Linguistic Identity Matching Expert Will Address Attendees at European Fraud Conference

Linguistic Identity Matching Expert Will Address Attendees at European Fraud Conference

When dealing with names, anti-fraud professionals must think both about the source language and the language it is being transcribed into. Would a name that originally is written in Russian Cyrillic characters and placed on an Egyptian watch list have the same sound and root name if then translated into English or French?

Victoria Meyer, CFE, ACCA, Director of the Swiss Business Academy, discussed this potential problem during her session, “Linguistic Identity Matching” at the 27th Annual ACFE Global Fraud Conference June 14, 2016. She'll be joining the ACFE again to speak at the 2017 ACFE Fraud Conference Europe, March 19-21 in London.

Meyer is the author of Linguistic Identity Matching, which will be available for sale in the bookstore at the 2017 ACFE Fraud Conference Europe. The following is a glimpse of what she shared with attendees in 2016.

Read More

What’s in a Name? How to Reconcile Linguistic Differences in Identity Matching

What’s in a Name? How to Reconcile Linguistic Differences in Identity Matching

For most people, your name is one of the purest, and easiest, summations of your identity. For those in the business of screening identity data against compliance intelligence information, a name may be the best tool you have to track and prosecute fraudsters around the globe. However, things begin to get complex when you consider the sheer multitude of countries and organizations developing sanction lists using their language’s translations of names.

Read More

5 Key Steps to Take When Investigating Big Data

5 Key Steps to Take When Investigating Big Data

13,311,666,640,184,600. According to Bill Hardin, CFE, CPA, CFF, and Director of Navigant Consulting, this is the number devices that will be connected to the Internet in 2020. Hardin led the session, “Five Lessons Learned with Managing Big Data in an Investigation” this morning and gave five key steps to take when managing the big data that can and will be found in connected devices. 

Read More