000 07101cam a2200877 i 4500
001 sulb-eb0033004
003 BD-SySUS
005 20170713221351.0
006 m o d
007 cr |||||||||||
008 131216s2014 nju ob 001 0 eng
010 _a 2013049994
040 _aDLC
_beng
_erda
_epn
_cDLC
_dYDX
_dN$T
_dEBLCP
_dDG1
_dE7B
_dYDXCP
_dCUI
_dDEBSZ
_dTEFOD
_dBNA
_dB24X7
_dUMI
_dCOO
_dDEBBG
_dAU@
_dK6U
_dUAB
_dOCLCO
_dTEFOD
_dOCLCQ
_dVT2
_dOCLCQ
_dBD-SySUS
019 _a880748090
_a900611584
_a906024341
_a910911923
_a961624687
_a962639146
020 _a9781118233979
_q(epub)
020 _a1118233972
_q(epub)
020 _a9781118220320
_q(pdf)
020 _a1118220323
_q(pdf)
020 _a9781118886168
020 _a111888616X
020 _z9780470494394
_q(hardback)
020 _z0470494395
029 1 _aAU@
_b000052893477
029 1 _aCHBIS
_b010259540
029 1 _aCHVBK
_b325941092
029 1 _aDEBBG
_bBV042490803
029 1 _aDEBSZ
_b405667086
029 1 _aDEBSZ
_b434839825
029 1 _aDEBBG
_bBV043606548
029 1 _aDEBBG
_bBV043396430
035 _a(OCoLC)865544039
_z(OCoLC)880748090
_z(OCoLC)900611584
_z(OCoLC)906024341
_z(OCoLC)910911923
_z(OCoLC)961624687
_z(OCoLC)962639146
037 _aFB7B0C92-A4DB-4087-84B5-14FBD1DFA0C2
_bOverDrive, Inc.
_nhttp://www.overdrive.com
042 _apcc
050 0 0 _aHG1616.S37
072 7 _aBUS
_x027000
_2bisacsh
082 0 0 _a332.1068/4
_223
084 _aBUS027000
_2bisacsh
049 _aMAIN
100 1 _aSubramanian, Revathi.
245 1 0 _aBank fraud :
_busing technology to combat losses /
_cRevathi Subramanian.
264 1 _aHoboken, New Jersey :
_bWiley,
_c[2014]
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aWiley & SAS business series
520 _a"Capitalize on technology to halt bank fraudExamining the technology that is needed to combat bank fraud, Bank Fraud: Using Technology to Combat Losses equips corporate security and loss prevention managers with the necessary tools to determine an organization's unique technology needs. Looks at the technology needed to handle data intelligence Provides guidance to assess the technology necessary to battle fraud Features unique coverage of the history of fraud detection and prevention in banking Explores the challenges of fraud detection in a financial services environment; understanding corporate risk exposure; losses per assets; trending over time; benefits of technology Focusing on the financial crimes and insider frauds in operation nationally and internationally, Bank Fraud: Using Technology to Combat Losses arms fraud prevention professionals with authoritative guidance to detect and prevent such crimes in future"--
_cProvided by publisher.
588 0 _aPrint version record and CIP data provided by publisher.
504 _aIncludes bibliographical references and index.
505 0 _aBank Fraud; Contents; Preface; Acknowledgments; About the Author; CHAPTER 1 Bank Fraud: Then and Now; THE EVOLUTION OF FRAUD; Fraud in the Present Day; Risk and Reward; Secured Lending versus Unsecured Lending; Statistical Models and the Problem of Prediction; THE EVOLUTION OF FRAUD ANALYSIS; Early Credit Card Fraud; Separating the Wheat from the Chaff; The Advent of Nonlinear Statistical Models; Tackling Fraud with Technology; SUMMARY; CHAPTER 2 Quantifying Fraud: Whose Loss Is It Anyway?; Data Storage and Statistical Thinking; Understanding Non-Fraud Behavior; Quantifying Potential Risk.
505 8 _aRecording the Fraud EpisodeSupervised versus Unsupervised Modeling; The Importance of Accurate Data; FRAUD IN THE CREDIT CARD INDUSTRY; Early Charge and Credit Cards; Lost-and-Stolen Fraud: The Beginnings of Fraud in Credit Cards; Card-Not-Present Fraud and Changes in the Marketplace; THE ADVENT OF BEHAVIORAL MODELS; FRAUD MANAGEMENT: AN EVOLVING CHALLENGE; FRAUD DETECTION ACROSS DOMAINS; USING FRAUD DETECTION EFFECTIVELY; SUMMARY; CHAPTER 3 In God We Trust. The Rest Bring Data!; DATA ANALYSIS AND CAUSAL RELATIONSHIPS; BEHAVIORAL MODELING IN FINANCIAL INSTITUTIONS.
505 8 _aCustomer Expectations versus Standards of PrivacyThe Importance of Data in Implementing Good Behavioral Models; SETTING UP A DATA ENVIRONMENT; 1. Know Your Data; 2. Collect All the Data You Can from Day One; 3. Allow for Additions as the Data Grows; 4. If You Cannot Integrate the Data, You Cannot Integrate the Businesses; 5. When You Want to Change the Definition of a Field, It Is Best to Augment and Not Modify; 6. Document the Data You Have as Well as the Data You Lost; 7. When Change Happens, Document It; 8. ETL: "Extract, Translate, Load" (Not "Extract, Taint, Lose").
505 8 _a9. A Data Model Is an Impressionist Painting10. The Top Two Assets of Any Business Today Are People and Data; UNDERSTANDING TEXT DATA; SUMMARY; CHAPTER 4 Tackling Fraud: The Ten Commandments; 1. DATA: GARBAGE IN; GARBAGE OUT; 2. NO DOCUMENTATION? NO CHANGE!; 3. KEY EMPLOYEES ARE NOT A SUBSTITUTE FOR GOOD DOCUMENTATION; 4. RULES: MORE DOESN'T MEAN BETTER; 5. SCORE: NEVER REST ON YOUR LAURELS; 6. SCORE + RULES = WINNING STRATEGY; 7. FRAUD: IT IS EVERYONE'S PROBLEM; 8. CONTINUAL ASSESSMENT IS THE KEY; 9. FRAUD CONTROL SYSTEMS: IF THEY REST, THEY RUST.
505 8 _a10. CONTINUAL IMPROVEMENT: THE CYCLE NEVER ENDSSUMMARY; CHAPTER 5 It Is Not Real Progress Until It Is Operational; THE IMPORTANCE OF PRESENTING A SOLID PICTURE; BUILDING AN EFFECTIVE MODEL; 1. Operations Personnel Need to Understand the Concept of a Fraud Score; 2. The Score Development Process Must Take into Consideration Operational Use and Constraints; 3. In General, Fraud Strategies Should Complement and Not Compete with the Fraud Score; 4. Fraud Strategies and Operational Processes Should Be Well Documented; SUMMARY; CHAPTER 6 The Chain Is Only as Strong as Its Weakest Link.
505 8 _aDISTINCT STAGES OF A DATA-DRIVEN FRAUD MANAGEMENT SYSTEM.
650 0 _aBanks and banking
_xSecurity measures.
650 0 _aBank fraud
_xPrevention.
650 0 _aBank fraud
_xPrevention
_xTechnological innovation.
650 4 _aBank fraud.
650 4 _aBanks and banking.
650 4 _aCommercial crimes.
650 4 _aWhite collar crimes.
650 7 _aBUSINESS & ECONOMICS
_xFinance.
_2bisacsh
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aSubramanian, Revathi.
_tBank fraud.
_dHoboken, New Jersey : John Wiley and Sons, Inc, [2014]
_z9780470494394
_w(DLC) 2013046697
830 0 _aWiley and SAS business series.
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781118886168
_zWiley Online Library [Free Download only for SUST IP]
938 _aBooks 24x7
_bB247
_nbkf00063460
938 _aEBL - Ebook Library
_bEBLB
_nEBL836562
938 _aebrary
_bEBRY
_nebr10849286
938 _aEBSCOhost
_bEBSC
_n719519
938 _aYBP Library Services
_bYANK
_n11419731
938 _aYBP Library Services
_bYANK
_n11715726
938 _aYBP Library Services
_bYANK
_n12671284
994 _a92
_bDG1
999 _c64656
_d64656