2012 Third International Conference on Emerging Intelligent Data and Web Technologies 2012
DOI: 10.1109/eidwt.2012.22
|View full text |Cite
|
Sign up to set email alerts
|

Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Consumer conduct in speculation actions is complexs incenumerous influences effect it, likewise show that by selecting appropriate scopes, modest DM practices can be functional composed to detect mistrustful ML belongings in speculation doings [10]. Hence, in this paper, present a onestep clustering approach basing on some heuristics from AML experts to improve the performance of our previous solution in the term of running time [13].…”
Section: Related Workmentioning
confidence: 95%
“…Consumer conduct in speculation actions is complexs incenumerous influences effect it, likewise show that by selecting appropriate scopes, modest DM practices can be functional composed to detect mistrustful ML belongings in speculation doings [10]. Hence, in this paper, present a onestep clustering approach basing on some heuristics from AML experts to improve the performance of our previous solution in the term of running time [13].…”
Section: Related Workmentioning
confidence: 95%
“…Nonetheless, these controls cannot protect the database from unauthorised access when it is directly compromised by insiders [8] who take advantage of their credential privileges in order to alter sensitive information. For instance during the CNE database investigation, it was found that malicious employees were responsible of altering database records of political parties [6], even though records and audit trails were not found.…”
Section: B Database Intrusion Detection Module (Db-idm)mentioning
confidence: 98%
“…Second, the lack of security controls at back-end level prevent authorities to find evidence and audit trails to prosecute malicious individuals, some of them employees [8], who illegally use access privileges to alter database records without being discovered. In the previous CNE example, it was found that this database was not prevented from being accessed without permission, being unclear whether or not the user credentials were managed properly, as evidence based on audit logs where not found in the suspicious database [6].…”
Section: Introductionmentioning
confidence: 99%