Why Does New Payment System and Products (NPSPs) Vulnerable to Money Laundering

Go, Lisanawati (2015) Why Does New Payment System and Products (NPSPs) Vulnerable to Money Laundering. Journal of Social and Development Sciences, 6 (3). pp. 35-42. ISSN 2221-1152

Go Lisanawati_Why Does New Payment_Revisi_2015.pdf

Download (1003Kb) | Preview
Official URL: https://ifrnd.org/journal/index.php/jsds/issue/vie...


This paper will assess on the impact of the newest development on payment systems, which has been manifested in such kinds of payments products and threatening through money laundering. In order to increase the quality of people’ lives in this technologically advanced era, many sophisticated products have been produced, such as virtual currencies, or other stored value cards. The anonymity characteristic of new payment systems and products is vulnerable to money laundering exploitation. The study of FATF, as reported by APG, shows that the AML/CFT risk has associated with the payment method (means as virtual currencies). There are some reason which may indicate the potentiality of AML/CFT. (APG, 2014). As a part of Scientific Research, this legal research will be using qualitative methods. It will assess on the implementation of virtual currencies in real world which is causing problem for anti money laundering. It is a doctrinal research and using conceptual approach to solve the problem. The result of this research shows that anti money laundering rules and regulation should be strictly implemented to virtual currencies’s problem in order to anticipate its vulnerabililty to money laundering. The Due Diligence should be developed further.

Item Type: Article
Uncontrolled Keywords: New Payment System, Payment Products, Payment Services, Anti Money Laundering Approach
Subjects: K Law > K Law (General)
Divisions: Faculty of Law > Department of Law
Depositing User: Eko Setiawan 194014
Date Deposited: 28 Jan 2016 01:26
Last Modified: 05 Mar 2019 04:20
URI: http://repository.ubaya.ac.id/id/eprint/26565

Actions (login required)

View Item View Item