11:24 AM
Connect Directly

Fraud Management In The Age Of Big Data

Big data can help financial firms uncover fraud, sometimes even before it happens.

A recent WSJ Article highlights advances made in the area of fraud detection and management at Visa by using Big Data techniques. The company estimates that their models have helped identify at least $2 billion worth of annual fraud, and have also given it the chance to address those vulnerabilities before that money was lost.

Financial services companies with operations spanning retail banking and credit cards must not only implement highly sophisticated and automated business operations but also must ensure that their business activities are transparent to business process owners, auditors and others.

In addition to managing new sources and more streams of data, they also face new regulations that create a greater need for compliance. Their IT leadership teams are pressured to not only support evolving business requirements, but the also must improve efficiency and manageability, contain costs and speed products to market -- all while ensuring security.

Let us consider the fictional but highly representative example of such a firm drowning in big data -- unable to effectively store, manage and best direct the data onslaught. They know that, when utilized effectively, data can be one of the company’s most important assets. Data not properly managed can quickly become a liability and cost.

For example, here is a model reference architecture from an end to end infrastructure and application re-architecture for an organization that is considering a Big Data initiative in the area of fraud detection and prevention.

Business Challenge

The Federal Reserve defines credit card fraud as "Unauthorized account activity by a person for which the account was not intended. Operationally, this is an event for which action can be taken to stop the abuse in progress and incorporate risk management practices to protect against similar actions in the future."

Accordingly the various categories of credit card fraud include - application fraud, lost or stolen credit cards, counterfeit cards, and account takeovers.

Business Requirements

1. Integrate & cleanse data to get complete view of any transaction that could signal potential fraud
2. Predict cardholder behavior to provide better customer service
3. Help target customer transactions for personalized communications on transactions that raise security flags
4. Deliver them the ways your customers want -- web, text, email and mail
5. Track these events end to end from a strategic perspective
6. Help provide a complete picture of high value customers to help drive loyalty programs

Design and Architecture

The architecture needs to consider two broad data paradigms -- data in motion and data at rest.

Data in motion is defined as streaming data that is being sent into an information architecture in real time. Examples of data in motion include credit card swipes, e-commerce tickets, web-based interactions and social media feeds that are a result of purchases or feedback about services. The challenge in this area is to assimilate a huge volume of data and filter it, gather reason from it and to send it to downstream systems such as a business process management (BPM). Managing the event data to make sure changing business rules/regulations are consistently integrated with the data is another key facet in this area.

Data at rest is defined as data that has been collected and ingested in a form that conforms to enterprise data architecture and governance specifications. This data needs to be assimilated or federated with pre-existing sources so that the business can query it in a read/write manner from a strategic and long-term perspective.

NEXT: Reference Architecture

As Chief Architect of Red Hat's Financial Services Vertical, Vamsi Chemitiganti is responsible for driving Red Hat's technology vision from a client standpoint. The breadth of these areas range from Platform, Middleware, Storage to Big Data and Cloud (IaaS and PaaS). The ... View Full Bio
1 of 2
Comment  | 
Print  | 
More Insights
More Commentary
One Size Fits Nobody in End User Services
How building profiles from employees' roles and behaviors can help optimize your end user services.
'Enlightened' Non-IT Execs More Likely To Run Secure Organization
Do senior executives understand their role in data security? On the whole, unsurprisingly, no.
No Screwups, Please, We’re Banks
Changing a bank's culture is not going to happen overnight, but having the right tools and levers in house will surely make a big difference over time.
You’re Doing BYOD Wrong: These Numbers Prove It
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place.
Citibank Brazil Deploys Award-Winning BPM Solution: Now What?
Citibank Brazil automated commercial customer onboarding and reduced cycle time by 70%. But how can a global organization harness the successes of its islands of solutions?
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - Elite 8, October 2014
The in-depth profiles of this year's Elite 8 honorees focus on leadership, talent recruitment, big data, analytics, mobile, and more.