How is the data-driven, six-step detection approach relevant to

How is the data-driven, six-step detection approach relevant to e-business fraud detection?