De lIntelligence Artificielle à lIntelligence Financière
L'AUTOMATISATION INTELLIGENTE DES PROCESSUS FINANCIERS. S'IMPOSE DANS TOUTES LES STRATES utilisons intègrent des principes d'Intelligence Artificielle.
Léducation financière - Manuel du participant Notre relation avec l
Étape 1 - Définissez votre objectif INTELLIGENT. Soyez aussi précis que possible. Incluez tous les coûts associés à la réalisation de vos objectifs. Essayez de
THÈSE
Intelligence financière et statistique zipfienne : deux outils au service de la prise de position sur les marchés financiers.
INTELLIGENCE ÉCONOMIQUE ET MODÉLISATION FINANCIÈRE :
Nous analyserons dans un premier temps quelle peut être la contribution de l'Intelligence. Economique (IE) aux activités financières. Nous montrerons de plus
Online Library Augmentez Votre Intelligence Financiere
4 days ago Télécharger AUGMENTEZ VOTRE. INTELLIGENCE FINANCIERE PDF ... Augmentez votre intelligence financière. (French) Paperback – Jan. 29 2009 by.
INTELLIGENCE FINANCIÈRE ET DU RISQUE
Qui sommes-nous. Diligence préalable et conformité INSIDE. GRC - Gouvernance gesion des risques et conformité. Gesion du risque de réputaion. Surveillance.
Décembre 2018 Intelligence artificielle : enjeux pour le secteur
1 Dec 2018 financier (fédérations professionnelles banques
Quest ce que léducation financière ?
Aujourd'hui la Fédération bancaire française (FBF) la Banque de. France et différents partenaires privés accordent également leur soutien financier. Comme le
Untitled
25 Jul 2016 son intelligence financière et faire bien plus avec moins d'argent et plus de temps pour lui et sa famille ? Ne serait-ce pas une bonne.
Financial Intelligence Units: An Overview (June 2004) - IMF
Financial intelligence units (FIUs) constitute an important component of these strategies An FIU is a central national agency responsible for receiving analyzing and transmitting disclosures on suspicious transactions to the competent authorities
Télécharger gratuitement cours intelligence financière [PDF]
intelligence gathering the report does identify a number of proliferation financing cases Determining for example that a high medium or low number or value of international financial transactions are facilitating proliferation may be impractical however the cases identified in the report show several
De l’innovation financière à l’inclusion - IMF
technologies numériques transforment le secteur financier en changeant à la fois la manière dont les paiements l’épargne l’emprunt et les services d’investissement sont fournis et leurs fournisseurs
Robert T Kiyosaki - databnffr
Guide pour investir (2014) Augmentez votre intelligence ?nancière (2009) Thèmes en relation avec Robert T Kiyosaki (12 ressources dans data bnf fr) Économie politique Travail (7) Crise économique (2008) Finances personnelles Réseaux d'entreprises Succès dans les affaires
Avis sur la digitalisation des services financiers dans le
Le volume des flux financiers générés par les différents marchés : immobiliers santé tourisme mines etc attirent les criminels financiers L’avènementdu numérique D’une part la prolifération des technologies numériques offre aux entreprises des possibilités sans précédent
RedalycBusiness intelligence y la toma de decisiones
de business intelligence en su desarrollo científi-co como en sus diferentes aplicaciones REVISIÓN TEÓRICA En esta sección se presentarán varios elementos relacionados con la Inteligencia de Negocios desa-rrollados todos ellos en diferentes escenarios histó-ricos técnicos y tecnológicos En la sección 2 1 se
FINANCIAL INTELLIGENCE
Jan 12 2006 · FINANCIAL INTELLIGENCE Manager’s Guide to Knowing What the Numbers Really Mean By Karen Berman and Joe Knight with John Case Harvard Business School Press Publication date: January 12 2006 Price: $24 95; Page count: 288; ISBN: 1-59139-764-2 Distributed to the trade by Client Distribution Services
Manuel du participant Notre relation avec l’argent
Étape 2 – Tracez un aperçu des étapes qui vous mèneront à votre objectif Écrivez toutes les étapes que vous devrez suivre grandes ou petites Vous aurez ainsi un tracé clair pour l’atteinte de votre objectif Étape 3 – Examinez les défis et pensez à la stratégie pour les relever
Intelligence économique et management de l'information
L'intelligence économique est d'abord un concept empirique qui s'appuie sur des processus des actions et des comportements en entreprises dont le rapport Martre viendra donner en France une première formalisation (Lebrument 2011)
De l’Intelligence Artificielle - CELGEfr 1er comparateur
De l’Intelligence Artificielle à l’Intelligence Financière Introduction Présentée comme la 4e révolution industrielle l’Intelligence Artificielle (dite I A ) captive tout autant qu’elle questionne ; comment s’intègre-t-elle dans notre quotidien et à quelle échelle peut-elle bouleverser notre économie ?
Searches related to intelligence financière pdf filetype:pdf
Although intelligence sources provide insights into terrorist financing activities that information and information related to money laundering gathered from law enforcement flows to the private sector as risk management guidance advisories and targeted economic sanctions The private sector also is alerted to risks
Quels sont les attributs de l’intelligence financière ?
- Il en est ainsi lorsqu’ils rencontrent des informations comptables, ils peuvent discerner la meilleure ligne de conduite à adopter. De la théorie à l’application réelle, voila les quatre principaux attributs de l’intelligence financière: La fondation: les décideurs doivent comprendre comment lire les documents financiers de base.
Qui a le plus intérêt à développer l’intelligence financière ?
- Il explique que ceux qui évoluent, ou qui souhaitent évoluer, dans les quadrants P et I sont ceux qui ont le plus intérêt à développer leur intelligence financière car leurs revenus sont directement corrélés à leur intelligence financière. La réussite dans les quadrants P et I se mesure avec l’argent.
Comment développer son intelligence financière ?
- Dans ce chapitre l’auteur explique comment concrètement faire pour développer son intelligence financière : L’auteur s’appuie ici sur la notion d’intelligences multiples (concept de Howard Gardner). Logico-mathématiques (capacité à comprendre des concepts logiques et abstraits) Musicale (aisance pour comprendre et reproduire le langage musical)
Quels sont les points essentiels du livre Augmentez votre intelligence financière ?
- Dans ce chapitre Robert Kiyosaki aborde également un point essentiel du livre Augmentez votre intelligence financière. Il explique, qu’en 1971, le Président Nixon, en proclamant la suspension de la convertibilité du dollar en or, a provoqué une modification profonde des règles de l’argent.
Financial Action Task Force
Groupe d'action financière
MONEY LAUNDERING & TERRORIST
FINANCING RISK ASSESSMENT STRATEGIES
18 June 2008
© FATF/OECD 2008
All rights reserved. No reproduction, copy, transmission or translation of this publication may be made without written permission. Applications for permission to reproduce all or part of this publication should be made to: FATF Secretariat, OECD, 2 rue André Pascal 75775 Paris Cedex 16, FranceTABLE OF CONTENTS
Introduction ........................................................... .................................................................... 2I. What is a Risk Assessment? ........................................................................
.......................... 5Conducting a National ML/TF Risk Assessment .......................................................... 5
The FATF Recommendations and the Risk Assessment Process ................................. 6II. Examples of National ML and/or TF Assessments .............................................................. 9
Australia .............................................................. .......................................................... 9 Belgium ................................................................ 10 Canada ................................................................. ........................................................ 11 Japan .................................................................. .......................................................... 11 Macao, China ........................................................................ ...................................... 11 Netherlands ............................................................ ...................................................... 12 Poland ................................................................. ......................................................... 12 Spain .................................................................. .......................................................... 13 United Kingdom ........................................................................ .................................. 14 United States ........................................................................ ....................................... 15 Europol ................................................................ ........................................................ 15 Interpol ............................................................... ......................................................... 16 III. Issues to Consider When Conducting a national ML/TF Risk Assessment ...................... 17Meeting the Needs of the Customer ........................................................................
.... 17Resources and the Assessment Process .......................................................................
17 Interagency Cooperation ........................................................................ ..................... 18Data Availability and Quality ........................................................................
............. 18Developing an Ongoing Assessment Process ............................................................. 18
IV. Sources of Data for a National ML/TF Risk Assessment ................................................. 20
Determining the Threat ........................................................................ ....................... 20 Measuring Crime ........................................................................ ................................. 21 Victimisation Surveys ........................................................................ ......................... 22 Offender Surveys ........................................................................ ................................. 23Other Relevant Data Sources for a Threat Assessment ............................................... 23
Country and Sector ML/TF Vulnerability ................................................................... 24
V. Issues for Further Consideration ........................................................................
................ 27 Conclusion ............................................................. .................................................................. 28 Bibliography ........................................................... ................................................................. 29 Appendix 1: Summary of Money Laundering Assessment Survey Responses ...................... 31Appendix 2: Evaluating Law Enforcement Effectiveness ...................................................... 36
Appendix 3: Estimating the Total Scope of Money Laundering ............................................ 39
ACRONYMS
AML Anti-money laundering
CDDCustomer due diligence
CFTCombating the financing of terrorism
DNFBPs
Designated non-financial businesses and professions FATFFinancial Action Task Force
FIFinancial institution
FIUFinancial intelligence unit
FSRBFATF-style regional body
IMFInternational Monetary Fund
LEALaw enforcement agency
MLMoney laundering
RBARisk-based approach
SARSuspicious activity report
SSIStrategic surveillance initiative
STRSuspicious transaction report
TFTerrorist financing
WGTYPWorking Group on Typologies
WBWorld Bank
INTRODUCTION
1. Understanding the sources and methods of money laundering and terrorist financing in a
jurisdiction is essential for competent authorities to develop and implement an effective anti-money laundering/counter-terrorist financing (AML/CFT) programme. A national money laundering/terrorist financing (ML/TF) risk assessment should be considered the foundation for setting AML/CFT policy priorities and resource allocation.2. The purpose of this report is to provide information on developing a national ML sk
assessment. There are obvious similarities and differences between money laundering and terrorist financing, but the risks of both are often assessed and managed using the same information flows between public and private sector institutions. 13. The Financial Action Task Force (FATF) typology report, Terrorist Financing, published in
February 2008 notes: "The application of the FATF 40 Recommendations and 9 Special Recommendations provides a solid basis upon which to gather financial information. Leveraging thisfinancial information with wider information on counterterrorism, including intelligence, at a national
level may prove to be the most effective use of fi nancial information in identifying terrorist activity." 24. The terminology used in this paper as well as the risk management principles and procedures
that are presented draw heavily on the June 2007 FATF paper, Guidance on the Risk-Based Approach to Combating Money Laundering and Terrorist Financing (RBA paper). 3The RBA paper defined a
"risk management process for dealing with money laundering and terrorist financing" thatencompasses i) recognising the existence of risks; ii) undertaking an assessment of the risk(s); and iii)
developing strategies to manage and mitigate the identified risks. 4This paper offers methodologies for
undertaking the risk assessment portion of that framework at the national level.5. Although depth of coverage may differ, a national ML sk assessment is a process that
typically presents information on: The nature and scale of ML/TF and related predicate crimes (i.e. the threat). Weaknesses in AML/CFT systems and controls and other features of a jurisdiction that make it attractive to money launderers and terrorist financiers (i.e. the vulnerability). 56. The purpose of a national ML sk assessment is to identify money laundering and terrorist
financing methods across a jurisdiction and to determine how often those methods are used, how 1Although intelligence sources provide insights into terrorist financing activities, that information and
information related to money laundering gathered from law enforcement flows to the private sector as risk
management guidance, advisories, and targeted economic sanctions. The private sector also is alerted to risks
regarding specific individuals, entities, and transactions through information requests received from law
enforcement. Relevant ML/TF information flows the other way as well, through currency and transaction
reporting from financial institutions required to file such reports. 2FATF (2008).
3FATF (2007a).
4 Ibid. 5 There are currently no standard definitions used internationally within the AML/CFT context for theterms risk, threat, and vulnerability. This project identifies concepts linked to these terms in order to promote a
consistent approach by countries, but does not go so far as to suggest precise definitions for adoption by the
international community. Having a clear understanding of what the concepts mean, however, will assist countries
when establishing the terms of reference and scale of ambition when conducting a national ML/TF assessment.
2 effective they are in moving illicit funds, and whether there are gaps in the AML/CFT systems and controls.7. A national ML sk assessment should be regarded as "fundamental background
information" to assist supervisors, law enforcement authorities, the financial intelligence unit (FIU),
and financial institutions. 6 This requires that competent authorities periodically renew their awareness of current money laundering and terrorist financing methods and reassess the effectiveness of established safeguards.8. The ML/TF risk assessment process should inform a consideration of whether current laws are
sufficient to address new threats, and whether current methods of supervision and enforcement are adequate. Where the law is inadequate, there is vulnerability. Where the law is adequate, but supervision and examination are weak law enforcement will be overwhelmed. Where law enforcement is weak, the law has little deterrent effect.9. Conducting a risk assessment should be useful to policymakers in identifying AML and CFT
priorities. "The principle is that resources should be directed in accordance with priorities so that the
greatest risks receive the highest attention." 7 Assessments should be tied to strategic planning and linked to specific actions.10. In addition to identifying high priority ML sks at the national or jurisdictional level,
aggregating risk assessments across jurisdictions will help to identify priority concerns at the international level. To support the goal of producing a global threat assessment, the February 2008 FATF plenary initiated the Strategic Surveillance Initiative (SSI). The SSI process includes aggregating existing national ML sk assessments, surveying FATF and FATF-style regional body members regarding emerging trends and high priority ML sks, fact-finding by the FATF Secretariat, and discussion in the FATF Working Group on Typologies (WGTYP).11. This project was undertaken in the FATF WGTYP. The co-chairs of the project were the
International Monetary Fund (IMF), United Kingdom (UK), United States (US) and World Bank. Source material for the project included a review of the relevant literature, consultation with Dr. PeterReuter
8 and Dr. Matthew Hitchcock Fleming, 9 survey responses from FATF members describing jurisdictional risk assessment methodologies and terminology, contributions from the core project group 10 and related discussions in Bangkok, Thailand at the November 2007 FATF TypologiesExperts' Meeting.
12. The first section of the report describes what a national ML sk assessment is and what a
risk assessment project entails. While the risks and the priorities may vary from one country to another, much of the information gathering and even the assessment process are built into the FATFRecommendations.
11 The 40+9 Recommendations and the role of financial institutions, regulatory andsupervisory authorities, financial intelligence units, and law enforcement are mapped to the assessment
process in this first section. 6 Ibid. 7 For more on why to conduct a national money laundering/terrorist financing risk assessment, refer toFATF (2007a).
8 Dr. Reuter is a professor in the School of Public Policy and the Department of Criminology at theUniversity of Maryland in the United States.
9Dr. Fleming is currently serving as a Highly Qualified Expert with the US Department of Defense; he was
a consultant on AML/CFT matters with the IMF at the time of drafting of this report. He has also held positions
with the IMF, World Bank, United Nations, and with University College London's Jill Dando Institute of Crime
Science.
10In addition to the IMF, UK, US and World Bank, the core project team included Australia, Belgium, and
the Netherlands. 11See The FATF 40+9 Recommendations .
313. The second section of the report presents examples of jurisdictional risk assessments covering
money laundering and/or terrorist financing. The methodology and output of these efforts varies, but together they illustrate the many approaches that can be taken to understand how terrorists and criminals move money within a jurisdiction.14. The third section of the report addresses the environment in which a national ML sk
assessment is produced, describing the process and resources needed.A national risk assessment may
be a collection of single agency efforts or a c oordinated multi-agency project. Either approach is resource-intensive requiring information and cooperation from competent authorities.15. The fourth section of the report provides guidance to relevant information sources and
analytical methods that may provide information helpful to understanding the scope of money laundering and/or terrorist financing beyond what can be identified through law enforcement investigations and financial institution currency and transaction reporting.16. The report concludes with suggestions for further study, focusing on FATF Recommendations
31 and 32. These Recommendations address the need for relevant data and cooperation among
competent authorities, which are the two fundamental building blocks of a national ML sk assessment. Although authorities may prefer to work independently on mission-specific ML sk assessments, this approach could suffer from a lack of scope and relevant information unlessopportunities exist for the relevant authorities to reinforce one another's risk analysis and resulting
AML/CFT strategy.
17. Appendix 1 is a summary of the responses received to the project survey issued through the
FATF WGTYP. Appendix 2 describes a model that can be used to help evaluate the effectiveness of law enforcement. Appendix 3 provides a framework to go beyond known data to estimate the full scope of money laundering in a jurisdiction. 4I. WHAT IS A RISK ASSESSMENT?
18. Many industries conduct risk assessments. Depending on the circumstances, a risk assessment
can be retrospective or prospective, quantitative or qualitative, or some combination. A quantitative
risk assessment, using valid data, can be more objective and more useful over time than a qualitative
risk assessment developed from assumptions and random case studies.19. Retrospective risk assessments have the benefit of drawing on data from past events to help
anticipate future problems. 12 Although the past is not always a reliable indicator of the future, consistent patterns can emerge in data and crime data is no exception.20. Prospective risk assessments attempt to see into the future without the benefit of historical
data. 13 The risk assessment process when little or no data is available involves using whatever information is known to anticipate real or potential outcomes. This approach relies primarily on qualitative rather than quantitative indicators.21. The best risk assessment methodology uses a combination of approaches in order to capture
all that is known and as much as possible about what is not known.22. There are likely to be illicit financing methods being used that have not been detected by
financial institutions or law enforcement, and so will not show up in the data gathered from criminal
investigations or financial institution currency or transaction reporting. And there may be other illicit
financing options that even the criminals have not yet discovered. In the absence of data or case studies identifying these methods, financial institutions and competent authorities must rely on creative intuition and a careful analysis of potential systemic weaknesses.Conducting a National ML/TF Risk Assessment
23. A national ML sk assessment is an organised and systematic effort to identify and
evaluate the sources and methods of money laundering and terrorist financing and weakness in the AML/CFT systems and other vulnerabilities that have an impact, either direct or indirect, on the country conducting the assessment. Such an assessment may involve multiple public sector offices working together with or without the private sector, or it may involve one or more individual agencies working independently to assess specific aspects of the country's ML/TF situation.24. An assessment effort that is organised and systematic is one that has a well-defined process
and purpose with clearly stated goals. Also important is that sufficient resources are available, including information, to achieve the stated goals. 12 Life insurance companies study, among other things, the circumstances involved in the deaths ofpolicyholders to look for indicators of premature death that will help in pricing future policies. Auto insurers
study accidents, particularly those involving their policyholders, in order to identify indicators of poor driving
habits. Financial analysts study historic pricing patterns for financial stocks and bonds. Price fluctuation is
perceived as "risk" in financial markets. Doctors and pharmaceutical manufacturers test experimental treatments
on small groups of patients in order to anticipate positive and potentially negative outcomes in the general
population. 13 This kind of assessment is common in industries in which a single accident or malfunction can havehorrific consequences, limiting potential testing (e.g. aircraft design, nuclear power plant operations, and disaster
preparedness). 525. Although depth of coverage may differ, a national ML sk assessment is a process that
typically presents information on: The nature and scale of ML/TF and related predicate crimes (i.e. the threat). Weaknesses in AML/CFT systems and controls and other features of a jurisdiction that make it attractive to money launderers and terrorist financiers (i.e. the vulnerability).26. Assessing the nature and scale of ML/TF and related predicate crimes involves identifying and
quantifying the predicate crimes and methods supporting money laundering and terrorist financing,using law enforcement investigations, prosecutions, and convictions, as well as financial institution
currency and transaction reporting, and other relevant data.27. Assessing weakness in the AML/CFT systems and controls involves determining whether
appropriate laws are in place to block or deter certain illicit financing activity. Where adequate laws
are in place yet data shows that illicit activity is occurring at an unacceptable rate the effectiveness of
law enforcement has to be evaluated, as well as the potential impact of corruption.28. The output of a national ML sk assessment is generally a public document, although in
some jurisdictions, a restricted version may also be produced which may elaborate on specific criminal
(and, potentially, national security) intelligence.29. The national ML sk assessment should be an input to a national strategy, as part of the
country's overall AML sk management process. 1430. The extent to which an assessment can identify and evaluate ML/TF threats depends on the
information available. At a minimum, identifying the common predicate crimes that generate illicit proceeds and the subsequent money laundering methods used should be a routine function of domestic law enforcement. Going beyond identifying to quantifying and evaluating the money laundering/terrorist financing situation requires data from investigations, prosecutions, and convictions; financial institution currency and transaction reporting; and relevant indicators of potential criminal activity.31. Although evaluating the scale and scope of ML/TF is valuable, just identifying all of the
relevant methods of illegal financial activity is often challenging. The risk assessment process will
require that judgments be made about the information available, including what information to use, how to use it, and even how to interpret it. For example, determining what constitutes "domestic"money laundering or terrorist financing can itself be a challenging question. The globalisation of trade,
increasing use of the Internet, and introduction of new payment methods has made it difficult to determine where crimes are committed or where the associated transactions take place.32. Regardless of whether a national ML sk assessment is quantitative or qualitative,
retrospective or prospective, the inputs to the risk assessment process - both objective and subjective
sources of information - should be clearly identified along with any assumptions or interpretations. The FATF Recommendations and the Risk Assessment Process33. Whether a national ML sk assessment is drawn from risk assessments conducted by
individual public sector agencies working independently or is coordinated as a single effort with broad
participation, the private sector, regulatory and supervisory authorities, FIU, and law enforcement 14The strategy should address the vulnerabilities identified in the risk assessment (e.g. implement or amend
laws as appropriate, study identified problems in greater detail as necessa ry, reallocate resources to cover lawenforcement inadequacies, and/or focus on personnel or agencies suspected of creating vulnerabilities through
corruption). 6 community each competent authority involved in AML/CFT has a unique vantage point to make a contribution to the ML/TF risk assessment process.34. Regardless of which offices of the national government collaborate to produce a national
quotesdbs_dbs12.pdfusesText_18[PDF] intendance03
[PDF] intendant établissement scolaire
[PDF] intendant lycée definition
[PDF] intendant zonard
[PDF] intensité concurrentielle secteur automobile
[PDF] intensité du courant exercices corrigés pdf
[PDF] intensité du trafic erlang
[PDF] intensité sonore en fonction de la distance
[PDF] intention d'achat achat
[PDF] intention d'achat immobilier
[PDF] intention stratégique renault
[PDF] intention to treat
[PDF] inter définition
[PDF] inter definition larousse