Home Page Icon
Home Page
Table of Contents for
Cover Page
Close
Cover Page
by Delena D. Spann
Fraud Analytics: Strategies and Methods for Detection and Prevention
Cover Page
Title Page
Copyright
Dedication
Contents
Foreword
Preface
Acknowledgments
Chapter 1: The Schematics of Fraud and Fraud Analytics
HOW DO WE DEFINE FRAUD ANALYTICS?
MINING THE FIELD: FRAUD ANALYTICS IN ITS NEW PHASE
HOW DO WE USE FRAUD ANALYTICS?
FRAUD DETECTION
HOW DO WE DEFINE FRAUD ANALYTICS?
FRAUD ANALYTICS REFINED
NOTES
Chapter 2: The Evolution of Fraud Analytics
WHY USE FRAUD ANALYTICS?
THE EVOLUTION CONTINUES
FRAUD PREVENTION AND DETECTION IN FRAUD ANALYTICS
INCENTIVES, PRESSURES, AND OPPORTUNITIES
NOTES
Chapter 3: The Analytical Process and the Fraud Analytical Approach
THE TURN OF THE ANALYTICAL WHEEL
IT TAKES MORE THAN ONE STEP
PROBABILITIES OF FRAUD AND WHERE IT ALL BEGINS
WHAT SHOULD THE FRAUD ANALYTICS PROCESS LOOK LIKE?
DATA ANALYTICS EXPOSED
NOTES
Chapter 4: Using ACL Analytics in the Face of Excel
THE DEVIL REMAINS IN THE DETAILS
NOTES
Chapter 5: Fraud Analytics versus Predictive Analytics
OVERVIEW OF FRAUD ANALYSIS AND PREDICTIVE ANALYSIS
COMPARING AND CONTRASTING METHODOLOGIES
13 STEP SCORE DEVELOPMENT VERSUS FRAUD ANALYSIS
CRISP-DM VERSUS FRAUD DATA ANALYSIS
SAS/SEMMA VERSUS FRAUD DATA ANALYSIS
CONFLICTS WITHIN METHODOLOGIES
COMPOSITE METHODOLOGY
COMPARING AND CONTRASTING PREDICTIVE MODELING AND DATA ANALYSIS
NOTES
Chapter 6: CaseWare IDEA Data Analysis Software
DETECTING FRAUD WITH IDEA
FRAUD ANALYSIS POINTS OF IDEA
CORRELATION, TREND ANALYSIS, AND TIME SERIES ANALYSIS
WHAT IS IDEA'S PURPOSE?
A SIMPLE SCHEME: THE PURCHASE FRAUD OF AN EMPLOYEE AS A VENDOR
STAGES OF USING IDEA
NOTES
Chapter 7: Centrifuge Analytics: Is Big Data Enough?
SOPHISTICATED LINK ANALYSIS
THE CHALLENGE WITH ANTI-COUNTERFEITING
INTERACTIVE ANALYTICS: THE CENTRIFUGE WAY
FRAUD ANALYSIS WITH CENTRIFUGE VNA
THE FRAUD MANAGEMENT PROCESS
NOTES
Chapter 8: i2 Analyst's Notebook: Best in Fraud Solutions
RAPID INVESTIGATION OF FRAUD AND FRAUDSTERS
i2 ANALYST'S NOTEBOOK
i2 ANALYST'S NOTEBOOK AND FRAUD ANALYTICS
HOW TO USE i2 ANALYST'S NOTEBOOK: FRAUD FINANCIAL ANALYTICS
USING i2 ANALYST'S NOTEBOOK IN A MONEYLAUNDERING SCENARIO
NOTES
Chapter 9: The Power to Know Big Data:
THE SAS WAY
ACTIONABLE INTELLIGENCE TECHNOLOGIES' FINANCIAL INVESTIGATIVE SOFTWARE
A CASE IN POINT
NOTES
Chapter 10: New Trends in Fraud Analytics and Tools
THE MANY FACES OF FRAUD ANALYTICS
THE PAPER CHASE IS OVER
TO BE OR NOT TO BE
RAYTHEON'S VISUALINKS
FICO INSURANCE FRAUD MANAGER 3.3
IBM i2 iBase
PALANTIR TECH
FISERV'S AML MANAGER
NOTES
About the Author
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset