The system of counteracting money laundering and financing of terrorism (ML/FT) is built mainly on analysis of data of obliged entities, risk assessment and application of financial security measures. The growing amounts of data connected with their processing for the purpose of execution of subject instruments requirements improvement of methods in the scope of their acquisition, analysis and management. Thus, this system is also a basis for support of the human factor by means of state-of-the-art technical solutions. Therefore, meta data analyses, machine learning, predictive modelling or semantic modelling of natural language are incorporated in the assessment of ML/FT threats. The assumption is that each of these support methods must simplify and accelerate as well as reduce the costs of the processes of identification of ML/FT threats. The data analysis techniques used are aimed at - in the initial phase, before establishing a relationship with the obliged entity - the search for primary data, their verification and determination of the purpose of the client's activity, which may generate a threat. In the advanced phase - ongoing relations with the obliged entity - with the control of its behavior in the profit / risk relationship for safety and the introduction of "drivers" [controller] or "security bells" to the offered products - which is associated with the need to counteract the threat.
Published in | International Journal of Law and Society (Volume 5, Issue 1) |
DOI | 10.11648/j.ijls.20220501.13 |
Page(s) | 19-27 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Financial Information, Risk Assessment, Reconnaissance Information, Money Laundering AML, Semantics, Machine Learning, Natural Language Processing NLP
[1] | Kostera M. (2008), Nowe kierunki w zarządzaniu [New directions in management], Wydawnictwa Akademickie i Profesjonalne [Academic and Professional Publishers], Warsaw, ISBN: 978-83-60807-66-8 (130+4), p. 160. |
[2] | Directive (EU) 2019/1153 of the European Parliament and of the Council of 20 June 2019 laying down rules facilitating the use of financial and other information for the prevention, detection, investigation or prosecution of certain criminal offences, and repealing Council Decision 2000/642/JHA [in:] https://eur-lex.europa.eu/legal-content/PL/TXT/?uri=CELEX%3A32019L1153. |
[3] | Lewinson S. C.) (1983), Pragmatics, p. 2. [in:] https://www.cambridge.org/highereducation/books/pragmatics/6D0011901AE9E92CBC1F5F21D7C598C3#overview. |
[4] | Rybarczyk M (2021)., Real Time marketing: Dynamiczna segmentacja, czyli kampanie na Twoich warunkach [Real Time marketing: Dynamic segmentation, i.e. campaigns on your terms] [in:] https://www.redlink.pl/blog/real-time-marketing-dynamiczna-segmentacja/. |
[5] | Domashova J, Mikhailina N. (2021), Usage of machine learning methods for early detection of money laundering schemes, Procedia Computer Science Volume 190, pp. 184-192 [in:] https://www.sciencedirect.com/science/article/pii/S1877050921012771. |
[6] | Szaniawski K. (1967), Teoria decyzji a etyka [Theory of decision vs ethics], Etyka [Ethics] 2/1967, p. 8-9, [in:] file:///C:/Users/HP/Downloads/686-Tekst%20artykułu-653-3-10-20191029.pdf. |
[7] | Kedzierski M. A. (2021), Pozyskiwanie śladów finansowania terroryzmu i ich przetwarzanie [Acquiring and processing traces of terrorist financing], p. 166, Wydawnictwo Adam Marszałek [Adam Marszalek Publishing House] ISBN: 8381804167, 9788381804165. |
[8] | Skoczeń I., (2016), Granica pomiędzy semantyką a pragmatyką języka prawnego [Boundary between semantics and pragmatics of the legal language], Internetowy Przegląd Prawniczy [Online Legal Review] TBSP UJ 2016/1 ISSN 1689-9601 p. 8 [in:] http://www.tbsp.wpia.uj.edu.pl/documents/4137545/127722957/5_skoczen. |
[9] | Altinok D. (2018), An Ontology-Based Dialogue Management System for Banking and Finance Dialogue Systems [in:] https://arxiv.org/ftp/arxiv/papers/1804/1804.04838.pdf. |
[10] | Kumar S. (2021), Natural Language Processing in Fintech world, [in:] https://www.finextra.com/blogposting/20868/natural-language-processing-in-fintech-world. |
[11] | Ajdukiewicz K., Die syntaktische Konnexität (1935), O spójności syntaktycznej [On syntactic cohesion], Język i poznanie [Language and cognition] (1960) vol. 1 pp. 222-242 – translation of the article publish in German vol. 1-2, Państwowe Wydawnictwo Naukowe [State Scientific Publishers] (1960-1965). |
[12] | The definition of unusual and unjustified transactions from the perspective of the risk of money laundering and terrorist financing, Česka Narodni Banka [Czech National Bank] [in:] https://www.cnb.cz/export/sites/cnb/en/faq/.galleries/definition_of_unusual_and_unjustified_transactions_from_the_perspective_of_the_risk_of_money_laundering_and_terrorist_financing.pdf. |
[13] | Karthik K., Mahajan S. (2020), Money laundering, terrorist financing: Why we need customer risk rating, [in:] https://www.forbesindia.com/blog/finance/money-laundering-terrorist-financing-why-we-need-customer-risk-rating/. |
[14] | Jefferson R.(2007), Generating a dynamic customer risk-rating, pp. 24-25 [in:] http://www.focustechnologygroup.com/files/ACAMS%20TODAY%20march%20april%20pg%2024-25.pdf. |
[15] | Huibers, F. (2021). Distributed Ledger Technology and the Future of Money and Banking: Banking is Necessary, Banks Are Not. Bill Gates 1994. Accounting, Economics, and Law: A Convivium, 1-37. [20190095]. https://doi.org/10.1515/ael-2019-0095. |
APA Style
Matthias Alexander Kedzierski. (2022). Application of Typing and Analysis of Reconnaissance Information for the Purpose of Its Transformation into the Financial Information Administered by FIUs. International Journal of Law and Society, 5(1), 19-27. https://doi.org/10.11648/j.ijls.20220501.13
ACS Style
Matthias Alexander Kedzierski. Application of Typing and Analysis of Reconnaissance Information for the Purpose of Its Transformation into the Financial Information Administered by FIUs. Int. J. Law Soc. 2022, 5(1), 19-27. doi: 10.11648/j.ijls.20220501.13
AMA Style
Matthias Alexander Kedzierski. Application of Typing and Analysis of Reconnaissance Information for the Purpose of Its Transformation into the Financial Information Administered by FIUs. Int J Law Soc. 2022;5(1):19-27. doi: 10.11648/j.ijls.20220501.13
@article{10.11648/j.ijls.20220501.13, author = {Matthias Alexander Kedzierski}, title = {Application of Typing and Analysis of Reconnaissance Information for the Purpose of Its Transformation into the Financial Information Administered by FIUs}, journal = {International Journal of Law and Society}, volume = {5}, number = {1}, pages = {19-27}, doi = {10.11648/j.ijls.20220501.13}, url = {https://doi.org/10.11648/j.ijls.20220501.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijls.20220501.13}, abstract = {The system of counteracting money laundering and financing of terrorism (ML/FT) is built mainly on analysis of data of obliged entities, risk assessment and application of financial security measures. The growing amounts of data connected with their processing for the purpose of execution of subject instruments requirements improvement of methods in the scope of their acquisition, analysis and management. Thus, this system is also a basis for support of the human factor by means of state-of-the-art technical solutions. Therefore, meta data analyses, machine learning, predictive modelling or semantic modelling of natural language are incorporated in the assessment of ML/FT threats. The assumption is that each of these support methods must simplify and accelerate as well as reduce the costs of the processes of identification of ML/FT threats. The data analysis techniques used are aimed at - in the initial phase, before establishing a relationship with the obliged entity - the search for primary data, their verification and determination of the purpose of the client's activity, which may generate a threat. In the advanced phase - ongoing relations with the obliged entity - with the control of its behavior in the profit / risk relationship for safety and the introduction of "drivers" [controller] or "security bells" to the offered products - which is associated with the need to counteract the threat.}, year = {2022} }
TY - JOUR T1 - Application of Typing and Analysis of Reconnaissance Information for the Purpose of Its Transformation into the Financial Information Administered by FIUs AU - Matthias Alexander Kedzierski Y1 - 2022/01/14 PY - 2022 N1 - https://doi.org/10.11648/j.ijls.20220501.13 DO - 10.11648/j.ijls.20220501.13 T2 - International Journal of Law and Society JF - International Journal of Law and Society JO - International Journal of Law and Society SP - 19 EP - 27 PB - Science Publishing Group SN - 2640-1908 UR - https://doi.org/10.11648/j.ijls.20220501.13 AB - The system of counteracting money laundering and financing of terrorism (ML/FT) is built mainly on analysis of data of obliged entities, risk assessment and application of financial security measures. The growing amounts of data connected with their processing for the purpose of execution of subject instruments requirements improvement of methods in the scope of their acquisition, analysis and management. Thus, this system is also a basis for support of the human factor by means of state-of-the-art technical solutions. Therefore, meta data analyses, machine learning, predictive modelling or semantic modelling of natural language are incorporated in the assessment of ML/FT threats. The assumption is that each of these support methods must simplify and accelerate as well as reduce the costs of the processes of identification of ML/FT threats. The data analysis techniques used are aimed at - in the initial phase, before establishing a relationship with the obliged entity - the search for primary data, their verification and determination of the purpose of the client's activity, which may generate a threat. In the advanced phase - ongoing relations with the obliged entity - with the control of its behavior in the profit / risk relationship for safety and the introduction of "drivers" [controller] or "security bells" to the offered products - which is associated with the need to counteract the threat. VL - 5 IS - 1 ER -