Seminar Data & Web Mining. Christian Groß Timo Philipp

Size: px
Start display at page:

Download "Seminar Data & Web Mining. Christian Groß Timo Philipp"

Transcription

1 Seminar Data & Web Mining Christian Groß Timo Philipp

2 Agenda Application types Introduction to Applications Evaluation Applications 2

3 Overview Crime enforcement Crime Link Explorer Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 3

4 Crime Link Explorer (1) Software developed by University of Arizona Crime investigators should be enabled to automatically conduct effective and efficient link analysis Link Analysis Identification, analysis and visualization of associations between entities : persons locations criminal incidents Applications 4

5 Crime Link Explorer (2) Three techniques included: Concept space approach Shortest path algorithm Heuristic approach Applications 5

6 Data source for Link Analysis Data source: crime incident report ( Anzeige ) Uniform Crime Report (UCR) established 1930 surveillance logs telephone records financial transactions Link: If two entities appear in the same document / log / telephone record Applications 6

7 Problems Costs much time and human effort Information overload Information buried in large volume of raw data High branching factors The number of direct links an entity has Determining the importance of links Relies heavily on domain knowledge Applications 7

8 System design GUI for visualizing founded association paths Dijkstra shortest path algorithm used for finding strong association between entities Associations are identified and extracted from the dataset using the concept space approach Heuristics, capturing domain knowledge, are used for identifying criminal associations Applications 8

9 Co-occurrence weights Applications 9

10 Concept Space Network consisting of domain specific concepts (nodes) Weighted co-occurrence relationship (links) Example: COPLINK Concepts: (nodes) Persons Organizations Locations Vehicles Link: if two concepts appear in the same criminal incidents Applications 10

11 Co-occurrence weights (1) Incident report A Location A Incident report B Person A Person A Person C Person B Person B Location B Applications 11

12 Co-occurrence weigths (2) Co-occurrence weight computed based on frequency that two persons appear together in same incident report Person A weight Person B Con: Weights computed are only a minor assistance in term of uncovering investigative leads Applications 12

13 Heuristic approach Applications 13

14 Heuristic approach three criteria: Relationship between crime type and person roles Shared addresses Shared telephone numbers Repeated co-occurrence in incident report % scale indicating the strength of associations Applications 14

15 Heuristic approach Crime type / person role (1) Construction of a matrix for each crime type Homicide Robbery Auto Theft Sexual Assault. Each matrix containing strength estimation for each role combination victim <-> witness witness <-> suspect suspect <-> victim Applications 15

16 Heuristic approach Crime type / person role (2) Table for crime type homicide: Homicide Victim Witness Suspect Arrestee Other Victim Witness... Suspect Arrestee... Other Estimation of strength of associations occurring for role combination and crime type out of every 100 incidents Heuristic score could be improved by including statistical analysis Applications 16

17 Heuristic approach Shared address / phone Important indicator for associations But: phone number often erroneous only 5 % to final weight Address more accurate than phone number 10 % to final weight Applications 17

18 Heuristic approach Co-occurrence Same idea as concept space approach But: estimation of co-occurrence weights based on empirically derived probability distribution Co-occurrence count Association probability (%) Applications 18

19 Heuristic approach Final heuristic weight P1 = crime_type / person_score P2 = shared phone score P3 = shared address score P4 = association probability based on co-occurrence counts w final Max 0.85 P P P P3, Applications 19

20 Association Path Person A Person B w 1 Person C w 2 w 4 w 3 Person D Person E w 5 Person F Applications 20

21 Association path search Logarithmic transformation done on weights w i Modified Dijkstra Algorithm used for finding strongest association path between two or more persons Applications 21

22 System Evaluation Data set: incident reports persons involved Age, gender, race, address, phone number 10 crime analysts Heuristic approach more accurate than concept space approach Heuristic approach uses domain knowledge Reduced time and effort needed for link analysis Applications 22

23 Overview Crime enforcement Link Exploration Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 23

24 FAIS The Financial Crimes Enforcement Network AI System maintained by FinCEN (U.S.) Aim: detection of money laundering Applications 24

25 Information collection Information injection into DB (U.S. Customs Services Data Centre) Money Transaction over into/out of US Fill Currency Transaction Report (CTR) DB 7/19/2007 Applications 25

26 FAIS Load and prepare Data DB (U.S. Customs Services Data Centre) transaction Load Program Consolidated data Suspicious Rating Prog. Data with rating FAIS DB (Sybase) Analysis rules (336) -Subject, Accounts (linked with transactions) Link Analysis NEXPERT: GUI for investigating how result is received Allow what if statements Heuristic knowledge for text fields Rules result in individual pos./neg. evidences Bayesian transform to single rate Applications 26

27 FAIS Data Analysis Data Driven Mode User Directed Mode Apply filters Create SQL query Applications 27

28 FAIS Data Analysis (cont.) Applications 28

29 FAIS Use and Payoff Introduction 1993 Beginning 1995: 20 mio transactions 3000 subjects detected 2,5 mio accounts Beginning 1997: (see Strategy Plan of FinCEN ) 39 mio (Bank Secrecy Acts including CTR) Revealing new 3500 subjects 5,000 bank accounts of Colombian/Mexican money launderers detected Received Feedback 50% known hits 50% hits with similar behaviour 90% of leads are correct Applications 29

30 Consequences Revised Form Applications 30

31 Overview Crime enforcement Link Exploration Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 31

32 OSS development phenomenon OSS := Open Source Software Hypothesis: Open Source Software development could be modeled as a self-organizing, collaborative network Collaborative network Variation of social network Edge between nodes if they are part of a collaboration Linchpins connect disparate groups into larger cluster Motivation: Better understanding of how the OSS community works IT planners are able to better calculate the risk of OSS usage Applications 32

33 OSS development (1) Recent studies showed: OSS development produces better, more bug-free software Most developers work for enjoyment and pride of being part of an successful OSS project. Not working for monetary return Collaborate from around the world Developers rarely meet face-to-face Developers are self-organized Applications 33

34 OSS development (2) OSS movement is a example of a decentralized selforganizing process. No central control or planning Threatens traditional proprietary software business Open Questions: Intellectual property rights Role of the government concerning OSS Software licensing Applications 34

35 Power Law Networks Collaborative networks often show power law distribution Examples for power law distributions: City size distribution Word ranking in languages and writing Internet Example: Applications 35

36 Data Collection and Analysis Web Crawler collected data from SourceForge (Mailing Lists, project sites, forums) from Jan 2001 to March 2002 Project number Developer id SourceForge Number of projects: (2002), (2007) Number of developers: (2002) Number of registered users: (2007) Applications 36

37 Modeling approach Modeling the OSS Community as collaborative social network Hypothesis: The OSS Movement displays power law relationships in its structure Cluster size Degree of nodes Applications 37

38 Graph modeling Node = developer Edge = work on the same project Node = projects Edge = same developer works on both projects Dev[53] emule GIMP Dev[14] Dev[75] Azureus Applications 38

39 Results Both figures show, that the two modeled networks satisfy the power law property Applications 39

40 Clustering Analysis (1) Linchpins Linchpins Applications 40

41 Number of cluster Clustering Analysis (2) Cluster size Applications 41

42 Conclusions (1) OSS developer network fits to the power law relationship OSS developer network is not a random network The graph displays preferential attachment of new nodes Initial success of a OSS project more developer join the project Important role of linchpins Attractors for other developers Facilitate the diffusion of ideas and technology between clusters Applications 43

43 Conclusions (2) Long term study needed because of high fluctuation rate of nodes Further research should be done on the OSS network Additional graph theoretic properties could be computed (cluster coefficients, network diameter, etc) Deeper understanding of how nodes join and leave Role of SourceForge? Applications 44

44 Overview Crime enforcement Link Exploration Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 45

45 Adolescent Cigarette Smoking Social network theory and analysis applied to examine whether adolescents differ in prevalence of current smoking. Research project on 1092 ninth graders of 5 schools: Each choose 3 best friends (ordered by better friends first) Aim to classified each adolescent in Clique member Clique liaison Isolate Additional information provided 7/19/2007 Applications 46

46 Building Link Graph Liaisons Clique members: -Belong to group of min 3-50+% of their links within their group -Connected by some path lying entirely within the clique Clique liaisons: -2+ links with clique members/other liaisons -Not in a clique Isolates Isolates: Few/no links to other Weight of arcs = 1 if non reciprocated friendship otherwise Applications 47

47 Test data Applications 48

48 Cigarette Smoking Defined by self-report (current smoker and 1+ packs of cigarette) and carbon monoxide content in alveolar breath samples Applications 49

49 Result Smokers tent more often to be white than black (2 schools significant) come from families with mothers having lower education Applications 50

50 Additional Analysis significance in interaction at 4 schools School E significant in interactions between social position and variables grander and mother education?!? Including nonsurveyed subjects leads to 5 schools with significant relationship between social position and current smoking (not shown) Underestimation of relationship Applications 51

51 Additional Analysis (cont.) Possibility remains that isolates are integrated into peer groups outside the school social network Applications 52

52 Fiend Smoking Behaviour Isolates have more smoking friend than clique members/liaisons (1,5 4 times as many); Isolates have fewer friends than other subjects. Add attribute friend smoking to graph (ø of 3 friends - smoking/non smoking ) -> Not significant ->friend smoking is strongly related to subject smoking. Friend smoking is not a proxy for peer group social position Applications 53

53 Isolates tend to be smokers Explanation: 1. Social Isolation cause smoking 2. Smoking cause social isolation 3. No relationship between smoking & isolation (both caused by same factors) 4. Isolates are members of cliques from outside the school environment Regardless of explanation smoking is not a peer group phenomenon! Applications 54

54 Similarities / Differences between Applications Applications 55

55 Evaluation Link analysis offers a great potential to crime investigation Reduce time and human effort Domain knowledge could improve link analysis More accurate results with domain knowledge based link analysis Peer Group Analysis is a helpful tool for social network analysis Applications 56

56 7/19/2007 Applications 57

Relational Data Mining and Web Mining

Relational Data Mining and Web Mining Relational Data Mining and Web Mining Prof. Dr. Daning Hu Department of Informatics University of Zurich Nov 20th, 2012 Outline Introduction: Big Data Relational Data Mining Web Mining Ref Book: Web Intelligence,

More information

An Analysis of Open Source Software Development Using Social Network Theory and Agent-Based Modeling

An Analysis of Open Source Software Development Using Social Network Theory and Agent-Based Modeling An Analysis of Open Source Software Development Using Social Network Theory and Agent-Based Modeling Greg Madey Vincent Freeh Renee Tynan Chris Hoffman University of Notre Dame March 2003 The Second Lake

More information

Bank Secrecy Act Training: Who, What, When, How and Why? Presented by Lynn English Lafayette Federal Credit Union

Bank Secrecy Act Training: Who, What, When, How and Why? Presented by Lynn English Lafayette Federal Credit Union Bank Secrecy Act Training: Who, What, When, How and Why? Presented by Lynn English Lafayette Federal Credit Union Key Takeaways After this webinar, participants should have an understanding of minimum

More information

Networked Life (CSE 112)

Networked Life (CSE 112) Networked Life (CSE 112) Prof. Michael Kearns Final Examination May 3, 2006 The final exam is closed-book; you should have no materials present other than the exam and a pen or pencil. NAME: PENN ID: Exam

More information

Bond Market Simulation

Bond Market Simulation www.overbond.com Bond Market Simulation Simulation Abstract From June 17 th to June 19 th, 2016, Overbond performed a bond market simulation that empirically demonstrated differences in market connectivity

More information

Final Project Report CS224W Fall 2015 Afshin Babveyh Sadegh Ebrahimi

Final Project Report CS224W Fall 2015 Afshin Babveyh Sadegh Ebrahimi Final Project Report CS224W Fall 2015 Afshin Babveyh Sadegh Ebrahimi Introduction Bitcoin is a form of crypto currency introduced by Satoshi Nakamoto in 2009. Even though it only received interest from

More information

Inferring Social Ties across Heterogeneous Networks

Inferring Social Ties across Heterogeneous Networks Inferring Social Ties across Heterogeneous Networks CS 6001 Complex Network Structures HARISH ANANDAN Introduction Social Ties Information carrying connections between people It can be: Strong, weak or

More information

JOB DESCRIPTION: **Pay for new employees typically starts at the minimum of the posted range**

JOB DESCRIPTION: **Pay for new employees typically starts at the minimum of the posted range** CITY OF DELRAY BEACH invites applications for the position of: Crime Analyst Police Department SALARY Hourly $21.29 $33.01 An Equal Opportunity Employer Annually $44,283.20 $68,660.80 OPENING DATE: 03/22/17

More information

SOCIAL MEDIA MINING. Behavior Analytics

SOCIAL MEDIA MINING. Behavior Analytics SOCIAL MEDIA MINING Behavior Analytics Dear instructors/users of these slides: Please feel free to include these slides in your own material, or modify them as you see fit. If you decide to incorporate

More information

Oracle Financial Services FCCM Analytics User Guide. Release October 2017

Oracle Financial Services FCCM Analytics User Guide. Release October 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.5.0.0 October 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.5.0.0 October 2017 Part Number: E85262-01 Oracle Financial

More information

Text Analytics for Executives Title

Text Analytics for Executives Title WHITE PAPER Text Analytics for Executives Title What Can Text Analytics Do for Your Organization? ii Contents Introduction... 1 Getting Started with Text Analytics... 2 Text Analytics in Government...

More information

HOW DATA SCIENCE CAN REDUCE AML FIFTH PILLAR RISK

HOW DATA SCIENCE CAN REDUCE AML FIFTH PILLAR RISK HOW DATA SCIENCE CAN REDUCE AML FIFTH PILLAR RISK New Technologies Including Artificial Intelligence (Ai), Machine Learning And Big Data Enable Banks And Financial Institutions To Surpass Kyc Regulatory

More information

Oracle Financial Services FCCM Analytics User Guide. Release March 2017

Oracle Financial Services FCCM Analytics User Guide. Release March 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.4.0.0 March 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.4.0.0 March 2017 Part Number: E85262-01 Oracle Financial

More information

Business Network Analytics

Business Network Analytics Business Network Analytics Sep, 2017 Daning Hu Department of Informatics University of Zurich Business Intelligence Research Group F Schweitzer et al. Science 2009 Research Methods and Goals What Why How

More information

Ask the Expert SAS Text Miner: Getting Started. Presenter: Twanda Baker Senior Associate Systems Engineer SAS Customer Loyalty Team

Ask the Expert SAS Text Miner: Getting Started. Presenter: Twanda Baker Senior Associate Systems Engineer SAS Customer Loyalty Team Ask the Expert SAS Text Miner: Getting Started Ask the Expert SAS Text Miner: Getting Started Presenter: Twanda Baker Senior Associate Systems Engineer SAS Customer Loyalty Team Q&A: Melodie Rush Senior

More information

IBM SPSS Modeler Personal

IBM SPSS Modeler Personal IBM SPSS Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables

More information

Enabling News Trading by Automatic Categorization of News Articles

Enabling News Trading by Automatic Categorization of News Articles SCSUG 2016 Paper AA22 Enabling News Trading by Automatic Categorization of News Articles ABSTRACT Praveen Kumar Kotekal, Oklahoma State University Vishwanath Kolar Bhaskara, Oklahoma State University Traders

More information

Eyal Carmi. Google, 76 Ninth Avenue, New York, NY U.S.A. Gal Oestreicher-Singer and Uriel Stettner

Eyal Carmi. Google, 76 Ninth Avenue, New York, NY U.S.A. Gal Oestreicher-Singer and Uriel Stettner RESEARCH NOTE IS OPRAH CONTAGIOUS? THE DEPTH OF DIFFUSION OF DEMAND SHOCKS IN A PRODUCT NETWORK Eyal Carmi Google, 76 Ninth Avenue, New York, NY 10011 U.S.A. {eyal.carmi@gmail.com} Gal Oestreicher-Singer

More information

Seminars of Software and Services for the Information Society. Social Networks A case study

Seminars of Software and Services for the Information Society. Social Networks A case study DIPARTIMENTO DI INGEGNERIA INFORMATICA AUTOMATICA E GESTIONALE ANTONIO RUBERTI Master of Science in Engineering in Computer Science (MSE-CS) Seminars in Software and Services for the Information Society

More information

Data Mining and Crime Analysis in the Richmond Police Department

Data Mining and Crime Analysis in the Richmond Police Department Data Mining and Crime Analysis in the Richmond Police Department Colleen McCue, PhD, Senior Research Scientist, RTI International Highlights: Data mining tools such as IBM SPSS Modeler enable law enforcement

More information

The Agent s Independent Review cannot be conducted by the designated Compliance Officer or an employee reporting directly to the Compliance Officer.

The Agent s Independent Review cannot be conducted by the designated Compliance Officer or an employee reporting directly to the Compliance Officer. Independent Review What is the purpose of an Independent Review? The purpose of an Independent Review is to monitor the completeness and effectiveness of an Agent s antimoney laundering (AML) program as

More information

Testing and Reviews. Importance of BSA / AML Training Testing staff on their comprehension of the training

Testing and Reviews. Importance of BSA / AML Training Testing staff on their comprehension of the training Testing and Reviews Testing and Reviews Importance of BSA / AML Training Testing staff on their comprehension of the training BSA AML Review Target Training to those who need it Know Your Employee Accountability

More information

Analytics in Action transforming the way we use and consume information

Analytics in Action transforming the way we use and consume information Analytics in Action transforming the way we use and consume information Big Data Ecosystem The Data Traditional Data BIG DATA Repositories MPP Appliances Internet Hadoop Data Streaming Big Data Ecosystem

More information

PATH TO INTELLIGENT TRANSACTION MONITORING. February 22, 2018

PATH TO INTELLIGENT TRANSACTION MONITORING. February 22, 2018 PATH TO INTELLIGENT TRANSACTION MONITORING February 22, 2018 SPEAKER Mayank Johri joined First Republic in 2014 as Vice President BSA/AML Analytics. He has over 20 years combined experience in banking,

More information

Practical Application of Predictive Analytics Michael Porter

Practical Application of Predictive Analytics Michael Porter Practical Application of Predictive Analytics Michael Porter October 2013 Structure of a GLM Random Component observations Link Function combines observed factors linearly Systematic Component we solve

More information

IBM SPSS Modeler Personal

IBM SPSS Modeler Personal IBM Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables you

More information

BUSINESS DEVELOPMENT INTELLIGENCE MONITORING FOR LAW FIRMS

BUSINESS DEVELOPMENT INTELLIGENCE MONITORING FOR LAW FIRMS WHITEPAPER BUSINESS DEVELOPMENT INTELLIGENCE MONITORING FOR LAW FIRMS Most major law firms engage in intelligence monitoring to spot new business opportunities and inform attorneys about important developments

More information

Expanding a Datawarehouse in step with Oracle advancements

Expanding a Datawarehouse in step with Oracle advancements Expanding a Datawarehouse in step with Oracle advancements Paris, 20.09.2003 Birmingham, 10.12. 2003 Jan Medek jan.medek@ct.cz Paul Skaife paul@yorviq.co.uk Agenda Introduction Project History Project

More information

Workflow Mining: Identification of frequent patterns in a large collection of KNIME workflows

Workflow Mining: Identification of frequent patterns in a large collection of KNIME workflows Workflow Mining: Identification of frequent patterns in a large collection of KNIME workflows Nils Weskamp, Research Scientist Computational Chemistry nils.weskamp@boehringer-ingelheim.com Overview Motivation

More information

Operational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do?

Operational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do? Operational Application of Targeted Analysis Eric Chasin, NTELX echasin@ntelx.com Agenda Who is NTELX? Applying Intelligence Multi Source and Multi Indicator Knowledge Based Decision Making to Medicaid/Medicare

More information

Business Objects Universe Developer Guide. Release

Business Objects Universe Developer Guide. Release Business Objects Universe Developer Guide Release 13.3.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Brian Macdonald Big Data & Analytics Specialist - Oracle

Brian Macdonald Big Data & Analytics Specialist - Oracle Brian Macdonald Big Data & Analytics Specialist - Oracle Improving Predictive Model Development Time with R and Oracle Big Data Discovery brian.macdonald@oracle.com Copyright 2015, Oracle and/or its affiliates.

More information

CHAPTER 8 PROFILING METHODOLOGY

CHAPTER 8 PROFILING METHODOLOGY 107 CHAPTER 8 PROFILING METHODOLOGY 8.1 INTRODUCTION This research aims to develop a customer profiling methodology with reference to customer lifetime value, relationship, satisfaction, behavior using

More information

AI that creates professional opportunities at scale

AI that creates professional opportunities at scale AI that creates professional opportunities at scale Deepak Agarwal AI in practice, AAAI, San Francisco, USA Feb 6 th, 2017 We are seeking new professional opportunities all the time To Advance our Careers

More information

AJS 275. Criminal Investigation. Course Package

AJS 275. Criminal Investigation. Course Package AJS 275 Criminal Investigation Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Michael S. Messner Date of proposal to Curriculum Sub-committee: 02/12/10 Purpose: New _X_

More information

REUTERS/Carlos Baria. Thomson Reuters World-Check One Finding Hidden Risks

REUTERS/Carlos Baria. Thomson Reuters World-Check One Finding Hidden Risks REUTERS/Carlos Baria Thomson Reuters World-Check One Finding Hidden Risks Thomson Reuters World-Check One Finding Hidden Risks A better way to identify Financial Crime & Reputational Risk World-Check One

More information

Public Goods Theory of the Open Source Development Community using Agent-based Simulation

Public Goods Theory of the Open Source Development Community using Agent-based Simulation Public Goods Theory of the Open Source Development Community using Agent-based Simulation Scott Christley, Jin Xu, Yongqin Gao, Greg Madey Dept. of Computer Science and Engineering University of Notre

More information

AML / CTF in the Customer Domain

AML / CTF in the Customer Domain AML / CTF in the Customer Domain APRIL 2017 Introduction Over the last few years, the introduction of new regulations and the proliferation of emerging technologies have changed customers expectation of

More information

Next-Generation Software Platform For Intelligence-Led Decision Making

Next-Generation Software Platform For Intelligence-Led Decision Making Data Sheet Next-Generation Software Platform For Intelligence-Led Decision Making Key Benefits Get Answers 10X Faster All your data, connected in one place for search and analysis Fast response, even with

More information

Uncovering the Small Community Structure in Large Networks: A Local Spectral Approach

Uncovering the Small Community Structure in Large Networks: A Local Spectral Approach Uncovering the Small Community Structure in Large Networks: A Local Spectral Approach Yixuan Li 1, Kun He 2, David Bindel 1 and John E. Hopcroft 1 1 Cornell University, USA 2 Huazhong University of Science

More information

KnowledgeSTUDIO. Advanced Modeling for Better Decisions. Data Preparation, Data Profiling and Exploration

KnowledgeSTUDIO. Advanced Modeling for Better Decisions. Data Preparation, Data Profiling and Exploration KnowledgeSTUDIO Advanced Modeling for Better Decisions Companies that compete with analytics are looking for advanced analytical technologies that accelerate decision making and identify opportunities

More information

Commercial Due Diligence

Commercial Due Diligence Solutions For All Situation Commercial Due Diligence February 2019 1 Who we are RHT Forensics & Disputes Advisory (RHT FDA) is an independent risk management consultancy specializing in helping organizations

More information

HybridRank: Ranking in the Twitter Hybrid Networks

HybridRank: Ranking in the Twitter Hybrid Networks HybridRank: Ranking in the Twitter Hybrid Networks Jianyu Li Department of Computer Science University of Maryland, College Park jli@cs.umd.edu ABSTRACT User influence in social media may depend on multiple

More information

APPLICATION FOR EMPLOYMENT

APPLICATION FOR EMPLOYMENT APPLICATION FOR EMPLOYMENT The County considers applicants for all positions without regard to age, race, color, religion, creed, sex, national origin, marital status, disability, veteran status, gender

More information

Final Project - Social and Information Network Analysis

Final Project - Social and Information Network Analysis Final Project - Social and Information Network Analysis Factors and Variables Affecting Social Media Reviews I. Introduction Humberto Moreira Rajesh Balwani Subramanyan V Dronamraju Dec 11, 2011 Problem

More information

Open System Engineering Environment (OSEE) Action Tracking System (ATS)

Open System Engineering Environment (OSEE) Action Tracking System (ATS) Open System Engineering Environment (OSEE) Action Tracking System (ATS) Copyright 2005 The Boeing Company Mesa, Arizona OSEE Team Goal Create a powerful and tightly integrated tracking system within OSEE

More information

Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D

Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D What is Social Network Analysis? Network analysis is: > the study of social relations among a set of actors > a theoretical

More information

EMPLOYEE ENGAGEMENT SURVEY

EMPLOYEE ENGAGEMENT SURVEY EMPLOYEE ENGAGEMENT SURVEY ATC Project March 30, 2015 on behalf of TTC TABLE OF CONTENTS Introduction 3 Overall Engagement Score 12 Aspects of Employee Engagement 16 What Drives Engagement 20 Overall Organizational

More information

Behavioral Data Mining. Lecture 22: Network Algorithms II Diffusion and Meme Tracking

Behavioral Data Mining. Lecture 22: Network Algorithms II Diffusion and Meme Tracking Behavioral Data Mining Lecture 22: Network Algorithms II Diffusion and Meme Tracking Once upon a time Once upon a time Approx 1 MB Travels ~ 1 hour, B/W = 3k b/s News Today, the total news available from

More information

The Modern FCIU: Special Risk Investigations

The Modern FCIU: Special Risk Investigations SAS FINANCIAL CRIMES EXECUTIVE FORUM Toronto, 2018 The Modern FCIU: Special Risk Investigations Daniel Nagle, Global Banking Principal, SAS Trends in Compliance What are other Financial Institutions saying?

More information

FRAUD MONITORING. Modern, comprehensive solution for fraud detection and prevention in banking systems.

FRAUD MONITORING. Modern, comprehensive solution for fraud detection and prevention in banking systems. FRAUD MONITORING Modern, comprehensive solution for fraud detection and prevention in banking systems. www.infigo.hr INTRODUCTION KEY FEATURES OF INFIGO FM Banking institutions are increasingly faced with

More information

Pikes Peak Retail Security Assoc**.. (Decreasing level of shoplifting/citywide)

Pikes Peak Retail Security Assoc**.. (Decreasing level of shoplifting/citywide) Pikes Peak Retail Security Assoc**.. (Decreasing level of shoplifting/citywide) 03-09 Description of problem: Repeat shoplifts, thefts, and frauds being committed by the same individuals or groups. Retailers

More information

MAPPING GLOBAL VALUE CHAINS AND MEASURING TRADE IN TASKS MOTIVATIONS AND ANNOTATED OUTLINE HUBERT ESCAITH, WTO JUNE 2013

MAPPING GLOBAL VALUE CHAINS AND MEASURING TRADE IN TASKS MOTIVATIONS AND ANNOTATED OUTLINE HUBERT ESCAITH, WTO JUNE 2013 MAPPING GLOBAL VALUE CHAINS AND MEASURING TRADE IN TASKS MOTIVATIONS AND ANNOTATED OUTLINE HUBERT ESCAITH, WTO JUNE 2013 MOTIVATION - PROVIDE THE BIG PICTURE - LOOK AT THE ROAD MAP Why? Offer a Synthesis

More information

Group #2 Project Final Report: Information Flows on Twitter

Group #2 Project Final Report: Information Flows on Twitter Group #2 Project Final Report: Information Flows on Twitter Huang-Wei Chang, Te-Yuan Huang 1 Introduction Twitter has become a very popular microblog website and had attracted millions of users up to 2009.

More information

Cash In Transit (CIT) United States

Cash In Transit (CIT) United States Cash In Transit (CIT) United States Richard Davis Vice President Davis Bancorp Background: Davis Bancorp Davis Bancorp provides commercial, financial & municipal institutions with: Armored Transportation

More information

Financial Crime Mitigation

Financial Crime Mitigation Financial Crime Mitigation A uniquely flexible range of intelligent, versatile solutions for financial institutions, large and small, to combat financial crime. Introduction Our Financial Crime Mitigation

More information

A Framework for Analyzing Twitter to Detect Community Crime Activity

A Framework for Analyzing Twitter to Detect Community Crime Activity SESSION ID: CCT2-W05 A Framework for Analyzing Twitter to Detect Community Crime Activity Safaa S. Al Dhanhani @ssdhanhani Outline Why? Literature review What is the framework Approach How? 2 Cont. Outline

More information

Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee

Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Lecture - 02 Data Mining Process Welcome to the lecture 2 of

More information

Advancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION

Advancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information Management and Analysis with Entity Resolution Whitepaper February 2016 novetta.com 2016, Novetta ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information

More information

LexisNexis Risk Management Suite

LexisNexis Risk Management Suite LexisNexis Risk Management Suite Prevention. Detection. Investigation. It s all here. ROI: R E T U R N O N INFOATION SOLUTIONS Customer Development Authentication & Screening Fraud Prevention Collections

More information

Session 4 Strategic analysis products

Session 4 Strategic analysis products The Egmont Group of Financial Intelligence Units Egmont Strategic Analysis Course Session 4 Version 30 October 2012 Egmont Strategic Analysis Course Page 2 of 34 Session 4 1. Introduction This session

More information

Technology Office Challenge. (Why numbers rock!)

Technology Office Challenge. (Why numbers rock!) Technology Office Challenge (Why numbers rock!) Context 800,000+ customers 280+ branches 300 ATMs 1,100 staff $14.4bn assets 2 data centres 350 production servers (50% virtual) 0.5PB storage (10% structured)

More information

7 Tips to Successful Check Cashing

7 Tips to Successful Check Cashing 7 Tips to Successful Check Cashing Now that you ve started cashing checks here is what you need to know to ensure success Use the following best practices to help make your check cashing business successful.

More information

Chapter 9. Business Intelligence Systems

Chapter 9. Business Intelligence Systems Chapter 9 Business Intelligence Systems We Can Make the Bits Produce Any Report You Want, But You ve Got to Pay for It. Need to monitor patient workout data. Spending too many hours each day looking at

More information

Public Transport Planning System by Dijkstra Algorithm: Case Study Bangkok Metropolitan Area Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom

Public Transport Planning System by Dijkstra Algorithm: Case Study Bangkok Metropolitan Area Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom Public Transport Planning System by Dijkstra Algorithm: Case Study Bangkok Metropolitan Area Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom International Science Index, Computer and Information Engineering

More information

Compliance/Risk Management & Bank Secrecy Act Officer

Compliance/Risk Management & Bank Secrecy Act Officer Compliance/Risk Management & Bank Secrecy Act Officer Job Reporting Relationships Supervised by: Supervises: Chief Operating Officer None Basic Qualifications Education/Training: A Bachelor s degree in

More information

Leveraging Code Coverage Data to Improve Test Suite Efficiency and Effectiveness

Leveraging Code Coverage Data to Improve Test Suite Efficiency and Effectiveness Leveraging Code Coverage Data to Improve Test Suite Efficiency and Effectiveness Jean Hartmann, Ph.D. Principal Test Architect Engineering Systems Group Microsoft Developer Division Agenda Motivation Goals

More information

Use of Data Mining and Machine. Use of Data Mining and Machine. Learning for Fraud Detection. Learning for Fraud Detection. Welcome!

Use of Data Mining and Machine. Use of Data Mining and Machine. Learning for Fraud Detection. Learning for Fraud Detection. Welcome! Use of Data Mining and Machine Use of Data Mining and Machine Learning for Fraud Detection CPE PIN Code: UKLK Learning for Fraud Detection Welcome! Ramazan Isik, CFE, CIA, CRISC, CRMA Chief Audit Executive

More information

UFED Pro Series. Advance the case with access to the widest amount of digital evidence and insights.

UFED Pro Series. Advance the case with access to the widest amount of digital evidence and insights. UFED Pro Series Advance the case with access to the widest amount of digital evidence and insights. Investigations need the full picture as quickly as possible. The challenges to digital evidence are constant.

More information

Boundedly Rational Consumers

Boundedly Rational Consumers Boundedly Rational Consumers Marco VALENTE 1 1 LEM, S. Anna School of Advanced Studies, Pisa University of L Aquila Background Mainstream: consumers behaviour is represented by maximisation of a utility

More information

An Exploratory Study on the Relationship Between OSS Project Popularity and Network Characteristics

An Exploratory Study on the Relationship Between OSS Project Popularity and Network Characteristics An Exploratory Study on the Relationship Between OSS Project Popularity and Network Characteristics SI708 Network Theory and Application Term Paper Min-seok Pang noticeme@umich.edu 1. Introduction In this

More information

DATA ANALYTICS WITH R, EXCEL & TABLEAU

DATA ANALYTICS WITH R, EXCEL & TABLEAU Learn. Do. Earn. DATA ANALYTICS WITH R, EXCEL & TABLEAU COURSE DETAILS centers@acadgild.com www.acadgild.com 90360 10796 Brief About this Course Data is the foundation for technology-driven digital age.

More information

Identification of Process-based Fraud Patterns in Credit Application

Identification of Process-based Fraud Patterns in Credit Application Identification of Process-based Fraud Patterns in Credit Application Solichul Huda Universitas Dian Nuswantoro Semarang, Indonesia solichul.huda@dsn.dinus.ac.id Tohari Ahmad Institut Teknologi Sepuluh

More information

Oracle Knowledge Analytics User Guide

Oracle Knowledge Analytics User Guide Oracle Knowledge Analytics User Guide Working with Oracle Knowledge Analytics Reports Oracle Knowledge Version 8.4.2.2 April, 2012 Oracle, Inc. COPYRIGHT INFORMATION Copyright 2002, 2011, Oracle and/or

More information

The Science of Social Media. Kristina Lerman USC Information Sciences Institute

The Science of Social Media. Kristina Lerman USC Information Sciences Institute The Science of Social Media Kristina Lerman USC Information Sciences Institute ML meetup, July 2011 What is a science? Explain observed phenomena Make verifiable predictions Help engineer systems with

More information

The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales

The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales Today's IT service providers offer a large set of tools supporting sales and marketing activities

More information

On Alert: Designing Effective AML Monitoring Processes

On Alert: Designing Effective AML Monitoring Processes On Alert: Designing Effective AML Monitoring Processes SYNOPSIS: This article first appeared in ABA Bank Compliance magazine in October 2008. Co-authored by David Caruso, CEO of Dominion Advisory Group

More information

CA Clarity Project & Portfolio Manager

CA Clarity Project & Portfolio Manager CA Clarity Project & Portfolio Manager Business Objects Universes for CA Clarity PPM Reference Guide v12.1.0 This documentation and any related computer software help programs (hereinafter referred to

More information

EMPLOYEE ENGAGEMENT SURVEY

EMPLOYEE ENGAGEMENT SURVEY EMPLOYEE ENGAGEMENT SURVEY Customer Communications/Customer Development/Farecard Team March 31, 2015 on behalf of TTC TABLE OF CONTENTS Introduction 3 Overall Engagement Score 11 Aspects of Employee Engagement

More information

EMPLOYEE ENGAGEMENT SURVEY

EMPLOYEE ENGAGEMENT SURVEY EMPLOYEE ENGAGEMENT SURVEY Legal March 27, 2015 on behalf of TTC TABLE OF CONTENTS Introduction 3 Overall Engagement Score 11 Aspects of Employee Engagement 15 What Drives Engagement 19 Overall Organizational

More information

Collaborative Free Software Development

Collaborative Free Software Development Collaborative Free Software Development Cristian CIUREA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania cristian.ciurea@ie.ase.ro Abstract: In this paper is presented the

More information

Transaction Monitoring

Transaction Monitoring Course Syllabus Audience The primary target is the frontline analyst, teaching skills that benefit new and experienced employees, especially as regulator and market expectations increase. This course assumes

More information

Waterloo Regional Police Service: About Our Data

Waterloo Regional Police Service: About Our Data Waterloo Regional Police Service: About Our Data REVISED November 2017 Table of Contents Waterloo Regional Police Service: About Our Data... 1 DISCLAIMER... 1 The Science of Police Deployment... 2 WRPS

More information

Enterprise-wide Risk Case

Enterprise-wide Risk Case Enterprise-wide Risk Case December 4, 2013 Management Categorizing Costs and Savings for Clearer Return on Investment (ROI) Executive Summary Greater losses from financial crime incidents, pressure to

More information

The project recruits, trains and supervises volunteers to act as Independent Visitors for children in the care of Hull City Council.

The project recruits, trains and supervises volunteers to act as Independent Visitors for children in the care of Hull City Council. Sova Hull Independent Visitors Project Support Officer Job Pack Sova is committed to safeguarding and promoting the welfare of children, young people and vulnerable adults, and expects all staff and volunteers

More information

Lecture 10. Outline. 1-1 Introduction. 1-1 Introduction. 1-1 Introduction. Introduction to Statistics

Lecture 10. Outline. 1-1 Introduction. 1-1 Introduction. 1-1 Introduction. Introduction to Statistics Outline Lecture 10 Introduction to 1-1 Introduction 1-2 Descriptive and Inferential 1-3 Variables and Types of Data 1-4 Sampling Techniques 1- Observational and Experimental Studies 1-6 Computers and Calculators

More information

Using SAS Visual Investigator to Enforce Model Tuning Best Practices in a Regulatory Environment

Using SAS Visual Investigator to Enforce Model Tuning Best Practices in a Regulatory Environment Paper SAS1777-2018 Using SAS Visual Investigator to Enforce Model Tuning Best Practices in a Regulatory Environment Scott Wood, Josh Lincoln, and Edwin Rivera, SAS Institute Inc. ABSTRACT A common process

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Master Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Master Degree Accreditation & Quality Assurance Center Curriculum for Master Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Department of Business Information Technology.3 (Arabic)

More information

Occupational Health and Safety Policy

Occupational Health and Safety Policy Occupational Health and Safety Policy TJ Instrumentation strives to achieve excellence in the workplace Health and Safety. Preventing harm to the public, employees, sub-contractors, customers, plant assets

More information

The Customer Is Always Right: Analyzing Existing Market Feedback to Improve TVs

The Customer Is Always Right: Analyzing Existing Market Feedback to Improve TVs The Customer Is Always Right: Analyzing Existing Market Feedback to Improve TVs Jose Valderrama 1, Laurel Rawley 2, Simon Smith 3, Mark Whiting 4 1 University of Central Florida 2 University of Houston

More information

STRATEGIES FOR REDUCING AML CASE PROCESSING TIMES

STRATEGIES FOR REDUCING AML CASE PROCESSING TIMES 1 INTRODUCTION As organizations deal with rising regulatory expectations and increasing scrutiny, they confront the prospect of compliance cost increases that exceed their growth in top-line revenue. Many

More information

SmartCare. SPSS Workshop. Rick Durham - North American Advanced Analytics Channel Team IBM Corporation. Date: 5/28/2014

SmartCare. SPSS Workshop. Rick Durham - North American Advanced Analytics Channel Team IBM Corporation. Date: 5/28/2014 SPSS Workshop Key Presenter Rick Durham - North American Advanced Analytics Channel Team Date: 5/28/2014 Agenda What is Predictive Analytics? What is the architecture of the IBM/SPSS technology stack?

More information

A Unified Theory of Software Testing Bret Pettichord 16 Feb 2003

A Unified Theory of Software Testing Bret Pettichord 16 Feb 2003 A Unified Theory of Software Testing Bret Pettichord 16 Feb 2003 This paper presents a theory, or model, for analyzing and understanding software test techniques. It starts by developing a theory for describing

More information

Artificial Intelligence Breadth-First Search and Heuristic

Artificial Intelligence Breadth-First Search and Heuristic Artificial Intelligence Breadth-First Search and Heuristic Chung-Ang University, Jaesung Lee The original version of this content is came from MIT OCW of MIT Electrical Engineering and Computer Science

More information

Contextual Monitoring: Enabling banks to reduce false positives while catching the bad guys

Contextual Monitoring: Enabling banks to reduce false positives while catching the bad guys Contextual Monitoring: Enabling banks to reduce false positives while catching the bad guys Executive summary The need for a new approach The current approach to Anti-Money Laundering (AML) Transaction

More information

Multi-Resource Packing for Cluster Schedulers. CS6453: Johan Björck

Multi-Resource Packing for Cluster Schedulers. CS6453: Johan Björck Multi-Resource Packing for Cluster Schedulers CS6453: Johan Björck The problem Tasks in modern cluster environments have a diverse set of resource requirements CPU, memory, disk, network... The problem

More information

Probation Population: 05-07

Probation Population: 05-07 Arrowhead Regional Corrections Probation Population: 05-07 Prepared September 2009 Director: Tom Roy Phone: (218) 726-2650 Email: royt@co.st-louis.mn.us Research Analyst: Kelly Emmons Phone: (218) 725-5044

More information

Can Cascades be Predicted?

Can Cascades be Predicted? Can Cascades be Predicted? Rediet Abebe and Thibaut Horel September 22, 2014 1 Introduction In this presentation, we discuss the paper Can Cascades be Predicted? by Cheng, Adamic, Dow, Kleinberg, and Leskovec,

More information