//]]>

Linguistic Identity Matching (Record no. 22490)

000 -LEADER
fixed length control field 04359nam a22004095i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151132.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130606s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783834820952
978-3-8348-2095-2
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number P98-98.5
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.35
Edition number 23
264 #1 -
-- Wiesbaden :
-- Springer Fachmedien Wiesbaden :
-- Imprint: Springer Vieweg,
-- 2013.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Lisbach, Bertrand.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Linguistic Identity Matching
Medium [electronic resource] /
Statement of responsibility, etc by Bertrand Lisbach, Victoria Meyer.
300 ## - PHYSICAL DESCRIPTION
Extent XVII, 244 p. 8 illus., 4 illus. in color.
Other physical details online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction: Paradigm Shift in Identity Matching Theory -- Part I: Introduction to Linguistic Identity Matching -- Chapter 1: Basic Concepts -- Chapter 2: The Application of Identity Matching Techniques -- Chapter 3: Introduction to Proper Names -- Chapter 4: Transcription -- Chapter 5: Derivative Forms of Names -- Chapter 6: Phonetically Similar Names -- Chapter 7: Typos -- Part II: Name Matching Methods -- Chapter 8: Name Matching Methods of the First Generation -- Chapter 9: Second Generation Name Matching Methods -- Chapter 10: Third Generation Name Matching Methods -- Chapter 11: Benchmark Study -- Part III: Into the New Paradigm -- Chapter 12: Name Matching and Identity Matching -- Chapter 13: Evaluation of Identity Matching Software -- Chapter 14: A Linguistic Search Standard.
520 ## - SUMMARY, ETC.
Summary, etc Identity matching has become an integral part of many business and security processes, from border control and crime investigation to anti-money laundering and client data management. Following years of struggling with computational techniques, the new linguistic identity matching approach finally offers an appropriate way for such processes to balance the risk of missing an identity match with the costs of overmatching. This new paradigm for searching identity data focuses on understanding the influences that languages, writing systems and cultural conventions have on proper names. In this book, the authors draw on their many years of identity matching experience to explain why linguistic knowledge is the key to improving both the recall and precision of identity search systems, and how organisations can best harness this knowledge to improve the way they work with identity data. Content Part I: Introduction to Linguistic Identity Matching - Basic Concepts - The Application of Identity Matching Techniques - Introduction to Proper Names - Transcription - Derivative Forms of Names - Phonetically Similar Names - Typos - Part II: Name Matching Methods - Name Matching Methods of the First Generation - Second Generation Name Matching Methods - Third Generation Name Matching Methods - Benchmark Study - Part III: Into the New Paradigm - Name Matching and Identity Matching - Evaluation of Identity Matching Software - A Linguistic Search Standard Target Groups Compliance Officers Law Enforcement Anti-Fraud and AML Professionals CIOs Product Managers and Business Analysts Students and Academics of computer science and linguistics Authors Dr Bertrand Lisbach is CEO of the award-winning Linguistic Search Solutions AG and is an expert in linguistic identity matching. He studied psychology, languages & IT and provides consultancy, system evaluations & solution implementation. Victoria Meyer is a forensic accountant and Director of SIBAcademy. A former Forensic Technology Director for one of the Big 4 consultancy firms, she has over two decades of experience in the use of identity matching techniques for fraud investigation and AML purposes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Translators (Computer programs).
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Language Translation and Linguistics.
Topical term or geographic name as entry element Information Systems Applications (incl. Internet).
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Meyer, Victoria.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783834813701
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-8348-2095-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-24AUM Main Library2014-04-24 2014-04-24 E-Book   AUM Main Library006.35

Languages: 
English |
العربية