blog




  • Essay / Review of the literature on how insurance companies identify...

    REVIEW OF THE LITERATUREFraud in insurance companiesAs according to Verma and Mani (2002), the analysis can help to support the technologies of your business in the era of social networks, Big Data and CRM to repress financial offenders. Verma and Mani (2002) pointed out that the increasing number of mobile devices and social media platforms are bringing about significant transformations in the business world, including the insurance sector. The opportunities this landscape presents for insurers are vast. The myriad of social networks and communities allow insurers to connect with their customers more effectively, which in turn contributes to brand equity, customer acquisition and retention. Insurance companies are also empowered through customer feedback which can also be used for new product and pricing strategies. In addition to these opportunities, insurance companies use data analytics to detect fraud. Manual fraud management has always been costly for insurance companies, even if one or two minor cases of high-value fraud went undetected. Additionally, the Big Data trend (the growth of unstructured data) still leaves plenty of room for undetected fraud resulting from poor data analysis. Furthermore, as mentioned by Ruchi Verma and Sathyan Ramakrishna Mani (2002), analytics addresses these challenges and plays a crucial role in fraud detection for insurance companies. Some of the key benefits of using analytics in fraud detection are discussed below. Using sampling techniques, the methods come with their own particular set of accepted errors. Through analysis, insurance agencies can make frameworks that have reviewed all the basic information...... middle of paper ......3. Calculate r = x1 mod n, if r = 0 go to step 1.4. Calculate k -1 mod n.5. Calculate SHA-1(m) and on the other hand return this bit string to an integer e.6. Calculate s= k-1(e + dr) mod n. if s=0 then go to step 1.7. The signature of A for message m is (r, s). (c) Verification of ECDSA signature To verify the signature of A (r, s) on m, B obtains a required copy of the domain parameters of AD = (q, a, b, G, n) and associated public key Q .1. Check that r and s are in particular integers in the interval [1, n-1].2. Calculate SHA-1(m) and convert this bit string to an integer e.3. Calculate w = s-1 mod n.4. Calculate u1 = ew mod n and u2 = rw mod n.5. Calculate X = u1G + u2Q.6. If X = 0, remove the signature. Otherwise, convert the x1 coordinate of X to an integer x1bar and calculate v = x1bar mod n.7. Accept the signature if and only if v =r.