Archive | Tech Insight RSS feed for this archive

Getting Data Right

March 23, 2017

0 Comments

Brief coverage of and link to O’Reilly ebook ‘Getting Data Right’

Continue reading...

Data Science for Cyber Security? Challenges and Opportunities from FloCon 2017

January 10, 2017

0 Comments

Blogging from FloCon cyber security conference in San Diego #FloCon17 Although not a morning person by nature, the early 7 am kick-off session was quite painless as I am still jet lagged on Amsterdam time (+9 hours, making this an easy 4pm session!). While I was aware of a range of Linux-based open source tools for […]

Continue reading...

Reblog: Machine learning overview with SAS software

July 13, 2015

0 Comments

Machine learning overview with SAS software. From a SAS colleague, Longhow Lam http://5.100.228.219/#portfolio

Continue reading...

Fighting Fraud and Cyber Threats with the power of Network Analytics

February 6, 2015

0 Comments

New blog post published for Deloitte – view original post: Both fraudsters and cyber attackers take advantage of an increasingly interconnected world to infiltrate and assault financial and virtual infrastructures. Especially sophisticated electronic interactions bind people together in complex, global networks. While such networks have created new opportunities for interaction and commerce, they have also […]

Continue reading...

Reblog: How to use phone calls and network analysis to identify criminals

January 13, 2015

0 Comments

An excellent, hands-on demonstration of the power of social network analysis (SNA) via graph analytics to detect criminality from colleagues at Linkurious and a U.S.-based police detective: http://linkurio.us/how-to-use-phone-calls-and-network-analysis-to-identify-criminals/ SNA at times can seem too theoretical to stakeholders – this is an excellent example of a hands-on, engineering focused application with real practical value.  Applies Neo4J graph […]

Continue reading...

Anti money laundering (AML): the network graph analytics approach

October 10, 2014

2 Comments

The fight against fraud and AML often hits a ‘brick wall’ when encountering labyrinthian international, corporate structures. Even well-known brands such as Google and Starbucks, use controversial, though currently accepted, international structures to optimize capital flows and to reduce tax liabilities, for instance the so-called Double Irish or Dutch Sandwich. Due to this complexity, increasingly […]

Continue reading...

Manager-machine: analytics, artificial intelligence, and the uncertain future of management

October 7, 2014

11 Comments

Manager-Machine

As many traditional industrial age business functions become subject to disintermediation by automation and expert analytics systems, new industries and value propositions will need to be framed by an emerging generation of leaders.

Continue reading...

Fraud analytics: collected links

October 1, 2014

0 Comments

Recent collected posts and links to fraud detection and mitigation items: Network analytics for fraud detection & mitigation (video demostration) Part 1 video demo Part 2 video demo Semantics analytics lecture (Erasmus RSM) Demonstration of semantic analytics (video demonstration) Blog post Excuse me, do you speak fraud? Blog post Network analytics for fraud detection Blog post Network analytics: more than […]

Continue reading...

Predictive policing: the brave new age of law enforcement analytics

September 5, 2014

2 Comments

In the mid-1980’s I worked as an information analyst / data manager in a police station in a small town in New England (northeast U.S.).  It was a strange but exciting experience for a young man, chosen simply as I was identified as the local ‘computer geek’ at the town high school (a small and […]

Continue reading...

Excuse me, do you speak fraud?

August 18, 2014

7 Comments

Excuse me, do you speak fraud? Network graph analysis for fraud detection and mitigation by Scott Mongeau Executive summary Network analysis offers a new set of techniques to tackle the persistent and growing problem of complex fraud. Network analysis supplements traditional techniques by providing a mechanism to bridge investigative and analytics methods. Beyond base visualization, […]

Continue reading...