Table of contents
About this book
Identity matching has become an integral part of many business and security processes, from border control and crime investigation to anti-money laundering and client data management.
Following years of struggling with computational techniques, the new linguistic identity matching approach finally offers an appropriate way for such processes to balance the risk of missing an identity match with the costs of overmatching. This new paradigm for searching identity data focuses on understanding the influences that languages, writing systems and cultural conventions have on proper names.
In this book, the authors draw on their many years of identity matching experience to explain why linguistic knowledge is the key to improving both the recall and precision of identity search systems, and how organisations can best harness this knowledge to improve the way they work with identity data.
Part I: Introduction to Linguistic Identity Matching - Basic Concepts - The Application of Identity Matching Techniques - Introduction to Proper Names - Transcription - Derivative Forms of Names - Phonetically Similar Names - Typos - Part II: Name Matching Methods - Name Matching Methods of the First Generation - Second Generation Name Matching Methods - Third Generation Name Matching Methods - Benchmark Study - Part III: Into the New Paradigm - Name Matching and Identity Matching - Evaluation of Identity Matching Software - A Linguistic Search Standard
Anti-Fraud and AML Professionals
Product Managers and Business Analysts
Students and Academics of computer science and linguistics
Dr Bertrand Lisbach is CEO of the award-winning Linguistic Search Solutions AG and is an expert in linguistic identity matching. He studied psychology, languages & IT and provides consultancy, system evaluations & solution implementation.
Victoria Meyer is a forensic accountant and Director of SIBAcademy. A former Forensic Technology Director for one of the Big 4 consultancy firms, she has over two decades of experience in the use of identity matching techniques for fraud investigation and AML purposes.