3,904 research outputs found

    Privacy-Enhancing Technologies for Financial Data Sharing

    Full text link
    Today, financial institutions (FIs) store and share consumers' financial data for various reasons such as offering loans, processing payments, and protecting against fraud and financial crime. Such sharing of sensitive data have been subject to data breaches in the past decade. While some regulations (e.g., GDPR, FCRA, and CCPA) help to prevent institutions from freely sharing clients' sensitive information, some regulations (e.g., BSA 1970) require FIs to share certain financial data with government agencies to combat financial crime. This creates an inherent tension between the privacy and the integrity of financial transactions. In the past decade, significant progress has been made in building efficient privacy-enhancing technologies that allow computer systems and networks to validate encrypted data automatically. In this paper, we investigate some of these technologies to identify the benefits and limitations of each, in particular, for use in data sharing among FIs. As a case study, we look into the emerging area of Central Bank Digital Currencies (CBDCs) and how privacy-enhancing technologies can be integrated into the CBDC architecture. Our study, however, is not limited to CBDCs and can be applied to other financial scenarios with tokenized bank deposits such as cross-border payments, real-time settlements, and card payments

    Investigating Online Financial Misinformation and Its Consequences: A Computational Perspective

    Full text link
    The rapid dissemination of information through digital platforms has revolutionized the way we access and consume news and information, particularly in the realm of finance. However, this digital age has also given rise to an alarming proliferation of financial misinformation, which can have detrimental effects on individuals, markets, and the overall economy. This research paper aims to provide a comprehensive survey of online financial misinformation, including its types, sources, and impacts. We first discuss the characteristics and manifestations of financial misinformation, encompassing false claims and misleading content. We explore various case studies that illustrate the detrimental consequences of financial misinformation on the economy. Finally, we highlight the potential impact and implications of detecting financial misinformation. Early detection and mitigation strategies can help protect investors, enhance market transparency, and preserve financial stability. We emphasize the importance of greater awareness, education, and regulation to address the issue of online financial misinformation and safeguard individuals and businesses from its harmful effects. In conclusion, this research paper sheds light on the pervasive issue of online financial misinformation and its wide-ranging consequences. By understanding the types, sources, and impacts of misinformation, stakeholders can work towards implementing effective detection and prevention measures to foster a more informed and resilient financial ecosystem.Comment: 32 pages, 2 figure

    Old Frauds With a New Sauce: Digital Assets and Space Transition

    Get PDF
    Purpose The purpose of this study is to describe the evolution of fraud schemes with historically conducted with fiat money in physical space to the crypto-assets in digital space as follows: ransomware, price manipulation, pump and dump schemes, misrepresentation, spoofing and Ponzi Schemes. To explain how fraud schemes have evolved alongside digital asset markets, this study applies the space transition theory. Design/methodology/approach The methodology used is a review of the media regarding six digital asset fraud schemes that have evolved from physical space to virtual space that are currently operational, as well as a review of the literature regarding the space transition theory. Findings This paper finds that the digital space and digital assets may facilitate pseudonymous criminal behavior in the present regulatory environment. Research limitations/implications The field is rapidly evolving, however this study finds that the conversion from physical to virtual space obfuscates the criminal activity, facilitating anonymity of the perpetrators, and creating new challenges for the legal and regulatory environment. Practical implications This paper finds that the digital space and digital assets may facilitate pseudonymous criminal behavior in the present regulatory environment. An understanding of the six crypto-asset fraud schemes described in the paper is useful for anti-financial crime professionals and regulators focusing on deterrence. Social implications The space transition theory offers an explanation for why digital space leads criminals to be better positioned to conduct financial crime in virtual space relative to physical space. This offers insights into behavior of digital asset fraudster behavior that could help limit the social damage caused by crypto-asset fraud. Originality/value To the authors’ knowledge, this paper is the first to detail the evolution of fraud schemes with fiat money in physical space to their corresponding schemes with digital assets in physical space. This study is also the first to integrate the space transition theory into an analysis of digital asset fraud schemes

    "Minskyan Perspective, Part II--Treasury, CRMPG Reports, Financial Stability Forum"

    Get PDF
    This four-part study is a critical analysis of several reports dealing with the reform of the financial system in the United States. The study uses Minsky's framework of analysis and focuses on the implications of Ponzi finance for regulatory and supervisory policies. The main conclusion of the study is that, while all reports make some valuable suggestions, they fail to deal with the socioeconomic dynamics that emerge during long periods of economic stability. As a consequence, it is highly doubtful that the principal suggestions contained in the reports will provide any applicable means to limit the worsening of financial fragility over periods of economic stability. The study also concludes that any meaningful systemic and prudential regulatory changes should focus on the analysis of expected and actual cash flows (sources and stability) rather than capital equity, and on preventing the emergence of Ponzi processes. The latter tend to emerge over long periods of economic stability and are not necessarily engineered by crooks. On the contrary, the pursuit of economic growth may involve the extensive use of Ponzi financial processes in legal economic activities. The study argues that some Ponzi processes--more precisely, pyramid Ponzi processes--should not be allowed to proceed, no matter how severe the immediate impact on economic growth, standards of living, or competitiveness. This is so because pyramid Ponzi processes always collapse, regardless how efficient financial markets are, how well informed and well behaved individuals are, or whether there is a "bubble" or not. The longer the process is allowed to proceed, the more destructive it becomes. Pyramid Ponzi processes cannot be risk-managed or buffered against; if economic growth is to be based on a solid financial foundation, these processes cannot be allowed to continue. Finally, a supervisory and regulatory process focused on detecting Ponzi processes would be much more flexible and adaptive, since it would not be preoccupied with either functional or product limits, or with arbitrary ratios of "prudence." Rather, it would oversee all financial institutions and all products, no matter how new or marginal they might be. See also, Working Paper Nos. 574.1, 574.3, and 574.4.

    International Framework for Liquidity Risk Measurement,Standards and Monitoring:Corporate Governance and Internal Controls

    Get PDF
    This paper is structured in accordance with identified components which are considered to be essential to the successful implementation of the (two fold) topics of discussion of this paper, namely, monitoring and liquidity risk measurements. The importance of successfully communicating results obtained from monitoring and measuring such risks, and the role of corporate governance in ensuring such effective communication, constitutes a recurring theme throughout this paper. The identified components are as follows: i) Corporate governance (ii) Internal controls (iii) Disclosure (iv) Management of risk (v) Substance over form (vi) Transparency As well as highlighting the interdependence of these components, the paper also aims to accentuate the importance of individual components. Whilst no hierarchy of importance is assigned to these components, corporate governance and internal controls are two components which are analysed in greater depth (than other components). Furthermore, corporate governance could be accorded a status of greater importance than internal controls having regard to the fact that whilst internal controls relate to a very vital control aspect of an organisation, corporate governance relates to all processes – be it decision making, control, production, performance, within a company/bank. The paper will also attempt to demonstrate that it is possible to implement a system of regulation which combines increased formalised procedures and/or detailed rules - whilst giving due consideration to the substance of transaction

    Money laundering: Analysis on the placement methods

    Get PDF
    The International Monetary Fund (IMF) in 2015 estimated the size of money laundering to be at 2-5% of the world Global Domestic Production (GDP) with around USD800 billion to USD2 trillion being laundered. The global criminal activities are on the rise and the contribution of money laundering to exacerbate the problems associated with the upsurge in the criminal activities is unquantifiable. The negative effect of this on global economic development has grown to a staggering proportion. This is partly because the crisis experienced due to increase in criminal activities is borne out of the fact that the life blood of almost all the crimes are embedded in the financial system. Ironically, detecting money laundering becomes extremely difficult once it has been allowed to crystallized at layering level and finds its ways to the legitimate fund through integration mechanism. To combat money laundering, the parties must understand how money-laundering activities operate. The need to institute greater vigilance to prevent money laundering therefore becomes imperative. This has become the primary focus of most of the Anti-Money Laundering (AML) compliance measures and anti-crime initiatives at local and international levels. This paper therefore focus on the need to nib this dreaded crime at a point where it is almost likely to be detected. By using Malaysia as a focal point, the need to institute greater vigilance at placement level to salvage and ensure financial integrity in the banking sector as a necessary antidote to this problem is therefore the thrust or contention of this paper

    Cryptocurrencies and future financial crime.

    Get PDF
    Background: Cryptocurrency fraud has become a growing global concern, with various governments reporting an increase in the frequency of and losses from cryptocurrency scams. Despite increasing fraudulent activity involving cryptocurrencies, research on the potential of cryptocurrencies for fraud has not been examined in a systematic study. This review examines the current state of knowledge about what kinds of cryptocurrency fraud currently exist, or are expected to exist in the future, and provides comprehensive definitions of the frauds identified. Methods: The study involved a scoping review of academic research and grey literature on cryptocurrency fraud and a 1.5-day expert consensus exercise. The review followed the PRISMA-ScR protocol, with eligibility criteria based on language, publication type, relevance to cryptocurrency fraud, and evidence provided. Researchers screened 391 academic records, 106 of which went on to the eligibility phase, and 63 of which were ultimately analysed. We screened 394 grey literature sources, 128 of which passed on to the eligibility phase, and 53 of which were included in our review. The expert consensus exercise was attended by high-profile participants from the private sector, government, and academia. It involved problem planning and analysis activities and discussion about the future of cryptocurrency crime. Results: The academic literature identified 29 different types of cryptocurrency fraud; the grey literature discussed 32 types, 14 of which were not identified in the academic literature (i.e., 47 unique types in total). Ponzi schemes and (synonymous) high yield investment programmes were most discussed across all literature. Participants in the expert consensus exercise ranked pump-and-dump schemes and ransomware as the most profitable and feasible threats, though pump-and-dumps were, notably, perceived as the least harmful type of fraud. Conclusions: The findings of this scoping review suggest cryptocurrency fraud research is rapidly developing in volume and breadth, though we remain at an early stage of thinking about future problems and scenarios involving cryptocurrencies. The findings of this work emphasise the need for better collaboration across sectors and consensus on definitions surrounding cryptocurrency fraud to address the problems identified

    International framework for liquidity risk measurement, standards and monitoring: corporate governance and internal controls

    Get PDF
    This paper is structured in accordance with identified components which are considered to be essential to the successful implementation of the (two fold) topics of discussion of this paper, namely, monitoring and liquidity risk measurements. The importance of successfully communicating results obtained from monitoring and measuring such risks, and the role of corporate governance in ensuring such effective communication, constitutes a recurring theme throughout this paper. The identified components are as follows: i) Corporate governance (ii) Internal controls (iii) Disclosure (iv) Management of risk (v) Substance over form (vi) Transparency As well as highlighting the interdependence of these components, the paper also aims to accentuate the importance of individual components. Whilst no hierarchy of importance is assigned to these components, corporate governance and internal controls are two components which are analysed in greater depth (than other components). Furthermore, corporate governance could be accorded a status of greater importance than internal controls having regard to the fact that whilst internal controls relate to a very vital control aspect of an organisation, corporate governance relates to all processes – be it decision making, control, production, performance, within a company/bank. The paper will also attempt to demonstrate that it is possible to implement a system of regulation which combines increased formalised procedures and/or detailed rules - whilst giving due consideration to the substance of transactions.corporate governance; internal controls; monitoring; liquidity; regulation

    Spam on the Internet: can it be eradicated or is it here to stay?

    Get PDF
    A discussion of the rise in unsolicited bulk e-mail, its effect on tertiary education, and some of the methods being used or developed to combat it. Includes an examination of block listing, protocol change, economic and computational solutions, e-mail aliasing, sender warranted e-mail, collaborative filtering, rule-based and statistical solutions, and legislation
    corecore