Seminar Data & Web Mining. Christian Groß Timo Philipp
|
|
- Clinton Malone
- 6 years ago
- Views:
Transcription
1 Seminar Data & Web Mining Christian Groß Timo Philipp
2 Agenda Application types Introduction to Applications Evaluation Applications 2
3 Overview Crime enforcement Crime Link Explorer Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 3
4 Crime Link Explorer (1) Software developed by University of Arizona Crime investigators should be enabled to automatically conduct effective and efficient link analysis Link Analysis Identification, analysis and visualization of associations between entities : persons locations criminal incidents Applications 4
5 Crime Link Explorer (2) Three techniques included: Concept space approach Shortest path algorithm Heuristic approach Applications 5
6 Data source for Link Analysis Data source: crime incident report ( Anzeige ) Uniform Crime Report (UCR) established 1930 surveillance logs telephone records financial transactions Link: If two entities appear in the same document / log / telephone record Applications 6
7 Problems Costs much time and human effort Information overload Information buried in large volume of raw data High branching factors The number of direct links an entity has Determining the importance of links Relies heavily on domain knowledge Applications 7
8 System design GUI for visualizing founded association paths Dijkstra shortest path algorithm used for finding strong association between entities Associations are identified and extracted from the dataset using the concept space approach Heuristics, capturing domain knowledge, are used for identifying criminal associations Applications 8
9 Co-occurrence weights Applications 9
10 Concept Space Network consisting of domain specific concepts (nodes) Weighted co-occurrence relationship (links) Example: COPLINK Concepts: (nodes) Persons Organizations Locations Vehicles Link: if two concepts appear in the same criminal incidents Applications 10
11 Co-occurrence weights (1) Incident report A Location A Incident report B Person A Person A Person C Person B Person B Location B Applications 11
12 Co-occurrence weigths (2) Co-occurrence weight computed based on frequency that two persons appear together in same incident report Person A weight Person B Con: Weights computed are only a minor assistance in term of uncovering investigative leads Applications 12
13 Heuristic approach Applications 13
14 Heuristic approach three criteria: Relationship between crime type and person roles Shared addresses Shared telephone numbers Repeated co-occurrence in incident report % scale indicating the strength of associations Applications 14
15 Heuristic approach Crime type / person role (1) Construction of a matrix for each crime type Homicide Robbery Auto Theft Sexual Assault. Each matrix containing strength estimation for each role combination victim <-> witness witness <-> suspect suspect <-> victim Applications 15
16 Heuristic approach Crime type / person role (2) Table for crime type homicide: Homicide Victim Witness Suspect Arrestee Other Victim Witness... Suspect Arrestee... Other Estimation of strength of associations occurring for role combination and crime type out of every 100 incidents Heuristic score could be improved by including statistical analysis Applications 16
17 Heuristic approach Shared address / phone Important indicator for associations But: phone number often erroneous only 5 % to final weight Address more accurate than phone number 10 % to final weight Applications 17
18 Heuristic approach Co-occurrence Same idea as concept space approach But: estimation of co-occurrence weights based on empirically derived probability distribution Co-occurrence count Association probability (%) Applications 18
19 Heuristic approach Final heuristic weight P1 = crime_type / person_score P2 = shared phone score P3 = shared address score P4 = association probability based on co-occurrence counts w final Max 0.85 P P P P3, Applications 19
20 Association Path Person A Person B w 1 Person C w 2 w 4 w 3 Person D Person E w 5 Person F Applications 20
21 Association path search Logarithmic transformation done on weights w i Modified Dijkstra Algorithm used for finding strongest association path between two or more persons Applications 21
22 System Evaluation Data set: incident reports persons involved Age, gender, race, address, phone number 10 crime analysts Heuristic approach more accurate than concept space approach Heuristic approach uses domain knowledge Reduced time and effort needed for link analysis Applications 22
23 Overview Crime enforcement Link Exploration Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 23
24 FAIS The Financial Crimes Enforcement Network AI System maintained by FinCEN (U.S.) Aim: detection of money laundering Applications 24
25 Information collection Information injection into DB (U.S. Customs Services Data Centre) Money Transaction over into/out of US Fill Currency Transaction Report (CTR) DB 7/19/2007 Applications 25
26 FAIS Load and prepare Data DB (U.S. Customs Services Data Centre) transaction Load Program Consolidated data Suspicious Rating Prog. Data with rating FAIS DB (Sybase) Analysis rules (336) -Subject, Accounts (linked with transactions) Link Analysis NEXPERT: GUI for investigating how result is received Allow what if statements Heuristic knowledge for text fields Rules result in individual pos./neg. evidences Bayesian transform to single rate Applications 26
27 FAIS Data Analysis Data Driven Mode User Directed Mode Apply filters Create SQL query Applications 27
28 FAIS Data Analysis (cont.) Applications 28
29 FAIS Use and Payoff Introduction 1993 Beginning 1995: 20 mio transactions 3000 subjects detected 2,5 mio accounts Beginning 1997: (see Strategy Plan of FinCEN ) 39 mio (Bank Secrecy Acts including CTR) Revealing new 3500 subjects 5,000 bank accounts of Colombian/Mexican money launderers detected Received Feedback 50% known hits 50% hits with similar behaviour 90% of leads are correct Applications 29
30 Consequences Revised Form Applications 30
31 Overview Crime enforcement Link Exploration Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 31
32 OSS development phenomenon OSS := Open Source Software Hypothesis: Open Source Software development could be modeled as a self-organizing, collaborative network Collaborative network Variation of social network Edge between nodes if they are part of a collaboration Linchpins connect disparate groups into larger cluster Motivation: Better understanding of how the OSS community works IT planners are able to better calculate the risk of OSS usage Applications 32
33 OSS development (1) Recent studies showed: OSS development produces better, more bug-free software Most developers work for enjoyment and pride of being part of an successful OSS project. Not working for monetary return Collaborate from around the world Developers rarely meet face-to-face Developers are self-organized Applications 33
34 OSS development (2) OSS movement is a example of a decentralized selforganizing process. No central control or planning Threatens traditional proprietary software business Open Questions: Intellectual property rights Role of the government concerning OSS Software licensing Applications 34
35 Power Law Networks Collaborative networks often show power law distribution Examples for power law distributions: City size distribution Word ranking in languages and writing Internet Example: Applications 35
36 Data Collection and Analysis Web Crawler collected data from SourceForge (Mailing Lists, project sites, forums) from Jan 2001 to March 2002 Project number Developer id SourceForge Number of projects: (2002), (2007) Number of developers: (2002) Number of registered users: (2007) Applications 36
37 Modeling approach Modeling the OSS Community as collaborative social network Hypothesis: The OSS Movement displays power law relationships in its structure Cluster size Degree of nodes Applications 37
38 Graph modeling Node = developer Edge = work on the same project Node = projects Edge = same developer works on both projects Dev[53] emule GIMP Dev[14] Dev[75] Azureus Applications 38
39 Results Both figures show, that the two modeled networks satisfy the power law property Applications 39
40 Clustering Analysis (1) Linchpins Linchpins Applications 40
41 Number of cluster Clustering Analysis (2) Cluster size Applications 41
42 Conclusions (1) OSS developer network fits to the power law relationship OSS developer network is not a random network The graph displays preferential attachment of new nodes Initial success of a OSS project more developer join the project Important role of linchpins Attractors for other developers Facilitate the diffusion of ideas and technology between clusters Applications 43
43 Conclusions (2) Long term study needed because of high fluctuation rate of nodes Further research should be done on the OSS network Additional graph theoretic properties could be computed (cluster coefficients, network diameter, etc) Deeper understanding of how nodes join and leave Role of SourceForge? Applications 44
44 Overview Crime enforcement Link Exploration Money laundering Peer Group Analysis Open Source Software Development Adolescent cigarette smoking Applications 45
45 Adolescent Cigarette Smoking Social network theory and analysis applied to examine whether adolescents differ in prevalence of current smoking. Research project on 1092 ninth graders of 5 schools: Each choose 3 best friends (ordered by better friends first) Aim to classified each adolescent in Clique member Clique liaison Isolate Additional information provided 7/19/2007 Applications 46
46 Building Link Graph Liaisons Clique members: -Belong to group of min 3-50+% of their links within their group -Connected by some path lying entirely within the clique Clique liaisons: -2+ links with clique members/other liaisons -Not in a clique Isolates Isolates: Few/no links to other Weight of arcs = 1 if non reciprocated friendship otherwise Applications 47
47 Test data Applications 48
48 Cigarette Smoking Defined by self-report (current smoker and 1+ packs of cigarette) and carbon monoxide content in alveolar breath samples Applications 49
49 Result Smokers tent more often to be white than black (2 schools significant) come from families with mothers having lower education Applications 50
50 Additional Analysis significance in interaction at 4 schools School E significant in interactions between social position and variables grander and mother education?!? Including nonsurveyed subjects leads to 5 schools with significant relationship between social position and current smoking (not shown) Underestimation of relationship Applications 51
51 Additional Analysis (cont.) Possibility remains that isolates are integrated into peer groups outside the school social network Applications 52
52 Fiend Smoking Behaviour Isolates have more smoking friend than clique members/liaisons (1,5 4 times as many); Isolates have fewer friends than other subjects. Add attribute friend smoking to graph (ø of 3 friends - smoking/non smoking ) -> Not significant ->friend smoking is strongly related to subject smoking. Friend smoking is not a proxy for peer group social position Applications 53
53 Isolates tend to be smokers Explanation: 1. Social Isolation cause smoking 2. Smoking cause social isolation 3. No relationship between smoking & isolation (both caused by same factors) 4. Isolates are members of cliques from outside the school environment Regardless of explanation smoking is not a peer group phenomenon! Applications 54
54 Similarities / Differences between Applications Applications 55
55 Evaluation Link analysis offers a great potential to crime investigation Reduce time and human effort Domain knowledge could improve link analysis More accurate results with domain knowledge based link analysis Peer Group Analysis is a helpful tool for social network analysis Applications 56
56 7/19/2007 Applications 57
Relational Data Mining and Web Mining
Relational Data Mining and Web Mining Prof. Dr. Daning Hu Department of Informatics University of Zurich Nov 20th, 2012 Outline Introduction: Big Data Relational Data Mining Web Mining Ref Book: Web Intelligence,
More informationAn Analysis of Open Source Software Development Using Social Network Theory and Agent-Based Modeling
An Analysis of Open Source Software Development Using Social Network Theory and Agent-Based Modeling Greg Madey Vincent Freeh Renee Tynan Chris Hoffman University of Notre Dame March 2003 The Second Lake
More informationBank Secrecy Act Training: Who, What, When, How and Why? Presented by Lynn English Lafayette Federal Credit Union
Bank Secrecy Act Training: Who, What, When, How and Why? Presented by Lynn English Lafayette Federal Credit Union Key Takeaways After this webinar, participants should have an understanding of minimum
More informationNetworked Life (CSE 112)
Networked Life (CSE 112) Prof. Michael Kearns Final Examination May 3, 2006 The final exam is closed-book; you should have no materials present other than the exam and a pen or pencil. NAME: PENN ID: Exam
More informationBond Market Simulation
www.overbond.com Bond Market Simulation Simulation Abstract From June 17 th to June 19 th, 2016, Overbond performed a bond market simulation that empirically demonstrated differences in market connectivity
More informationFinal Project Report CS224W Fall 2015 Afshin Babveyh Sadegh Ebrahimi
Final Project Report CS224W Fall 2015 Afshin Babveyh Sadegh Ebrahimi Introduction Bitcoin is a form of crypto currency introduced by Satoshi Nakamoto in 2009. Even though it only received interest from
More informationInferring Social Ties across Heterogeneous Networks
Inferring Social Ties across Heterogeneous Networks CS 6001 Complex Network Structures HARISH ANANDAN Introduction Social Ties Information carrying connections between people It can be: Strong, weak or
More informationJOB DESCRIPTION: **Pay for new employees typically starts at the minimum of the posted range**
CITY OF DELRAY BEACH invites applications for the position of: Crime Analyst Police Department SALARY Hourly $21.29 $33.01 An Equal Opportunity Employer Annually $44,283.20 $68,660.80 OPENING DATE: 03/22/17
More informationSOCIAL MEDIA MINING. Behavior Analytics
SOCIAL MEDIA MINING Behavior Analytics Dear instructors/users of these slides: Please feel free to include these slides in your own material, or modify them as you see fit. If you decide to incorporate
More informationOracle Financial Services FCCM Analytics User Guide. Release October 2017
Oracle Financial Services FCCM Analytics User Guide Release 8.0.5.0.0 October 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.5.0.0 October 2017 Part Number: E85262-01 Oracle Financial
More informationText Analytics for Executives Title
WHITE PAPER Text Analytics for Executives Title What Can Text Analytics Do for Your Organization? ii Contents Introduction... 1 Getting Started with Text Analytics... 2 Text Analytics in Government...
More informationHOW DATA SCIENCE CAN REDUCE AML FIFTH PILLAR RISK
HOW DATA SCIENCE CAN REDUCE AML FIFTH PILLAR RISK New Technologies Including Artificial Intelligence (Ai), Machine Learning And Big Data Enable Banks And Financial Institutions To Surpass Kyc Regulatory
More informationOracle Financial Services FCCM Analytics User Guide. Release March 2017
Oracle Financial Services FCCM Analytics User Guide Release 8.0.4.0.0 March 2017 Oracle Financial Services FCCM Analytics User Guide Release 8.0.4.0.0 March 2017 Part Number: E85262-01 Oracle Financial
More informationBusiness Network Analytics
Business Network Analytics Sep, 2017 Daning Hu Department of Informatics University of Zurich Business Intelligence Research Group F Schweitzer et al. Science 2009 Research Methods and Goals What Why How
More informationAsk the Expert SAS Text Miner: Getting Started. Presenter: Twanda Baker Senior Associate Systems Engineer SAS Customer Loyalty Team
Ask the Expert SAS Text Miner: Getting Started Ask the Expert SAS Text Miner: Getting Started Presenter: Twanda Baker Senior Associate Systems Engineer SAS Customer Loyalty Team Q&A: Melodie Rush Senior
More informationIBM SPSS Modeler Personal
IBM SPSS Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables
More informationEnabling News Trading by Automatic Categorization of News Articles
SCSUG 2016 Paper AA22 Enabling News Trading by Automatic Categorization of News Articles ABSTRACT Praveen Kumar Kotekal, Oklahoma State University Vishwanath Kolar Bhaskara, Oklahoma State University Traders
More informationEyal Carmi. Google, 76 Ninth Avenue, New York, NY U.S.A. Gal Oestreicher-Singer and Uriel Stettner
RESEARCH NOTE IS OPRAH CONTAGIOUS? THE DEPTH OF DIFFUSION OF DEMAND SHOCKS IN A PRODUCT NETWORK Eyal Carmi Google, 76 Ninth Avenue, New York, NY 10011 U.S.A. {eyal.carmi@gmail.com} Gal Oestreicher-Singer
More informationSeminars of Software and Services for the Information Society. Social Networks A case study
DIPARTIMENTO DI INGEGNERIA INFORMATICA AUTOMATICA E GESTIONALE ANTONIO RUBERTI Master of Science in Engineering in Computer Science (MSE-CS) Seminars in Software and Services for the Information Society
More informationData Mining and Crime Analysis in the Richmond Police Department
Data Mining and Crime Analysis in the Richmond Police Department Colleen McCue, PhD, Senior Research Scientist, RTI International Highlights: Data mining tools such as IBM SPSS Modeler enable law enforcement
More informationThe Agent s Independent Review cannot be conducted by the designated Compliance Officer or an employee reporting directly to the Compliance Officer.
Independent Review What is the purpose of an Independent Review? The purpose of an Independent Review is to monitor the completeness and effectiveness of an Agent s antimoney laundering (AML) program as
More informationTesting and Reviews. Importance of BSA / AML Training Testing staff on their comprehension of the training
Testing and Reviews Testing and Reviews Importance of BSA / AML Training Testing staff on their comprehension of the training BSA AML Review Target Training to those who need it Know Your Employee Accountability
More informationAnalytics in Action transforming the way we use and consume information
Analytics in Action transforming the way we use and consume information Big Data Ecosystem The Data Traditional Data BIG DATA Repositories MPP Appliances Internet Hadoop Data Streaming Big Data Ecosystem
More informationPATH TO INTELLIGENT TRANSACTION MONITORING. February 22, 2018
PATH TO INTELLIGENT TRANSACTION MONITORING February 22, 2018 SPEAKER Mayank Johri joined First Republic in 2014 as Vice President BSA/AML Analytics. He has over 20 years combined experience in banking,
More informationPractical Application of Predictive Analytics Michael Porter
Practical Application of Predictive Analytics Michael Porter October 2013 Structure of a GLM Random Component observations Link Function combines observed factors linearly Systematic Component we solve
More informationIBM SPSS Modeler Personal
IBM Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables you
More informationBUSINESS DEVELOPMENT INTELLIGENCE MONITORING FOR LAW FIRMS
WHITEPAPER BUSINESS DEVELOPMENT INTELLIGENCE MONITORING FOR LAW FIRMS Most major law firms engage in intelligence monitoring to spot new business opportunities and inform attorneys about important developments
More informationExpanding a Datawarehouse in step with Oracle advancements
Expanding a Datawarehouse in step with Oracle advancements Paris, 20.09.2003 Birmingham, 10.12. 2003 Jan Medek jan.medek@ct.cz Paul Skaife paul@yorviq.co.uk Agenda Introduction Project History Project
More informationWorkflow Mining: Identification of frequent patterns in a large collection of KNIME workflows
Workflow Mining: Identification of frequent patterns in a large collection of KNIME workflows Nils Weskamp, Research Scientist Computational Chemistry nils.weskamp@boehringer-ingelheim.com Overview Motivation
More informationOperational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do?
Operational Application of Targeted Analysis Eric Chasin, NTELX echasin@ntelx.com Agenda Who is NTELX? Applying Intelligence Multi Source and Multi Indicator Knowledge Based Decision Making to Medicaid/Medicare
More informationBusiness Objects Universe Developer Guide. Release
Business Objects Universe Developer Guide Release 13.3.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationBrian Macdonald Big Data & Analytics Specialist - Oracle
Brian Macdonald Big Data & Analytics Specialist - Oracle Improving Predictive Model Development Time with R and Oracle Big Data Discovery brian.macdonald@oracle.com Copyright 2015, Oracle and/or its affiliates.
More informationCHAPTER 8 PROFILING METHODOLOGY
107 CHAPTER 8 PROFILING METHODOLOGY 8.1 INTRODUCTION This research aims to develop a customer profiling methodology with reference to customer lifetime value, relationship, satisfaction, behavior using
More informationAI that creates professional opportunities at scale
AI that creates professional opportunities at scale Deepak Agarwal AI in practice, AAAI, San Francisco, USA Feb 6 th, 2017 We are seeking new professional opportunities all the time To Advance our Careers
More informationAJS 275. Criminal Investigation. Course Package
AJS 275 Criminal Investigation Course Package Approved February 12, 2010 COURSE PACKAGE FORM Contact Person (s) Michael S. Messner Date of proposal to Curriculum Sub-committee: 02/12/10 Purpose: New _X_
More informationREUTERS/Carlos Baria. Thomson Reuters World-Check One Finding Hidden Risks
REUTERS/Carlos Baria Thomson Reuters World-Check One Finding Hidden Risks Thomson Reuters World-Check One Finding Hidden Risks A better way to identify Financial Crime & Reputational Risk World-Check One
More informationPublic Goods Theory of the Open Source Development Community using Agent-based Simulation
Public Goods Theory of the Open Source Development Community using Agent-based Simulation Scott Christley, Jin Xu, Yongqin Gao, Greg Madey Dept. of Computer Science and Engineering University of Notre
More informationAML / CTF in the Customer Domain
AML / CTF in the Customer Domain APRIL 2017 Introduction Over the last few years, the introduction of new regulations and the proliferation of emerging technologies have changed customers expectation of
More informationNext-Generation Software Platform For Intelligence-Led Decision Making
Data Sheet Next-Generation Software Platform For Intelligence-Led Decision Making Key Benefits Get Answers 10X Faster All your data, connected in one place for search and analysis Fast response, even with
More informationUncovering the Small Community Structure in Large Networks: A Local Spectral Approach
Uncovering the Small Community Structure in Large Networks: A Local Spectral Approach Yixuan Li 1, Kun He 2, David Bindel 1 and John E. Hopcroft 1 1 Cornell University, USA 2 Huazhong University of Science
More informationKnowledgeSTUDIO. Advanced Modeling for Better Decisions. Data Preparation, Data Profiling and Exploration
KnowledgeSTUDIO Advanced Modeling for Better Decisions Companies that compete with analytics are looking for advanced analytical technologies that accelerate decision making and identify opportunities
More informationCommercial Due Diligence
Solutions For All Situation Commercial Due Diligence February 2019 1 Who we are RHT Forensics & Disputes Advisory (RHT FDA) is an independent risk management consultancy specializing in helping organizations
More informationHybridRank: Ranking in the Twitter Hybrid Networks
HybridRank: Ranking in the Twitter Hybrid Networks Jianyu Li Department of Computer Science University of Maryland, College Park jli@cs.umd.edu ABSTRACT User influence in social media may depend on multiple
More informationAPPLICATION FOR EMPLOYMENT
APPLICATION FOR EMPLOYMENT The County considers applicants for all positions without regard to age, race, color, religion, creed, sex, national origin, marital status, disability, veteran status, gender
More informationFinal Project - Social and Information Network Analysis
Final Project - Social and Information Network Analysis Factors and Variables Affecting Social Media Reviews I. Introduction Humberto Moreira Rajesh Balwani Subramanyan V Dronamraju Dec 11, 2011 Problem
More informationOpen System Engineering Environment (OSEE) Action Tracking System (ATS)
Open System Engineering Environment (OSEE) Action Tracking System (ATS) Copyright 2005 The Boeing Company Mesa, Arizona OSEE Team Goal Create a powerful and tightly integrated tracking system within OSEE
More informationIntroduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D
Introduction Social Network Analysis Presented by Kimberly A. Fredericks, Ph.D What is Social Network Analysis? Network analysis is: > the study of social relations among a set of actors > a theoretical
More informationEMPLOYEE ENGAGEMENT SURVEY
EMPLOYEE ENGAGEMENT SURVEY ATC Project March 30, 2015 on behalf of TTC TABLE OF CONTENTS Introduction 3 Overall Engagement Score 12 Aspects of Employee Engagement 16 What Drives Engagement 20 Overall Organizational
More informationBehavioral Data Mining. Lecture 22: Network Algorithms II Diffusion and Meme Tracking
Behavioral Data Mining Lecture 22: Network Algorithms II Diffusion and Meme Tracking Once upon a time Once upon a time Approx 1 MB Travels ~ 1 hour, B/W = 3k b/s News Today, the total news available from
More informationThe Modern FCIU: Special Risk Investigations
SAS FINANCIAL CRIMES EXECUTIVE FORUM Toronto, 2018 The Modern FCIU: Special Risk Investigations Daniel Nagle, Global Banking Principal, SAS Trends in Compliance What are other Financial Institutions saying?
More informationFRAUD MONITORING. Modern, comprehensive solution for fraud detection and prevention in banking systems.
FRAUD MONITORING Modern, comprehensive solution for fraud detection and prevention in banking systems. www.infigo.hr INTRODUCTION KEY FEATURES OF INFIGO FM Banking institutions are increasingly faced with
More informationPikes Peak Retail Security Assoc**.. (Decreasing level of shoplifting/citywide)
Pikes Peak Retail Security Assoc**.. (Decreasing level of shoplifting/citywide) 03-09 Description of problem: Repeat shoplifts, thefts, and frauds being committed by the same individuals or groups. Retailers
More informationMAPPING GLOBAL VALUE CHAINS AND MEASURING TRADE IN TASKS MOTIVATIONS AND ANNOTATED OUTLINE HUBERT ESCAITH, WTO JUNE 2013
MAPPING GLOBAL VALUE CHAINS AND MEASURING TRADE IN TASKS MOTIVATIONS AND ANNOTATED OUTLINE HUBERT ESCAITH, WTO JUNE 2013 MOTIVATION - PROVIDE THE BIG PICTURE - LOOK AT THE ROAD MAP Why? Offer a Synthesis
More informationGroup #2 Project Final Report: Information Flows on Twitter
Group #2 Project Final Report: Information Flows on Twitter Huang-Wei Chang, Te-Yuan Huang 1 Introduction Twitter has become a very popular microblog website and had attracted millions of users up to 2009.
More informationCash In Transit (CIT) United States
Cash In Transit (CIT) United States Richard Davis Vice President Davis Bancorp Background: Davis Bancorp Davis Bancorp provides commercial, financial & municipal institutions with: Armored Transportation
More informationFinancial Crime Mitigation
Financial Crime Mitigation A uniquely flexible range of intelligent, versatile solutions for financial institutions, large and small, to combat financial crime. Introduction Our Financial Crime Mitigation
More informationA Framework for Analyzing Twitter to Detect Community Crime Activity
SESSION ID: CCT2-W05 A Framework for Analyzing Twitter to Detect Community Crime Activity Safaa S. Al Dhanhani @ssdhanhani Outline Why? Literature review What is the framework Approach How? 2 Cont. Outline
More informationBusiness Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee
Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Lecture - 02 Data Mining Process Welcome to the lecture 2 of
More informationAdvancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION
Advancing Information Management and Analysis with Entity Resolution Whitepaper February 2016 novetta.com 2016, Novetta ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information
More informationLexisNexis Risk Management Suite
LexisNexis Risk Management Suite Prevention. Detection. Investigation. It s all here. ROI: R E T U R N O N INFOATION SOLUTIONS Customer Development Authentication & Screening Fraud Prevention Collections
More informationSession 4 Strategic analysis products
The Egmont Group of Financial Intelligence Units Egmont Strategic Analysis Course Session 4 Version 30 October 2012 Egmont Strategic Analysis Course Page 2 of 34 Session 4 1. Introduction This session
More informationTechnology Office Challenge. (Why numbers rock!)
Technology Office Challenge (Why numbers rock!) Context 800,000+ customers 280+ branches 300 ATMs 1,100 staff $14.4bn assets 2 data centres 350 production servers (50% virtual) 0.5PB storage (10% structured)
More information7 Tips to Successful Check Cashing
7 Tips to Successful Check Cashing Now that you ve started cashing checks here is what you need to know to ensure success Use the following best practices to help make your check cashing business successful.
More informationChapter 9. Business Intelligence Systems
Chapter 9 Business Intelligence Systems We Can Make the Bits Produce Any Report You Want, But You ve Got to Pay for It. Need to monitor patient workout data. Spending too many hours each day looking at
More informationPublic Transport Planning System by Dijkstra Algorithm: Case Study Bangkok Metropolitan Area Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom
Public Transport Planning System by Dijkstra Algorithm: Case Study Bangkok Metropolitan Area Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom International Science Index, Computer and Information Engineering
More informationCompliance/Risk Management & Bank Secrecy Act Officer
Compliance/Risk Management & Bank Secrecy Act Officer Job Reporting Relationships Supervised by: Supervises: Chief Operating Officer None Basic Qualifications Education/Training: A Bachelor s degree in
More informationLeveraging Code Coverage Data to Improve Test Suite Efficiency and Effectiveness
Leveraging Code Coverage Data to Improve Test Suite Efficiency and Effectiveness Jean Hartmann, Ph.D. Principal Test Architect Engineering Systems Group Microsoft Developer Division Agenda Motivation Goals
More informationUse of Data Mining and Machine. Use of Data Mining and Machine. Learning for Fraud Detection. Learning for Fraud Detection. Welcome!
Use of Data Mining and Machine Use of Data Mining and Machine Learning for Fraud Detection CPE PIN Code: UKLK Learning for Fraud Detection Welcome! Ramazan Isik, CFE, CIA, CRISC, CRMA Chief Audit Executive
More informationUFED Pro Series. Advance the case with access to the widest amount of digital evidence and insights.
UFED Pro Series Advance the case with access to the widest amount of digital evidence and insights. Investigations need the full picture as quickly as possible. The challenges to digital evidence are constant.
More informationBoundedly Rational Consumers
Boundedly Rational Consumers Marco VALENTE 1 1 LEM, S. Anna School of Advanced Studies, Pisa University of L Aquila Background Mainstream: consumers behaviour is represented by maximisation of a utility
More informationAn Exploratory Study on the Relationship Between OSS Project Popularity and Network Characteristics
An Exploratory Study on the Relationship Between OSS Project Popularity and Network Characteristics SI708 Network Theory and Application Term Paper Min-seok Pang noticeme@umich.edu 1. Introduction In this
More informationDATA ANALYTICS WITH R, EXCEL & TABLEAU
Learn. Do. Earn. DATA ANALYTICS WITH R, EXCEL & TABLEAU COURSE DETAILS centers@acadgild.com www.acadgild.com 90360 10796 Brief About this Course Data is the foundation for technology-driven digital age.
More informationIdentification of Process-based Fraud Patterns in Credit Application
Identification of Process-based Fraud Patterns in Credit Application Solichul Huda Universitas Dian Nuswantoro Semarang, Indonesia solichul.huda@dsn.dinus.ac.id Tohari Ahmad Institut Teknologi Sepuluh
More informationOracle Knowledge Analytics User Guide
Oracle Knowledge Analytics User Guide Working with Oracle Knowledge Analytics Reports Oracle Knowledge Version 8.4.2.2 April, 2012 Oracle, Inc. COPYRIGHT INFORMATION Copyright 2002, 2011, Oracle and/or
More informationThe Science of Social Media. Kristina Lerman USC Information Sciences Institute
The Science of Social Media Kristina Lerman USC Information Sciences Institute ML meetup, July 2011 What is a science? Explain observed phenomena Make verifiable predictions Help engineer systems with
More informationThe usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales
The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales Today's IT service providers offer a large set of tools supporting sales and marketing activities
More informationOn Alert: Designing Effective AML Monitoring Processes
On Alert: Designing Effective AML Monitoring Processes SYNOPSIS: This article first appeared in ABA Bank Compliance magazine in October 2008. Co-authored by David Caruso, CEO of Dominion Advisory Group
More informationCA Clarity Project & Portfolio Manager
CA Clarity Project & Portfolio Manager Business Objects Universes for CA Clarity PPM Reference Guide v12.1.0 This documentation and any related computer software help programs (hereinafter referred to
More informationEMPLOYEE ENGAGEMENT SURVEY
EMPLOYEE ENGAGEMENT SURVEY Customer Communications/Customer Development/Farecard Team March 31, 2015 on behalf of TTC TABLE OF CONTENTS Introduction 3 Overall Engagement Score 11 Aspects of Employee Engagement
More informationEMPLOYEE ENGAGEMENT SURVEY
EMPLOYEE ENGAGEMENT SURVEY Legal March 27, 2015 on behalf of TTC TABLE OF CONTENTS Introduction 3 Overall Engagement Score 11 Aspects of Employee Engagement 15 What Drives Engagement 19 Overall Organizational
More informationCollaborative Free Software Development
Collaborative Free Software Development Cristian CIUREA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania cristian.ciurea@ie.ase.ro Abstract: In this paper is presented the
More informationTransaction Monitoring
Course Syllabus Audience The primary target is the frontline analyst, teaching skills that benefit new and experienced employees, especially as regulator and market expectations increase. This course assumes
More informationWaterloo Regional Police Service: About Our Data
Waterloo Regional Police Service: About Our Data REVISED November 2017 Table of Contents Waterloo Regional Police Service: About Our Data... 1 DISCLAIMER... 1 The Science of Police Deployment... 2 WRPS
More informationEnterprise-wide Risk Case
Enterprise-wide Risk Case December 4, 2013 Management Categorizing Costs and Savings for Clearer Return on Investment (ROI) Executive Summary Greater losses from financial crime incidents, pressure to
More informationThe project recruits, trains and supervises volunteers to act as Independent Visitors for children in the care of Hull City Council.
Sova Hull Independent Visitors Project Support Officer Job Pack Sova is committed to safeguarding and promoting the welfare of children, young people and vulnerable adults, and expects all staff and volunteers
More informationLecture 10. Outline. 1-1 Introduction. 1-1 Introduction. 1-1 Introduction. Introduction to Statistics
Outline Lecture 10 Introduction to 1-1 Introduction 1-2 Descriptive and Inferential 1-3 Variables and Types of Data 1-4 Sampling Techniques 1- Observational and Experimental Studies 1-6 Computers and Calculators
More informationUsing SAS Visual Investigator to Enforce Model Tuning Best Practices in a Regulatory Environment
Paper SAS1777-2018 Using SAS Visual Investigator to Enforce Model Tuning Best Practices in a Regulatory Environment Scott Wood, Josh Lincoln, and Edwin Rivera, SAS Institute Inc. ABSTRACT A common process
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Master Degree
Accreditation & Quality Assurance Center Curriculum for Master Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Department of Business Information Technology.3 (Arabic)
More informationOccupational Health and Safety Policy
Occupational Health and Safety Policy TJ Instrumentation strives to achieve excellence in the workplace Health and Safety. Preventing harm to the public, employees, sub-contractors, customers, plant assets
More informationThe Customer Is Always Right: Analyzing Existing Market Feedback to Improve TVs
The Customer Is Always Right: Analyzing Existing Market Feedback to Improve TVs Jose Valderrama 1, Laurel Rawley 2, Simon Smith 3, Mark Whiting 4 1 University of Central Florida 2 University of Houston
More informationSTRATEGIES FOR REDUCING AML CASE PROCESSING TIMES
1 INTRODUCTION As organizations deal with rising regulatory expectations and increasing scrutiny, they confront the prospect of compliance cost increases that exceed their growth in top-line revenue. Many
More informationSmartCare. SPSS Workshop. Rick Durham - North American Advanced Analytics Channel Team IBM Corporation. Date: 5/28/2014
SPSS Workshop Key Presenter Rick Durham - North American Advanced Analytics Channel Team Date: 5/28/2014 Agenda What is Predictive Analytics? What is the architecture of the IBM/SPSS technology stack?
More informationA Unified Theory of Software Testing Bret Pettichord 16 Feb 2003
A Unified Theory of Software Testing Bret Pettichord 16 Feb 2003 This paper presents a theory, or model, for analyzing and understanding software test techniques. It starts by developing a theory for describing
More informationArtificial Intelligence Breadth-First Search and Heuristic
Artificial Intelligence Breadth-First Search and Heuristic Chung-Ang University, Jaesung Lee The original version of this content is came from MIT OCW of MIT Electrical Engineering and Computer Science
More informationContextual Monitoring: Enabling banks to reduce false positives while catching the bad guys
Contextual Monitoring: Enabling banks to reduce false positives while catching the bad guys Executive summary The need for a new approach The current approach to Anti-Money Laundering (AML) Transaction
More informationMulti-Resource Packing for Cluster Schedulers. CS6453: Johan Björck
Multi-Resource Packing for Cluster Schedulers CS6453: Johan Björck The problem Tasks in modern cluster environments have a diverse set of resource requirements CPU, memory, disk, network... The problem
More informationProbation Population: 05-07
Arrowhead Regional Corrections Probation Population: 05-07 Prepared September 2009 Director: Tom Roy Phone: (218) 726-2650 Email: royt@co.st-louis.mn.us Research Analyst: Kelly Emmons Phone: (218) 725-5044
More informationCan Cascades be Predicted?
Can Cascades be Predicted? Rediet Abebe and Thibaut Horel September 22, 2014 1 Introduction In this presentation, we discuss the paper Can Cascades be Predicted? by Cheng, Adamic, Dow, Kleinberg, and Leskovec,
More information