We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byRobert Daniels
Modified over 3 years ago
©2011, Cognizant Fraud Control - IT Interventions and Solutions
| ©2011, Cognizant 2 Key considerations for the functional solution Provide practical insights to insurers, through portfolio analysis and comparison to industry benchmarks Understand the difference between abuse and fraud: Fraud: knowingly, intentionally, willfully, ongoing for direct financial gain Abuse: excessive, unwarranted, potentially not needed Focus on obtaining a demonstrable return on investment from project by prioritizing high financial loss practices, such as systematic collusion Deliver tools that can be deployed at all levels, ie: broker / agent / insurer / TPA / regulator and across functions – distribution / underwriting / claims processing Core Principles A solution that provides a comprehensive data analysis and reporting environment facilitating MIS and fraud analytics reports, to dissect and highlight patterns trends, volume and scope of fraudulent claims observed Strengthening future data capture initiatives and develop greater data analysis capabilities within the insurance company
| ©2011, Cognizant 3 Solution Proposed Functional Solution Technical Solution Solution Proposed Components of the proposed solution Domain Knowledge
| ©2011, Cognizant Solution Proposed – Holistic View 4 MIS & Fraud Detection Reports Aggregate Level Fraud Modeling Anomaly Detection Rules Social network analytics Predictive Modeling Real-time Fraud Detection at various stages Detection at Underwriting Detection at Claims Process Stage Detection at Preauthorization Integrated Data Operational Data Store (ODS) Data CubesData Marts Data Integration Extract, Transform & Load (ETL) Data Quality – Cleansing, Profiling Data Standardization & Certification Transactional Data Member Claims Lookup DataPolicy Provider Registration Portal Standardized IDs for providers & employers Procedure codes ICD 10 Coding Additional requirements Technical Solution Functional Solution
| ©2011, Cognizant 5 Functional Solution: Aggregate level Fraud Modeling & Analysis using data Flexibility: predictive models for fraud detection should be built using different statistical methods; the final models should be determined after analyzing the results. Focus on enhancing predictive values (also reducing false positives) and continuous improvement as new data fields becomes available.
| ©2011, Cognizant 6 Proposed Technical Solution
| ©2011, Cognizant 7 Key Considerations for the Technical Solution Need for a Platform that can provide end-to-end capabilities, starting with Data Integration, Statistical Modeling, Fraud Detection, BI & Reporting. To choose a tool that supports advanced analytic approaches and fraud risk scoring techniques like anomaly detection, social network analysis. To build a comprehensive Operational Data Store (ODS) to hold persistent source system data in a standard model for reporting & analytical requirements. An unique approach to combine Modeling techniques to leverage the unique aspects of each of the techniques be it logistic regression, decision trees or neural networks. Core Principles A solution that provides a comprehensive data analysis and reporting environment with MIS and fraud analytics reports, to dissect and highlight patterns trends, volume and scope of fraudulent claims A solution which caters to current requirements and is extensible to other lines of business. Leverage industry specific relevant frameworks, methodologies and processes to ensure flawless and timely delivery with utmost quality.
| ©2011, Cognizant 8 Technical Solution Overview The integrated data will consist of the Operational Data store (ODS), Data cubes built using SAS tools & Datamarts. This data will provide the base for the models & reports to be built for the solution SAS FFI (Base SAS, Enterprise Miner, OLAP Cube Studio) Oracle + SAS Cubes SAS FFI (SAS Enterprise BI) Fraud Suspect Extracts / Investigation feedback Oracle Enterprise Ed SAS FFI (SAS Enterprise DI)
| ©2011, Cognizant 9 Model Development & Modeling Techniques Identify the Variables for the Model No Exploratory Data Analysis Data Split No Data Extraction from different sources Claims Data Merging Data Cleaning Is Adequate Yes X. Predictive Modeling Is Model Adequate No X (Contd.) Yes Score the Validation Data Examine the predictive ability Is Satisfactory Yes Results and Insights Claims Segmentation Outliers Detection Fine tune the model Logistic Regression Statistical technique used to identify the likelihood of occurrence of a binary/ categorical outcome using multivariate inputs Logistic Regression can estimate the probability of making a fraud claim in next few months Decision Tree Decision Tree divides the population into segments with the greatest variation in the objective variable at each segment. The algorithms usually work top- down Decision Tree supports in identification of the segments which are more likely to have fraud concentration The key variables/logic, that identify the fraud concentration in decision tree can also be used in Neural network for instant Fraud detection. Neural Network Artificial Neural network is non-linear data analytical process used to identify complex relationships between inputs and output By detecting complex nonlinear relationships in data, neural networks can help make accurate predictions about real-world problems. Integrated learning capabilities in Neural network, where the significant logic coming out of Decision tree and logistic regression can be feed in. This will enable to continuously monitor and refine detection rules and techniques to reduce false positives and identify and respond to emerging threats Investigate ConsultSimulate Define DISC Analytics Methodology closely weaves business outcome with the statistical techniques Modeling Techniques proposed
| ©2011, Cognizant Exploratory Data Analysis 10 Sample
| ©2011, Cognizant Decision Tree Analysis 11 Sample
| ©2011, Cognizant Neural Networks 12 Sample
| ©2011, Cognizant Cognizants Fraud Management Workbench 13 Fraud Management Workbench Fraud Management Workbench will enable SIU users orchestrate the complete process of investigating a suspect claim referred to SIU, analyze the claim by its merits and label the claim to its logical closure Functional Features Automated & manual claims fraud referral from claims system Automated case assignment based on SIU user skills and availability Automated creation of relevant tasks for each case based on claim type Claim fraud scoring with 360 degree claims view Outside investigators assignment and tracking Compliance alerts and reports Regulator referral utility Technical Enablers Cloud ready Light weight case management/ workflow layer Rules engine interface Scoring engine to interpret predictive models and provide claim fraud propensity score Multi format claim investigation evidence update (Images, Audio Files, GIS Data etc) Third party reports interface Discussion forums and chat functionality to discuss with SIU gurus Sixth Sense Solution
| ©2011, Cognizant ©2011, Cognizant Thank you
BUSINESS INTELLIGENCE/DATA INTEGRATION/ETL/INTEGRATION AN INTRODUCTION Presented by: Gautam Sinha.
Manajemen Basis Data Pertemuan 8 Matakuliah: M0264/Manajemen Basis Data Tahun: 2008.
Data Mining Techniques
DATA MINING Team #1 Kristen Durst Mark Gillespie Banan Mandura University of DaytonMBA APR 09.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Shipi Kankane Prashanth Nakirekommula. Applying analytics and risk- management capabilities to health insurance through LexisNexis data platforms.
Understanding Data Warehousing
Center of Excellence for IT at Bellevue College. IT-enabled business decision making based on simple to complex data analysis processes Database development.
Introduction to Business Intelligence
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Business Intelligence Solutions for the Insurance Industry DAT – 13 Data Warehousing Rasool Ahmed.
Information systems and management in business Chapter 8 Business Intelligence (BI)
Managing Project Risk.
© 2008 Prentice Hall9-1 Introduction to Project Management Chapter 9 Managing Project Risk Information Systems Project Management: A Process and Team Approach,
Ihr Logo Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Turban, Aronson, and Liang.
Internal Control–Integrated Framework
Rajesh Bhat Director, PLM Analytics Applications PLM Analytics Solutions.
Who We Are We enable our customers to gain unprecedented insights to optimize their customer, channel partner, vendor and employee relationships. TheMindSuite.
Computer Science Universiteit Maastricht Institute for Knowledge and Agent Technology Data mining and the knowledge discovery process Summer Course 2005.
SAS solutions SAS ottawa platform user society nov 20th 2014.
Risk based selection for On the Spot Control at Agricultural and Rural Development Agency Miklós Lelkes Central Physical Control Department Agricultural.
Application of SAS®! Enterprise Miner™ in Credit Risk Analytics
Supporting End-User Access
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Chapter 14 Data Mining Transparencies. 2 Chapter Objectives u The concepts associated with data mining. u The main features of data mining operations,
Nature and Scope of Marketing Research
Business Intelligence System September 2013 BI.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
April 11, 2008 Data Mining Competition 2008 The 4 th Annual Business Intelligence Symposium Hualin Wang Manager of Advanced.
IBM Start Now Business Intelligence Solutions. Agenda Overview of BI Who will buy and why Start Now BI solution Benefit to customer.
1 Enterprise Open Source Kit SharePoint PLM download available on Microsoft CodePlex
Technology Capabilities. Market Research + Tech Capabilities Datamatics has in-house capabilities to deliver Technical expertise. Our clients rely on.
Special Challenges With Large Data Mining Projects CAS PREDICTIVE MODELING SEMINAR Beth Fitzgerald ISO October 2006.
OESAI COMPREHENSIVE LIFE INSURANCE TECHNICAL TRAINING.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
material assembled from the web pages at
Introduction to Building a BI Solution 권오주 OLAPForum
Copyright © 2012, SAS Institute Inc. All rights reserved. SAS CUSTOMER INTELLIGENCE SOLUTION BRIEFING SAS MARKETING OPTIMIZATION AND SAS ADAPTIVE CUSTOMER.
Altosoft Copyright ® 2012 altosoft.com8/3/2012 Sandy Follin, Sr. Account Executive Steve Schrader, Sr. Sales Engineer.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
Chapter 9 Business Intelligence and Information Systems for Decision Making.
Introduction to Systems Analysis and Design
Chong Ho Yu. Data mining (DM) is a cluster of techniques, including decision trees, artificial neural networks, and clustering, which has been employed.
Information Technology Audit
Data Analysis Superintendents Trust. Increase test scores and graduation rates through targeted efforts and investments that lead to student success Proactively.
© 2007 IBM Corporation IBM Information Management Accelerate information on demand with dynamic warehousing April 2007.
Business Intelligence components Introduction. Microsoft® SQL Server™ 2005 is a complete business intelligence (BI) platform that provides the features,
© 2017 SlidePlayer.com Inc. All rights reserved.