2018 4th International Conference for Convergence in Technology (I2CT) 2018
DOI: 10.1109/i2ct42659.2018.9058145
|View full text |Cite
|
Sign up to set email alerts
|

Synthesizing Data for Collusion-based Malpractice of Shell Companies in Money Laundering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The literature related to the detection of shell companies is scarce. A first study is by Pawde, Apte, Palshikar and Attar (2018), which used synthetic data to simulate the collusion-based malpractices of shell companies. They incorporate this proposal into Banking Transaction Simulator (BTS) to generate data sets and tackle the problem of shell-set detection.…”
Section: Shell Companies' Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The literature related to the detection of shell companies is scarce. A first study is by Pawde, Apte, Palshikar and Attar (2018), which used synthetic data to simulate the collusion-based malpractices of shell companies. They incorporate this proposal into Banking Transaction Simulator (BTS) to generate data sets and tackle the problem of shell-set detection.…”
Section: Shell Companies' Detectionmentioning
confidence: 99%
“…Mechanism and techniques of shell companies' action as those reported by FATF are also of great importance. Although studies as Pawde et al (2018) and Luna et al (2018) have considered the industrial sector, number of employees and revenues, in simulated data, the reality in financial systems makes necessary to incorporate more mechanisms present in the interaction between legal entities such as the nature of business relations, addresseses in common, virtual offices, etc. The same applies when metrics obtained from financial statements are considered as the main criteria of detection, as in Aggarwal and Dharni (2020).…”
Section: T Expected Then Classify the Connection As Suspiciousmentioning
confidence: 99%