Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Technology
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Exploring detection and prevention of money laundering with information technology
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2024) 27 (6): 995–1004.
Published: 30 November 2023
...Geo Finna Aprilia; Meiryani Purpose Regarding the magnitude of the impact caused by money laundering, the size of the organization and the many parties involved, this paper aims to explore the methods used in detecting money laundering, especially the use of technology. Design/methodology...
Journal Articles
Technology and intelligence
Available to Purchase
Journal:
Journal of Money Laundering Control
Journal of Money Laundering Control (2005) 8 (3): 227–242.
Published: 01 July 2005
...Neil J. Jensen Describes the impact of technology on intelligence, which means that vast amounts of data can now be stored, accessed and securely sent and received. Shows how intelligence‐led policing combines with suspicious activity reports (SARs) and cash transaction reports (CTRs...
