{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:05:22Z","timestamp":1729649122158,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/issa.2017.8251773","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T23:33:18Z","timestamp":1515713598000},"page":"40-47","source":"Crossref","is-referenced-by-count":7,"title":["Big data science for predicting insurance claims fraud"],"prefix":"10.1109","author":[{"given":"David","family":"Kenyon","sequence":"first","affiliation":[]},{"given":"J.H.P","family":"Eloff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/583890.583893"},{"journal-title":"Enterprise Architecture White Paper","article-title":"Improving insurer performance with big data","year":"2016","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2011.05.005"},{"key":"ref31","first-page":"252","article-title":"A comparison and analysis of name matching algorithms","volume":"4","author":"snae","year":"2007","journal-title":"International journal of applied science engineering and technology"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3163\/1536-5050.101.3.020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA-ECSA.212.32"},{"key":"ref36","first-page":"2","article-title":"Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing","author":"zaharia","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"journal-title":"A framework for the future","year":"0","key":"ref35"},{"key":"ref34","article-title":"Managing legacy system costs: A case study of a meta-assessment model to identify solutions in a large financial services company","author":"crotty","year":"2016","journal-title":"Applied Computing and Informatics"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2362522"},{"key":"ref27","first-page":"297","article-title":"An attackers view of distance preserving maps for privacy preserving data mining","author":"liu","year":"2006","journal-title":"European Conference on Principles of Data Mining and Knowledge Discovery"},{"key":"ref29","first-page":"250","article-title":"A study on weka tool for data preprocessing, classification and clustering","volume":"2","author":"singhal","year":"2013","journal-title":"International Journal of Innovative Technology and Exploring Engineering (IJITEE)"},{"key":"ref2","first-page":"11","article-title":"The RDR paradox: practice management","volume":"6","author":"tomlinson","year":"2015","journal-title":"MoneyMar-keting"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4314\/saaj.v13i1.3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2016.7603443"},{"journal-title":"Sharing and analyzing data to reduce insurance fraud","year":"2015","author":"power","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2016.12.002"},{"key":"ref24","first-page":"4393","article-title":"A fraud resilient medical insurance claim system","author":"shi","year":"2016","journal-title":"AAAI"},{"journal-title":"Big Data A Revolution That Will Transform How We Live Work and Think","year":"2013","author":"mayer-sch\u00f6nberger","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0006-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/2047-2501-2-3"},{"journal-title":"File system shell","year":"0","author":"hadoop","key":"ref50"},{"journal-title":"Analytics data mining data science software\/tools used in the past 12 months","year":"2015","author":"kdnuggets","key":"ref51"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2005010106"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.03.013"},{"year":"0","author":"mahout","key":"ref53"},{"key":"ref52","article-title":"Started guide","author":"getting","year":"2015","journal-title":"Literature"},{"journal-title":"Insurance fraud casebook paying a premium for crime","year":"2013","author":"wells","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.22495\/rgcv5i1c1art6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347159"},{"journal-title":"IT Glossary Big Data","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/jbl.12010"},{"key":"ref14","first-page":"1","article-title":"Cyber threat landscape faced by financial and insurance industry","author":"choo","year":"2011","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"ref15","first-page":"39","article-title":"Evaluation of online resources on the implementation of the protection of personal information act in South Africa","author":"botha","year":"2015","journal-title":"Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security ICCWS 2015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.43"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.22"},{"journal-title":"A review of financial accounting fraud detection based on data mining techniques","year":"2013","author":"sharma","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27400-3_11"},{"key":"ref4","article-title":"Insurance fraud: &#x2018;its all over the place,&#x2019; and you should care about it, officials say","author":"jordon","year":"2016","journal-title":"The Omaha World Herald"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6296.2007.00106.x"},{"journal-title":"POPI-is South Africa keeping up with international trends?","year":"2014","author":"luck","key":"ref6"},{"journal-title":"Tis the season for insurance fraud Waggener Edstrom South Africa","year":"0","author":"sera","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/09603107.2013.877570"},{"journal-title":"Insurance Fraud","year":"0","author":"dictionary","key":"ref7"},{"journal-title":"The Apache Software Foundation","year":"2016","author":"sqoop","key":"ref49"},{"key":"ref9","first-page":"35","article-title":"Insurance experience and consumers' attitudes toward insurance fraud","volume":"21","author":"tennyson","year":"2002","journal-title":"Journal of Insurance Regulation"},{"year":"0","author":"hadoop","key":"ref46"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1108\/13673271211246112","article-title":"Knowledge elicitation techniques in a knowledge management context","volume":"16","author":"schiuma","year":"2012","journal-title":"Journal of Knowledge Management"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2595630"},{"year":"0","author":"hive","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2013.6615467"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2004.1297040"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2460296.2460327"},{"key":"ref43","first-page":"1","article-title":"Predictive analytics","volume":"1","author":"eckerson","year":"2007","journal-title":"Extending the Value of Your Data Warehousing Investment TDWI Best Practices Report"}],"event":{"name":"2017 Information Security for South Africa (ISSA)","start":{"date-parts":[[2017,8,16]]},"location":"Johannesburg","end":{"date-parts":[[2017,8,17]]}},"container-title":["2017 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8240063\/8251762\/08251773.pdf?arnumber=8251773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T08:22:49Z","timestamp":1570609369000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8251773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/issa.2017.8251773","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}