45 research outputs found
Data Mining Techniques for Fraud Detection
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. NaΓ―ve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.
Keywords: Data Mining, Decision Tree, Bayesian Network, ROC Curve, Confusion Matri
Data Mining Techniques in Fraud Detection
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision treebased algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. NaΓ―ve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models
The Impact of Downsizing and Efficiency Measures on Anti-Fraud Resources
The main purpose of this study was to explore the impact of downsizing and efficiency measures on two key elements of operational performance - fraud detection and fraud reporting. Qualitative data were obtained from ethnographic observations of two major multinational insurance companies, which were already examined before the Global Financial Crisis, and subjected to an inter - and intra - business comparative analysis of anti - fraud resources. The paper points out a big discrepancy in opinions on the downsizing effects between junior staff and their supervisors. Whereas the latter present them as enabling the business to deal with suspicious claims more quickly, the former offer a contrastingly different view in which the constantly growing pressure often lea ds to suspicious claims getting approved. By validating the practical implications of a purposefully adapted version of resource - based theory, the paper illustrates the inviability of subjecting anti - fraud resources to the same levels of downsizing and efficiency as other business resources. Although the literature on the general negative impact of downsizing on the broadly - defined operational performance is growing, this is the first major study to examine its impact on insurance anti - fraud processes and illustrate their changes following the Global Financial Crisis
Detecting and Combating Fraudulent Health Insurance Claims Using ANN
This work was funded by the National Nature Science Foundation of China (71774069), 2014 βSix Talent Peaksβ Project of Jiangsu Province (2014- JY-004) Abstract While governments and private sector stakeholders are taking steps to improve the access and quality of health care service to its citizenry, a lot of resources are lost every year due to fraudulent health insurance claims. The aim of this paper is to explore a more robust and accurate ways of predicting fraudulent health insurance claims by the use of artificial neural network (ANN). Using the fraud diamond theory (FDT)βs fraud elements as fraud indicators, a fraud prediction model was created to determine whether a claim presented by a subscriber (individual) is fraudulent or non-fraudulent by varying severally the number of epoch, hidden layer number and threshold of the artificial neural network on a 14 input data to obtain an optimal parameter for the model.The model was able to predict accurately 98.98% with an MSE of 0.0086, which outperformed other artificial neural network (ANN) methods used to predict fraudulent health care claims. The incorporation of the capacity indicator of the fraud diamond theory (FDT) makes this model a tool not only for prediction but also pre-empting the occurrence of fraud. This study is the first to adopt the fraud diamond theoryβs fraud elements as fraud indicators together with artificial neural network (ANN) in predicting fraudulent health insurance claims. Keywords: health insurance claim, ANN, fraud prediction model, fraud diamond theor
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all
published technical and review articles in automated fraud detection within the
last 10 years. It defines the professional fraudster, formalises the main types
and subtypes of known fraud, and presents the nature of data evidence collected
within affected industries. Within the business context of mining the data to
achieve higher cost savings, this research presents methods and techniques
together with their problems. Compared to all related reviews on fraud
detection, this survey covers much more technical articles and is the only one,
to the best of our knowledge, which proposes alternative data and solutions
from related domains.Comment: 14 page
Prescription Fraud detection via data mining : a methodology proposal
Ankara : The Department of Industrial Engineering and the Institute of Engineering and Science of Bilkent University, 2009.Thesis (Master's) -- -Bilkent University, 2009.Includes bibliographical references leaves 61-69Fraud is the illegitimate act of violating regulations in order to gain personal profit.
These kinds of violations are seen in many important areas including, healthcare, computer
networks, credit card transactions and communications. Every year health care fraud causes
considerable amount of losses to Social Security Agencies and Insurance Companies in many
countries including Turkey and USA. This kind of crime is often seem victimless by the
committers, nonetheless the fraudulent chain between pharmaceutical companies, health care
providers, patients and pharmacies not only damage the health care system with the financial
burden but also greatly hinders the health care system to provide legitimate patients with
quality health care. One of the biggest issues related with health care fraud is the prescription
fraud. This thesis aims to identify a data mining methodology in order to detect fraudulent
prescriptions in a large prescription database, which is a task traditionally conducted by
human experts. For this purpose, we have developed a customized data-mining model for the
prescription fraud detection. We employ data mining methodologies for assigning a risk score
to prescriptions regarding Prescribed Medicament- Diagnosis consistency, Prescribed
Medicamentsβ consistency within a prescription, Prescribed Medicament- Age and Sex
consistency and Diagnosis- Cost consistency. Our proposed model has been tested on real
world data. The results we obtained from our experimentations reveal that the proposed model
works considerably well for the prescription fraud detection problem with a 77.4% true
positive rate. We conclude that incorporating such a system in Social Security Agencies
would radically decrease human-expert auditing costs and efficiency.Aral, Karca DuruM.S
ΠΠ΅ΡΠΎΡΡΠ½ΠΎΡΡΠ½ΠΎΠ΅ ΠΌΠΎΠ΄Π΅Π»ΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΡΡ Π°ΠΊΡΡΠ°ΡΠ½ΡΡ ΡΠΈΡΠΊΠΎΠ²
Π‘ΡΡΠ°Ρ
ΠΎΠ²Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΡΡΡ Π² ΡΠΌΠΎΠ²Π°Ρ
Π½Π°ΡΠ²Π½ΠΎΡΡΡ Π½Π΅Π²ΠΈΠ·Π½Π°ΡΠ΅Π½ΠΎΡΡΠ΅ΠΉ ΡΡΠ·Π½ΠΎΡ ΠΏΡΠΈΡΠΎΠ΄ΠΈ Ρ ΡΠΈΠΏΡ, ΡΠΎ ΠΏΡΠΈΠ·Π²ΠΎΠ΄ΠΈΡΡ Π΄ΠΎ Π²ΠΈΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ ΡΡΠ½Π°Π½ΡΠΎΠ²ΠΈΡ
ΡΠΈΠ·ΠΈΠΊΡΠ². Π£ Π·Π²βΡΠ·ΠΊΡ Π· ΡΠΈΠΌ Π²ΠΈΠ½ΠΈΠΊΠ°Ρ Π·Π°Π²Π΄Π°Π½Π½Ρ ΡΠ²ΠΎΡΡΠ°ΡΠ½ΠΎΠ³ΠΎ ΡΠΎΠ·ΠΏΡΠ·Π½Π°Π²Π°Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡΠ² Ρ ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌΡΠ² ΡΠΏΡΠ°Π²Π»ΡΠ½Π½Ρ Π½ΠΈΠΌΠΈ. Π¦Π΅ ΡΠ²ΠΎΡΡ ΡΠ΅ΡΠ³ΠΎΡ ΠΏΠΎΡΡΠ΅Π±ΡΡ ΡΡΠ²ΠΎΡΠ΅Π½Π½Ρ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ½ΠΈΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ Π΄Π»Ρ ΠΎΠΏΠΈΡΡ ΡΠΈΠ·ΠΈΠΊΡΠ² Ρ ΠΌΠ΅ΡΠΎΠ΄ΠΈΠΊ ΡΡ
Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ. ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½ΠΎ Π΄ΠΆΠ΅ΡΠ΅Π»Π° Π²ΠΈΠ½ΠΈΠΊΠ½Π΅Π½Π½Ρ ΡΠ°Ρ
ΡΠ°ΠΉΡΡΠ²Π° Ρ Π²ΠΈΠΊΠΎΠ½Π°Π½ΠΎ ΠΊΠ»Π°ΡΠΈΡΡΠΊΠ°ΡΡΡ ΡΠΈΠ·ΠΈΠΊΡΠ² ΡΡΡΡ Π³ΡΡΠΏΠΈ. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΠΎ Π΄Π»Ρ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ½ΠΎΠ³ΠΎ ΠΎΠΏΠΈΡΡ ΡΠ°ΠΊΠΈΡ
ΡΠΈΠ·ΠΈΠΊΡΠ² ΠΌΠΎΠΆΠ½Π° Π·Π°ΡΡΠΎΡΠΎΠ²ΡΠ²Π°ΡΠΈ ΠΌΠΎΠ΄Π΅Π»Ρ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ Π°ΠΏΠ°ΡΠ°ΡΡ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ½ΠΎΡ ΡΡΠ°ΡΠΈΡΡΠΈΠΊΠΈ, ΠΌΠΎΠ΄Π΅Π»Ρ ΡΠ΅Π³ΡΠ΅ΡΡΠΉΠ½ΠΎΠ³ΠΎ ΡΠΈΠΏΡ ΡΠ° Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ Π½Π΅ΡΡΡΠΊΠΎΡ Π»ΠΎΠ³ΡΠΊΠΈ. ΠΠ»Ρ ΠΎΡΡΠ½ΡΠ²Π°Π½Π½Ρ ΡΠΈΠ·ΠΈΠΊΡ ΡΡΡΠ°Ρ
ΠΎΠ²ΠΎΠ³ΠΎ ΡΠ°Ρ
ΡΠ°ΠΉΡΡΠ²Π° Π² Π°Π²ΡΠΎΡΡΡΠ°Ρ
ΡΠ²Π°Π½Π½Ρ Π·Π°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ ΠΌΠΎΠ΄Π΅Π»Ρ Ρ ΡΠΎΡΠΌΡ Π±Π°ΠΉΡΡΡΠ²ΡΡΠΊΠΎΡ ΠΌΠ΅ΡΠ΅ΠΆΡ. ΠΠ° ΠΎΡΠ½ΠΎΠ²Ρ Π΅ΠΊΡΠΏΠ΅ΡΡΠ½ΠΎΡ Ρ ΡΡΠ°ΡΠΈΡΡΠΈΡΠ½ΠΎΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΡΡΡΠ°Ρ
ΠΎΠ²ΠΎΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ Π²ΠΈΠΊΠΎΠ½Π°Π½ΠΎ ΠΎΡΡΠ½ΡΠ²Π°Π½Π½Ρ ΡΡΡΡΠΊΡΡΡΠΈ ΠΌΠ΅ΡΠ΅ΠΆΡ Ρ Π·Π°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΎ Π°Π»Π³ΠΎΡΠΈΡΠΌ ΡΠΎΡΠΌΡΠ²Π°Π½Π½Ρ Π²ΠΈΡΠ½ΠΎΠ²ΠΊΡ Π·Π° ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²Π°Π½ΠΎΡ ΠΌΠΎΠ΄Π΅Π»Π»Ρ Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½ΡΠΌ Π½Π°Π²ΡΠ°Π»ΡΠ½ΠΎΡ Π²ΠΈΠ±ΡΡΠΊΠΈ. ΠΡΠΈ ΡΡΠΎΠΌΡ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΡΡΡ Π²ΠΈΡΠ²Π»Π΅Π½Π½Ρ ΠΏΡΠΈΡ
ΠΎΠ²Π°Π½ΠΈΡ
Π²Π·Π°ΡΠΌΠΎΠ·Π²βΡΠ·ΠΊΡΠ² ΠΌΡΠΆ Π²ΠΈΠ±ΡΠ°Π½ΠΈΠΌΠΈ Π·ΠΌΡΠ½Π½ΠΈΠΌΠΈ. ΠΠΎΠ±ΡΠ΄ΠΎΠ²Π°Π½Π° ΠΌΠΎΠ΄Π΅Π»Ρ Π²ΡΠ΄ΠΎΠ±ΡΠ°ΠΆΠ°Ρ ΠΏΡΠΈΡΠΈΠ½Π½ΠΎ-Π½Π°ΡΠ»ΡΠ΄ΠΊΠΎΠ²Ρ Π·Π²βΡΠ·ΠΊΠΈ ΠΌΡΠΆ ΡΠ°ΠΊΡΠΎΡΠ°ΠΌΠΈ ΡΠΈΠ·ΠΈΠΊΡ ΡΠ° Π²ΡΡΠ°ΡΠ°ΠΌΠΈ ΡΡΡΠ°Ρ
ΠΎΠ²ΠΎΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ. ΠΠΎΠ½Π° ΠΌΠΎΠΆΠ΅ Π±ΡΡΠΈ Π·Π°ΡΡΠΎΡΠΎΠ²Π°Π½Π° Π΄Π»Ρ Π°Π½Π°Π»ΡΠ·Ρ ΡΡΠ°Π½Ρ Π²Π½ΡΡΡΡΡΠ½ΡΠΎΠ³ΠΎ ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡΠ° ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ; Π°Π½Π°Π»ΡΠ·Ρ Π·ΠΎΠ²Π½ΡΡΠ½ΡΡ
ΡΠΌΠΎΠ², Ρ ΡΠΊΠΈΡ
Π·Π΄ΡΠΉΡΠ½ΡΡ ΡΠ²ΠΎΡ Π΄ΡΡΠ»ΡΠ½ΡΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ; Π΄Π»Ρ Π²ΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ ΠΉΠΌΠΎΠ²ΡΡΠ½ΠΎΡ ΠΏΡΠΈΡΠΈΠ½ΠΈ Π²ΡΡΠ°Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΡΡ, ΠΏΠΎΠ²βΡΠ·Π°Π½ΠΈΡ
Π· ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½ΠΈΠΌΠΈ ΡΠΈΠ·ΠΈΠΊΠ°ΠΌΠΈ, Π° ΡΠ°ΠΊΠΎΠΆ Π΄Π»Ρ ΠΏΡΠΈΠΉΠ½ΡΡΡΡ Π½Π°Π»Π΅ΠΆΠ½ΠΈΡ
ΡΠΏΡΠ°Π²Π»ΡΠ½ΡΡΠΊΠΈΡ
ΡΡΡΠ΅Π½Ρ.Insurance companies are functioning in conditions of uncertainties of various types and nature what results in respective financial risks. All these reasons lead to the problem of timely recognition and development of mechanisms for the risks management. To solve the problem appropriate mathematical models are developed to describe the risks, and methodologies proposed for their practical application. The sources of the insurance fraud are detected and respective risk classification is presented. It is shown that to describe mathematically the risks of this class it is appropriate to apply the models based on the mathematical statistics approach, regression type models, and fuzzy logic. For estimation of the risk of actuarial fraud in auto insurance a model is proposed in the form of Bayesian network. The model structure was estimated using expert and statistical information of insurance company with providing a possibility for detecting hidden interactions between selected variables. An algorithm was also developed
for probabilistic inference on the network. The model constructed reflects the causal links between the risk factors and the insurance company losses. It can be applied for analysis of internal states of the company; analysis of external conditions characteristic for the company functioning; for determining probable reasons of company losses due to operational risks as well as for making appropriate managerial decisions.Π‘ΡΡΠ°Ρ
ΠΎΠ²ΡΠ΅ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ ΡΡΠ½ΠΊΡΠΈΠΎΠ½ΠΈΡΡΡΡ Π² ΡΡΠ»ΠΎΠ²ΠΈΡΡ
Π½Π°Π»ΠΈΡΠΈΡ Π½Π΅ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΠΎΡΡΠ΅ΠΉ ΡΠ°Π·Π»ΠΈΡΠ½ΠΎΠΉ ΠΏΡΠΈΡΠΎΠ΄Ρ ΠΈ ΡΠΈΠΏΠΎΠ², ΡΡΠΎ ΠΏΡΠΈΠ²ΠΎΠ΄ΠΈΡ ΠΊ Π²ΠΎΠ·Π½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΡ ΡΠΈΠ½Π°Π½ΡΠΎΠ²ΡΡ
ΡΠΈΡΠΊΠΎΠ². Π ΡΠ²ΡΠ·ΠΈ Ρ ΡΡΠΈΠΌ Π²ΠΎΠ·Π½ΠΈΠΊΠ°Π΅Ρ Π·Π°Π΄Π°ΡΠ° ΡΠ²ΠΎΠ΅Π²ΡΠ΅ΠΌΠ΅Π½Π½ΠΎΠ³ΠΎ ΡΠ°ΡΠΏΠΎΠ·Π½Π°Π²Π°Π½ΠΈΡ ΡΠΈΡΠΊΠΎΠ² ΠΈ ΡΠΎΠ·Π΄Π°Π½ΠΈΡ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΠΎΠ² ΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΠΈΠΌΠΈ. Π ΡΠ²ΠΎΡ ΠΎΡΠ΅ΡΠ΅Π΄Ρ ΡΡΠΎ ΡΡΠ΅Π±ΡΠ΅Ρ ΡΠΎΠ·Π΄Π°Π½ΠΈΡ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ Π΄Π»Ρ ΠΎΠΏΠΈΡΠ°Π½ΠΈΡ ΡΠΈΡΠΊΠΎΠ² ΠΈ ΠΌΠ΅ΡΠΎΠ΄ΠΈΠΊ ΠΈΡ
ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ. Π Π°ΡΠΊΡΡΡΡ ΠΈΡΡΠΎΡΠ½ΠΈΠΊΠΈ Π²ΠΎΠ·Π½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΡ ΠΌΠΎΡΠ΅Π½Π½ΠΈΡΠ΅ΡΡΠ²Π° ΠΈ ΠΏΡΠΈΠ²Π΅Π΄Π΅Π½Π° ΠΊΠ»Π°ΡΡΠΈΡΠΈΠΊΠ°ΡΠΈΡ ΡΠΈΡΠΊΠΎΠ² ΡΡΠΎΠΉ Π³ΡΡΠΏΠΏΡ. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΡΠΎ Π΄Π»Ρ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΎΠΏΠΈΡΠ°Π½ΠΈΡ ΡΠ°ΠΊΠΈΡ
ΡΠΈΡΠΊΠΎΠ² ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΌΠΎΠ΄Π΅Π»ΠΈ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ Π°ΠΏΠΏΠ°ΡΠ°ΡΠ° ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΡΡΠ°ΡΠΈΡΡΠΈΠΊΠΈ, ΠΌΠΎΠ΄Π΅Π»ΠΈ ΡΠ΅Π³ΡΠ΅ΡΡΠΈΠΎΠ½Π½ΠΎΠ³ΠΎ ΡΠΈΠΏΠ° ΠΈ Π½Π΅ΡΠ΅ΡΠΊΡΡ Π»ΠΎΠ³ΠΈΠΊΡ. ΠΠ»Ρ ΠΎΡΠ΅Π½ΠΈΠ²Π°Π½ΠΈΡ ΡΠΈΡΠΊΠ° ΠΌΠΎΡΠ΅Π½Π½ΠΈΡΠ΅ΡΡΠ²Π° Π² Π°Π²ΡΠΎΡΡΡΠ°Ρ
ΠΎΠ²Π°Π½ΠΈΠΈ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π°
ΠΌΠΎΠ΄Π΅Π»Ρ Π² ΡΠΎΡΠΌΠ΅ Π±Π°ΠΉΠ΅ΡΠΎΠ²ΡΠΊΠΎΠΉ ΡΠ΅ΡΠΈ. ΠΠ° ΠΎΡΠ½ΠΎΠ²Π΅ ΡΠΊΡΠΏΠ΅ΡΡΠ½ΠΎΠΉ ΠΈ ΡΡΠ°ΡΠΈΡΡΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΡΡΡΠ°Ρ
ΠΎΠ²ΠΎΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΎ ΠΎΡΠ΅Π½ΠΈΠ²Π°Π½ΠΈΠ΅ ΡΡΡΡΠΊΡΡΡΡ ΡΠ΅ΡΠΈ ΠΈ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ Π°Π»Π³ΠΎΡΠΈΡΠΌ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π²Π΅ΡΠΎΡΡΠ½ΠΎΡΡΠ½ΠΎΠ³ΠΎ Π²ΡΠ²ΠΎΠ΄Π° ΠΏΠΎ ΡΡΠΎΠΉ ΠΌΠΎΠ΄Π΅Π»ΠΈ Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΎΠ±ΡΡΠ°ΡΡΠ΅ΠΉ Π²ΡΠ±ΠΎΡΠΊΠΈ. ΠΡΠΈ ΡΡΠΎΠΌ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°Π΅ΡΡΡ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΠ΅ ΡΠΊΡΡΡΡΡ
Π²Π·Π°ΠΈΠΌΠΎΡΠ²ΡΠ·Π΅ΠΉ ΠΌΠ΅ΠΆΠ΄Ρ Π²ΡΠ±ΡΠ°Π½Π½ΡΠΌΠΈ ΠΏΠ΅ΡΠ΅ΠΌΠ΅Π½Π½ΡΠΌΠΈ. ΠΠΎΡΡΡΠΎΠ΅Π½Π½Π°Ρ ΠΌΠΎΠ΄Π΅Π»Ρ ΠΎΡΡΠ°ΠΆΠ°Π΅Ρ ΠΏΡΠΈΡΠΈΠ½Π½ΠΎ-ΡΠ»Π΅Π΄ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΡΠ²ΡΠ·ΠΈ ΠΌΠ΅ΠΆΠ΄Ρ ΡΠ°ΠΊΡΠΎΡΠ°ΠΌΠΈ ΡΠΈΡΠΊΠ° ΠΈ ΠΏΠΎΡΠ΅ΡΡΠΌΠΈ ΡΡΡΠ°Ρ
ΠΎΠ²ΠΎΠΉ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ. ΠΠ½Π° ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½Π° Π΄Π»Ρ Π°Π½Π°Π»ΠΈΠ·Π° ΡΠΎΡΡΠΎΡΠ½ΠΈΡ Π²Π½ΡΡΡΠ΅Π½Π½Π΅ΠΉ ΡΡΠ΅Π΄Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ; Π°Π½Π°Π»ΠΈΠ·Π° Π²Π½Π΅ΡΠ½ΠΈΡ
ΡΡΠ»ΠΎΠ²ΠΈΠΉ, Π² ΠΊΠΎΡΠΎΡΡΡ
ΠΏΡΠΎΠ²ΠΎΠ΄ΠΈΡ ΡΠ²ΠΎΡ Π΄Π΅ΡΡΠ΅Π»ΡΠ½ΠΎΡΡΡ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΡ; Π΄Π»Ρ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΡ Π²Π΅ΡΠΎΡΡΠ½ΠΎΠΉ ΠΏΡΠΈΡΠΈΠ½Ρ ΠΏΠΎΡΠ΅ΡΡ, ΡΠ²ΡΠ·Π°Π½Π½ΡΡ
Ρ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΡΠΈΡΠΊΠ°ΠΌΠΈ, Π° ΡΠ°ΠΊΠΆΠ΅ Π΄Π»Ρ
ΠΏΡΠΈΠ½ΡΡΠΈΡ Π½Π°Π΄Π»Π΅ΠΆΠ°ΡΠΈΡ
ΡΠΏΡΠ°Π²Π»Π΅Π½ΡΠ΅ΡΠΊΠΈΡ
ΡΠ΅ΡΠ΅Π½ΠΈΠΉ
Engineering the social: The role of shared artifacts
Abstract This paper presents a multidisciplinary approach to engineering socio-technical design. The paper addresses technological design for social interactions that are non-instrumental, and thereby sometimes contradictory or surprising and difficult to model. Through cooperative analysis of cultural probe data and development of agent-oriented software engineering (AOSE) models, ethnographers and software engineers participate in conversations around shared artifacts, which facilitate the transition from data collected in a social environment to a socially oriented requirements analysis for informing socio-technical design. To demonstrate how this transition was made, we present a case study of the process of designing technology to support familial relationships, such as playing, gifting, showing, telling and creating memories. The case study is based on data collected in a cultural probes study that explores the diverse, complex and unpredictable design environment of the home. A multidisciplinary team worked together through a process of conversations around shared artifacts to cooperatively analyze collected data and develop models. These conversations provided the opportunity to view the data from the perspective of alternative disciplines that resulted in the emergence of novel understandings and innovative practice. The artifacts in the process included returned probe items, scrapbooks, videos of interviews, photographs, family biographies and the AOSE requirements models. When shared between the two communities of practice, some of these artifacts played important roles in mediating discussions of mutual influence between ethnographers and software engineers. The shared artifacts acted as both triggers for conversations and information vessels-providing a variety of interpretable objects enabling both sides to articulate their understandings in different ways and to collaboratively negotiate understandings of the collected data. Analyzing the interdisciplinary exchange provided insight into the identification of bridging elements that allowed 'the social' to permeate the processes of analysis, requirements elicitation and design.