Barnett, M. L. (2014). Why stakeholders ignore firm misconduct: a cognitive view. Journal of Management, 40(3), 676–702.
Google Scholar
Bavelas, A. (1950). Communication patterns in task-oriented groups. The Journal of the Acoustical Society of America, 22(6), 725–730.
Google Scholar
Bernile, G., & Gregg, A. J. (2009). The impact of the options backdating scandal on shareholders. Journal of Accounting and Economics, 47(1–2), 2–26.
Google Scholar
Chintalapati, S. S., & Jyotsna, G. (2013). Application of data mining techniques for financial accounting fraud detection scheme. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 717–724.
Google Scholar
Chiu, J. P. C., & Nichols, E. (2016). Named entity recognition with bidirectional LSTM-CNNs. Transactions of the Association for Computational Linguistics, 4, 357–370.
Google Scholar
Colladon, A. F., & Remondi, E. (2017a). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49–58. https://doi.org/10.1016/j.eswa.2016.09.029.
Article
Google Scholar
Colladon, A. F., & Remondi, E. (2017b). Using social network analysis to prevent money laundering. International Journal of Expert Systems with Applications, 67, 49–58.
Google Scholar
Deriu, J., Gonzenbach M, Uzdilli F, Lucchi A, De Luca V, and Jaggi M. 2016. Swisscheese at Semeval-2016 task 4: sentiment classification using an ensemble of convolutional neural networks with distant supervision. In Proceedings of the 10th International Workshop on Semantic Evaluation, 1124–8. EPFL-CONF-229234.
Drezewski, R., Sepielak, J., & Filipkowski, W. (2015). The application of social network analysis algorithms in a system supporting money laundering detection. Information Scienece, 295, 18–32.
Google Scholar
Ehsan, U., Harrison, B., Chan, L. & Riedl, M.O. (2018). Rationalization: a neural machine translation approach to generating natural language explanations. Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society (AIES’18), New Orleans, LA, USA, 2–3 February 2018, 81–87.
Gallo, P. A., & Juckes, C. C. (2005). Threshold transaction disclosures: access on demand through latent disclosure rather than reporting. Journal of Money Laundering Control, 8, 328–334.
Google Scholar
Gao, S., & Xu, D. (2007). Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Systems with Applications, 36, 1493–1504.
Google Scholar
Gao, Z., & Ye, M. (2007). A framework for data mining-based anti-money laundering research. Journal of Money Laundering Control, 10(2), 170–179.
Google Scholar
Gao, S., & Xu, D. (2010). Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering Domains. Proceedings of the 43rd Hawaii International Conference on System Sciences, Honolulu, HI, USA, 2010, 1–10.
Gao, S., Xu, D., Wang, H., & Wang, Y. (2006). Intelligent Anti-money Laundering System. Proceedings of the IEEE International Conference on Service Operations and Logistics and Informatics, Shanghai, Peoples Republic of China, 21–23 June 2006, 851–856.
Goldberg, H.G., & Wong, R.W.H. (1998). Restructuring transactional data for link analysis in the FinCEN AI System. AAAI Technical Report, FS-98-01, 38–46.
Google Scholar
Gombiro, C., & Jantjies, M. (2015). A conceptual framework for detecting financial crime in mobile money transactions. Journal of Governance and Regulation, 4(4, continued 6),727–734.
Google Scholar
Goodman, B., & Flaxman, S. (2016). European union regulations on algorithmic decision-making and a ‘right to explanation. arXiv:1606.08813
Griffin, J.M, & Shams, A. (2018). Is Bitcoin Really Un-Tethered? Working paper. Available at SSRN: https://ssrn.com/abstract=3195066.
Gunning, D. (2017). Explainable artificial intelligence (Xai), DARPA/I2O. Retrieved from https://www.darpa.mil/attachments/XAIProgramUpdate.pdf.
Han, J., Barman, U., Hayes, J., Du, J., Burgin, E., Wan, D. (2018). NextGen AML: distributed deep learning based language technologies to augment anti money laundering investigation. Proceedings of the ACL 2018, System Demonstrations, Melbourne, Australia, July 2018, 37–42.
Hand, D.J., & Weston, D.J. (2008). Statistical techniques for fraud detection, prevention, and assessment. In F. Fogelman-Soulie, D. Perrotta, J. Piskorski, & R. Steinberger (Eds.) Mining massive data sets for security (pp. 257–270), Amsterdam: IOS Press.
Google Scholar
Hanneman, R.A, & Riddle, M. (2005). Introduction to social network methods. Riverside, CA: University of California, Riverside.
Google Scholar
Helmy, T. H. E., Abd-ElMegied, M. Z., Sobh, T. S., & Badran, K. M. S. (2014). Design of a monitor for detecting money laundering and terrorist financing. International Journal of Computer Networks and Applications, 1(1), 15–25.
Google Scholar
Hendrickx, I., Kim, S.N., Kozareva, Z., Nakov, P., Séaghdha, D.O., Padó, S., Pennacchiotti, M., Romano, L., & Szpakowicz, S. (2010). Semeval-2010 Task 8: multi-way classification of semantic relations between pairs of nominals. Proceedings of the 5th International Workshop on Semantic Evaluation, ACL 2010, Uppsala, Sweden, 15–16 July 2010, 33–38.
Huff, R. M. (2014). Money laundering. The Encyclopedia of Criminology and Criminal Justice. New York: Wiley.
Google Scholar
Irish Examiner. (2016). Retrieved from https://www.irishexaminer.com/breakingnews/ireland/ulster-bank-hit-with-33mfine-for-anti-money-laundering-weaknesses-761956.html.
Johnson, W. C., Xie, W., & Yi, S. (2014). Corporate fraud and the value of reputations in the product market. Journal of Corporate Finance, 25, 16–39.
Google Scholar
Jorisch, A. (2009). Tainted Money: Are We Losing the War on Money Laundering and Terrorism Financing? Arlington: Red Cell Intelligence Group.
Google Scholar
Kamarinou, D., Millard, C., Singh, J. (2016). Machine learning with personal data: Profiling, decisions and the EU General Data Protection Regulation. Working paper. Available at http://www.mlandthelaw.org/papers/kamarinou.pdf.
Kannan, S., & Somasundaram, K. (2017). Autoregressive-based outlier algorithm to detect money laundering activities. Journal of Money Laundering Control, 20(2), 190–202.
Google Scholar
Karpoff, J. M., Lee, D. S., & Martin, G. S. (2008). The cost to firms of cooking the books. Journal of Financial and Quantitative Analysis, 43(3), 581–611.
Google Scholar
Khan, N., & Haider, S. (2013). A Bayesian approach for suspicious financial activity reporting. International Journal of Computers and Applications, 35, 181–187.
Google Scholar
Kim, Y. (2014). Convolutional neural networks for sentence classification. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, 25–29 October 2014, 1746–1751.
Kingdon, J. (2004). AI fights money laundering. IEEE Intelligent Systems, 19, 87–89.
Google Scholar
Kolhatkar, J.S., Fatnani, S.S., Yao, Y., & Matsumoto, K. (2014). Multi-channel data driven, real-time anti-money laundering system for electronic payment cards. U.S. Patent No. US 8,751,399 B2. Available at: https://patentimages.storage.googleapis.com/20/52/22/4f12c57929b368/US8751399.pdf.
Kumar, D., Wong, A., & Taylor, G.W. (2017). Explaining the unexplained: a class-enhanced attentive response (CLEAR) approach to understanding deep neural networks. https://arxiv.org/abs/1704.04133.
Kuner, C., Svantesson, D. J. B., Cate, F. H., Lynskey, O., & Millard, C. (2017). Machine learning with personal data: is data protection law smart enough to meet the challenge? International Data Privacy Law, 7(1), 1–2.
Google Scholar
Lai, K. (2018). Blockchain as AML tool: a work in progress. International Financial Law Review.
Lample, G., Ballesteros, M., Subramanian, S., Kawakami, K., & Dyer, C. (2016). Neural architectures for named entity recognition. https://arxiv.org/abs/1603.01360.
Larik, A. S., & Haider, S. (2010). Clustering based anomalous transaction reporting. Procedia Computer Science, 3, 606–610.
Google Scholar
Le-Khac, N.-A., Kechadi, T. (2010). Application of data mining for anti-money laundering detection: A case study. Proceedings of 2010 IEEE International Conference on Data Mining Workshops, Sydney, Australia, December 2010, 577–584.
Le-Khac, N.-A., Markos, S., Kechadi, M.-T. (2009). Towards a new data mining-based approach for anti-money laundering in an international investment bank. In International Conference on Digital Forensics and Cyber Crime.
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436.
Google Scholar
Lin, Y., Shen, S., Liu, Z., Luan, H., Sun, M. (2016). Neural relation extraction with selective attention over instances. Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Berlin, Germany, August 2016, 2125–2133.
Liu, X., Zhang, P., & Zeng, D. (2008). Sequence matching for suspicious activity detection in anti-money laundering. In Intelligence and Security Informatics Workshops.
Lopez-Rojas, E.A., & Axelsson, S. (2012a). Money laundering detection using synthetic data. Proceedings of the 27th Annual Workshop of the Swedish Artificial Intelligence Society (SAIS), Örebro, Sweden, 14–15 May 2012, 33–40.
Lopez-Rojas, E.A., & Axelsson, S. (2012b). Multi agent based simulation (MABS) of financial transactions for anti money laundering (AML). Proceedings of the 17th Nordic Conference on Secure IT System, Karlskrona, Sweden, October 31 – November 2, 2012, 25–32.
Lucia, D.P., Donato, M. (2009). The risk-based approach in the new european anti-money laundering legislation: a law and economics view. Review of Law & Economics, 5(2), 931–52.
Luo, G., Huang, X., Lin, C.Y., & Nie, Z. (2015). Joint entity recognition and disambiguation. Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP), Lisbon, Portugal, September 2015, 879–888.
Lv, L.-T., Ji, N., & Zhang, J.L. (2008). A RBF neural network model for anti-money laundering. Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, Hong Kong, China, 30–31 August 2008, 209–215.
Martin, B. (2017, January 31). Deutsche Bank Hit with £500m Money Laundering Fines. The Telegraph. Retrieved from https://www.telegraph.co.uk/business/2017/01/31/deutsche-bank-hit-500m-money-laundering-fines/.
Mei, D., Ye, Y., & Gao, Z. (2014). Literature review of international anti-money laundering research: a scientometrical perspective. Open Journal of Social Sciences, 2, 111–120.
Google Scholar
Moustafa, T. H., El-Megeid, M. Z. A., Sobh, T. S., & Shafea, K. M. (2015). Anti money laundering using a two-phase system. Journal of Money Laundering Control, 18(3), 304–329.
Google Scholar
Murphy, D. L., Shrieves, R. E., & Tibbs, S. L. (2009). Understanding the penalties associated with corporate misconduct: an empirical examination of earnings and risk. Journal of Financial and Quantitative Analysis, 44(1), 55–83.
Google Scholar
Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The applications of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decision Support Systems, 50, 559–569.
Google Scholar
Owen, S., Anil, R., Dunning, T., & Friedman, E. (2011). Mahout in Action. Greenwich: Manning Publications Co.
Google Scholar
Pang, B., & Lee, L. (2008). Opinion mining and sentiment analysis. Foundations and Trends® in Information Retrieval, 2(1–2), 1–135.
Google Scholar
Parkman, T. (2012). Mastering Anti-Money Laundering and Counter-Terrorist Financing: A Compliance Guide for Practitioners. Harlow, England: Pearson.
Google Scholar
Paula, E.L, Ladeira, M., Carvalho, R.N., & Marzagão, T. (2016). Deep learning anomaly detection as support fraud investigation in Brazilian exports and anti-money laundering. Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA, 18–20 Dec. 2016, 954–960.
Pramanik, M. I., Lau, R. Y. K., Yue, W. T., Ye, Y., & Li, C. (2017). Big data analytics for security and criminal investigations”. WIREs Data Mining Knowledge Discovery, 7, e1208.
Google Scholar
Rajput, Q., Khan, N. S., Larik, A., & Haider, S. (2014). Ontology based expert-system for suspicious transactions detection”. Computer and Information Science, 7, 103.
Google Scholar
Raza, S., & Haider, S. (2010). Suspicious activity reporting using dynamic bayesian networks. Procedia Computer Science, 3, 987–991.
Google Scholar
Rohit, K. D., & Patel, D. B. (2015). Review on detection of suspicious transaction in anti-money laundering using data mining framework. Journal for Innovative Research in Science and Technology, 1, 129–133.
Google Scholar
Senator, T. E., Goldberg, H. G., Wooton, J., Cottini, M. A., Khan, A. F. U., Klinger, C. D., et al. (1995). The financial crimes enforcement network Ai System (Fais) identifying potential money laundering from reports of large cash transactions. AI Magazine, 16, 21.
Google Scholar
Sharma, A., & Panigrahi, P. K. (2012). A review of financial accounting fraud detection based on data mining techniques. International Journal of Computer Applications, 39(1), 37–47.
Google Scholar
Sudjianto, A., Nair, S., Yuan, M., Zhang, A., Kern, D., & Cela-Diaz, F. (2010). Statistical methods for fighting financial crimes”. Technometrics, 52, 5–19.
Google Scholar
Tang, D., Wei, F., Yang, N., Zhou, M., Liu, T., Qin, B. (2014). Learning sentiment-specific word embedding for twitter sentiment classification. Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, Baltimore, Maryland, USA, June 23–25 2014, 1555–1565.
Tang, J., & Yin, J. (2005). Developing an intelligent data discriminating system of anti-money laundering based on SVM. Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 18–21 Aug. 2005, 3453–3457.
Thompson, M., & Perez, E. (2017, July 1). BNP Paribas to Pay Nearly $9 Billion Penalty. CNN Business. Retrieved from https://money.cnn.com/2014/06/30/investing/bnp-paribas-sanctions-fine/.
Titcomb, J. (2014, Aug 9). Standard chartered pays $300m over money laundering failures. The Telegraph. Retrieved from https://www.telegraph.co.uk/finance/newsbysector/banksandfinance/11044353/Standard-Chartered-pays-300m-over-money-laundering-failures.html.
Unger, B., & Van Waarden, F. (2009). How to dodge drowning in data? Rule- and risk-based anti money laundering policies compared. Review of Law and Economics, 52, 953–985.
Google Scholar
Viswanatha, A., & Wolf, B. (201). HSBC to pay $1.9 Billion U.S. Fine in Money-Laundering Case. Reuters. Retrieved from https://uk.reuters.com/article/us-hsbc-probe-idUSBRE8BA05M20121211.
Wang, S.-N., & Yang, J.-G. (2007). A money laundering risk evaluation method based on decision tree. Proceedings of 2007 International Conference on Machine Learning and Cybernetics, Hong Kong, China, 19-22 August 2007, 283–286.
Weber, M., Chen, J., Suzumura, T., Pareja, A., Ma, T., Kanezashi, H., Kaler, T., Leiserson, C.E., & Schardl, T.B. (2018). Scalable graph learning for anti-money laundering: a first look. arXiv:1812.00076.
White, T. (2009). Hadoop: The Definitive Guide (1st ed.). Newton: O’Reilly Media Inc.
Google Scholar
Yu, T., Sengul, M., & Lester, R. H. (2008). Misery loves company: the spread of negative impacts resulting from an organizational crisis. Academy of Management Review, 33(2), 452–472.
Google Scholar
Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I. (2010). Spark: cluster computing with working sets. Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud'10), Boston, Massachusetts, USA, June 2010, 1–7.
Zengan, G. (2009). Application of cluster-based local outlier factor algorithm in anti-money laundering. Proceedings of 2009 International Conference on Management and Service Science, Wuhan, China, 20–22 September 2009, 1–4.
Zhang, Z., Yu, P.S., & Salerno, J.J. (2003). Applying data mining in investigating money laundering crimes. Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24–27, 2003, 747–752.