IDEAS home Printed from https://ideas.repec.org/p/arx/papers/2105.05793.html
   My bibliography  Save this paper

Using social network analysis to prevent money laundering

Author

Listed:
  • A. Fronzetti Colladon
  • E. Remondi

Abstract

This research explores the opportunities for the application of network analytic techniques to prevent money laundering. We worked on real world data by analyzing the central database of a factoring company, mainly operating in Italy, over a period of 19 months. This database contained the financial operations linked to the factoring business, together with other useful information about the company clients. We propose a new approach to sort and map relational data and present predictive models, based on network metrics, to assess risk profiles of clients involved in the factoring business. We find that risk profiles can be predicted by using social network metrics. In our dataset, the most dangerous social actors deal with bigger or more frequent financial operations; they are more peripheral in the transactions network; they mediate transactions across different economic sectors and operate in riskier countries or Italian regions. Finally, to spot potential clusters of criminals, we propose a visual analysis of the tacit links existing among different companies who share the same owner or representative. Our findings show the importance of using a network-based approach when looking for suspicious financial operations and potential criminals.

Suggested Citation

  • A. Fronzetti Colladon & E. Remondi, 2021. "Using social network analysis to prevent money laundering," Papers 2105.05793, arXiv.org.
  • Handle: RePEc:arx:papers:2105.05793
    as

    Download full text from publisher

    File URL: http://arxiv.org/pdf/2105.05793
    File Function: Latest version
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Kathleen M. Carley, 2006. "Destabilization of covert networks," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 51-66, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Parsaee Tabar , Azam & Abdolvand , Neda & Rajaee Harandi , Saeedeh, 2021. "Identifying the Suspected Cases of Money Laundering in Banking Using Multiple Attribute Decision Making (MADM)," Journal of Money and Economy, Monetary and Banking Research Institute, Central Bank of the Islamic Republic of Iran, vol. 16(1), pages 1-20, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Discussion Paper 2009-85, Tilburg University, Center for Economic Research.
    2. Brandy L. Aven, 2015. "The Paradox of Corrupt Networks: An Analysis of Organizational Crime at Enron," Organization Science, INFORMS, vol. 26(4), pages 980-996, August.
    3. Terrill L. Frantz & Kathleen M. Carley, 2017. "Reporting a network’s most-central actor with a confidence level," Computational and Mathematical Organization Theory, Springer, vol. 23(2), pages 301-312, June.
    4. Morgan Burcher & Chad Whelan, 2015. "Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 104-122, April.
    5. Sara Jeza Alotaibi, 2022. "A New Internet of Things (IoT) Framework for Public Sectors," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global, vol. 17(1), pages 1-15, January.
    6. Virginie Masson & Kelsey Wilkins, 2013. "The Small World of 9/11 and the Implications for Network Dismantlement Strategies," School of Economics and Public Policy Working Papers 2013-08, University of Adelaide, School of Economics and Public Policy.
    7. Alexandra-Maria Bocse, 0. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 0, pages 1-19.
    8. Kathleen M. Carley & Michael W. Bigrigg & Boubacar Diallo, 2012. "Data-to-model: a mixed initiative approach for rapid ethnographic assessment," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 300-327, September.
    9. Alexandra-Maria Bocse, 2021. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 21(2), pages 285-303, June.

    More about this item

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:arx:papers:2105.05793. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: arXiv administrators (email available below). General contact details of provider: http://arxiv.org/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.