Loading…
Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control
The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructin...
Saved in:
Published in: | PloS one 2021-12, Vol.16 (12), p.e0258627-e0258627 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403 |
container_end_page | e0258627 |
container_issue | 12 |
container_start_page | e0258627 |
container_title | PloS one |
container_volume | 16 |
creator | Sun, Ling |
description | The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%. |
doi_str_mv | 10.1371/journal.pone.0258627 |
format | article |
fullrecord | <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_2608443969</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A686069966</galeid><doaj_id>oai_doaj_org_article_9652abc502c44a04a82b3cadeaa627ac</doaj_id><sourcerecordid>A686069966</sourcerecordid><originalsourceid>FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403</originalsourceid><addsrcrecordid>eNqNk9-L1DAQx4so3nn6H4gWBNGHrmmSZpOXg-Pwx8LBgR6-hmma7mZpkzVJxdV_3vS2d2zlHnxqOv3Md2a-6WTZyxItSrIsP2zd4C10i52zeoFwxRlePspOS0FwwTAij4_OJ9mzELYIVYQz9jQ7IZRzzPjyNPuz6ned7rWNEI2zuWtz59dgze_DO9gm17YphqB9rly_G6Kx6wJsNEWfKu_zDgbbaJ-ieQqY6G6PYx6k9vbBhDzsQ9R9HrQavIn7pGOjd93z7EkLXdAvpudZdvPp483ll-Lq-vPq8uKqUIyWsVhqpBsoy0YAIkqXpBWcLtslwY0iVOOWqroSqmYNFZhTgRQmvCE1q0lFKCJn2euD7K5zQU62BYkZ4pQSwUQiVgeicbCVO2968HvpwMjbQDJEgo9GdVoKVmGoVYWwohQQBY5roqDRAMl_UEnrfKo21L1uVHLWQzcTnX-xZiPX7qfkrBKMj828mwS8-zHoEGVvgtJdB1a74dB3RTDB42Rv_kEfnm6i1pAGMLZ1qa4aReUF4wwxIRhL1OIBCsbRepMuTLcmxWcJ72cJ46XqX3ENQwhy9e3r_7PX3-fs2yN2o6GLm-C6YfwdwxykB1B5F4LX7b3JJZLjity5IccVkdOKpLRXxxd0n3S3E-Qvfx0PcA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2608443969</pqid></control><display><type>article</type><title>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</title><source>PMC (PubMed Central)</source><source>Publicly Available Content (ProQuest)</source><creator>Sun, Ling</creator><contributor>Lv, Zhihan</contributor><creatorcontrib>Sun, Ling ; Lv, Zhihan</creatorcontrib><description>The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0258627</identifier><identifier>PMID: 34882687</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Access control ; Accuracy ; Algorithms ; Computer and Information Sciences ; Crime ; Customers ; Data analysis ; Data mining ; Data transmission ; Decision analysis ; Decision trees ; Digital signatures ; Engineering and Technology ; Experimental data ; Financial institutions ; Financial services ; Insurance ; Insurance companies ; Machine learning ; Money laundering ; Monitoring ; Operating systems ; Organized crime ; Physical Sciences ; Prevention ; Registration ; Research and Analysis Methods ; Security ; Security management ; Social Sciences ; Subsystems ; Surveillance ; Systems Analysis ; Technology ; Technology assessment ; User profiles</subject><ispartof>PloS one, 2021-12, Vol.16 (12), p.e0258627-e0258627</ispartof><rights>COPYRIGHT 2021 Public Library of Science</rights><rights>2021 Ling Sun. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2021 Ling Sun 2021 Ling Sun</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403</cites><orcidid>0000-0001-7575-5844</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2608443969/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2608443969?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,25751,27922,27923,37010,37011,44588,53789,53791,74896</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/34882687$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Lv, Zhihan</contributor><creatorcontrib>Sun, Ling</creatorcontrib><title>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.</description><subject>Access control</subject><subject>Accuracy</subject><subject>Algorithms</subject><subject>Computer and Information Sciences</subject><subject>Crime</subject><subject>Customers</subject><subject>Data analysis</subject><subject>Data mining</subject><subject>Data transmission</subject><subject>Decision analysis</subject><subject>Decision trees</subject><subject>Digital signatures</subject><subject>Engineering and Technology</subject><subject>Experimental data</subject><subject>Financial institutions</subject><subject>Financial services</subject><subject>Insurance</subject><subject>Insurance companies</subject><subject>Machine learning</subject><subject>Money laundering</subject><subject>Monitoring</subject><subject>Operating systems</subject><subject>Organized crime</subject><subject>Physical Sciences</subject><subject>Prevention</subject><subject>Registration</subject><subject>Research and Analysis Methods</subject><subject>Security</subject><subject>Security management</subject><subject>Social Sciences</subject><subject>Subsystems</subject><subject>Surveillance</subject><subject>Systems Analysis</subject><subject>Technology</subject><subject>Technology assessment</subject><subject>User profiles</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNqNk9-L1DAQx4so3nn6H4gWBNGHrmmSZpOXg-Pwx8LBgR6-hmma7mZpkzVJxdV_3vS2d2zlHnxqOv3Md2a-6WTZyxItSrIsP2zd4C10i52zeoFwxRlePspOS0FwwTAij4_OJ9mzELYIVYQz9jQ7IZRzzPjyNPuz6ned7rWNEI2zuWtz59dgze_DO9gm17YphqB9rly_G6Kx6wJsNEWfKu_zDgbbaJ-ieQqY6G6PYx6k9vbBhDzsQ9R9HrQavIn7pGOjd93z7EkLXdAvpudZdvPp483ll-Lq-vPq8uKqUIyWsVhqpBsoy0YAIkqXpBWcLtslwY0iVOOWqroSqmYNFZhTgRQmvCE1q0lFKCJn2euD7K5zQU62BYkZ4pQSwUQiVgeicbCVO2968HvpwMjbQDJEgo9GdVoKVmGoVYWwohQQBY5roqDRAMl_UEnrfKo21L1uVHLWQzcTnX-xZiPX7qfkrBKMj828mwS8-zHoEGVvgtJdB1a74dB3RTDB42Rv_kEfnm6i1pAGMLZ1qa4aReUF4wwxIRhL1OIBCsbRepMuTLcmxWcJ72cJ46XqX3ENQwhy9e3r_7PX3-fs2yN2o6GLm-C6YfwdwxykB1B5F4LX7b3JJZLjity5IccVkdOKpLRXxxd0n3S3E-Qvfx0PcA</recordid><startdate>20211209</startdate><enddate>20211209</enddate><creator>Sun, Ling</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-7575-5844</orcidid></search><sort><creationdate>20211209</creationdate><title>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</title><author>Sun, Ling</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Accuracy</topic><topic>Algorithms</topic><topic>Computer and Information Sciences</topic><topic>Crime</topic><topic>Customers</topic><topic>Data analysis</topic><topic>Data mining</topic><topic>Data transmission</topic><topic>Decision analysis</topic><topic>Decision trees</topic><topic>Digital signatures</topic><topic>Engineering and Technology</topic><topic>Experimental data</topic><topic>Financial institutions</topic><topic>Financial services</topic><topic>Insurance</topic><topic>Insurance companies</topic><topic>Machine learning</topic><topic>Money laundering</topic><topic>Monitoring</topic><topic>Operating systems</topic><topic>Organized crime</topic><topic>Physical Sciences</topic><topic>Prevention</topic><topic>Registration</topic><topic>Research and Analysis Methods</topic><topic>Security</topic><topic>Security management</topic><topic>Social Sciences</topic><topic>Subsystems</topic><topic>Surveillance</topic><topic>Systems Analysis</topic><topic>Technology</topic><topic>Technology assessment</topic><topic>User profiles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sun, Ling</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Opposing Viewpoints In Context</collection><collection>Science In Context</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing & Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agriculture Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing & Allied Health Premium</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sun, Ling</au><au>Lv, Zhihan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2021-12-09</date><risdate>2021</risdate><volume>16</volume><issue>12</issue><spage>e0258627</spage><epage>e0258627</epage><pages>e0258627-e0258627</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>34882687</pmid><doi>10.1371/journal.pone.0258627</doi><tpages>e0258627</tpages><orcidid>https://orcid.org/0000-0001-7575-5844</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-6203 |
ispartof | PloS one, 2021-12, Vol.16 (12), p.e0258627-e0258627 |
issn | 1932-6203 1932-6203 |
language | eng |
recordid | cdi_plos_journals_2608443969 |
source | PMC (PubMed Central); Publicly Available Content (ProQuest) |
subjects | Access control Accuracy Algorithms Computer and Information Sciences Crime Customers Data analysis Data mining Data transmission Decision analysis Decision trees Digital signatures Engineering and Technology Experimental data Financial institutions Financial services Insurance Insurance companies Machine learning Money laundering Monitoring Operating systems Organized crime Physical Sciences Prevention Registration Research and Analysis Methods Security Security management Social Sciences Subsystems Surveillance Systems Analysis Technology Technology assessment User profiles |
title | Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T20%3A16%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20of%20organization%20and%20end-user%20computing-anti-money%20laundering%20monitoring%20and%20analysis%20system%20security%20control&rft.jtitle=PloS%20one&rft.au=Sun,%20Ling&rft.date=2021-12-09&rft.volume=16&rft.issue=12&rft.spage=e0258627&rft.epage=e0258627&rft.pages=e0258627-e0258627&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0258627&rft_dat=%3Cgale_plos_%3EA686069966%3C/gale_plos_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2608443969&rft_id=info:pmid/34882687&rft_galeid=A686069966&rfr_iscdi=true |