<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Building a Reference Model for Anti-Money Laundering in the Financial Sector</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Felix</forename><surname>Timm</surname></persName>
							<email>felix.timm@uni-rostock.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Computer Science</orgName>
								<orgName type="institution">University of Rostock</orgName>
								<address>
									<settlement>Rostock</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Zasada</surname></persName>
							<email>andrea.zasada@uni-rostock.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Computer Science</orgName>
								<orgName type="institution">University of Rostock</orgName>
								<address>
									<settlement>Rostock</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Felix</forename><surname>Thiede</surname></persName>
							<email>felix.thiede@uni-rostock.de</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Computer Science</orgName>
								<orgName type="institution">University of Rostock</orgName>
								<address>
									<settlement>Rostock</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Building a Reference Model for Anti-Money Laundering in the Financial Sector</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">662EBC8CA79656FF9925C75B078232D1</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T15:22+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Reference Modeling</term>
					<term>Compliance Management</term>
					<term>Anti-Money Laundering</term>
					<term>Financial Sector</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Anti-Money Laundering (AML) can be seen as a central problem for financial institutions because of the need to detect compliance violations in various customer contexts. Changing regulations and the strict supervision of financial authorities create an even higher pressure to establish an effective working compliance program. To support financial institutions in building a simple but efficient compliance program we develop a reference model that describes the process and data view for one key process of AML based on literature analysis and expert interviews. Therefore, this paper describes the customer identification process (CIP) as a part of an AML program using reference modeling techniques. The contribution of this work is (i) the application of multi-perspective reference modeling resulting in (ii) a reference model for AML customer identification. Overall, the results help to understand the complexity of AML processes and to establish a sustainable compliance program.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Motivation and Introduction</head><p>The financial industry offers services for individuals and companies to realize money transactions and grant access to numerous financial products such as accounts, shares or credits. Typical financial institutes are banks, insurance and leasing companies. The economic impact of financial activities is enormous. For example, in 2013 the insurance, reinsurance and pension funding in Germany reaches an annual turnover of 251,140 million Euro achieved by only 158,308 employees of 848 companies <ref type="bibr" target="#b0">[1]</ref>.</p><p>The size and structure of the financial industry does not only leave a multitude of financial perspectives but also openings for criminal activities such as money laundering. Money laundering can be described as the process of transforming illegal into legal assets <ref type="bibr" target="#b1">[2]</ref>. The German Institute of Economic Research (DIW) estimates that about 100 billion Euros are laundered in Germany per year. The observance of regulations that prevent illegal activities like money laundering is ensured by business process compliance management <ref type="bibr" target="#b2">[3]</ref>. However, different asset classes and trading platforms make realtime risk and compliance monitoring a challenging and expensive task <ref type="bibr" target="#b3">[4]</ref>. The monetary resources that companies need to invest in their compliance management include implementation, remediation, and penalty associated costs <ref type="bibr" target="#b4">[5]</ref>. A global survey with 200 hedge fund managers reveals that almost two thirds (64 percent) of respondents were spending over 5 percent in 2013 of their total operating costs on meeting compliance requirements <ref type="bibr" target="#b5">[6]</ref>.</p><p>The implementation of compliant business processes requires the collaboration of all involved stakeholders, such as compliance officers, IT and legal experts to build a reference model including necessary compliance requirements. The formal description of compliance requirements can be effectively supported by conceptual modeling techniques. These techniques are applied to improve the understanding and communication among stakeholders, which helps to prevent legal violations and reduces the operating costs of compliance management. An essential part of the compliance management of financial institutes is constituted by anti-money laundering (AML) regulations. In literature, the term reference model is often related to the Enterprise Architecture Management (EAM). EAM is used to reduce the complexity of business activities to create reference models abstracted from reality <ref type="bibr">[7]</ref>. Current approaches tackle single information systems disciplines like e-government and miss so far a documented procedure to build the corresponding reference model <ref type="bibr" target="#b6">[8]</ref>. With this paper, we drive attention to AML regulations and the necessity to develop a reference model that facilitates the application of compliance requirements in the financial industry. The research questions (RQs) are: RQ1: Which compliance regulations have to be adopted for AML prevention? RQ2: How should a reference model for the AML CIP be constituted?</p><p>The paper is structured as follows. In Section 2 we discuss the process of money laundering and give an overview on AML regulations and best practices. After presenting the research method in Section 3, we introduce the reference model for AML customer identification in Section 4. In the end, we discuss the evaluation approach in Section 5 before we conclude our work in Section 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Anti-Money Laundering Regulations</head><p>In general, the money laundering process consists of three stages: placement, layering and integration <ref type="bibr" target="#b7">[9]</ref>. At the first stage illegal money is placed at a bank account. By using an account with a low risk, the money launderer avoids to be detected by authorities. At the layering stage the money is transferred from one to several other accounts, which lowers the chance that law enforcement detects and follows the money flow. At the last stage the money is actually laundered by investing in legal businesses like property or luxury articles <ref type="bibr" target="#b8">[10]</ref>. Research indicates that effective AML is a resource-intensive quest and benefits from the collection, maintenance and dissemination of customer related information <ref type="bibr" target="#b9">[11]</ref>. Another positive impact on AML can be observed regarding the employee work attitude and training <ref type="bibr" target="#b10">[12]</ref>. Laws and guidelines are describing general principles and criteria to establish an AML process and to assign appropriate control activities. This paper covers the German Money Laundry Law (GwG) <ref type="bibr" target="#b11">[13]</ref>, the guidelines published by the Federal Financial Supervisory Authority (BaFin) <ref type="bibr">[16]</ref> and the two international financial supervision committees namely Financial Action Task Force (FATF) <ref type="bibr" target="#b12">[14]</ref> and the Wolfsberg Group <ref type="bibr" target="#b13">[15]</ref>. The GwG explains various levels of diligence that can be used by financial institutions to identify the customer or guarantee the Know Your Customer (KYC) principle. KYC means that financial institutions have to implement a suitable system of internal controls and policies to identify their customers and suspicious transactions <ref type="bibr" target="#b14">[17]</ref>. It describes fines for financial institutions if their money laundering detection fails or AML mechanisms have not been implemented <ref type="bibr" target="#b15">[18]</ref>. The BaFin publishes lists of non-cooperative countries and territories that can be used to identify single financial institutions which follow the law. Moreover, BaFin suggests guidelines that support the customer identification and the ascertainment of the beneficial owner of a company. The FATF recommends that financial institutions should establish compliance programs to prevent money laundering and counter terrorism <ref type="bibr" target="#b16">[19]</ref>. The Wolfsberg Group, an association of eleven global financial institutions, built an industrial standard for compliance <ref type="bibr" target="#b17">[20]</ref>. It is known as the Wolfsberg principles and motivates financial institutions to exchange information on AML cases <ref type="bibr" target="#b18">[21]</ref>. Financial institutions that cannot establish these principles are disclosed <ref type="bibr">[22]</ref>. To ensure that laws and guidelines are met, financial institutions have to establish an organizational framework to identify money laundering cases <ref type="bibr" target="#b19">[23]</ref>. The steps of building an AML program are described in Table <ref type="table">1</ref>. After identifying and adapting financial regulations and guidelines, risk phenomena are measured <ref type="bibr" target="#b17">[20]</ref>. Depending on the results, the AML process is defined usually supported by appropriate software <ref type="bibr" target="#b17">[20]</ref>. Many guidelines also suggest to install organizational structures, which should at least encompass a compliance officer, whose task is to decide which countermeasures to take <ref type="bibr" target="#b10">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1. AML program for financial institutions</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Phase</head><p>Step </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Methodological Approach</head><p>This approach integrates the process and data perspective in one reference model for a central AML process. The aim is to develop a reference model for AML exemplified for the CIP. We therefore conducted a literature analysis on common AML regulations as described in Section 2. To holistically capture the CIP and the data-centric nature of its related KYC paradigm a reference model should consider different perspectives. For developing such a multi-perspective reference model we adapted the procedure model by Rosemann and Schütte (1999) <ref type="bibr" target="#b20">[24]</ref> because it explicitly defines different perspectives on the problem domain. The model consists of five phases: (1) Problem identification, (2) Design of the reference model frame, (3) Design of the reference model structure, (4) Finalization of the reference model and ( <ref type="formula">5</ref>) Application of the reference model. The scope of this paper comprises phase (1) to (4) which are described in Section 4.</p><p>In the first phase a problem definition is given to determine modeling objectives, e.g. reducing the model complexity or improve the process efficiency. This requires a detailed process description including relevant regulations, stakeholders and modelling perspectives, e.g. process, data, application or technology <ref type="bibr" target="#b21">[25]</ref>. As we are addressing customer identification and KYC in our approach, we will focus on the process and data perspective. The second phase is dedicated to the method applied for process modeling and a first sketch of the process, for which we propose the common Business Process Model and Notation (BPMN 2.0) standard. The third phase deals with the actual design of the process model, while phase four is used to enrich the process model with business data and evaluate the model constraints, for which we used the literature analysis. In phase four we conducted two expert interviews with senior IT consultants to complete the process information that has been gained from literature. The experts work for different IT vendors specialized for compliance software in the financial sector. Given their longtime experiences in supporting their customers (i.e. financial institutes) in implementing a successful AML program, we consider them as appropriate experts for our purpose.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Reference Model for Anti-Money Laundering</head><p>The processes of an institute's AML program can be seen as supporting processes related to the daily routines of the banking business, such as account opening, payments or account management. For instance, each transaction made by a customer will be monitored in terms of AML parameters like the transaction's amount. Further, the AML program can be divided into four different activities. The (i) AML hazard analysis is an upstream process, which analyzes all risks that are related to AML such as customeror location-related risks. It results in a risk matrix used to assess a certain customer's likelihood to launder money. The (ii) CIP is triggered every time the institute enters a new business relationship with a customer <ref type="bibr" target="#b17">[20]</ref>. This implies to follow the KYC principle discussed earlier. Every transaction is monitored during the (iii) transaction monitoring process and checked against threshold values depending on the customer's risk assessment. Every suspicious activity triggers the (iv) AML case handling <ref type="bibr" target="#b17">[20]</ref>. According to the experts, process (iii) is usually automated. Thus, we excluded it from our reference model. Process (i) is often performed with a global perspective on the institute, where AML risks are a subset of the holistic risk scheme. Although we consider process (i) vital for correct AML, we excluded it due to space limitations. In consequence, we focused on the processes (ii) and (iv) when performing reference modeling.</p><p>In the following section, we will present the (ii) CIP of an AML program in BPMN and the KYC principles from a data perspective.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Reference Process Perspective on AML</head><p>The main source of information is a literature analysis we performed. On basis of the identified literature the first version of the reference models emerged. Then, two expert interviews were conducted. The resulting models are presented in the following section. The AML CIP is triggered every time a new customer enters a relationship with the institute. Next to the usual customer data handling, on the one hand financial institutes face strict requirements by law in terms of data complexity, validation and screening. On the other hand, institutes have to assess the customer's risk regarding money laundering in order to adjust their AML monitoring systems and research activities. Three types of sources were used to model the reference process model. First, results from the literature analysis <ref type="bibr" target="#b17">[20,</ref><ref type="bibr">22,</ref><ref type="bibr" target="#b22">26,</ref><ref type="bibr" target="#b23">27]</ref> served as a process foundation. Second, laws and directives from different authorities were analyzed <ref type="bibr" target="#b11">[13,</ref><ref type="bibr" target="#b24">28,</ref><ref type="bibr" target="#b25">29]</ref>. Third, known recommendations and best practices were incorporated into the reference model <ref type="bibr" target="#b12">[14,</ref><ref type="bibr" target="#b13">15,</ref><ref type="bibr" target="#b26">30]</ref>. For the final reference model we use the BPMN 2.0 notation for the process perspective, which is visualized in Fig. <ref type="figure" target="#fig_0">1</ref>.</p><p>There are five roles acting in the process, which are represented by the BPMN 2.0 swim lanes. While the customer and a service provider are modeled as a black box lane, the collaboration between three generic departments is modeled. First, the customer's account representative (AR) receives several sources of data from the customer during the customer identification. The amount of data depends on the customer's type (see Section 4.2). The institute needs defined internal guidelines for correct and complete customer data collection derived from national or international law. The guidelines also define how to validate the customer's identity by using official service providers like Office of Foreign Assets Controls (OFAC) or internal identity list. The next step identify customer's purpose of usage is important to predict future account movements and relate the customer to a risk cluster. Subsequently, the AML employee (AE) uses the validated customer data to assess her or his risk profile. Therefore, the customer screening compares the customer's identity with existing AML lists. For instance, the institute has to be aware whether the new customer is a political exposed person (PEP) or named in an official sanction list. Most of these lists can be accessed by service providers such as OFAC or World Check by Thomson Reuters. The institute should define against which lists the customer has to be checked. Afterwards, the AE assesses the customer's risk based on the risk matrix defined by the AML hazard analysis. The results of this risk assessment are then integrated into the monitoring system. The monitoring sys-tem's threshold values are set depending on the customer's risk profile. The more precise and diligent the customer data is assessed, the more exact the monitoring system works. For instance, when a PEP, whose AML risk is set as high, receives a transaction from a country, which AML list providers rate as highly corrupt, the transaction can be identified as a possible AML case. This case will then be handled by the process (iv) AML case handling. The reference model in Fig. <ref type="figure" target="#fig_0">1</ref> also includes a BPMN 2.0 model of the AML hazard analysis with a low level of detail to highlight the dependencies with the customer identification. It is performed by an employee of the risk management department. In general, the institute has to decide which risk phenomena related to the institute contain AML risk and can be measured. For each of these phenomena values are defined, from which scenarios are derived instantiating the different values. These scenarios are assessed regarding their likelihood to represent an AML case. Usually, this is done by defining an AML risk of a scenario from low over medium and high to unacceptable. When a customer's risk is assessed, his profile is related to these scenarios. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reference Data Perspective on AML</head><p>In the CIP the processes data is customer data, risk matrix and AML lists. After structuring the identified data into these clusters, more detailed data structures were built. This was discussed within the expert interviews, which also served as an information source. Table <ref type="table" target="#tab_1">2</ref> summarizes the data structure. The findings reveal that most of the analyzed data is related to the customer. Depending on the type of customer (natural or corporate) the required data fields differ. While the identification of private customers is primarily limited to personal information, the research activities of the AR and AE from Fig. <ref type="figure" target="#fig_0">1</ref> are very complex and cost-intense (e.g. to identify the beneficial owners). Furthermore, the type of relationship the customer enters with the institute needs to be distinguished in the stated data fields. The data about the customer and her or his business relationship with the institute are used to assess the customer's risk level. This is based on the prior developed risk matrix. Table <ref type="table" target="#tab_1">2</ref> shows which risk phenomena should be captured in order to build AML risk categories, e.g. risks related to the customer, countries or even the institute's employees. The AML lists that are used for customer identification are usually provided by third parties (see Section 4.1). The structure in Table <ref type="table" target="#tab_1">2</ref> serves as a general data view on the CIP. The elaboration of the concrete data objects exceeds the scope of the paper. In general, the complexity of data used for customer identification depends on its context, i.e. the type of customer and its environment. The authors derive a strong dependency between the process and data perspective in the CIP. For instance, the sub-tasks of validate customer identity changes with the type of customer. We identify the need to incorporate these dependencies within the reference model. The current reference model uses BPMN 2.0, which is restricted to model the control flow and lacks profound data modeling. Therefore, we suggest the Enterprise Architectures (EA) concept as a possible alternative to the current model structure. EAs capture the structure of an organization from different perspectives (e.g. business, data, application and technology layer) and reveal their interdependencies <ref type="bibr" target="#b21">[25]</ref>. This would add value for institutes to identify the dependencies not only regarding AML but their whole compliance organization.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Evaluation of the Reference Model</head><p>The development of a reference model is an iterative process. This process is characterized by different versions of the considered model. The reference model should be evaluated using a validation method, which may lead to adjustments of the reference model <ref type="bibr" target="#b20">[24]</ref>. In this work two iteration loops were traversed. Therefore, semi-structured telephone interviews with experts of two different vendors for financial compliance software were conducted <ref type="bibr" target="#b27">[31]</ref>. While the first iteration loop concentrated on the process perspective, the second iteration loop focused on the data perspective of the AML program. The experts assessed the reference model as content wise correct, mentioning that the detailed sub-tasks may differ among different institutes. Furthermore, they pointed out that the usage of a complete data structure inside the institutes has a significant influence on the AML program's success. The expert interviews provided most input for the data perspective, which most literature did not discuss in detail. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>This work addresses the need of financial institutes to meet regulatory requirements defined on national and international level. Therefore, we present the results of applying multi-perspective reference modeling by Rosemann and Schütte for an AML program based on a literature analysis and expert interviews <ref type="bibr" target="#b20">[24]</ref>. By analyzing related literature, legislative texts and recommendations from practitioners' working groups, requirements for an AML program have been derived (RQ1). On the basis of these results and two expert interviews, a reference model was developed capturing process and data perspectives of the CIP in an AML program (RQ2). From theoretical point of view this work contributes how to apply reference modeling. Further, practitioners can benefit from this approach in terms of evaluating their current practice of an AML program. Nevertheless, the authors want to point out that the used data base may not be complete in order to provide a sufficient level of detail of the reference model. Moreover, the interviewed experts may be biased since they represent the interests of their respective enterprise. In consequence, the authors see multiple areas for future research in this topic. First, the data base could be enriched by conducting interviews or workshops at the institutes' in order to gather their current state and identify practitioners' best practices, which would result in applying inductive reference modeling <ref type="bibr" target="#b28">[32]</ref>. Second, the proposed reference model could be extended by concepts of EA. Finally, broadening the horizon to other domains of financial compliance like regulatory reporting might identify synergies among different data models, which then would be represented by a holistic reference model.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The CIP reference process in an AML program</figDesc><graphic coords="6,123.35,349.95,346.15,260.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>Data perspective of the CIP</figDesc><table><row><cell></cell><cell cols="2">Contained Information</cell></row><row><cell>Data Object</cell><cell></cell><cell></cell></row><row><cell>Customer Data</cell><cell>A) Natural Person:  Personal data</cell><cell>B) Corporate Identity:  Industry and legal form</cell></row><row><cell></cell><cell>(e.g. name and nationality)</cell><cell> Places of business</cell></row><row><cell></cell><cell> Occupation and industry</cell><cell>(national vs. global)</cell></row><row><cell></cell><cell> Sources of wealth</cell><cell> Beneficial owners</cell></row><row><cell></cell><cell> Relationships to other clients</cell><cell> Organizational structure</cell></row><row><cell></cell><cell> Data of business relationship</cell><cell> Data of business relationship</cell></row><row><cell>Business Relationship</cell><cell> Purpose of account or product  Total assets</cell><cell> Type of account, currency and ac-count opening  Predication of transactions</cell></row><row><cell>Risk Matrix</cell><cell> Customer related</cell><cell> Employee related</cell></row><row><cell></cell><cell> Product related</cell><cell> Transaction related</cell></row><row><cell></cell><cell> Country related</cell><cell> Information systems related</cell></row><row><cell></cell><cell> Business process related</cell><cell> Derived risk categories</cell></row><row><cell>AML Lists</cell><cell> PEP and related lists</cell><cell> Internal lists</cell></row><row><cell></cell><cell> Sanction lists</cell><cell> Country risk lists</cell></row><row><cell></cell><cell> Black lists</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgements. This work has been supported by the BITKOM funded project "IT gestützte Compliance im Finanzsektor".</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Statistisches Jahrbuch</title>
		<imprint>
			<biblScope unit="volume">2015</biblScope>
			<date type="published" when="2016">2016</date>
			<publisher>Weitere Dienstleistungen</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<author>
			<persName><forename type="first">Friedrich</forename><surname>Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ursula</forename><surname>Windischbauer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Money Laundering: Some Facts</title>
				<imprint>
			<date>01/01/10</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">From Legislation to Potential Compliance Violations in Business Processes. Simplicity Matters</title>
		<author>
			<persName><forename type="first">Steffen</forename><surname>Höhenberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Patrick</forename><surname>Dennis M Riehle</surname></persName>
		</author>
		<author>
			<persName><surname>Delfmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the European Conference on Information Systems (ECIS 2016)</title>
				<meeting>the European Conference on Information Systems (ECIS 2016)<address><addrLine>Instanbul, Turkey</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">transform the industry in the decade ahead</title>
	</analytic>
	<monogr>
		<title level="m">Banking reimagined: How disruptive forces will radically</title>
				<imprint>
			<publisher>Deloitte Center for Financial Services</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Compliance management ontology -a shared conceptualization for research and practice in compliance management</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Indulska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sadiq</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10796-016-9631-4</idno>
	</analytic>
	<monogr>
		<title level="j">Inf Syst Front</title>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The Application of Enterprise Reference Architecture in the Financial Industry</title>
		<author>
			<persName><surname>Harmsen Van Der Beek</surname></persName>
		</author>
		<author>
			<persName><surname>Wijke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Trienekens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">KPMG International The Cost of Compliance: 2013 KPMG/AIMA/MFA Global Hedge Fund Survey</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Aier</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Ekstedt</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Matthes</surname></persName>
		</editor>
		<meeting><address><addrLine>Barcelona, Spain; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012-10-23">2012. October 23-24, 2012</date>
			<biblScope unit="volume">131</biblScope>
			<biblScope unit="page" from="93" to="110" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A reference requirements set for public service provision enterprise architectures</title>
		<author>
			<persName><forename type="first">E</forename><surname>Tambouris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kaliva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Liaros</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10270-012-0303-7</idno>
	</analytic>
	<monogr>
		<title level="j">Softw Syst Model</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="991" to="1013" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Chasing dirty money: The fight against money laundering</title>
		<author>
			<persName><forename type="first">P</forename><surname>Reuter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">M</forename><surname>Truman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Inst. for Internat. Economics</title>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Modelling of money laundering and terrorism financing typologies</title>
		<author>
			<persName><forename type="first">Angela</forename><surname>Samantha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maitland</forename><surname>Irwin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kim-Kwang Raymond</forename><surname>Choo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lin</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1108/13685201211238061</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Money Laundering Control</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="316" to="335" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Anti-money laundering regulations and its effectiveness</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Kemal</surname></persName>
		</author>
		<idno type="DOI">10.1108/JMLC-06-2013-0022</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Money Laundering Control</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="416" to="427" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">AML&quot;) management and the importance of employees&apos; work attitude</title>
		<author>
			<persName><forename type="first">Hung</forename><surname>Kwok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">S</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2013 International Conference on Engineering, Management Science and Innovation (ICEMSI)</title>
				<imprint>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
	<note>Anti money laundering</note>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="https://www.gesetze-im-internet.de/bundes-recht/gwg_2008/gesamt.pdf" />
		<title level="m">Gesetz über das Aufspüren von Gewinnen aus schweren Straftaten (Geldwäschegesetz -GwG</title>
				<imprint>
			<publisher>German Goverment</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<ptr target="http://www.fatf-gafi.org/media/fatf/content/images/Na-tional_ML_TF_Risk_Assessment.pdf" />
		<title level="m">Financial Action Task Force (2013) National money laundering and terrorist financing risk assessment</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">Wolfsberg</forename><surname>Group</surname></persName>
		</author>
		<ptr target="http://www.wolfsberg-principles.com/pdf/stand-ards/Wolfsberg_Credit_Cards_AML_Guidance_(2009).pdf" />
		<title level="m">Wolfsberg AML Guidance on Credit/Charge Card Issuing and Merchant Acquiring Activities</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The role of financial intermediaries in elite money laundering practices: Evidence from Nigeria</title>
		<author>
			<persName><forename type="first">Julius</forename><surname>Olatunde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Solabomi</forename><surname>Otusanya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eddy</forename><forename type="middle">Olajide</forename><surname>Omobola Ajibolade</surname></persName>
		</author>
		<author>
			<persName><surname>Omolehinwa</surname></persName>
		</author>
		<idno type="DOI">10.1108/13685201211194736</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Money Laundering Control</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="58" to="84" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m">Anwendungsempfehlungen zur Geld-wäschebekämpfung bei Leasing-Unternehmen</title>
				<imprint>
			<publisher>Bundesverband Deutscher Leasing-Unternehmen</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">COMPLIANCE PROGRAM IN LATVIAS&apos; BANKING SECTOR: THE RESULTS OF A SURVEY</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lagzdins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sloka</surname></persName>
		</author>
		<idno type="DOI">10.5755/j01.eis.0.6.1612</idno>
	</analytic>
	<monogr>
		<title level="j">EurInsStud</title>
		<imprint>
			<biblScope unit="volume">0</biblScope>
			<biblScope unit="issue">6</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m">Anti-money laundering in a nutshell: Awareness and compliance for financial personnel and business</title>
				<editor>
			<persName><forename type="first">K</forename><surname>Sullivan</surname></persName>
		</editor>
		<meeting><address><addrLine>Berkley</addrLine></address></meeting>
		<imprint>
			<publisher>Apress</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Between the hammer and the anvil?: The anti-money laundering-complex and its interactions with the compliance industry</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pieth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Aiolfi</surname></persName>
		</author>
		<author>
			<persName><surname>Verhage</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10611-008-9174-9</idno>
	</analytic>
	<monogr>
		<title level="j">Crime Law Soc Change</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="9" to="32" />
			<date type="published" when="2003">2003. 2009</date>
		</imprint>
	</monogr>
	<note>Anit-Money Laundering: Levelling the Playing Field 22</note>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m">Compliance and the compliance function in banks</title>
				<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>Basel Commitee</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Multiperspektivische Referenzmodellierung</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rosemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Schütte</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Referenzmodellierung: State-of-the-Art und Entwicklungsperspektiven</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Becker</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Rosemann</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Schütte</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Physica-Verlag HD</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="22" to="44" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Strategic Enterprise Architecture Management</title>
		<author>
			<persName><forename type="first">F</forename><surname>Ahlemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Stettiner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Messerschmidt</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin Heidelberg; Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Improving auditor effectiveness in assessing KYC/AML practices</title>
		<author>
			<persName><surname>Smet D De</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mention</surname></persName>
		</author>
		<idno type="DOI">10.1108/02686901111095038</idno>
	</analytic>
	<monogr>
		<title level="j">Managerial Auditing Journal</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="182" to="203" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">The system integration of anti-money laundering data reporting and customer relationship management in commercial banks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ai</surname></persName>
		</author>
		<idno type="DOI">10.1108/JMLC-04-2013-0010</idno>
	</analytic>
	<monogr>
		<title level="j">J of Money Laundering Control</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="231" to="237" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="http://eur-lex.europa.eu/legal-con-tent/EN/TXT/PDF/?uri=CELEX:32015L0849&amp;from=DE" />
		<title level="m">DIRECTIVE (EU) 2015/849 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>European Union</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf" />
		<title level="m">USA Patriot Act</title>
				<imprint>
			<publisher>US Government</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<ptr target="http://www.fatf-gafi.org/media/fatf/documents/recommenda-tions/pdfs/FATF_Recommendations.pdf" />
		<title level="m">International standards on the combating of money launder-ing and the financing of terrorism and proliferation</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>The FATF recommendations</note>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Guidelines for conducting and reporting case study research in software engineering</title>
		<author>
			<persName><forename type="first">P</forename><surname>Runeson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Höst</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10664-008-9102-8</idno>
	</analytic>
	<monogr>
		<title level="j">Empir Software Eng</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="131" to="164" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Identification of Business Process Models in a Digital World</title>
		<author>
			<persName><forename type="first">P</forename><surname>Loos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Fettke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Walter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">BPM -driving Innovation in a digital world</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Vom Brocke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Schmiedel</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="155" to="174" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
