More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Marketers can personalize interactions using information that spans complete anonymity to full authentication, with a middle range in which identified data may be used intermittently.
The distinction between anonymous and authenticated hinges on personally identifiable information (PII)—information that can be used alone, in combination, or in context to contact an individual.
This information includes unique and partial identifiers such as name, address, phone number, and email address, as well as financial, employment, or other data associated with an individual.
Published By: Quocirca
Published Date: Apr 23, 2007
After the relative anonymity and privacy of more discrete forms of communication – letters, email, the telephone – is the experience useful and comfortable for the individual and does video now add sufficient value to the organization to justify the cost?