Identifying Illicit Activity Through Financial Transactions
January 22, 2014
January 22, 2014
To shield against emerging threats from sources such as rogue states, terrorist groups, organized crime and disaffected internal elements, financial intelligence units need to use financial intelligence solutions to collate and analyze information from multiple source systems. This paper presents the two fundamental architectural approaches for FI solutions -- the database-centric and application-centric approaches.
•Bylaws •Code of Conduct •Privacy Notice •Terms of Use © 2022 Global Association of Risk Professionals