Affiliation:
1. Macquarie University, Australia
Abstract
In this chapter, the authors explore the operational data related to transactions in a financial organisation to find out the suitable techniques to assess the origin and purpose of these transactions and to detect if they are relevant to money laundering. The authors’ purpose is to provide an AML/CTF compliance report that provides AUSTRAC with information about reporting entities’ compliance with the Anti-Money Laundering and Counter-Terrorism Financing Act 2006. Their aim is to look into the Money Laundering activities and try to identify the most critical classifiers that can be used in building a decision tree. The tree has been tested using a sample of the data and passing it through the relevant paths/scenarios on the tree. The success rate is 92%, however, the tree needs to be enhanced so that it can be used solely to identify the suspicious transactions. The authors propose that a decision tree using the classifiers identified in this chapter can be incorporated into financial applications to enable organizations to identify the High Risk transactions and monitor or report them accordingly.
Reference15 articles.
1. Austrac E-learning. (2009). Introduction to Money Laundering. Retrieved November 27, 2009, from http://www.austrac.gov.au/elearning/mod1/mod_1_money_laundering_11.html.
2. Campos, M. M., Stengard, P. J., & Milenova, B. L. (2005). Data-centric automated data mining. Proceedings of Fourth International Conf on Machine Learning and Applications, 15-17 Dec. 2005, (pp.8).
3. Chen, H. (2006).Intelligence and Security Informatics for International Security, Information Sharing and Data Mining. Integrated Series in Information Systems, 10(18).
4. Automatic construction of networks of concepts characterizing document databases
5. CRISP-DM. (2009). Cross Industry Standard Process for Data Mining. Retrieved November 27, 2009, from http://www.crisp-dm.org/