Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-6 of 6
Keywords: Data mining
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Anti money laundering system in detecting and preventing money laundering activities: a systematic review
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2025) 28 (2): 385–407.
Published: 07 March 2025
... of money laundering concepts, issues and techniques of AML. The review articles are on the techniques of AML, such as machine learning, data mining, graph networks and artificial intelligence, which are applied to detect and prevent money laundering issues. Originality/value Money laundering, being...
Journal Articles
Exploring detection and prevention of money laundering with information technology
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2024) 27 (6): 995–1004.
Published: 30 November 2023
... Publishing Limited 2023 Emerald Publishing Limited Licensed re-use rights only Money laundering Technology Artificial intelligence Machine learning Data mining Social network analysis Based on data from the Corruption Perceptions Index (CPI) 2022, the state of Indonesia is ranked 110...
Journal Articles
Money laundering control in Mexico: A risk management approach through regression trees (data mining)
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2020) 23 (2): 427–439.
Published: 12 March 2020
... the customer portfolio and his transaction profile is analyzed through BigData and data mining. To develop a methodology to assess the ML risk to which a financial institution is exposed, we established key risk elements and their respective indicators. Table I provides a list of these indicators...
Journal Articles
Global knowledge management of suspicious transaction reporting system in Japan
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2020) 23 (1): 55–63.
Published: 21 January 2020
... are from financial institutions. Moreover, it cannot be said that the effect is used completely. It is important to increase the accuracy of the data mining method and incorporate the concept of knowledge management. Furthermore, it is desirable to use suspicious transactions from a global “knowledge...
Journal Articles
Data mining for statistical analysis of money laundering transactions
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2019) 22 (4): 753–763.
Published: 07 October 2019
... of unstructured data form suspicious money laundering transactions to inform public policies. By deducing from the results of empirical studies in the field of money laundering detection, this paper presented an overview of data mining technology for detecting suspicious transactions. After...
Journal Articles
Data mining in anti-money laundering field
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2017) 20 (3): 301–310.
Published: 03 July 2017
...Noriaki Yasaka Purpose This report aims to focus on how suspicious transaction report is created with data mining methods and used from the point of view of knowledge management. Design/methodology/approach This paper considers data mining versus knowledge management in the anti-money...
