Loading…

Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control

The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructin...

Full description

Saved in:
Bibliographic Details
Published in:PloS one 2021-12, Vol.16 (12), p.e0258627-e0258627
Main Author: Sun, Ling
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403
container_end_page e0258627
container_issue 12
container_start_page e0258627
container_title PloS one
container_volume 16
creator Sun, Ling
description The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.
doi_str_mv 10.1371/journal.pone.0258627
format article
fullrecord <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_2608443969</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A686069966</galeid><doaj_id>oai_doaj_org_article_9652abc502c44a04a82b3cadeaa627ac</doaj_id><sourcerecordid>A686069966</sourcerecordid><originalsourceid>FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403</originalsourceid><addsrcrecordid>eNqNk9-L1DAQx4so3nn6H4gWBNGHrmmSZpOXg-Pwx8LBgR6-hmma7mZpkzVJxdV_3vS2d2zlHnxqOv3Md2a-6WTZyxItSrIsP2zd4C10i52zeoFwxRlePspOS0FwwTAij4_OJ9mzELYIVYQz9jQ7IZRzzPjyNPuz6ned7rWNEI2zuWtz59dgze_DO9gm17YphqB9rly_G6Kx6wJsNEWfKu_zDgbbaJ-ieQqY6G6PYx6k9vbBhDzsQ9R9HrQavIn7pGOjd93z7EkLXdAvpudZdvPp483ll-Lq-vPq8uKqUIyWsVhqpBsoy0YAIkqXpBWcLtslwY0iVOOWqroSqmYNFZhTgRQmvCE1q0lFKCJn2euD7K5zQU62BYkZ4pQSwUQiVgeicbCVO2968HvpwMjbQDJEgo9GdVoKVmGoVYWwohQQBY5roqDRAMl_UEnrfKo21L1uVHLWQzcTnX-xZiPX7qfkrBKMj828mwS8-zHoEGVvgtJdB1a74dB3RTDB42Rv_kEfnm6i1pAGMLZ1qa4aReUF4wwxIRhL1OIBCsbRepMuTLcmxWcJ72cJ46XqX3ENQwhy9e3r_7PX3-fs2yN2o6GLm-C6YfwdwxykB1B5F4LX7b3JJZLjity5IccVkdOKpLRXxxd0n3S3E-Qvfx0PcA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2608443969</pqid></control><display><type>article</type><title>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</title><source>PMC (PubMed Central)</source><source>Publicly Available Content (ProQuest)</source><creator>Sun, Ling</creator><contributor>Lv, Zhihan</contributor><creatorcontrib>Sun, Ling ; Lv, Zhihan</creatorcontrib><description>The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0258627</identifier><identifier>PMID: 34882687</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Access control ; Accuracy ; Algorithms ; Computer and Information Sciences ; Crime ; Customers ; Data analysis ; Data mining ; Data transmission ; Decision analysis ; Decision trees ; Digital signatures ; Engineering and Technology ; Experimental data ; Financial institutions ; Financial services ; Insurance ; Insurance companies ; Machine learning ; Money laundering ; Monitoring ; Operating systems ; Organized crime ; Physical Sciences ; Prevention ; Registration ; Research and Analysis Methods ; Security ; Security management ; Social Sciences ; Subsystems ; Surveillance ; Systems Analysis ; Technology ; Technology assessment ; User profiles</subject><ispartof>PloS one, 2021-12, Vol.16 (12), p.e0258627-e0258627</ispartof><rights>COPYRIGHT 2021 Public Library of Science</rights><rights>2021 Ling Sun. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2021 Ling Sun 2021 Ling Sun</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403</cites><orcidid>0000-0001-7575-5844</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2608443969/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2608443969?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,727,780,784,885,25751,27922,27923,37010,37011,44588,53789,53791,74896</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/34882687$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><contributor>Lv, Zhihan</contributor><creatorcontrib>Sun, Ling</creatorcontrib><title>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.</description><subject>Access control</subject><subject>Accuracy</subject><subject>Algorithms</subject><subject>Computer and Information Sciences</subject><subject>Crime</subject><subject>Customers</subject><subject>Data analysis</subject><subject>Data mining</subject><subject>Data transmission</subject><subject>Decision analysis</subject><subject>Decision trees</subject><subject>Digital signatures</subject><subject>Engineering and Technology</subject><subject>Experimental data</subject><subject>Financial institutions</subject><subject>Financial services</subject><subject>Insurance</subject><subject>Insurance companies</subject><subject>Machine learning</subject><subject>Money laundering</subject><subject>Monitoring</subject><subject>Operating systems</subject><subject>Organized crime</subject><subject>Physical Sciences</subject><subject>Prevention</subject><subject>Registration</subject><subject>Research and Analysis Methods</subject><subject>Security</subject><subject>Security management</subject><subject>Social Sciences</subject><subject>Subsystems</subject><subject>Surveillance</subject><subject>Systems Analysis</subject><subject>Technology</subject><subject>Technology assessment</subject><subject>User profiles</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNqNk9-L1DAQx4so3nn6H4gWBNGHrmmSZpOXg-Pwx8LBgR6-hmma7mZpkzVJxdV_3vS2d2zlHnxqOv3Md2a-6WTZyxItSrIsP2zd4C10i52zeoFwxRlePspOS0FwwTAij4_OJ9mzELYIVYQz9jQ7IZRzzPjyNPuz6ned7rWNEI2zuWtz59dgze_DO9gm17YphqB9rly_G6Kx6wJsNEWfKu_zDgbbaJ-ieQqY6G6PYx6k9vbBhDzsQ9R9HrQavIn7pGOjd93z7EkLXdAvpudZdvPp483ll-Lq-vPq8uKqUIyWsVhqpBsoy0YAIkqXpBWcLtslwY0iVOOWqroSqmYNFZhTgRQmvCE1q0lFKCJn2euD7K5zQU62BYkZ4pQSwUQiVgeicbCVO2968HvpwMjbQDJEgo9GdVoKVmGoVYWwohQQBY5roqDRAMl_UEnrfKo21L1uVHLWQzcTnX-xZiPX7qfkrBKMj828mwS8-zHoEGVvgtJdB1a74dB3RTDB42Rv_kEfnm6i1pAGMLZ1qa4aReUF4wwxIRhL1OIBCsbRepMuTLcmxWcJ72cJ46XqX3ENQwhy9e3r_7PX3-fs2yN2o6GLm-C6YfwdwxykB1B5F4LX7b3JJZLjity5IccVkdOKpLRXxxd0n3S3E-Qvfx0PcA</recordid><startdate>20211209</startdate><enddate>20211209</enddate><creator>Sun, Ling</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-7575-5844</orcidid></search><sort><creationdate>20211209</creationdate><title>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</title><author>Sun, Ling</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Access control</topic><topic>Accuracy</topic><topic>Algorithms</topic><topic>Computer and Information Sciences</topic><topic>Crime</topic><topic>Customers</topic><topic>Data analysis</topic><topic>Data mining</topic><topic>Data transmission</topic><topic>Decision analysis</topic><topic>Decision trees</topic><topic>Digital signatures</topic><topic>Engineering and Technology</topic><topic>Experimental data</topic><topic>Financial institutions</topic><topic>Financial services</topic><topic>Insurance</topic><topic>Insurance companies</topic><topic>Machine learning</topic><topic>Money laundering</topic><topic>Monitoring</topic><topic>Operating systems</topic><topic>Organized crime</topic><topic>Physical Sciences</topic><topic>Prevention</topic><topic>Registration</topic><topic>Research and Analysis Methods</topic><topic>Security</topic><topic>Security management</topic><topic>Social Sciences</topic><topic>Subsystems</topic><topic>Surveillance</topic><topic>Systems Analysis</topic><topic>Technology</topic><topic>Technology assessment</topic><topic>User profiles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sun, Ling</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Opposing Viewpoints In Context</collection><collection>Science In Context</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>Nursing &amp; Allied Health Database</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological &amp; Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>Agricultural &amp; Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Materials Science Database</collection><collection>Nursing &amp; Allied Health Database (Alumni Edition)</collection><collection>Meteorological &amp; Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Biological Science Collection</collection><collection>Agriculture Science Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Nursing &amp; Allied Health Premium</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sun, Ling</au><au>Lv, Zhihan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2021-12-09</date><risdate>2021</risdate><volume>16</volume><issue>12</issue><spage>e0258627</spage><epage>e0258627</epage><pages>e0258627-e0258627</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>34882687</pmid><doi>10.1371/journal.pone.0258627</doi><tpages>e0258627</tpages><orcidid>https://orcid.org/0000-0001-7575-5844</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1932-6203
ispartof PloS one, 2021-12, Vol.16 (12), p.e0258627-e0258627
issn 1932-6203
1932-6203
language eng
recordid cdi_plos_journals_2608443969
source PMC (PubMed Central); Publicly Available Content (ProQuest)
subjects Access control
Accuracy
Algorithms
Computer and Information Sciences
Crime
Customers
Data analysis
Data mining
Data transmission
Decision analysis
Decision trees
Digital signatures
Engineering and Technology
Experimental data
Financial institutions
Financial services
Insurance
Insurance companies
Machine learning
Money laundering
Monitoring
Operating systems
Organized crime
Physical Sciences
Prevention
Registration
Research and Analysis Methods
Security
Security management
Social Sciences
Subsystems
Surveillance
Systems Analysis
Technology
Technology assessment
User profiles
title Implementation of organization and end-user computing-anti-money laundering monitoring and analysis system security control
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T20%3A16%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20of%20organization%20and%20end-user%20computing-anti-money%20laundering%20monitoring%20and%20analysis%20system%20security%20control&rft.jtitle=PloS%20one&rft.au=Sun,%20Ling&rft.date=2021-12-09&rft.volume=16&rft.issue=12&rft.spage=e0258627&rft.epage=e0258627&rft.pages=e0258627-e0258627&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0258627&rft_dat=%3Cgale_plos_%3EA686069966%3C/gale_plos_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c641t-7e0eda11d9a03ce13f9847f732dc34e2f4cb59cb6d4928490c238d3b6b353403%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2608443969&rft_id=info:pmid/34882687&rft_galeid=A686069966&rfr_iscdi=true