Question

In: Math

4. (a) In a fraud detection system a number of different algorithms are working indepen- dently...

4. (a) In a fraud detection system a number of different algorithms are working indepen- dently to flag a fraudulent event. Each algorithm has probability 0.9 of correctly detecting such an event. The program director wants to be make sure the system can detect a fraud with high probability. You are tasked with finding out how many different algorithms need to be set up to detect a fraudulent event. Solve the following 3 problems and report to the director. [Total: 18 pts] (b) Suppose n is the number of algorithms set up. Derive an expression for the probability that a fraudulent event is detected. (6 pts) (c) Using R, draw a plot of the probability of a fraudulent event being detected versus n, varying n from 1 to 10. (6 pts) (d) Your colleague claims that if the company uses n = 4 algorithms, the probability of detecting the fraudulent event is 0.9999. The director is not convinced. Generate 1 million samples from Binomial distribution with n = 4, p = 0.90 and count the number of cases where Y = 0. Report the number to the director. (6 pts)

Solutions

Expert Solution

(b)

Probability that at least one of algorithm detects fraud = 1 - Probability that no algorithm detects fraud

= 1 - (1 - 0.9)n

= 1 - 0.1n

(c)

The plot of the probability of a fraudulent event being detected versus n is,

R Code:

> n = c(1:10)
> p = 1 - 0.1^n
> plot(n,p, pch = 16, col = "blue" , ylab ="probability of a fraudulent event being detected")

(d)

For n = 4,

Probability of a fraudulent event being detected = 1 - 0.14 = 0.9999

R code to generate 1 million samples from Binomial distribution with n = 4, p = 0.90 and count the number of cases where Y = 0.

x = rbinom(n = 1000000, size = 4, prob = 0.9)
sum(x == 0)

On running the code, we get the number of cases where Y = 0 is 94. Note that we will be getting different numbers on running the code.

Proportion of cases where Y = 0 = 94/1000000 = 0.0000094

Proportion of cases where Y is not 0 (so that the fraud is detected) = 1 - 0.0000094 = 0.9999906


Related Solutions

Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to...
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
In this assignment you are developing a fraud detection system to detect fraudulent activities based on...
In this assignment you are developing a fraud detection system to detect fraudulent activities based on this Decision Three. Your program receives a comma separated transaction log with the below format as its input: [amount],[# of transactions in last day],[area code],[transaction time] Your program should use string operations to decompose the transaction log and store its elements in variables of appropriate types. Then, based on the values of those attributes and the decision three, it attaches either a ",fraud" or...
How is probability theory applied in fraud detection?
How is probability theory applied in fraud detection?
evaluate the risk of fraud within a business suggesting methods for detection
evaluate the risk of fraud within a business suggesting methods for detection
We studied a number of different businesses that collapsed due to fraud but the difficulty was...
We studied a number of different businesses that collapsed due to fraud but the difficulty was in early detection. For the following case respond to the question and identify the effects on the financial statements and any concerns you may have. Also please note if you see any similarities to any of the companies we studied. CCM has many contracts that are long term and cross over reporting periods. They report their earnings before interest and taxes by prorating completed...
The COSO report is one of the foundations of internal auditing and fraud detection. Who is...
The COSO report is one of the foundations of internal auditing and fraud detection. Who is COSO? What is their ERM framework? How does this help us create an effective organization and minimize fraud?
Which of the following is not a way to improve fraud detection? Select one: a. Install...
Which of the following is not a way to improve fraud detection? Select one: a. Install fraud detection software. b. Implement a fraud hotline. c. Employ a computer security officer. d. Implement computer-based controls over input, processing, storage, and output activities.
Design a program in JAVA that allows you to experiment with different sort algorithms. The algorithms...
Design a program in JAVA that allows you to experiment with different sort algorithms. The algorithms are shell sort and quick sort. Assume that input data is stored in a text file. Experimenting with a prototype data (integers from 1 to 10) to ensure that your implementation works correctly and the results match expectations. The program will sort what is in the text file and print the amount of comparisons and exchanges for both algorithms.
Please no Plagiarism Steganography: Different type of algorithms, implementations, and write classic algorithms.
Please no Plagiarism Steganography: Different type of algorithms, implementations, and write classic algorithms.
Please no Plagiarism Kleptography: Different type of algorithms, implementations, and write classic algorithms.
Please no Plagiarism Kleptography: Different type of algorithms, implementations, and write classic algorithms.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT