Process Information and Data (deleted)

Header Image
Project:
Process Information and Data (deleted) : Public <<TMF_Process>> eTOM Process
Created: 6/28/2022 5:52:29 PM
Modified: 1/16/2025 11:26:33 AM
Project:
Advanced:
Fraud operations in general should be receiving data almost continuously, and analysis of the received data should take place without delay where possible.  Earlier processing and/or analysis of datasets enables not only more rapid detection of fraud, but also the subsequent ability to take meaningful action to stop fraudulent activities before (any) damage is incurred by the business.  There are 3 primary functional areas within this process to address and define:

1. Rule Processing:  During rule processing activities, information and data is passed through rules either through automated (technology-based) means or other manual processes.  Depending on the volume of data and the complexity of the rules (interdependencies, aggregated or weighted triggering, etc.), increasing levels of technology will be necessary to quickly implement rules against data and determine the results.
2. Alert Generation:  Configuration of alerts.  Alerts may be generated when certain expected conditions are not met, including missing dataset delivery, failure to act on investigation requests (escalations), etc.  Alerts may also be issued when certain conditions are exceeded, including excessive alarm quantities resulting from “loose” rules producing false positive results.
3. Alarm Generation:  Configuration of alarms.  Alarms are typically the result of detected events or activities that are suspicious and should be investigated as possible fraud.  Alarms may be the result of single rule violations, or of multiple rule violations that contribute to weighted levels of suspicion (more complex scenario) etc.

Other functions may also include the configuration of supplementary reports for scenarios not configured through rules and alarms as listed above.

The configuration of rules, alerts, and alarms should be governed by policies as described in the 1.1.x processes for Fraud Management.  Additionally, the procedures that should be followed as a result of the issuance of an alert or alarm should be governed by policies as described within the 1.1.x processes for Fraud Management.
  • Associations To
  • Tagged Values
  • Advanced
Element Source Role Target Role
«TMF_Process» Support Fraud Management Operations
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Domain» Enterprise Domain
Domain «TMF_DomainAggregatesProcess»
Name:  
 
Name:  
 
Details: