U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computers Learn To Detect Financial Abuse of the Elderly

NCJ Number
251227
Date Published
October 2017
Length
2 pages
Annotation

This paper presents a summary description of NIJ-funded research that determined whether data from cases of suspected elder abuse can be supplied to a computer program that can determine whether financial abuse of the elderly person has occurred ("pure" financial abuse), as well as whether financial abuse may have been accompanied by physical abuse ("hybrid" financial abuse).

Abstract

The research team used a statewide dataset of 8,800 confirmed cases of elder abuse in Texas that had been investigated by adult protective services agencies. The data were randomly split 80/20. The larger dataset was used to program the computer to detect patterns for financial exploitation and also differentiate between "pure" financial exploitation and "hybrid" financial exploitation. The smaller dataset was used to test the computer models on accuracy in classifying the cases of financial exploitation. The researchers determined that the computer algorithms they developed were reliable in predicting clients who had experienced financial exploitation compared with those who had experienced other forms of elder abuse. The main factors that distinguished the financial exploitation from other abuse types were misuses of financial assets. In distinguishing between "pure" financial exploitation and "hybrid" financial exploitation, the computer algorithms made modest improvements in prediction accuracy compared to chance. The most significant factor that distinguished between "pure" and "hybrid" financial abuse was the presence of an apparent injury, such as bruises and skin tears. The researchers anticipate the data algorithms being transformed into web-based applications.