Detect fraud earlier to mitigate loss and prevent cascading damageFraud Analytics Using Descriptive, Predictive, and Social Network Techniques is
an authoritative guidebook for setting up a comprehensive fraud
detection analytics solution. Early detection is a key factor in
mitigating fraud damage, but it involves more specialized techniques
than detecting fraud at the more advanced stages. This invaluable guide
details both the theory and technical aspects of these techniques, and
provides expert insight into streamlining implementation. Coverage
includes data gathering, preprocessing, model building, and
post-implementation, with comprehensive guidance on various learning
techniques and the data types utilized by each. These techniques are
effective for fraud detection across industry boundaries, including
applications in insurance fraud, credit card fraud, anti-money laundering, healthcare fraud, telecommunications fraud, click fraud, tax evasion, and more, giving you a highly practical framework for fraud prevention.
It is estimated that a typical organization loses about 5% of its revenue to fraud every year. More effective fraud detection is possible, and this book describes the various analytical techniques your organization must implement to put a stop to the revenue leak.
Chapter 1: Fraud: Detection, Prevention, and Analytics!It is estimated that a typical organization loses about 5% of its revenue to fraud every year. More effective fraud detection is possible, and this book describes the various analytical techniques your organization must implement to put a stop to the revenue leak.
- Examine fraud patterns in historical data
- Utilize labeled, unlabeled, and networked data
- Detect fraud before the damage cascades
- Reduce losses, increase recovery, and tighten security
Introduction
Fraud!
Fraud Detection and Prevention Big Data for Fraud Detection
Data-Driven Fraud Detection
Fraud-Detection Techniques
Fraud Cycle
The Fraud Analytics Process Model
Fraud Data Scientists
A Scientific Perspective on Fraud
References
Chapter 2: Data Collection, Sampling, and Preprocessing
Introduction
Types of Data Sources
Merging Data Sources
Sampling
Types of Data Elements
Visual Data Exploration and Exploratory Statistical Analysis
Benford's Law
Descriptive Statistics
Missing Values
Outlier Detection and Treatment
Red Flags
Standardizing Data
Categorization
Weights of Evidence Coding
Variable Selection
Principal Components Analysis
RIDITs
PRIDIT Analysis
Segmentation
References
Chapter 3: Descriptive Analytics for Fraud Detection
Introduction
Graphical Outlier Detection Procedures
Statistical Outlier Detection Procedures
Clustering
One-Class SVMs
References
Chapter 4: Predictive Analytics for Fraud Detection
Introduction
Target Definition
Linear Regression
Logistic Regression
Variable Selection for Linear and Logistic Regression
Decision Trees
Neural Networks
Support Vector Machines
Ensemble Methods
Multiclass Classification Techniques
Evaluating Predictive Models
Other Performance Measures for Predictive Analytical Models
Developing Predictive Models for Skewed Data Sets
Fraud Performance Benchmarks
References
Chapter 5: Social Network Analysis for Fraud Detection
Networks: Form, Components, Characteristics, and Their Applications
Is Fraud a Social Phenomenon? An Introduction to Homophily
Impact of the Neighborhood: Metrics
Community Mining: Finding Groups of Fraudsters
Extending the Graph: Toward a Bipartite Representation
References
Chapter 6: Fraud Analytics: Post-Processing
Introduction
The Analytical Fraud Model Life Cycle
Model Representation
Selecting the Sample to Investigate
Fraud Alert and Case Management
Visual Analytics
Backtesting Analytical Fraud Models
Model Design and Documentation
References
Chapter 7: Fraud Analytics: A Broader Perspective
Introduction
Data Quality
Privacy
Capital Calculation for Fraud Loss
An Economic Perspective on Fraud Analytics
In Versus Outsourcing
Modeling Extensions
The Internet of Things
Corporate Fraud Governance
References
About the Authors
Index
End User License Agreement
No comments:
Post a Comment