{"id":11011,"date":"2014-06-27T14:30:43","date_gmt":"2014-06-27T17:30:43","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=11011"},"modified":"2014-06-27T00:43:31","modified_gmt":"2014-06-27T03:43:31","slug":"fraud-analytics-strategies-and-methods-for-detection-and-prevention","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/fraud-analytics-strategies-and-methods-for-detection-and-prevention\/","title":{"rendered":"Fraud Analytics: Strategies and Methods for Detection and Prevention"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-11012\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/06\/fraud-analytics-strategies-and-methods-for-detection-and-prevention.jpg\" alt=\"Fraud Analytics: Strategies and Methods for Detection and Prevention\" width=\"145\" height=\"217\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/06\/fraud-analytics-strategies-and-methods-for-detection-and-prevention.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/06\/fraud-analytics-strategies-and-methods-for-detection-and-prevention-100x150.jpg 100w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Delena D. Spann<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Editor Wiley<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> Fraud Analytics thoroughly reveals the elements of analysis that are used in today&#8217;s fraud examinations, fraud investigations, and financial crime investigations. This valuable resource reviews the types of analysis that should be considered prior to beginning an investigation and explains how to optimally use data mining techniques to detect fraud. Packed with examples and sample cases illustrating pertinent concepts in practice, this book also explores the two major data analytics providers: ACL and IDEA.<\/p>\n<ul>\n<li>Looks at elements of analysis used in today&#8217;s fraud examinations;<\/li>\n<li>Reveals how to use data mining (fraud analytic) techniques to detect fraud;<\/li>\n<li>Examines ACL and IDEA as indispensable tools for fraud detection;<\/li>\n<li>Includes an abundance of sample cases and examples.<\/li>\n<\/ul>\n<p>Written by Delena D Spann, Board of Regent (Emeritus) for the Association of Certified Fraud Examiners (ACFE), who currently serves as Advisory Board Member of the Association of Certified Fraud Examiners, Board Member of the Education Task Force of the Association of Certified Anti-Money Laundering Specialists ASIS International (Economic Crime Council) and Advisory Board Member of the Robert Morris University (School of Business), Fraud Analytics equips you with authoritative fraud analysis techniques you can put to use right away.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Delena D. Spann Editor Wiley Descripci\u00f3n: Fraud Analytics thoroughly reveals the elements of analysis that are used in today&#8217;s fraud examinations, fraud investigations, and financial crime investigations. This valuable resource reviews the types of analysis that should be considered prior to beginning an investigation and explains how to optimally use data mining techniques to detect fraud. Packed with examples and sample cases illustrating pertinent concepts in practice, this book also&hellip; <\/p>\n","protected":false},"author":3,"featured_media":11012,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,15,6,19],"tags":[],"class_list":["post-11011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-fraude-e-investigacao","category-livros","category-risco-e-perdas"],"views":420,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/11011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=11011"}],"version-history":[{"count":2,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/11011\/revisions"}],"predecessor-version":[{"id":11014,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/11011\/revisions\/11014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/11012"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=11011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=11011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=11011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}