Downloads: 0 | Views: 199
Informative Article | Computer Science & Engineering | India | Volume 9 Issue 9, September 2020 | Popularity: 4.8 / 10
Comprehensive Review on Automated Suspicious Activity Report Generation (SAR)
Ankur Mahida
Abstract: The focus of this detailed assessment is to offer insightful information to financial institutions in the process of detecting and reporting suspected cases of money laundering and terrorist financing through automated suspicious activity reporting (SAR). Financial institutions have the legal responsibility of monitoring and reporting suspicious financial activities to regulatory authorities to keep the financial system safe from money laundering, terrorist financing, and other financial crimes. But the hand - on approach from earlier times to identifying and reporting the suspicious activities has become increasingly difficult due to the huge volumes of financial transactions, the complexity of money laundering schemes, and the constantly changing techniques used by criminals. Automated SAR Generation deals with these problems using big data analytics, machine learning, and artificial intelligence that analyze financial data which reveal patterns of suspicious activities and generate SAER promptly and accurately. The automation approach in reporting not only improves the efficiency and effectiveness of the process but also increases compliance with AML regulations and decreases the possibility of fines and reputational damage for financial institutions. The review will deal with the problem statement, solutions, uses, impact, and scope of Automated SAR Generation. The review will illustrate the significance of Automated SAR Generation in fighting financial crimes and ensuring compliance with anti - money laundering (AML) regulations.
Keywords: Automated Suspicious Activity Report (SAR) Generation, Anti - Money Laundering (AML), Financial Crimes, Compliance, Suspicious Activity Detection
Edition: Volume 9 Issue 9, September 2020
Pages: 1607 - 1610
DOI: https://www.doi.org/10.21275/SR24314131130
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 1998
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 714
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 694
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 696
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 683
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera