Bank fraud : using technology to combat losses /

"Capitalize on technology to halt bank fraudExamining the technology that is needed to combat bank fraud, Bank Fraud: Using Technology to Combat Losses equips corporate security and loss prevention managers with the necessary tools to determine an organization's unique technology needs. Lo...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Subramanian, Revathi
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Hoboken, New Jersey : Wiley, [2014]
Σειρά:Wiley and SAS business series.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06675nam a2200781 4500
001 ocn865544039
003 OCoLC
005 20170124071128.2
006 m o d
007 cr |||||||||||
008 131216s2014 nju ob 001 0 eng
010 |a  2013049994 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d YDX  |d N$T  |d EBLCP  |d DG1  |d E7B  |d YDXCP  |d CUI  |d DEBSZ  |d TEFOD  |d BNA  |d B24X7  |d UMI  |d COO  |d DEBBG  |d AU@  |d K6U  |d UAB  |d OCLCO  |d TEFOD  |d OCLCQ  |d VT2  |d OCLCQ  |d GrThAP 
019 |a 880748090  |a 900611584  |a 906024341  |a 910911923  |a 961624687  |a 962639146 
020 |a 9781118233979  |q (epub) 
020 |a 1118233972  |q (epub) 
020 |a 9781118220320  |q (pdf) 
020 |a 1118220323  |q (pdf) 
020 |a 9781118886168 
020 |a 111888616X 
020 |z 9780470494394  |q (hardback) 
020 |z 0470494395 
029 1 |a AU@  |b 000052893477 
029 1 |a CHBIS  |b 010259540 
029 1 |a CHVBK  |b 325941092 
029 1 |a DEBBG  |b BV042490803 
029 1 |a DEBSZ  |b 405667086 
029 1 |a DEBSZ  |b 434839825 
029 1 |a DEBBG  |b BV043606548 
029 1 |a DEBBG  |b BV043396430 
035 |a (OCoLC)865544039  |z (OCoLC)880748090  |z (OCoLC)900611584  |z (OCoLC)906024341  |z (OCoLC)910911923  |z (OCoLC)961624687  |z (OCoLC)962639146 
037 |a FB7B0C92-A4DB-4087-84B5-14FBD1DFA0C2  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
050 0 0 |a HG1616.S37 
072 7 |a BUS  |x 027000  |2 bisacsh 
082 0 0 |a 332.1068/4  |2 23 
084 |a BUS027000  |2 bisacsh 
049 |a MAIN 
100 1 |a Subramanian, Revathi. 
245 1 0 |a Bank fraud :  |b using technology to combat losses /  |c Revathi Subramanian. 
264 1 |a Hoboken, New Jersey :  |b Wiley,  |c [2014] 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Wiley & SAS business series 
520 |a "Capitalize on technology to halt bank fraudExamining the technology that is needed to combat bank fraud, Bank Fraud: Using Technology to Combat Losses equips corporate security and loss prevention managers with the necessary tools to determine an organization's unique technology needs. Looks at the technology needed to handle data intelligence Provides guidance to assess the technology necessary to battle fraud Features unique coverage of the history of fraud detection and prevention in banking Explores the challenges of fraud detection in a financial services environment; understanding corporate risk exposure; losses per assets; trending over time; benefits of technology Focusing on the financial crimes and insider frauds in operation nationally and internationally, Bank Fraud: Using Technology to Combat Losses arms fraud prevention professionals with authoritative guidance to detect and prevent such crimes in future"--  |c Provided by publisher. 
588 0 |a Print version record and CIP data provided by publisher. 
504 |a Includes bibliographical references and index. 
505 0 |a Bank Fraud; Contents; Preface; Acknowledgments; About the Author; CHAPTER 1 Bank Fraud: Then and Now; THE EVOLUTION OF FRAUD; Fraud in the Present Day; Risk and Reward; Secured Lending versus Unsecured Lending; Statistical Models and the Problem of Prediction; THE EVOLUTION OF FRAUD ANALYSIS; Early Credit Card Fraud; Separating the Wheat from the Chaff; The Advent of Nonlinear Statistical Models; Tackling Fraud with Technology; SUMMARY; CHAPTER 2 Quantifying Fraud: Whose Loss Is It Anyway?; Data Storage and Statistical Thinking; Understanding Non-Fraud Behavior; Quantifying Potential Risk. 
505 8 |a Recording the Fraud EpisodeSupervised versus Unsupervised Modeling; The Importance of Accurate Data; FRAUD IN THE CREDIT CARD INDUSTRY; Early Charge and Credit Cards; Lost-and-Stolen Fraud: The Beginnings of Fraud in Credit Cards; Card-Not-Present Fraud and Changes in the Marketplace; THE ADVENT OF BEHAVIORAL MODELS; FRAUD MANAGEMENT: AN EVOLVING CHALLENGE; FRAUD DETECTION ACROSS DOMAINS; USING FRAUD DETECTION EFFECTIVELY; SUMMARY; CHAPTER 3 In God We Trust. The Rest Bring Data!; DATA ANALYSIS AND CAUSAL RELATIONSHIPS; BEHAVIORAL MODELING IN FINANCIAL INSTITUTIONS. 
505 8 |a Customer Expectations versus Standards of PrivacyThe Importance of Data in Implementing Good Behavioral Models; SETTING UP A DATA ENVIRONMENT; 1. Know Your Data; 2. Collect All the Data You Can from Day One; 3. Allow for Additions as the Data Grows; 4. If You Cannot Integrate the Data, You Cannot Integrate the Businesses; 5. When You Want to Change the Definition of a Field, It Is Best to Augment and Not Modify; 6. Document the Data You Have as Well as the Data You Lost; 7. When Change Happens, Document It; 8. ETL: "Extract, Translate, Load" (Not "Extract, Taint, Lose"). 
505 8 |a 9. A Data Model Is an Impressionist Painting10. The Top Two Assets of Any Business Today Are People and Data; UNDERSTANDING TEXT DATA; SUMMARY; CHAPTER 4 Tackling Fraud: The Ten Commandments; 1. DATA: GARBAGE IN; GARBAGE OUT; 2. NO DOCUMENTATION? NO CHANGE!; 3. KEY EMPLOYEES ARE NOT A SUBSTITUTE FOR GOOD DOCUMENTATION; 4. RULES: MORE DOESN'T MEAN BETTER; 5. SCORE: NEVER REST ON YOUR LAURELS; 6. SCORE + RULES = WINNING STRATEGY; 7. FRAUD: IT IS EVERYONE'S PROBLEM; 8. CONTINUAL ASSESSMENT IS THE KEY; 9. FRAUD CONTROL SYSTEMS: IF THEY REST, THEY RUST. 
505 8 |a 10. CONTINUAL IMPROVEMENT: THE CYCLE NEVER ENDSSUMMARY; CHAPTER 5 It Is Not Real Progress Until It Is Operational; THE IMPORTANCE OF PRESENTING A SOLID PICTURE; BUILDING AN EFFECTIVE MODEL; 1. Operations Personnel Need to Understand the Concept of a Fraud Score; 2. The Score Development Process Must Take into Consideration Operational Use and Constraints; 3. In General, Fraud Strategies Should Complement and Not Compete with the Fraud Score; 4. Fraud Strategies and Operational Processes Should Be Well Documented; SUMMARY; CHAPTER 6 The Chain Is Only as Strong as Its Weakest Link. 
505 8 |a DISTINCT STAGES OF A DATA-DRIVEN FRAUD MANAGEMENT SYSTEM. 
650 0 |a Banks and banking  |x Security measures. 
650 0 |a Bank fraud  |x Prevention. 
650 0 |a Bank fraud  |x Prevention  |x Technological innovation. 
650 4 |a Bank fraud. 
650 4 |a Banks and banking. 
650 4 |a Commercial crimes. 
650 4 |a White collar crimes. 
650 7 |a BUSINESS & ECONOMICS  |x Finance.  |2 bisacsh 
655 4 |a Electronic books. 
776 0 8 |i Print version:  |a Subramanian, Revathi.  |t Bank fraud.  |d Hoboken, New Jersey : John Wiley and Sons, Inc, [2014]  |z 9780470494394  |w (DLC) 2013046697 
830 0 |a Wiley and SAS business series. 
856 4 0 |u https://doi.org/10.1002/9781118886168  |z Full Text via HEAL-Link 
994 |a 92  |b DG1