investigated in greater detail and from those that are
found to be fraudulent, new fraud profiles are built.
2.2 The Importance of Ontologies
Ontologies can play a vital role in both the rule-
based and data mining fraud detection approaches.
Apart from the rules, a really important component
of a rule-based system is its knowledge base. An
important issue in knowledge bases is the knowledge
representation paradigm they adopt as the latter
influences the type and quality of reasoning that can
be made within the knowledge-based system. In the
Knowledge Representation literature there can be
found a number of different knowledge
representation schemas and languages including
first-order logic (Hodges, 2001), defeasible logic
(Nute, 1994), modal logic (Blackburn et al, 2003)
etc.
A family of these languages are Description
logics (DL) (Baader et al, 2003) on which in turn
ontologies are based. Ontologies are knowledge
models that represent a domain and are used to
reason about the objects in that domain and the
relations between them (Gruber 1993). Thus, a
knowledge base may use an ontology to specify its
structure (entity types and relationships) and its
classification scheme. In such a case, the ontology,
together with a set of instances of its classes
constitutes the knowledge base.
The use of ontologies and ontology-related
technologies for building knowledge bases for rule-
based systems is considered quite beneficial for two
main reasons:
• Ontologies provide an excellent way of
capturing and representing domain knowledge,
mainly due to their expressive power.
• A number of well established methodologies,
languages and tools (
Gomez-Perez et al 2004)
developed in the Ontological Engineering area can
make the building of the knowledge base easier,
more accurate and more efficient, especially in the
knowledge acquisition stage which is usually a
bottleneck in the whole ontology development
process.
Ontologies are also very important to the data
mining area as they can be used to select the best
data mining method for a new data set (Tadepalli et
al 2004). When new data is described in terms of the
ontology, one can look for a data set which is most
similar to the new one and for which the best data
mining method is known, this method is then applied
to the new data set. In this way, there is no need for
trying out every known method on the new data set,
but the one (or few) that is most promising can be
directly selected.
2.3 The Importance of Existing
Ontologies and Standards
Creating a knowledge model for a given domain
from scratch is most of the times a very difficult and
time/resource consuming task especially as far as the
knowledge acquisition process is concerned.
Therefore, in any such effort, the existence of
already established and commonly accepted
standards, classification schemes and ontologies
regarding this domain should always be taken in
mind. Of course the degree of existence and
reusability of such standards depends largely on the
given domain.
For example, in the healthcare domain, existing
medical classifications, terminologies and
taxonomies, which we used for the TSAY case study
that we describe in section 5, include the
International Classification of Diseases ICD)
(http://www.who.int/ classifications/icd), the ATC
system (http://www.whocc.no/atcddd) and the
SNOMED CT system (http://www.snomed.org). The
ICD classification is an international standard
diagnostic classification for all general
epidemiological and many health management
purposes. The Anatomical Therapeutic Chemical
(ATC) system is a system for classification of
medicinal products according to their primary
constituent and to the organ or system on which they
act and their chemical, pharmacological and
therapeutic properties. Finally, SNOMED
(Systematized Nomenclature of Medicine) is a
system of standardized medical terminology
developed by the College of American Pathologists
(CAP).
Apart from such domain specific classifications
like ATC or SNOMED, attempts for building fraud
ontologies for certain domains and fraud types have
also been made. Examples include financial fraud
(Leary et al, 2003) and e-mail based fraud
(Kerremans et al, 2005).
3 METHODOLOGY FOR
BUILDING FRAUD
ONTOLOGIES
The methodology we propose for building fraud
detection ontologies is based on the suggestion that
fraud is actually an operational risk for an
TOWARDS A GENERIC FRAUD ONTOLOGY IN E-GOVERNMENT
271