Details

Anti-Money Laundering Transaction Monitoring Systems Implementation


Anti-Money Laundering Transaction Monitoring Systems Implementation

Finding Anomalies
Wiley and SAS Business Series 1. Aufl.

von: Derek Chau, Maarten van Dijck Nemcsik

39,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 08.12.2020
ISBN/EAN: 9781119381969
Sprache: englisch
Anzahl Seiten: 304

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Effective transaction monitoring begins with proper implementation</b> <p><i>Anti-Money Laundering Transaction Monitoring Systems Implementation</i> provides comprehensive guidance for bank compliance and IT personnel tasked with implementing AML transaction monitoring. Written by an authority on data integration and anti-money laundering technology, this book offers both high-level discussion of transaction monitoring concepts and direct clarification of practical implementation techniques. All transaction monitoring scenarios are composed of a few common elements, and a deep understanding of these elements is the critical factor in achieving your goal; without delving into actual code, this guide provides actionable information suitable for any AML platform or solution to help you implement effective strategies and ensure regulatory compliance for your organization. <p>Transaction monitoring is increasingly critical to banking and business operations, and the effectiveness of any given solution is directly correlated to its implementation. This book provides clear guidance on all facets of AML transaction monitoring, from conception to implementation, to help you: <ul> <li>Detect anomalies in the data</li> <li>Handle known abnormal behavior</li> <li>Comply with regulatory requirements</li> <li>Monitor transactions using various techniques</li> </ul> <p>Regulators all over the world are requiring banks and other companies to institute automated systems that combat money laundering. With many variables at play on both the transaction side and the solution side of the equation, a solid understanding of AML technology and its implementation is the most critical factor in successful detection. <i>Anti-Money Laundering Transaction Monitoring Systems Implementation</i> is an invaluable resource for those tasked with putting these systems in place, providing clear discussion and practical implementation guidance.
<p>About the Authors xiii</p> <p>Acknowledgments xv</p> <p>Preface xvii</p> <p><b>Chapter 1 An Introduction to Anti-Money Laundering 1</b></p> <p>The Emergence of AML 2</p> <p>AML as a Compliance Domain 5</p> <p>The Objectives of AML 9</p> <p>Regulatory Reporting 9</p> <p>Corporate Citizenship versus Profitability 10</p> <p>About True and False Positives and Negatives 11</p> <p>The Evolution of Automated Transaction Monitoring 15</p> <p>From Rule-Based to Risk-Based 17</p> <p>From Static to More Dynamic Transaction Monitoring 22</p> <p>Latest Trends: Machine Learning and Artificial Intelligence 26</p> <p>Latest Trends: Blockchain 29</p> <p>Risk-Based Granularity and Statistical Relevance 34</p> <p>Summary 36</p> <p><b>Chapter 2 Transaction Monitoring in Different Businesses 39</b></p> <p>Banking 43</p> <p>Correspondent Banking 46</p> <p>Banking – Trade Finance 49</p> <p>Banking – Credit Card 60</p> <p>Insurance 60</p> <p>Securities 63</p> <p>Stored Value Facilities (SVFs) 66</p> <p>Casinos and Online Gambling 68</p> <p>Lottery and Jockey Club 70</p> <p>Other Businesses 72</p> <p>Summary 72</p> <p><b>Chapter 3 The Importance of Data 75</b></p> <p>ETL: Extract, Transform, and Load 76</p> <p>Extract: Data Availability and Sourcing 77</p> <p>Transform: Data Quality, Conversion, and Repair 80</p> <p>Data Load and Further Processing 89</p> <p>Loading of the Data 89</p> <p>Data Lineage 92</p> <p>Multiple ETLs 92</p> <p>Summary 93</p> <p><b>Chapter 4 Typical Scenario Elements 95</b></p> <p>Transaction Types 96</p> <p>Actionable Entity 100</p> <p>Scenario Parameters 106</p> <p>Use of Maximum Instead of Minimum Value Threshold 108</p> <p>Threshold per Customer 109</p> <p>Pre-Computing Data 110</p> <p>Timeliness of Alerts 112</p> <p>Use of Ratios 114</p> <p>Ratio as Degree of Change/Similarity 117</p> <p>Ratio as Proportion 119</p> <p>Other Common Issues 120</p> <p><b>Chapter 5 Scenarios in Detail 121</b></p> <p>Large Aggregate Value 122</p> <p>Unexpected Transaction 123</p> <p>High Velocity/Turnover 129</p> <p>Turnaround/Round-Tripping 132</p> <p>Structuring 136</p> <p>Early Termination/Quick Reciprocal Action 141</p> <p>Watchlist 141</p> <p>Common Specifications across Unrelated Entities 142</p> <p>Involving Unrelated Third Party 144</p> <p>One-to-Many 144</p> <p>Transacting Just below Reporting Threshold 145</p> <p><b>Chapter 6 The Selection of Scenarios 147</b></p> <p>Selecting Scenarios 148</p> <p>Regulatory Requirements 148</p> <p>Business Drivers 150</p> <p>Data Quality and Availability of Reference Data 152</p> <p>Maintenance of the Scenario Repository 152</p> <p>How Specific should a Scenario Rule Be? 153</p> <p>Overlapping Scenario Rules 155</p> <p>Summary 156</p> <p><b>Chapter 7 Entity Resolution and Watchlist Matching 157</b></p> <p>Entity Resolution 158</p> <p>Watchlists 161</p> <p>Summary 184</p> <p><b>Chapter 8 Customer Segmentation 185</b></p> <p>The Need for Segmenting Customers 186</p> <p>Approaches to Segmentation 188</p> <p>Overview of Segmentation Steps 191</p> <p>Organizational Profiling 193</p> <p>Common Segmentation Dimensions 195</p> <p>Considerations in Defining Segments 197</p> <p>Check Source Data for Segmentation 199</p> <p>Verify with Statistical Analysis 200</p> <p>Ongoing Monitoring 205</p> <p>Change of Segmentation 205</p> <p>Summary 207</p> <p><b>Chapter 9 Scenario Threshold Tuning 209</b></p> <p>The Need for Tuning 210</p> <p>Parameters and Thresholds 210</p> <p>True versus False, Positive versus Negative 212</p> <p>Cost 213</p> <p>Adapting to the Environment 214</p> <p>Relatively Simple Ways to Tune Thresholds 215</p> <p>Objective of Scenario Threshold Tuning 216</p> <p>Increasing Alert Productivity 216</p> <p>Definition of a Productive Alert 219</p> <p>Use of Thresholds in Different Kinds of Scenario Rules 220</p> <p>Regulation-Driven Rules 220</p> <p>Statistical Outlier 221</p> <p>Insignificance Threshold 225</p> <p>Safety-Blanket Rules 225</p> <p>Combining Parameters 226</p> <p>Steps for Threshold Tuning 228</p> <p>Preparation of Analysis Data 234</p> <p>Scope of Data 234</p> <p>Data Columns 234</p> <p>Quick and Easy Approach 237</p> <p>Analysis of Dates 238</p> <p>Stratified Sampling 239</p> <p>Statistical Analysis of Each Tunable Scenario Threshold Variable 239</p> <p>Population Distribution Table by Percentile (Ranking Analysis) 244</p> <p>Distribution Diagram Compressed as a Single Line 245</p> <p>Multiple Peaks 246</p> <p>Zeros 246</p> <p>Above-the-Line Analysis and Below-the-Line Analysis 247</p> <p>Above-the-Line Analysis 247</p> <p>Below-the-Line Analysis 249</p> <p>Use of Scatter plots and Interactions between Parameter Variables 251</p> <p>Binary Search 258</p> <p>What-If Tests and Mock Investigation 260</p> <p>What-If Tests 260</p> <p>Sample Comparisons of What-If Tests 261</p> <p>Qualifying Results of What-If Tests 262</p> <p>Scenario Review Report 263</p> <p>Scenario Review Approach 268</p> <p>Scenario Review Results 268</p> <p>Summary 274</p> <p>Index 277</p>
<p><b>CHAU CHAN YIP (DEREK)</b> is Principal Technical Consultant at SAS Hong Kong since 2010. He was formerly a Technology Consultant at Hewlett Packard. He specializes in data integration and anti-money laundering. He received his Master of Science degree in Computer Science from the Chinese University of Hong Kong. <p><b>MAARTEN VAN DIJCK NEMCSIK, LLM, P<small>H</small>D,</b> has worked with SAS since 2012 as a financial crime and tax compliance domain expert and solution lead. He is part of the SAS Global Fraud & Security Business Intelligence Unit, responsible for internal and external training courses in the financial crime and compliance space.
<p><b>Learn how to design and implement an effective AML solution from the ground up</b> <p>As anti-money laundering (AML) regulations become more complex, and as the penalties for non-compliance become more severe, companies everywhere are struggling with the efficient implementation of AML systems and processes. <p><i>Anti-Money Laundering Transaction Monitoring Systems Implementation: Finding Anomalies</i> offers readers a practical guide to creating and employing effective AML strategies that detect suspicious and abnormal financial activity and protect your firm, and its executives and employees, from the fines and penalties associated with failing to abide by AML regulations. <p>In addition to a comprehensive introduction to the world of AML, you'll learn about monitoring transactions in a wide variety of businesses, including banking, insurance, securities, and gaming. The author provides information about the importance of accurate data, as well as how to use typical scenarios to detect suspicious activity. <p>This book is ideal for compliance officers and managers, as well as Chief Compliance Officers and other executives in industries that must comply with AML regulations. IT employees who regularly interact with AML systems will also benefit from the insights contained within, as will the banking professionals who are on the front lines of the AML fight.

Diese Produkte könnten Sie auch interessieren:

Mindfulness
Mindfulness
von: Gill Hasson
PDF ebook
12,99 €
Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €