Top Banner
Analytics Application: Risk Management
27

Analytics Application: Risk Management

Oct 23, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Analytics Application: Risk Management

Analytics Application: Risk Management

Page 2: Analytics Application: Risk Management

Outline

• Defining Risk Management

• Types of Risk

• Applications of Analytics in Risk Management➢Financial Risk➢Operational Risk

Page 3: Analytics Application: Risk Management

Risk is…

Potential of gaining orlosing something ofvalue

Due to a potential,uncontrollable outcome

Source: https://en.wikipedia.org/wiki/Risk

Page 4: Analytics Application: Risk Management

What is Risk Management?

Risk Identification

Risk Measurement

Risk Mitigation

Risk Monitoring

Page 5: Analytics Application: Risk Management

Types of Risk

Source: http://smallbusiness.chron.com/types-business-risk-99.html

Strategic Risk Compliance Risk Financial Risk

Operational Risk Reputational Risk

Page 6: Analytics Application: Risk Management

Types of Risk

Source: http://smallbusiness.chron.com/types-business-risk-99.html

Strategic Risk Compliance Risk Financial Risk

Operational Risk Reputational Risk

Page 7: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Correlation / Concentration of Risks

Association Analysis

• Related Counterparty Exposure

• Cross-default Exposure

• Industry Exposure

Page 8: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Correlation / Concentration of Risks

Association Analysis

• Related Counterparty Exposure

• Cross-default Exposure

• Industry Exposure

Complex Risk Events

• Path Analysis

• SequenceAnalysis

• Path to default

• Path to Collection

• Path to Incidents

• Path to Fraud

• Path to Market Loss

• Path to Liquidity Loss

Page 9: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Propensity Models

Logistic Regression

• Acquisition Scoring

• Behavioral Scoring

• Recovery Scoring

Fraud Scoring

Page 10: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Propensity Models

Logistic Regression

• Acquisition Scoring

• Behavioral Scoring

• Recovery Scoring

Fraud Scoring

Classification / Rule Models

• Decision Trees

• Random Forests

• Credit Policy Rules

• Fraud Policy Rules

• Audit Rules

Trading Rules

Page 11: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Forecasting • Time series Regression

• Panel models

• Volatilitymodels

• Provisions Forecasts

• Credit riskcapital

OperationalRisk Capital

• Market Risk Capital

• Liquidity Risk Capital

Page 12: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Forecasting • Time series Regression

• Panel models

• Volatilitymodels

• Provisions Forecasts

• Credit riskcapital

OperationalRisk Capital

• Market Risk Capital

• Liquidity Risk Capital

Stress Testing • Monte Carlo Simulation

• Time-series Regression

Credit Value-at-Risk

Operations Value-at-Risk

Market Value-at-Risk

Page 13: Analytics Application: Risk Management

Analytics in Risk ManagementAnalytics Algorithm CREDIT OPERATIONS MARKET /

LIQUIDITYCOMPLIANCE

Forecasting • Time series Regression

• Panel models

• Volatilitymodels

• Provisions Forecasts

• Credit riskcapital

OperationalRisk Capital

• Market Risk Capital

• Liquidity Risk Capital

Stress Testing • Monte Carlo Simulation

• Time-series Regression

Credit Value-at-Risk

Operations Value-at-Risk

Market Value-at-Risk

Document Analysis

• TopicModels

• TF-IDF

Legal Document Classification / Compliance

Page 14: Analytics Application: Risk Management

Outline

• Defining Risk Management

• Types of Risk

• Applications of Analytics in Risk Management➢Financial Risk➢Operational Risk➢Compliance Risk

Page 15: Analytics Application: Risk Management

Analytics Application: Fraud Management

Page 16: Analytics Application: Risk Management

Outline

• Defining Fraud Detection

• List of Fraud Categories and Types

• Fraud Risk Management

• Survey of Techniques in Anomaly Detection

Page 17: Analytics Application: Risk Management

Fraud is…

ncommon

mperceptibly concealed

ell-considered

ime-evolving

arefully organized

Source: Van Vlasselaer, V., Eliassi-Radj, T., Akoglu, L., Snoeck, M., & Baesens, B. (2015). Gotcha! Network-based Fraud Detection for Social Security Fraud. Management Science, Submitted.

Page 18: Analytics Application: Risk Management

Fraud Types

• Credit Card Fraud

• Insurance Fraud

• Corruption

• Counterfeit

• Product Warranty Fraud

• Healthcare Fraud

• Telecommunications Fraud

• Money Laundering

• Click Fraud

• Identity Theft

• Tax Evasion

• Click Fraud

• Plagiarism

Page 19: Analytics Application: Risk Management

Fraud Management

Fraud Prevention

Fraud Detection

Fraud Response

Refers to measures that can be taken to

avoid or reduce fraud

Ability to recognize or discover fraud

Corrective actions taken in the event of a fraud

to minimize and recover losses and determine

accountabilities

Page 20: Analytics Application: Risk Management

Anomaly Detection

Page 21: Analytics Application: Risk Management

Anomaly Detection TechniquesDESCRIPTIVE

• Graphical Procedures

Box and Whisker Plot

Source: https://www.tibco.com/blog/2017/10/09/top-10-methods-for-outlier-detection-in-spotfire/

Histogram Scatterplot

Page 22: Analytics Application: Risk Management

Anomaly Detection TechniquesDESCRIPTIVE

• Statistical Techniques

z-scores Hypothesis Testing(Break Point and Peer

Analysis)

Association Analysis(Fraud Ring Detection)

Source: Baesens, B., Van Vlasselaer, V., & Verbeke, W. (2015). Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for FraudDetection. John Wiley & Sons, Inc.

Page 23: Analytics Application: Risk Management

Anomaly Detection TechniquesDESCRIPTIVE

• Clustering-based Methods

Source: Baesens, B., Van Vlasselaer, V., & Verbeke, W. (2015). Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for FraudDetection. John Wiley & Sons, Inc.

Statistical Clustering Analysis Self-organizing Maps

Page 24: Analytics Application: Risk Management

Anomaly Detection TechniquesDESCRIPTIVE

• Social Network Analysis

Source: https://resources.zaloni.com/blog/mitigating-detecting-financial-fraud-with-social-network-analysis-and-graph-database

Page 25: Analytics Application: Risk Management

Anomaly Detection TechniquesPREDICTIVE

Predicting Fraud Cases

• Logistic Regression

• Decision Trees

• Support Vector Machines

• Neural Networks

Source: Baesens, B., Van Vlasselaer, V., & Verbeke, W. (2015). Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for FraudDetection. John Wiley & Sons, Inc.

Page 26: Analytics Application: Risk Management

Anomaly Detection TechniquesPREDICTIVE

Predicting Amount of Fraud

• Regression

Source: Baesens, B., Van Vlasselaer, V., & Verbeke, W. (2015). Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for FraudDetection. John Wiley & Sons, Inc.

Linear Regression Nonlinear Regression Principal Components Regression

Page 27: Analytics Application: Risk Management

MindMap: Fraud Management