SlideShare a Scribd company logo
Anti-Fraud and eDiscovery using
Graph Databases and Graph
Visualization
Corey Lanum
We are hiring!
Corey Lanum
• 10 years with i2 (now IBM), developing visualization and
analytical solutions for large government and enterprise
customers
– Major insurance companies
• Auto
• Health
– Government Agencies
• RCMP
• FBI
• California Department of Justice
Fraud
Fraud consists of misrepresentation for
personal financial gain
– Personal Misrepresentation
– Pretending to be someone
else to collect money
intended for others
– Transactional Misrepresentation
– Fabricating details of a
transaction to avoid scrutiny
– Fabrication or exaggeration
of insurance claims

Recommended for you

How blockchain technology can supercharge cfo initiative
How blockchain technology can supercharge cfo initiativeHow blockchain technology can supercharge cfo initiative
How blockchain technology can supercharge cfo initiative

Ernst and Young (EY) did a study showing how blockchain technology could revolutionize the job of the CFO. These beneficial advancements run the gamut, from enhancing cybersecurity to helping manage the supply chain better. Here are a few of the ways that blockchain development can impact CFO roles

blockchaintechnologysoftware development
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...

Data lineage tracks how data flows through an enterprise by identifying where data comes from, where it goes, and what happens along the way. It can be difficult to achieve due to differences between business and technical views of data, scope, level of detail needed, and changes within a company over time from mergers, migrations, and high rates of change. Data lineage use cases include governance and regulatory compliance by meeting commitments faster with less manual effort, accurately defining governance initiatives, and exposing previously unknown privacy exposures. MANTA software documents lineage by analyzing SQL, ETL and BI code to visualize lineage maps or integrate with third-party governance solutions.

Big data engineering slideshare - v0.4
Big data engineering   slideshare - v0.4Big data engineering   slideshare - v0.4
Big data engineering slideshare - v0.4

Big Data provides a source of competitive advantage if organizations can unlock its intrinsic value. To do so requires establishing a cost-effective, governed, and agile data foundation that enables self-service analytics. This allows data citizens to directly query data and extract insights with minimal IT support. Both cultural and technical challenges must be overcome through an enterprise-wide shift in mindset driven by top management and a phased approach to solving technical problems.

Fraud Detection
• Why Graph Databases?
– Almost all fraud cases involve the fabrication of a relationship, so
it makes sense to model your data to highlight relationships
• Why Visualization?
– Visualization of these relationships helps investigators and
analysts determine what patterns are normal, and which are
abnormal, and flag the abnormal patterns for further scrutiny
Fraud Investigation
• Once we have uncovered a fraudulent
transaction, how do we determine who is
responsibility, and prove
misrepresentation?
– Who had access?
– Who benefited?
– Did they work alone?
• 270 public and private sector organizations in
the UK are members of CIFAS
• CIFAS maintains two large databases, one of all
reported fraud instances and one for reported
staff fraud
• CIFAS has contracted to use KeyLines to
visualize connections between fraud instances
Neo4j and KeyLines

Recommended for you

Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management

This document provides an overview and summary of occupational fraud risks, including: - A summary of key findings from the 2014 ACFE Global Fraud Study on typical fraud schemes, losses, and detection methods. - Definitions and examples of the main categories of fraud - asset misappropriation, corruption, and financial statement fraud. - Common red flags or warning signs of potential fraudulent behavior. - Steps for conducting a fraud risk assessment to identify risks and controls. - Examples of anti-fraud controls that can be implemented to prevent or detect various fraud schemes.

Fraud Detection with Neo4j
Fraud Detection with Neo4jFraud Detection with Neo4j
Fraud Detection with Neo4j

The document discusses using Neo4j and graph databases for fraud detection solutions. It describes how Neo4j allows for agile development, high productivity, and real-time response times when working with connected fraud data. The document outlines a fraud detection demo using Neo4j to load operational data, inject fraud cases, generate alerts, and export detected fraud data for investigation. It proposes using Neo4j as the foundation for a 360-degree fraud prevention solution integrated with other systems and data sources.

nosqlfraudneo4j
Teaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTechTeaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTech

Talk at scikit-learn day at PyData Paris 2016.

machine learningscikit-learnteaching
KeyLines
Visualise and analyse networks in the browser
• Communication networks
• Social networks
• Fraud networks
Features
• Pure HTML5
• Works on IE6, 7, 8 via Flash
• Graph layouts
• Graph analytics
– SNA measures, path finding & more
• Full event model
• Full workflow support
– Image generation for reports, undo stack, etc
• Very quick integration time
• Thorough documentation
• Good performance
• Great support
KeyLines / Neo Architecture
Credit Card Fraud Scenario
• Employees of a retail merchant swipe
customers’ cards and steal data before
processing transaction
• Cardholders later notice fraudulent
charges on their bill
• How do we walk back to determine who is
responsible?
Insurance Fraud
• A claim on an insurance policy that one is
not entitled to make
– Staged auto accidents
– Doctors billing for services they never
performed
– Claiming pre-existing damage was caused by
a covered event
• Misrepresentation on the policy application
to pay lower premiums

Recommended for you

Anomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learnAnomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learn

This document discusses anomaly detection techniques in scikit-learn. It begins by defining anomalies and outliers, then describes the main types of anomaly detection as supervised, semi-supervised (novelty detection), and unsupervised. Popular density-based, kernel, nearest neighbors, and tree/partitioning approaches are covered. Examples are given using Gaussian mixture models, one-class SVM, local outlier factor, and isolation forest algorithms. Challenges in anomaly detection like parameter tuning and evaluation are also noted.

scikit-learnpythonstatistics
How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?

A walk through a common fraud case : how to use Neo4j and graph visualization to identify criminals and fight loan fraud.

big dataanalyticsgraph visualization
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection

A telecom company named as Bad Idea is expecting for fraudsters. They designed a weird rate plan called Praxis plan where only four calls are allowed during a day. Bad Idea has their call logs spanning over one and half months.We are using the Naive Bayesian Classification rule to predict the fraudsters for telecom company.

@arbind@vaibhav@rohit
eDiscovery
• Similar to Fraud detection
• Large volumes of transactional data – need to
understand patterns in the data
• Can’t afford to pay lawyers to read every document
• eDiscovery tools help to identify which documents or
communications may be relevant by using a number of
algorithms
• Neo4j and Graph Visualization can help!
Costs of Fraud
• Industry estimates are $2.5 Trillion per
year
• By making it easier to both detect and
investigate fraud, we reduce the incentives
to conduct fraud in the first place
• Neo4j and KeyLines are perfect
technologies to assist in this endevour
Thanks!
corey@cambridge-intelligence.com
All logos, trademarks, service marks and copyrights used in this
presentation belong to their respective owners
Roadmap
• Larger and larger
networks
– Filtering
– Combining nodes
together
– Improved analytics for
node importance
– Faster rendering (long
term)
• Dynamic networks
– Filtering
– Timeline, time slider
• Location information
– Map underlays
– Geographic node layout
• Real time networks
– Visual activity indicators
• Information synthesis
– Shapes, boxes,
attributes for annotation
– Snap to grid
– Elbows on links

Recommended for you

Revenue control
Revenue controlRevenue control
Revenue control

The document discusses revenue control procedures for food and beverage operations. It covers standard revenue definitions, manual and automated guest check systems, server and cashier banking systems, and using daily reports to monitor revenue. Automated systems simplify controls by eliminating duplicate checks and automating tasks like voiding items. Managers can use point-of-sale reports to compare actual to expected revenues.

Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector

The document discusses telecom fraud, including definitions, types, and detection techniques. It notes that telecom fraud results in significant global losses estimated at $40 billion annually by the Communications Fraud Control Association in 2011. The document outlines different categories of fraud, including technical (external and internal) frauds and non-technical frauds. It also summarizes two literature articles on data mining approaches to fraud detection and an overview of different types of telecom frauds such as subscription, clip on, and call forwarding frauds. Detection techniques discussed include data modeling of user behavior, social media monitoring, and strengthening customer identification controls.

Revenue Control
Revenue ControlRevenue Control
Revenue Control

This document discusses revenue control procedures for food and beverage operations. It covers manual and automated guest check systems, server and cashier banking for collecting revenue, and assessing standard revenue levels for food, beverage, and automated beverage operations. The goal is to understand how managers use various systems and reports to establish revenue standards and ensure actual revenue collected matches expectations.

food &amp beverage control

More Related Content

What's hot

MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
Boston Global Forum
 
Data Science Capability Framework
Data Science Capability FrameworkData Science Capability Framework
Data Science Capability Framework
Craig Milroy
 
Trusto &TMT Ratings
Trusto &TMT Ratings Trusto &TMT Ratings
Trusto &TMT Ratings
Aurel Ispas
 
How blockchain technology can supercharge cfo initiative
How blockchain technology can supercharge cfo initiativeHow blockchain technology can supercharge cfo initiative
How blockchain technology can supercharge cfo initiative
Muhammad Asad Saleem
 
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Neo4j
 
Big data engineering slideshare - v0.4
Big data engineering   slideshare - v0.4Big data engineering   slideshare - v0.4
Big data engineering slideshare - v0.4
Agilisium Consulting
 

What's hot (6)

MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
 
Data Science Capability Framework
Data Science Capability FrameworkData Science Capability Framework
Data Science Capability Framework
 
Trusto &TMT Ratings
Trusto &TMT Ratings Trusto &TMT Ratings
Trusto &TMT Ratings
 
How blockchain technology can supercharge cfo initiative
How blockchain technology can supercharge cfo initiativeHow blockchain technology can supercharge cfo initiative
How blockchain technology can supercharge cfo initiative
 
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
Data Lineage: Using Knowledge Graphs for Deeper Insights into Your Data Pipel...
 
Big data engineering slideshare - v0.4
Big data engineering   slideshare - v0.4Big data engineering   slideshare - v0.4
Big data engineering slideshare - v0.4
 

Viewers also liked

Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
Ron Steinkamp
 
Fraud Detection with Neo4j
Fraud Detection with Neo4jFraud Detection with Neo4j
Fraud Detection with Neo4j
Neo4j
 
Teaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTechTeaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTech
agramfort
 
Anomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learnAnomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learn
agramfort
 
How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?
Linkurious
 
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
Punit Kishore
 
Revenue control
Revenue controlRevenue control
Revenue control
Rajendra Nabar
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
sksahu099
 
Revenue Control
Revenue ControlRevenue Control
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
Maruthi Nataraj K
 

Viewers also liked (10)

Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Fraud Detection with Neo4j
Fraud Detection with Neo4jFraud Detection with Neo4j
Fraud Detection with Neo4j
 
Teaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTechTeaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTech
 
Anomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learnAnomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learn
 
How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?
 
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
 
Revenue control
Revenue controlRevenue control
Revenue control
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Revenue Control
Revenue ControlRevenue Control
Revenue Control
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
 

Similar to Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Corey Lanum @ GraphConnect Boston 2013

Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
Darrell O'Donnell
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
The Forensics Frontier
The Forensics FrontierThe Forensics Frontier
The Forensics Frontier
whbrown5
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Vivastream
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
Credit Internet Tools
Credit Internet ToolsCredit Internet Tools
Credit Internet Tools
Credit Management Association
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
IRJET Journal
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
Pamela Mantone
 
credit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptxcredit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptx
227r1a0519
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
fmi_igf
 
Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document Processing
InfrrdInc
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
Boston Institute of Analytics
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
Steven Wardell
 
Data mining and Forensic Audit
Data mining and Forensic AuditData mining and Forensic Audit
Data mining and Forensic Audit
Dhruv Seth
 
Credit Information Sharing (CIS)
Credit Information Sharing (CIS)Credit Information Sharing (CIS)

Similar to Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Corey Lanum @ GraphConnect Boston 2013 (20)

Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
Our way of fighting fraud
 
The Forensics Frontier
The Forensics FrontierThe Forensics Frontier
The Forensics Frontier
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Credit Internet Tools
Credit Internet ToolsCredit Internet Tools
Credit Internet Tools
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
credit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptxcredit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptx
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document Processing
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
Data mining and Forensic Audit
Data mining and Forensic AuditData mining and Forensic Audit
Data mining and Forensic Audit
 
Credit Information Sharing (CIS)
Credit Information Sharing (CIS)Credit Information Sharing (CIS)
Credit Information Sharing (CIS)
 

More from Neo4j

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Atelier - Architecture d’applications de Graphes - GraphSummit Paris
Atelier - Architecture d’applications de Graphes - GraphSummit ParisAtelier - Architecture d’applications de Graphes - GraphSummit Paris
Atelier - Architecture d’applications de Graphes - GraphSummit Paris
Neo4j
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
FLOA - Détection de Fraude - GraphSummit Paris
FLOA -  Détection de Fraude - GraphSummit ParisFLOA -  Détection de Fraude - GraphSummit Paris
FLOA - Détection de Fraude - GraphSummit Paris
Neo4j
 
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...
Neo4j
 
ADEO - Knowledge Graph pour le e-commerce, entre challenges et opportunités ...
ADEO -  Knowledge Graph pour le e-commerce, entre challenges et opportunités ...ADEO -  Knowledge Graph pour le e-commerce, entre challenges et opportunités ...
ADEO - Knowledge Graph pour le e-commerce, entre challenges et opportunités ...
Neo4j
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
Neo4j
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
Neo4j
 

More from Neo4j (20)

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Atelier - Architecture d’applications de Graphes - GraphSummit Paris
Atelier - Architecture d’applications de Graphes - GraphSummit ParisAtelier - Architecture d’applications de Graphes - GraphSummit Paris
Atelier - Architecture d’applications de Graphes - GraphSummit Paris
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
FLOA - Détection de Fraude - GraphSummit Paris
FLOA -  Détection de Fraude - GraphSummit ParisFLOA -  Détection de Fraude - GraphSummit Paris
FLOA - Détection de Fraude - GraphSummit Paris
 
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...
SOPRA STERIA - GraphRAG : repousser les limitations du RAG via l’utilisation ...
 
ADEO - Knowledge Graph pour le e-commerce, entre challenges et opportunités ...
ADEO -  Knowledge Graph pour le e-commerce, entre challenges et opportunités ...ADEO -  Knowledge Graph pour le e-commerce, entre challenges et opportunités ...
ADEO - Knowledge Graph pour le e-commerce, entre challenges et opportunités ...
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 

Recently uploaded

20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 

Recently uploaded (20)

20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 

Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Corey Lanum @ GraphConnect Boston 2013

  • 1. Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization Corey Lanum
  • 3. Corey Lanum • 10 years with i2 (now IBM), developing visualization and analytical solutions for large government and enterprise customers – Major insurance companies • Auto • Health – Government Agencies • RCMP • FBI • California Department of Justice
  • 4. Fraud Fraud consists of misrepresentation for personal financial gain – Personal Misrepresentation – Pretending to be someone else to collect money intended for others – Transactional Misrepresentation – Fabricating details of a transaction to avoid scrutiny – Fabrication or exaggeration of insurance claims
  • 5. Fraud Detection • Why Graph Databases? – Almost all fraud cases involve the fabrication of a relationship, so it makes sense to model your data to highlight relationships • Why Visualization? – Visualization of these relationships helps investigators and analysts determine what patterns are normal, and which are abnormal, and flag the abnormal patterns for further scrutiny
  • 6. Fraud Investigation • Once we have uncovered a fraudulent transaction, how do we determine who is responsibility, and prove misrepresentation? – Who had access? – Who benefited? – Did they work alone?
  • 7. • 270 public and private sector organizations in the UK are members of CIFAS • CIFAS maintains two large databases, one of all reported fraud instances and one for reported staff fraud • CIFAS has contracted to use KeyLines to visualize connections between fraud instances
  • 9. KeyLines Visualise and analyse networks in the browser • Communication networks • Social networks • Fraud networks Features • Pure HTML5 • Works on IE6, 7, 8 via Flash • Graph layouts • Graph analytics – SNA measures, path finding & more • Full event model • Full workflow support – Image generation for reports, undo stack, etc • Very quick integration time • Thorough documentation • Good performance • Great support
  • 10. KeyLines / Neo Architecture
  • 11. Credit Card Fraud Scenario • Employees of a retail merchant swipe customers’ cards and steal data before processing transaction • Cardholders later notice fraudulent charges on their bill • How do we walk back to determine who is responsible?
  • 12. Insurance Fraud • A claim on an insurance policy that one is not entitled to make – Staged auto accidents – Doctors billing for services they never performed – Claiming pre-existing damage was caused by a covered event • Misrepresentation on the policy application to pay lower premiums
  • 13. eDiscovery • Similar to Fraud detection • Large volumes of transactional data – need to understand patterns in the data • Can’t afford to pay lawyers to read every document • eDiscovery tools help to identify which documents or communications may be relevant by using a number of algorithms • Neo4j and Graph Visualization can help!
  • 14. Costs of Fraud • Industry estimates are $2.5 Trillion per year • By making it easier to both detect and investigate fraud, we reduce the incentives to conduct fraud in the first place • Neo4j and KeyLines are perfect technologies to assist in this endevour
  • 15. Thanks! corey@cambridge-intelligence.com All logos, trademarks, service marks and copyrights used in this presentation belong to their respective owners
  • 16. Roadmap • Larger and larger networks – Filtering – Combining nodes together – Improved analytics for node importance – Faster rendering (long term) • Dynamic networks – Filtering – Timeline, time slider • Location information – Map underlays – Geographic node layout • Real time networks – Visual activity indicators • Information synthesis – Shapes, boxes, attributes for annotation – Snap to grid – Elbows on links

Editor's Notes

  1. Bring up neo demo
  2. This slide is to explain the main drivers for the features we are planning.The drivers are: large networks, dynamic, location info, real-time dashboards and a need for users to draw stuff ‘on top’ of the networks