1919 Img SYTR09 Fraud Management Eng
1919 Img SYTR09 Fraud Management Eng
1919 Img SYTR09 Fraud Management Eng
Focusing both on processes and systems, Reply provides innovative solutions for
Fraud Management based on Business Rules Management Systems (BRMS). With a
BRMS-based approach, organizations can analyze their own data in order to
prevent and fight against fraud, ensuring the business profitability. Through in-
depth knowledge of Telco&Media processes combined with system design
competence, Reply helps organizations to achieve a faster return on investment.
FRAUD
Fraud is an intentional deception made for personal gain in order to obtain
unauthorized benefits (money, property, etc.); examples of frauds are the use of
services without paying the due amount, the appropriation of money through the
improper use of means of payment, etc.
© Reply
www.reply.eu
2 FRAUD MANAGEMENT. HOW TO DETECT FRAUDS AND ACT AGAINST THEM BEFORE THEY OCCUR
IDENTITY THEFT
Quick and continuous market changes and technology developments provide people
intending to commit Fraud with new scenarios and methods. This is a consequence of
the increasing use of Information Technology tools (Internet and PC) which do not
require people to reveal the identity or to be physically present in order to be
identified. The new Information Technology tools can be used provided users have
valid credentials; if, however, these credentials are not adequately protected, they can
be stolen and used by other users.
A survey on 50 different countries considering 4000 companies has shown that the
number of companies which have become victims of fraud in Western Europe has
increased by 5% from 2001 to 2003 reaching 34% in 2005, while this number has
increased by 11% reaching 37% in Central and Eastern Europe.
Italy is severely damaged by fraud and from recent studies (carried out in 2004) it
results that Italy - unfortunately - holds the second place in Europe after Great Britain,
as for fraud practices committed using false or stolen credentials.
Identity Fraud is commonly known as “Identity Theft”.
IMAGE LOSS
The substantial increase of online credit card transactions or online bank transactions
has resulted in a huge increase of fraudulent practices. In the Telco & Media Market,
the value of losses due to Identity Theft is often identified with the value of physical or
hardware devices, but image losses are often greater.
Economic advantages resulting from the adoption of a fraud management solution are
linked to the economic loss reduction associated with the use of services by customers
not entitled to or related to either identity theft or, in general, to illegal practices.
3 FRAUD MANAGEMENT. HOW TO DETECT FRAUDS AND ACT AGAINST THEM BEFORE THEY OCCUR
Although not directly linked to loss reduction, other advantages result from the
adoption of a fraud management solution:
PROCESS SYNERGY
The ideal approach shall involve the whole company and its processes in order to
provide the key solution defining the Fraud Management Solution.
Risk assessment for potential clients Identify and act against a Analysis and cross-matching of data
and assessment of commercial in order to identify new scenarios
potential fraudulent behavior. and methods of carrying out Frauds
actions to be carried out
All the actions related to the Risk
Fraud operations This section (process) is never
Management area and useful (as provided, even though it is a very
input) for Fraud Management useful element in Fraud
activities Management
The functional model for the definition of an anti-fraud solution is based on three
different components:
4 FRAUD MANAGEMENT. HOW TO DETECT FRAUDS AND ACT AGAINST THEM BEFORE THEY OCCUR
• Prevention: It includes all the components of the key value such as the
customer identity, the creation and delivery of the service, new IT applications
and technologies, new operations and business processes, adequate SLAs
• Detection and management: It includes decision-making and back-office
processes
• Analysis and investigation: It includes KPIs and data analyses
In general, the first solution adopted is Data Mining. The analysis to be carried out on
company data will for sure be time-intensive and complex and require a serious
computational ability in order to identify appropriate statistical models for the
definition of the prevention rules based on data analysis. A data mining technology
enables to collect, analyze and prevent different fraudulent practices. Data mining
techniques are based on the analysis and investigation of a huge database in order to
define models and rules.
BUSINESS RULE
Intelligence
Stand.
Intellig.
Case Timely solve reports
Other Generator
Sources
Quick actions
Fraud
Case Back Office Detailed Reporting
Assignm.
Analysis Support
BPM
The business rules are expressions resulting from policies, rules and procedures which
are included in the system (ILOG source, Inc.). The Functional architecture of the
figure is based on the Ilog BRMS.
Sytel Reply is the company of the Reply Group specialized in the Telco Market. Sytel
Reply’s mission is to support telecommunications operators in the technology and
application innovation by designing, deploying and managing systems addressed to the
BSS and OSS areas.
Leveraging its expertise and competence, Sytel Reply deploys a team of professionals
able to support customers in each phase of the project: system design, requirements
analysis, software development and go-live.
Sytel Reply
www.reply.eu