Access the full text.
Sign up today, get DeepDyve free for 14 days.
Y. Shi
Analysis of over‐reporting issue in Chinese suspicious activity reporting system
J. Tang
Customer behavior‐based AML monitoring and analysis system
C.H. Zhang, Y.Y. Sun, W.H. Yao
Determination of individual suspicious transaction based on cluster analysis
Z.A. Gao
Anti‐money laundering: is suspicious reporting system effective?
FFIEC
Bank Secrecy Act/Anti‐Money Laundering Examination Manual
X.F. Shi, Z.Q. Qiu
Learning from American experience: improving Chinese AML system
FATF on Money Laundering
First Mutual Evaluation Report on Anti‐Money Laundering and Combating the Financing of Terrorism, People's Republic of China
S. Yang, P. Wang
Data‐mining based RMB anti‐money laundering system
J. Kingdon (2004)
AI Fights Money LaunderingIEEE Intell. Syst., 19
Purpose – This paper attempts to explain the key elements and associated definitions of the financial institutions' enterprise‐wide anti‐money laundering (AML) information system, and to discuss the technical theory for implementing the information system. Design/methodology/approach – The paper defines the problems of defensive filing in the suspicious transaction reports, proposes AML practice from objective standard principle to subjective assessment principle, and provides detailed description of enterprise‐wide AML solution. Findings – As rule‐based AML approach and objective‐standard monitoring principle have led to numbers of practical problems, a significant tendency of regulatory reform is to replace the objective‐standard principle by comprehensive risk‐assessment process with considerations of the enterprise's reality. Originality/value – The paper presents the latest development in enterprise‐wide AML information system construction, including customer risk evaluation, transaction risk measurement, behavior monitoring technology, link analysis, risk ranking and workflow tools, etc. and major fundamentals and functions of these modules are also discussed.
Journal of Financial Crime – Emerald Publishing
Published: Jul 19, 2011
Keywords: Risk analysis; Enterprise‐wide solution; Information systems; China; Financial institutions
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.