Professional Documents
Culture Documents
www.iiste.org
www.iiste.org
money laundering and terrorism financing for the year 2007 also issued Regulation No. (40) for the year 2009
System Unit to combat money laundering and terrorist financing issued under paragraph (c) of Article (7) of the
Anti-Laundering money (the law against money laundering and terrorism financing No. (47) for the year 2007
published on page 4130 of the Official Gazette No. 4831 dated 17/6/2007, amended by Law No. (8) for the year
2010), regarding anti-money laundering, which is compatible with the provisions of criminalization of money
laundering contained in the United Nations Convention to Combat Transnational Organized Crime (Sulyman,
2006).
Defines article (2 / a) of the Act anti-money laundering and terrorism that money laundering is all an
act involves the acquisition of funds or acquired or disposed of or transferred or managed or saved or replaced or
deposited or invested or manipulated in value or converted, or any other act The intent of this act to hide or
disguise the source or nature of their real or place, movement or disposition or ownership of or rights with
respect to or prevent knowledge from committed the crime obtained them money with the knowledge that they
obtained from a any of the offenses set forth in article ( 4) of the Act and Article (4) of the law on combating
money laundering and terrorism is all money derived from any offenses set forth below subject to money
laundering:
A. Any offense punishable under the provisions of the legislation in force in the Kingdom.
B. Crimes stipulated by international agreements ratified by the Kingdom considers its proceeds to shop for the
crime of money laundering, provided that it is punishable by law in Jordan.
The money laundering linked to illegal activities are usually fugitive outside the validity of laws
against financial corruption and then try to return again legitimately recognized by the same laws that were
criminalized, not the owners of illicit funds or the resulting transactions dirty that they would return their money
into the country only after reassuring to the absence of irregularities and risks associated with security or
sovereignty (AbdelAzim, 1997). There is many multiple sources of illicit funds multiplicity of offenses which
are difficult to restrict it in a window or a certain number, and the most important drug trafficking and crossborder smuggling of goods and bribery and trafficking in foreign currency and associations wicked and terrorism,
embezzlement and corruption in public office and tax evasion and political activities illegal and borrowing from
banks without sufficient guarantees, and crimes of white-collar workers that are committed by people them a
high status in the community (breach of the duties of the job, the investment function, abuse power, ...), fraud,
commercial fraud and trademark counterfeiting and forgery cash, coins, banknotes and falsifying bank checks
and illegal speculation in stock ... and others. (Shafie ,2001)
The censorship in any facility is the mainstay to ensure implementation of the plans and the application
of regulations, policies and achieve the goals, and this control is not in a vacuum, but rather require fundamental
constituents of the existence of those in charge, functions, policies and procedures are one of the management
functions and the pivot on which the administration to make sure that the actual performance are in accordance
with the planned objectives and standards set . The censorship localities as substantial in management but arise
as a result of the likelihood of any errors during the implementation of the plans drawn and the objectives set in
advance (Tawfik, 2000).
Defines censorship as "to make sure that what has been done OK what was planned in advance"
((Tawfik, 2000). And Defines by some as "measuring and correcting performance of subordinates for the
purpose of making sure that the objectives of the facility and plans to reach them has been achieved (Tawfik,
2000).
Also defines too as: "to make sure that what has been achieved from the activities and tasks and goals
is exactly what it should be, including the identification of deviations, if any, and the reasons for and methods of
treatment" ((Hanafi, and Abu Qahef,1992).
The objective of the control procedures relating to the codification of entry and electronic
communication with computers in reducing the risk of penetration of illegal (Illegal Penetration) programs and
computer systems, and there is a set of procedures used, including: (Aldahaan, 1990).
1. Password: It is a way intended to validate the user to identify actions that can or is allowed to do and access to
the system to deal with the software, who shall user define himself to the device by a password and is compared
to the information provided with the information recorded in computer files If matching, managed user access to
the system and use the software allowed him to use, and this method is one of the most preferred ways for easy
change upon the occurrence of any fault, and there are a range of considerations must be introduced, if the
password is composed of a group letters or numbers so long that you cannot access them through
experimentation, in addition to be a specific period of time certain device automatically asks the user to change
the word, and that there is a record of the number of unsuccessful attempts to use the terminals to gain access to
the system.
2. Isolate and classify information: are usually isolated and save information on the means of storing and moving
according to the importance of information and confidentiality, rated and classified in a special file, and specify a
password to gain access to this information, and then put it in a safe place.
37
www.iiste.org
3. Encryption data : is a method whereby the conversion of simple text (Plain Text) to typed cipher text and
conversion programs and information to the forms and symbols incomprehensible, and this means good control
and effective control to protect the programs of the organization, which is characterized by secrecy and
sensitivity as well as to protect the information of changes or modifications is documented from unauthorized
users, and this requires special software and a special key codes be known by the authorized users to gain access
to programs and information.
4. Censor the court to run the computer time-sharing system, and through the manual and automatic closure of
the files and records.
The banks represent one of the most important channels of money laundering globally and that the
growing need for money launderers to use the banking and financial system that offers great potential and
attractive to pass Operations suspicious efforts to conceal and disguise the sources of those dirty money.
Since the mid-eighties of the last century began the world's attention is increasingly trying to adopt a
set of rules and principles of control that must be followed by banks and other financial institutions to strengthen
its role in the fight against money-laundering phenomenon and work to respect the requirements of law
enforcement, taking into account work on activating the financial and banking systems and ensure transparency
financial operations and validation of the legitimacy of the funds and the reduction of the exploitation of
financial institutions to pass and the flow of criminal proceeds in order not to turn into open channels to launder
illicit funds settlement does not achieve the degree of restriction of the principle of banking secrecy without
compromising the right of individuals to respect confidentiality, (Tahir ,2002), and after that there is several
international documents to develop two types of obligations and legal rules and regulatory first type is the
preventive measures aimed at preventing the use of banks and financial institutions in the crimes of money
laundering and the second type is the action detect money laundering and track down the perpetrators, and banks
must prepare and save documents and records relating to operations and financial transactions for customers and
so easy reference when needed by the authorities of the bank or auditors or by the central bank or other
competent authorities. (Fayed, 1992)
From the above it is clear that the absolute banking secrecy represent temptation and attractive to
money launderers and criminal organizations that exploited on a large scale to facilitate money laundering
derived from drug trafficking and other crimes (Tahir, 2002).
Thus researchers believe that the process of restricting the principle of banking secrecy became
international demand urgent to activate international cooperation in the Anti-money Laundering operations
which confirmed most of the relevant international documents to restrict bank secrecy by following the various
states a set of measures that limit the release and to protect the banking system where breakthroughs money
launderers and achieve cooperation with the judiciary and the police to combat money-laundering operations.
Problem of the study
The study linked the problem of crime and money laundering aspects associated with the reduction, including
through the investigation and analysis of the role of banking secrecy in the extent of assistance in reducing and
anti-money laundering. The study comes to answer the following questions:
1-Is there an effect of banking secrecy in the Anti-money Laundering in Jordanian banks?
And the ramifications of them the following questions:
Is there a risk assessment of the impact to the customer on the Anti-money Laundering in Jordanian banks?
Is there an effect of the use of behavior detection technology to combat money laundering in Jordanian banks?
Is there a risk to measure the impact of the deal on anti-money laundering in Jordanian banks?
Is there a mechanism for the effect of the use of workflow and reporting on anti-money laundering in Jordanian
banks?
The main hypothesis of the study hypotheses Sub
H01: There is no statistically significant effect at the level of significance (0.05) banking secrecy dimensions
(risk assessment, behavior detection technology, measuring the risk of the deal, automatic workflow and
reporting) on the Anti-money Laundering.
H01-1: No effect is statistically significant at the level of significance (0.05) to assess the risk of the client on
the Anti-money Laundering.
H01-2: No effect is statistically significant at the level of significance (0.05) technology to detect behavior on
the Anti-money Laundering.
H01-3: No effect is statistically significant at the level of significance (0.05) to measure the risk of the deal on
anti-money laundering
H01-4: No effect is statistically significant at the level of significance (0.05) mechanism for workflow and
reporting on anti-money laundering.
38
www.iiste.org
39
www.iiste.org
good.
The Study Population
The study population consisted of Jordanian banks and number (16) banks, according to statistics of the Central
Bank of Jordan in 2013.
The Study Sample
The number of the study sample (165) male and female employees in Jordanian banks, were distributed study
tool for the study sample, which was recovered (148) questionnaire were excluded (8) questionnaires for lack of
suitability for scientific analysis, and was getting on (140) to identify valid and reliable for the purposes of
scientific analysis, which is about (90%) of the questionnaires were distributed and (5%) of the study population,
which is acceptable ratio for the purposes of analysis (Nuaimi, 2010).
Study Tool
For the initial data has been adopted questionnaire as a key tool for the study, and use the questionnaire for the
purposes of achieving the objectives of the study so designed building on the Likert scale Quintet (Scale Likert),
which consists resolution of three parts, included the first part of the personal information data and functional,
and the second part consisted of questions on the subject of the study.
Believe tool
To ascertain the veracity of the instrument, the researchers are viewing on a number of professors, specialists in
the universities to make sure of the safety of the language and the appropriateness of paragraphs for the purposes
of the study has been made necessary amendments in the light of the views of arbitrators.
The Stability of the Tool
I have been using the alpha value to measure the stability of the measurement tool where we note that the value
of (alpha) of the questionnaire as a whole is equal to (89.8%), the largest percentage of statistically acceptable
(60%), which reflects the stability of the measurement tool used. (David, 2002).
Shows how the dimensions of stability:
1 assess the risk of the client 82.9%
2 behavior detection technology 92.6%
3 to measure the risk of the deal 84.5%
4 automatic workflow and reporting 91.3%
5 Anti-Money Laundering 81.9%
6 Resolution as a whole 89.8%
Procedures for Processing Tool:
Was measured answer phrases related groups values according to the Likert scale quintet so that they form very
OK number (5), and the corresponding form number (4), and corresponding to a certain extent the number (3),
and is OK figure (2), and Strongly Disagree number (1), and we infer the direction of the respondents to the
study variables according to the arithmetic average and standard deviation of the responses of the respondents.
(Naimi, 2010).
Conclusions reached by the researchers through statistical analysis as follows:
The researchers found through analysis of the data and the results of the analysis that has been assembled to:
1. The banks are updating all customer data, whether individuals or companies who belong to the black list in
commercial suspicious transactions.
2. Banks to notify the competent authorities of suspicious customers' data.
3. Banks to use electronic systems to comply with new registration information to ensure the accounts and
movements accurately.
4. Work continuously monitors banking transactions to detect money laundering.
5. The competent departments of banks classify suspicious accounts according to the degree of seriousness.
6. Are monitored financial transactions made through electronic transfer systems
7. Banks not to grant loans against the assets of unknown source or owned by a financial institution or a third
party.
Recommendations and proposals
By the results of the study, researchers offers the following recommendations:
1- Find new systems operate on the electronic link between the local and international banks all operate on antimoney laundering.
40
www.iiste.org
2-To take advantage of international experience in all countries involved in combating money laundering.
3-Establishment of alliances and partnerships between all government and private sectors to curb money
laundering crimes.
4-Preferred tighten sanctions on all violations related to money laundering.
5-Advised to activate the role of training in the Central Bank of Jordan, and all the banks to find a staff
specialized in Anti-money Laundering.
6-Recommended commitment of all banks to disclose the crimes or even suspicions that lead to crimes of money
laundering in order to take advantage of them for the rest of the competent authorities.
7- Are advised to increase the interest of Jordanian banks risk assessment of the client and the follow-up of
customer behavior through their accounts and their remittances, which affects positively on the Anti-money
Laundering.
8- Recommended concentration of Jordanian banks on the use of behavior detection systems using specialized
technology and thus the development of this technology whenever the need arises to avoid the rapid
development of electronic systems, and anti-money laundering.
References List
1- Aldahaan , Umaymah, and Mohsen Makhamreh, (1990), the impact of computer use on business activities
in banks in Jordan, Journal of Studies, University of Jordan, Volume 16, Issue 1.
2- Abdul Baqi, knew Joseph, (2008), the phenomenon of money laundering and how to address them, M.Sc.
University of Omdurman, 2008.
3- Abdel Azim, 10, Hamdi, (1997), money laundering in Egypt and the world (white crime, its dimensions, its
effects, how to combat it), i 1, Dar Arab renaissance for publication and distribution.
4- David A. Garvin, (2002) General Management: Processes and Action.
5- Daoudi, Ghalib Ali, (2002), the role of financial and banking institutions in the fight against crime, money
laundering, police magazine, Issue 275, May 2002 AD, Jordan.
6- Eitan, Ghaith Nasser (2009) "methods of money laundering and the role of the banking system in control"
(Unpublished MA Thesis), Al al-Bayt University, Jordan.
7- Fayed, Ahmed Mohammed Abdel-Raouf (1992). Study and evaluate the references to adjust the internal
accounting systems in electronic, the scientific journal of the economy and trade, Faculty of Commerce, Ain
Shams University, the second issue.
8- Fendang. C (2003)The Role of the Banking Sector in Combating Money Laundering center for advanced
international studies, Lusaka Zambia.
9- Friedrich Schneider & Ursula Windischbauer (2008) Money laundering: some facts.
10- Jennifer Hanley(2010), Money Laundering Typologies Anti-Money Laundering Regimes and the Third EU
Directive's Approach to Customer Due Diligence.
11- Hanafi, Abdul Ghaffar and Abdul Salam Abu cranium. (1992), "financial markets and institutions," the
office of modern Arab, Egypt.
12- Interview, the mind of Joseph, (2002), the crime of money laundering in the era of globalization, research
presented to the Scientific Conference for Economic Crime, held at the University of Jerash, Faculty of Law,
during the period of 29-30 / 4/2002
13- Kim Danh. Mara Fernanda Estrada. (2011) Julieta Meja Ibez. Max Risch and. Maureen Tee. Advisor:
Professor JaeBin Ahn May 2011
14- law on combating money laundering and terrorism financing No. (47) for the year 2007 published on page
4130 of the Official Gazette No. 4831 dated 17/6/2007, amended by Law No. (8) of 2010.
15- Menon, R and Kumar, S. (2005) Understanding the role of technology in Anti-Money Laundering
Compliance.
16- Nabhan, Mohammed Farooq, (1989), about a unified strategy to combat organized crime, publications of the
Arab Center for Security Studies, Riyad.
17- Qchoc, Hoda Hamid, (2007), the crime of money laundering in the scope of international cooperation, Dar
Arab renaissance.
18- Shaykhli, Ahmed Samir Mohamed Abdel Wahab. (2010) "The role of banks in the fight against moneylaundering operations," Unpublished MA Thesis, University of Jordan.
19- Shafi, Nader Abdul Aziz, (2001), a comparative study of money laundering, human rights publications
Halabi, Beirut.
20- Suleiman, Abdel Fattah 0.2002, anti-money laundering, the first edition, Dar legal books.
21- Tawfiq, gameel, (2000), Business Administration, Alexandria, University House.
22- Taher, Mustafa, (2002), the legislative confrontation of the phenomenon of money laundering derived from
drug offenses, police presses for printing and publishing, Cairo.
23- Tanki, Frank, J., (1993). Internal Control: Integrated Framework: A Landmark Study, the CPA Journal, New
41
www.iiste.org
42