Application of Technological Solutions in the Fight Against Money Laundering—A Systematic Literature Review
Abstract
:1. Introduction
- The paper reports on the design, execution and results of a review that systematically identifies a comprehensive set of relevant studies on information technology applications in the fight against money laundering. The study was based on predefined selection criteria, rigorously analyzing and synthesizing the approaches, associated support mechanisms and reported evidence in an easily accessible format.
- The paper structures and classifies the approaches and support mechanisms adopted, as well as the available evidence, using different formats that are expected to be useful to practitioners and researchers concerned. Findings can be used as an evidence-based guide to select appropriate techniques, solutions, approaches or support mechanisms based on the different activities and needs. The findings also identify issues relevant to interested researchers.
Background and Related Work
2. Research Method
2.1. Research Questions
2.2. Search Strategy
2.2.1. Search Method
2.2.2. Search Terms
- Derive key terms from research questions and study topics;
- Identify synonyms, plurals and related terms;
- Use the logical operator “OR” to incorporate synonyms;
- Use the logical operator “AND” to concatenate the parameters;
- Check terms in article titles, abstracts and keywords;
(money laundry OR money laundering OR anti money laundering OR fight money laundering OR fight against money laundering OR combating money laundering OR money laundering prevention) AND (technology OR information technology OR information system OR system) AND (approach OR process OR model OR method OR framework).
2.2.3. Data Sources
2.3. Inclusion and Exclusion Criteria
2.4. Study Selection and Data Extraction
3. Results and Discussions
3.1. Demografic Data
Publication Venues and Citation Count
3.2. Study Quality Assessment
3.3. Question Analysis
3.3.1. Approaches and Application Domains (RQ1 e RQ2)
- Suspicious Transaction Detection (CD1): Category that covers approaches that seek to identify suspicious transactions by applying different methodologies or techniques.
- Money Laundering Pattern/Group/Anomaly Detection (CD2): A category that covers approaches that act by detecting and/or classifying patterns or performing money laundering-focused clusters.
- Risk Assessment/Analysis (CD3): Covers approaches that apply money laundering risk rating techniques by conducting assessments or analyzes.
- Security, control, structuring and/or governance applications (CD4): Covers approaches that apply governance, security, structuring or control techniques focused on money laundering.
- Visual Analysis/Applications of Visual Techniques (CD5): Category of approaches involving applications of techniques, methodologies or visual systems focused on money laundering.
3.3.2. Support Mechanisms (RQ3)
3.3.3. Available Evidence and Context (RQ4 e RQ5)
4. Research Implications and Limitations
- The keywords searched may not all be explicit in the search places such as in the title, keywords or abstract.
- Relevant works may not be found because the String search may not contain the full set of keywords required because of their variety.
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
Appendix A
ID | ACM | IEEE | Scopus | Compendex | ID | ACM | IEEE | Scopus | Compendex | ID | ACM | IEEE | Scopus | Compendex |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
S1 | X | X | S25 | X | X | X | S49 | X | ||||||
S2 | X | X | X | S26 | X | S50 | X | |||||||
S3 | X | X | S27 | X | X | S51 | X | X | ||||||
S4 | X | X | S28 | X | S52 | X | X | X | X | |||||
S5 | X | X | X | S29 | X | S53 | X | |||||||
S6 | X | X | S30 | X | S54 | X | X | |||||||
S7 | X | X | S31 | X | X | S55 | X | X | X | |||||
S8 | X | S32 | X | S56 | X | X | X | |||||||
S9 | X | S33 | X | X | X | X | S57 | X | X | |||||
S10 | X | X | X | X | S34 | X | X | S58 | X | X | X | |||
S11 | X | S35 | X | S59 | X | X | ||||||||
S12 | X | X | S36 | X | S60 | X | ||||||||
S13 | X | X | X | X | S37 | X | S61 | X | X | X | ||||
S14 | X | S38 | X | S62 | X | |||||||||
S15 | X | S39 | X | S63 | X | X | ||||||||
S16 | X | X | X | S40 | X | X | X | S64 | X | X | ||||
S17 | X | S41 | X | X | X | S65 | X | X | X | |||||
S18 | X | X | S42 | X | S66 | X | ||||||||
S19 | X | X | S43 | X | X | X | S67 | X | X | |||||
S20 | X | X | S44 | X | X | X | S68 | X | X | X | ||||
S21 | X | X | X | S45 | X | X | X | S69 | X | X | X | |||
S22 | X | X | S46 | X | S70 | X | ||||||||
S23 | X | X | X | S47 | X | X | S71 | X | X | X | X | |||
S24 | X | X | X | X | S48 | X | X | X |
ID | References | Title | Approach | Author(s) | Venue | Acronym | Year |
---|---|---|---|---|---|---|---|
S1 | [15] | A bayesian approach for suspicious financial activity reporting | Bayesian network (BN) based approach to detect suspicious behavior in financial transactions. | Nida S. Khan, Asma S. Larik, Quratulain Rajput and Sajjad Haider | International Journal of Computers and Applications | IJCAA | 2013 |
S2 | [16] | A clique-based method for mining fuzzy graph patterns in anti-money laundering systems | Click-based method for fuzzy graphic money-mining pattern mining | Bershtein L.S. and Tselykh A.A. | International Conference on Security of Information and Networks | SIN | 2013 |
S3 | [17] | A framework for financial botnet analysis | Framework for detecting, viewing and sharing information about financial botnets | Marco Riccardi, David Oro, Jesus Luna, Marco Cremonini and Marc Vilanova | eCrime Researchers Summit | eCRS | 2010 |
S4 | [18] | A framework for preventing money laundering in bank | A framework for bank money laundering prevention formed by mapping COBIT to COSO | Vandana Pramod, Jinghua Li and Ping Gao | Information Management & Computer Security (Renamed to: Information and Computer Security) | ICS | 2012 |
S5 | [19] | A Money Laundering Risk Evaluation Method Based on Decision Tree | Decision Tree for Creating Money Laundering Risk Determination Rules for Bank Customers | Su-Nan Wang and Jian-Gang Yang | International Conference on Machine Learning and Cybernetics | ICMLC | 2007 |
S6 | [20] | A multi-agent system in the combat against money laundering | Multiagent approach to combating money laundering by capturing suspicious transactions and assisting in analyzing suspicious behavior | Claudio Alexandre and João Balsa | Iberian Journal of Information Systems and Technologies | RISTI | 2017 |
S7 | [21] | A new algorithm for money laundering detection based on structural similarity | Framework for detecting money laundering transactions between large data volumes by reducing the input data set | Reza Soltani, Uyen Trang Nguyen, Yang Yang, Mohammad Faghani, AlaaYagoub and Aijun An | IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference | UEMCON | 2016 |
S8 | [22] | A Novel Multiobjective Approach for Detecting Money Laundering with a Neuro-Fuzzy Technique | Multi-objective approach based on Adaptive Neuro-Diffuse Inference System to recognize bank money laundering and currency exchange | Mohammad (Behdad) Jamshidi, Ali Lalbakhsh, MohammadrezaGorjiankhanzad and Saeed Roshani | IEEE International Conference on Networking, Sensing and Control | ICNSC | 2019 |
S9 | [23] | A RBF neural network model for anti-money laundering | Radial function neural network model based on clustering algorithm APC-III and smaller recursive square algorithm for combating money laundering | Lin-Tao LV, Na Ji and Jiu-Long Zhang | International Conference on Wavelet Analysis and Pattern Recognition | ICWAPR | 2008 |
S10 | [24] | A Scan Statistics Based Suspicious Transactions Detection Model for Anti-money Laundering (AML) in Financial Institutions | Suspicious transaction detection model based on statistical scanning and machine learning | Xuan Liu and Pengzhu Zhang | International Conference on Multimedia Communications | MEDIACOM | 2010 |
S11 | [25] | An advanced network visualization system for financial crime detection | System for visual analysis of financial activity networks through social network analysis and clustering | Walter Didimo, Giuseppe Liotta, Pietro Palladino and Fabrizio Montecchiani | IEEE Pacific Visualization Symposium | APVIS | 2011 |
S12 | [26] | An Agent Based Anti-Money Laundering System Architecture for Financial Supervision | Agent-based anti-money laundering architecture for financial oversight | LiuXuan and Zhang Pengzhu | International Conference on Wireless Communications, Networking and Mobile Computing | WiCOM | 2007 |
S13 | [27] | An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance | Cross-outlier detection model based on distance definition incorporated with financial transaction data capabilities. | Zhu Tianqing | IEEE Asia-Pacific Conference on Services Computing | APSCC | 2006 |
S14 | [28] | Anti-money laundering in financial institutions using affiliation mapping calculation and sequential mining | Affiliation mapping calculation and sequential mining | VikasJayasree and R.V Siva Balan | Journal of Engineering and Applied Sciences | JEAS | 2016 |
S15 | [29] | Anti-money laundering using a two-phase system | Plan-based framework for anti-money laundering systems | Tamer HossamMoustafa, Mohamed ZakiAbd El-Megied and Tarek Salah Sobh and Khaled Mohamed Shafea | Journal of Money Laundering Control | JOMLC | 2015 |
S16 | [30] | Anti-money-laundering System Based on Mainframe and SOA | Mainframe-based money laundering warning system with SOA architectures | Mao Shu, Liu Rui, Li Dancheng and Zhu Shuaizhen | International Conference on Computational Intelligence and Communication Networks | CICN | 2013 |
S17 | [31] | Application of artificial intelligence technologies for the monitoring of transactions in AMLsystems using the example of the developed classification algorithm | Transaction classification algorithm using machine learning methods and graph-based approaches | S.G. Magomedov, A.S. Dobrotvorsky, M.P. Khrestina, S.A. Pavelyev and T.R. Yusubaliev | International Journal of Engineering & Technology | IJET | 2018 |
S18 | [32] | Application of machine analysis algorithms to automate implementation of tasks of combating criminal money laundering | Application of machine analysis algorithms to automate the implementation of anti-money laundering tasks | Dmitry Dorofeev, Marina Khrestina, TimurUsubaliev, Aleksey Dobrotvorskiy and SaveliyFilatov | International Conference on Digital Transformation and Global Society | DTGS | 2018 |
S19 | [33] | Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism | Methodology for automating the generation of new typology-based ML / FT schema variants using Big Data | Kirill Plaksiy, Andrey Nikiforov and Natalia Miloslavskaya | International Conference on Future Internet of Things and Cloud Workshops | FiCLOUDW | 2018 |
S20 | [34] | Applying data mining in money laundering detection for the vietnamese banking industry | Money Laundering Detection Techniques Using Banking Data Transfer Grouping Techniques | Dang Khoa Cao and Phuc Do | Asian Conference on Intelligent Information and Database Systems | ACIIDS | 2012 |
S21 | [35] | Breaking Through Opacity: A Context-Aware Data-Driven Conceptual Design for a Predictive Anti Money Laundering System | Context-driven, data-driven software / hardware approach to physical money tracking | Oussama H. Hamid | IEEE-GCC Conference and Exhibition | GCCCE | 2017 |
S22 | [36] | Clustering based anomalous transaction reporting | Approach to Reporting Cluster-Based Anomalous Financial Transactions | Asma S. Larik and SajjadHaider | World Conference on Information Technology | WCIT | 2011 |
S23 | [37] | CoDetect: Financial Fraud Detection With Anomaly Feature Detection | A framework for detecting financial fraud and resource patterns associated with fraud activity | Dongxu Huang, Dejun Mu, Libin Yang and Xioayan Cai | IEEE Access | IEEE Access | 2018 |
S24 | [38] | Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions | Anti-money laundering model combining digital forensic practices and database analysis methodologies | Denys A. Flores, Olga Angelopoulou, Richard J. Self | International Conference on Emerging Intelligent Data and Web Technologies | EIDWT | 2012 |
S25 | [39] | Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering | Application of intelligent agents to assist preventive controls in anti-money laundering system | Shijia Gao, Dongming Xu, | Expert Systems with Applications | ESWA | 2009 |
S26 | [40] | Data Mining Techniques for Anti-Money Laundering | Use of anti-money laundering data mining techniques based on the evaluation of four types of neural networks | AssemKhalaf Ahmed Allam El-Din and Nashaat El Khamesy | International Journal of Computer Applications | IJCA | 2016 |
S27 | [41] | DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions | Clustering algorithm application to identify suspicious financial transactions and anti-money laundering regulatory enforcement system | Y. Yang, B. Lian, L. Li, C. Chen and P. Li | International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery | CyberC | 2014 |
S28 | [42] | Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering | Unsupervised model for detecting suspected export fraud through deep learning | Ebberth L Paula, Marcelo Ladeira, Rommel N. Carvalho and Thiago Marzagão | IEEE International Conference on Machine Learning and Applications | ICMLA | 2016 |
S29 | [43] | Design of a Monitor for Detecting Money Laundering and Terrorist Financing | Monitoring framework for anti-money laundering systems based on rule base monitoring, behavior detection monitoring, cluster monitoring and link analysis based monitoring | Tamer Hossam Eldin Helmy, Mohamed zakiAbd-ElMegied, Tarek S. Sobh and Khaled Mahmoud Shafea Badran | International Journal of Computer Networks and Applications | IJCNA | 2016 |
S30 | [44] | Detection of Blockchain Transactions Used in Blockchain Mixer of Coin Join Type | Decentralized approach to detecting possible money laundering transactions based on blockchain technology | Artem A. Maksutov, Maxim S. Alexeev, Natalia O. Fedorova and Daniil A. Andreev | IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering | EIConRus | 2019 |
S31 | [45] | Detection of Suspicious Transactions with Database Forensics and Theory of Evidence | Forensic methodology for monitoring database transactions through audit logs and Bayesian classification algorithm | Harmeet Kaur Khanuja and Dattatraya Adane | International Symposium on Security in Computing and Communication | SSCC | 2019 |
S32 | [46] | Developing an intelligent data discriminating system of anti-money laundering based on SVM | Unusual client behavior detection method based on support vector machine | JunTang and Jian Yin | International Conference on Machine Learning and Cybernetics | ICMLC | 2005 |
S33 | [47] | Discovering Hidden Group in Financial Transaction Network Using Hidden Markov Model and Genetic Algorithm | Approach to Hidden Group Discovery in a Hidden Model Markov Financial Transaction Network | Yuhua Li, DongshengDuan, Guanghao Hu and Zhengding Lu | International Conference on Fuzzy Systems and Knowledge Discovery | FSKD | 2009 |
S34 | [48] | Dynamic Approach for Detection of Suspicious Transactions in Money Laundering | Dynamic approach to detecting suspicious behavior-based money laundering transactions through hash method | Anagha A Rao, Kanchana V. | International Journal of Engineering & Technology | IJET | 2018 |
S35 | [49] | Dynamic Risk Model of Money Laundering | Dynamic money laundering risk model based on static risk score | Murad Mehmet, Murat Günestas and Duminda Wijesekera | International Workshop on Risk Assessment and Risk-driven Testing | RISK | 2014 |
S36 | [50] | Event-based approach to money laundering data analysis and visualization | Event-based approach to money laundering data analysis and visualization | Tat-Man Cheong and Yain-Whar Si | International Symposium on Visual Information Communication | VINCI | 2010 |
S37 | [51] | Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti-money laundering | Application of expectations maximization algorithms to detect suspicious transactions | Zhiyuan Chen, Le Dinh Van Khoa, Amril Nazir, Ee Na Teoh and Ettikan Kandasamy Karupiah | IEEE Conference on Open Systems | ICOS | 2014 |
S38 | [52] | Fighting money laundering with technology: A case study of Bank X in the UK | Application of the structural coupling concept to portray the dynamic relationship between computer profile and human profile | Dionysios S. Demetis | Decision Support Systems | DSS | 2018 |
S39 | [53] | Finding shell company accounts using anomaly detection | Application of anomaly detection algorithms to identify ghost companies | Devendra Kumar Luna, Manoj Apte, Girish Keshav Palshikar and Arnab Bhattacharya | ACM India Joint International Conference on Data Science and Management of Data | CODS-COMAD | 2018 |
S40 | [54] | Finding Suspicious Activities in Financial Transactions and Distributed Ledgers | Methodology for exploratory analysis of financial data and information using anomaly detection algorithms | R. D. Camino, R. State, L. Montero and P. Valtchev | IEEE International Conference on Data Mining Workshops | ICDMW | 2017 |
S41 | [55] | Graph mining approach to suspicious transaction detection | Graphic mining machine learning method for suspicious transaction detection | K. Michalak and J. Korczak | Federated Conference on Computer Science and Information Systems | FedCSIS | 2011 |
S42 | [56] | Identifying and tracking online financial services through web mining and latent semantic indexing | Tool application for monitoring and identifying online financial transactions using latent semantic indexing for text mining | Kristen Bernard, Andrew Cassidy, Monica Clark, Kevin Liu, Katrina Lobaton, Drew McNeill and Donald Brown | IEEE Systems and Information Engineering Design Symposium | SIEDS | 2011 |
S43 | [57] | Intelligent Anti-Money Laundering Solution Based upon Novel Community Detection in Massive Transaction Networks on Spark | Method to detect suspected money laundering Communities in massive transaction networks by proposing a Louvain algorithm | X. Li, X. Cao, X. Qiu, J. Zhao and J. Zheng | International Conference on Advanced Cloud and Big Data | CBD | 2017 |
S44 | [58] | Intelligent money laundering monitoring and detecting system | Intelligent agents application for money laundering monitoring and detection based on Simons decision-making theory | Shijia Gao, Dongming Xu, Huaiqing Wang and Yingfeng Wang | European and Mediterranean Conference on Information Systems | EMCIS | 2008 |
S45 | [59] | Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services | Application of visualization techniques to detect fraudulent activity in mobile money transfer services | Evgenia Novikova, Igor Kotenko and Evgenii Fedotov | International Journal of Mobile Computing and Multimedia Communications | IJMCMC | 2014 |
S46 | [60] | Money laundering analysis based on time variant behavioral transaction patterns using data mining | Time-variant approach using behavioral patterns to identify money laundering | Krishnapriya, G and Prabakaran, M | Journal of Theoretical and Applied Information Technology | JATIT | 2014 |
S47 | [61] | Money Laundering Analytics Based on Contextual Analysis. Application of Problem Solving Ontologies in Financial Fraud Identification and Recognition | Application of problem solving ontologies in identifying and recognizing financial fraud | Chmielewski M. and Stąpor P. | International Conference on Information Systems Architecture and Technology | ISAT | 2017 |
S48 | [62] | Money laundering detection using TFA system | Application of mining and clustering algorithms for transaction flow analysis | P. Umadevi and E. Divya | International Conference on Software Engineering and Mobile Application Modelling and Development | ICSEMA | 2012 |
S49 | [63] | Money Laundering Identification on Banking Data Using Probabilistic Relational Audit Sequential Pattern | Application of sequential probabilistic relational audit standard for identification of money laundering in bank data | Vikas Jayasree and R.V. Siva Balan | Asian Journal of Applied Sciences | AJAS | 2015 |
S50 | [64] | Monitor and Detect Suspicious Transactions With Database Forensic Analysis | Database forensic analysis methodology to monitor and detect suspicious transactions | Kaur Khanuja, Harmeet and Adane, Dattatraya | Journal of Database Management | JDM | 2018 |
S51 | [65] | NextGen AML: Distributed Deep Learning based Language Technologies to Augment Anti Money Laundering Investigation | Application of natural language processing techniques for deep learning in money laundering research | Jingguang Han, Utsab Barman, Jer Hayes, Jinhua Du, Edward Burgin and Dadong Wan | Annual Meeting of the Association for Computational Linguistics-System Demonstrations | AMACLSD | 2018 |
S52 | [66] | No Smurfs: Revealing Fraud Chains in Mobile Money Transfers | Application of the model-based approach to PSA@R event-driven process safety analysis | M. Zhdanova, J. Repp, R. Rieke, C. Gaber and B. Hemery | International Conference on Availability, Reliability and Security | ARES | 2014 |
S53 | [67] | On the use of data mining methods for money laundering detection based on financial transactions information | Use of data mining methods in financial transactions for money laundering detection | Ayshan Gasanova, Alexander N. Medvedev, Evgeny I. Komotskiy, Kamen B. Spasov and Igor N. Sachkov | AIP Conference Proceedings | AIP | 2018 |
S54 | [68] | Peer to Peer Anti-Money Laundering Resource Allocation Based on Semi-Markov Decision Process | Anti-money laundering resource allocation based on semi-Markov decision process | Xintao Hong, Hongbin Liang, Lin X. Cai, Zengan Gao and Limin Sun | IEEE Global Communications Conference | GLOBECOM | 2015 |
S55 | [69] | Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering Domains | Real-time decision support approach in multi-agent based exception management | S. Gao and D. Xu | Hawaii International Conference on System Sciences | HICSS | 2010 |
S56 | [70] | Research on anti-money laundering based on core decision tree algorithm | Central decision tree algorithm to identify money laundering activities by combining BIRCH and K-means | R. Liu, X. Qian, S. Mao and S. Zhu | Chinese Control and Decision Conference | CCDC | 2011 |
S57 | [71] | Research on Anti-Money Laundering Hierarchical Model | Hierarchical model of capital flow based on suspicious data to combat money laundering and use of the peso-entopine method | Y. Jin and Z. Qu | IEEE International Conference on Software Engineering and Service Science | ICSESS | 2018 |
S58 | [72] | Research on application of distributed data mining in anti-money laundering monitoring system | Application of data mining techniques to analyze custom transaction behavior | Cheng-wei Zhang and Yu-bo Wang | International Conference on Advanced Computer Control | ICACC | 2010 |
S59 | [73] | Research on Suspicious Financial Transactions Recognition Based on Privacy-Preserving of Classification Algorithm | Application of the privacy preservation rating algorithm to identify suspicious financial transactions | C. Ju and L. Zheng | International Workshop on Education Technology and Computer Science | ETCS | 2009 |
S60 | [74] | Risk-based approach for designing enterprise-wide AML information system solution | Risk-based approach to designing AML information system solution | Ai, Lishan and Tang, Jun | Journal of Financial Crime | JFC | 2011 |
S61 | [75] | Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering | Computational approach to identifying suspicious transactions through sequence matching | Liu X., Zhang P. and Zeng D | International Conference on Intelligence and Security Informatics | CORE | 2008 |
S62 | [76] | Study on Anti-Money Laundering Service System of Online Payment Based on Union-Bank Mode | Dynamic monitoring and analysis of online payment transactions for money laundering identification | Q. Yang, B. Feng and P. Song | International Conference on Wireless Communications, Networking and Mobile Computing | WiCOM | 2007 |
S63 | [77] | Suspicious activity reporting using Dynamic Bayesian Networks | Approach employing a combination of clustering and dynamic Bayesian network (DBN) to identify transaction sequence anomalies | Raza, Saleha and Haider, Sajjad | Procedia Computer Science (World Conference on Information Technology) | WCIT | 2011 |
S64 | [78] | System supporting money laundering detection | Using a Money Laundering Detection Support System Using Clustering and Frequent Patters | Rafat Drezewski, Jan Sepielak and Wojciech Filipkowski | Digital Investigation | DI | 2012 |
S65 | [79] | The application of social network analysis algorithms in a system supporting money laundering detection | Social network analytics application in money laundering detection | Rafal Dreżewski, Jan Sepielak and Wojciech Filipkowski | Information Sciences | IS | 2015 |
S66 | [80] | The DBInspector project | Using High Performance Computing Technology to Implement a Software Environment for Anti-Money Laundering Activities | P. Stofella | International Workshop on Research Issues in Data Engineering | RIDE | 1997 |
S67 | [81] | Toward the discovery and extraction of money laundering evidence from arbitrary data formats using combinatory reductions | Using Comminatory Reductions to Discover and Extract Money Laundering Evidence | Alonza Mumford and Duminda Wijesekera | International Conference on Semantic Technologies for Intelligence, Defense and Security | STIDS | 2014 |
S68 | [82] | Using dynamic risk estimation & social network analysis to detect money laundering evolution | Using dynamic risk estimation and social network analysis to detect the evolution of money laundering | M. Mehmet and D. Wijesekera | IEEE International Conference on Technologies for Homeland Security | HST | 2013 |
S69 | [83] | Using social network analysis to prevent money laundering. | Approach to classifying and mapping relational data and presenting predictive models - based on network metrics - to assess customer risk profiles | Andrea Fronzetti Colladon and Elisa Remondi | Expert Systems With Applications | ESWA | 2017 |
S70 | [84] | Visual exploration of cash flow chains | Interactive visual exploration of financial transaction chains | J. Korczak and W. Łuszczyk | Federated Conference on Computer Science and Information Systems | FedCSIS | 2011 |
S71 | [85] | WireVis: Visualization of Categorical, Time-Varying Data From Financial Transactions | Multi view approach to assist in exploring large volume electronic transaction data | Remco Chang, Mohammad Ghoniem, Robert Kosara, William Ribarsky and Jing Yang | IEEE Symposium on Visual Analytics Science and Technology | VAST | 2007 |
References
- Camdessus, M. Money Laundering: The importance ofinternational countermeasures. In Proceedings of the IMF to the Plenary Meeting of the Financial Action TaskForce on Money Laundering, Paris, France, 10 February 1988; p. 2. [Google Scholar]
- HM Treasury. Anti-Money Laundering Strategy, October 2004. Available online: http://wgfacml.asa.gov.eg/en/doc_interest/doc_sais/0%20UK%20Treasury%20AML%20strategy.pdf (accessed on 4 June 2019).
- Federal Bureau of Investigation (FBI). Combating Money Laundering and Other Forms of Illicit Finance: Regulator and Law Enforcement Perspectives on Reform—Statement for the Record. Criminal Investigative Division, Department of Justice: United States, 2018. Available online: https://www.fbi.gov/news/testimony/combating-money-laundering-and-other-forms-of-illicit-finance (accessed on 2 June 2019).
- United Nations Office on Drugs and Crime (UNODC). Money-Laundering and Globalization. Available online: https://www.unodc.org/unodc/en/money-laundering/globalization.html (accessed on 2 July 2019).
- Basel AML Index: A Country Ranking and Review of Money Laundering and Terrorist Financing Risks around the World, 8th ed.; Basel Institute on Governance, University of Basel: Basel, Switzerland, 2019; Available online: https://www.baselgovernance.org/sites/default/files/2019-10/Basel%20AML%20Index%208%20edition.pdf (accessed on 29 October 2019).
- Ngai, E.W.T.; Hu, Y.; Wong, Y.H.; Chen, Y.; Sun, X. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decis. Support Syst. 2011, 50, 559–569. [Google Scholar] [CrossRef]
- Phua, C.; Lee, V.; Smith, K.; Gayler, R. A Comprehensive Survey of Data Miningbased Fraud Detection Research. Comput. Hum. Behav. 2012, 28, 1002–1013. [Google Scholar]
- Sudjianto, A.; Nair, S.; Yuan, M.; Zhang, A.; Kern, D.; Cela Diaz, F. Statistical Methods for Fighting Financial Crimes. Technometrics 2010, 52, 5–19. [Google Scholar] [CrossRef]
- Semenov, A.; Doropheev, D.; Mazeev, A.; Yusubaliev, T. Survey of Common Design Approaches in AML Software Development. In Proceedings of the GraphHPC-2017 Conference, Moscow, Russia, 2 March 2017; Voevodin, V., Simonov, A., Eds.; Moscow State University: Moscow, Russia, 2017. [Google Scholar]
- Chen, Z.; Dinh, L.; Khoa, V.; Nazir, A.; Teoh, E.N.; Karupiah, E.K.; Lam, K.S. Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: A review. Knowl. Inf. Syst. 2018, 57, 245–285. [Google Scholar] [CrossRef]
- Kitchenham, B.A.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering, EBSE Technical Report version 2.3, EBSE-2017-01; Software Engineering Group; Keele Univ.: Keele, UK; Univ of Durham: Durham, UK, 2007. [Google Scholar]
- Chen, L.; Babar, M.A.; Zhang, H. Towards na evidence-based understanding of eletronic data souces. In Proceedings of the 14th International Conference on Evaluation and Assessment in Software Engineering (EASE), Swindon, UK, 12–13 April 2010; pp. 135–138. [Google Scholar]
- Chen, L.; Babar, M.A.; Cawley, C. A Status Report on the Evaluation of Variability Management Approaches. In Proceedings of the 13th International Conference on Evaluation and Assessment in Software Engineering, EASE’09, Swindon, UK, 20–21 April 2009; pp. 118–127. [Google Scholar]
- Dyba, T.; Dingsoyr, T. Empirical Studies of Agile Software Development: A Systematic Review. Inf. Softw. Technol. 2008, 50, 833–859. [Google Scholar] [CrossRef]
- Khan, N.S.; Larik, A.S.; Rajput, Q.; Haider, S. A Bayesian Approach for Suspicious Financial Activity Reporting. Int. J. Comput. Appl. 2013, 35, 181–187. [Google Scholar] [CrossRef]
- Bershtein, L.S.; Tselykh, A.A. A clique-based method for mining fuzzy graph patterns in anti-money laundering systems. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN’13), New York, NY, USA, 26–28 November 2013; pp. 384–387. [Google Scholar] [CrossRef]
- Riccardi, M.; Oro, D.; Luna, J.; Cremonini, M.; Vilanova, M. A Framework for Financial Botnet Analysis. In Proceedings of the 2010 eCrime Researchers Summit, Dallas, TX, USA, 18–20 October 2010; pp. 1–7. [Google Scholar] [CrossRef]
- Vandana, P.; Jing, L.; Ping, G. A framework for preventing money laundering in banks. Inf. Manag. Comput. Secur. 2012, 20, 170–183. [Google Scholar] [CrossRef]
- Wang, S.; Yang, J. A Money Laundering Risk Evaluation Method Based on Decision Tree. In Proceedings of the 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, China, 19–22 August 2007; pp. 283–286. [Google Scholar] [CrossRef]
- Alexandre, C.; Balsa, J. A Multi-Agent System in the Combat Against Money Laundering. RISTI Porto 2017, 25, 1–17. [Google Scholar] [CrossRef]
- Soltani, R.; Nguyen, U.T.; Yang, Y.; Faghani, M.; Yagoub, A. A new algorithm for money laundering detection based on structural similarity. In Proceedings of the 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 20–22 October 2016; pp. 1–7. [Google Scholar] [CrossRef]
- Jamshidi, M.B.; Gorjiankhanzad, M.; Lalbakhsh, A.; Roshani, S. A Novel Multiobjective Approach for Detecting Money Laundering with a Neuro-Fuzzy Technique. In Proceedings of the 2019 IEEE 16th International Conference on Networking, Sensing and Control (ICNSC), Banff, AB, Canada, 9–11 May 2019; pp. 454–458. [Google Scholar] [CrossRef]
- Lin-Tao, L.; Na, J.; Jiu-Long, Z. A RBF neural network model for anti-money laundering. In Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, China, 30–31 August 2008; pp. 209–215. [Google Scholar] [CrossRef]
- Liu, X.; Zhang, P. A Scan Statistics Based Suspicious Transactions Detection Model for Anti-money Laundering (AML) in Financial Institutions. In Proceedings of the 2010 International Conference on Multimedia Communications, Hong Kong, China, 7–8 August 2010; pp. 210–213. [Google Scholar] [CrossRef]
- Didimo, W.; Liotta, G.; Montecchiani, F.; Palladino, P. An advanced network visualization system for financial crime detection. In Proceedings of the 2011 IEEE Pacific Visualization Symposium, Hong Kong, China, 1–4 March 2011; pp. 203–210. [Google Scholar] [CrossRef]
- Liu, X.; Zhang, P. An Agent Based Anti-Money Laundering System Architecture for Financial Supervision. In Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 21–25 September 2007; pp. 5472–5475. [Google Scholar] [CrossRef]
- Zhu, T. An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance. In Proceedings of the 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC’06), Guangzhou, China, 12–15 December 2006; pp. 601–604. [Google Scholar] [CrossRef]
- Jayasree, V.; Siva, B.R.V. Anti-Money Laundering in Financial Institutions Using Affiliation Mapping Calculation and Sequential Mining. J. Eng. Appl. Sci. 2016, 11, 51–56. [Google Scholar] [CrossRef]
- Tamer, H.M.; Mohamed, Z.A.E.; Tarek, S.S.; Khaled, M.S. Anti money laundering using a two-phase system. J. Money Laund. Control 2015, 18, 304–329. [Google Scholar] [CrossRef]
- Shu, M.; Rui, L.; Dancheng, L.; Shuaizhen, Z. Anti-money-laundering System Based on Mainframe and SOA. In Proceedings of the 2013 5th International Conference and Computational Intelligence and Communication Networks, Mathura, India, 27–29 September 2013; pp. 613–616. [Google Scholar] [CrossRef]
- Magomedov, G.S.; Dobrotvorsky, A.S.; Khrestina, M.P.; Pavelyev, S.A.; Yusubaliev, T.R. Application of Artificial Intelligence Technologies for the Monitoring of Transactions in AML-Systems Using the Example of the Developed Classification Algorithm. Int. J. Eng. Technol. 2018, 7, 76–79. [Google Scholar] [CrossRef]
- Dorofeev, D.; Khrestina, M.; Usubaliev, T.; Dobrotvorskiy, A.; Filatov, S. Application of Machine Analysis Algorithms to Automate Implementation of Tasks of Combating Criminal Money Laundering. In Digital Transformation and Global Society, DTGS 2018, Communications in Computer and Information Science; Alexandrov, D., Boukhanovsky, A., Chugunov, A., Kabanov, Y., Koltsova, O., Eds.; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Plaksiy, K.; Nikiforov, A.; Miloslavskaya, N. Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism. In Proceedings of the 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Barcelona, Spain, 6–8 August 2018; pp. 70–77. [Google Scholar] [CrossRef]
- Cao, D.K.; Do, P. Applying Data Mining in Money Laundering Detection for the Vietnamese Banking Industry. In Asian Conference on Intelligent Information and Database Systems; Pan, J.S., Chen, S.M., Nguyen, N.T., Eds.; Springer: Berlin, Germany, 2012. [Google Scholar]
- Hamid, O.H. Breaking Through Opacity: A Context-Aware Data-Driven Conceptual Design for a Predictive Anti Money Laundering System. In Proceedings of the 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 8–11 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Asma, S.L.; Sajjad, H. Clustering based anomalous transaction reporting. Procedia Comput. Sci. 2011, 3, 606–610. [Google Scholar] [CrossRef] [Green Version]
- Huang, D.; Mu, D.; Yang, L.; Cai, X. CoDetect: Financial Fraud Detection with Anomaly Feature Detection. IEEE Access 2018, 6, 19161–19174. [Google Scholar] [CrossRef]
- Flores, D.A.; Angelopoulou, O.; Self, R.J. Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions. In Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, Bucharest, Romania, 19–21 September 2012; pp. 218–224. [Google Scholar] [CrossRef]
- Shi, G.; Dong, X. Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Syst. Appl. 2009, 36, 1493–1504. [Google Scholar] [CrossRef]
- Khalaf, A.; El, N. Data Mining Techniques for Anti-Money Laundering. Int. J. Comput. Appl. 2016, 146, 28–33. [Google Scholar] [CrossRef]
- Yang, Y.; Lian, B.; Li, L.; Chen, C.; Li, P. DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions. In Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, 13–15 October 2014; pp. 60–65. [Google Scholar] [CrossRef]
- Paula, E.L.; Ladeira, M.; Carvalho, R.N.; Marzagão, T. Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering. In Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA, 18–20 December 2016; pp. 954–960. [Google Scholar] [CrossRef]
- Tamer, H.E.H.; Mohamed, Z.A.E.; Tarek, S.S.; Khaled, M.S.B. Design of a Monitor for Detecting Money Laundering and Terrorist Financing. J. Theor. Appl. Inf. Technol. 2016, 1, 425–436. [Google Scholar]
- Maksutov, A.A.; Alexeev, M.S.; Fedorova, N.O.; Andreev, D.A. Detection of Blockchain Transactions Used in Blockchain Mixer of Coin Join Type. In Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg and Moscow, Russia, 28–31 January 2019; pp. 274–277. [Google Scholar] [CrossRef]
- Khanuja, H.K.; Adane, D. Detection of Suspicious Transactions with Database Forensics and Theory of Evidence. In International Symposium on Security in Computing and Communication; Springer: Singapore, 2019. [Google Scholar]
- Jun, T.; Jian, Y. Developing an intelligent data discriminating system of anti-money laundering based on SVM. In Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 August 2005; pp. 3453–3457. [Google Scholar] [CrossRef]
- Li, Y.; Duan, D.; Hu, G.; Lu, Z. Discovering Hidden Group in Financial Transaction Network Using Hidden Markov Model and Genetic Algorithm. In Proceedings of the 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, Tianjin, China, 14–16 August 2009; pp. 253–258. [Google Scholar] [CrossRef]
- Anagha, A.R.; Kanchana, V. Dynamic Approach for Detection of Suspicious Transactions in Money Laundering. Int. J. Eng. Technol. 2018, 7, 10–13. [Google Scholar] [CrossRef] [Green Version]
- Mehmet, M.; Güneştaş, M.; Wijesekera, D. Dynamic Risk Model of Money Laundering. In Risk Assessment and Risk-Driven Testing, RISK 2013, Lecture Notes in Computer Science; Bauer, T., Großmann, J., Seehusen, F., Stølen, K., Wendland, M.F., Eds.; Springer: Cham, Switzerland, 2014; p. 8418. [Google Scholar] [CrossRef]
- Tat-Man, C.; Yain-Whar, S. Event-based approach to money laundering data analysis and visualization. In Proceedings of the 3rd International Symposium on Visual Information Communication (VINCI’10), Beijing, China, 28–29 September 2010; ACM: New York, NY, USA, 2010. [Google Scholar]
- Chen, Z.; Nazir, A.; Teoh, E.N.; Karupiah, E.K. Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti-money laundering. In Proceedings of the 2014 IEEE Conference on Open Systems (ICOS), Subang, Malaysia, 26–28 October 2014; pp. 145–149. [Google Scholar] [CrossRef]
- Dionysios, S.D. Fighting money laundering with technology: A case study of Bank X in the UK. Decis. Support Syst. 2018, 105, 96–107. [Google Scholar] [CrossRef]
- Devendra, K.L.; Manoj, A.; Girish, K.P.; Arnab, B. Finding Shell Company Accounts Using Anomaly Detection. In Proceedings of the ACM India Joint International Conference on Data Science and Management of Data (CoDS-COMAD ’18), Goa, India, 11–13 January 2018; ACM: New York, NY, USA; pp. 167–174. [Google Scholar] [CrossRef]
- Camino, R.D.; State, R.; Montero, L.; Valtchev, P. Finding Suspicious Activities in Financial Transactions and Distributed Ledgers. In Proceedings of the 2017 IEEE International Conference on Data Mining Workshops (ICDMW), New Orleans, LA, USA, 18–21 November 2017; pp. 787–796. [Google Scholar] [CrossRef]
- Michalak, K.; Korczak, J. Graph mining approach to suspicious transaction detection. In Proceedings of the 2011 Federated Conference on Computer Science and Information Systems (FedCSIS), Szczecin, Poland, 18–21 September 2011; pp. 69–75, ISBN 978-83-60810-39-2. [Google Scholar]
- Bernard, K.; Cassidy, A.; Clark, M.; Liu, K.; Lobaton, K.; McNeill, D.; Brown, D. Identifying and tracking online financial services through web mining and latent semantic indexing. In Proceedings of the 2011 IEEE Systems and Information Engineering Design Symposium, Charlottesville, VA, USA, 29 April 2011; pp. 158–163. [Google Scholar] [CrossRef]
- Li, X.; Cao, X.; Qiu, X.; Zhao, J.; Zheng, J. Intelligent Anti-Money Laundering Solution Based upon Novel Community Detection in Massive Transaction Networks on Spark. In Proceedings of the 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), Shanghai, China, 13–16 August 2017; pp. 176–181. [Google Scholar] [CrossRef]
- Wang, Y.; Wang, H.; Gao, S.; Xu, D. Intelligent money laundering monitoring and detecting system. In Proceedings of the European and Mediterranean Conference on Information Systems, EMCIS, Al Bustan Rotana Hotel, Dubai, UAE, 25–26 May 2008. [Google Scholar] [CrossRef]
- Novikova, E.; Kotenko, I.; Fedotov, E. Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services. Int. J. Mob. Comput. Multimed. Commun. 2014, 6, 73–97. [Google Scholar] [CrossRef]
- Krishnapriya, G.; Prabakaran, M. Money laundering analysis based on time variant behavioral transaction patterns using data mining. J. Theor. Appl. Inf. Technol. 2014, 67, 12–17. [Google Scholar]
- Chmielewski, M.; Stąpor, P. Money Laundering Analytics Based on Contextual Analysis. Application of Problem Solving Ontologies in Financial Fraud Identification and Recognition. Information Systems Architecture and Technology. In ISAT 2016—Part I. Advances in Intelligent Systems and Computing, Proceedings of the 37th International Conference on Information Systems Architecture and Technology, Karpacz, Poland, 18–20 September 2016; Borzemski, L., Grzech, A., Świątek, J., Wilimowska, Z., Eds.; Springer: Cham, Switzerland, 2017; p. 521. [Google Scholar] [CrossRef]
- Umadevi, P.; Divya, E. Money laundering detection using TFA system. In Proceedings of the International Conference on Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), Chennai, India, 19–21 December 2012; pp. 1–8. [Google Scholar] [CrossRef]
- Jayasree, V.; Siva Balan, R.V. Money Laundering Identification on Banking Data Using Probabilistic Relational Audit Sequential Pattern. Asian J. Appl. Sci. 2015, 8, 173–184. [Google Scholar] [CrossRef] [Green Version]
- Kaur, K.H.; Adane, D. Monitor and Detect Suspicious Transactions with Database Forensic Analysis. J. Database Manag. 2018. [Google Scholar] [CrossRef]
- Han, J.; Barman, U.; Hayes, J.; Du, J.; Burgin, E.; Wan, D. NextGen AML: Distributed Deep Learning based Language Technologies to Augment Anti Money Laundering Investigation. In Proceedings of the ACL 2018, System Demonstrations, Melbourne, Australia, 15–20 July 2018; Association for Computational Linguistics; pp. 37–42. [Google Scholar] [CrossRef]
- Zhdanova, M.; Repp, J.; Rieke, R.; Gaber, C.; Hemery, B. No Smurfs: Revealing Fraud Chains in Mobile Money Transfers. In Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security, Fribourg, Switzerland, 8–12 September 2014; pp. 11–20. [Google Scholar] [CrossRef]
- Gasanova, A.; Medvedev, A.N.; Komotskiy, E.I.; Spasov, K.B.; Sachkov, I.N. On the Use of Data Mining Methods for Money Laundering Detection Based on Financial Transactions Information. In Proceedings of the International Conference of Computational Methods in Sciences and Engineering 2018, ICCMSE 2018, Thessaloniki, Greece, 14–18 March 2018; Volume 2040. [Google Scholar] [CrossRef]
- Hong, X.; Liang, H.; Cai, L.X.; Gao, Z.; Sun, L. Peer to Peer Anti-Money Laundering Resource Allocation Based on Semi-Markov Decision Process. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Gao, S.; Xu, D. Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering Domains. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA, 5–8 January 2010; pp. 1–10. [Google Scholar] [CrossRef]
- Liu, R.; Qian, X.; Mao, S.; Zhu, S. Research on anti-money laundering based on core decision tree algorithm. In Proceedings of the 2011 Chinese Control and Decision Conference (CCDC), Mianyang, China, 23–25 May 2011; pp. 4322–4325. [Google Scholar] [CrossRef]
- Jin, Y.; Qu, Z. Research on Anti-Money Laundering Hierarchical Model. In Proceedings of the 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 23–25 November 2018; pp. 406–411. [Google Scholar] [CrossRef]
- Zhang, C.; Wang, Y. Research on application of distributed data mining in anti-money laundering monitoring system. In Proceedings of the 2010 2nd International Conference on Advanced Computer Control, Shenyang, China, 27–29 March 2010; pp. 133–135. [Google Scholar] [CrossRef]
- Ju, C.; Zheng, L. Research on Suspicious Financial Transactions Recognition Based on Privacy-Preserving of Classification Algorithm. In Proceedings of the 2009 First International Workshop on Education Technology and Computer Science, Wuhan, China, 7–8 March 2009; pp. 525–528. [Google Scholar] [CrossRef]
- Lishan, A.; Tang, J. Risk-based approach for designing enterprise-wide AML information system solution. J. Financ. Crime 2011, 18. [Google Scholar] [CrossRef]
- Liu, X.; Zhang, P.; Zeng, D. Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering. In Intelligence and Security Informatics, ISI 2008, Lecture Notes in Computer Science; Yang, C.C., Ed.; Springer: Berlin, Germany, 2008; p. 5075. [Google Scholar] [CrossRef]
- Yang, Q.; Feng, B.; Song, P. Study on Anti-Money Laundering Service System of Online Payment Based on Union-Bank Mode. In Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 21–25 September 2007; pp. 4991–4994. [Google Scholar] [CrossRef]
- Raza, S.; Haider, S. Suspicious activity reporting using Dynamic Bayesian Networks. Procedia Comput. Sci. 2011, 3, 987–991. [Google Scholar] [CrossRef]
- Drezewski, R.; Sepielak, J.; Filipkowski, W. System supporting money laundering detection. Digit. Investig. 2012, 9, 8–21. [Google Scholar] [CrossRef]
- Dreżewski, R.; Sepielak, J.; Filipkowski, W. The application of social network analysis algorithms in a system supporting money laundering detection. Inf. Sci. 2015, 295, 18–32. [Google Scholar] [CrossRef]
- Stofella, P. The DBInspector Project. In Proceedings Seventh International Workshop on Research Issues in Data Engineering; High Performance Database Management for Large-Scale Applications: Birmingham, UK, 1997; pp. 73–75. [Google Scholar] [CrossRef]
- Mumford, A.; Wijesekera, D. Toward the discovery and extraction of money laundering evidence from arbitrary data formats using combinatory reductions. In Proceedings of the International Conference on Semantic Technologies for Intelligence, Defense, and Security, Fairfax, VA, USA, 18–21 November 2014; pp. 32–39. [Google Scholar]
- Mehmet, M.; Wijesekera, D. Using dynamic risk estimation & social network analysis to detect money laundering evolution. In Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 12–14 November 2013; pp. 310–315. [Google Scholar] [CrossRef]
- Colladon, A.F.; Remondi, E. Using social network analysis to prevent money laundering. Expert Syst. Appl. 2017, 67, 49–58. [Google Scholar] [CrossRef]
- Korczak, J.; Łuszczyk, W. Visual exploration of cash flow chains. In Proceedings of the 2011 Federated Conference on Computer Science and Information Systems (FedCSIS), Szczecin, Poland, 18–21 September 2011; pp. 41–46, ISBN 978-83-60810-39-2. [Google Scholar]
- Chang, R.; Ghoniem, M.; Kosara, R.; Ribarsky, W.; Yang, J. Wirevis: Visualization of Categorical, Time-Varying Data from Financial Transactions. In Proceedings of the 2007 IEEE Symposium on Visual Analytics Science and Technology, Sacramento, CA, USA, 30 October–1 November 2007; pp. 155–162. [Google Scholar] [CrossRef]
Research Question | Motivation |
---|---|
RQ1: What approaches have been suggested or used to combat money laundering that adopt information systems and/or information technology solutions? | The purpose of this question is to identify which anti-money laundering approaches are present in the literature and which use information systems and/or information technology solutions. |
RQ2: What are the different application domains of the identified approaches? | This question seeks to identify the application domains or purposes of the approaches, as well as the frequency of application. This information can help practitioners and researchers identify the application domains that have gained the most interest in combating money laundering. |
RQ3: What types of support mechanisms are part and/or have been suggested or applied? | What tools, techniques, systems, standards, among other mechanisms have been proposed or used to support or achieve the objectives of the approaches? This information can assist researchers and practitioners in identifying trends in the use of money laundering solutions, techniques, tools and other mechanisms. |
RQ4: How much evidence is available to support the adoption of anti-money laundering approaches? | The purpose of this question is to gain knowledge of the maturity of the proposed approaches. This research question is of interest to practitioners and researchers when they want to further adopt or evaluate existing approaches. Maturity is measured based on the level of evidence as described in Section 2.4. |
RQ5: What are the contexts addressed? | The intent of this question is to identify in what context the study was applied, that is, if it was an experiment in the academy or if the validation or evaluation was performed in any organization/institution or with actual data from it. If the work describes validations in both contexts, the industrial context will be considered for the purpose of work evaluation. |
Electronic Database | Search Terms are Matched With | Web Address | Publications Found |
---|---|---|---|
IEEE Xplore Digital Library | Paper title, keywords, abstract | http://ieeexplore.ieee.org | 76 |
ACM Digital Library | Paper title, keywords | http://dl.acm.org | 77 |
El Compendex | Paper title, keywords, abstract | www.engineeringvillage.com | 194 |
Elsevier Scopus | Paper title, keywords, abstract | http://www.scopus.com | 448 |
Inclusion Criteria | |
I1 | Money laundering related work addressing the use of information technology and/or information systems. |
Exclusion Criteria | |
E1 | Duplicate publications (even with different references). |
E2 | Standards, models, industry standards. |
E3 | Editorials, position papers, keynotes, reviews, summaries tutorials, books, courses or workshops, panel discussions. |
E4 | Non-scientific publications |
E5 | Publications that do not meet the inclusion criteria |
Objective | Data Item | Objective | Data Item |
---|---|---|---|
General data | Title | RQ5 | Context |
Author(s) | Q1 | Study Objectives | |
Year of publication | Q2 | Context Description | |
Venue | Q3 | Research Project description | |
Paper Summary | Q4 | Data analysis | |
RQ1 | Approach Used | Q5 | Presentation of conclusions |
RQ2 | Application domain | Q6 | Critical analysis |
RQ3 | Support Mechanisms | Q7 | Credibility and limitations |
RQ4 | Evidence level |
Level | Classification | Description |
---|---|---|
0 | Without evidence | No evidence of validation or evaluation. |
1 | Demonstration or usage example | The authors describe an application and provide an example to aid in its description. |
2 | Expert Notes | Some textual, qualitative assessments or opinions are provided. For example, it compares and contrasts the advantages and disadvantages. |
3 | Laboratory experiment | The result is obtained from simulations with artificial data used in real experiments. Evidence is collected informally or formally. |
4 | Empirical Investigation | Investigate the behavior of the proposed approach within a real context. |
5 | Strict analysis | Use of a more formal methodology to evaluate and validate the study. For example, defining questions and variables to be analyzed while applying the approach. |
Publication Venue | # | % | Publication Venue | # | % | Publication Venue | # | % |
---|---|---|---|---|---|---|---|---|
ESWA | 2 | 308 | eCRS | 1 | 154 | IJCAA | 1 | 154 |
FedCSIS | 2 | 308 | EIConRus | 1 | 154 | IJCNA | 1 | 154 |
ICMLC | 2 | 308 | EIDWT | 1 | 154 | IJMCMC | 1 | 154 |
IJET | 2 | 308 | EMCIS | 1 | 154 | IS | 1 | 154 |
WCIT | 2 | 308 | ETCS | 1 | 154 | ISAT | 1 | 154 |
WiCOM | 2 | 308 | FiCLOUDW | 1 | 154 | JATIT | 1 | 154 |
ACIIDS | 1 | 154 | FSKD | 1 | 154 | JDM | 1 | 154 |
AIP | 1 | 154 | GCCCE | 1 | 154 | JEAS | 1 | 154 |
AJAS | 1 | 154 | GLOBECOM | 1 | 154 | JFC | 1 | 154 |
AMACLSD | 1 | 154 | HICSS | 1 | 154 | JOMLC | 1 | 154 |
APSCC | 1 | 154 | HST | 1 | 154 | MEDIACOM | 1 | 154 |
APVIS | 1 | 154 | ICACC | 1 | 154 | RIDE | 1 | 154 |
ARES | 1 | 154 | ICDMW | 1 | 154 | RISK | 1 | 154 |
CBD | 1 | 154 | ICMLA | 1 | 154 | RISTI | 1 | 154 |
CCDC | 1 | 154 | ICNSC | 1 | 154 | SIEDS | 1 | 154 |
CICN | 1 | 154 | ICOS | 1 | 154 | SIN | 1 | 154 |
CODS-COMAD | 1 | 154 | ICS | 1 | 154 | SSCC | 1 | 154 |
CORE | 1 | 154 | ICSEMA | 1 | 154 | STIDS | 1 | 154 |
CyberC | 1 | 154 | ICSESS | 1 | 154 | UEMCON | 1 | 154 |
DI | 1 | 154 | ICWAPR | 1 | 154 | VAST | 1 | 154 |
DSS | 1 | 154 | IEEE Access | 1 | 154 | VINCI | 1 | 154 |
DTGS | 1 | 154 | IJCA | 1 | 154 |
Studies ID | Citation Counts | Studies ID | Citation Counts | Studies ID | Citation Counts |
---|---|---|---|---|---|
[S71] | 123 | [S1] | 11 | S21 | 2 |
[S25] | 72 | [S12] | 11 | S43 | 2 |
[S32] | 53 | [S48] | 10 | S44 | 2 |
[S65] | 50 | [S23] | 9 | S46 | 2 |
[S5] | 41 | [S38] | 9 | S66 | 2 |
[S69] | 40 | [S27] | 7 | S15 | 1 |
[S9] | 33 | [S29] | 7 | S19 | 1 |
[S64] | 31 | [S36] | 7 | S30 | 1 |
[S11] | 30 | [S42] | 6 | [S31] | 1 |
[S28] | 30 | [S2] | 5 | [S40] | 1 |
[S61] | 30 | [S33] | 5 | [S54] | 1 |
[S41] | 25 | [S37] | 5 | [S58] | 1 |
[S13] | 23 | [S59] | 5 | [S6] | 1 |
[S4] | 23 | [S60] | 5 | [S17] | 0 |
[S56] | 22 | [S70] | 5 | [S18] | 0 |
[S3] | 20 | [S16] | 4 | [S34] | 0 |
[S63] | 20 | [S45] | 4 | [S35] | 0 |
[S22] | 18 | [S26] | 3 | [S39] | 0 |
[S10] | 16 | [S47] | 3 | [S50] | 0 |
[S55] | 16 | [S49] | 3 | [S53] | 0 |
[S52] | 14 | [S51] | 3 | [S57] | 0 |
[S62] | 13 | [S68] | 3 | [S67] | 0 |
[S20] | 12 | [S7] | 3 | [S8] | 0 |
[S24] | 12 | [S14] | 2 |
Countries/Categories | CD1 | CD2 | CD3 | CD4 | CD5 |
---|---|---|---|---|---|
China (20) | [S9], [S10], [S12], [S13], [S16], [S27], [S32], [S44], [S54], [S58], [S59], [S61], [S62] | [S23], [S33], [S36], [S43] | [S5], [S60] | [S57] | |
India (8) | [S14], [S31], [S34], [S48], [S50] | [S39], [S46], [S49] | |||
Russia (7) | [S17], [S18], [S19], [S30], [S53] | [S2] | [S45] | ||
Poland (5) | [S41], [S47], [S64] | [S65] | [S70] | ||
United States (5) | [S42], [S56] | [S68] | [S67] | [S71] | |
Pakistan (3) | [S1], [S22], [S63] | ||||
United Kingdom (3) | [S24] | [S4], [S38] | |||
Egypt (3) | [S15], [S29] | [S26] | |||
Australia (2) | [S25], [S55] | ||||
Italy (2) | [S69] | [S66] | |||
Spain (1) | [S3] | ||||
Portugal (1) | [S6] | ||||
Canada (1) | [S7] | ||||
Iran (1) | [S8] | ||||
Italy (1) | [S11] | ||||
Vietnam (1) | [S20] | ||||
Iraq (1) | [S21] | ||||
Brazil (1) | [S28] | ||||
Turkey (1) | [S35] | ||||
Malaysia (1) | [S37] | ||||
Luxembourg (1) | [S40] | ||||
Ireland (1) | [S51] | ||||
Germany (1) | [S52] |
ID | Study Quality Assessment Question | Yes | Partially | No |
---|---|---|---|---|
Q1 | Are the aims and objectives of the study clearly specified? | 59 (83.1%) | 12 (16.9%) | 0 (0%) |
Q2 | Is the context of the study clearly stated? | 7 (9.9%) | 34 (47.9%) | 30 (42.3%) |
Q3 | Does the research design support the aims of the study? | 8 (11.3%) | 36 (50.7%) | 27 (38.0%) |
Q4 | Has the study an adequate description of the data analysis? | 8 (11.3%) | 23 (32.4%) | 40 (56.3%) |
Q5 | Is there a clear statement of findings and was sufficient data provided to support them? | 17 (23.9%) | 36 (50.7%) | 18 (24.4%) |
Q6 | Do the researchers critically examine their potential bias and influence to the study? | 2 (2.8%) | 9 (12.7%) | 60 (84.5%) |
Q7 | Are the limitations of the study discussed explicitly? | 3 (4.2%) | 14 (19.7%) | 54 (76.1%) |
Category | Studies |
---|---|
CD1: Suspicious transaction detection | [S1], [S6], [S9], [S10], [S12], [S13], [S14], [S15], [S16], [S17], [S18], [S19], [S22], [S24], [S27], [S29], [S30], [S31], [S32], [S34], [S37], [S40], [S41], [S44], [S47], [S48], [S50], [S51], [S52], [S53], [S54], [S58], [S59], [S61], [S62], [S63], [S64] |
CD2: Pattern detection/groups/money laundering anomalies | [S2], [S7], [S20], [S21], [S23], [S26], [S28], [S33], [S36], [S39], [S42], [S43], [S46], [S49], [S56], [S65] |
CD3: Risk Assessment/Analysis | [S5], [S8], [S35], [S60], [S68], [S69] |
CD4: Security, control, structuring and/or governance applications | [S3], [S4], [S25], [S38], [S55], [S67] |
CD5: Visual Analysis/Applications of Visual Techniques | [S11], [S45], [S57], [S66], [S70], [S71] |
Support Mechanism Categories | Techniques/Mechanism | Studies | |
---|---|---|---|
C1: Systems/Software/Tools/Programming Languages | Malware Analysis | [S3] | |
Mainframe, SOA | [S16] | ||
Big Data | [S19] | ||
Forensic Practices | [S24] | ||
Semantic Web, Data models, Functional programming, Data processing, Formal languages | [S67] | ||
Others | [S5], [S6], [S7], [S8], [S14], [S15], [S21], [S25], [S28], [S42], [S43], [S45], [S47], [S50], [S51], [S53] | ||
C2: Hardware′s | Others | [S16], [S21], [S66] | |
C3: Patterns/Theories/Frameworks | COBIT-COSO | [S4] | |
Decision making theory, Multi-agent, Cognitive Approach | [S44] | ||
Structural Coupling (System Theory) | [S38] | ||
Predictive Security Analysis | [S52] | ||
Semi-Markov Decision, Process (SMDP), Resource Allocation, Maximal Rewards | [S54] | ||
Simon′s decision-making/problem-solving process theory, Cynefin sense-making framework, Multi-agent | [S55] | ||
Hierarchical Model Algorithms, Multi-attribute Evaluation, Entropy-weight Method | [S57] | ||
Risk Analysis, Link Analysis, Behavior Profiling | [S60] | ||
C4: Algorithms/Mathematical Application (data mining and machine learning) | Application Class | Technique | Studies |
Classification | Decision Trees | [S5] | |
Bayesian Network | [S1] | ||
Sequential Patter, Analysis, Affiliation Mapping | [S14] | ||
Machine Learning, SVM (support vector machine), Random Forest, Logical Regression | [S17], [S18] | ||
Neural Networks, Network Analysis | [S26], [S28], [S30], [S35] | ||
Behavioral Patter, Separation (BPS) | [S46] | ||
Natural Language Processing, Sentiment Analysis, Link Analysis, Fuzzy Logic, Neural Network | [S51] | ||
Privacy-Preserving, Decision tree | [S59] | ||
Euclidean distance sequence matching | [S61] | ||
Multi-agent, Neural Network, Genetic Algorithms, Velocity Analysis, Fuzzy Logic, Case-based Reasoning | [S62] | ||
Patter Recognition, Sequence Matching, Case-based Analysis, Network Analysis, Complex Event Processing | [S68] | ||
Regression | Logistic model | [S42] | |
Outlier Detection/Approximation | Outlier Point Analysis, Statistic Pattern Recognition, Machine Learning | [S10], [S12], [S13] | |
Rule-based Bayesian Classification algorithm | [S31] | ||
Support Vector Machine | [S32] | ||
RRS, FastVOA, LOF | [S39] | ||
Isolation Forest (IF), One Class SVM, Gaussian Mixture Models | [S40] | ||
Forensic Analysis, Rule based Dempster Shafer Theory of Evidence | [S50] | ||
Clustering | K-Means | [S6], [S22], [S23] | |
Decision Tree, K-Means, BIRCH | [S56] | ||
Structural Similarity | [S7] | ||
Neural Networks, Fuzzy Logic | [S2], [S8], [S25], [S41] | ||
Affinity Propagation Clustering (APC) | [S9] | ||
Network/Link analysis, Visualization | [S15], [S21], [S29], [S36], [S53], [S69], [S71] | ||
CLOPE Algorithm | [S20] | ||
Network/Link analysis, DBSCAN | [S27] | ||
K-Cores, Network/Link analysis, Visualization | [S11] | ||
Hidden Model Markov, Genetic Algorithm | [S33] | ||
Hash-based algorithm, Link analysis | [S34] | ||
Expectation Maximization | [S37] | ||
Louvain algorithm | [S43] | ||
OntologyNetwork Analysis | [S47] | ||
Probabilistic Relational Model, Association Mapping, Audit Sequential Patter | [S49] | ||
K-Means, Frequent Pattern, Visualization, Sequence Miner, BI-Directional Extension checkin-BIDE | [S48] | ||
Distributed Association Rule Analysis | [S58] | ||
Bayesian Network | [S63] | ||
Frequent Pattern, Network Analysis, Visualization | [S64], [S65] | ||
Neural Patter Recognition, Visualization | [S66] | ||
Visualization | RadViz, Heat Map, Graphs | [S45] | |
Heuristics Evolutionary Algorithm | [S70] |
Evidence Level | Context | |
---|---|---|
Academic | Industrial | |
0: Without evidence | [S2], [S12], [S16], [S21], [S47], [S56], [S60], [S62], [S66], [S67] | X |
1: Demonstration or usage example | [S4], [S8], [S17], [S18], [S19], [S24], [S29], [S30], [S51], [S53], [S55] | [S25] |
2: Expert Notes | X | X |
3: Laboratory experiment | [S3], [S5], [S7], [S9], [S11], [S34], [S35], [S39], [S41], [S42], [S43], [S44], [S45], [S46], [S48], [S49], [S52], [S54], [S57], [S58], [S59], [S64], [S65] | [S10], [S20], [S26], [S27], [S33] |
4: Empirical Investigation | X | [S1], [S6], [S13], [S14], [S28], [S31], [S32], [S36], [S37], [S38], [S40], [S50], [S61], [S63], [S68], [S70], [S71] |
5: Strict analysis | X | [S15], [S22], [S23], [S69] |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sobreira Leite, G.; Bessa Albuquerque, A.; Rogerio Pinheiro, P. Application of Technological Solutions in the Fight Against Money Laundering—A Systematic Literature Review. Appl. Sci. 2019, 9, 4800. https://doi.org/10.3390/app9224800
Sobreira Leite G, Bessa Albuquerque A, Rogerio Pinheiro P. Application of Technological Solutions in the Fight Against Money Laundering—A Systematic Literature Review. Applied Sciences. 2019; 9(22):4800. https://doi.org/10.3390/app9224800
Chicago/Turabian StyleSobreira Leite, Gleidson, Adriano Bessa Albuquerque, and Plácido Rogerio Pinheiro. 2019. "Application of Technological Solutions in the Fight Against Money Laundering—A Systematic Literature Review" Applied Sciences 9, no. 22: 4800. https://doi.org/10.3390/app9224800
APA StyleSobreira Leite, G., Bessa Albuquerque, A., & Rogerio Pinheiro, P. (2019). Application of Technological Solutions in the Fight Against Money Laundering—A Systematic Literature Review. Applied Sciences, 9(22), 4800. https://doi.org/10.3390/app9224800