首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
李童 《科技风》2023,(20):60-61+128
随着互联网的发展,网络洗钱危害国家和人民的利益。尽管我国反洗钱工作在稳步推动,但不能期望打击网络洗钱实践立即出现质的飞跃。我们可以从完善支付机构反洗钱行政法规、严密监测网络洗钱、完善网络洗钱案件的侦查协作、推动电子数据取证规范化、提升侦查队伍能力素质以及加强反网络洗钱的宣传教育等方面着手,提升我国反网络洗钱工作质效。  相似文献   

2.
本文主要利用“决策树”理论对银行业洗钱和反洗钱中的行为主体:洗钱者、金融机构和反洗钱者的行为决策进行分析,在此基础上提出自己的一些看法。  相似文献   

3.
石岳  韩雪 《科教文汇》2012,(19):206-208
洗钱是指犯罪分子为了躲避法律的制裁,将其非法所得的收入合法化的过程。而金融机构之所以成为反洗钱工作中的关键环节,是因为它是洗钱活动的主要渠道。本文通过对金融机构在反洗钱工作中地位、作用和金融机构参与反洗钱活动成本和收益的分析,认为消极反洗钱有可能成为金融机构的最优策略选择。因此,只有通过尽快建立完整的金融机构反洗钱激励机制和补偿机制,才能形成监管当局与金融机构之间的激励相容,促使商业银行积极承担起反洗钱的义务。  相似文献   

4.
王晓磊 《今日科苑》2007,(20):230-230
随着经济的发展,洗钱犯罪活动日益发展,对我国的金融体系构成了一定的危害。本文介绍了在构建和谐社会中反洗钱的必要性和作用,并从政治、经济和文化三个方面介绍了反洗钱在构建和谐社会中的意义。  相似文献   

5.
崔蕾 《科技创业月刊》2005,18(12):116-117
金融机构应正确认识自身在反洗钱中的重要作用,明确反洗钱是其正确选择并积极担负反洗钱的职责。强化金融机构反洗钱意识,对有效预防和打击洗钱犯罪、稳定经济秩序、维护国家社会公正及经济健康均具有重要意义。  相似文献   

6.
反洗钱效率的会计视角   总被引:1,自引:0,他引:1  
反洗钱会计是为反洗钱机构提供充分、及时、准确的情报信息并对反洗钱活动进行收益成本核算的应用学科,其宗旨是为反洗钱服务。建立权利制约权力、权力制衡权力的反洗钱会计信息系统,并以此为基础建立科学合理的反洗钱收益分配机制和反洗钱成本负担机制,形成洗钱亏损而反洗钱盈利的制度环境是提高反洗钱工作效率的必要条件。  相似文献   

7.
韩冰 《百科知识》2007,(12X):9-10
反洗钱金融行动特别工作组(Financial Action Task Force on Money Laundering),简称FATF,是当今世界最具权威性的反洗钱国际组织,它成立于1989年7月,秘书处设在法国巴黎。FATF是原西方七国集团为专门研究洗钱的危害、预防洗钱并协调反洗钱国际行动而成立的政府间国际组织,目前,其成员遍布各大洲,截至2007年9月底,  相似文献   

8.
本文主要介绍了目前洗钱犯罪活动已呈现更加专业化、复杂化、国际化和犯罪手段的高科技化发展趋势,这对金融机构的反洗钱工作水平提出了更高的挑战和要求。作者深入基层调查研究阿拉善盟辖内村镇银行反洗钱工作时,针对高科技、高复杂性大环境下基层反洗钱工作存在的问题进行了分析,并对此项工作提出了建议。  相似文献   

9.
周蓓莉 《科教文汇》2008,(2):122-122
洗钱犯罪已经成为当今国际社会面临的一大公害。金融机构在反洗钱工作中担当着重要的职责,我国新颁布的《中华人民共和国反洗钱法》中详细规定了金融机构在反洗钱工作中的定位和权责。但是,从实践层面来看,我国金融机构在反洗钱工作中仍存在许多问题。本文将重点分析金融机构反洗钱的法律制度完善。  相似文献   

10.
洗钱犯罪已经成为当今国际社会面临的一大公害。金融机构在反洗钱工作中担当着重要的职责,我国新颁布的《中华人民共和国反洗钱法》中详细规定了金融机构在反洗钱工作中的定位和权责。但是,从实践层面来看,我国金融机构在反洗钱工作中仍存在许多问题。本文将重点分析金融机构反洗钱的法律制度完善。  相似文献   

11.
网络的快速发展给大学生的生活、学习和工作带来巨大便利的同时也给他们带来了一些负面的影响。本文从大学生网络犯罪现状谈起,分析影响大学生网络犯罪的心理因素,并提出了积极有效地防范措施来预防大学生网络犯罪,对于大学生的健康成长和社会的安定有重要的现实意义。  相似文献   

12.
企业获取Internet信息的基本技术与策略研究   总被引:1,自引:0,他引:1  
谭利文  马哲明 《情报科学》2004,22(5):578-580
本文首先介绍了一些对企业来说一般的 Internet信息获取技术 ,再以这些技术为基础介绍了企业高效获取 Internet信息的一些实用的策略 ,其最终目的就是想让 Internet为企业提供更好的信息服务  相似文献   

13.
The Covid-19 pandemic has led to an inevitable surge in the use of digital technologies due to the social distancing norms and nationwide lockdowns. People and organizations all over the world have had to adjust to new ways of work and life. We explore possible scenarios of the digital surge and the research issues that arise.An increase in digitalization is leading firms and educational institutions to shift to work-from-home (WFH). Blockchain technology will become important and will entail research on design and regulations. Gig workers and the gig economy is likely to increase in scale, raising questions of work allocation, collaboration, motivation, and aspects of work overload and presenteeism. Workplace monitoring and technostress issues will become prominent with an increase in digital presence. Online fraud is likely to grow, along with research on managing security. The regulation of the internet, a key resource, will be crucial post-pandemic.Research may address the consequences and causes of the digital divide. Further, the issues of net neutrality and zero-rating plans will merit scrutiny. A key research issue will also be the impact and consequences of internet shutdowns, frequently resorted to by countries. Digital money, too, assumes importance in crisis situations and research will address their adoption, consequences, and mode. Aspects of surveillance and privacy gain importance with increased digital usage.  相似文献   

14.
无线射频识别技术(RFID)及其在物联网中的应用   总被引:4,自引:0,他引:4  
随着物联网知识的普及,以及其技术的广泛推广应用,物联网被越来越多的人所关注。本文介绍了物联网及其关键技术RFID,并结合RFID在物联网的实际应用,并对其未来的发展作出了展望。  相似文献   

15.
In the current era of internet, information related to crime is scattered across many sources namely news media, social networks, blogs, and video repositories, etc. Crime reports published in online newspapers are often considered as reliable compared to crowdsourced data like social media and contain crime information not only in the form of unstructured text but also in the form of images. Given the volume and availability of crime-related information present in online newspapers, gathering and integrating crime entities from multiple modalities and representing them as a knowledge base in machine-readable form will be useful for any law enforcement agencies to analyze and prevent criminal activities. Extant research works to generate the crime knowledge base, does not address extraction of all non-redundant entities from text and image data present in multiple newspapers. Hence, this work proposes Crime Base, an entity relationship based system to extract and integrate crime related text and image data from online newspapers with a focus towards reducing duplicity and loss of information in the knowledge base. The proposed system uses a rule-based approach to extract the entities from text and image captions. The entities extracted from text data are correlated using contextual as-well-as semantic similarity measures and image entities are correlated using low-level and high-level image features. The proposed system also presents an integrated view of these entities and their relations in the form of a knowledge base using OWL. The system is tested for a collection of crime related articles from popular Indian online newspapers.  相似文献   

16.
《普罗米修斯》2012,30(4):461-464
Robin Mansell is professor of new media and the internet at LSE. She is interested in how and why people communicate with each other, especially when their relationships are mediated by the use of information and communication technologies.  相似文献   

17.
刘彤 《科学学研究》2012,30(6):904-908
 技术把门人在研发团队信息传递中的作用机制在互联网技术的影响下需要重新审视。对某制药企业北京研发团队进行案例研究,使用社会网络分析(SNA)并做人员访谈。分析结果表明,在互联网技术的影响下,技术把门人在研发团队中所占比例为6%,远低于以往研究公认的20%。技术把门人角色可分离为外部交流明星和内部交流明星。建立了研发团队信息传递机制新的概念框架。  相似文献   

18.
移动互联网技术及移动电子商务   总被引:12,自引:0,他引:12  
赵英 《情报科学》2002,20(6):635-639
本文介绍了移动互联网和移动电子商务的有关概念,着重对移动通信技术和移动电子商务进行了阐述,并分析了移动互联网的建设和移动电子商务的发展。  相似文献   

19.
《普罗米修斯》2012,30(2):127-144
This study uses diffusion of innovations theory to examine the influence of Muslim religious scholars on internet diffusion in Saudi Arabia. It applies content analysis to the fatwa, the religious edicts that Muslim religious scholars issue, to explore fatwa decisions relating to the internet since its launch in Saudi Arabia in 1999. There are 34 fatwa in total, 11 with approving decisions, 11 with disapproving ones, and 12 with conditionally approving decisions. Those who issue approving fatwa argue that it helps to spread the word of Allah and that if Muslims do not exploit the opportunities provided by the internet, then non-Muslims and non-believers will use it for evil. To explain their disapproving fatwa, other scholars argue that the internet corrupts people. The study discusses the impact of religion and religious scholars on the dissemination of communication technologies in Saudi society. It also predicts a pattern of opinions that scholars may be expected to adopt on the introduction of any new communication technology that is culturally controversial.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号