|
|
|
|
LEADER |
04460nam a22004335i 4500 |
001 |
978-3-8348-2095-2 |
003 |
DE-He213 |
005 |
20151125151543.0 |
007 |
cr nn 008mamaa |
008 |
130606s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783834820952
|9 978-3-8348-2095-2
|
024 |
7 |
|
|a 10.1007/978-3-8348-2095-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a P98-98.5
|
072 |
|
7 |
|a UYQL
|2 bicssc
|
072 |
|
7 |
|a COM042000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.35
|2 23
|
100 |
1 |
|
|a Lisbach, Bertrand.
|e author.
|
245 |
1 |
0 |
|a Linguistic Identity Matching
|h [electronic resource] /
|c by Bertrand Lisbach, Victoria Meyer.
|
264 |
|
1 |
|a Wiesbaden :
|b Springer Fachmedien Wiesbaden :
|b Imprint: Springer Vieweg,
|c 2013.
|
300 |
|
|
|a XVII, 244 p. 8 illus., 4 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction: Paradigm Shift in Identity Matching Theory -- Part I: Introduction to Linguistic Identity Matching -- Chapter 1: Basic Concepts -- Chapter 2: The Application of Identity Matching Techniques -- Chapter 3: Introduction to Proper Names -- Chapter 4: Transcription -- Chapter 5: Derivative Forms of Names -- Chapter 6: Phonetically Similar Names -- Chapter 7: Typos -- Part II: Name Matching Methods -- Chapter 8: Name Matching Methods of the First Generation -- Chapter 9: Second Generation Name Matching Methods -- Chapter 10: Third Generation Name Matching Methods -- Chapter 11: Benchmark Study -- Part III: Into the New Paradigm -- Chapter 12: Name Matching and Identity Matching -- Chapter 13: Evaluation of Identity Matching Software -- Chapter 14: A Linguistic Search Standard.
|
520 |
|
|
|a Identity matching has become an integral part of many business and security processes, from border control and crime investigation to anti-money laundering and client data management. Following years of struggling with computational techniques, the new linguistic identity matching approach finally offers an appropriate way for such processes to balance the risk of missing an identity match with the costs of overmatching. This new paradigm for searching identity data focuses on understanding the influences that languages, writing systems and cultural conventions have on proper names. In this book, the authors draw on their many years of identity matching experience to explain why linguistic knowledge is the key to improving both the recall and precision of identity search systems, and how organisations can best harness this knowledge to improve the way they work with identity data. Content Part I: Introduction to Linguistic Identity Matching - Basic Concepts - The Application of Identity Matching Techniques - Introduction to Proper Names - Transcription - Derivative Forms of Names - Phonetically Similar Names - Typos - Part II: Name Matching Methods - Name Matching Methods of the First Generation - Second Generation Name Matching Methods - Third Generation Name Matching Methods - Benchmark Study - Part III: Into the New Paradigm - Name Matching and Identity Matching - Evaluation of Identity Matching Software - A Linguistic Search Standard Target Groups Compliance Officers Law Enforcement Anti-Fraud and AML Professionals CIOs Product Managers and Business Analysts Students and Academics of computer science and linguistics Authors Dr Bertrand Lisbach is CEO of the award-winning Linguistic Search Solutions AG and is an expert in linguistic identity matching. He studied psychology, languages & IT and provides consultancy, system evaluations & solution implementation. Victoria Meyer is a forensic accountant and Director of SIBAcademy. A former Forensic Technology Director for one of the Big 4 consultancy firms, she has over two decades of experience in the use of identity matching techniques for fraud investigation and AML purposes.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computational linguistics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Language Translation and Linguistics.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
|
|a Meyer, Victoria.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783834813701
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-8348-2095-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|