Processing math: 100%
+ - 0:00:00
Notes for current slide
Notes for next slide

An End-to-end Project-based Approach to Teaching Data Mining Process

A Case Study in Credit Card Fraud Detection

Cheng Peng

West Chester University of Pennsylvania

05/14/2022
Presented at

eCOTS 2022: Teaching Data Mining

Slides available at: https://rpubs.com/cpeng/eCOTS2022 AND https://pengdsci.github.io/eCOTS2022/

1 / 33

Agenda

Learning from Learning Theories

  • Learning Theories

  • Pedagogical Strategies

Case-study: Credit Card Fraud Mining

  • Fraud Background

  • Analytic View of Fraud and Challenges

  • Feature Extraction

  • Analytic Fraud Identification Methods and Assessment

  • Deployment and Automation

2 / 33

Learning from Learning Theories

3 / 33

Teaching DM Process vs Techniques

Cross-Industry Standard Process for Data Mining (CRISP-DM)

Source: https://blogs.sap.com/2018/08/28/sap-machine-learning-approaching-your-project/
4 / 33

Learning from Learning Theories

There are many learning theories. They all fall under the three major theories.

  • Behaviorism Learning Theory: knowledge is independent and on the exterior of the learner. It focuses on the outside environment’s influences on learning.

  • Cognitive Learning Theory: processing information received rather than just responding to a stimulus as in behaviorism learning theory. It uses metacognition - “thinking about thinking”—to understand how thought processes influence learning .

  • Constructivism Learning Theory: constructing learning new ideas based on the prior knowledge and experiences through active engagement with the world (such as experiments or real-world problem solving)

5 / 33

Some Principles of Constructivism Theory

I am a firm believer in constructivism learning theory.

  • Knowledge is constructed. This is the basic principle, meaning that knowledge is built upon the foundation of previous learning.

  • Learning is a social activity. Learning is something we do together, in interaction with each other, rather than an abstract concept.

  • There is no knowledge independent of the meaning attributed to experience (constructed) by the learner, or community of learners.

  • Learning is contextual: we do not learn isolated facts and theories that are separated from the rest of our lives.

  • Motivation is key to learning. Cognitive motivation is rooted in the availability of information and past experience/ prior knowledge.

6 / 33

My Adopted Pedagogies in Teaching Analytics

  • Providing experience with the knowledge construction process - students determine how they will learn.

  • Providing experience in and appreciation for multiple perspectives - evaluation of alternative solutions.

  • Embedding learning in realistic contexts - authentic tasks.

  • Embedding learning in social experience – collaborative learning.

  • Encourage awareness of the knowledge construction process - reflection, metacognition.

  • Facilitate students to make sense of information presently available and in determining how to respond or relate to the current situation.

7 / 33

Case Study

Credit Card Fraud Detection

8 / 33

Adapted CRISP-DM for Fraud Mining Process

  • Data Preparation - thinking of automation in the phase.

  • Modeling - train / retrain models and algorithms according to the change in the fraud dynamics.

9 / 33

Credit Card Transaction Process

Source: https://business.chase.com/resources/start/a-crash-course-on-taking-the-mystery-out-of-payments
10 / 33

What is Credit Card Fraud?

Credit card fraud is a form of identity theft that involves an unauthorized taking of another’s credit card information for the purpose of charging purchases to the account or removing funds from it.

Credit Card Fraud Types: Credit card fraud schemes generally fall into one of two categories of fraud: application fraud and account takeover.

Why Combat Credit Fraud Loss: Card fraud over the next decade will cost the industry a collective $408.50 billion in losses globally, according to an annual report from the industry research firm Nilson Report.

11 / 33

Fraud Data Generation Process & Availability

Pre-authorization: timestamp, geo-info of POS, Card information (card number, expiration date, billing address, security code)

Authorization: Pre-auth info + requested payment amount

Authentication: the issuing bank will

  • verify the authorization information sent from the processor: validating card info and checking the availability of funds (credit line); and

  • send the result of the authentication to the merchant: approval or denial.

  • The merchant will send the complete transaction information to the issuing bank or the processor.

12 / 33

Fraud Data Generation Process: A General Fraud Management System

13 / 33

Availability and Types of Data

Based on credit card processing and the general fraud detection system, The following information is available in different processing stages:

  • Pre-authorization Data

    • geo-information of point of sale (POS)
    • time-stamp.
    • card information.
  • Authorization and Authentication Data

    • pre-auth information
    • payment information
  • Historical Data

    • complete transaction information.
    • confirmed fraud (labels).
    • account information, etc.
  • Other Publicly Data: crime rate, etc.

14 / 33

Data Preparation - Collection

Goal: detect/identify fraudulent transactions.

Challenges:

  • No information about fraudsters!

  • Real-time detection.

  • the rarity of fraud.

What information is relevant?

  • Current transaction: card info, timestamp, amount, POS info.

  • Historical transactions: timestamp, amount, POS info, fraud labels.

  • Account information: Card holder’s info.

  • Derived merchant site info (including publicly available info).

15 / 33

Creating Analytic Data According to Potential Analytic Methods

  • Key Point: Fraudulent activity alters genuine customers’ spending patterns!

  • Cross-sectional Data: current transactions.

  • Longitudinal /Panel Data: current and historical transactions

  • Hybrid Cross-sectional and Longitudinal Data: both current transactions and aggregated information of historical transactions

16 / 33

Types of Candidate Models/Algorithms

  • Business rules (expert system).

  • Supervised classification models/algorithms

    • handling the issue of the rarity of fraudulent transactions.
    • using fraud labels to train .
    • fraud index as a predictor variable.
    • rare event logistic models.
    • penalized tree-based classification models/algorithms.
  • Unsupervised anomaly detection methods

    • using the distribution of fraud index to detect fraud: high quantile along with operational constraints.
    • no need for handling imbalanced issues (fraud labels are not used)
  • Other probabilistic models/algorithms such as HMM.

17 / 33

Fraud Index Based on Historical Transactions

How fraudulent activities alter genuine customers’ spending patterns.

Modified from: https://neo4j.com/blog/fraud-prevention-neo4j-5-minute-overview/
  • The transaction dollar amount is significantly different from that of genuine customers.

  • The genuine customers spending frequency will be changed.

  • The genuine customers’ transaction gap times (time between consecutive transactions) will be changed.

18 / 33

What is Process Capability Index (PCI)?

Process capability compares the output of an in-control process to the specification limits by using capability indices.

  • If the PCI of a process is under a threshold, the process is incapable.
  • There are different PCIs for different processes.
  • USL and LSL need to be estimated from a portion of data.
19 / 33

A Numerical Example

Data Layout, Candidate Models, and Algorithms

20 / 33

The “Capability” of Customers’ Spending Process – Fraud Index

Illustration: Defining a fraud index using historical payment dollar amounts.

21 / 33

Pre-processed Data (Long Table)

22 / 33

Data Matrix

23 / 33

A PCI-like Fraud Index Using Payment Amount

idx=(USLμ)29(maxμ)2+(Tμ)2

USL, T: Estimated from the larger data.

max, μ: Estimated from the smaller data.

Sample sizes of both data sets are tuning parameters

24 / 33

How Fraud Index Works in Fraud Detection

25 / 33

Distribution of Resulting Fraud Index

  • The above figure indicates that the fraud index can be used as a standalone fraud detection algorithm with no structural parameters - an unsupervised anomaly detection.
26 / 33

Performance Analysis

  • Consideration of multivariate fraud index to incorporate gap time and spending frequency to boost the discriminatory power of the index.
27 / 33

Supervised Algorithms and Models

The fraud index will be used as a feature variable.

Models and algorithms need to account for imbalance labels.

  • Firth penalized logit models.

  • King and Zeng's rare event logistic model.

  • Qing's semi-parametric logistic model.

  • penalized tree-based algorithm (including BAGGING. RF is not an option for this particular case).

  • regular logit models based on over-/under sampled data.

  • asymmetric-link GLMs.

28 / 33

Deployment / Monitoring and Updating

29 / 33

Deployment Workflow & Improvement

  • Deploying algorithms and models is only a component of the DM process.

  • The Champion/challenger scheme in the real world DM systems.

  • Continuous updating models/algorithms - retraining/retesting

  • Importance of automation in the DM process.

30 / 33

Learning by Doing!

31 / 33

Student's Project Ideas

There are many moving parts in the definition of the fraud index and the ways of using it. Even with the same data, students can build their projects using the combination of the following

  • Methods of estimating USL and LSL

  • One-sided fraud indexes?

  • parametric and parametric indexes?

  • Supervise methods using both labels and index

    • statistical models

    • machine learning algorithms

  • Index as a standalone algorithm - high quantile decision boundary

    • parametric distribution of the indexes

    • non-parametric distribution of the indexes

32 / 33

Thanks!

Slides created via the R package xaringan.

33 / 33

Agenda

Learning from Learning Theories

  • Learning Theories

  • Pedagogical Strategies

Case-study: Credit Card Fraud Mining

  • Fraud Background

  • Analytic View of Fraud and Challenges

  • Feature Extraction

  • Analytic Fraud Identification Methods and Assessment

  • Deployment and Automation

2 / 33
Paused

Help

Keyboard shortcuts

, , Pg Up, k Go to previous slide
, , Pg Dn, Space, j Go to next slide
Home Go to first slide
End Go to last slide
Number + Return Go to specific slide
b / m / f Toggle blackout / mirrored / fullscreen mode
c Clone slideshow
p Toggle presenter mode
t Restart the presentation timer
?, h Toggle this help
Esc Back to slideshow