Ibrahim George's research while affiliated with Macquarie University and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (2)


Data Mining in the Investigation of Money Laundering and Terrorist Financing
  • Chapter

January 2013

·

10 Reads

·

Ibrahim George

·

In this chapter, the authors explore the operational data related to transactions in a financial organisation to find out the suitable techniques to assess the origin and purpose of these transactions and to detect if they are relevant to money laundering. The authors' purpose is to provide an AML/CTF compliance report that provides AUSTRAC with information about reporting entities' compliance with the Anti-Money Laundering and Counter-Terrorism Financing Act 2006. Their aim is to look into the Money Laundering activities and try to identify the most critical classifiers that can be used in building a decision tree. The tree has been tested using a sample of the data and passing it through the relevant paths/scenarios on the tree. The success rate is 92%, however, the tree needs to be enhanced so that it can be used solely to identify the suspicious transactions. The authors propose that a decision tree using the classifiers identified in this chapter can be incorporated into financial applications to enable organizations to identify the High Risk transactions and monitor or report them accordingly.

Share

Data Mining in the Investigation of Money Laundering and Terrorist Financing

January 2010

·

57 Reads

·

3 Citations

In this chapter, the authors explore the operational data related to transactions in a financial organi-sation to find out the suitable techniques to assess the origin and purpose of these transactions and to detect if they are relevant to money laundering. The authors' purpose is to provide an AML/CTF compliance report that provides AUSTRAC with information about reporting entities' compliance with the Anti-Money Laundering and Counter-Terrorism Financing Act 2006. Their aim is to look into the Money Laundering activities and try to identify the most critical classifiers that can be used in building a decision tree. The tree has been tested using a sample of the data and passing it through the relevant paths/scenarios on the tree. The success rate is 92%, however, the tree needs to be enhanced so that it can be used solely to identify the suspicious transactions. The authors propose that a decision tree using the classifiers identified in this chapter can be incorporated into financial applications to enable organizations to identify the High Risk transactions and monitor or report them accordingly.

Citations (1)


... After answering the research questions it was identified that the main techniques explored were supervised classification techniques [1,[5][6][7][8][9][10][11][12][13][14][15][16][17][18] with 15 (28.3%) and clustering [2,5,7,10,15,17,[19][20][21][22][23][24][25] with 14 techniques (26.42%). ...

Reference:

Fighting Against Money Laundering: A Systematic Mapping
Data Mining in the Investigation of Money Laundering and Terrorist Financing
  • Citing Article
  • January 2010