图书介绍

TECHNOLOGY AND ANTI-MONEY LAUNDERING A SYSTEMS THEORY AND RISK-BASED APPROACHPDF|Epub|txt|kindle电子书版本网盘下载

TECHNOLOGY AND ANTI-MONEY LAUNDERING A SYSTEMS THEORY AND RISK-BASED APPROACH
  • DIONYSIOS S.DEMETIS 著
  • 出版社: EDWARD ELGAR
  • ISBN:1848445563
  • 出版时间:2010
  • 标注页数:188页
  • 文件大小:46MB
  • 文件页数:199页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

TECHNOLOGY AND ANTI-MONEY LAUNDERING A SYSTEMS THEORY AND RISK-BASED APPROACHPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1. Introduction1

2. Introduction to anti-money laundering4

Introduction4

The nature of laundered money5

The laundering process12

Estimating the money laundering market?13

The international fight against ML16

An overview of some global AML features26

The farce of anti-terrorist financing (ATF)31

3.On systems theory36

Introduction36

About systems theory37

Difference and distinction41

The system43

The boundary, the environment et al47

Complexity51

Self-reference54

4.The case study of Drosia bank62

Introduction62

Access to the bank62

General comments about the bank64

AML within the bank68

Examining scenario a) external requests68

Examining scenario b) internal initiation of reporting71

The POSEIDON information system74

The extent and form of asymmetry in STRs78

The CHIMERA system: a new automated solution for AML84

The Electronic Updates System93

The ZEUS profiling software93

Broader comments95

5.Systems theory - a theory for AML97

Introduction97

The system of AML98

The functional differentiation of society and the role of AML102

Coding108

The code of the AML system110

The role of technology in the AML system115

AML -‘islands of reduced complexity’123

The technological construction of AML-reality127

The system of technology132

6.The risk-based approach and a risk-based data-mining application133

Deconstructing risk133

On the regenesis of risk137

The concept of risk138

The 3rd AML Directive and its confusion of risk139

Risk representation144

The construction of risk-deconstruction145

A data-mining application for the risk-based approach148

Epilogue161

Notes163

References168

Index177

热门推荐