Online from: 1993
Subject Area: Accounting and Finance
Options: To add Favourites and Table of Contents Alerts please take a Emerald profile
|Title:||Risk-based approach for designing enterprise-wide AML information system solution|
|Author(s):||Lishan Ai, (Centre for Transnational Crime Prevention, Faculty of Law, University of Wollongong, Wollongong, Australia), Jun Tang, (School of Information, Zhongnan University of Economics and Law, Wuhan, People's Republic of China and China Centre for Anti-Money Laundering Studies, Fudan University, Shanghai, People's Republic of China)|
|Citation:||Lishan Ai, Jun Tang, (2011) "Risk-based approach for designing enterprise-wide AML information system solution", Journal of Financial Crime, Vol. 18 Iss: 3, pp.268 - 276|
|Keywords:||China, Enterprise-wide solution, Financial institutions, Information systems, Risk analysis|
|Article type:||Research paper|
|DOI:||10.1108/13590791111147488 (Permanent URL)|
|Publisher:||Emerald Group Publishing Limited|
Purpose – This paper attempts to explain the key elements and associated definitions of the financial institutions' enterprise-wide anti-money laundering (AML) information system, and to discuss the technical theory for implementing the information system.
Design/methodology/approach – The paper defines the problems of defensive filing in the suspicious transaction reports, proposes AML practice from objective standard principle to subjective assessment principle, and provides detailed description of enterprise-wide AML solution.
Findings – As rule-based AML approach and objective-standard monitoring principle have led to numbers of practical problems, a significant tendency of regulatory reform is to replace the objective-standard principle by comprehensive risk-assessment process with considerations of the enterprise's reality.
Originality/value – The paper presents the latest development in enterprise-wide AML information system construction, including customer risk evaluation, transaction risk measurement, behavior monitoring technology, link analysis, risk ranking and workflow tools, etc. and major fundamentals and functions of these modules are also discussed.
To purchase this item please login or register.
Complete and print this form to request this document from your librarian