Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Soon after the first wave of

...

fraud applications were identified

...

in June 2016,

...

the CCC Technology Center took immediate steps to strengthen the security of

...

the CCCApply system and protect our students' personal identifiable data (

...

read more about all the

...

ways we are addressing

...

fraud

...

in CCCApply).

...

At the same time, we contracted with a machine learning data research team to perform data analysis on several thousand

...

fraud applications examples that we had collected from the colleges who initially reported the spam.

Research Objectives

Our The objectives for the study research project were simple:

  • Understand why we are seeing an influx of fraudulent applications across the CCC system
  • Understand the motivations behind these fraudulent attacks
  • Identify trends, commonalities and patterns in the data
  • Identify the tools and techniques being used by spammers
  • What can CCCApply do to prevent fraud now and in the future?
  • What can the colleges do to prevent fraud now and in the future?

In addition, the research team will work with the CCCApply product manager and support team to commence a small pilot of colleges to help develop a process for ongoing collection of data and fraud applications for continuous analysis and disseminate information to the colleges.

Data Analysis

Based on that initial review, we initiated a multi-part data analysis (without using any student personal information). In the first data review, we focused on one college that provided a large number of bad applications between June 1, 2016 - August 15, 2017; the second analysis looked at all other colleges who provided examples of bad applications in the same time frame; and the third pull looked at all remaining colleges and submitted application data. It was important to compare the bad applications to good applications in order to start detecting trends and patterns in the fraudulent "formula".

...