Browsing All Posts filed under »Fraud Detection«

Risk Analysis and Legacy Data: How to make your Big Data Defensible

March 27, 2014

0

Every company and government organisation has defined goals, targets and strategies for their success or growth, with established timelines for each proposed deliverable. But along the way, all types of terrible events can take place which may jeopardize these strategies and prevent the achievement of these goals and targets. We cannot prevent or foresee all […]

Dealing with Documents in other Languages

January 28, 2014

0

High-stake investigations and eDiscovery projects are not limited by national boundaries and no investigator can afford to miss relevant information because it is in a foreign language and the cost of translation is too high. Multi-lingual text collection hide more complexities than it initially look like, because, in addition to differences in character sets and […]

Automatic Fraud Triangle Analytics made possible with Text-Mining and Content Analytics

January 21, 2014

0

Economic crimes such as corruption and fraud are difficult to detect and prevent, but the financial and reputational consequences and the growing public and political demand for harsh action on corporates whose employees break the law are forcing companies to review their security and compliance policies to limit the extent to which fraud can take […]

How Technology can Help Investigators to Discovery the Golden W’s

January 13, 2014

0

The answers to the “Five W’s” that every investigator knows from school form the basis of the complete story of an investigation: • Who is it about? • What happened? • When did it take place? • Where did it take place? • Why did it happen? Some investigators add a sixth and seven question, […]

The Essential Role of Technology for Law Enforcement and Internal Investigations

December 16, 2013

0

Almost every crime leaves a proverbial “paper trail”, but when the probative information spans a vast volume of confiscated documents, electronic records, e-mail, wiretap transcripts, observation reports, cold cases, intelligence, information from telecom and internet providers, handwritten notes, audio files, pictures, video’s and social network posts, it is hard to link and combine all these […]

Big Data Risk Management

June 25, 2013

0

Big Data is the New, New Thing (Lewis, 1999)! In Moneyball (Lewis, 2004), Michael Lewis described how Big Data analytics can be used to create an optimal baseball team with limited resources. The futuristic The Singularity is Near (2005) from Ray Kurzweil argues how Moore’s Law will eventually lead to computers so powerful, that man […]