点此搜书

TECHNOLOGY AND ANTI-MONEY LAUNDERING  A SYSTEMS THEORY AND RISK-BASED APPROACH
  • 作 者:DIONYSIOS S.DEMETIS
  • 出 版 社:EDWARD ELGAR
  • 出版年份:2010
  • ISBN:1848445563
  • 标注页数:188 页
  • PDF页数:199 页
  • 请阅读订购服务说明与试读!

文档类型

价格(积分)

购买连接

试读

PDF格式

8

立即购买

点击试读

订购服务说明

1、本站所有的书默认都是PDF格式,该格式图书只能阅读和打印,不能再次编辑。

2、除分上下册或者多册的情况下,一般PDF页数一定要大于标注页数才建议下单购买。【本资源199 ≥188页】

图书下载及付费说明

1、所有的电子图书为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、电子图书在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

3、所有的电子图书都是原书直接扫描方式制作而成。

1. Introduction 1

2. Introduction to anti-money laundering 4

Introduction 4

The nature of laundered money 5

The laundering process 12

Estimating the money laundering market? 13

The international fight against ML 16

An overview of some global AML features 26

The farce of anti-terrorist financing (ATF) 31

3.On systems theory 36

Introduction 36

About systems theory 37

Difference and distinction 41

The system 43

The boundary, the environment et al 47

Complexity 51

Self-reference 54

4.The case study of Drosia bank 62

Introduction 62

Access to the bank 62

General comments about the bank 64

AML within the bank 68

Examining scenario a) external requests 68

Examining scenario b) internal initiation of reporting 71

The POSEIDON information system 74

The extent and form of asymmetry in STRs 78

The CHIMERA system: a new automated solution for AML 84

The Electronic Updates System 93

The ZEUS profiling software 93

Broader comments 95

5.Systems theory - a theory for AML 97

Introduction 97

The system of AML 98

The functional differentiation of society and the role of AML 102

Coding 108

The code of the AML system 110

The role of technology in the AML system 115

AML -‘islands of reduced complexity’ 123

The technological construction of AML-reality 127

The system of technology 132

6.The risk-based approach and a risk-based data-mining application 133

Deconstructing risk 133

On the regenesis of risk 137

The concept of risk 138

The 3rd AML Directive and its confusion of risk 139

Risk representation 144

The construction of risk-deconstruction 145

A data-mining application for the risk-based approach 148

Epilogue 161

Notes 163

References 168

Index 177

购买PDF格式(8分)
返回顶部