05868nam 2200769 450 991013148950332120230912145345.01-119-14683-61-119-14684-41-119-14682-8(CKB)3710000000454783(EBL)2009871(SSID)ssj0001530643(PQKBManifestationID)12562642(PQKBTitleCode)TC0001530643(PQKBWorkID)11532438(PQKB)10822268(PQKBManifestationID)16114674(PQKB)24273660(DLC) 2015019076(Au-PeEL)EBL4041085(CaPaEBR)ebr11114058(CaONFJC)MIL818884(OCoLC)908935560(CaSebORM)9781119133124(MiAaPQ)EBC4041085(MiAaPQ)EBC2009871(PPN)272710415(EXLCZ)99371000000045478320151105h20152015 uy 0engur|||||||||||txtccrFraud analytics using descriptive, predictive, and social network techniques a guide to data science for fraud detection /Bart Baesens, Veronique Van Vlasselaer, Wouter Verbeke1st editionHoboken, New Jersey :Wiley,2015.©20151 online resource (402 p.)Wiley and SAS Business SeriesIncludes index.1-119-13312-2 Includes bibliographical references at the end of each chapters and index.Cover; Title Page; Copyright; Contents; List of Figures; Foreword; Preface; Acknowledgments; Chapter 1 Fraud: Detection, Prevention, and Analytics!; Introduction; Fraud!; Fraud Detection and Prevention; Big Data for Fraud Detection; Data-Driven Fraud Detection; Fraud-Detection Techniques; Fraud Cycle; The Fraud Analytics Process Model; Fraud Data Scientists; A Fraud Data Scientist Should Have Solid Quantitative Skills; A Fraud Data Scientist Should Be a Good Programmer; A Fraud Data Scientist Should Excel in Communication and Visualization SkillsA Fraud Data Scientist Should Have a Solid Business Understanding A Fraud Data Scientist Should Be Creative; A Scientific Perspective on Fraud; References; Chapter 2 Data Collection, Sampling, and Preprocessing; Introduction; Types of Data Sources; Merging Data Sources; Sampling; Types of Data Elements; Visual Data Exploration and Exploratory Statistical Analysis; Benford's Law; Descriptive Statistics; Missing Values; Outlier Detection and Treatment; Red Flags; Standardizing Data; Categorization; Weights of Evidence Coding; Variable Selection; Principal Components Analysis; RIDITsPRIDIT Analysis Segmentation; References; Chapter 3 Descriptive Analytics for Fraud Detection; Introduction; Graphical Outlier Detection Procedures; Statistical Outlier Detection Procedures; Break-Point Analysis; Peer-Group Analysis; Association Rule Analysis; Clustering; Introduction; Distance Metrics; Hierarchical Clustering; Example of Hierarchical Clustering Procedures; k-Means Clustering; Self-Organizing Maps; Clustering with Constraints; Evaluating and Interpreting Clustering Solutions; One-Class SVMs; References; Chapter 4 Predictive Analytics for Fraud Detection; IntroductionTarget Definition Linear Regression; Logistic Regression; Basic Concepts; Logistic Regression Properties; Building a Logistic Regression Scorecard; Variable Selection for Linear and Logistic Regression; Decision Trees; Basic Concepts; Splitting Decision; Stopping Decision; Decision Tree Properties; Regression Trees; Using Decision Trees in Fraud Analytics; Neural Networks; Basic Concepts; Weight Learning; Opening the Neural Network Black Box; Support Vector Machines; Linear Programming; The Linear Separable Case; The Linear Nonseparable Case; The Nonlinear SVM Classifier; SVMs for RegressionOpening the SVM Black Box Ensemble Methods; Bagging; Boosting; Random Forests; Evaluating Ensemble Methods; Multiclass Classification Techniques; Multiclass Logistic Regression; Multiclass Decision Trees; Multiclass Neural Networks; Multiclass Support Vector Machines; Evaluating Predictive Models; Splitting Up the Data Set; Performance Measures for Classification Models; Performance Measures for Regression Models; Other Performance Measures for Predictive Analytical Models; Developing Predictive Models for Skewed Data Sets; Varying the Sample Window; Undersampling and OversamplingSynthetic Minority Oversampling Technique (SMOTE)Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early detection is a key factor in mitigating fraud damage, but it involves more specialized techniques than detecting fraud at the more advanced stages. This invaluable guide details both the theory and technical aspects of these techniques, and provides expert insight into streamlining implementation. Coverage includes data gathering, preprocessing, modeWiley and SAS business series.FraudStatistical methodsFraudPreventionCommercial crimesPreventionFraudStatistical methods.FraudPrevention.Commercial crimesPrevention.364.16/3015195Baesens Bart903326MiAaPQMiAaPQMiAaPQBOOK9910131489503321Fraud analytics using descriptive, predictive, and social network techniques2026775UNINA