Data Analysis Techniques for Fraud Detection

Results: 78



#Item
21Science / Crimes / Fraud / Academic dishonesty / Betrayers of the Truth: Fraud and Deceit in the Halls of Science / Scientific method / Data Analysis Techniques for Fraud Detection / The Great Betrayal: Fraud In Science / Scientific misconduct / Education / Knowledge

What do we know about fraud and other forms of intellectual dishonesty in science? Part 1. The spectrum of deviant behavior in science

Add to Reading List

Source URL: www.garfield.library.upenn.edu

Language: English - Date: 2002-08-26 11:49:21
22Business intelligence / Science / Auditing / Computer-aided audit tools / Forensic accounting / Microsoft Excel / Analytics / Data analysis / Data Analysis Techniques for Fraud Detection / Accountancy / Business / Information technology audit

ARBUTUS Arbutus Fraud Detection AUDIT ANALYTICS FOR FRAUD DETECTION AND FORENSIC INVESTIGATION

Add to Reading List

Source URL: www.arbutussoftware.com

Language: English - Date: 2014-10-06 16:45:23
23Deception / Fraud / Tort law / Political corruption / Financial crimes / Money laundering / Forensic accountant / ReD / Data Analysis Techniques for Fraud Detection / Ethics / Law / Crimes

Investigating Fraud and Corruption Workshop aim Fraud and corruption impacts upon the efficiency, reputation, morale and stability of an organisation, often creating problems far greater than the financial losses involve

Add to Reading List

Source URL: www.ripainternational.co.uk

Language: English - Date: 2014-09-23 12:17:09
24Email / ReD / Fraud / Computing / Technology / Electronics / Data Analysis Techniques for Fraud Detection / Payment systems / Business / Revenue assurance

Fraud Management Case Study

Add to Reading List

Source URL: www.equinoxis.com

Language: English - Date: 2013-11-26 10:10:22
25Data mining / Data security / Anomaly / Outlier / Computer-aided audit tools / Data Analysis Techniques for Fraud Detection / Statistics / Data analysis / Anomaly detection

A modified version of this technical report will appear in ACM Computing Surveys, September[removed]Anomaly Detection : A Survey VARUN CHANDOLA University of Minnesota ARINDAM BANERJEE

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:29:06
26Computer security / Information technology management / Information / Local outlier factor / Intrusion detection system / Synthetic data / Threat / Association rule learning / Data Analysis Techniques for Fraud Detection / Data mining / Statistics / Data management

Detection of Undesirable Insider Behavior Joseph A. Calandrino1? , Steven J. McKinney2? , and Frederick T. Sheldon3 1 Princeton University, Princeton, NJ 08544, USA [removed]

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 08:59:10
27Deception / Behavior / Criminology / Tort law / White-collar crime / Insurance fraud / Advance-fee fraud / Confidence trick / Data Analysis Techniques for Fraud Detection / Ethics / Fraud / Crimes

AU S T RAL IAN I N S T I T U T E OF CRIMINOLOGY trends No. 199 &

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-06-19 14:47:43
28Wielkopolski Bank Kredytowy / ReD / Bank Zachodni WBK / Bank Zachodni / Credit card / Financial services / Data Analysis Techniques for Fraud Detection / National Hunter / Allied Irish Banks / Ethics / Fraud

Case study: Bank Zachodni Increasing fraud detection effectiveness and efficiency for leading Polish bank

Add to Reading List

Source URL: www.experian.co.za

Language: English - Date: 2015-01-07 08:43:55
29Ethics / Adaptive learning / Law / ReD / Fraud / Clickstream / Adaptive behavior / Data Analysis Techniques for Fraud Detection / Payment systems / Learning / Brighterion

brighterion_cutsheet_postcard_iprevent

Add to Reading List

Source URL: www.brighterion.com

Language: English - Date: 2013-05-02 19:55:34
30Data mining / Anomaly detection / Intrusion detection system / AAFID / Feature selection / Feature / Data Analysis Techniques for Fraud Detection / Statistics / Computer security / Data security

The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-02-05 20:56:16
UPDATE