Deplyoing Advance Data Analytics Techniques with Conversational Analytics Outputs for Fraud Detection

Full Text (PDF, 637KB), PP.42-52

Views: 0 Downloads: 0

Author(s)

Sunil Kappal 1,*

1. GH5 and 7/775 Second Floor Paschim Vihar,India, New Delhi-87

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2019.01.04

Received: 11 Oct. 2017 / Revised: 23 May 2018 / Accepted: 19 Jul. 2018 / Published: 8 Jan. 2019

Index Terms

Data Mining, Benford’s Law, Bayesian Classification Method, Conversational Analytics, Interaction Analytics

Abstract

This paper outlines the application of various classification methods and analytical techniques to identify a potential fraud. The aim of this document is to showcase the usefulness of such classification and analytical techniques for fraud detection. Considering the fact that there are hundreds of statistical methods and procedures to perform such analysis. In this paper, I would like to present a hybrid fraud detection method by using the Bayesian Classification technique to identify the risk group; followed by Benford's Law (The Law of First Digit) to detect a fraudulent transaction done by the identified risk group. Though this analysis focuses on the healthcare dataset, however, this technique can be replicated in any industry setup. Also, by adding the Voice of the Customer data to these classification and statistical methods, makes this analysis even more powerful and robust with improved accuracy.

Cite This Paper

Sunil Kappal,"Deplyoing Advance Data Analytics Techniques with Conversational Analytics Outputs for Fraud Detection", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.5, No.1, pp.42-52, 2019. DOI: 10.5815/ijmsc.2019.01.04

Reference

[1]http://as.wiley.com/WileyCDA/WileyTitle/productCd-1118152859.html

[2]http://www.canadiancapitalist.com/cheating-on-taxes-and-benfords-law/

[3]https://www.ft.com/content/afeea0be-01b9-11e6-99cb-83242733f755

[4]http://www.techrepublic.com/article/Conversational-analytics-why-the-big-data-source-isnt-music-to-your-competitors-ears/

[5]http://www.cs.unb.ca/~hzhang/publications/FLAIRS04ZhangH.pdf ( H. Zhang (2004)

[6]https://www.researchgate.net/publication/241401706_The_Effective_Use_of_Benford's_Law_to_  Assist_in_Detecting_Fraud_in_Accounting_Data

[7]https://faculty.uoit.ca/fletcherlu/LuECML05.pdf (Fletcher Lu and J  Efrim Boritz)

[8]https://www.ijariit.com/manuscripts/v4i3/V4I3-1165.pdf (Sai Kiran, Jyoti Guru, Rishabh Kumar, Naveen Kumar, Deepak Kataria, Maheshwar Sharma

[9]http://www.iosrjournals.org/iosr-jce/papers/Vol18-issue4/Version-4/F1804042632.pdf (Carolyne Milgo)

[10]https://www.forbes.com/sites/bernardmarr/2016/08/08/the-amazing-potential-of-voice-analytics/

[11]https://www.datasciencecentral.com/profiles/blogs/fraud-analysis-using-speech-analytics-output-with-monte-carlo

[12]https://www.ey.com/Publication/vwLUAssets/ey-audio-analytics/$FILE/ey-audio-analytics.pdf

[13]http://www.speechtechmag.com/Articles/Editorial/FYI/Market-Spotlight-Banking-on-Speech-to-Prevent-Fraud-109084.aspx

[14]https://www.ft.com/content/fd711f44-dc4d-11e3-a33d-00144feabdc0

[15]https://patents.google.com/patent/WO2014107141A1