A Systems Theory and Risk-Based Approach
Chapter 5: Systems Theory – A Theory for AML
5. Systems theory – a theory for AML INTRODUCTION In this chapter, the case study findings are discussed and a theoretical treatise is developed. In such a treatise, the anti-money laundering domain is portrayed as a system in the tradition of systems theory. On the basis of empirical data collected from Drosia bank, the role of technology in the AML system is also reflected upon. While this theoretical investigation attempts to establish the academic nature of AML research by moving the domain past ad hoc descriptions, one thing should be made crystal clear from the start; there are considerable implications for practice by dealing with AML in a systems theoretical fashion. This will become more evident in the following chapter where a risk-based application of systems theory for data-mining suspicious transactions is presented. An attempt is made here to synthesize the two distinct poles that have been presented thus far: the core theoretical aspects of systems theory and the more practical aspects that have been outlined for AML through the case study. Some opening remarks will hopefully be of use to the reader by providing a set of clarifications for the analysis itself. The synthesis between AML and systems theory is carried out in two distinct phases. First, some broader comments are provided on how antimoney laundering can be viewed as a system through systems theory. This builds on previous work that attempted for a first time to merge systems theory with AML (Angell and Demetis, 2005). Second, such a description...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.