Anomalies
341 views | +0 today
Follow
Anomalies
Outliers, aberrations, fat tails, trouble at the mill and maybe something good once in awhile
Your new post is loading...
Your new post is loading...
Scooped by Ellie Kesselman Wells
Scoop.it!

Graph-based Anomaly Detection and Description: A Survey

This survey aims to provide a general, comprehensive, and structured overview of the state-of-the-art methods for anomaly detection in data represented as graphs..

Ellie Kesselman Wells's insight:

Via arXiv

No comment yet.
Scooped by Ellie Kesselman Wells
Scoop.it!

Anomaly Tracker

For years, our researchers have analyzed and crunched numbers looking for outliers -- instances where a politician relies to an unusual degree on one group of donors, for instance,...

Ellie Kesselman Wells's insight:

This is a helpful tool for identifying possible anomalies, then ruling out any false positives. The means to do both are provided by the same web app. There's also a thorough caveat about proper data and contextual checks, before drawing conclusions from initial results. While I was in the process of checking why, for example, a particular Republican from MN had the most anomalies, I found that the dollar amounts, and scope of legislation, was much less than that of others, both Republican and Democrat, for the same state. The Anomaly Tracker provided the means to check all of it. They did a good job!

No comment yet.
Rescooped by Ellie Kesselman Wells from Big Data Technology, Semantics and Analytics
Scoop.it!

Investigating the Investigations - X Marks the Spot

Investigating the Investigations - X Marks the Spot | Anomalies | Scoop.it

"Most of the financial crimes investigators I know live in a world where they dream of moving things from their Inbox to their Outbox..."


Via Tony Agresta
Ellie Kesselman Wells's insight:

The field is enterprise fraud detection. Investigating is the starting point. Adjudication is the final outcome of fraud detection and analysis.


Data (repositories such as enterprise data warehouses)  +

Technology (secure sharing across jurisdictions, automated link discovery, non-obvious relationship detection and identity resolution) are used to uncover insights which result in adjudication and closure of a complex incident investigation.

Tony Agresta's curator insight, December 3, 2013 2:48 PM

Here's another good post from Doug Wood of www.fightfinancialcrimes.com.   Advances in technology are revolutionizing how fraud investigations are being done today.