{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:30:42Z","timestamp":1725906642751},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319649290"},{"type":"electronic","value":"9783319649306"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64930-6_10","type":"book-chapter","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T02:20:18Z","timestamp":1501813218000},"page":"133-147","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Model for Identification of Politically Exposed Persons"],"prefix":"10.1007","author":[{"given":"Zane","family":"Miltina","sequence":"first","affiliation":[]},{"given":"Arnis","family":"Stasko","sequence":"additional","affiliation":[]},{"given":"Ingars","family":"Erins","sequence":"additional","affiliation":[]},{"given":"Janis","family":"Grundspenkis","sequence":"additional","affiliation":[]},{"given":"Marite","family":"Kirikova","sequence":"additional","affiliation":[]},{"given":"Girts","family":"Kebers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,5]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-10632-8_4","volume-title":"An Introduction to Design Science","author":"P Johannesson","year":"2014","unstructured":"Johannesson, P., Perjons, E.: A method framework for design science research. In: Johannesson, P., Perjons, E. (eds.) An Introduction to Design Science, pp. 75\u201389. Springer, Cham (2014). doi:10.1007\/978-3-319-10632-8_4"},{"key":"10_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-43839-8"},{"unstructured":"Law on the Prevention of Money Laundering and Terrorism Financing (in Latvian - Noziedz\u012bgi ieg\u016btu l\u012bdzek\u013cu legaliz\u0101cijas un terorisma finans\u0113\u0161anas nov\u0113r\u0161anas likums). https:\/\/likumi.lv\/doc.php?id=178987. Accessed 23 Feb 2017","key":"10_CR3"},{"unstructured":"FATF Guidance politically exposed persons (recommendations 12 and 22). http:\/\/www.fatf-gafi.org\/media\/fatf\/documents\/recommendations\/guidance-pep-rec12-22.pdf. Accessed 30 Mar 2017","key":"10_CR4"},{"unstructured":"Recommendations for Credit Institutions and Financial Institutions to Establish and Research Politically Exposed Persons, their Family Members, and Closely-related Persons and to Monitor Transactions. http:\/\/www.fktk.lv\/en\/law\/credit-institutions\/fcmc-regulations\/5652-recommendations-for-credit-institutions-and-financial-institutions-to-establish-and-research-politically-exposed-persons-their-family-members-and-closely-related-persons-and-to-monitor-tr. Accessed 30 Mar 2017","key":"10_CR5"},{"unstructured":"Reduce Time Spent Screening Politically Exposed Persons. https:\/\/www.casewareanalytics.com\/events\/webinar-reduce-time-spent-screening-politically-exposed-persons. Accessed 30 Mar 2017","key":"10_CR6"},{"unstructured":"Reduce Time Spent Screening Politically Exposed Persons, Webinar. https:\/\/www.youtube.com\/watch?v=10bbVf1pEsI. Accessed 30 Mar 2017","key":"10_CR7"},{"unstructured":"Schiffer, M.A.: Method of Ranking Politically Exposed Persons and Other Heightened Risk Persons and Entities, US 8069126 B2, US20080281765, WO2008141161A1 (2008)","key":"10_CR8"},{"unstructured":"Lawrence, D.: Automated political risk management, CA2437310A1, EP1358606A2, EP1358606A4, US7181428, US7711637, US8099357, US20020103747, US2007027675, US20100138262, US20120284186, WO 2002061663 A2, WO2002061663A3 (2001)","key":"10_CR9"},{"unstructured":"Lawrence, D., Nitze, P., MacDonald, A.: Method, system, apparatus, program code and means for identifying and extracting information, US8996481, US20150278289 (2004)","key":"10_CR10"},{"unstructured":"Roland, B., Swim, D.C., Messina, T., Conolly, W.P.: Evaluating customer risk, US20070288355A1 (2006)","key":"10_CR11"},{"unstructured":"Regulations on the Latvian Population Registration System Classifier (in Latvian - Noteikumi par Latvijas iedz\u012bvot\u0101ju re\u0123istr\u0101cijas sist\u0113mas klasifikatoru). https:\/\/likumi.lv\/doc.php?id=187420&from=off. Accessed 23 Feb 2017","key":"10_CR12"},{"doi-asserted-by":"crossref","unstructured":"Kastrati, Z., Imran, A.S.: Yayilgan, S.Y.: An improved concept vector space model for ontology based classification. In: 2015 11th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), pp. 240\u2013245 (2015)","key":"10_CR13","DOI":"10.1109\/SITIS.2015.102"},{"unstructured":"Prot\u00e9g\u00e9. http:\/\/protege.stanford.edu\/. Accessed 30 Mar 2017","key":"10_CR14"},{"unstructured":"Llinas, J., Hall, D.L.: An introduction to multi-sensor data fusion. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, ISCAS 1998 (Cat. No. 98CH36187), vol. 6, pp. 537\u2013540 (1998)","key":"10_CR15"},{"issue":"2","key":"10_CR16","first-page":"122","volume":"1","author":"E Blasch","year":"2006","unstructured":"Blasch, E., et al.: Issues and challenges in situation assessment (level 2 fusion). J. Adv. Inf. FUSIO 1(2), 122\u2013139 (2006)","journal-title":"J. Adv. Inf. FUSIO"},{"volume-title":"Taming Text: How to Find, Organise, and Manipulate It","year":"2013","author":"GS Ingersoll","unstructured":"Ingersoll, G.S., Morton, T.S., Farris, A.L.: Taming Text: How to Find, Organise, and Manipulate It. Manning, Greenwich (2013)","key":"10_CR17"},{"unstructured":"Riga Technical University: Deliverable 1 \u201cData Validation Method and their Algorithm, Statistical and Mathematical Model Evaluation on the Basis of Available Data Sources, Aimed to Assess the Most Appropriate Methods to be Used (including Algorithms) for the Development of Optimal Algorithm Execution Flow Model.\u201d of research project \u201cDevelopment of Data Processing Algorithm Flow Optimisation Model for Identification of Politically Exposed Persons\u201d developed for IT Competence Centre and Central Finance and Contracting Agency (2017)","key":"10_CR18"},{"key":"10_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/0470861223","volume-title":"Developing Intelligent Agent Systems: A Practical Guide","author":"L Padgham","year":"2004","unstructured":"Padgham, L., Winikoff, M.: Developing Intelligent Agent Systems: A Practical Guide. Wiley, Hoboken (2004)"},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/367211.367250","volume":"44","author":"NR Jennings","year":"2001","unstructured":"Jennings, N.R.: An agent-based approach for building complex software systems. Commun. ACM 44(4), 35\u201341 (2001)","journal-title":"Commun. ACM"},{"unstructured":"With a view to identify politically exposed persons, banks will start customer interrogation (in Latvian - Nol\u016bk\u0101 identific\u0113t politiski noz\u012bm\u012bgas personas bankas s\u0101ks klientu izvaic\u0101\u0161anu | Financenet | TVNET). http:\/\/financenet.tvnet.lv\/finansu_zinas\/605924-noluka_identificet_politiski_nozimigas_personas_bankas_saks_klientu_izvaicasanu. Accessed 30 Mar 2017","key":"10_CR21"},{"unstructured":"Riga Technical University: Deliverable 2 \u201cSelection of the Most Appropriate Methods for the Development of Model for Politically Exposed Persons Identification\u201d of research project \u201cDevelopment of Data Processing Algorithm Flow Optimisation Model for Identification of Politically Exposed Persons\u201d developed for IT Competence Centre and Central Finance and Contracting Agency (2017)","key":"10_CR22"}],"container-title":["Lecture Notes in Business Information Processing","Perspectives in Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64930-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:40:36Z","timestamp":1710355236000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64930-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319649290","9783319649306"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64930-6_10","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Informatics Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bir2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bir2017.aau.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}