IJMSC Vol. 5, No. 1, 8 Jan. 2019
Cover page and Table of Contents: PDF (size: 637KB)
Full Text (PDF, 637KB), PP.42-52
Views: 0 Downloads: 0
Data Mining, Benford’s Law, Bayesian Classification Method, Conversational Analytics, Interaction Analytics
This paper outlines the application of various classification methods and analytical techniques to identify a potential fraud. The aim of this document is to showcase the usefulness of such classification and analytical techniques for fraud detection. Considering the fact that there are hundreds of statistical methods and procedures to perform such analysis. In this paper, I would like to present a hybrid fraud detection method by using the Bayesian Classification technique to identify the risk group; followed by Benford's Law (The Law of First Digit) to detect a fraudulent transaction done by the identified risk group. Though this analysis focuses on the healthcare dataset, however, this technique can be replicated in any industry setup. Also, by adding the Voice of the Customer data to these classification and statistical methods, makes this analysis even more powerful and robust with improved accuracy.
Sunil Kappal,"Deplyoing Advance Data Analytics Techniques with Conversational Analytics Outputs for Fraud Detection", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.5, No.1, pp.42-52, 2019. DOI: 10.5815/ijmsc.2019.01.04
[1]http://as.wiley.com/WileyCDA/WileyTitle/productCd-1118152859.html
[2]http://www.canadiancapitalist.com/cheating-on-taxes-and-benfords-law/
[3]https://www.ft.com/content/afeea0be-01b9-11e6-99cb-83242733f755
[4]http://www.techrepublic.com/article/Conversational-analytics-why-the-big-data-source-isnt-music-to-your-competitors-ears/
[5]http://www.cs.unb.ca/~hzhang/publications/FLAIRS04ZhangH.pdf ( H. Zhang (2004)
[6]https://www.researchgate.net/publication/241401706_The_Effective_Use_of_Benford's_Law_to_ Assist_in_Detecting_Fraud_in_Accounting_Data
[7]https://faculty.uoit.ca/fletcherlu/LuECML05.pdf (Fletcher Lu and J Efrim Boritz)
[8]https://www.ijariit.com/manuscripts/v4i3/V4I3-1165.pdf (Sai Kiran, Jyoti Guru, Rishabh Kumar, Naveen Kumar, Deepak Kataria, Maheshwar Sharma
[9]http://www.iosrjournals.org/iosr-jce/papers/Vol18-issue4/Version-4/F1804042632.pdf (Carolyne Milgo)
[10]https://www.forbes.com/sites/bernardmarr/2016/08/08/the-amazing-potential-of-voice-analytics/
[11]https://www.datasciencecentral.com/profiles/blogs/fraud-analysis-using-speech-analytics-output-with-monte-carlo
[12]https://www.ey.com/Publication/vwLUAssets/ey-audio-analytics/$FILE/ey-audio-analytics.pdf
[13]http://www.speechtechmag.com/Articles/Editorial/FYI/Market-Spotlight-Banking-on-Speech-to-Prevent-Fraud-109084.aspx
[14]https://www.ft.com/content/fd711f44-dc4d-11e3-a33d-00144feabdc0
[15]https://patents.google.com/patent/WO2014107141A1