Question

In: Accounting

What is Fraud Detection and how can Decision Tree be used to discover and prevent Fraudulent...

What is Fraud Detection and how can Decision Tree be used to discover and prevent Fraudulent Activity?

Solutions

Expert Solution

Solution:-

What is Fraud Detection:-

Fraud detection is a topic applicable to many industries including banking and financial sectors, insurance, government agencies and law enforcement, and more. Fraud attempts have seen a drastic increase in recent years, making fraud detection more important than ever. Despite efforts on the part of the affected institutions, hundreds of millions of dollars are lost to fraud every year. Since relatively few cases show fraud in a large population, finding these can be tricky.

In banking, fraud can involve using stolen credit cards, forging checks, misleading accounting practices, etc. In insurance, 25% of claims contain some form of fraud, resulting in approximately 10% of insurance payout dollars. Fraud can range from exaggerated losses to deliberately causing an accident for the payout. With all the different methods of fraud, finding it becomes harder still.  

Data mining and statistics help to anticipate and quickly detect fraud and take immediate action to minimize costs. Through the use of sophisticated data mining tools, millions of transactions can be searched to spot patterns and detect fraudulent transactions.

An important early step in fraud detection is to identify factors that can lead to fraud. What specific phenomena typically occur before, during, or after a fraudulent incident?  What other characteristics are generally seen with fraud? When these phenomena and characteristics are pinpointed, predicting and detecting fraud becomes a much more manageable task.

Using sophisticated data mining tools such as decision trees (Boosting trees, Classification trees, CHAID and Random Forests),  machine learning,  association rules, cluster analysis and neural networks , predictive models can be generated to estimate things such as probability of fraudulent behavior or the dollar amount of fraud.  These predictive models help to focus resources in the most efficient manner to prevent or recuperate fraud losses.

How can Decision Tree be used to discover and prevent Fraudulent Activity:-

With the developments in the information technology, fraud is spreading all over the world, resulting in huge financial losses. Though fraud prevention mechanisms such as CHIP&PIN are developed for credit card systems, these mechanisms do not prevent the most common fraud types such as fraudulent credit card usages over virtual POS (Point Of Sale) terminals or mail orders so called online credit card fraud. As a result, fraud detection becomes the essential tool and probably the best way to stop such fraud types. In this study, a new cost-sensitive decision tree approach which minimizes the sum of misclassification costs while selecting the splitting attribute at each non-terminal node is developed and the performance of this approach is compared with the well-known traditional classification models on a real world credit card data set. In this approach, misclassification costs are taken as varying. The results show that this cost-sensitive decision tree algorithm outperforms the existing well-known methods on the given problem set with respect to the well-known performance metrics such as accuracy and true positive rate, but also a newly defined cost-sensitive metric specific to credit card fraud detection domain. Accordingly, financial losses due to fraudulent transactions can be decreased more by the implementation of this approach in fraud detection systems.


Related Solutions

Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
In this assignment you are developing a fraud detection system to detect fraudulent activities based on...
In this assignment you are developing a fraud detection system to detect fraudulent activities based on this Decision Three. Your program receives a comma separated transaction log with the below format as its input: [amount],[# of transactions in last day],[area code],[transaction time] Your program should use string operations to decompose the transaction log and store its elements in variables of appropriate types. Then, based on the values of those attributes and the decision three, it attaches either a ",fraud" or...
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to...
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
Explain how the risk analysis decision tree can be used in conjunction with the five-step process...
Explain how the risk analysis decision tree can be used in conjunction with the five-step process for ADA. Provide an example.
How is probability theory applied in fraud detection?
How is probability theory applied in fraud detection?
When it comes to fraud that an A/P does, What can the company do to prevent...
When it comes to fraud that an A/P does, What can the company do to prevent this type of behavior?
Because all fraud involves some form of financial misstatement, how is fraudulent statement fraud different?
Because all fraud involves some form of financial misstatement, how is fraudulent statement fraud different? 
What is the decision learning tree?
What is the decision learning tree?
find current techniques used to prevent payroll fraud. Discuss what you see as the advantages and...
find current techniques used to prevent payroll fraud. Discuss what you see as the advantages and disadvantages of what you found.
1. How could this fraud have been prevented? Why is this a difficult fraud to prevent?...
1. How could this fraud have been prevented? Why is this a difficult fraud to prevent? 1. What factors in Johnson’s control environment have led to and facilitated the manager’s manipulation of inventory? 2. What pressures did Debbie have to overstate inventory? 3. What rationalization did Debbie use to justify her fraud? . How could this fraud have been prevented? Why is this a difficult fraud to prevent?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT