2015
DOI: 10.1016/j.ins.2014.10.015
|View full text |Cite
|
Sign up to set email alerts
|

The application of social network analysis algorithms in a system supporting money laundering detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 103 publications
(52 citation statements)
references
References 5 publications
0
50
0
2
Order By: Relevance
“…We propose to use top-level theory to identify which topological feature should be considered in the calculations and to use domain knowledge explicitly. As an example, similar to our proposed strategy, the authors in [34] use well known social network metrics, like centrality and PageRank, to determine roles each criminal has in a money laundering network. The link between topological metrics and top-level roles was only possible through the cooperation of investigators with field knowledge of laundering methods, an approximation between domain knowledge, and bottom-up metrics.…”
Section: Influence Analysis Background From Social Network Analysis Rmentioning
confidence: 99%
“…We propose to use top-level theory to identify which topological feature should be considered in the calculations and to use domain knowledge explicitly. As an example, similar to our proposed strategy, the authors in [34] use well known social network metrics, like centrality and PageRank, to determine roles each criminal has in a money laundering network. The link between topological metrics and top-level roles was only possible through the cooperation of investigators with field knowledge of laundering methods, an approximation between domain knowledge, and bottom-up metrics.…”
Section: Influence Analysis Background From Social Network Analysis Rmentioning
confidence: 99%
“…A number of extensive studies have been made over the past few years in behaviour analysis on Social Networks such as, Rafa Drezewski [1] presented a social network analysis component for detecting money laundering that makes use of data from bank statements and the National Court Register and construct and analyse social networks during an investigation into money laundering cases. The paper presented by Mamoun Alazab [2] examines the evolution of malware including the nature of its activity and variants, and the implication of this for computer security industry practices.…”
Section: Related Workmentioning
confidence: 99%
“…Interesting use of heuristics to create models of different processes can be found, among others, in [6], where the heuristics were used for traffic modelling, or in [7] which presents a heuristic approach to the semantic classification of text documents. With the use of the adopted heuristics it is possible to construct a model of a process, bearing in mind the fact that dependencies (relationships) obtained in this way can describe this model in an approximate way only.…”
Section: Heuristics and Heuristic Modelsmentioning
confidence: 99%