Details

Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques


Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques

A Guide to Data Science for Fraud Detection
Wiley and SAS Business Series 1. Aufl.

von: Bart Baesens, Veronique Van Vlasselaer, Wouter Verbeke

33,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 27.07.2015
ISBN/EAN: 9781119146827
Sprache: englisch
Anzahl Seiten: 400

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Detect fraud earlier to mitigate loss and prevent cascading damage</b> <p><i>Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques </i>is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early detection is a key factor in mitigating fraud damage, but it involves more specialized techniques than detecting fraud at the more advanced stages. This invaluable guide details both the theory and technical aspects of these techniques, and provides expert insight into streamlining implementation. Coverage includes data gathering, preprocessing, model building, and post-implementation, with comprehensive guidance on various learning techniques and the data types utilized by each. These techniques are effective for fraud detection across industry boundaries, including applications in insurance fraud, credit card fraud, anti-money laundering, healthcare fraud, telecommunications fraud, click fraud, tax evasion, and more, giving you a highly practical framework for fraud prevention.</p> <p>It is estimated that a typical organization loses about 5% of its revenue to fraud every year. More effective fraud detection is possible, and this book describes the various analytical techniques your organization must implement to put a stop to the revenue leak.</p> <ul> <li>Examine fraud patterns in historical data</li> <li>Utilize labeled, unlabeled, and networked data</li> <li>Detect fraud before the damage cascades</li> <li>Reduce losses, increase recovery, and tighten security</li> </ul> <p>The longer fraud is allowed to go on, the more harm it causes. It expands exponentially, sending ripples of damage throughout the organization, and becomes more and more complex to track, stop, and reverse. Fraud prevention relies on early and effective fraud detection, enabled by the techniques discussed here. <i>Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques</i> helps you stop fraud in its tracks, and eliminate the opportunities for future occurrence.</p>
<p>List of Figures xv</p> <p>Foreword xxiii</p> <p>Preface xxv</p> <p>Acknowledgments xxix</p> <p><b>Chapter 1 Fraud: Detection, Prevention, and Analytics! 1</b></p> <p>Introduction 2</p> <p>Fraud! 2</p> <p>Fraud Detection and Prevention 10</p> <p>Big Data for Fraud Detection 15</p> <p>Data-Driven Fraud Detection 17</p> <p>Fraud-Detection Techniques 19</p> <p>Fraud Cycle 22</p> <p>The Fraud Analytics Process Model 26</p> <p>Fraud Data Scientists 30</p> <p>A Fraud Data Scientist Should Have Solid Quantitative Skills 30</p> <p>A Fraud Data Scientist Should Be a Good Programmer 31</p> <p>A Fraud Data Scientist Should Excel in Communication and Visualization Skills 31</p> <p>A Fraud Data Scientist Should Have a Solid Business Understanding 32</p> <p>A Fraud Data Scientist Should Be Creative 32</p> <p>A Scientific Perspective on Fraud 33</p> <p>References 35</p> <p><b>Chapter 2 Data Collection, Sampling, and Preprocessing 37</b></p> <p>Introduction 38</p> <p>Types of Data Sources 38</p> <p>Merging Data Sources 43</p> <p>Sampling 45</p> <p>Types of Data Elements 46</p> <p>Visual Data Exploration and Exploratory Statistical Analysis 47</p> <p>Benford’s Law 48</p> <p>Descriptive Statistics 51</p> <p>Missing Values 52</p> <p>Outlier Detection and Treatment 53</p> <p>Red Flags 57</p> <p>Standardizing Data 59</p> <p>Categorization 60</p> <p>Weights of Evidence Coding 63</p> <p>Variable Selection 65</p> <p>Principal Components Analysis 68</p> <p>RIDITs 72</p> <p>PRIDIT Analysis 73</p> <p>Segmentation 74</p> <p>References 75</p> <p><b>Chapter 3 Descriptive Analytics for Fraud Detection 77</b></p> <p>Introduction 78</p> <p>Graphical Outlier Detection Procedures 79</p> <p>Statistical Outlier Detection Procedures 83</p> <p>Break-Point Analysis 84</p> <p>Peer-Group Analysis 85</p> <p>Association Rule Analysis 87</p> <p>Clustering 89</p> <p>Introduction 89</p> <p>Distance Metrics 90</p> <p>Hierarchical Clustering 94</p> <p>Example of Hierarchical Clustering Procedures 97</p> <p>k-Means Clustering 104</p> <p>Self-Organizing Maps 109</p> <p>Clustering with Constraints 111</p> <p>Evaluating and Interpreting Clustering Solutions 114</p> <p>One-Class SVMs 117</p> <p>References 118</p> <p><b>Chapter 4 Predictive Analytics for Fraud Detection 121</b></p> <p>Introduction 122</p> <p>Target Definition 123</p> <p>Linear Regression 125</p> <p>Logistic Regression 127</p> <p>Basic Concepts 127</p> <p>Logistic Regression Properties 129</p> <p>Building a Logistic Regression Scorecard 131</p> <p>Variable Selection for Linear and Logistic Regression 133</p> <p>Decision Trees 136</p> <p>Basic Concepts 136</p> <p>Splitting Decision 137</p> <p>Stopping Decision 140</p> <p>Decision Tree Properties 141</p> <p>Regression Trees 142</p> <p>Using Decision Trees in Fraud Analytics 143</p> <p>Neural Networks 144</p> <p>Basic Concepts 144</p> <p>Weight Learning 147</p> <p>Opening the Neural Network Black Box 150</p> <p>Support Vector Machines 155</p> <p>Linear Programming 155</p> <p>The Linear Separable Case 156</p> <p>The Linear Nonseparable Case 159</p> <p>The Nonlinear SVM Classifier 160</p> <p>SVMs for Regression 161</p> <p>Opening the SVM Black Box 163</p> <p>Ensemble Methods 164</p> <p>Bagging 164</p> <p>Boosting 165</p> <p>Random Forests 166</p> <p>Evaluating Ensemble Methods 167</p> <p>Multiclass Classification Techniques 168</p> <p>Multiclass Logistic Regression 168</p> <p>Multiclass Decision Trees 170</p> <p>Multiclass Neural Networks 170</p> <p>Multiclass Support Vector Machines 171</p> <p>Evaluating Predictive Models 172</p> <p>Splitting Up the Data Set 172</p> <p>Performance Measures for Classification Models 176</p> <p>Performance Measures for Regression Models 185</p> <p>Other Performance Measures for Predictive Analytical Models 188</p> <p>Developing Predictive Models for Skewed Data Sets 189</p> <p>Varying the Sample Window 190</p> <p>Undersampling and Oversampling 190</p> <p>Synthetic Minority Oversampling Technique (SMOTE) 192</p> <p>Likelihood Approach 194</p> <p>Adjusting Posterior Probabilities 197</p> <p>Cost-sensitive Learning 198</p> <p>Fraud Performance Benchmarks 200</p> <p>References 201</p> <p><b>Chapter 5 Social Network Analysis for Fraud Detection 207</b></p> <p>Networks: Form, Components, Characteristics, and Their Applications 209</p> <p>Social Networks 211</p> <p>Network Components 214</p> <p>Network Representation 219</p> <p>Is Fraud a Social Phenomenon? An Introduction to Homophily 222</p> <p>Impact of the Neighborhood: Metrics 227</p> <p>Neighborhood Metrics 228</p> <p>Centrality Metrics 238</p> <p>Collective Inference Algorithms 246</p> <p>Featurization: Summary Overview 254</p> <p>Community Mining: Finding Groups of Fraudsters 254</p> <p>Extending the Graph: Toward a Bipartite Representation 266</p> <p>Multipartite Graphs 269</p> <p>Case Study: Gotcha! 270</p> <p>References 277</p> <p><b>Chapter 6 Fraud Analytics: Post-Processing 279</b></p> <p>Introduction 280</p> <p>The Analytical Fraud Model Life Cycle 280</p> <p>Model Representation 281</p> <p>Traffic Light Indicator Approach 282</p> <p>Decision Tables 283</p> <p>Selecting the Sample to Investigate 286</p> <p>Fraud Alert and Case Management 290</p> <p>Visual Analytics 296</p> <p>Backtesting Analytical Fraud Models 302</p> <p>Introduction 302</p> <p>Backtesting Data Stability 302</p> <p>Backtesting Model Stability 305</p> <p>Backtesting Model Calibration 308</p> <p>Model Design and Documentation 311</p> <p>References 312</p> <p><b>Chapter 7 Fraud Analytics: A Broader Perspective 313</b></p> <p>Introduction 314</p> <p>Data Quality 314</p> <p>Data-Quality Issues 314</p> <p>Data-Quality Programs and Management 315</p> <p>Privacy 317</p> <p>The RACI Matrix 318</p> <p>Accessing Internal Data 319</p> <p>Label-Based Access Control (LBAC) 324</p> <p>Accessing External Data 325</p> <p>Capital Calculation for Fraud Loss 326</p> <p>Expected and Unexpected Losses 327</p> <p>Aggregate Loss Distribution 329</p> <p>Capital Calculation for Fraud Loss Using Monte Carlo Simulation 331</p> <p>An Economic Perspective on Fraud Analytics 334</p> <p>Total Cost of Ownership 334</p> <p>Return on Investment 335</p> <p>In Versus Outsourcing 337</p> <p>Modeling Extensions 338</p> <p>Forecasting 338</p> <p>Text Analytics 340</p> <p>The Internet of Things 342</p> <p>Corporate Fraud Governance 344</p> <p>References 346</p> <p>About the Authors 347</p> <p>Index 349</p>
<p><B>BART BAESENS</B> is a full professor at KU Leuven, and a lecturer at the University of Southampton. He has done extensive research on analytics, customer relationship management, web analytics, fraud detection, and credit risk management. He regularly advises and provides consulting support to international firms with respect to their analytics and credit risk management strategy. <p><B>VÉRONIQUE VAN VLASSELAER</B> is a PhD researcher in the Department of Decision Sciences and Information Management at KU Leuven. Her research focuses on the develop­ment of new techniques for fraud detection by combining predictive and network analytics. <p><B>WOUTER VERBEKE</B> is an assistant professor at Vrije Universiteit Brussel (Brussels, Belgium). His research is situated in the field of predictive analytics and complex network analysis with applications in fraud, marketing, credit risk, human resources management, and mobility.
<p>The sooner fraud detection occurs the better—as the likelihood of further losses is lower, potential recoveries are higher, and security issues can be addressed more rapidly. Catching fraud in an early stage, though, is more difficult than detecting it later, and requires specific techniques. Packed with numerous real-world examples, <i>Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques</i> authoritatively shows you how to put historical data to work against fraud. <p>Authors Bart Baesens, Véronique Van Vlasselaer, and Wouter Verbeke expertly discuss the use of unsupervised learning, supervised learning, and social network learning using techniques across a wide variety of fraud applications, such as insurance fraud, credit card fraud, anti-money laundering, healthcare fraud, telecommunications fraud, click fraud, and tax evasion. This book provides the essential guidance you need to examine fraud patterns from historical data in order to detect fraud earvly in the process. <p>Providing a clear look at the pivotal role analytics plays in managing fraud, this book includes straightforward guidance on: <ul><li>Fraud detection, prevention, and analytics</li> <li>Data collection, sampling, and preprocessing</li> <li>Descriptive analytics for fraud detection</li> <li>Predictive analytics for fraud detection</li> <li>Social network analytics for fraud detection</li> <li>Post processing of fraud analytics</li> <li>Fraud analytics from an economic perspective</li></ul> <p>Read <i>Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques</i> for a comprehensive overview of fraud detection analytical techniques and implementation guidance for an effective fraud prevention solution that works for your organization.

Diese Produkte könnten Sie auch interessieren:

V poiskah istochnikov rosta. Uchebnye keysy na materialah rossiyskih kompaniy
V poiskah istochnikov rosta. Uchebnye keysy na materialah rossiyskih kompaniy
von: Andrey Starkov, Alexander Lebedev, Daniil Muravsky, Pavel Voloshchuk, Vera Rebyazina, Olga Kusraeva, Alexander Pligin, Olga Mondrus, Alexander Rozhkov, Andrey Dubovskov, Denis Klimanov
EPUB ebook
9,99 €
All In - gemeinsam erfolgreich
All In - gemeinsam erfolgreich
von: Mike Michalowicz
PDF ebook
15,99 €
All In - gemeinsam erfolgreich
All In - gemeinsam erfolgreich
von: Mike Michalowicz
EPUB ebook
15,99 €