Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff

The collection and analysis of financial data, referred to as financial intelligence, is gaining recognition has a key tool in the war on crime in general and terrorism in particular. Money in electronic form leaves a trail which means that individuals cannot easily disappear. There is a burgeoning industry providing sophisticated computer technology and complex mathematical models to mine financial data and single out unusual patterns of transactions. The use of automated monitoring systems is often seen as a powerful ally in the fight against money laundering and terrorist financing, justified by the increase in size of the typical transactional database, and by a desire to keep compliance costs under control. However, the power of automated profiling can result in negative outcomes such as over-reporting and increased expenditure on manual compliance checking.

[1]  Gregory Piatetsky-Shapiro,et al.  The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.

[2]  Kevin C. Desouza,et al.  On "Information" in Organizations: An Emergent Information Theory and Semiotic Framework , 2002 .

[3]  L. Forget,et al.  Financial Intelligence Units: An Overview. , 2004 .

[4]  J. Searle Expression and Meaning: Studies in the Theory of Speech Acts , 1979 .

[5]  Kecheng Liu,et al.  Semiotics in Information Systems Engineering , 2000 .

[6]  James Backhouse,et al.  Understanding Information: An Introduction , 1990 .

[7]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[8]  Heather D'Cruz,et al.  The Social Construction of Child Maltreatment , 2004 .

[9]  David J. Hand,et al.  Data Mining: Statistics and More? , 1998 .

[10]  C. Riessman,et al.  Qualitative Studies in Social Work Research , 1993 .

[11]  Clive Humby,et al.  Scoring points : how Tesco is winning customer loyalty , 2003 .

[12]  Wim Staat,et al.  On Abduction, Deduction, Induction and the Categories , 1993 .

[13]  Michael J. A. Berry,et al.  Data mining techniques - for marketing, sales, and customer support , 1997, Wiley computer publishing.

[14]  A. Koller,et al.  Speech Acts: An Essay in the Philosophy of Language , 1969 .

[15]  Jonathan Liebenau,et al.  Organizational reconciliation and its implications for organizational decision support systems: a semiotic approach , 2002, Decis. Support Syst..

[16]  R. E. Bell Discretion and Decision Making in Money Laundering Prosecutions , 2001 .

[17]  Sunny Marche,et al.  On what a building might not be - a case study , 1991 .

[18]  Terry Winograd,et al.  Understanding computers and cognition , 1986 .

[19]  Padhraic Smyth,et al.  Business applications of data mining , 2002, CACM.

[20]  R. M. Hare,et al.  Norm and Action: A Logical Enquiry. , 1965 .

[21]  Umberto Eco,et al.  A theory of semiotics , 1976, Advances in semiotics.

[22]  M. Levi,et al.  Technologies, Security, and Privacy in the Post-9/11 European Information Society , 2004 .

[23]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[24]  R. Stamper Information in business and administrative systems , 1973 .

[25]  Chong Ho Yu,et al.  Abduction? Deduction? Induction? Is There a Logic of Exploratory Data Analysis?. , 1994 .

[26]  Joyce Jackson,et al.  Data Mining; A Conceptual Overview , 2002, Commun. Assoc. Inf. Syst..

[27]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .