Blog: William McKnight Subscribe to this blog's RSS feed!

William McKnight

Hello and welcome to my blog!

I will periodically be sharing my thoughts and observations on information management here in the blog. I am passionate about the effective creation, management and distribution of information for the benefit of company goals, and I'm thrilled to be a part of my clients' growth plans and connect what the industry provides to those goals. I have played many roles, but the perspective I come from is benefit to the end client. I hope the entries can be of some modest benefit to that goal. Please share your thoughts and input to the topics.

About the author >

William is the president of McKnight Consulting Group, a firm focused on delivering business value and solving business challenges utilizing proven, streamlined approaches in data warehousing, master data management and business intelligence, all with a focus on data quality and scalable architectures. William functions as strategist, information architect and program manager for complex, high-volume, full life-cycle implementations worldwide. William is a Southwest Entrepreneur of the Year finalist, a frequent best-practices judge, has authored hundreds of articles and white papers, and given hundreds of international keynotes and public seminars. His team's implementations from both IT and consultant positions have won Best Practices awards. He is a former IT Vice President of a Fortune company, a former software engineer, and holds an MBA. William is author of the book 90 Days to Success in Consulting. Contact William at wmcknight@mcknightcg.com.

Editor's Note: More articles and resources are available in William's BeyeNETWORK Expert Channel. Be sure to visit today!

Recently in Other Category

I was part of one of the pioneer credit card fraud detection projects.  It was at Visa and, together with all the similar projects taking advantage of early-stage data mining that were going on about the same time throughout the financial industry, drove credit card fraud down dramatically to all-time lows.  In recent years, as the technology changes, fraud has increased once again.  The financial industry has the online problem to deal with in addition to the ramifications from identity theft and the card skimming that was once falling.  Employees are compromising the data they come into contact with as well. 

Mass compromises occur routinely since thieves can divide and conquer - some can focus on getting the card numbers and others commit the fraud.  There is a robust, efficient black market for card numbers.  Consider the huge breach at Heartland Payment Systems in 2009.  Committing fraud is done with the detection systems in mind.  They often occur in "blitz" mode to overwhelm the system before it has a chance to react and stop transactions.

A recent study by Ovum studied 120 banks and found that counterfeit card fraud is the top issue, with wire fraud second.  Card readers can be purchased much more easily (i.e., on the iPhone) and the number of cards has proliferated, increasing potential for fraud.  While the UK has adopted "chip and pin" technology on the card, the US has not.  This may one day make it more difficult for criminals to cash in on credit card fraud in the US.

Personally, I just count on having to change my credit card numbers at least yearly either on account of outright fraud, the bank (I'll use "bank", but am referring to all financial companies in this article) being compromised or me making legitimate charges where the bank panics and decides to cancel the card.   All that good fraud detection comes with a price to the card holder.

I've worked on the fraud issue since then.  Other than the fact that it's working on the prevention of a negative to the company, these actually are fun, detective-work projects.  For those who have not had the opportunity, today I decided to share some of the architecture behind fraud prevention utilizing the approach of one of the leading international providers of payment systems, ACI Worldwide (Nasdaq: ACIW) and their product, ACI Proactive Risk Managerâ„¢ 8.0 (PRM). 

As the last step in the authorization process, PRM shares a score with the bank and, based on the tolerance the bank has set for the customer (balancing potential fraud with false positives), the bank's system decides whether to authorize or not.

Although the bank may have a data warehouse, all customer transaction sources feed PRM.  Some customers extend PRM's capabilities to make it their data warehouse.  One year's worth of backlogged transactions is recommended to start with - even though most are legally required to store seven years of data.

PRM makes decisions at the point of authorization based on:

1.     Customer profile - i.e., customers with a $200/day average try to charge $500; customers are also lumped into "peer groups" and charges are expected to conform to the pattern of the group - or else!

2.      Rule basis - the rules are managed by the bank; they may decide taking out the maximum from the ATM a minute before AND after midnight is acceptable for this customer; maybe not

3.      Analytics - detecting a pattern in charges that equate to the PRM database of fraudulent patterns

As a learning system, PRM learns when it has been wrong and tunes accordingly.  Patterns start with the known fraudulent patterns such as small charges at a gas pump followed by a Best Buy shopping spree, and go from there into areas I won't be writing about here.  Some are quite nuanced, reflecting the growing sophistication of both the criminal network and the network detecting the crime.

One of the benefits is sharing learned fraud patterns across the ACI network.  And although ACI brings in third-party, syndicated data, to enhance customer data it does not aggregate customer transactions across the network.

So the cat and mouse game continues into 2011 and, as with many important initiatives, we find information management critical to the solution.


Posted July 13, 2011 12:19 PM
Permalink | 1 Comment |

I wish you all the best as we embark on a new year. It is exciting, as always, to look forward to a new year. 2009 may require more resolve than other years, but I hope you find it to be the best year ever and not allow anything to dissuade you from entering the year with that outlook and making that your reality.

2008 was a challenging year for nearly everyone, especially those caught up in the economic downturn. My teams and I still helped over 25 companies improve their business and their use of information and thousands improve their skills and contributions. My goal for 2009 is to double the impact.

Finally, I must say Thank You, Thank You, Thank You! Without clients, friends, business partners and people who read and engage like YOU, there would be no practice. I am eternally grateful for your support and referrals. Happy New Year.


Posted December 31, 2008 8:34 AM
Permalink | No Comments |

I was walking around the office the other day and I came across this, the Enron Code of Ethics. It's the real thing, from the glory days of Enron, and it actually reads very, very well. You would definitely come away from reading this thinking ethics were of utmost importance to this company.

IMG00074.jpg


Posted September 9, 2008 12:37 PM
Permalink | 1 Comment |

"Data is like garbage. You had better know what you are going to do with it before you collect it."


Posted May 30, 2008 12:25 PM
Permalink | No Comments |

Wouldn't it be helpful if, when dealing with your consultants, vendors, support groups and employees, one of the following paragraphs magically appeared above their head in a quote bubble?

1. I am acting as an advocate. I am exercising my passion and persuasion on behalf of my firm, my department or a cause in which I do not privately believe is the best solution aligned with your objectives.

or

2. I really believe what I am saying here. It is the best I can do and it makes sense for my understanding of your objectives.


Posted May 28, 2008 10:21 AM
Permalink | No Comments |
PREV 1 2

   VISIT MY EXPERT CHANNEL

Search this blog
Categories ›
Archives ›
Recent Entries ›