News & Commentary

02:41 PM
Stuart Rose, SAS
Stuart Rose, SAS
Commentary
50%
50%

3 Insurance Business Applications for Text Analytics

Insurance companies collect huge amounts of text daily, and no one has time to read it all.

Insurance companies collect huge amounts of text-based information daily, in many languages and dialects: customer feedback, emails, Web documents, blogs, Twitter feeds, adjuster notes, medical records, police statements, surveys, research studies, underwriter notes, competitive intelligence and more. No one has time to read it all, much less classify the content into common themes or make sense of the essential information.

To observe trends, spot new topics, issue alerts about potential problems and flag new business indicators, insurers must be able to analyze all your data before acting on it. But conversational language is ambiguous, and key messages buried in text data are not easy to discern or process. Most organizations are unable to combine text content with structured data in decision-making contexts.

Stuart Rose
Stuart Rose, SAS

By most estimates, up to 90% of the information available in an organization is actually unstructured data, and that percentage is likely to increase with the growth of social media. But for insurance companies, it might just as well be called invisible data. For an industry that is driven by data, text analytics is still new to most insurance companies.

So what is text analytics? The simple definition is the use of computer software to annotate and extract information from electronic text sources and analyze that information for business purposes. But pattern discovery is where we get the true value of text analytics. Within this category the main technologies are:

• Sentiment analysis, which automatically locates and extracts sentiment from online materials.

• Text mining, which provides powerful ways to explore unstructured data to discover previously unknown concepts and patterns.

[Previously from Rose: Finding your most valuable policyholders]

Imagine the power if insurers could harness the insights hidden within that vast sea of words? Here are just three areas where text analytics can positively impact insurer profitability:

Subrogation

It is estimated that, on average, 5% of claims that should go to subrogation don't. By using data and text mining techniques, insurers have minimized the number of missed recovery cases by recognizing known and unknown subrogation indicators in the claims information. In fact, one leading European insurer was able to improve its recovery rate by more than 4%, representing millions of dollars per year to its bottom line.

Fraud detection

Insurance companies are using text analytics to dig into the details contained in applications, adjuster notes, and other unstructured text sources, helping prioritize cases for SIU examiners. For example, carriers may find a common phrase or description of an accident among multiple claimants, usually an indicator of organized fraud.

Brand reputation

Our world has changed drastically in the past 10 years. Before the rise of the Internet, blogs and social media sites, an insurer could more easily maintain and control its brand and reputation. Now these websites are creating a virtual focus group online. Customers are venting their frustration or sharing stories of positive experience, and all of it is recorded and shared with millions of other consumers. Sentiment analysis can analyze this online content and categorize the text as "positive," "negative" or "neutral." Insurers can then review the various categories and comments and look at trends over a period of time to see if their brand reputation is improving or declining.

The volume of unstructured data coming from social media is growing exponentially. Add to this the thousands of call center records, emails and other internal data sources. Today successful and innovative insurance companies can no longer ignore text analytics and the vast amount of information contained within unstructured data.

About the Author: Stuart Rose is global insurance marketing manager at Cary, N.C.-based SAS. Rose, a 20-year veteran of the insurance industry, began his career as an actuary. He has worked for a global insurance carrier in both its life and property divisions and has worked for several software vendors, where he was responsible for marketing, product management and application development. He has driven successful development and implementation of enterprise systems with insurance companies in the U.S., the U.K., South Africa and Continental Europe.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly22
50%
50%
Kelly22,
User Rank: Author
1/10/2014 | 5:30:30 PM
re: 3 Insurance Business Applications for Text Analytics
I like your description of blogs and social media sites as a 'virtual focus group.' So many customers share their experiences online, and their opinions could prove very useful to companies looking to boost their reputation.
Nathan Golia
50%
50%
Nathan Golia,
User Rank: Author
1/10/2014 | 4:57:15 PM
re: 3 Insurance Business Applications for Text Analytics
Thanks Stuart. FWIW, I always wonder how sentiment analysis on social media would work if an epidemic of sarcasm gripped the web.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.