Table of Contents

Search

  1. Preface
  2. Introduction
  3. Major Concepts
  4. Prototyping
  5. The Design Issues
  6. Standard Population Choices
  7. Customer Identification Systems
  8. Identity Screening Systems
  9. Fraud and Intelligence Systems
  10. Marketing Systems

Best Practices Guide

Best Practices Guide

Impact of Risk on the Search Transaction

Impact of Risk on the Search Transaction

In many business systems the risk of missing a match must determine the scale of the search.
Compare the risk of missing:
  • a bad credit record when lending $1,000,000 as opposed to $1,000;
  • a criminal history record for a serial murderer as opposed to a petty thief;
  • a border alert record for a terrorist as opposed to a visa overstayer;
  • a medical history record as opposed to a prospect history record;
  • a dangerous material advice record as opposed to a yellow pages entry.
In fraud, criminal and alert data, the important high risk record will often be harder to find because the identity alteration becomes more devious and complex.
In data which is collected over long periods, the important record will be hard to find because time may have altered the identification in the search data.
With complex or locally entered foreign data, an important record will be hard to find because of its tendency to contain severe error.
High-risk searches must be thorough. With today’s data volumes, thorough searching must use intelligent keys and search strategies to manage the volume and quality of records returned.
Even with intelligent keys and search strategies, being thorough necessarily increases the volume of candidates returned. Because of this, reliable matching must also be used to assist the user by refining and ranking the list, and in some systems actually by matching the record, based on all available identity data.
Lower risk searches can afford to be less thorough, and can take advantage of assumptions about the stability of the data to provide quick access.
If you value your business, don’t trust the same strategy or scale of name search for transactions of different risk values. You may need to automate the choice of strategy relative to the transaction’s risk. Index the critical data separately and more thoroughly than the non-critical.

0 COMMENTS

We’d like to hear from you!