hero-fraud

How to prevent manufacturing fraud using anomaly detection

Sept. 1, 2022
The unfortunate truth is that the core characteristics of the manufacturing industry make it a sweet spot for fraud schemes.

The unfortunate truth is that the core characteristics of the manufacturing industry—unmonitored supply chains, a host of third parties, underlying assets in the form of inventory, and multiple and frequent transactions—make it a sweet spot for procurement and inventory fraud schemes.

Common vulnerabilities and fraud risks in the manufacturing sector include product counterfeiting, bid rigging, conflict of interest, warranty-claims fraud, IP infringement, theft or misuse of inventory, and more. 

And it’s taking a financial toll. The Association of Certified Fraud Examiners estimates that fraud costs $200,000 per incident. 

While fraud is impossible to eliminate entirely, there are common ways to reduce its probability and more quickly identify red flags:

  1. Assess and actively monitor internal controls. Existing controls, thresholds and procedures should be regularly reviewed and assessed for relevance, adequacy and effectiveness. 
  2. Develop a robust, well-communicated fraud-response plan. 
  3. Know your supplier. Performing background checks and integrity due diligence can ensure that the manufacturers or suppliers are of reputable standing and can also highlight their interests, associations, related parties, and possible conflicts of interest. 
  4. Conduct regular checks on quality, such as routine checks for non-deliveries, repeat deliveries for the same order, and discrepancies between purchase orders and delivery.
  5. Optimize the power of data. Big data is not only useful to provide insights, but organizations can also extract some real value in the form of opportunities of which they were unaware. 

Putting data to work against fraud

Utilizing artificial intelligence (AI) and machine-learning (ML) technologies to automate detection and triage processes enables faster resolution (and with the interconnectivity and interdependence of data growing like never before, simple univariate-anomaly-detection techniques frankly do not cut it anymore). 

The most advanced companies are leveraging sophisticated anomaly-detection techniques to pinpoint oddities in their data instead of trying to manually find them buried in dashboards and reports. Using AI to automate fraud detection enables a manufacturer to instantly pick up on red flags such as excessive shrinkage in inventory, an abnormal rise in invoice volumes, split purchase orders, multiple payments made to vendors without any corresponding services rendered, unusually low or high bid prices, and a sudden and unexplainable rise in customer complaints.

Companies need algorithms that look across a variety of data sources, metrics and segments to uncover trends and relationships in order to more confidently assess where the true anomalies are found. But where do you start? Here are five common AI/ML approaches to fraud prevention and protection to consider for your organization: 

  1. Anomaly detection is an unsupervised-learning technique to automate detection of anomalies and make it more effective, especially utilizing large data sets.
  2. Logistic regression is a supervised-learning technique that is used when the decision is categorical. It means that the result will be either “fraud” or “non-fraud” if a transaction occurs.
  3. Decision-tree algorithms in fraud detection are used where there is a need for the classification of unusual activities in a transaction from an authorized user. These algorithms consist of constraints that are trained on the dataset for classifying fraud transactions.
  4. Random forest uses a combination of decision trees to improve the results. Each decision tree checks for different conditions. They are trained on random datasets and each tree gives the probability of the transaction being “fraud” or “non-fraud.” Then, the model predicts the result accordingly.
  5. Neural networks is a concept inspired by the working of a human brain, using cognitive computing that helps in building machines capable of using self-learning algorithms that rely on data mining, pattern recognition, and natural language processing. 

The corporate use cases for anomaly detection are practically endless. From spotting fraud to revenue leakage to system outages, you can quickly identify outliers that impact profit. As data has grown in volume along with unpredictability, more attention has been devoted to predicting anomalies as a proactive measure, as opposed to a reactive approach. The technology is here today to help you take control and minimize profit-cutting fraud.

By Andy Williamson, Kaizen Analytix founder and chief product officer, and Bobby Falconer, Kaizen Analytix business consultant lead