Didyou know

Case Managment, also known as CSR Interface, is used to manually review transactions, perform analysis on past fraudulent transactions and to perform forensic analysis.

Most companies choose to use existing CRM systems and rely on vendor specific point solutions. This means they have to open and review multiple different applications in order to complete a single case. Applications specifically designed for risk management will combine data from multiple different data sources to make it easier and faster for the risk team to review transactions and to perform forensics.

 

subscribe to newsletter

 

 

Case Management (CSR Interface)technique overview

The Case Management, CSR Interface, is used by the risk team to review high risk orders, conduct investigations and clean up activities related to risk management. Key considerations when implementing or buying this functionality include:

  • How well does the application support adding additional data feeds? Is it a black box approach, or can you integrate other services?
  • Can you customize the interface for your business workflow?
  • Does it support queing and hierarchy?
  • Does it support user roles?
  • Does it comply with PCI?
  • Link analysis is a MUST!

How does it work?

Typically these systems are running in parallel to existing systems, and will allow your exisitng eCommerce stream to submit transactions to the system in real time or batch mode. They produce the capability for workflow using rule based queuing and manual routing. A company's operations team can use the interface to manually review risky transactions, to perform analysis on past fraudulent transactions and to perform forensic analysis.

AdditionalResources

  • Introduction to Manual Review Tools.

    Provides methods for how to authenticate and verify a consumer’s name, address, phone and email online. It also provides demonstrations and examples of how to perform manual reviews using free and low cost online sites.

  • Introduction to Ecommerce Fraud Fundamentals.

    Provides participants foundation level knowledge about the theories, best practices and terminology surrounding electronic payment fraud. Presented in a standard format covering the history of eCommerce Fraud, consumer fraud, merchant fraud, fraudster motivation, fraud trends, identity verification and phishing.

  • Ecommerce Fraud Moving from Tools to Solutions.

    This session covers what constitutes a fraud solution and categorizes the many types of third party fraud tools. The course outlines the common terminology of fraud solutions and describes the capabilities needed to implement a fraud solution.

keynotes