47 research outputs found

    A New Prototype for Intelligent Visual Fraud Detection in Agent-Based Auditing Framework

    Get PDF
    While US. Sarbanes Oxley act has been viewed by most as an onerous and expensive requirement; it is having a positive impact on driving appropriate levels of investment in IT security, controls, and transactional systems. This paper introduces a new secure solution for auditing and accounting based on artificial intelligence technology. These days, security is a big issue among regulatory firms. Big companies are concerned about their data to be disseminated to their competitors; this high risk prevents them to provide full information to the regulatory firms. This solution not only significantly reduces the risk of unauthorized access to the company’s information but also facilitate a framework for controlling the flow of disseminating information in a risk free method. Managing security is performed by a network of mobile agents in a pyramid structure among regulatory organization like securities and exchanges commissions, stock exchanges in top of this pyramid to the companies in the button. Because of security considerations, our strategy is to delegate all fraud detection algorithms to Intelligent Mobile Auditing Agent and web service undertake all inter communicational activity. Web services can follow auditing actives in predefined framework and they can act based on permitted security allowance to auditors. The current solution is designed based on Java-based mobile agents. Such design reaps strong mobility and security benefits. This new prototyped solution could be a framework for strengthening security for future development in this area. An insider trading case study is used to demonstrate and evaluate the approach

    A Comprehensive Survey of Data Mining-based Fraud Detection Research

    Full text link
    This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines the professional fraudster, formalises the main types and subtypes of known fraud, and presents the nature of data evidence collected within affected industries. Within the business context of mining the data to achieve higher cost savings, this research presents methods and techniques together with their problems. Compared to all related reviews on fraud detection, this survey covers much more technical articles and is the only one, to the best of our knowledge, which proposes alternative data and solutions from related domains.Comment: 14 page

    Supporting Financial Market Surveillance: An IT Artifact Evaluation

    Get PDF
    In this paper, an IT artifact instantiation (i.e. software prototype) to support decision making in the field of financial market surveillance, is presented and evaluated. This artifact utilizes a qualitative multi-attribute model to identify situations in which prices of single stocks are affected by fraudsters who aggressively advertise the stock. A quantitative evaluation of the instantiated IT artifact, based on voluminous and heterogeneous data including data from social media, is provided. The empirical results indicate that the developed IT artifact instantiation can provide support for identifying such malicious situations. Given this evidence, it can be shown that the developed solution is able to utilize massive and heterogeneous data, including user-generated content from financial blogs and news platforms, to provide practical decision support in the field of market surveillance

    Automated Social Hierarchy Detection through Email Network Analysis

    Get PDF
    We present our work on automatically extracting social hierarchies from electronic communication data. Data mining based on user behavior can be leveraged to analyze and catalog patterns of communications between entities to rank relationships. The advantage is that the analysis can be done in an automatic fashion and can adopt itself to organizational changes over time. We illustrate the algorithms over real world data using the Enron corporation's email archive. The results show great promise when compared to the corporations work chart and judicial proceeding analyzing the major players

    Geração de perfis Web baseada em assinaturas

    Get PDF
    Dissertação de mestrado em Engenharia de InformáticaNo mundo atual, com o crescimento da Internet e o consequente aumento de informação e serviços que são oferecidos pelas empresas e organizações no seu ambiente torna-se premente desenvolver técnicas que facilitem a navegação dos utilizadores por este enorme espaço virtual. A forma como interagimos com os diversos sítios presentes na Internet define um determinado comportamento, os nossos hábitos, os nossos costumes. De facto, no nosso dia-a-dia, e depois de frequentar durante bastante tempo um mesmo estabelecimento, apreciamos o cuidado com que, por vezes, sem nada dizer, o que mais apreciamos é posto à frente e à nossa disposição sem que sejamos consultados. Simplesmente conhecem-nos. Os sítios na Internet cada vez mais tentam ter esse mesmo cuidado com os seus utilizadores. Todavia, a comunidade cibernauta é, como sabemos, muito vasta e heterógena e, como tal, saber os hábitos e costumes de tantos indivíduos é uma tarefa complicada. O uso de perfis é uma ação normal na caracterização de utilizadores, seja por questões de segurança ou funcionais. Um determinado utilizador pode sempre enquadrar-se num ou noutro perfil, em que cada um deles determina o acesso a este ou àquele tipo de informação ou funcionalidade usualmente oferecida por um sítio presente na Internet. Este tipo caracterização pode permitir o agrupamento de utilizadores por diversos perfis, facilitando a gestão de informação e serviços, aproximando-os às necessidades reais dos utilizadores. Contudo uma das questões relacionadas com este tipo de caracterização de perfis é o facto de ela ser estática ao longo do tempo. Os nossos comportamentos e hábitos, como é conhecido, podem não o ser. O conhecimento de “Quem nós somos” num sítio pode sofrer alterações ao longo do tempo. As nossas características de consumo e as nossas preferências podem mudar, o que nos define perante ele, a nossa assinatura, pode ter variações. As características de utilização que os diversos sítios presentes Internet valorizam mais varia de sítio para sítio. Questões de consumo, por exemplo, serão provavelmente mais valorizadas em sítios que ofereçam produtos e serviços, em detrimento de outras questões, dependendo, obviamente dos objetivos de negócio do sítio em questão. Com certeza que, a definição de quais as características mais importantes num determinado contexto irá definir os atributos da assinatura dos utilizadores para esse sítio, tendo cada utilizador um valor diferente de acordo com esses atributos. Cada utilizador terá a sua assinatura. O valor da assinatura dos utilizadores ao longo do tempo tem que ser determinada por processos de cálculo específicos e ajustados ao contexto em questão e à informação disponível. O uso de técnicas de mineração de dados e de extração de conhecimento é, assim, essencial para este processo. A definição e o cálculo da variação de assinaturas de utilizadores para um dado sítio permitem a realização de várias análises. Uma delas é a análise do perfil de um utilizador ao longo do tempo. A variação da assinatura de um utilizador poderá indiciar uma alteração no seu perfil de comportamento perante o sítio que frequenta. O sítio, sabendo dessa alteração, poderá reagir de forma dinâmica e de diversas formas. Por exemplo, alterando o conteúdo ou a estrutura do próprio sítio. Neste trabalho de dissertação foram exploradas estas temáticas. Mais especificamente pretendeu-se aprofundar a definição de assinatura de um utilizador Web e a sua associação aos diversos padrões de utilização de um sítio. No âmbito deste trabalho, esses padrões foram extraídos recorrendo a técnicas de mineração de dados a partir de diversas fontes de informação disponibilizadas pelos servidores que alojam os sítios. As técnicas utilizadas na extração desse conhecimento são também abordadas ao longo desta dissertação, com o objetivo de fornecer uma perspetiva global tanto do processo de mineração de dados em si, como da posterior associação do conhecimento extraído às assinaturas definidas para os utilizadores de um sítio específico que escolhemos como alvo para o nosso estudo.In today's world, with the continuous growth of the Internet and the consequent increase of information and services that are offered by companies and organizations, it is urgent to develop techniques that ease users’ navigation throughout this virtual space. The way we interact with the various sites on the Internet defines a particular behavior, our habits and our customs. In fact, in our daily life and after attending for a long time the same establishment, we appreciate that sometimes, without saying a word, the things that we like the most are put at our disposal without we being consulted. They just know us. The websites increasingly try to have that same care with their users. However and as we know, the cybernetic community is very large and heterogeneous and as so, knowing the habits and customs of so many individual users is a complicated task. The use of profiles is a normal procedure in user characterization, either for security or functional reasons. A given user can always be fitted in one profile and each profile will give access to various types of information or functionalities, usually given by a website. This characterization may allow the grouping of users by different profiles, easing the information and services management, bringing them closer to the real needs of users. However one of the issues with this type of profile characterization is that it is static over time. Our behaviors and routines, as it is known, may not be. The knowledge of “Who we are” in a website may change over time. Our consumption habits and our preferences may change, that which defines us to that website, our signature, may have variations. The users’ characteristics that websites value the most, change from website to website. Consumption issues, for example, will probably be more valued to websites that sell products and services over others, depending, obviously of the business goals of the website in question. It is certain that the definition of which are most important characteristics in a given context, will define the attributes of the signature for that website, having each user a different value according to those attributes. Each user will have its signature. The value of the users’ signatures over a period of time must be determined by specific calculation processes and must be adjusted to the context in question and to the information available. The use of data mining techniques and knowledge extraction is thus, crucial to this process. The definition and calculation of users’ signature variation for a given website enables several analyses. One of those is the chance to analyze a users profile over a period of time. Signature variation may indicate a change in its behavior profile to the website that he attends. The website, knowing of this change, may react to that change dynamically and in several ways. It can, for example, change its contents or structure. In this dissertation these issues were explored. More specifically it was intended to deepen the definition of a web user’s signature and its association with the usage patterns of a website. As part of this work, these patterns were extracted by data mining techniques from various sources of information, particularly those provided by the web servers that host these websites. The techniques used in the extraction of this knowledge are also addressed in this dissertation with the purpose of giving a global perspective of both the data mining process itself, and of the subsequent association of the extracted knowledge to the user´s signatures that were defined by a specific website that we selected as target for our study. Keywords: Signatures, Web Signatures, Profiles, Web, Web Profiling, Personalization, Web Personalization, Data Mining, Web Mining, Web Usage Mining, Data Warehouse, Data Warehousing, Patterns, Pattern Discovery, Pattern Mining

    Decision Support Systems for Financial Market Surveillance

    Get PDF
    Entscheidungsunterstützungssysteme in der Finanzwirtschaft sind nicht nur für die Wis-senschaft, sondern auch für die Praxis von großem Interesse. Um die Finanzmarktüber-wachung zu gewährleisten, sehen sich die Finanzaufsichtsbehörden auf der einen Seite, mit der steigenden Anzahl von onlineverfügbaren Informationen, wie z.B. den Finanz-Blogs und -Nachrichten konfrontiert. Auf der anderen Seite stellen schnell aufkommen-de Trends, wie z.B. die stetig wachsende Menge an online verfügbaren Daten sowie die Entwicklung von Data-Mining-Methoden, Herausforderungen für die Wissenschaft dar. Entscheidungsunterstützungssysteme in der Finanzwirtschaft bieten die Möglichkeit rechtzeitig relevante Informationen für Finanzaufsichtsbehörden und Compliance-Beauftragte von Finanzinstituten zur Verfügung zu stellen. In dieser Arbeit werden IT-Artefakte vorgestellt, welche die Entscheidungsfindung der Finanzmarktüberwachung unterstützen. Darüber hinaus wird eine erklärende Designtheorie vorgestellt, welche die Anforderungen der Regulierungsbehörden und der Compliance-Beauftragten in Finan-zinstituten aufgreift
    corecore