skip to main content
Article

Applying data mining in investigating money laundering crimes

Published: 24 August 2003 Publication History

Abstract

In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- that of automatic community generation based on uni-party data, the data in which there is no direct or explicit link information available. Consequently, we have proposed a new methodology for Link Discovery based on Correlation Analysis (LDCA). We have used MLC group model generation as an exemplary application of this problem paradigm, and have focused on this application to develop a specific method of automatic MLC group model generation based on timeline analysis using the LDCA methodology, called CORAL. A prototype of CORAL method has been implemented, and preliminary testing and evaluations based on a real MLC case data are reported. The contributions of this work are: (1) identification of the uni-party data community generation problem paradigm, (2) proposal of a new methodology LDCA to solve for problems in this paradigm, (3) formulation of the MLC group model generation problem as an example of this paradigm, (4) application of the LDCA methodology in developing a specific solution (CORAL) to the MLC group model generation problem, and (5) development, evaluation, and testing of the CORAL prototype in a real MLC case data.

References

[1]
Domingos, P. and Hulten, D., Catching up with the data: research issues in mining data streams, Proc. Workshop on Research Issues in Data Mining and Knowledge Discovery, 2001.
[2]
Gibson, D., Kleinberg, J., and Raghavan, P., Inferring Web communities from link topoploy, Proc. HyperText98, 1998.
[3]
Goldberg, H. G. and Senator, T. E., Break detection systems, Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, AAAI Press, 1997.
[4]
Jain, R., Kasturi, R., and Schunck, B. G., Machine Vision, Prentice Hall, 1995.
[5]
Jensen, D., Prospective assessment of A1 technologies for fraud detection: A case study, Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997.
[6]
Scott., J. Social Network Analysis: A handbook, SAGE Publications, 1991.
[7]
Shardanand, U. and Maes, P., Social information filtering: algorithms for automating "world of mouth", Proc. ACM CHI, 1995.
[8]
Toyoda, M. and Kitsuregawa, M., Creating a Web community chart for navigating related communities, Proc. ACM HT, 2001.
[9]
Vertan, C. and Boujemaa, N., Embedding fuzzy logic in content based image retrieval, Proc. 19th Int'l Meeting of North America Fuzzy Information Processing Society, 2000.

Cited By

View all
  • (2024)A Comprehensive Survey on the Role of Law in Different Applications in Computer ScienceSocial Sciences10.11648/j.ss.20241305.1713:5(192-196)Online publication date: 10-Oct-2024
  • (2024)Structural entropy minimization combining graph representation for money laundering identificationInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02129-z15:9(3951-3968)Online publication date: 10-Apr-2024
  • (2024)The effects of auditing and reporting standards and country‐level governance on money laundering: A cross‐country analysisJournal of Public Affairs10.1002/pa.293524:3Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
August 2003
736 pages
ISBN:1581137370
DOI:10.1145/956750
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 August 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CORAL
  2. Link Discovery based on Correlation Analysis (LDCA)
  3. MLC Group Models
  4. Money Laundering Crimes (MLCs)
  5. bi-party data
  6. clustering
  7. community generation
  8. histogram
  9. timeline analysis
  10. uni-party data

Qualifiers

  • Article

Conference

KDD03
Sponsor:

Acceptance Rates

KDD '03 Paper Acceptance Rate 46 of 298 submissions, 15%;
Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)46
  • Downloads (Last 6 weeks)4
Reflects downloads up to 25 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Comprehensive Survey on the Role of Law in Different Applications in Computer ScienceSocial Sciences10.11648/j.ss.20241305.1713:5(192-196)Online publication date: 10-Oct-2024
  • (2024)Structural entropy minimization combining graph representation for money laundering identificationInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02129-z15:9(3951-3968)Online publication date: 10-Apr-2024
  • (2024)The effects of auditing and reporting standards and country‐level governance on money laundering: A cross‐country analysisJournal of Public Affairs10.1002/pa.293524:3Online publication date: Jul-2024
  • (2023)Incorporating machine learning and a risk-based strategy in an anti-money laundering multiagent systemExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.119500217:COnline publication date: 1-May-2023
  • (2023)Trust the Machine and Embrace Artificial Intelligence (AI) to Combat Money Laundering ActivitiesComputational Intelligence for Modern Business Systems10.1007/978-981-99-5354-7_4(63-81)Online publication date: 4-Nov-2023
  • (2022)Verifying the Correctness of Analytic Query ResultsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2020.303731334:9(4527-4537)Online publication date: 1-Sep-2022
  • (2021)A Study on Various Applications of Data Mining and Supervised Learning Techniques in Business Fraud DetectionMachine Learning Applications for Accounting Disclosure and Fraud Detection10.4018/978-1-7998-4805-9.ch008(108-125)Online publication date: 2021
  • (2021)Variational Autoencoders and Wasserstein Generative Adversarial Networks for Improving the Anti-Money Laundering ProcessIEEE Access10.1109/ACCESS.2021.30863599(83762-83785)Online publication date: 2021
  • (2021)Deep Learning and Explainable Artificial Intelligence Techniques Applied for Detecting Money Laundering–A Critical ReviewIEEE Access10.1109/ACCESS.2021.30862309(82300-82317)Online publication date: 2021
  • (2020)Money laundering through exchange officesJournal of Money Laundering Control10.1108/JMLC-07-2019-005926:3(445-461)Online publication date: 20-Jan-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media