{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:48:29Z","timestamp":1757454509226,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2009,4,3]],"date-time":"2009-04-03T00:00:00Z","timestamp":1238716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4,3]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p><jats:italic>Criminal elements in today's technology\u2010driven society are using every means available at their disposal to launder the proceeds from their illegal activities. While many anti\u2010money laundering (AML) solutions have been in place for some time within the financial community, they face the challenge to adapt to the ever\u2010changing risk and methods in relation to money laundering (ML). This research seeks to focus on ML control and prevention, which aim to automate the monitoring and diagnosing of ML schemes in order to report suspicious activities to banks.<\/jats:italic><\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p><jats:italic>The research adopted the technology of intelligent agents to provide a more adaptive, flexible, and knowledge\u2010based solution for AML.<\/jats:italic><\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p><jats:italic>Based on the analysis of monitoring, diagnosing, and reporting of ML activities occurring in electronic transactions, several types of intelligent agents are proposed and a multi\u2010agent framework is presented for AML. Furthermore, business knowledge such as business rules and strategies are extracted from AML practice, and applied to the design of individual agents to make them act autonomously and collaboratively to fulfil the goal of ML detection.<\/jats:italic><\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p><jats:italic>The proposed multi\u2010agent framework is a stand\u2010alone system, which can be integrated by banks to combat ML. Although it is a uni\u2010bank framework at present, it can be extended to multi\u2010bank application in the future.<\/jats:italic><\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p><jats:italic>The research explores the approach of applying an intelligent agent for knowledge\u2010based AML in an electronic transaction environment for banks. By separating business logic from the business model, such a business\u2010rules approach can enhance the flexibility and adaptability of the agent\u2010based AML system.<\/jats:italic><\/jats:p><\/jats:sec>","DOI":"10.1108\/13673270910942709","type":"journal-article","created":{"date-parts":[[2009,4,27]],"date-time":"2009-04-27T05:08:53Z","timestamp":1240808933000},"page":"63-75","source":"Crossref","is-referenced-by-count":13,"title":["Knowledge\u2010based anti\u2010money laundering: a software agent bank application"],"prefix":"10.1108","volume":"13","author":[{"given":"Shijia","family":"Gao","sequence":"first","affiliation":[]},{"given":"Dongming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Huaiqing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Green","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020919524603100_b1","doi-asserted-by":"crossref","unstructured":"Aguirre, J.L., Brena, R. and Cantu, F.J. (2001), \u201cMultiagent\u2010based knowledge networks\u201d, Expert Systems with Applications, Vol. 20 No. 1, pp. 65\u201075.","DOI":"10.1016\/S0957-4174(00)00049-X"},{"key":"key2022020919524603100_b2","doi-asserted-by":"crossref","unstructured":"Bui, T. and Lee, J. (1999), \u201cAn agent\u2010based framework for building decision support systems\u201d, Decision Support Systems, Vol. 25 No. 3, pp. 225\u201037.","DOI":"10.1016\/S0167-9236(99)00008-1"},{"key":"key2022020919524603100_b3","unstructured":"Byrne, T. (2005), \u201cWill the guilty please raise their hands?\u201d, AML Newsletter, December, pp. 20\u20101."},{"key":"key2022020919524603100_b4","unstructured":"Caglayan, A. and Harrison, C. (1997), Agent Sourcebook: A Complete Guide to Desktop, Internet, and Intranet Agent, John Wiley & Sons, New York, NY."},{"key":"key2022020919524603100_b5","unstructured":"Camdessus, M. (1998), \u201cMoney laundering: the importance of international countermeasures\u201d, IMF to the Plenary Meeting of the Financial Action Task Force on Money Laundering, Paris, IMF, Paris, 10 February."},{"key":"key2022020919524603100_b6","unstructured":"Celent (2002), \u201cAnti\u2010money laundering: a brave new world for financial institutions\u201d, available at: www.celent.com\/PressReleases\/20020927\/AntiMoneyLaundering.htm (accessed 27 September 2002)."},{"key":"key2022020919524603100_b7","unstructured":"(The) CICA (The Canada Institute of Chartered Accountants) (2004), Canada's Anti\u2010Money Laundering & Anti\u2010Terrorist Financing Requirements, February, Toronto."},{"key":"key2022020919524603100_b8","doi-asserted-by":"crossref","unstructured":"Elofson, G., Beranek, P.M. and Thomas, P. (1997), \u201cAn intelligent agent community approach to knowledge sharing\u201d, Decision Support Systems, Vol. 20 No. 1, pp. 83\u201098.","DOI":"10.1016\/S0167-9236(96)00077-2"},{"key":"key2022020919524603100_b10","unstructured":"FATF\u2010GAFI (2008a), \u201cFATA 40 recommendations and nine special recommendations\u201d, available at: www.fatf\u2010gafi.org\/pages\/0,2966,en_32250379_32235720_1_1_1_1_1,00.html."},{"key":"key2022020919524603100_b9","unstructured":"Financial Action Task Force (FATF) (2008b), \u201cBasic facts about money laundering\u201d, available at: www.fatf\u2010gafi.org\/document\/29\/0,3343,en_32250379_32235720_33659613_1_1_1_1,00.html#howmuchmoneyislaunderedperyearm (accessed March 2008)."},{"key":"key2022020919524603100_b11","unstructured":"Franklin, S. and Graesser, A. (1997), \u201cIs it an agent, or just a program?\u201d, in Muller, J., Wooldridge, M. and Jennings, N. (Eds), Intelligent Agents III: Agent Theories, Architectures, and Language: Proceedings ECAI'96 Workshop (ATAL), Budapest, Hungary, August 12\u201013, 1996, Springer\u2010Verlag, Berlin, pp. 1\u201020."},{"key":"key2022020919524603100_b12","unstructured":"Giarratano, J. and Riley, G. (1998), Expert Systems \u2013 Principles and Programming, PWS Publishing Company, Boston, MA."},{"key":"key2022020919524603100_b13","unstructured":"HM Treasury (2004), Anti\u2010Money Laundering Strategy, London, 4 October."},{"key":"key2022020919524603100_b14","unstructured":"Horobin, I. (2001), \u201cApplying technology to fight money laundering\u201d, Money Laundering Bulletin, April."},{"key":"key2022020919524603100_b15","unstructured":"IFAC (International Federation of Accountants) (2002), Anti\u2010Money Laundering, New York, NY, 9 January."},{"key":"key2022020919524603100_b16","doi-asserted-by":"crossref","unstructured":"Jennings, N.R. (2000), \u201cOn agent\u2010based software engineering\u201d, Artificial Intelligence, Vol. 117 No. 2, pp. 227\u201096.","DOI":"10.1016\/S0004-3702(99)00107-1"},{"key":"key2022020919524603100_b17","doi-asserted-by":"crossref","unstructured":"Jennings, N.R. and Wooldridge, M. (1996), \u201cSoftware agents\u201d, IEE Review, Vol. 42 No. 1, pp. 17\u201020.","DOI":"10.1049\/ir:19960101"},{"key":"key2022020919524603100_b18","unstructured":"Jennings, N.R. and Wooldridge, M. (1998), Agent Technology: Foundations, Applications, and Markets, Springer\u2010Verlag, Berlin\/New York, NY."},{"key":"key2022020919524603100_b19","doi-asserted-by":"crossref","unstructured":"Jennings, N.R., Faratin, P., Norman, T.J., O'Brien, P. and Odgers, B. (2000), \u201cAutonomous agents for business process management\u201d, International Journal of Applied Artificial Intelligence, Vol. 14 No. 2, pp. 145\u201089.","DOI":"10.1080\/088395100117106"},{"key":"key2022020919524603100_b20","doi-asserted-by":"crossref","unstructured":"Li, X., Montazemi, A.R. and Yuan, Y. (2006), \u201cAgent\u2010based buddy\u2010finding methodology for knowledge sharing\u201d, Information & Management, Vol. 43 No. 3, pp. 283\u201096.","DOI":"10.1016\/j.im.2005.07.001"},{"key":"key2022020919524603100_b21","doi-asserted-by":"crossref","unstructured":"Liu, K., Sun, L., Dix, A. and Narasipuram, M. (2001), \u201cNorm based agency for designing collaborative information systems\u201d, Information Systems Journal, Vol. 11 No. 3, pp. 229\u201047.","DOI":"10.1046\/j.1365-2575.2001.00102.x"},{"key":"key2022020919524603100_b22","unstructured":"Menon, R. and Kuman, S. (2005), \u201cUnderstanding the role of technology in anti\u2010money laundering compliance\u201d, White paper, Infosys Technology Ltd, Bangalore, January."},{"key":"key2022020919524603100_b23","unstructured":"Moorman, M. (2004), \u201cDetecting terrorist financing\u201d, American Banker, 24 September."},{"key":"key2022020919524603100_b24","unstructured":"Morgan, T. (2002), Business Rules and Information Systems, Addison\u2010Wesley, New York, NY."},{"key":"key2022020919524603100_b25","doi-asserted-by":"crossref","unstructured":"Roda, C., Angehrn, A., Nabeth, T. and Razmerita, L. (2003), \u201cUsing conversational agents to support the adoption of knowledge sharing practices\u201d, Interacting with Computers, Vol. 15 No. 1, pp. 57\u201089.","DOI":"10.1016\/S0953-5438(02)00029-2"},{"key":"key2022020919524603100_b26","doi-asserted-by":"crossref","unstructured":"Shen, W., Norrie, D.H., Barthes, J.P.A. and Shen, W.M. (2001), Multi\u2010Agent Systems for Concurrent Intelligent Design and Manufacturing, Taylor & Francis, New York, NY.","DOI":"10.4324\/9780203305607"},{"key":"key2022020919524603100_b27","unstructured":"Turban, E. and Aronson, J.E. (1998), Decision Support Systems and Intelligent Systems, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020919524603100_b29","doi-asserted-by":"crossref","unstructured":"Wang, H.Q. and Wang, C. (1997), \u201cIntelligent agents in the nuclear industry\u201d, IEEE Computer, Vol. 30 No. 11, pp. 28\u201034.","DOI":"10.1109\/2.634838"},{"key":"key2022020919524603100_b28","doi-asserted-by":"crossref","unstructured":"Wang, H.Q., Mylopoulos, J. and Liao, S. (2002), \u201cIntelligent agents and financial risk monitoring systems\u201d, Communications of the ACM, Vol. 45 No. 3, pp. 83\u20108.","DOI":"10.1145\/504729.504733"},{"key":"key2022020919524603100_b30","unstructured":"Wicks, T. (2001), \u201cIntelligent systems for money laundering prevention\u201d, Money Laundering Bulletin, September."},{"key":"key2022020919524603100_b32","unstructured":"Wooldridge, M. (1999), \u201cIntelligent agents\u201d, in Weiss, G. (Ed.), Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, MIT Press, Cambridge, MA, pp. 27\u201077."},{"key":"key2022020919524603100_b33","unstructured":"Wooldridge, M. (2002), An Introduction to Multiagent Systems, Wiley, Chichester."},{"key":"key2022020919524603100_b31","doi-asserted-by":"crossref","unstructured":"Wooldridge, M. and Jennings, N.R. (1995), \u201cIntelligent agents: theory and practice\u201d, Knowledge Engineering Review, Vol. 10 No. 2, pp. 115\u201052.","DOI":"10.1017\/S0269888900008122"},{"key":"key2022020919524603100_b34","doi-asserted-by":"crossref","unstructured":"Wu, D.J. (2001), \u201cSoftware agents for knowledge management: coordination in multi\u2010agent supply chains and auctions\u201d, Expert Systems with Applications, Vol. 20 No. 1, pp. 51\u201064.","DOI":"10.1016\/S0957-4174(00)00048-8"},{"key":"key2022020919524603100_b35","doi-asserted-by":"crossref","unstructured":"Zhuge, H. (2003), \u201cWorkflow\u2010 and agent\u2010based cognitive flow management for distributed team cooperation\u201d, Information and Management, Vol. 40 No. 5, pp. 419\u201029.","DOI":"10.1016\/S0378-7206(02)00061-7"}],"container-title":["Journal of Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/13673270910942709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13673270910942709\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/13673270910942709\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:11:34Z","timestamp":1753402294000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jkm\/article\/13\/2\/63-75\/256330"}},"subtitle":[],"editor":[{"given":"Eric","family":"Tsui","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2009,4,3]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4,3]]}},"alternative-id":["10.1108\/13673270910942709"],"URL":"https:\/\/doi.org\/10.1108\/13673270910942709","relation":{},"ISSN":["1367-3270"],"issn-type":[{"type":"print","value":"1367-3270"}],"subject":[],"published":{"date-parts":[[2009,4,3]]}}}