LITERATURE REVIEW Fraud in insurance companies According to Verma and Mani (2002), analytics can help accompany business technologies in the era of social networks, of Big Data and CRM to repress financial criminals. Verma and Mani (2002) highlighted that the growing number of mobile devices and social media platforms are bringing significant transformations in the business world, including the insurance sector. The opportunities this landscape presents for insurers are vast. The myriad of social networks and communities allow insurers to connect with their customers more efficiently, which in turn contributes to brand equity, customer acquisition and retention. Insurance companies are also empowered through customer feedback input which can also be used for new products and pricing strategies. In addition to these opportunities, insurance companies use data analytics to detect fraud. Manually managing fraud has always been costly for insurance companies, even if one or two high-value fraud cases went undetected. In addition to this, the trend of big data (the growth of unstructured data) always leaves a lot of room for undetected fraud resulting from poor data analysis. Furthermore, as mentioned by Ruchi Verma and Sathyan Ramakrishna Mani (2002), analytics addresses these challenges and plays a crucial role in fraud detection for insurance companies. Some of the key benefits of using analytics in fraud detection are discussed below. By making use of sampling techniques, the methods come with their own particular set of accepted errors. Using analytics, insurance agencies can create structures that have gone through all the basic information… halfway through the document… 3. Calculate r = x1 mod n, if r = 0 go to step 1.4. Calculate k -1 mod n.5. Compute SHA-1(m) and on the other hand return this bit string to an integer e.6. Calculate s= k-1(e + dr) mod n. if s=0 go to step 1.7. A's signature on message m is (r,s).(c) ECDSA signature verificationTo verify A's signature (r, s) on m, B obtains a required copy of the domain parameters of AD= (q, a , b, G, n) and associated public key Q.1. Verify that res are integers in the range [1, n-1].2. Calculate SHA-1(m) and convert this bit string to an integer e.3. Calculate w = s-1 mod n.4. Calculate u1 = ew mod n and u2 = rw mod n.5. Calculate X = u1G + u2Q.6. If X = 0, discard the signature. Otherwise convert the x coordinate x1 of X into an integer x1bar and calculate v = x1bar mod n.7. Accept the signature if and only if v =r.
tags