Detail
Raw data [ X ]
<section name="raw"> <SEQUENTIAL> <record key="001" att1="001" value="173189" att2="173189">001 173189</record> <field key="037" subkey="x">englisch</field> <field key="050" subkey="x">Graue Literatur</field> <field key="076" subkey="">Ökonomie</field> <field key="079" subkey="y">http://go.worldbank.org/OZFRCVX490</field> <field key="079" subkey="z">Chatain, Pierre-Laurent - et al., Integrity in Mobile Phone Financial Services (World Bank Publication)</field> <field key="079" subkey="y">http://books.google.com/books?id=ypGYRhGYwGEC&printsec=frontcover</field> <field key="079" subkey="z">Chatain, Pierre-Laurent - et al., Integrity in Mobile Phone Financial Services (Google Book Search)</field> <field key="100" subkey="">Chatain, Pierre-Laurent</field> <field key="103" subkey="">Senior Financial Sector Specialist, Financial Market Integrity Unit, The World Bank</field> <field key="104" subkey="a">Hernández-Coss, Raúl</field> <field key="107" subkey="">Primary Task Manager, Financial Market Integrity Unit, The World Bank</field> <field key="108" subkey="a">Borowik, Kamil</field> <field key="111" subkey="">Financial Analyst, Financial and Private Sector Development Network, The World Bank</field> <field key="112" subkey="a">et al.</field> <field key="116" subkey="b">Klein, Michael (Pr.)</field> <field key="200" subkey="b">The World Bank (Ed.)</field> <field key="331" subkey="">Integrity in Mobile Phone Financial Services</field> <field key="335" subkey="">Measures for Mitigating Risks from Money Laundering and Terrorist Financing</field> <field key="403" subkey="">1. Ed.</field> <field key="410" subkey="">Washington, D.C.</field> <field key="412" subkey="">The World Bank</field> <field key="425" subkey="">2008, May</field> <field key="433" subkey="">xiv, 80 pp.</field> <field key="451" subkey="">World Bank Working Paper; No. 146</field> <field key="517" subkey="c">from the Table of Contents: Foreword; Acknowledgments; Abbreviations and Acronyms; Executive Summary; Introduction; m-FS Growth</field> <field key="Pot" subkey="e">ntial and Concerns; Analyzing and Responding to ML and TF Risks: Observations of Applied Practices; Applying FATF</field> <field key="Rec" subkey="o">mmendations to m-FS; Conclusions and Policy Recommendations; Appendix A. m-FS Growth; Appendix B. Types of m-FS and m-FS</field> <field key="Ser" subkey="v">ices Observed in Fieldwork; Appendix C. Mitigation Measures for m-BSA; Appendix D. Mitigation Measures for m-Money; AppendixE</field> <field key=". T" subkey="h">e Financial Action Task Force (FATF); Appendix F. Overview of m-FS Risk Identification and Mitigation; Glossary;</field> <field key="Bib" subkey="l">iography; Author Biographies; List of Tables; List of Figures; List of Boxes;</field> <field key="540" subkey="">978-0-8213-7556-3</field> <field key="542" subkey="">1726-5878</field> <field key="544" subkey="">WB173189</field> <field key="700" subkey="b">332</field> <field key="700" subkey="b">Financial economics</field> <field key="710" subkey="">Home banking services -- Security measures</field> <field key="710" subkey="">Electronic funds transfers -- Security measures</field> <field key="710" subkey="">Cellular telephone systems -- Security measures</field> <field key="710" subkey="">Commercial crimes -- Prevention</field> </SEQUENTIAL> </section> Servertime: 0.381 sec | Clienttime:
sec
|