Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 28031 dokumen yang sesuai dengan query
cover
Yusup Saprudin
Jakarta: PTIK, 2006
345.023 Sap m
Buku Teks  Universitas Indonesia Library
cover
cover
cover
Siahaan, Nommy H.T.
Jakarta: Jala, 2008
345.023 SIA m
Buku Teks  Universitas Indonesia Library
cover
Siahaan, Nommy H.T.
Jakarta: jala penerbit, 2008
Buku Teks SO  Universitas Indonesia Library
cover
Pardede, Marulak
Jakarta: Badan Pembinaan Hukum Nasional, Kementerian Hukum dan HAM Republik Indonesia, 1995
332.76 PAR m
Buku Teks SO  Universitas Indonesia Library
cover
Yenti Garnasih
Jakarta: Fakultas Hukum. Universitas Indonesia, 2003
345.023 YEN k
Buku Teks  Universitas Indonesia Library
cover
Jakarta: Badan Pembinaan Hukum Nasional, Kementerian Hukum dan HAM Republik Indonesia, 2011
345.023 IND e
Buku Teks  Universitas Indonesia Library
cover
Dwi Sasono
"Diilhami dari penelitian tentang metode pencucian uang melalui kartu kredit di Amerika Serikat pada tahun 2002, sejumlah parameter dan pendekatan rezim anti pencucian uang disesuaikan dengan kondisi saat ini di Indonesia. Sebagai Financial Intelligence Unit, PPATK merupakan kunci sentral dari Rezim Anti Pencucian Uang di Indonesia dan ditantang untuk menemukan metoda pencegahan pencucian uang yang efektif di Indonesia. Ketika pencucian uang di Indonesia sangat lekat dengan korupsi dan penyuapan, PPATK mengungkap bahwa pencucian uang melalui kartu kredit adalah hal baru di Indonesia. Penelitian ini berupaya melihat potensi risiko pencucian uang melalui transaksi kartu kredit di Indonesia, dimana praktek Credit Card Laundering yang mengandung potensi besar kerawanan dibiarkan menjamur. Penelitian diarahkan untuk memahami fenomena tersebut dan mendapatkan formulasi strategi yang handal untuk mencegah perluasan metoda pencucian uang dimasa yang akan datang. Pendekatan penelitian akan menggunakan studi kasus dalam bentuk gratifikasi. Analisa yang digunakan adalah sebuah pendekatan dengan metoda pengujian risiko dan ancaman yang mengikuti formula R = T + V + C. Berdasarkan sejumlah masukan dan temuan yang terungkap selama penelitian diketahui bahwa pemasalahan utama yang menjadi risiko terbesar yang dihadapi adalah kerentanan akibat tidak adanya sinergi antar PPATK, regulator dan penegak hukum serta pihak pelapor (PJK). Selain itu kemampuan intervensi PPATK yang lemah serta pemahaman dari hakikat pencucian uang yang masih minim.

Inspired by a research held on 2002 in United States regarding Money Laundering Extension through Credit Cards, this research was set with some adjustment of parameters and approach to anti-money laundering regime adapted to current conditions in Indonesia. As a Financial Intelligence Unit, INTRAC is a central key of the Anti-Money Laundering Regime in Indonesia and challenged to find a method of prevention of money laundering in Indonesia. While money laundering in Indonesia very closely with corruption and bribery, PPATK revealed that money laundering through a credit card is a new thing in Indonesia. This study seeks to look at the potential risk of money laundering through credit card transactions in Indonesia. The practice of Credit Card Laundering which is known to potentially vulnerable for money laundering was greatly accepted as a common practice in Indonesia. The research directed to understanding the phenomenon and to obtain a reliable strategy formulation for the prevention of money laundering methods in the future. Research approach will use a case study in the form of gratification. The analysis used in this research will be tested with risks assessment formulation as follows R = T + V + C. The number of entries and the findings revealed during research had raised the core problem facing in risk mitigation is vulnerability due to the lack of synergy between INTRAC, regulators and law enforcement agencies as well as the complainant (CHD). In addition, INTRAC capabilities to intervention were inadequate and there is lack of understanding for the nature of money laundering itself within the society."
Depok: Universitas Indonesia, 2015
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Abdul Hafiz Sukri
"[ABSTRAK
Tindakan penipuan seperti yang dilakukan oleh PT.GTIS memberikan peluang terjadinya tindakan penyamaran aset yang dilakukan oleh para pelaku. Hal ini dapat terjadi karena besarnya potensi aset yang didapatkan oleh pelaku disaat melakukan penipuan. Dalam karya akhir ini akan dibahas bagaimana proses dari tindakan penyamaran aset tersebut dilakukan oleh pelaku. Selain itu, juga dibahas faktor-faktor yang mendorong pelaku untuk melakukan tindakan tersebut. Faktor-faktor tersebut akan dibahas menggunakan dua teori yaitu rational choice theory dan juga control balance theory. Dengan menggunakan kedua teori tersebut ditemukan bahwa faktor yang mendorong terjadinya penyamaran aset adalah pertimbangan dari pelaku yang melihat adanya keuntungan yang lebih besar ketika melakukan penyamaran terhadap aset hasil penipuan dan keserakahan dari pelaku sendiri. Selain itu, tindakan tersebut didorong oleh masalah perusahaan yang tidak lagi mampu untuk menjalankan bisnis dengan skema ponzi.

ABSTRACT
Fraud that committed by PT.GTIS give opportunities to cloaking the asset performed by perpetrator. Asset cloaking can be happen because of the assets acquired by the perpetrator when committing fraud is very potential. In this paper will discuss how the processes of the asset cloak performed by actors. In addition, it also discussed the factors that encourage actors to cloaking the assets acquired from fraud action. These factors will be discussed using rational choice theory and control balance theory. By using both theories, author found that the factors that contribute to cloaking the assets are the consideration of the perpetrator who looks for greater profits when hiding the assets and greediness of the perpetrator. Moreover, the assets cloaking are driven by the company's problems are no longer able to run the business with a ponzi scheme.;Fraud that committed by PT.GTIS give opportunities to cloaking the asset performed by perpetrator. Asset cloaking can be happen because of the assets acquired by the perpetrator when committing fraud is very potential. In this paper will discuss how the processes of the asset cloak performed by actors. In addition, it also discussed the factors that encourage actors to cloaking the assets acquired from fraud action. These factors will be discussed using rational choice theory and control balance theory. By using both theories, author found that the factors that contribute to cloaking the assets are the consideration of the perpetrator who looks for greater profits when hiding the assets and greediness of the perpetrator. Moreover, the assets cloaking are driven by the company's problems are no longer able to run the business with a ponzi scheme.;Fraud that committed by PT.GTIS give opportunities to cloaking the asset performed by perpetrator. Asset cloaking can be happen because of the assets acquired by the perpetrator when committing fraud is very potential. In this paper will discuss how the processes of the asset cloak performed by actors. In addition, it also discussed the factors that encourage actors to cloaking the assets acquired from fraud action. These factors will be discussed using rational choice theory and control balance theory. By using both theories, author found that the factors that contribute to cloaking the assets are the consideration of the perpetrator who looks for greater profits when hiding the assets and greediness of the perpetrator. Moreover, the assets cloaking are driven by the company's problems are no longer able to run the business with a ponzi scheme., Fraud that committed by PT.GTIS give opportunities to cloaking the asset performed by perpetrator. Asset cloaking can be happen because of the assets acquired by the perpetrator when committing fraud is very potential. In this paper will discuss how the processes of the asset cloak performed by actors. In addition, it also discussed the factors that encourage actors to cloaking the assets acquired from fraud action. These factors will be discussed using rational choice theory and control balance theory. By using both theories, author found that the factors that contribute to cloaking the assets are the consideration of the perpetrator who looks for greater profits when hiding the assets and greediness of the perpetrator. Moreover, the assets cloaking are driven by the company's problems are no longer able to run the business with a ponzi scheme.]"
2015
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>