Research on Money Laundering Crime under Electronic Payment Background

نویسنده

  • Weibing Peng
چکیده

As the result of information technology's development, promoted the tradition payment means enormously to the computerization development advancement. The electronic payment has accelerated the money circulation speed, and has brought the enormous convenience for the modern trade activity. But the electronic payment's characteristics such as invisible, high speed, concealment and so on have provided the enormous convenience to the money laundering criminal activity, and presented the enormous challenge to the traditional countermoney laundering system. The money laundering activities change to the virtual space from the real world, and the electronic money laundering become a new confidentiality and highly effective method for the money laundering crime. The question of moniting criminality of launders money under the electronic payment background, regardless of from the legislation and the technical angle, is a new domain needing to deeply research. This article has first analyzed money laundering pattern under the electronic payment background, then has analyzed the characteristic of the electronic money laundering compared to tradition money laundering pattern and the new challenge which brings for the counter-money laundering work. Finally, proposed several countermeasures to guard electron money laundering crime based on the above research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Electronic Money Laundering Detection in Transactions of Payment Service Providers

Under the coverage of legitimate commerce, criminals money-launder their illicit incomes through the payment gateways provided by Payment Service Providers (PSP). In order to do money-laundering forensics in transactions of PSP companies, a new method was proposed by Hojati et al which is done through detecting deviations from class behavior based on peer group analysis (PGA) method. Our experi...

متن کامل

Laundering Money Online: a review of cybercriminals methods

Money laundering is a critical step in the cyber crime process which is experiencing some changes as hackers and their criminal colleagues continually alter and optimize payment mechanisms. Conducting quantitative research on underground laundering activity poses an inherent challenge: Bad guys and their banks don’t share information on criminal pursuits. However, by analyzing forums, we have i...

متن کامل

Providing a Method to Identify Malicious Users in Electronic Banking System Using Fuzzy Clustering Techniques

Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...

متن کامل

Identifying the Suspected Cases of Money Laundering in Banking Using Multiple Attribute Decision Making (MADM)

Money laundering is among the most common financial crimes that negatively affect countries' economies and hurt their social and political relations. With the increasing growth of e-banking and the increase in electronic financial transactions, the identification of money laundering methods and behaviors has become more complex; because money launderers, by accessing the Internet and using new ...

متن کامل

Providing a Method to Identify Malicious Users in Electronic Banking System Using Fuzzy Clustering Techniques

Money-Laundering causes a higher prevalence of crime and reduces the desire tending to invest in productive activities. Also, it leads to weaken the integrity of financial markets and decrease government control over economic policy. Banks are able to prevent theft, fraud, money laundering conducted by customers through identification of their clients’ behavioral characteristics. This leads to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011