Bank Secrecy Act [[electronic resource] ] : increased use of exemption provisions could reduce currency transaction reporting while maintaining usefulness to law enforcement efforts : report to congressional committees |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2008] |
Descrizione fisica | iii, 99 pages : digital, PDF file |
Soggetto topico |
Foreign exchange - Accounting
Banks and banking Commercial crimes - Prevention |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Bank Secrecy Act |
Record Nr. | UNINA-9910696429103321 |
[Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2008] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Confidentialité et prévention de la criminalité financière / / Guillaume Bègue ; préface d'Alain Couret |
Autore | Bègue Guillaume |
Pubbl/distr/stampa | Bruxelles : , : Bruylant, , [2017] |
Descrizione fisica | 1 online resource (1,018 pages) |
Disciplina | 363.25968 |
Collana | Collection Droit & économie |
Soggetto topico | Commercial crimes - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN | 2-8027-5821-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910467062003321 |
Bègue Guillaume
![]() |
||
Bruxelles : , : Bruylant, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Confidentialité et prévention de la criminalité financière / / Guillaume Bègue ; préface d'Alain Couret |
Autore | Bègue Guillaume |
Pubbl/distr/stampa | Bruxelles : , : Bruylant, , [2017] |
Descrizione fisica | 1 online resource (1,018 pages) |
Disciplina | 363.25968 |
Collana | Collection Droit & économie |
Soggetto topico | Commercial crimes - Prevention |
ISBN | 2-8027-5821-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910795211403321 |
Bègue Guillaume
![]() |
||
Bruxelles : , : Bruylant, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Confidentialité et prévention de la criminalité financière / / Guillaume Bègue ; préface d'Alain Couret |
Autore | Bègue Guillaume |
Pubbl/distr/stampa | Bruxelles : , : Bruylant, , [2017] |
Descrizione fisica | 1 online resource (1,018 pages) |
Disciplina | 363.25968 |
Collana | Collection Droit & économie |
Soggetto topico | Commercial crimes - Prevention |
ISBN | 2-8027-5821-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Record Nr. | UNINA-9910809217503321 |
Bègue Guillaume
![]() |
||
Bruxelles : , : Bruylant, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Fraud analytics using descriptive, predictive, and social network techniques : a guide to data science for fraud detection / / Bart Baesens, Veronique Van Vlasselaer, Wouter Verbeke |
Autore | Baesens Bart |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 364.16/3015195 |
Collana | Wiley and SAS Business Series |
Soggetto topico |
Fraud - Statistical methods
Fraud - Prevention Commercial crimes - Prevention |
ISBN |
1-119-14683-6
1-119-14684-4 1-119-14682-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; List of Figures; Foreword; Preface; Acknowledgments; Chapter 1 Fraud: Detection, Prevention, and Analytics!; Introduction; Fraud!; Fraud Detection and Prevention; Big Data for Fraud Detection; Data-Driven Fraud Detection; Fraud-Detection Techniques; Fraud Cycle; The Fraud Analytics Process Model; Fraud Data Scientists; A Fraud Data Scientist Should Have Solid Quantitative Skills; A Fraud Data Scientist Should Be a Good Programmer; A Fraud Data Scientist Should Excel in Communication and Visualization Skills
A Fraud Data Scientist Should Have a Solid Business Understanding A Fraud Data Scientist Should Be Creative; A Scientific Perspective on Fraud; References; Chapter 2 Data Collection, Sampling, and Preprocessing; Introduction; Types of Data Sources; Merging Data Sources; Sampling; Types of Data Elements; Visual Data Exploration and Exploratory Statistical Analysis; Benford's Law; Descriptive Statistics; Missing Values; Outlier Detection and Treatment; Red Flags; Standardizing Data; Categorization; Weights of Evidence Coding; Variable Selection; Principal Components Analysis; RIDITs PRIDIT Analysis Segmentation; References; Chapter 3 Descriptive Analytics for Fraud Detection; Introduction; Graphical Outlier Detection Procedures; Statistical Outlier Detection Procedures; Break-Point Analysis; Peer-Group Analysis; Association Rule Analysis; Clustering; Introduction; Distance Metrics; Hierarchical Clustering; Example of Hierarchical Clustering Procedures; k-Means Clustering; Self-Organizing Maps; Clustering with Constraints; Evaluating and Interpreting Clustering Solutions; One-Class SVMs; References; Chapter 4 Predictive Analytics for Fraud Detection; Introduction Target Definition Linear Regression; Logistic Regression; Basic Concepts; Logistic Regression Properties; Building a Logistic Regression Scorecard; Variable Selection for Linear and Logistic Regression; Decision Trees; Basic Concepts; Splitting Decision; Stopping Decision; Decision Tree Properties; Regression Trees; Using Decision Trees in Fraud Analytics; Neural Networks; Basic Concepts; Weight Learning; Opening the Neural Network Black Box; Support Vector Machines; Linear Programming; The Linear Separable Case; The Linear Nonseparable Case; The Nonlinear SVM Classifier; SVMs for Regression Opening the SVM Black Box Ensemble Methods; Bagging; Boosting; Random Forests; Evaluating Ensemble Methods; Multiclass Classification Techniques; Multiclass Logistic Regression; Multiclass Decision Trees; Multiclass Neural Networks; Multiclass Support Vector Machines; Evaluating Predictive Models; Splitting Up the Data Set; Performance Measures for Classification Models; Performance Measures for Regression Models; Other Performance Measures for Predictive Analytical Models; Developing Predictive Models for Skewed Data Sets; Varying the Sample Window; Undersampling and Oversampling Synthetic Minority Oversampling Technique (SMOTE) |
Record Nr. | UNINA-9910131489503321 |
Baesens Bart
![]() |
||
Hoboken, New Jersey : , : Wiley, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Fraud analytics using descriptive, predictive, and social network techniques : a guide to data science for fraud detection / / Bart Baesens, Veronique Van Vlasselaer, Wouter Verbeke |
Autore | Baesens Bart |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 364.16/3015195 |
Collana | Wiley and SAS Business Series |
Soggetto topico |
Fraud - Statistical methods
Fraud - Prevention Commercial crimes - Prevention |
ISBN |
1-119-14683-6
1-119-14684-4 1-119-14682-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Contents; List of Figures; Foreword; Preface; Acknowledgments; Chapter 1 Fraud: Detection, Prevention, and Analytics!; Introduction; Fraud!; Fraud Detection and Prevention; Big Data for Fraud Detection; Data-Driven Fraud Detection; Fraud-Detection Techniques; Fraud Cycle; The Fraud Analytics Process Model; Fraud Data Scientists; A Fraud Data Scientist Should Have Solid Quantitative Skills; A Fraud Data Scientist Should Be a Good Programmer; A Fraud Data Scientist Should Excel in Communication and Visualization Skills
A Fraud Data Scientist Should Have a Solid Business Understanding A Fraud Data Scientist Should Be Creative; A Scientific Perspective on Fraud; References; Chapter 2 Data Collection, Sampling, and Preprocessing; Introduction; Types of Data Sources; Merging Data Sources; Sampling; Types of Data Elements; Visual Data Exploration and Exploratory Statistical Analysis; Benford's Law; Descriptive Statistics; Missing Values; Outlier Detection and Treatment; Red Flags; Standardizing Data; Categorization; Weights of Evidence Coding; Variable Selection; Principal Components Analysis; RIDITs PRIDIT Analysis Segmentation; References; Chapter 3 Descriptive Analytics for Fraud Detection; Introduction; Graphical Outlier Detection Procedures; Statistical Outlier Detection Procedures; Break-Point Analysis; Peer-Group Analysis; Association Rule Analysis; Clustering; Introduction; Distance Metrics; Hierarchical Clustering; Example of Hierarchical Clustering Procedures; k-Means Clustering; Self-Organizing Maps; Clustering with Constraints; Evaluating and Interpreting Clustering Solutions; One-Class SVMs; References; Chapter 4 Predictive Analytics for Fraud Detection; Introduction Target Definition Linear Regression; Logistic Regression; Basic Concepts; Logistic Regression Properties; Building a Logistic Regression Scorecard; Variable Selection for Linear and Logistic Regression; Decision Trees; Basic Concepts; Splitting Decision; Stopping Decision; Decision Tree Properties; Regression Trees; Using Decision Trees in Fraud Analytics; Neural Networks; Basic Concepts; Weight Learning; Opening the Neural Network Black Box; Support Vector Machines; Linear Programming; The Linear Separable Case; The Linear Nonseparable Case; The Nonlinear SVM Classifier; SVMs for Regression Opening the SVM Black Box Ensemble Methods; Bagging; Boosting; Random Forests; Evaluating Ensemble Methods; Multiclass Classification Techniques; Multiclass Logistic Regression; Multiclass Decision Trees; Multiclass Neural Networks; Multiclass Support Vector Machines; Evaluating Predictive Models; Splitting Up the Data Set; Performance Measures for Classification Models; Performance Measures for Regression Models; Other Performance Measures for Predictive Analytical Models; Developing Predictive Models for Skewed Data Sets; Varying the Sample Window; Undersampling and Oversampling Synthetic Minority Oversampling Technique (SMOTE) |
Record Nr. | UNINA-9910824829403321 |
Baesens Bart
![]() |
||
Hoboken, New Jersey : , : Wiley, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Integrity in mobile phone financial services [[electronic resource] ] : measures for mitigating risks from money laundering and terrorist financing / / Pierre-Laurent Chatain ... [et al.] |
Pubbl/distr/stampa | Washington, D.C., : World Bank, c2008 |
Descrizione fisica | 1 online resource (98 p.) |
Disciplina | 332.1/70684 |
Altri autori (Persone) | ChatainPierre-Laurent <1961-> |
Collana | World Bank working paper |
Soggetto topico |
Home banking services - Security measures
Electronic funds transfers - Security measures Cell phone systems - Security measures Commercial crimes - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-38590-5
9786611385903 0-8213-7557-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Foreword; Acknowledgments; Abbreviations and Acronyms; Executive Summary.; 1. Introduction; Background; Objective; Scope and Target Audience; Geographical Coverage; Outline; 2. m-FS Growth Potential and Concerns; m-FS Offers Unique Economic Development Potential; Box 1. m-FS Increases Access to Financial Services; m-FS Development Demands a Convergence of Stakeholder Incentives; Figure 1. Convergence of Stakeholders' Incentives Results in m-FS Growth; Perceived ML and TF Risks and the Case for Regulation; Table 1. The Four Identified Risk Factors
Market Access and the Case for Regulatory BalanceBox 2. Suspicious Activities Using Mobile Phones: The Case of Korea; New Challenges to Old Risk Analysis Methods; 3. Analyzing and Responding to ML and TF Risks: Observations of Applied Practices; New Framework for Risk Analysis; Box 3. Framework for Risk Analysis; Figure 2. Mobile Financial Information Services (m-fINFO); ML and TF Risks Inherent in the Four m-FS Service Categories; Figure 3. Mobile Bank and Securities Accounts (m-BSA); Box 4. Risk-based Determination of Transaction Limits: The Case of Korea Table 2. Possible ML and TF Risks and Observed Control Measures for m-BSAFigure 4. Mobile Payment Services (m-Payments); Figure 5. Mobile Money Services (m-Money); ML and TF Risks External to m-FS Service Categories; Table 3. Concurrent Use of m-FS; Figure 6. Concurrent Use of m-FS; Box 5. Collaboration through Regulatory Dialogues; Table 4. Observed m-FS Licensing and AML and CFT Compliance Requirements; Box 6. IT Supervisory Core Group at a Central Bank; Observed Mitigation Responses and their Consistency with FATF Recommendations; 4. Applying FATF Recommendations to m-FS Box 7. Guidelines Designed by Financial InstitutionsTable 5. Most Relevant FATF Recommendations for Risk-Based Consideration; Application of AML and CFT Standards to All m-FS Providers; 5. Conclusions and Policy Recommendations; Conclusions; Policy Recommendations and Issues for Consideration; Figure 7. Soaring Market for Mobile Connections and SMS; Appendix A. m-FS Growth; Table 6. Factors Contributing to Growth of m-FS; Table 7. m-fINFO in Visited Jurisdictions; Appendix B. Types of m-FS and m-FS Services Observed in Fieldwork; Table 8. m-BSA in Visited Jurisdictions Table 9. m-Payments in Visited JurisdictionsTable 10. m-Money in Visited Jurisdictions; Appendix C.Mitigation Measures for m-BSA; Box 8. Non-face-to-face Risk Mitigation Responses: The Case of South Africa; Box 9. Customer Profiling Systems for AML and CFT; Table 11. Observed Limits on m-FS Transactions, USD (2007); Box 10. Korean Rules for Detecting m-BSA Suspicious Transactions; Appendix D.Mitigation Measures for m-Money; Appendix E. The Financial Action Task Force (FATF); Appendix F.Overview of m-FS Risk Identification and Mitigation; Glossary; Bibliography; Author Biographies |
Record Nr. | UNINA-9910454165303321 |
Washington, D.C., : World Bank, c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Integrity in mobile phone financial services : : measures for mitigating risks from money laundering and terrorist financing / / Pierre-Laurent Chatain ... [and others] |
Pubbl/distr/stampa | Washington, D.C. : , : World Bank, , c2008 |
Descrizione fisica | xiv, 80 pages : illustrations ; ; 26 cm |
Disciplina | 332.1/70684 |
Altri autori (Persone) | ChatainPierre-Laurent <1961-> |
Collana | World Bank working paper |
Soggetto topico |
Home banking services - Security measures
Electronic funds transfers - Security measures Cell phone systems - Security measures Commercial crimes - Prevention |
ISBN |
1-281-38590-5
9786611385903 0-8213-7557-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Foreword; Acknowledgments; Abbreviations and Acronyms; Executive Summary.; 1. Introduction; Background; Objective; Scope and Target Audience; Geographical Coverage; Outline; 2. m-FS Growth Potential and Concerns; m-FS Offers Unique Economic Development Potential; Box 1. m-FS Increases Access to Financial Services; m-FS Development Demands a Convergence of Stakeholder Incentives; Figure 1. Convergence of Stakeholders' Incentives Results in m-FS Growth; Perceived ML and TF Risks and the Case for Regulation; Table 1. The Four Identified Risk Factors
Market Access and the Case for Regulatory BalanceBox 2. Suspicious Activities Using Mobile Phones: The Case of Korea; New Challenges to Old Risk Analysis Methods; 3. Analyzing and Responding to ML and TF Risks: Observations of Applied Practices; New Framework for Risk Analysis; Box 3. Framework for Risk Analysis; Figure 2. Mobile Financial Information Services (m-fINFO); ML and TF Risks Inherent in the Four m-FS Service Categories; Figure 3. Mobile Bank and Securities Accounts (m-BSA); Box 4. Risk-based Determination of Transaction Limits: The Case of Korea Table 2. Possible ML and TF Risks and Observed Control Measures for m-BSAFigure 4. Mobile Payment Services (m-Payments); Figure 5. Mobile Money Services (m-Money); ML and TF Risks External to m-FS Service Categories; Table 3. Concurrent Use of m-FS; Figure 6. Concurrent Use of m-FS; Box 5. Collaboration through Regulatory Dialogues; Table 4. Observed m-FS Licensing and AML and CFT Compliance Requirements; Box 6. IT Supervisory Core Group at a Central Bank; Observed Mitigation Responses and their Consistency with FATF Recommendations; 4. Applying FATF Recommendations to m-FS Box 7. Guidelines Designed by Financial InstitutionsTable 5. Most Relevant FATF Recommendations for Risk-Based Consideration; Application of AML and CFT Standards to All m-FS Providers; 5. Conclusions and Policy Recommendations; Conclusions; Policy Recommendations and Issues for Consideration; Figure 7. Soaring Market for Mobile Connections and SMS; Appendix A. m-FS Growth; Table 6. Factors Contributing to Growth of m-FS; Table 7. m-fINFO in Visited Jurisdictions; Appendix B. Types of m-FS and m-FS Services Observed in Fieldwork; Table 8. m-BSA in Visited Jurisdictions Table 9. m-Payments in Visited JurisdictionsTable 10. m-Money in Visited Jurisdictions; Appendix C.Mitigation Measures for m-BSA; Box 8. Non-face-to-face Risk Mitigation Responses: The Case of South Africa; Box 9. Customer Profiling Systems for AML and CFT; Table 11. Observed Limits on m-FS Transactions, USD (2007); Box 10. Korean Rules for Detecting m-BSA Suspicious Transactions; Appendix D.Mitigation Measures for m-Money; Appendix E. The Financial Action Task Force (FATF); Appendix F.Overview of m-FS Risk Identification and Mitigation; Glossary; Bibliography; Author Biographies |
Record Nr. | UNINA-9910782157003321 |
Washington, D.C. : , : World Bank, , c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Integrity in mobile phone financial services : : measures for mitigating risks from money laundering and terrorist financing / / Pierre-Laurent Chatain ... [and others] |
Pubbl/distr/stampa | Washington, D.C. : , : World Bank, , c2008 |
Descrizione fisica | xiv, 80 pages : illustrations ; ; 26 cm |
Disciplina | 332.1/70684 |
Altri autori (Persone) | ChatainPierre-Laurent <1961-> |
Collana | World Bank working paper |
Soggetto topico |
Home banking services - Security measures
Electronic funds transfers - Security measures Cell phone systems - Security measures Commercial crimes - Prevention |
ISBN |
1-281-38590-5
9786611385903 0-8213-7557-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Foreword; Acknowledgments; Abbreviations and Acronyms; Executive Summary.; 1. Introduction; Background; Objective; Scope and Target Audience; Geographical Coverage; Outline; 2. m-FS Growth Potential and Concerns; m-FS Offers Unique Economic Development Potential; Box 1. m-FS Increases Access to Financial Services; m-FS Development Demands a Convergence of Stakeholder Incentives; Figure 1. Convergence of Stakeholders' Incentives Results in m-FS Growth; Perceived ML and TF Risks and the Case for Regulation; Table 1. The Four Identified Risk Factors
Market Access and the Case for Regulatory BalanceBox 2. Suspicious Activities Using Mobile Phones: The Case of Korea; New Challenges to Old Risk Analysis Methods; 3. Analyzing and Responding to ML and TF Risks: Observations of Applied Practices; New Framework for Risk Analysis; Box 3. Framework for Risk Analysis; Figure 2. Mobile Financial Information Services (m-fINFO); ML and TF Risks Inherent in the Four m-FS Service Categories; Figure 3. Mobile Bank and Securities Accounts (m-BSA); Box 4. Risk-based Determination of Transaction Limits: The Case of Korea Table 2. Possible ML and TF Risks and Observed Control Measures for m-BSAFigure 4. Mobile Payment Services (m-Payments); Figure 5. Mobile Money Services (m-Money); ML and TF Risks External to m-FS Service Categories; Table 3. Concurrent Use of m-FS; Figure 6. Concurrent Use of m-FS; Box 5. Collaboration through Regulatory Dialogues; Table 4. Observed m-FS Licensing and AML and CFT Compliance Requirements; Box 6. IT Supervisory Core Group at a Central Bank; Observed Mitigation Responses and their Consistency with FATF Recommendations; 4. Applying FATF Recommendations to m-FS Box 7. Guidelines Designed by Financial InstitutionsTable 5. Most Relevant FATF Recommendations for Risk-Based Consideration; Application of AML and CFT Standards to All m-FS Providers; 5. Conclusions and Policy Recommendations; Conclusions; Policy Recommendations and Issues for Consideration; Figure 7. Soaring Market for Mobile Connections and SMS; Appendix A. m-FS Growth; Table 6. Factors Contributing to Growth of m-FS; Table 7. m-fINFO in Visited Jurisdictions; Appendix B. Types of m-FS and m-FS Services Observed in Fieldwork; Table 8. m-BSA in Visited Jurisdictions Table 9. m-Payments in Visited JurisdictionsTable 10. m-Money in Visited Jurisdictions; Appendix C.Mitigation Measures for m-BSA; Box 8. Non-face-to-face Risk Mitigation Responses: The Case of South Africa; Box 9. Customer Profiling Systems for AML and CFT; Table 11. Observed Limits on m-FS Transactions, USD (2007); Box 10. Korean Rules for Detecting m-BSA Suspicious Transactions; Appendix D.Mitigation Measures for m-Money; Appendix E. The Financial Action Task Force (FATF); Appendix F.Overview of m-FS Risk Identification and Mitigation; Glossary; Bibliography; Author Biographies |
Record Nr. | UNINA-9910828477503321 |
Washington, D.C. : , : World Bank, , c2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
IOMA's security director's report |
Pubbl/distr/stampa | New York, NY, : Institute of Management and Administration |
Descrizione fisica | 1 online resource |
Disciplina | 651 |
Soggetto topico |
Business enterprises - Security measures
Security systems Commercial crimes - Prevention Computer security |
Soggetto genere / forma | Periodicals. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Security director's report
Institute of Management and Administration's security director's report |
Record Nr. | UNISA-996209258803316 |
New York, NY, : Institute of Management and Administration | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|