Networks of monetary flow at native resolution

10/12/2019
by   Carolina Mattsson, et al.
0

People and companies move money with every financial transaction they make. We aim to understand how such activity gives rise to large-scale patterns of monetary flow. In this work, we trace the movement of e-money through the accounts of a mobile money system using the provider's own transaction records. The resulting transaction sequences—balance-respecting trajectories—are data objects that represent observed monetary flows. Common sequential motifs correspond to known use-cases of mobile money: digital payments, digital transfers, and money storage. We find that each activity creates a distinct network structure within the system, and we uncover coordinated gaming of the mobile money provider's commission schedule. Moreover, we find that e-money passes through the system in anywhere from minutes to months. This pronounced heterogeneity, even within the same use-case, can inform the modeling of turnover in money supply. Our methodology relates economic activity at the transaction level to large-scale patterns of monetary flow, broadening the scope of empirical study about the network and temporal structure of the economy.

READ FULL TEXT

page 4

page 7

research
08/27/2022

TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum

Due to the decentralized and public nature of the Blockchain ecosystem, ...
research
11/05/2018

Top-Down Transaction-Level Design with TL-Verilog

Transaction-Level Verilog (TL-Verilog) is an emerging extension to Syste...
research
12/29/2017

How to Charge Lightning

Off-chain transaction channels represent one of the leading techniques t...
research
02/16/2021

Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking

With the wide application of blockchain in the financial field, the rise...
research
09/05/2018

Digital Urban Sensing: A Multi-layered Approach

Studies of human mobility increasingly rely on digital sensing, the larg...
research
04/22/2015

Semantic Enrichment of Mobile Phone Data Records Using Background Knowledge

Every day, billions of mobile network events (i.e. CDRs) are generated b...
research
05/16/2023

Four Factor Authentication with emerging cybersecurity for Mobile Transactions

Cybersecurity is very essential for Mobile Transactions to complete seam...

Please sign up or login with your details

Forgot password? Click here to reset