Banks, credit unions, credit card companies, insurance companies, stock brokerages, investment funds, and more must report their activities to government regulatory agencies. Following financial crises in the late 2000s, regulatory compliance has become stricter and more onerous on financial services companies like those listed above.
From the stricter need for reporting and the massive amounts of data generated by financial institutions, the regtech industry has sprung up, combining regulatory reporting and big data technology.
Language revitalization refers to the process of bringing a dead or dying language back into common usage. It is also called language revival, although many believe the term “revival” should only apply to dead languages and “revitalization” to dying ones.
Language reclamation is a related concept and frequently occurs together with revitalization/revival. However, it refers only to the process of a population reasserting its right to speak its language.
As organizations continue to adopt IoT technology, ensuring secure access to a private network becomes particularly difficult. Network access control systems, however, protect network data by requiring user authentication and authorization before every request.
These systems also proactively address security breaches, though many also integrate with anti-virus or malware systems that organizations already use.
Network segmentation refers to the act of dividing different parts of a network into separate segments or subnets. This is done either physically or technologically, usually as part of a network access control system that limits who can access what parts of the network.
Once organizations have identified subnetworks, they establish virtual fences around them using a variety of techniques, including VLANs, SDNs, and firewalls.
A large proportion of data breaches come from authorized network users. Since they have network privileges, however, this type of cybersecurity threat is extremely difficult to address. Insider threat detection comprises the methods and technologies that organizations use to identify and mitigate these insider threats.
There are various types of insider threats, not all intentional or malicious. Pawns, for example, are simply victims of phishing or other social engineering traps while Goofs lost confidential data due to ignorant or arrogant flaunting of security policies. The malicious types of insider threats come from Collaborators and Lone Wolves, who are rarely encountered.
Taking the place of an in-person managers, a financial robo-advisor provides personalized investment and wealth management services to individuals as well as small and medium-sized businesses.
Robo-advisors use deep learning and other artificial intelligence techniques to offer advice and even automate trades in a variety of industries and account types, from individuals with retirement accounts to small businesses with equity finance plans.
VR therapy is the use of virtual reality equipment and programs within a therapeutic setting, sometimes as the primary therapy used, to address both mental illness and physical injury. In many cases, VR headsets are used in combination with biometric sensors like heartbeat or electrodermal activity sensors.
CCBT stands for Computerized Cognitive Behavioral Therapy and refers to the use of apps or other programs to do CBT therapy on a personal basis.
Cognitive behavioral therapy is, essentially, a method of training people to recognize fallacious beliefs or self-destructive behavior in themselves and then working with them to change their beliefs and behaviors to more healthy, productive ones. For example, someone prone to catastrophizing (assuming the worst outcome of a situation) may need to learn how to identify more likely outcomes.
CBT works best with mild to moderate emotional disturbances, especially depression and anxiety. Patients may use these programs in concert with their therapists or general practitioners, but cCBT has also proven itself very effective when used on its own.
Fighting money laundering is a complicated task with substantial costs and risks, including—but not limited to—regulatory, reputational, and financial crime risks. Money laundering can be difficult to track, with many false alerts making detection even more challenging. But new technology, such as artificial intelligence (AI) and big data, can increase detection rates and keep your firm safe.
Many companies supply goods, loans, and services based on business and trade credit, either invoicing customers for payment at a later date or providing B2B loans. Business credit risk management assists companies with lending decisions based on a client’s financial health as well as other parameters that may indicate how likely they are to pay on time. Providing the right amount of credit will reduce the risk of late payments or defaults, which expose the vendor to financial risk.
Fraud between companies can interrupt the flow of business and destroy their reputations and it is becoming increasingly difficult to identify and stop criminals from committing fraud: PYMNTS.com’s 2019 yearly report, “Securing B2B Payments,” relates that global markets lost $4.2 trillion in 2019 alone due to fraud. However, machine learning can identify fraud accurately before it has occurred.
Hedge fund investments use several different strategies to achieve returns in both domestic and international markets. They are often aggressively managed and trade in land, real estate, stocks, derivatives, currencies, etc. markets.
The most lucrative hedge funds also have a diverse portfolio—which means investors need to analyze large amounts of data to make investment decisions.
Insurance claims management is the process of managing a claim from reception to settlement. The insurance claim process is particularly suited to machine learning solutions as much can be done to cut time and costs, leading to speedier resolution of claims to the satisfaction of both insurer and insured.
Insurance fraud can be committed by either the buyer or the seller of an insurance policy.
The seller may offer policies from non-existent companies, fail to submit premiums, and churn policies to create more commissions. The buyer exaggerate claims, falsify medical history, post-date policies, sell their policy to for cash when they are diagnosed with a terminal disease, or fake their death or kidnapping. We will focus on the buyer insurance fraud in this post.
Historically, insurers have relied on linear regression of a small number of risk factors, largely reported by the policy-holder on a trust basis, to determine an insurance premium. However, a good prediction model of individual future insurance costs is becoming a business essential as competition in the insurance industry and low customer switching costs have become key drivers for insurers to build a pricing structure which covers their incurred costs.
Promotional planning is the process of optimizing marketing tools, strategies, and resources to promote a product or service to generate demand and meet set objectives. Artificial intelligence (AI) can be used to effectively plan promotional events, measuring their outcomes, and adjusting as necessary to achieve growth.
In today’s global economy, supply chains include numerous partners, with services and sourcing managed across several organizations and in jurisdictions across the world. Corporations are increasing their use of third-party suppliers in the execution of key strategic imperatives and these third-party operations are becoming larger and more complicated as time goes on. Businesses should upgrade their risk management framework if they don’t want to miss potential profits and saved costs.
AI has been used to improve supply chain and demand forecasting for a couple of decades. Demand planning applications use data driven algorithms to take historical data and use it to forecast. Demand forecasting can include promotion planning or stock and sales forecasting. The machine looks at the forecast, compares it to actual shipments, and suggests alternatives and optimization options. Over time, many companies started doing more specific forecasting for specific regions, products or stores or for more granular points in time. Both retailers and their suppliers (CPG companies or 3rd party shipping and supply chain companies) use their data to help conduct automated decision making within the supply chain.
Targeted marketing is a marketing strategy which identifies an audience that is most likely to buy a product or service and subsequently creates a marketing campaign designed specifically to advertise said product or service to the target audience, using advertisements and promotional messages. This allows different companies to hone in on certain market segments, creating a “specialty” and possibly lowering competition with similar companies.
CoreLogic’s Consumer Disputes Resolution provides free access to FCRA (Fair Credit Reporting Act)-compliant credit information. CoreLogic offers investigative and consultation services to individuals, with a readiness to correct missing or mistaken bureau data.
DataX Know Your Customer provides data to better asses consumer risk assessment.
Twenty Billion Neurons Crowd Acting platform enables your own interactive AI to train using large and and diverse datasets.
Wiser Solutions Retail Auditing And Mobile Crowdsourcing provides actionable insights on in-store sales performance, competitors, and consumer behavior.
Grandata Social Universe provides coded information about consumers, including locations, and spending habits to paint a rich picture about how consumers make purchasing decisions.