skip to main content
10.1145/956750.956851acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Applying data mining in investigating money laundering crimes

Published:24 August 2003Publication History

ABSTRACT

In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- that of automatic community generation based on uni-party data, the data in which there is no direct or explicit link information available. Consequently, we have proposed a new methodology for Link Discovery based on Correlation Analysis (LDCA). We have used MLC group model generation as an exemplary application of this problem paradigm, and have focused on this application to develop a specific method of automatic MLC group model generation based on timeline analysis using the LDCA methodology, called CORAL. A prototype of CORAL method has been implemented, and preliminary testing and evaluations based on a real MLC case data are reported. The contributions of this work are: (1) identification of the uni-party data community generation problem paradigm, (2) proposal of a new methodology LDCA to solve for problems in this paradigm, (3) formulation of the MLC group model generation problem as an example of this paradigm, (4) application of the LDCA methodology in developing a specific solution (CORAL) to the MLC group model generation problem, and (5) development, evaluation, and testing of the CORAL prototype in a real MLC case data.

References

  1. Domingos, P. and Hulten, D., Catching up with the data: research issues in mining data streams, Proc. Workshop on Research Issues in Data Mining and Knowledge Discovery, 2001.Google ScholarGoogle Scholar
  2. Gibson, D., Kleinberg, J., and Raghavan, P., Inferring Web communities from link topoploy, Proc. HyperText98, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Goldberg, H. G. and Senator, T. E., Break detection systems, Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, AAAI Press, 1997.Google ScholarGoogle Scholar
  4. Jain, R., Kasturi, R., and Schunck, B. G., Machine Vision, Prentice Hall, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jensen, D., Prospective assessment of A1 technologies for fraud detection: A case study, Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997.Google ScholarGoogle Scholar
  6. Scott., J. Social Network Analysis: A handbook, SAGE Publications, 1991.Google ScholarGoogle Scholar
  7. Shardanand, U. and Maes, P., Social information filtering: algorithms for automating "world of mouth", Proc. ACM CHI, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Toyoda, M. and Kitsuregawa, M., Creating a Web community chart for navigating related communities, Proc. ACM HT, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Vertan, C. and Boujemaa, N., Embedding fuzzy logic in content based image retrieval, Proc. 19th Int'l Meeting of North America Fuzzy Information Processing Society, 2000.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Applying data mining in investigating money laundering crimes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader