11:24 AM
Connect Directly

Fraud Management In The Age Of Big Data

Big data can help financial firms uncover fraud, sometimes even before it happens.

A recent WSJ Article highlights advances made in the area of fraud detection and management at Visa by using Big Data techniques. The company estimates that their models have helped identify at least $2 billion worth of annual fraud, and have also given it the chance to address those vulnerabilities before that money was lost.

Financial services companies with operations spanning retail banking and credit cards must not only implement highly sophisticated and automated business operations but also must ensure that their business activities are transparent to business process owners, auditors and others.

In addition to managing new sources and more streams of data, they also face new regulations that create a greater need for compliance. Their IT leadership teams are pressured to not only support evolving business requirements, but the also must improve efficiency and manageability, contain costs and speed products to market -- all while ensuring security.

Let us consider the fictional but highly representative example of such a firm drowning in big data -- unable to effectively store, manage and best direct the data onslaught. They know that, when utilized effectively, data can be one of the company’s most important assets. Data not properly managed can quickly become a liability and cost.

For example, here is a model reference architecture from an end to end infrastructure and application re-architecture for an organization that is considering a Big Data initiative in the area of fraud detection and prevention.

Business Challenge

The Federal Reserve defines credit card fraud as "Unauthorized account activity by a person for which the account was not intended. Operationally, this is an event for which action can be taken to stop the abuse in progress and incorporate risk management practices to protect against similar actions in the future."

Accordingly the various categories of credit card fraud include - application fraud, lost or stolen credit cards, counterfeit cards, and account takeovers.

Business Requirements

1. Integrate & cleanse data to get complete view of any transaction that could signal potential fraud
2. Predict cardholder behavior to provide better customer service
3. Help target customer transactions for personalized communications on transactions that raise security flags
4. Deliver them the ways your customers want -- web, text, email and mail
5. Track these events end to end from a strategic perspective
6. Help provide a complete picture of high value customers to help drive loyalty programs

Design and Architecture

The architecture needs to consider two broad data paradigms -- data in motion and data at rest.

Data in motion is defined as streaming data that is being sent into an information architecture in real time. Examples of data in motion include credit card swipes, e-commerce tickets, web-based interactions and social media feeds that are a result of purchases or feedback about services. The challenge in this area is to assimilate a huge volume of data and filter it, gather reason from it and to send it to downstream systems such as a business process management (BPM). Managing the event data to make sure changing business rules/regulations are consistently integrated with the data is another key facet in this area.

Data at rest is defined as data that has been collected and ingested in a form that conforms to enterprise data architecture and governance specifications. This data needs to be assimilated or federated with pre-existing sources so that the business can query it in a read/write manner from a strategic and long-term perspective.

NEXT: Reference Architecture

As Chief Architect of Red Hat's Financial Services Vertical, Vamsi Chemitiganti is responsible for driving Red Hat's technology vision from a client standpoint. The breadth of these areas range from Platform, Middleware, Storage to Big Data and Cloud (IaaS and PaaS). The ... View Full Bio
1 of 2
Comment  | 
Print  | 
More Insights
More Commentary
Interactive Data Launches Continuous Fixed Income Pricing Service
Independent intra-day FI pricing is helping to shine light on the opaque fixed income market.
Gartner: 75% of Mobile Apps Will Fail Security Tests Through 2015
The rise of BYOD means enterprises must implement security testing and containment solutions, according to new Gartner research.
Chip & Pain, EMV Will Not Solve Payment Card Fraud
Switching to EMV cards will lower retail fraud, but it's not enough. Here's the good, the bad, and the ugly.
With UCITS V, $9T Isnít as Easy as It Used to Be
With UCITS V's restrictive remuneration rules and hidden costs, going global may get a little less attractive.
Banks to Increase IT Spend on Big Data Challenges, Finds Aite Report
Big data has presented the greatest challenges and dissatisfaction for banks, yet it is the most likely to see upward spending in the next two years.
Register for Wall Street & Technology Newsletters
White Papers
Current Issue
Wall Street & Technology - July 2014
In addition to regular audits, the SEC will start to scrutinize the cyber-security preparedness of market participants.