOAH Conference 2019 in Tel Aviv, Hangar 11, 10-11 April 2019.
Eight Months of EMV: Early Fraud Shifts and TrajectoryTransUnion
The United States has finally joined the rest of the G-20 countries in upgrading to the EMV standard, though the path has certainly been a rocky one. At the same time that EMV gradually works its way into the fabric of U.S. payments, financial fraud continues to increase. Account takeover (ATO), card-not-present (CNP) fraud, and application fraud are all rapidly rising, fueled by reams of data breaches that have given criminals vast stores of consumer data. Lessons learned from countries that preceded the United States in upgrading to EMV indicate that as the U.S. migration progresses, dwindling counterfeit card opportunity will further magnify the increases in other forms of fraud.
This on-demand webinar, based on fresh research from Aite Group, explores the current state of the U.S. EMV migration, and the associated account takeover, CNP fraud, and application fraud trends. The research will help executives benchmark EMV’s progress and better understand the rapidly shifting fraud landscape.
Data Defeats Truman – SXSW Panelpicker PitchKyle J. Britt
What secrets do billions of emails reveal? Our presidential candidates are telling us everything we need to know about their campaign – and what kind of president they may be – 20 million times a day.
Digital Risk: Protecting your Most Important Asset.RobbiePaterson2
The Dark Web is a real place that operates like a legitimate business. Compromised credentials are becoming more and more common, but the danger of these exposures goes beyond the individual. All it takes is one employee to potentially give away the keys to your entire network.
Brightridge Technology
https://www.linkedin.com/company/brightridgeuk/
iovation presents Fighting CNP Fraud - April 2016 TransUnion
With the rise of online and mobile transactions, device fingerprinting is a known effective tool in fighting CNP fraud over the past decade. Today’s retailers need to consider how they can utilize the information within the device fingerprint to help detect fraud before a transaction occurs.
In this webinar, iovation’s Eddie Glenn will explain how the Global Device Intelligence Platform delivers device insight and fraud prevention management tools to combat CNP fraud:
* How to leverage a global device intelligence network to fight CNP fraud
* Why separating user identity from device identity is imperative when fighting fraud
* What to look for when selecting a global device intelligence solution
A Practical Guide to Post-EMV Card Not Present FraudForter
Experts predict that EMV adoption in the US will set off a tsunami of card not present fraud. Are you leveraging everything you've got in preparation for the oncoming threat?
Find out in this Practical Guide.
Neo4j and the Panama Papers - FooCafe June 2016Craig Taverner
In May 2016, the ICIJ stunned the world by making available a download of "The Panama Papers".
This remarkable dataset represents the largest leak of offshore financial networks ever, at least 10 times bigger than the previous largest leak. Luckily for those of us keen to analyse this data, they made the data available as a ready-to-run instance of the Neo4j graph database, with all data pre-loaded. In this presentation we'll show you how to download and run this database, and how to perform various queries using the Cypher query language to gain insights into the structure of the offshore financial networks used by people and corporations around the world.
And don't worry, you won't need to know Neo4j or Cypher, or even what the Panama Papers are. We'll introduce everything before pulling out the Cypher queries!
These webinar slides are an introduction to Neo4j and Graph Databases. They discuss the primary use cases for Graph Databases and the properties of Neo4j which make those use cases possible. They also cover the high-level steps of modeling, importing, and querying your data using Cypher and touch on RDBMS to Graph.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Kelly Riddle of Kelmar Global shares tips for conducting insurance investigations.
To watch the webinar recording, visit: http://i-sight.com/webinar-investigating-insurance-fraud/
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
FinTech & InsurTech: Company presentation by Michael Reitblat, Co-Founder & CEO of Forter at the NOAH Conference 2019 in Tel Aviv, Hangar 11, 10-11 April 2019.
Eight Months of EMV: Early Fraud Shifts and TrajectoryTransUnion
The United States has finally joined the rest of the G-20 countries in upgrading to the EMV standard, though the path has certainly been a rocky one. At the same time that EMV gradually works its way into the fabric of U.S. payments, financial fraud continues to increase. Account takeover (ATO), card-not-present (CNP) fraud, and application fraud are all rapidly rising, fueled by reams of data breaches that have given criminals vast stores of consumer data. Lessons learned from countries that preceded the United States in upgrading to EMV indicate that as the U.S. migration progresses, dwindling counterfeit card opportunity will further magnify the increases in other forms of fraud.
This on-demand webinar, based on fresh research from Aite Group, explores the current state of the U.S. EMV migration, and the associated account takeover, CNP fraud, and application fraud trends. The research will help executives benchmark EMV’s progress and better understand the rapidly shifting fraud landscape.
Data Defeats Truman – SXSW Panelpicker PitchKyle J. Britt
What secrets do billions of emails reveal? Our presidential candidates are telling us everything we need to know about their campaign – and what kind of president they may be – 20 million times a day.
Digital Risk: Protecting your Most Important Asset.RobbiePaterson2
The Dark Web is a real place that operates like a legitimate business. Compromised credentials are becoming more and more common, but the danger of these exposures goes beyond the individual. All it takes is one employee to potentially give away the keys to your entire network.
Brightridge Technology
https://www.linkedin.com/company/brightridgeuk/
iovation presents Fighting CNP Fraud - April 2016 TransUnion
With the rise of online and mobile transactions, device fingerprinting is a known effective tool in fighting CNP fraud over the past decade. Today’s retailers need to consider how they can utilize the information within the device fingerprint to help detect fraud before a transaction occurs.
In this webinar, iovation’s Eddie Glenn will explain how the Global Device Intelligence Platform delivers device insight and fraud prevention management tools to combat CNP fraud:
* How to leverage a global device intelligence network to fight CNP fraud
* Why separating user identity from device identity is imperative when fighting fraud
* What to look for when selecting a global device intelligence solution
A Practical Guide to Post-EMV Card Not Present FraudForter
Experts predict that EMV adoption in the US will set off a tsunami of card not present fraud. Are you leveraging everything you've got in preparation for the oncoming threat?
Find out in this Practical Guide.
Neo4j and the Panama Papers - FooCafe June 2016Craig Taverner
In May 2016, the ICIJ stunned the world by making available a download of "The Panama Papers".
This remarkable dataset represents the largest leak of offshore financial networks ever, at least 10 times bigger than the previous largest leak. Luckily for those of us keen to analyse this data, they made the data available as a ready-to-run instance of the Neo4j graph database, with all data pre-loaded. In this presentation we'll show you how to download and run this database, and how to perform various queries using the Cypher query language to gain insights into the structure of the offshore financial networks used by people and corporations around the world.
And don't worry, you won't need to know Neo4j or Cypher, or even what the Panama Papers are. We'll introduce everything before pulling out the Cypher queries!
These webinar slides are an introduction to Neo4j and Graph Databases. They discuss the primary use cases for Graph Databases and the properties of Neo4j which make those use cases possible. They also cover the high-level steps of modeling, importing, and querying your data using Cypher and touch on RDBMS to Graph.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Kelly Riddle of Kelmar Global shares tips for conducting insurance investigations.
To watch the webinar recording, visit: http://i-sight.com/webinar-investigating-insurance-fraud/
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business-disrupting cyber incidents.
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud Using Data Analytics. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on fraud detection using data analytic software (Excel, ACL, IDEA)
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
The two entities designed FRN as the “go-to”, easy-to-use source of “how-to” fraud prevention, detection, audit and investigation templates, guidelines, policies, training programs (recorded no CPE and live with CPE) and articles from leading subject matter experts.
FRN is a continuously expanding and improving resource, offering auditors, fraud examiners, controllers, investigators and accountants a content-rich source of cutting-edge anti-fraud tools and techniques they will want to refer to again and again.
Criminal Bankryptcy is one of the most undermining crimes of a legal economy. So detecting and investigating criminal bankruptcies is contributing to a saver economic system
Billions of dollars of loss are caused every year by fraudulent credit card transactions. The design of efficient fraud detection algorithms is key for reducing these losses, and more and more algorithms rely on advanced machine learning techniques to assist fraud investigators. The design of fraud detection algorithms is however particularly challenging due to the non-stationary distribution of the data, the highly unbalanced classes distributions and the availability of few transactions labeled by fraud investigators. At the same time public data are scarcely available for confidentiality issues, leaving unanswered many questions about what is the best strategy. In this thesis we aim to provide some answers by focusing on crucial issues such as: i) why and how under sampling is useful in the presence of class imbalance (i.e. frauds are a small percentage of the transactions), ii) how to deal with unbalanced and evolving data streams (non-stationarity due to fraud evolution and change of spending behavior), iii) how to assess performances in a way which is relevant for detection and iv) how to use feedbacks provided by investigators on the fraud alerts generated. Finally, we design and assess a prototype of a Fraud Detection System able to meet real-world working conditions and that is able to integrate investigators’ feedback to generate accurate alerts.
Webinar: What's new in Linkurious Enterprise 2.8Linkurious
With Linkurious Enterprise 2.8, we focused on time filtering with a Timeline and on providing more control on data entry and data presentation with support for data schema.
We discuss:
- The benefits of a schema and how to set it up.
- How to explore and filter the graph over time using the Timeline.
- How to disable the auto-save mode.
We also discuss the changes in the graph layout menu.
For decades, the intelligence community has been collecting and analyzing information to produce timely and actionable insights for intelligence consumers. But as the amount of information collected increases, analysts are facing new challenges in terms of data processing and analysis. In this presentation, we explore the possibilities that graph technology is offering for intelligence analysis.
The slides from a presentation of Linkurious Enterprise, in which we look at what’s new in this release, including the new Query Template capabilities and the redesign of the query panel.
Video of the presentation: https://youtu.be/ucuntmqzTYI
Linkurious Enterprise is compatible with Azure Cosmos DB and offers investigation teams a turnkey solution to detect and investigate threats hidden in graph data. In this post, we explain how Linkurious Enterprise connects to Cosmos DB graph database.
GraphTech Ecosystem - part 3: Graph VisualizationLinkurious
The graph ecosystem presentation lists and introduces the graph visualization actors: graph visualization libraries and toolkits; graph visualizers and add-ons
Getting started with Cosmos DB + Linkurious EnterpriseLinkurious
Nowadays, many real-world applications generate data that is naturally connected, but traditional systems fail to capture the value it represents. Thanks to its graph API, the multi-model database Cosmos DB lets you model and store graph-like data. On top of Cosmos DB, Linkurious Enterprise is turnkey solution to detect and investigate insights through an interface for graph data visualization and analysis.
In this presentation, we will explain the value of graphs and show how to get started with Cosmos DB and Linkurious Enterprise to accelerate the discovery of new insights in your connected data.
GraphTech Ecosystem - part 2: Graph AnalyticsLinkurious
The graph ecosystem presentation lists and introduces a vast majority of graph analytics actors: graph analytics frameworks; graph processing engines; graph analytics libraries and toolkits; graph query languages and projects.
GraphTech Ecosystem - part 1: Graph DatabasesLinkurious
The graph ecosystem presentation lists and introduces a vast majority of storage systems for graph-like data: native graph databases, RDF databases, multi-model systems or systems with a graph API.
Graph analytics in Linkurious EnterpriseLinkurious
Graph algorithms provide tools to extract insights from graph data. From detecting anomalies to understanding what are the key elements in a network or finding communities, graph algorithms reveal information that would otherwise remain hidden. Learn about:
- The most popular graph algorithms and what they can be used for;
- The benefits of using graph analytics with Linkurious Enterprise;
- How to integrate graph analytics in Linkurious Enterprise.
Graph technology and data-journalism: the case of the Paradise PapersLinkurious
Discover how graph analysis and visualization technologies allowed the ICIJ journalists to highlight the suspicious relations between political figures and offshore companies in the Paradise Papers investigations.
Visualize the Knowledge Graph and Unleash Your DataLinkurious
Slides from the webinar "Visualize the Knowledge Graph and Unleash Your Data" with Michael Grove, Vice President of Engineering and co-founder of Stardog, and Jean Villedieu, co-founder of Linkurious.
The webinar covers the topic of enterprise Knowledge Graphs and lets you experience how to visualize and analyze this data to discover actionable insights for your organization.
Supporting product development while reducing material and prototyping costs or centralizing product records is critical for PLM and PDM managers. However, the growing complexity and volume of cross-business data and processes can turn the management of a product lifecycle into a complex enterprise.
Graph technology like Linkurious offers an intuitive approach to model, search and understand data by putting the connections between components at the forefront. Modeling people, processes, business systems and products components into an interactive and unified network is one of the keys to escape the complexity of product development and find the insights your organization need to gain competitive advantage.
In this presentation, you will learn about:
- Challenges and risks of product development and data management,
- How businesses can use graph technology to model, visualize, optimize and monitor product lifecycles and related elements,
- How to conduct BOM and change management with Linkurious.
Fraudes Financières: Méthodes de Prévention et DétectionLinkurious
Cette présentation en partenariat avec DataStax revient sur comment détecter en temps réel des activités frauduleuses telles que la fraude identitaire. Des applications concrètes de ces technologies seront détaillées, de l’affaire des Panama Papers à des cas d’usages quotidiens dans des banques et des institutions financières. Les techniques de lutte antifraude ainsi que les avantages des approches orientées graphe seront également présentés.
Detecting eCommerce Fraud with Neo4j and LinkuriousLinkurious
Last year, the global eCommerce market represented $1.9 trillions. As the market expands worldwide, the opportunity for fraud keeps growing with fraudsters constantly refining their tactics to outsmart anti-fraud frameworks. From chargeback fraud to re-shipping scam or identity fraud, numerous types of fraud can impact your organization. While collecting data is essential to enable real-time risk assessment, many organizations don’t have the necessary tools to find the insights needed to block fraud attempts.
Neo4j and Linkurious offer a solution to tackle the eCommerce fraud challenge. Their combined technologies provide a 360° overview of organization’s data and allow real-time analysis and detection of eCommerce fraud patterns and activities.
Maintaining networks and servers availability while reducing downtimes to minimum are fundamental missions for IT managers and administrators. But with the growing complexity of infrastructures, the pressure from business strategists to deliver new services or the heterogeneity of data assets, managing networks is often a challenge.
Graph technologies like Linkurious offer an intuitive approach to model and investigate data by putting the connections between components at the forefront. Modeling the network into a flexible and unified overview is one of the keys to understand your architecture and reduce risks, costs and time spent on maintenance operations.
Slides of Linkurious presentation at GraphConnect London 2017.
Tracking the flow of data is the foundation for solid data governance. It's also a compliance imperative for financial institutions impacted by BCBS 239. In this talk, we will discuss how graph-oriented data lineage is well suited for today's growing data volume and complexity. You will learn how to answer questions like: What would be the impact of a component of my data pipeline breaking up? Where does the data from a particular report originate?
Using Linkurious in your Enterprise Architecture projectsLinkurious
Architects, analysts and business managers need comprehensive modeling and visualization tools to understand how companies assets are assembled. Graph technologies allow to understand complex connected data and manage change and complexity in a more efficient way than traditional siloed solutions. With Linkurious technology, you get a comprehensive and visual overview of your enterprise architecture to successfully implement new systems, processes or frameworks.
Graph technologies have the potential to help businesses understand complex connected data. From financial crime to cyber-security to IT management, specific business requires custom applications. This is why we created the Linkurious SDK , a toolkit that enables you to quickly build secure and flexible applications to leverage the connections within your data or unveil hidden relationships.
Discover in this presentation the challenges of integrating graph technologies into enterprise applications; and how to use the Linkurious SDK to build a robust, secure and interactive graph application.
Fighting financial crime with graph analysis at BIWA Summit 2017Linkurious
Additional details on our blog: https://linkurio.us/visualize-oracle-graph-data-ogma-library/
Discover how to use graph analysis to identify suspicious connections and unmask criminals. In this session, Jean will share his experience working on the Panama Papers or with banks and insurance companies (first-party fraud, anti-money laundering, insurance fraud). He will explain how to combine the kind of graph analytics enabled by Oracle Spatial and Graph with powerful graph visualization to help analysts detect, investigate and stop financial crime.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Fraud detection, whiplash for cash scheme and Neo4j
1. Fraud detection and whiplash for
cash schemes
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
2. WHAT IS A GRAPH?
Father Of
Father Of
Siblings
This is a graph
3. WHAT IS A GRAPH : NODES AND RELATIONSHIPS
Father Of
Father Of
Siblings
A graph is a set of nodes linked by
relationships
This is a node
This is a
relationship
4. People, objects, movies,
restaurants, music
Antennas, servers, phones,
people
Supplier, roads, warehouses,
products
Graphs can be used to model many domains
DIFFERENT DOMAINS WHERE GRAPHS ARE IMPORTANT
Supply chains Social networks Communications
5. Stage fake accidents and receive real money
from insurance companies
WHAT IS A WHIPLASH FOR CASH SCHEME
Stage a fake car
accident
Fill insurance
claims
Cash in the
check
Based on the accident, they
fill insurance forms to ask
their insurance companies to
cover for injuries and the car
damages.
The insurance company
looks at the claim and writes
a check to its customers. The
fraudsters cash it.
A few fraudsters get together.
They define an accident
scenario and enact it.
6. But why is it hard to detect whiplash for cash
fraud rings?
WHY FRAUD DETECTION IS HARD
7. The criminal keep their claims small, corroborate
each other and pretend to have hard to disprove
injuries
PROBLEM 1 : CRIMINALS FLY BELOW THE RADAR
8. From one accident to the next, the vehicles, the
persons and their roles will change : hard to see
a pattern emerge
PROBLEM 2 : HARD TO SEE THE PATTERN IN A LARGE NUMBER OF ACCIDENTS
10. A single accident doesn’t look suspicious
A GRAPH DATA MODEL FOR A SINGLE ACCIDENT
IS_LAWYER
IS_DOCTOR
Udo
(Person)
Monroe
(Person)
Robrectch
(Person)
Skyler
(Person)
Euanthe
(Person)
Jasmine
(Person)
Chelle
(Person)
Sousanna
(Person)
Focus
(Car)
Corolla
(Car)
Accident 1
(Accident)
IS_INVOLVEDIS_INVOLVE
D
PASSENGER
DRIVER
DRIVER PASSENGER PASSENGER
PASSENGER
11. But representing the claim data as a graph
makes it easy to spot a fraud ring
WHAT DOES A FRAUD RING LOOK LIKE
3 separate accidents (above) involve a small set of 8 persons (below) who seem
to have strong relationships : suspicious?
12. HOW TO INVESTIGATE A WHIPLASH FOR CASH FRAUD RING : STARTING POINT
The investigation starts with a car accident...
As a fraud analyst, we’ll use a Neo4j graph database to investigate the claims
data and see if we can spot something suspicious
13. 1. Are the persons involved in the accident
involved in other accidents?
2. If they are, who are they involved with? Are
these people connected to other accidents?
HOW TO INVESTIGATE A WHIPLASH FOR CASH FRAUD RING : QUESTIONS
15. location date
Florida 23/05/2014
Florida 27/05/2014
QUESTION 1 : ARE THE PERSONS INVOLVED IN THE ACCIDENT INVOLVED IN OTHER ACCIDENTS
Our suspects are involved in 2 more accidents
16. With a simple “*” we are expanding our search
across the graph
QUESTION 2 : WHO ARE THEY INVOLVED WITH
MATCH (accident)<-[*]-(potentialfraudtser:Person)
WHERE accident.location = 'New Jersey'
RETURN DISTINCT potentialfraudtser.first_name as first_name, potentialfraudtser.
last_name as last_name
17. first_name last_name
Udo Halstein
Robrecht Miloslav
Monroe Maksymilian
Skyler Gavril
Euanthe Rossana
Jasmine Rhea
Sousanna Pinar
Chelle Jessie
QUESTION 2 : WHO ARE THEY INVOLVED WITH
We have a group of 8 people involved in 3
accidents
18. What if we want to detect automatically these
suspicious behaviour?
QUESTION 3 : IS IT POSSIBLE TO DETECT THE FRAUD
19. Looking in real time for highly connected
“accidentees”
QUESTION 3 : IS IT POSSIBLE TO DETECT THE FRAUD
MATCH (person1:Person)-[*..2]->(accident1:Accident)<-[*..2]-(person2:Person)-[*..2]->
(accident2:Accident)<-[*..2]-(person3:Person)-[*..2]->(accident3:Accident)
RETURN DISTINCT person1, person2, person3
20. QUESTION 3 : IS IT POSSIBLE TO DETECT THE FRAUD
It is possible to look for suspicious patterns at
large scale
An event triggers
security checks
New customer
New car registered
New accident
A Neo4j Cypher query
runs to detect patterns
Identification of the
fraudsters
21. The fraud teams acts faster
and more fraud cases can be
avoided.
WHAT IS THE IMPACT OF LINKURIOUS
If something suspicious comes up, the analysts
can use Linkurious to quickly assess the
situation
Linkurious allows the fraud
teams to go deep in the data
and build cases against fraud
rings.
Treat false
positives
Investigate
serious cases
Save money
Linkurious allows you to
control the alerts and make
sure your customers are not
treated like criminals.
26. Presentation on fraud and whiplash for cash by Philip Rathle and Gorka Sadowski (the
inspiration for this presentation) : https://vimeo.com/91743128
Article on whiplash for cash :
- the article : http://linkurio.us/whiplash-for-cash-using-graphs-for-fraud-detection/
- the dataset : https://www.dropbox.com/s/6ipfn4paaggughv/Whiplash%20for%20cash.zip
GraphGist on whiplash for cash :
- the article : http://gist.neo4j.org/?6bae1e799484267e3c60
Whitepaper on fraud detection by Philip Rathle and Gorka Sadowski :
- the whitepaper : http://www.neotechnology.com/fraud-detection/
SOME ADDITIONAL RESOURCES TO CONSIDER