Author
Abstract
The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.
Suggested Citation
Ling Sun, 2021.
"Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control,"
PLOS ONE, Public Library of Science, vol. 16(12), pages 1-19, December.
Handle:
RePEc:plo:pone00:0258627
DOI: 10.1371/journal.pone.0258627
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:plo:pone00:0258627. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: plosone (email available below). General contact details of provider: https://journals.plos.org/plosone/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.