Application of Technological Solutions in the Fight Against Money Laundering-A Systematic Literature Review

被引:12
作者
Sobreira Leite, Gleidson [1 ]
Bessa Albuquerque, Adriano [1 ]
Rogerio Pinheiro, Placido [1 ]
机构
[1] Univ Fortaleza, Dept Comp Sci, BR-60811905 Fortaleza, Ceara, Brazil
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 22期
关键词
data mining; information technology; money laundering; literature review; FRAUD DETECTION; VISUALIZATION;
D O I
10.3390/app9224800
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the growing interest in technological solutions aimed at combating money laundering, several studies involving the application of technology have been carried out. However, there were no records of studies aimed at identifying, selecting, rigorously analyzing and synthesizing the literature on solutions that adopt technology to combat money laundering. This paper presents a systematic review of the literature on the application of technological solutions in the fight against money laundering. Seventy-one papers were selected from the 795 studies initially retrieved for data extraction, analysis and synthesis based on predefined inclusion and exclusion criteria. The results obtained with the data analysis made it possible to identify a general categorization of the domains of application of the approaches, as well as a mapping and classification of the support mechanisms adopted. The findings of this review showed that, among the application domain categories identified, the detection of suspicious transactions attracted greater attention from researchers. Regarding the support mechanisms adopted, the application of data mining techniques was used more extensively to detect money laundering. Topics for further research and refinement were also identified, such as the need for a better description of data analysis to provide more convincing evidence to support the benefits presented.
引用
收藏
页数:29
相关论文
共 85 条
[1]  
Ai L., 2011, Journal of Financial Crime, V18, P268, DOI DOI 10.1108/13590791111147488
[2]  
Alexandre C., 2017, RISTI PORTO, V25, P1, DOI [10.17013/risti.25.1-17, DOI 10.17013/RISTI.25.1-17]
[3]  
[Anonymous], SOFTW ENG MOB APPL M
[4]  
[Anonymous], 2019, BAS AML IND COUNTR R
[5]  
Bernard K, 2011, 2011 IEEE SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), P158, DOI 10.1109/SIEDS.2011.5876870
[6]  
Bershtein L.S., 2013, Proceedings of the 6th International Conference on Security of Information and Networks, P384, DOI DOI 10.1145/2523514.2523568
[7]  
Camdessus M., 1988, P IMF PLEN M FIN ACT, P2
[8]   Finding Suspicious Activities in Financial Transactions and Distributed Ledgers [J].
Camino, Ramino ;
State, Radu ;
Montero, Leandro ;
Valtchev, Petko .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, :787-796
[9]  
Cao D.K., 2012, AS C INT INF DAT SYS
[10]   WireVis: Visualization of categorical, time-varying data from financial transactions [J].
Chang, Remco ;
Ghoniem, Mohammad ;
Kosara, Robert ;
Ribarsky, William ;
Yang, Jing ;
Suma, Evan ;
Ziemkiewicz, Caroline ;
Kern, Daniel ;
Sudjianto, Agus .
VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS, 2007, :155-+