Skip to main content

Model for Identification of Politically Exposed Persons

  • Conference paper
  • First Online:
Perspectives in Business Informatics Research (BIR 2017)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 295))

Included in the following conference series:

Abstract

Due to increasing strength of regulatory requirements in area of money laundering and terrorism financing prevention, financial institutions are looking for ways to retrieve, analyse and interpret relevant information on politically exposed persons (PEPs). Task addresses complex decision making over distributed data. Manual PEP identification is labour and time consuming, therefore, IT solutions are necessary to support and enhance the process. This paper highlights the complexity of regulatory demands inherent in the PEP definition, reveals a number of requirements for PEP identification and proposes a model for PEP status identification. The model follows a multi-agent paradigm enabling several scenarios of PEP identification with involvement of software and human agents. Although the proposed PEP status identification model is created in accordance with the regulatory requirements and countries specific data sources for the Republic of Latvia, still, the model can be adjusted for use also in other EU countries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johannesson, P., Perjons, E.: A method framework for design science research. In: Johannesson, P., Perjons, E. (eds.) An Introduction to Design Science, pp. 75–89. Springer, Cham (2014). doi:10.1007/978-3-319-10632-8_4

    Google Scholar 

  2. Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). doi:10.1007/978-3-662-43839-8

    Book  Google Scholar 

  3. Law on the Prevention of Money Laundering and Terrorism Financing (in Latvian - Noziedzīgi iegūtu līdzekļu legalizācijas un terorisma finansēšanas novēršanas likums). https://likumi.lv/doc.php?id=178987. Accessed 23 Feb 2017

  4. FATF Guidance politically exposed persons (recommendations 12 and 22). http://www.fatf-gafi.org/media/fatf/documents/recommendations/guidance-pep-rec12-22.pdf. Accessed 30 Mar 2017

  5. Recommendations for Credit Institutions and Financial Institutions to Establish and Research Politically Exposed Persons, their Family Members, and Closely-related Persons and to Monitor Transactions. http://www.fktk.lv/en/law/credit-institutions/fcmc-regulations/5652-recommendations-for-credit-institutions-and-financial-institutions-to-establish-and-research-politically-exposed-persons-their-family-members-and-closely-related-persons-and-to-monitor-tr. Accessed 30 Mar 2017

  6. Reduce Time Spent Screening Politically Exposed Persons. https://www.casewareanalytics.com/events/webinar-reduce-time-spent-screening-politically-exposed-persons. Accessed 30 Mar 2017

  7. Reduce Time Spent Screening Politically Exposed Persons, Webinar. https://www.youtube.com/watch?v=10bbVf1pEsI. Accessed 30 Mar 2017

  8. Schiffer, M.A.: Method of Ranking Politically Exposed Persons and Other Heightened Risk Persons and Entities, US 8069126 B2, US20080281765, WO2008141161A1 (2008)

    Google Scholar 

  9. Lawrence, D.: Automated political risk management, CA2437310A1, EP1358606A2, EP1358606A4, US7181428, US7711637, US8099357, US20020103747, US2007027675, US20100138262, US20120284186, WO 2002061663 A2, WO2002061663A3 (2001)

    Google Scholar 

  10. Lawrence, D., Nitze, P., MacDonald, A.: Method, system, apparatus, program code and means for identifying and extracting information, US8996481, US20150278289 (2004)

    Google Scholar 

  11. Roland, B., Swim, D.C., Messina, T., Conolly, W.P.: Evaluating customer risk, US20070288355A1 (2006)

    Google Scholar 

  12. Regulations on the Latvian Population Registration System Classifier (in Latvian - Noteikumi par Latvijas iedzīvotāju reģistrācijas sistēmas klasifikatoru). https://likumi.lv/doc.php?id=187420&from=off. Accessed 23 Feb 2017

  13. Kastrati, Z., Imran, A.S.: Yayilgan, S.Y.: An improved concept vector space model for ontology based classification. In: 2015 11th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), pp. 240–245 (2015)

    Google Scholar 

  14. Protégé. http://protege.stanford.edu/. Accessed 30 Mar 2017

  15. Llinas, J., Hall, D.L.: An introduction to multi-sensor data fusion. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, ISCAS 1998 (Cat. No. 98CH36187), vol. 6, pp. 537–540 (1998)

    Google Scholar 

  16. Blasch, E., et al.: Issues and challenges in situation assessment (level 2 fusion). J. Adv. Inf. FUSIO 1(2), 122–139 (2006)

    Google Scholar 

  17. Ingersoll, G.S., Morton, T.S., Farris, A.L.: Taming Text: How to Find, Organise, and Manipulate It. Manning, Greenwich (2013)

    Google Scholar 

  18. Riga Technical University: Deliverable 1 “Data Validation Method and their Algorithm, Statistical and Mathematical Model Evaluation on the Basis of Available Data Sources, Aimed to Assess the Most Appropriate Methods to be Used (including Algorithms) for the Development of Optimal Algorithm Execution Flow Model.” of research project “Development of Data Processing Algorithm Flow Optimisation Model for Identification of Politically Exposed Persons” developed for IT Competence Centre and Central Finance and Contracting Agency (2017)

    Google Scholar 

  19. Padgham, L., Winikoff, M.: Developing Intelligent Agent Systems: A Practical Guide. Wiley, Hoboken (2004)

    Book  Google Scholar 

  20. Jennings, N.R.: An agent-based approach for building complex software systems. Commun. ACM 44(4), 35–41 (2001)

    Article  Google Scholar 

  21. With a view to identify politically exposed persons, banks will start customer interrogation (in Latvian - Nolūkā identificēt politiski nozīmīgas personas bankas sāks klientu izvaicāšanu | Financenet | TVNET). http://financenet.tvnet.lv/finansu_zinas/605924-noluka_identificet_politiski_nozimigas_personas_bankas_saks_klientu_izvaicasanu. Accessed 30 Mar 2017

  22. Riga Technical University: Deliverable 2 “Selection of the Most Appropriate Methods for the Development of Model for Politically Exposed Persons Identification” of research project “Development of Data Processing Algorithm Flow Optimisation Model for Identification of Politically Exposed Persons” developed for IT Competence Centre and Central Finance and Contracting Agency (2017)

    Google Scholar 

Download references

Acknowledgment

The research leading to these results has received funding from the research project “Competence Centre of Information and Communication Technologies” of EU Structural funds, contract No. 1.2.1.1/16/A/007 signed between IT Competence Centre and Central Finance and Contracting Agency, Research No. 1.14 “Development of Data Processing Algorithm Flow Optimisation Model for Identification of Politically Exposed Persons”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marite Kirikova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Miltina, Z., Stasko, A., Erins, I., Grundspenkis, J., Kirikova, M., Kebers, G. (2017). Model for Identification of Politically Exposed Persons. In: Johansson, B., Møller, C., Chaudhuri, A., Sudzina, F. (eds) Perspectives in Business Informatics Research. BIR 2017. Lecture Notes in Business Information Processing, vol 295. Springer, Cham. https://doi.org/10.1007/978-3-319-64930-6_10

Download citation

Publish with us

Policies and ethics