图书介绍
TECHNOLOGY AND ANTI-MONEY LAUNDERING A SYSTEMS THEORY AND RISK-BASED APPROACHPDF|Epub|txt|kindle电子书版本网盘下载
![TECHNOLOGY AND ANTI-MONEY LAUNDERING A SYSTEMS THEORY AND RISK-BASED APPROACH](https://www.shukui.net/cover/1/33996015.jpg)
- DIONYSIOS S.DEMETIS 著
- 出版社: EDWARD ELGAR
- ISBN:1848445563
- 出版时间:2010
- 标注页数:188页
- 文件大小:46MB
- 文件页数:199页
- 主题词:
PDF下载
下载说明
TECHNOLOGY AND ANTI-MONEY LAUNDERING A SYSTEMS THEORY AND RISK-BASED APPROACHPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1. Introduction1
2. Introduction to anti-money laundering4
Introduction4
The nature of laundered money5
The laundering process12
Estimating the money laundering market?13
The international fight against ML16
An overview of some global AML features26
The farce of anti-terrorist financing (ATF)31
3.On systems theory36
Introduction36
About systems theory37
Difference and distinction41
The system43
The boundary, the environment et al47
Complexity51
Self-reference54
4.The case study of Drosia bank62
Introduction62
Access to the bank62
General comments about the bank64
AML within the bank68
Examining scenario a) external requests68
Examining scenario b) internal initiation of reporting71
The POSEIDON information system74
The extent and form of asymmetry in STRs78
The CHIMERA system: a new automated solution for AML84
The Electronic Updates System93
The ZEUS profiling software93
Broader comments95
5.Systems theory - a theory for AML97
Introduction97
The system of AML98
The functional differentiation of society and the role of AML102
Coding108
The code of the AML system110
The role of technology in the AML system115
AML -‘islands of reduced complexity’123
The technological construction of AML-reality127
The system of technology132
6.The risk-based approach and a risk-based data-mining application133
Deconstructing risk133
On the regenesis of risk137
The concept of risk138
The 3rd AML Directive and its confusion of risk139
Risk representation144
The construction of risk-deconstruction145
A data-mining application for the risk-based approach148
Epilogue161
Notes163
References168
Index177