-
1
-
-
85064454895
-
-
accessed 15 October 2010
-
AUSTRAC (2009), “Introduction to terrorism financing”, available at: www.austrac.gov.au/elearning/mod5/mod_5_terrorism_financing_8.html (accessed 15 October 2010).
-
(2009)
Introduction to terrorism financing
-
-
-
2
-
-
85064631787
-
-
British Broadcasting Corporation News, : (accessed 21 June 2011
-
BBC (2008), “Poor earning virtual gaming gold, 22 August 2008”, British Broadcasting Corporation News, available at: http://news.bbc.co.uk/2/hi/7575902.stm (accessed 21 June 2011).
-
(2008)
Poor earning virtual gaming gold, 22 August 2008
-
-
-
3
-
-
85029263262
-
Financial crime as a threat to the wealth of nations: a cost-effectiveness approach
-
Biagioli, A. (2008), “Financial crime as a threat to the wealth of nations: a cost-effectiveness approach”, Journal of Money Laundering Control, Vol. 11 No. 1, p. 88.
-
(2008)
Journal of Money Laundering Control
, vol.11
, Issue.1
, pp. 88
-
-
Biagioli, A.1
-
4
-
-
84962857593
-
Petri net script: a visual language for describing action, behaviour and plot
-
Blackwell, L., von Konsky, B. and Robey, M. (2001), “Petri net script: a visual language for describing action, behaviour and plot”, Proceedings on Computer Science Conference 2001, ACSC 2001, Gold cost, 29 January-4 February, pp. 29-37.
-
(2001)
Proceedings on Computer Science Conference 2001, ACSC 2001, Gold cost, 29 January-4 February
, pp. 29-37
-
-
Blackwell, L.1
von Konsky, B.2
Robey, M.3
-
6
-
-
69249215331
-
B2 model: a browsing behaviour model based on high-level petri-nets to generate behavioural patterns for e-learning
-
Chang, Y.-C., Huang, Y.-C. and Chu, C.-P. (2009), “B2 model: a browsing behaviour model based on high-level petri-nets to generate behavioural patterns for e-learning”, Expert Systems with Applications, Vol. 36, pp. 12423-40.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 12423-12440
-
-
Chang, Y.C.1
Huang, Y.C.2
Chu, C.P.3
-
7
-
-
77957695303
-
Organised crime groups in cyberspace: a typology
-
Choo, K.-K.R. (2008), “Organised crime groups in cyberspace: a typology”, Trends in Organized Crime, Vol. 11 No. 3, pp. 270-95.
-
(2008)
Trends in Organized Crime
, vol.11
, Issue.3
, pp. 270-295
-
-
Choo, K.K.R.1
-
8
-
-
46449097423
-
Criminal exploitation of online systems by organised crime groups
-
Choo, K.-K.R. and Smith, R.G. (2008), “Criminal exploitation of online systems by organised crime groups”, Asian Journal of Criminology, Vol. 3, pp. 37-59.
-
(2008)
Asian Journal of Criminology
, vol.3
, pp. 37-59
-
-
Choo, K.K.R.1
Smith, R.G.2
-
9
-
-
24344461256
-
-
Annual Report 2002-2003, : (accessed 15 June 2011
-
FATF (2003), “Financial Action Task Force on money laundering”, Annual Report 2002-2003, available at: www.oecd.org/dataoecd/12/27/2789358.pdf (accessed 15 June 2011).
-
(2003)
Financial Action Task Force on money laundering
-
-
-
11
-
-
84900376596
-
-
accessed 20 May 2011
-
FATF-GAFI.org (2004), 9 Special Recommendations (SR) on Terrorist Financing (TF), available at: www.fatf-gafi.org/document/9/0,3746,en_32250379_32236920_34032073_1_1_1_1,00.html (accessed 20 May 2011).
-
(2004)
9 Special Recommendations (SR) on Terrorist Financing (TF)
-
-
-
13
-
-
85064442849
-
-
Financial Transactions and Reports Analysis Centre of Canada, : (accessed 9 October 2010
-
FINTRAC (2009), “Terrorist financing”, Financial Transactions and Reports Analysis Centre of Canada, available at: www.fintrac.gc.ca/multimedia/education/c1/1-5-eng.asp (accessed 9 October 2010).
-
(2009)
Terrorist financing
-
-
-
14
-
-
84858994469
-
-
Financial Supervision Commission, : (accessed 9 May 2011
-
FSC (2009), “Money laundering and the financing of terrorism”, Financial Supervision Commission, available at: www.fsc.gov.im/aml/ (accessed 9 May 2011).
-
(2009)
Money laundering and the financing of terrorism
-
-
-
15
-
-
84955363882
-
-
Occasional Paper Series 36, August 2009, Financial Services Authority, : (accessed 19 May 2011
-
Fleming, M.H. (2009), “FSA's scale & impact of financial crime project (phase one): critical analysis”, Occasional Paper Series 36, August 2009, Financial Services Authority, available at: www.fsa.gov.uk/pubs/other/critical_analysis.pdf (accessed 19 May 2011).
-
(2009)
FSA's scale & impact of financial crime project (phase one): critical analysis
-
-
Fleming, M.H.1
-
16
-
-
84960286889
-
-
accessed 19 May 2011).Australian Institute of Criminology, canberra
-
Graycar, A. and Grabosky, P. (1996), Money Laundering in the 21st Century: Risks and Countermeasures, Australian Institute of Criminology, canberra, available at: www.aic.gov.au/documents/D/D/E/%7BDDE3E02F-CF47-473D-8603-9DDC708CE4F4%7DRPP02.pdf(accessed 19 May 2011).
-
(1996)
Money Laundering in the 21st Century: Risks and Countermeasures
-
-
Graycar, A.1
Grabosky, P.2
-
17
-
-
84993077385
-
Banks governance and public-private partnership in preventing and confronting organized crime, corruption and terrorism financing
-
Hardouin, P. (2009), “Banks governance and public-private partnership in preventing and confronting organized crime, corruption and terrorism financing”, Journal of Financial Crime, Vol. 16 No. 3.
-
(2009)
Journal of Financial Crime
, vol.16
, Issue.3
-
-
Hardouin, P.1
-
19
-
-
57749113063
-
-
accessed 13 March 2011).National White Collar Crime Centre, Fairmont, WV
-
Kane, J. and Wall, A. (2005), The 2005 National Public Survey on White Collar Crime, National White Collar Crime Centre, Fairmont, WV, available at: www.nw3c.org/research/docs/national_public_household_survey.pdf (accessed 13 March 2011).
-
(2005)
The 2005 National Public Survey on White Collar Crime
-
-
Kane, J.1
Wall, A.2
-
20
-
-
85064718716
-
-
www2.informatik.hu-berlin.de/∼lindeman/masho01_contributions/koemolroe.converted_from_ps.pdf (accessed 20 May 2011
-
Köhler, M., Moldt, D. and Rölke, H. (2001), “Modelling a sociological case study”, available at: www2.informatik.hu-berlin.de/∼lindeman/masho01_contributions/koemolroe.converted_from_ps.pdf (accessed 20 May 2011).
-
(2001)
Modelling a sociological case study
-
-
Kö1
hler, M.2
Moldt, D.3
Rö4
lke, H.5
-
21
-
-
84942429793
-
-
accessed 2 June 2011
-
Leapman, B. (2007), “Second Life world may be haven for terrorists”, available at: www.telegraph.co.uk/news/uknews/1551423/Second-Life-world-may-be-haven-for-terrorists.html (accessed 2 June 2011).
-
(2007)
Second Life world may be haven for terrorists
-
-
Leapman, B.1
-
22
-
-
77956160679
-
Wage slaves
-
accessed 20 October 2009
-
Lee, J. (2005), “Wage slaves”, Computer Gaming World, July/August, pp. 20-3, available at: www.1up.com/do/feature?cId=3141815 (accessed 20 October 2009).
-
(2005)
Computer Gaming World
, Issue.July/August
, pp. 20-23
-
-
Lee, J.1
-
24
-
-
84986009673
-
Building synergies between theory and practice: countering financial crime on a systemic approach
-
Nardo, M. (2006), “Building synergies between theory and practice: countering financial crime on a systemic approach”, Journal of Financial Crime, Vol. 13 No. 3.
-
(2006)
Journal of Financial Crime
, vol.13
, Issue.3
-
-
Nardo, M.1
-
25
-
-
85064710574
-
-
Counter Terrorist Financing, AML Newsletter, : (accessed 3 June 2011
-
Palmer, C. (2005), “A picture of terrorist financing”, Counter Terrorist Financing, AML Newsletter, December, available at: www.amlmagazine.com.au/amlwr/_assets/main/lib7006/a%20picture%20of%20terrorist%20financing_issue2_december05.pdf (accessed 3 June 2011).
-
(2005)
A picture of terrorist financing
-
-
Palmer, C.1
-
26
-
-
51149087062
-
Modelling multithreaded social protocols with colour petri-nets
-
Piccard, W. (2008), “Modelling multithreaded social protocols with colour petri-nets”, IFIP International Federation for Information Processing, No. 283, pp. 345-50.
-
(2008)
IFIP International Federation for Information Processing
, Issue.283
, pp. 345-350
-
-
Piccard, W.1
-
27
-
-
85064443467
-
-
accessed 15 June 2011
-
Rijock, K. (2007), “China's central bank will regulate virtual currency”, 13 January, available at: www.world-check.com/articles/2007/01/13/chinas-central-bank-will-regulate-virtual-currency/ (accessed 15 June 2011).
-
(2007)
China's central bank will regulate virtual currency
-
-
Rijock, K.1
-
30
-
-
0041939196
-
Shadow economies: size, causes, and consequences
-
Schneider, F. and Enste, D.H. (2000), “Shadow economies: size, causes, and consequences”, Journal of Economic Literature, Vol. 38, March, pp. 77-114.
-
(2000)
Journal of Economic Literature
, vol.38
, Issue.March
, pp. 77-114
-
-
Schneider, F.1
Enste, D.H.2
-
31
-
-
33750971678
-
-
International Monetary Fund, Washington, DC
-
Schott, P.A. (2006), Reference Guide to Anti-money Laundering and Combating the Financing of Terror, Terrorism Financing, International Monetary Fund, Washington, DC.
-
(2006)
Reference Guide to Anti-money Laundering and Combating the Financing of Terror, Terrorism Financing
-
-
Schott, P.A.1
-
32
-
-
38949154655
-
-
Trends & IssuesCrime and Criminal Justice Series, 342, AUSTRAC, August, : (accessed 18 May 2011).Australian Institute of Criminology, Canberra
-
Stamp, J. and Walker, J. (2007), “Money laundering in and through Australia, 2004”, Trends & Issues in Crime and Criminal Justice Series, No. 342, Australian Institute of Criminology, Canberra, AUSTRAC, August, available at: www.aic.gov.au/documents/6/4/2/%7B6427C6F9-BDE8-462E-A3AC-F68DB2C6505D%7Dtandi342.pdf (accessed 18 May 2011).
-
(2007)
Money laundering in and through Australia, 2004
-
-
Stamp, J.1
Walker, J.2
-
37
-
-
50249123627
-
-
Report for the Ministry of Finance, February, : (accessed 19 May 2011
-
Unger, B., Siegel, M., Ferwerda, J., de Kruijf, W., Busuioic, M., Wokke, K. and Rawlings, G. (2006), “The amounts and the effects of money laundering”, Report for the Ministry of Finance, February, available at: www.maurizioturco.it/bddb/2006_02_16_the_amounts_and_pdf (accessed 19 May 2011).
-
(2006)
The amounts and the effects of money laundering
-
-
Unger, B.1
Siegel, M.2
Ferwerda, J.3
de Kruijf, W.4
Busuioic, M.5
Wokke, K.6
Rawlings, G.7
-
38
-
-
85064607324
-
-
accessed 7 May 2011
-
University of Aarhus (2011), “Coloured petri nets at the University of Aarhus”, available at: http://daimi.au.dk/CPnets/proxy.php?url=/CPnets/index (accessed 7 May 2011).
-
(2011)
Coloured petri nets at the University of Aarhus
-
-
-
39
-
-
72249120693
-
-
Trends & IssuesCrime and Criminal Justice 72, August, : (accessed 1 May 2011).Australian Institute of Criminology, Canberra
-
Walker, J. (1997), “Estimates of the costs of crime in Australia in 1996”, Trends & Issues in Crime and Criminal Justice No. 72, Australian Institute of Criminology, Canberra, August, available at: www.aic.gov.au/documents/8/0/2/%7B802105A2-3DE8-4C42-A08B-0EC47AAF93D0%7Dti72.pdf (accessed 1 May 2011).
-
(1997)
Estimates of the costs of crime in Australia in 1996
-
-
Walker, J.1
-
40
-
-
85064693877
-
How big is global money laundering?
-
Walker, J. (1999), “How big is global money laundering?”, Journal of Money Laundering Control, Vol. 3 No. 1, pp. 25-37.
-
(1999)
Journal of Money Laundering Control
, vol.3
, Issue.1
, pp. 25-37
-
-
Walker, J.1
-
41
-
-
73649104422
-
Measuring global money laundering: “The Walker Gravity Model
-
Walker, J. and Unger, B. (2009), “Measuring global money laundering: “The Walker Gravity Model”, Review of Law & Economics, Vol. 5 No. 2, pp. 821-53.
-
(2009)
Review of Law & Economics
, vol.5
, Issue.2
, pp. 821-853
-
-
Walker, J.1
Unger, B.2
-
42
-
-
85064461092
-
-
Chapter 1, 30 March (accessed 25 May 2011
-
(The) WorldBank.org (2003), “Money laundering and terrorist financing: definitions and explanations”, Chapter 1, 30 March, available at: www1.worldbank.org/finance/assets/images/01-chap01-f.qxd.pdf (accessed 25 May 2011).
-
(2003)
Money laundering and terrorist financing: definitions and explanations
-
-
-
43
-
-
73649116715
-
Trade-based money laundering and terrorist financing
-
Zdanowicz, J.S. (2009), “Trade-based money laundering and terrorist financing”, Review of Law & Economics, Vol. 5 No. 2, p. 3.
-
(2009)
Review of Law & Economics
, vol.5
, Issue.2
, pp. 3
-
-
Zdanowicz, J.S.1
|