3 paragraphs and 3 references per discussion
Answer this question
Discuss the current trends in data analysis techniques and how effective you think this analysis is in preventing or detecting fraud related to matrimonial fraud cases. Include in your discussion, topics such as data mining, trend analysis, and digital forensics. Then apply one of these techniques to a specific example of a situation where this technique could be used to detected fraud related a specific matrimonial fraud situations such as the division of assets, child support, etc. Be sure to support your conclusions with authoritative sources (including peer reviewed articles from the library, Fraud Examiners Manual, etc).
Comment this post (SK)
Data analytics typically refers to the use of analytics software to identify trends, patterns, anomalies, and exceptions in data. In recent years, organizations have increasingly adopted data analytics techniques and approaches to assist in fraud prevention and detection. (“ANTI-FRAUD TECHNOLOGY Benchmarking Report” (p14))
It gives a comprehensive overview of fraud detection analytical techniques and provides implementation guidance for an effective fraud prevention solution for earlier fraud detection. Data analytic technique analyzes data in order to find red flags and control gaps that might indicate the potential for misconduct. Examples of data analytic techniques include Emotional tone/sentiment analysis, Artificial intelligence/machine learning, Geographic data mapping, Text mining, Link analysis/social network analysis, Predictive analytics/modeling, Data visualization, Automated red flags/business rules, Exception reporting/anomaly detection. (“ANTI-FRAUD TECHNOLOGY Benchmarking Report” (p14))
In addition to data analytics, numerous other types of technologies can be used to improve an organization’s ability to effectively and efficiently combat fraud. The most common of these technologies currently being used to fight fraud is biometrics (e.g., fingerprint, facial, or keystroke recognition). Others are blockchain/ distributed ledger technology and robotics. Robotic process automation is currently used less frequently than biometrics
In our case study, both spouses will provide declarations about their respective bank accounts, business interests, and expenses. A spouse may wish to undervalue their holdings to reduce the amount of child support. Delpo, K. (2017) In this case data mining tools can be used to discover a pattern in these financial records and fraud propensity scores can be calculated. The predictive modeling technique can analyze the bank and credit card statements of the individual and can reveal the spending pattern, sources of income pattern, and if there is a probability of any hidden assets and incomes in the marriage. Geeta, V. Sivalyothi, P. & Rao, T. ( p.1-5.2015)
Answer this question
Discuss the differences you see between a fraud examiner and law enforcement as it relates to digital forensic investigations. Do you think both the fraud examiner and law enforcement should have the same rights, processes and procedures? Be sure to use authoritative sources (including peer reviewed articles from the library, Fraud Examiners Manual, etc) to back up your opinion.
The fraud examiner and law enforcement have differences in the ways of investigations including digital forensic investigations. The main, reason as I see, is what industry the investigator represents. If law enforcement is working for the government, the fraud examiner can work for the government as well as for private industry. Law enforcement has more authority, especially in criminal cases. In forensic investigations where devices should be seized, law enforcement often has a warrant to do so. The fraud investigator, before conducting the seizure, should consult with legal counsel regarding the law pertaining to the seizure.
The fraud examiner working in the private industry can be flexible in planning and conducting the investigation. To perform his investigation, the fraud examiner can access the assigned computer remotely, even if he is physically based on site. “Examiners can be located anywhere they are able to connect securely into the forensic network” (Johnston, 2011, para. 28). Law enforcement officers often “depend on their personal network of contacts when attempting to conduct investigations that may cross into other jurisdictions” (Flory, 2016, para. 23). Moreover, not every jurisdiction has digital forensic investigators. According to this, fraud examiner has an advantage in the performance of the investigations despite jurisdictions.
The fraud examiner specialized in digital forensic investigations can be invited by law enforcement as a third party for consulting. That means fraud examiners are more knowledgeable and maintain their knowledge with training, experience and continued educations, while law enforcement can be dependent on supervisor decisions, work schedules, and resources. However, I think that both, the fraud examiner and law enforcement, should have the same processes and procedures regarding the digital forensic investigation. I would probably skip “the same right” because law enforcement might have more rights due to their authority. The same procedures and processes will be helping to successful collaboration and improving techniques and methods to combat such fraud. This fraud does not have borders or limits. The fraudsters can commit this type of fraud remotely around the world. And procedures have to be not only the same for the fraud investigator and law enforcement but internationally recognized. “This (digital) is a forensic process and must be subject to the same standards as other forensic processes” (Lallie & Pimlott, 2012, para. 47).