Mostrar el registro sencillo del documento

dc.contributor.advisorGarcía Bedoya, Olmer
dc.coverage.spatialColombiaspa
dc.creatorGuevara Pérez, Jorge Ivan
dc.creatorGranados, Oscar
dc.date.accessioned2021-02-12T16:57:49Z
dc.date.available2021-02-12T16:57:49Z
dc.date.created2021-02-07
dc.identifier.urihttp://hdl.handle.net/20.500.12010/17251
dc.description.abstractLas actividades de lavado de activos son el resultado de la corrupción, actividades ilegales y crimen organizado que afectan la dinámica social e involucra, directa e indirectamente a varias comunidades a través de diferentes mecanismos de blanqueo de dinero ilícito. En este artículo, proponemos un enfoque de aprendizaje automático para el análisis de actividades sospechosas en corresponsales bancarios, un tipo de agente financiero que desarrolla transacciones financieras para clientes bancarios específicos. Este artículo utiliza varios algoritmos para identificar anomalías en un conjunto de transacciones de un corresponsal bancario durante 2019 para una ciudad intermediaria en Colombia. Nuestros resultados muestran que algunas metodologías son más apropiadas que otros para este caso y facilita la identificación de las anomalías y transacciones sospechosas en este tipo de intermediario financiero.spa
dc.format.extent17 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherUniversidad de Bogotá Jorge Tadeo Lozanospa
dc.sourceinstname:Universidad de Bogotá Jorge Tadeo Lozanospa
dc.sourcereponame:Expeditio Repositorio Institucional UJTLspa
dc.subjectTransaccionesspa
dc.subjectCorrupciónspa
dc.titleMachine learning methodologies against money laundering in non-banking correspondentsspa
dc.type.localTrabajo de grado de maestríaspa
dc.subject.lembLavado de activosspa
dc.subject.lembNarcotraficantesspa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersionspa
dc.rights.localAbierto (Texto Completo)spa
dc.subject.keywordCorruptionspa
dc.identifier.repourlhttp://expeditio.utadeo.edu.cospa
dc.creator.degreeMagíster en Ingeniería y Analítica de Datosspa
dc.publisher.programMaestría en Ingeniería y Analítica de Datosspa
dc.relation.referencesRao, A.A., Kanchana, V.: Dynamic approach for detection of suspicious transactions in money laundering. Int. J. Eng. Technol. 7(3.10), 10–13 (2018). https:// doi.org/10.14419/ijet.v7i3.10.15619spa
dc.relation.referencesAdankon, M.M., Cheriet, M.: Support vector machine. In: Li, S.Z., Jain, A. (eds.) Encyclopedia of Biometrics, pp. 1303–1308. Springer, Boston (2009). https://doi. org/10.1007/978-0-387-73003-5 299spa
dc.relation.referencesBayona-Rodr´ıguez, H.: Money laundering in rural areas with illicit crops: empirical evidence for Colombia. Crime Law Soc. Change 72(4), 387–417 (2019). https:// doi.org/10.1007/s10611-019-09822-zspa
dc.relation.referencesBholowalia, P., Kumar, A.: EBK-means: a clustering technique based on elbow method and k-means in WSN. Int. J. Comput. Appl. 105(9) (2014). https://doi. org/10.5120/18405-9674spa
dc.relation.referencesChen, Z., Van Khoa, L.D., Teoh, E.N., Nazir, A., Karuppiah, E.K., Lam, K.S.: Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowl. Inf. Syst. 57(2), 245–285 (2018). https://doi.org/10.1007/s10115-017-1144-zspa
dc.relation.referencesCindori, S., et al.: Money laundering: correlation between risk assessment and suspicious transactions. Financ. Theor. Pract. 37(2), 181–206 (2013). https://doi. org/10.3326/fintp.37.2.3spa
dc.relation.referencesDemetis, D.S.: Fighting money laundering with technology: a case study of bank x in the UK. Decis. Support Syst. 105, 96–107 (2018). https://doi.org/10.1016/j. dss.2017.11.005spa
dc.relation.referencesDrezewski, R., Dziuban, G., Hernik, L., Paczek, M.: Comparison of data mining techniques for money laundering detection system. In: Proceedings - 2015 International Conference on Science in Information Technology: Big Data Spectrum for Future Information Economy, ICSITech 2015, pp. 5–10 (2016). https://doi.org/10. 1109/ICSITech.2015.7407767spa
dc.relation.referencesDre˙zewski, R., Sepielak, J., Filipkowski, W.: System supporting money laundering detection. Digital Invest. 9(1), 8–21 (2012). https://doi.org/10.1016/j.diin.2012. 04.003spa
dc.relation.referencesGarc´ıa-Bedoya, O., Granados, O., Cardozo, J.: Ai against money laundering networks: the Colombian case. J. Money Laundering Control (2020). https://doi.org/ 10.1108/JMLC-04-2020-0033spa
dc.relation.referencesGoogleCloud: Vision AI. https://cloud.google.com/visionspa
dc.relation.referencesHuang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Discovery 2(3), 283–304 (1998). https://doi. org/10.1023/A:1009769707641spa
dc.relation.referencesJi, J., Bai, T., Zhou, C., Ma, C., Wang, Z.: An improved k-prototypes clustering algorithm for mixed numeric and categorical data. Neurocomputing 120, 590–596 (2013). https://doi.org/10.1016/j.neucom.2013.04.011spa
dc.relation.referencesKumar, A., Parsons, A., Urdapilleta, E., Nair, A.: Expanding Bank Outreach through Retail Partnerships: Correspondent Banking in Brazil. The World Bank, Washington (2006)spa
dc.relation.referencesLiu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413–422. IEEE (2008). https://doi.org/10. 1109/ICDM.2008.17spa
dc.relation.referencesLoayza, N., Villa, E., Misas, M.: Illicit activity and money laundering from an economic growth perspective: A model and an application to Colombia. J. Econ. Behav. Organ. 159, 442–487 (2019). https://doi.org/10.1016/j.jebo.2017.10.002spa
dc.relation.referencesManevitz, L.M., Yousef, M.: One-class SVMs for document classification. J. Mach. Learn. Res. 2, 139–154 (2001)spa
dc.relation.referencesMuller, K., Mika, S., Ratsch, G., Tsuda, K., Scholkopf, B.: An introduction to kernel-based learning algorithms. IEEE Trans. Neural Networks 12(2), 181–201 (2001). https://doi.org/10.1109/72.914517spa
dc.relation.referencesPedregosa, F., et al.: Scikit-learn: Machine learning in python. J. Mach. Learn. Res. 12, 2825–2830 (2011)spa
dc.relation.referencesPham, D.T., Ruz, G.A.: Unsupervised training of Bayesian networks for data clustering. Proc. Roy. Soc. Math. Phys. Eng. Sci. 465(2109), 2927–2948 (2009). https://doi.org/10.1098/rspa.2009.0065spa
dc.relation.referencesPrakash, A., Apoorva, S., Amulya, K.H., Kavya, T.P., Prashanth Kumar, K.N.: Proposal of expert system to predict financial frauds using data mining. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), pp. 1080–1083, March 2019. https://doi.org/10.1109/ICCMC. 2019.8819709spa
dc.relation.referencesS´anchez-Gonz´alez, C., Prada-Araque, D., Erazo-Inca, F.: El aporte de los corresponsales no bancarios a la inclusi´on financiera. Desarrollo Gerencial 12(1), 1–23 (2020). 10.17081/dege.12.1.3599spa
dc.relation.referencesSch¨olkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13, 1443– 1471 (2001). https://doi.org/10.1162/089976601750264965spa
dc.relation.referencesShin, H.J., Eom, D.H., Kim, S.S.: One-class support vector machines–an application in machine fault detection and classification. Comput. Ind. Eng. 48(2), 395–408 (2005). https://doi.org/10.1016/j.cie.2005.01.009spa
dc.relation.referencesSingh, K., Best, P.: Anti-money laundering: using data visualization to identify suspicious activity. Int. J. Acc. Inf. Syst. 34, 100418 (2019). https://doi.org/10. 1016/j.accinf.2019.06.001spa
dc.relation.referencesThoumi, F.E.: Political Economy and Illegal Drugs in Colombia. Lynne Rienner Publishers, Boulder (1995)spa
dc.relation.referencesThoumi, F.E., Anzola, M.: Asset and money laundering in Bolivia, Colombia and Peru: a legal transplant in vulnerable environments? Crime Law Soc. Change 53(5), 437–455 (2010). https://doi.org/10.1007/s10611-010-9235-8spa
dc.relation.referencesThoumi, F.E., Anzola, M.: Can AML policies succeed in Colombia? Crime, Law and Soc. Change 57(1), 1–14 (2012). https://doi.org/10.1007/s10611-011-9331-4spa
dc.relation.referencesThulasiraman, K., Swamy, M.: 5.7 acyclic directed graphs. In: Graphs: Theory and Algorithms, p. 118. Wiley, New York (1992)spa
dc.relation.referencesVishwanathan, S., Murty, M.N.: SSVM: a simple SVM algorithm. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002 (Cat. No. 02CH37290), vol. 3, pp. 2393–2398. IEEE (2002)spa
dc.relation.referencesWirth, R., Hipp, J.: CRISP-DM: towards a standard process model for data mining. In: Proceedings of the 4th International Conference on the Practical Applications of Knowledge Discovery and Data Mining, pp. 29–39. Springer, London (2000)spa
dc.description.hashtag#lavadoDeActivosspa
dc.description.hashtag#TransaccionesFinancierasspa
dc.description.abstractenglishThe activities of money laundering are a result of corruption, illegal activities, and organized crime that affect social dynamics and involved, directly and indirectly, several communities through different mechanisms to launder illegal money. In this article, we propose a machine learning approach to the analysis of suspicious activities in nonbanking correspondents, a type of financial agent that develops some financial transactions for specific banking customers. This article uses several algorithms to identify anomalies in a transaction set of a nonbanking correspondent during 2019 for an intermediary city in Colombia. Our results show that some methodologies are more appropriate than others for this case and facilitate to identify the anomalies and suspicious transactions in this kind of financial intermediary.spa
dc.type.driverinfo:eu-repo/semantics/masterThesisspa
dc.type.coarhttp://purl.org/coar/resource_type/c_bdccspa


Archivos en el documento

Thumbnail

Este documento aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del documento