Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Camden Council fights fraud with IBM big data analytics

7/07/2015 by

W1siziisijiwmtuvmdcvmdcvmtyvmtgvmjivnzm3l2nhbwrlbl9iev9oewt1x2zsawnrcl81ndb4mzm0lmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

The London Borough of Camden is using IBM big data analytics to create a database that consolidates residents' data to reduce fraud and costs.

The Residents Index database draws on the big data and analytics technology in IBM's InfoSphere Platform, which provides data warehousing, management and governance.

Camden Council can use the database to pull together residents' data from various parts of the organisation, such as electoral, housing and council tax services.

The council can then use IBM's predictive and investigative analytics to get a single view of all its residents' data and spot anomalies where, for example, a person is registered at more than one address.

Camden can use this to find data entry errors and uncover data points indicating fraudulent activity, such as illegal subletting or deceptive school admissions.

The Residents Index meets the council's data protection requirements, and can provide the borough's social care agencies with the information they need to identify vulnerable people, such as children, quickly and efficiently.

Camden councillor Theo Blackwell explained that access to residential big data in changing the way the borough saves money and prevents illegal activity in the face of funding cuts.

"Take school admission fraud. Parents complain about people gaming the system by pretending to reside in the borough to get their kids into the most sought-after schools," he said.

"Now with the Residents Index in place, council staff can carry out detailed checks and identify previously hidden discrepancies in the information supplied to the council to prove residency.

This article has been extracted from http://www.v3.co.uk, please click on this link to read the article in full http://www.v3.co.uk/v3-uk/news/2416270/camden-council-fights-fraud-with-ibm-big-data-analytics

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...