{"id":241,"date":"2017-01-20T14:20:52","date_gmt":"2017-01-20T14:20:52","guid":{"rendered":"https:\/\/blogs.scu.edu\/finis\/?p=241"},"modified":"2017-01-20T14:20:52","modified_gmt":"2017-01-20T14:20:52","slug":"fraud-management-via-analytics","status":"publish","type":"post","link":"https:\/\/blogs.scu.edu\/finis\/2017\/01\/20\/fraud-management-via-analytics\/","title":{"rendered":"Fraud Management via Analytics"},"content":{"rendered":"<p>Fraud analytics is an emerging tool as it relates to detecting anomalies and patterns within voluminous amounts of big data. Fraud prevention measures can \u00a0be used to look\u00a0beyond the individual data points in an organization, to the connections that link them. Often these connections go unnoticed until it is too late. The sole objective of fraud analysis is to develop the most precise and valid inferences.The rationale being used here is that unexpected patterns can be symptoms of possible frauds.<\/p>\n<p><strong>Ratio analysis:\u00a0<\/strong>It\u00a0involves the calculation of ratios for key numeric fields. Like financial ratios that give indications of the relative health of a company, data analysis ratios point to possible symptoms of fraud. Three commonly employed ratios are: maximum\/minimum, Maximum\/Second highest and current year to the previous year. Unexplained deviations could be symptoms of fraud<\/p>\n<p><strong>Network analysis:<\/strong>Mapping relationships helps identify potential vulnerabilities within network between entities to identify association networks. As organizations grows, more complex relations get developed within and outside the establishments, which needs to be monitored, for any untoward development of ambiguity other than normal. It could reveal normal and anomalous patterns of interaction within and between people or groups, can expose facilitators of fraud.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fraud analytics is an emerging tool as it relates to detecting anomalies and patterns within voluminous amounts of big data. Fraud prevention measures can \u00a0be used to look\u00a0beyond the individual data points in an organization, to the connections that link them. Often these connections go unnoticed until it is too late. The sole objective of &hellip; <a href=\"https:\/\/blogs.scu.edu\/finis\/2017\/01\/20\/fraud-management-via-analytics\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Fraud Management via Analytics<\/span><\/a><\/p>\n","protected":false},"author":1681,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-241","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"gutentor_comment":1,"qubely_featured_image_url":null,"qubely_author":{"display_name":"mon","author_link":"https:\/\/blogs.scu.edu\/finis\/author\/sonam\/"},"qubely_comment":1,"qubely_category":"<a href=\"https:\/\/blogs.scu.edu\/finis\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","qubely_excerpt":"Fraud analytics is an emerging tool as it relates to detecting anomalies and patterns within voluminous amounts of big data. Fraud prevention measures can \u00a0be used to look\u00a0beyond the individual data points in an organization, to the connections that link them. Often these connections go unnoticed until it is too late. The sole objective of&hellip;","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/users\/1681"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/comments?post=241"}],"version-history":[{"count":1,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/241\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/posts\/241\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/media?parent=241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/categories?post=241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.scu.edu\/finis\/wp-json\/wp\/v2\/tags?post=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}