<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Basic Scenario Reports and Information Algorithms Intelligent System of Financial Monitoring</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pavel Petrov</string-name>
          <email>petrov@ue-varna.bg</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yaroslav Petrivskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Derkach</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Petrivskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>CEUR Workshop Proceedings (CEUR-WS.org) Proceedings</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Rivne State Humanitarian University</institution>
          ,
          <addr-line>St. Bandery str. 12, Rivne, 33000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Bohdan Hawrylyshyn str. 24, Kyiv, 01001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Economics</institution>
          ,
          <addr-line>Varna</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <fpage>20</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>In the article the main principles of creating intelligent information systems for monitoring and controlling the financial sector of the circulation of funds are discussed. The conceptual foundations of the design of a flexible model of the Integrated Software Package for Preventing Abuses in Financial Practices are proposed, which uses seventeen basic scenarios as reliability criteria, which is successfully integrated with various banking products (the bank's operational day), solves the issue of multifaceted testing and detection of abuses in banking practice. A statistical approach to selecting the number of payments to check with results for different payment groups is presented. Information systems, anti-money laundering, financial monitoring, scenario report, criterion Workshop Proceedings ceur-ws.org</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>algorithm</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Undoubtedly for all countries is the question of the importance of combating the illegal circulation
of funds, which is a financial source of ensuring the possibility of criminal activities, such as drug and
arms trafficking, human trafficking, terrorist attacks, and others. Unfortunately, the entire progressive
world felt the dangerous burden of the consequences of neglecting the obvious signs of a crime,
including in the field of banking monitoring, as a result of the aggression of the Russian Federation
against Ukraine. Wartime conditions determine the need to apply strengthened measures of a practical
and organizational nature to combat the legalization of proceeds of crime, the financing of terrorism,
and the financing of the proliferation of weapons of mass destruction [1, 2, 3, 4, 5].</p>
      <p>
        The global independent intergovernmental body that develops and promotes policies to protect the
global financial system against money laundering, terrorist financing, and the financing of the
proliferation of weapons of mass destruction is the Financial Action Task Force (FATF), which was
established in 1989 to combat money laundering and terrorist financing. It is an intergovernmental
agency made up of 35 member jurisdictions and two regional organizations. Ukraine is a member of
the Committee of Experts of the Council of Europe as part of the FATF on the assessment of measures
to combat money laundering and terrorist financing – MONEYVAL [
        <xref ref-type="bibr" rid="ref1">6,7</xref>
        ].
      </p>
      <p>Ukraine strictly adheres to the important rules adopted by the European Union (EU) (officially
known as General Data Protection Regulations-GDPR) regarding the collection, storage, and use of
personal information, which entered into force as law throughout the EU in May 2018 and replaced the
EU Data Protection Directive 1995. In terms of scope, the new provision applies equally to industries,
EU organizations, and organizations of other countries that trade with the EU. Data-driven regulations
focus on some specific issues, including ownership of data, explainability, trustworthiness, and
transparency of algorithms that are trained or built on such data. A detailed analysis of these rules can</p>
      <p>
        2023 Copyright for this paper by its authors.
CEUR
be found in [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">8,9,10</xref>
        ]. Thus, according to the data of the State Financial Monitoring Service of Ukraine,
for 2022, State Financial Monitoring sent 934 materials to law enforcement agencies (of which 550
were generalized materials and 384 additional generalized materials), where the amount of financial
transactions that may be related to the legalization of funds and the commission of a criminal offense,
amounts to 75.7 billion hryvnias, and for 2022, the total amount of financial transactions stopped by
the State Financial Monitoring and blocked funds is equivalent to 7.7 billion hryvnias [
        <xref ref-type="bibr" rid="ref5">11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>2. Current results overview and formulation of the problem</title>
      <p>
        Among the modern automated applications of intelligent decision-making support with the help of
agents in the field of logistics and anti-money laundering are known, for example, Real-Time Exception
Management Decision Model [
        <xref ref-type="bibr" rid="ref6">12</xref>
        ], multi-channel data-driven, real-time anti-money laundering systems
for electronic payment cards [
        <xref ref-type="bibr" rid="ref7">13</xref>
        ], Scalable graph learning for anti-money laundering [
        <xref ref-type="bibr" rid="ref8">14</xref>
        ] and others.
      </p>
      <p>
        As a rule, the algorithms of such software complexes are based on a sequential multi-step analysis
using Simon's decision-making model. First, the data is described, and then there is a transition to the
weighted assessment of transactions [
        <xref ref-type="bibr" rid="ref9">15</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref10">16</xref>
        ], the authors proposed a system for identifying
transactions with a high risk of illegality. The article [
        <xref ref-type="bibr" rid="ref11">17</xref>
        ] describes an intelligent anti-money laundering
system that uses human agents to train and adapt such a system. The publications contain meaningful
recommendations for the use of modern automated applications of intelligent decision-making support
in the prevention and fight against money laundering, but they do not provide details about how the
specified technology should be developed and implemented and what is the real result of its
implementation.
      </p>
      <p>
        The modern Ukrainian market already offers separate "complex solutions" for the study of financial
flows for the purpose of financial monitoring. But at their core, these are financial constructors that
provide only general information data that is already available in banking institutions [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17">18-23</xref>
        ]. In the
publication [
        <xref ref-type="bibr" rid="ref18">24</xref>
        ], the authors proposed a prototype of an automated system for financial monitoring of
banking operations from the design of a smart value system for business process modeling, expansion
of the Business Process Management Initiative (BPMN), and software package with two
complementary products: Process Modeler and BPM Suite Bizagi Studio. The proposed information
system is based on the thirteen rules of potential risk: compliance of the funds credited to a bank account
with the financial status of the client; regularity of receipt of funds, and further cash withdrawals; signs
of evasion from the mandatory financial monitoring procedure on the part of a client; status of a
beneficiary in the case of crediting funds from many individuals or legal entities; payment by the client
for remote services; payment of the royalty fee, crediting foreign currency to the card account of the
client; paying off client’s loan for elite goods or real estate; similar IP-addresses of client transactions
with other transactions; transactions exceeding 150,000 UAH. This approach allowed the authors to
assess the risk of money laundering for each transaction. In the article [
        <xref ref-type="bibr" rid="ref19">25</xref>
        ] the main conceptual
principles of creating intelligent information systems for monitoring and controlling the financial sector
of the circulation of funds, which meets the requirements of the regulatory framework of the world
community regarding the prevention and counteraction of the legalization of income obtained through
criminal means are examined.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Main part</title>
      <p>The development of information technology, increasing the rigidity of requirements for the
reliability of financial transactions, defines a number of new tasks for specialists in the field of financial
analytics to improve existing and develop new banking audit service software products in the areas of
developing combined scenarios for solving individual problems, constantly updating algorithms (tasks)
with taking into account the trends of the global financial market.</p>
      <p>To solve the above problems that arise in banking institutions in modern conditions, a group of
specialists from the Analyst-1 information and analytical company has developed and is constantly
improving ISPPA in FP (Integrated Software Package for Reventing Abuses in Financial Practices - a
package of integrated software for preventing abuse in financial practice. It provides automation of
control over the activities of bank customers based on the analysis of banking operations performed by
customers, the status of customer accounts, the risk levels of their legalization of proceeds from crime,
as well as the identification of affiliated customers by their counterparties, the timeliness of updating
personal data and their correspondence to real activity.25 To write the ISPPA in FP software product,
the object-oriented programming language JAVA was chosen, which provides reliability, security, and
functionality and is a universal a powerful means of connecting users with various sources of
information, regardless of their location. And "architecture independence" allows you to run the
software on any platform that has a JAVA virtual machine installed. The main repository of information
for the operation of the ISPPA in FP software is the PostgreSQL object-relational database management
system. This DBMS provides high stability, fault tolerance, functionality, and speed, has a wide range
of tools for storing, processing, and retrieving information, and also supports full compliance with the
SQL standard. Identification of funding sources and other support, and thanks to individuals and groups
that assisted in the research and the preparation of the work should be included in an acknowledgment
section, which is placed just before the reference section in your document.</p>
      <p>When tracking cash flows, the system used an innovative approach to analyse cash flows using
mathematical models. This is a scoring of client risks - the identification of atypical (doubtful) cash
flows using 20 multi-level mathematical scenario cases with their further ranking according to the
degree of riskiness. In an in-depth study of the client, in order to increase the accuracy of identifying a
dubious transaction, we also use an assessment of reputational risks, as well as simplified operational
indicators. To date, we have automated the identification of more than 70 risks and indicators in order
to obtain additional data for the final decision on the client.</p>
      <p>When assessing reputational risks, information registers are used, and only those that are in the
public domain. A deep professional understanding of the processes taking place in the banking sector
allows us to develop and improve for our clients exactly those databases that are directly needed for
high-quality financial monitoring. The gradual filling of our information platform with new databases
is not our desire, this is a market requirement, because the market is developing, mutating, and
unscrupulous clients are constantly looking for new and new ways to conduct dubious transactions. We,
on the other hand, are on guard and monitor risky areas that appear on the market, which financial
institutions need to control more deeply and carefully.</p>
      <p>Currently, there are two ways for ISPPA in FP to interact with automated accounting systems:
integration and conditional integration. In the case of interaction between ISPPA in FP and an
automated accounting system using the integration method, the ISPPA in FP system is directly
connected via a local network to data arrays (DBMS) formed in an automated accounting system, and
in the reading, mode receives data online for further processing. As a result of data processing, templates
of dubious transactions and schemes are formed that can be used by clients when carrying out
transactions in a financial institution. A library of such templates is formed into a protective shield
designed to prevent dubious operations or the use of dubious schemes for such operations.</p>
      <p>The results obtained during data processing, intermediate and final forms of ISPPA in FP work
reports can be used to make appropriate management decisions. In the case of interaction between
ISPPA in FP and an automated accounting system using conditional integration, the ISPPA in FP
system receives data in file mode - offline. As a result of data processing, templates of dubious
transactions and schemes are formed that can be used by clients when carrying out transactions in a
financial institution. A library of such templates is formed into a protective shield in the form of
template files, which are loaded into the system to ensure the timely termination of dubious operations
or the use of dubious schemes for such operations. The results obtained during data processing,
intermediate and final forms of ISPPA in FP work reports can be used to make appropriate management
decisions.
3.1.</p>
    </sec>
    <sec id="sec-5">
      <title>Simple designed software overview</title>
      <p>The financial analytical tool in the form of the ISPPA in FP software package of the Analyst-1
company, with the help of the developed "scoring ranking", allows the use of "case" indicators in order
to identify risky cash flows. The presented model includes customer segmentation by type, turnover,
etc., superimposed on library templates of designed scenarios for suspicious transactions of a customer
or a group of customers. The complex makes it possible to carry out analysis on individual indicative
indicators, such as "Financial assistance", "Assignment of debt", "Transit operations", "Return of
funds", "Currency operations", etc., as well as to form mixed "cases" using the score scales. It allows
you to set risk-based points of contact for scenario models to determine the degree of responsibility
using the developed mechanism for establishing the categoricalness of decisions in accordance with the
vertical of subordination in the structure of the financial monitoring unit.</p>
      <p>These features help:
 minimizing the decision-making time for individual scenario "cases";
 conducting operational analysis of selected and ranked clients depending on the number of
scenario mix "cases";
 conducting an early response based on the results of the consolidation of scenario criteria.</p>
      <p>The developed analytical system is based on a dynamically configured analytical platform. The use
of already configured mathematical and analytical algorithms and their testing on real banking bases
allow us to model the logic of clients' cash flows and understand the principles of their activities. To
process large data arrays, Analytic-1 uses the latest integrated technological approaches, such as big
data. The company's extensive experience in data processing has been focused on optimizing analysis
methods. Thus, the use of a hybrid method of analysis, which is a combination of clear (digital) and
fuzzy (textual phrases) matches, made it possible to create unified libraries of "assignments" for greater
coverage of the payment "audience" and a clearer understanding of the essence of cash flows of both
the client and his counterparty (s). Based on the above, the company's specialists are actively using a
consolidated single platform with improved architectural and analytical capabilities, flexible
configuration, and modular expansion.</p>
    </sec>
    <sec id="sec-6">
      <title>3.2. Description algorithm of basic script reports and their concise descriptive</title>
      <p>We will provide a description of the basic scenario reports and their concise descriptive algorithm.
Consolidated reporting is defined in a period of one month.</p>
      <p>1. The "Financial Assistance" limitation provides for the possibility of making samples for the
assignment of payments (according to the "FINANCIAL ASSISTANCE" directories) within the
defined turnover and with established interest limits:</p>
      <p> customer operations are selected according to a set of control words in the "Financial
assistance" group of the assignment directory that is included in the payment assignment. Transactions
that the client performs on his own within the bank (payer of MFI, the payer of EDRPOU) &lt;&gt; (recipient
of MFI, recipient of EDRPOU) are removed from the set. We select clients in which the amount of
credit turnover for the month is more than indicated in the report parameters, the amount of financial
assistance is greater than indicated, or the percentage of the amount of financial assistance to the amount
of credit turnover is more than indicated.</p>
      <p>2. The "Securities" limitation provides for the possibility of making samples for the assignment of
payments (according to the "SECURITIES" directories) within the defined turnover and with the
established interest limits:</p>
      <p> customer operations are selected according to a set of control words in the "Payment for
goods, without VAT" group of the assignment directory, which is included in the payment assignment.
Transactions that the client carries out on his own within the bank (MFI payer, EDRPOU payer) &lt;&gt;
(MFI recipient, EDRPOU recipient) are removed from the set. Customers are selected in which the
amount of credit turnover for the month is more than specified in the report parameters, the amount for
"without VAT" is greater than the specified amount, or the percentage of the amount for "without VAT"
to the amount of credit turnover is more than specified.</p>
      <p>3. The restriction "Payment for goods "without VAT" implements the possibility of making samples
for the assignment of payments (according to the directories) "FOR GOODS WITHOUT VAT" within
the defined turnover and with established interest limits:</p>
      <p> customer operations are selected according to a set of control words in the "Payment for
goods, without VAT" group of the assignment directory, which is included in the payment assignment.
Transactions that the client performs on his own within the bank (payer of MFI, the payer of EDRPOU)
&lt;&gt; (recipient of MFI, recipient of EDRPOU) are removed from the set. We select clients in which the
amount of credit turnover for a month is greater than specified in the report parameters, the amount
"without VAT" is greater than the specified amount, or the percentage of the amount "without VAT" to
the amount of credit turnover is greater than the specified amount.</p>
      <p>4. Crediting to the accounts of individuals from legal entities (J---&gt;P) allows you to identify the total
amounts of turnover per month on the account(s) of an individual that exceeds the established limited
threshold:</p>
      <p> the selection of clients of legal entities that carry out operations on individuals for a total
amount per month greater than/equal to the specified amount is carried out. Turnovers are taken from
accounts 2600, 2650, and 2605 to accounts 2620, and 2650, excluding transactions in which the Bank
is the payer.</p>
      <p>5. Reimbursement of insurance payments involves the return of insurance payments to the client's
account exceeding the total established limit of more than:</p>
      <p> customer operations are selected according to a set of control words in the "Refund of
insurance payments" group of the assignment directory, which is included in the payment assignment.
We select clients in which the number of returns per month is greater than specified in the report
parameters.</p>
      <p>6. Balance at the end of the day. (In the period of one month, the client's balance at the end of the
day is less than given % of the credit turnover for the day):</p>
      <p> credit turnover and balances at the end of the day are selected to generate data on Class 2
accounts. The report includes clients whose credit turnover is greater than/equal to that specified in the
report parameters, and the ratio of the average daily balance at the end of the day to the average daily
turnover is less than/equal to the specified percentage in the report.</p>
      <p>7. The restriction "Assignment of claim rights" allows you to implement the possibility of carrying
out samples for the assignment of payments (according to the directories) "ASSIGNMENT OF CLAIM
RIGHTS" within the defined turnovers and with established percentage limits with the exclusion of
defined GROUPS of clients from the reports:</p>
      <p> the selection of customer operations is carried out according to a set of control words in the
"Assignment of the right of claim" group of the assignment directory, which are included in the payment
assignment. Transactions that the client carries out on his own within the bank are removed from the
set (MFI payer, EDRPOU payer) &lt;&gt; (MFI recipient, EDRPOU recipient). claim" is greater than the
specified amount or a percentage of the amount "Assignment of the right of claim" to the credit amount.</p>
      <p>8. The restriction "Refunds" allows the possibility to carry out samples on the assignment of
payments (according to the directories) "REFUNDS (ERRORLY CALCULATED COSTS)" within the
defined turnovers and with the established percentage limits with the exclusion of defined GROUPS of
clients from the reports:</p>
      <p> customer operations are selected according to a set of control words in the "Refund" group of
the assignment directory, which are included in the payment assignment. Transactions that the client
performs on his own within the bank (payer of MFI, the payer of EDRPOU) &lt;&gt; (recipient of MFI,
recipient of EDRPOU) are removed from the set. We select clients in which the amount of credit
turnover for a month is greater than specified in the report parameters, the amount of "Refund" is greater
than the specified amount, or the percentage of the amount of "Refund" to the amount of credit turnover.</p>
      <p>9. Transfers from legal entities to individuals. (For a period of one month, the generally limited
threshold of transfers by legal entities (Dt. Turnover) of funds to the accounts of individuals (Ct.
Turnover) exceeds 55% of all debits from the accounts of legal entities.):</p>
      <p> the selection of clients, and legal entities that carry out operations for individuals or FOPs is
carried out. Turnovers on accounts from 2600, 2650 to 2620, 2625, and from 2600, 2650 to 2600 are
selected (FOP EDRPOU&gt;9 characters). Customers have selected in which the amount of the total debit
turnover is greater than/equal to the specified amount in the report parameters, the percentage of the
ratio of the number of transfers (physical persons + FOP) to the amount of the total debit turnover.</p>
      <p>10. Foreign exchange payments (import). (Selection of all clients who transfer funds abroad under
contracts with a threshold amount in hryvnia equivalent):</p>
      <p> clients who carry out operations from accounts 2600, 2932, and 2952 to account 1500 with a
currency code other than 980 are selected. At the same time, the total amount of operations must be
greater than/equal to that specified in the report parameters.</p>
      <p>11. Transit transactions (turnovers with a difference in amounts of +- 5% within 60 min).
 the selection of customers is formed by operations, the amount of which is greater than/equal
to the amount indicated in the report parameters, which are received on the accounts of 2600, 2650
clients (operations in which the payer's EDPOOU = the Bank's EDROPOU are excluded). At the same
time, these clients sent the payment to another client within an hour after receipt with the amount +
the percentage indicated in the report parameters, from the amount of the receipt payment.</p>
      <p>12. Verification of relation to Public Persons. (Selection of all clients who are public entities and
who conducted transactions with their counterparties):</p>
      <p> selected according to the client's questionnaire from OBD Bank.</p>
      <p>13. Verification of the client's compliance with the segment. (Selection of all customers that exceed
the declared segment turnover):</p>
      <p> the report works if there is customer segmentation in relation to the amount of its turnover.
For the calculation, the sum of all credit turnover on accounts with the mask "26%" is taken, minus the
amount that passes through operations from "2600" to "2900" with currency code=980. The amount of
the determined turnover is compared with the amounts from the Bank's segmentation guide to determine
the current segment.</p>
      <p>14. Turnovers with counterparties who had NVR or are included in the Bank's emergency situation
(Selection of clients who have turnover with clients from NVR):</p>
      <p> from the customer questionnaire, we determine the list of customers who have NVR in the
calculation period. The report includes all clients who had transactions with clients from the list.</p>
      <p>15. Transactions with counterparties from external emergencies. (Selection of clients who have
turnover with clients from emergency situations.):</p>
      <p> the bank fills in the so-called blacklist of clients. The report includes all clients who had
transactions with clients from the list.</p>
      <p>16. Receiving budget payments. (Receipts to client accounts from budgetary organizations):
 legal entities that had income from treasury accounts are selected, and the selection of
treasury accounts is carried out according to the MFI directory. Clients whose transaction amount is
greater than/equal to the specified transaction amount in the report parameters or the total amount for
the period is greater than/equal to the specified total amount in the report parameters are included in the
selection.</p>
      <p>17. Grinding. "Grinding" includes a client who performs transactions, or for whom another
counterparty performs transactions with a total number of &gt;=3, for a total amount of &gt;=450000.00
during one day. At the same time, the purpose of operations must match by &gt;= 70 percent.</p>
    </sec>
    <sec id="sec-7">
      <title>3.3. Developed software modules overview</title>
    </sec>
    <sec id="sec-8">
      <title>3.3.1. Database of public figures, their ranking, and processing</title>
      <p>Full automation of archival activities, the creation of electronic archives is no longer a dream, but a
reality of our days. All archival information, including all program libraries, should be integrated into
a single program, on the basis of which it will be possible to provide information to users on many
indicators. In the ISPPA in FP software package, achieving the goal of automating the processes of
verification of public persons is ensured by implementing a number of interrelated activities aimed at
an integrated approach to searching, ranking, collecting, and processing information. When forming the
database of public, close, and related persons, the company put forward a number of requirements:
 the database schema should be as simple as possible to understand without much effort;
 the database schema should be relatively complicated in order to build scenario "cases";
 the database scheme should be filled with data of various profiles, both external and internal,
which will be connected using algorithmic chains;</p>
      <p> the scheme of the base should be adjusted depending on sectoral changes, both of a national and
regional nature.</p>
      <p>The ISPPA in FP software package implements a model for the accumulation of multidimensional
information, it's processing and updating. The use of a stepwise automated mode to identify and identify
the affiliation of bank customers with national, and foreign public figures and figures performing
political functions in international organizations, persons close to them, or persons related to them on
the basis of a valid and constantly (daily) updated database allows with maximum accuracy conduct a
sample of clients of this category. In general, the functional solution of the ISPPA in FP software
package allows using the developed "cases" to conduct cash flow studies on a new scenario level using
a full set of algorithms integrated into the complex.</p>
      <p>The functionality of the "Public Persons" module of the ISPPA in FP software package consists of
four sections:
 list of public persons;
 personal data;
 identification of public figures;
 service.</p>
    </sec>
    <sec id="sec-9">
      <title>3.3.2. List of public persons.</title>
      <p>This section includes the following blocks:
 General information. The block contains a list of all public and related persons;
 Associated individuals. The block provides access to the list of relatives and related individuals
of a particular public person;</p>
      <p> Associated entities. The block provides access to the list of related legal entities of a specific
public entity;</p>
      <p> Search. In addition to searching by the specified parameters, you can use the filter by "Sectors of
activity" and "Regions". It is also possible to view only new or changed entries. Activating the "Photo"
option allows you to view photos of a public person directly when you select it.</p>
    </sec>
    <sec id="sec-10">
      <title>3.3.3. Personal data</title>
      <p>The section allows you to view information about the institution's clients, and search for them by
name or EDRPOU code, TIN. In addition, you can view a list of customers who are identified as public
persons in this institution, as well as view a list of persons who are identified as non-public and are not
included in automatic searches.</p>
    </sec>
    <sec id="sec-11">
      <title>3.3.4. Identification of public figures</title>
      <p>The section allows you to search in the bank's customer base and identify "public persons" who did
not indicate in the questionnaire information about belonging to "public persons", by priority (high,
medium, low). This section also displays information about the identified person from the database of
public persons, with the ability to view supporting information with a link to the source of information.</p>
      <p>The result of the samples is the formation of reporting:
 report on selected public persons - a summary report on selected entries;
 report on identified persons - a complete report on all records, indicating the place of work;
 list of public persons with related organizations – list of persons with related organizations
existing in the institution;</p>
      <p> another.
3.3.5. Service</p>
      <p>The tasks of this section include:
 work with users of the module "Public persons";
 performance of other functions.</p>
      <p>Constant modernization of the ISPPA in FP complex with the involvement of leading experts in
financial monitoring, operational improvements in accordance with customer requirements, and
training taking into account the latest program changes are the priority of the developers.</p>
    </sec>
    <sec id="sec-12">
      <title>3.3.6. Customers</title>
      <p>For large and medium-sized banks, Analyst 1 specialists have developed software packages ISPPA
in FP (Integrated Software Package to Preventing Abuses in Financial Practices), and for small banks,
a complex for studying individual risky assets DORA (Research of Risk Assets). Both applications are
capable of handling large data sets. They can be used autonomously and at the same time are easily
integrated into various information banking systems. For non-banking financial institutions, there is the
ISPPA for NBFI (Integrated Software Package to Preventing Abuses for Non-Bank Financial
Institutions) application. Also, the specified scenario report and the proposed algorithms for its
implementation made it possible to create software for tracking reputational risks - Check Lists FinAP.</p>
      <p>The integrated software package has proven itself, has been tested, and is successfully used in a
number of leading banks. Among the users of the developed software products are Ukreximbank,
AlfaBank, TASCOMBANK, PUMB, Raiffeisen Bank, OTP Bank, Kredobank, Piraeus Bank, and others.
The information system is trusted by more than 25 insurance companies, including "Universalna",
"Oranta", "Etalon", "Providna", "Persha", UPSK. TAS Group and Eximleasing are also our clients.
Financial companies’ "SS LOUN", "CASH TO GO", "FREEDOM FINANCE Ukraine", Money4You
cooperate with us. And there are many other clients that are equally important to us.</p>
    </sec>
    <sec id="sec-13">
      <title>4. A statistical approach to selecting the number of payments to check</title>
      <p>Let the observation units (payments) be characterized by a wide range of value parameters - from
several thousand hryvnias to values exceeding 1 million hryvnias. It was decided to check payments for
a certain period of time, the total number of which is 5,000. Since the range of value indicators is large,
the observation units will be divided into 4 value intervals according to the selective method of
stratification (the first column of Table 1). Based on considerations about determining the minimum
required sample size of the researched observation units, which representatively characterize the entire
general population, with the corresponding indicators of confidence probability and confidence error of
observations, it is determined according to the formula:
 =</p>
      <p>2 ∙  ∙  ∙ 
∆2 ∙ 
+  2 ∙  ∙ 
,
(1)
(2)
where t – the critical value of the Student's criterion at the appropriate level of significance (as a rule,
in statistical studies, 0.05 is used as the critical level of significance, then at this level of significance 
is 1.96), ∆ – maximum permissible error (usually 5% in statistical studies), N – general volume, P – the
proportion of cases in which the trait under study occurs, Q – the proportion of cases in which the
feature under study does not occur (100- ).</p>
      <p>Thus, the minimum number of selected payments for verification is

=</p>
      <p>1,962 ∙ 10 ∙ 90 ∙ 5000
52 ∙ 5000 + 1,962 ∙ 10 ∙ 90
= 134,6 ≈ 135.</p>
      <p>Thus, it is necessary to select 135 observation units with value parameters below the threshold of
significance, from the total number of them, equal to 5000. There are two options for this:
1. Randomly select this quantity without taking into account the cost characteristics in each layer
(proportional placement);
2. Taking them into account.</p>
      <p>The second method of selection, where disproportionate placement takes place, more reliably
reflects the properties of the general population.</p>
      <p>In column A of the "Sample volume" column of the table. sample sizes proportional to the number
of payments in each interval (2.7% of the number of payments in a stratum) are shown.</p>
      <p>When dividing the sample volume by intervals taking into account cost characteristics to estimate
cost indicators by intervals, multiply the central values of each cost interval (shown in parentheses) by
the number of payments it includes.</p>
      <p>The estimate of the total amount of value indicators is 2.13 million hryvnias. So, for every million
hryvnias. this amount accounts for 135/2130 = 0.063 sample units. In this case, the sample size for the
first interval will be 12.5 0.063 = 0.78 for the second interval - 55 0.063 = 5.2, etc. The corresponding
data are given in column B of calculation table 1. As we can see, even a very approximate accounting
of the cost factor (column B) significantly changed the distribution of sample sizes by strata in favor of
observation units with higher cost characteristics.</p>
    </sec>
    <sec id="sec-14">
      <title>5. Conclusion</title>
      <p>Payments count</p>
      <p>The ISPPA in FP software product, which uses seventeen basic scenario reports as criteria
algorithms, allows the creation of a flexible information model that makes it possible to quickly
integrate with a variety of banking products (the bank's operating day), as well as the creation of a
technological map of diverse testing of the integration with using functional analysis, analysis of limit
values broken down into equivalence classes and taking into account multi-level mathematically
integrated components to test the structural and functional criteria of software. Conducting multi-vector
statistical and dynamic testing of the software package confirms the correctness of the mathematical
model of the software product and ensures successful certification and verification. The cross-platform
nature of the ISPPA in FP software package allows you to easily and quickly integrate with the
environment of a financial institution. The implementation of the ISPPA in FP software package makes
it possible to use: typical information search scenarios with the possibility of using "alerts"; new unified
algorithms that are already successfully operating in banking institutions and developed by practicing
financial analysts; the latest developments in the field of processing large data arrays and
systematization of technological processes that allow you to quickly and efficiently operate information.
Also, in the article a statistical approach to selecting the number of payments to check is presented.
With use of described approach count of payments to check for each layer was presented.</p>
    </sec>
    <sec id="sec-15">
      <title>6. References</title>
      <p>[1] The Law of Ukraine "On Prevention and Counteraction of Legalization (Laundering) of Criminal
Proceeds, Financing of Terrorism and Financing of the Proliferation of Weapons of Mass
Destruction", asset of the Cabinet of Ministers of Ukraine and the Ministry of Finance of Ukraine.</p>
      <p>URL: https://zakon.rada.gov.ua/laws/show/361-20#Text.
[2] The main directions of the development of the system of prevention and countermeasures against
the legalization (laundering) of proceeds obtained through crime, the financing of terrorism and
the financing of the proliferation of weapons of mass destruction in Ukraine for the period until
2023 and the plan of measures for their implementation (Decree of the Cabinet of Ministers dated
12.05.2021 No. 435- r). URL: https://zakon.rada.gov.ua/laws/show/435-2021-%D1%80#Text.
[3] Action plan for improving the national system of financial monitoring based on the results of the
5th round of assessment of Ukraine by the MONEYVAL Committee of the Council of Europe.
URL:
https://fiu.gov.ua/pages/dijalnist/koordinacija/koordinaciini-plani/plan-dii-sczodoudoskonalennja-nacionalno-sistemi-finansovogo-monitoringu-za-rezultatami-5go-raundu-ocinkiukrani-komitetom-MONEYVAL.html.
[4] Strategic development programs of the State Financial Monitoring for the period until 2024. URL:
https://fiu.gov.ua/assets/userfiles/0350/strategy/16.pdf.
[5] Priorities of State Financial Monitoring for the period of martial law agreed by the Ministry of
Finance of Ukraine. URL:
https://finap.com.ua/derzhfinmonitoryng-informuvannya-pro-rezultatyroboty-za-2022-rik/.
[6] FATF Annual Report 2020-2021 This report summarizes the work of the Financial Action Task
Force (FATF) from 1 July 2020 to 30 June 2021, Under the Presidency of Dr. Marcus Pleyer of
Germany, p. 78. URL: www.fatf-gafi.org/.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>FATF</given-names>
            <surname>Recommendations. Financial Action Task</surname>
          </string-name>
          <article-title>Force (FATF): website</article-title>
          . URL: https://www.fatfgafi.org/ publications/ fatf recommendations/?hf=
          <volume>10</volume>
          &amp;
          <article-title>b=0&amp;s=desc.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Goodman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Flaxman</surname>
          </string-name>
          ,
          <article-title>European union regulations on algorithmic decision-making and a right to explanation</article-title>
          ,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.1606.08813.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kamarinou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Millard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Machine learning with personal data: Profiling, decisions and the EU General Data Protection Regulation</article-title>
          ,
          <year>2016</year>
          . URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=
          <volume>2865811</volume>
          #.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>C.</given-names>
            <surname>Kuner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. J. B.</given-names>
            <surname>Svantesson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. H.</given-names>
            <surname>Cate</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lynskey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Millard</surname>
          </string-name>
          ,
          <article-title>Machine learning with personal data: is data protection law smart enough to meet the challenge?</article-title>
          ,
          <source>International Data Privacy Law</source>
          , Volume
          <volume>7</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>1</given-names>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . doi:
          <volume>10</volume>
          .1093/idpl/ipx003.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [11]
          <article-title>The State Financial Monitoring Service of Ukraine</article-title>
          . URL: https://fiu.gov.ua/en/.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering Domains</article-title>
          ,
          <source>Proceedings of the 43rd Hawaii International Conference on System Sciences, Honolulu</source>
          ,
          <string-name>
            <surname>HI</surname>
          </string-name>
          , USA,
          <year>2010</year>
          . doi:
          <volume>10</volume>
          .1109/HICSS.
          <year>2010</year>
          .
          <volume>314</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.S.</given-names>
            <surname>Kolhatkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Fatnani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>Matsumoto, Multi-channel data driven, real-time antimoney laundering system for electronic payment cards, U.S. Patent No US20130018796A1</article-title>
          . URL: https://patents.google.com/patent/US20130018796.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Weber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Suzumura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pareja</surname>
          </string-name>
          , T. Ma, H. Kanezashi,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kaler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.E.</given-names>
            <surname>Leiserson</surname>
          </string-name>
          , T.B.
          <string-name>
            <surname>Schardl</surname>
          </string-name>
          ,
          <article-title>Scalable graph learning for anti-money laundering: a first look</article-title>
          ,
          <source>NeurIPS 2018 Workshop on Challenges and Opportunities for AI in Financial Services: the Impact of Fairness</source>
          , Explainability, Accuracy, and
          <string-name>
            <surname>Privacy</surname>
          </string-name>
          , Montreal, Canada,
          <year>2018</year>
          . doi: https://doi.org/10.48550/arXiv.
          <year>1812</year>
          .
          <volume>00076</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <article-title>A framework for data mining-based anti-money laundering research</article-title>
          ,
          <source>Journal of Money Laundering Control</source>
          , Volume
          <volume>10</volume>
          , Issue 2, pp.
          <fpage>170</fpage>
          -
          <lpage>179</lpage>
          . doi:
          <volume>10</volume>
          .1108/13685200710746875.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Intelligent Anti-money Laundering System</article-title>
          ,
          <source>Proceedings of the IEEE International Conference on Service Operations and Logistics and Informatics</source>
          , Shanghai, Peoples Republic of China,
          <fpage>21</fpage>
          -
          <lpage>23</lpage>
          June 2006, pp.
          <fpage>851</fpage>
          -
          <lpage>856</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <article-title>Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering</article-title>
          ,
          <source>Expert Systems with Applications</source>
          , Volume
          <volume>36</volume>
          , Issue 2, pp.
          <fpage>1493</fpage>
          -
          <lpage>1504</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2007</year>
          .
          <volume>11</volume>
          .059.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T. G.</given-names>
            <surname>Ivanova</surname>
          </string-name>
          ,
          <article-title>Ensuring information security in the field of banking as an element of the development of the digital economy in Ukraine, Young scientist</article-title>
          , Volume
          <volume>7</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>1</given-names>
          </string-name>
          ,
          <year>2018</year>
          , pp.
          <fpage>270</fpage>
          -
          <lpage>274</lpage>
          . URL: http://nbuv.gov.ua/UJRN/molv_2018_
          <volume>7</volume>
          (
          <issue>1</issue>
          )
          <fpage>62</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [19]
          <string-name>
            <surname>M. I. Zubok</surname>
          </string-name>
          ,
          <article-title>Security of banking activity</article-title>
          , KNUE, Kyiv,
          <year>2020</year>
          , p.
          <fpage>190</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [20]
          <article-title>Information security policy of First Investment Bank PJSC</article-title>
          . URL: http://www.pinbank.ua/wpcontent/uploads/2017/02/Polityka_IB_
          <year>2016</year>
          _
          <article-title>2.0_2_KT-1</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [21]
          <article-title>On the approval of the Regulation on the organization of measures to ensure information security in the banking system of Ukraine</article-title>
          . URL: https://bank.gov.ua/document/download?docId=
          <fpage>56426049</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [22]
          <article-title>Typological study "Risks of using cash"</article-title>
          .
          <source>State Financial Monitoring Service of Ukraine</source>
          . URL: http://www.sdfm.gov.ua/content/file/Site_docs/
          <year>2018</year>
          /20180103/2017%20Nalichka.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [23]
          <article-title>Typological study "Risks of terrorism and separatism"</article-title>
          .
          <source>State Financial Monitoring Service of Ukraine</source>
          . URL: http://www.sdfm.gov.ua/content/file/Site_docs/
          <year>2018</year>
          /20180103/typ_terror.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Leonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yarovenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Boiko</surname>
          </string-name>
          , T. Dotsenko,
          <article-title>Information System for Monitoring Banking Transactions Related to Money Laundering. Experimental Economics and Machine Learning for Prediction of Emergent Economy Dynamics</article-title>
          ,
          <source>Proceedings of the Selected Papers of the8th International Conference on Monitoring, Modeling &amp; Management of Emergent Economy (M3E2</source>
          <year>2019</year>
          ), Odessa, May
          <volume>22</volume>
          -24,
          <year>2019</year>
          , pp.
          <fpage>297</fpage>
          -
          <lpage>307</lpage>
          . URL: https://lib.iitta.gov.ua/716845/1/papers.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Petrivskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Derkach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kravchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Petrivskyi</surname>
          </string-name>
          ,
          <source>Principles and Algorithms for Creating Automated Intelligent Control Systems of Electronic Banking, 9th International Scientific Conference "Information Technology and Implementation" CEUR Workshop Proceedings</source>
          , IT and
          <string-name>
            <surname>I-WS</surname>
          </string-name>
          <year>2022</year>
          .
          <year>2022</year>
          . Vol.
          <volume>3384</volume>
          . P.
          <volume>219</volume>
          -
          <fpage>226</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>