메뉴 건너뛰기




Volumn 15, Issue 3, 2012, Pages 316-335

Modelling of money laundering and terrorism financing typologies

Author keywords

Anti money laundering counter terrorism financing; Collaborative information sharing; Entity relationship modelling; Financing; Knowledge management; Modelling; Money laundering; Terrorism; Virtual environments

Indexed keywords


EID: 85064703175     PISSN: 13685201     EISSN: 17587808     Source Type: Journal    
DOI: 10.1108/13685201211238061     Document Type: Article
Times cited : (22)

References (27)
  • 2
    • 85064714621 scopus 로고    scopus 로고
    • accessed 22 August 2011
    • Belgian Financial Intelligence Processing Unit (2005), C.T.I.F.-C.F.I.: 12th Annual Report, available at: www.ctif-cfi.be/website/images/EN/annual_report/2005_ctif_cfi_en.pdf (accessed 22 August 2011).
    • (2005) C.T.I.F.-C.F.I.: 12th Annual Report
  • 3
    • 84992996373 scopus 로고    scopus 로고
    • Methodological innovation and effective action: looking into synergies to countering economic crime
    • Biagioli, A. (2006), “Methodological innovation and effective action: looking into synergies to countering economic crime”, Journal of Financial Crime, Vol. 13 No. 3.
    • (2006) Journal of Financial Crime , vol.13 , Issue.3
    • Biagioli, A.1
  • 4
    • 85029263262 scopus 로고    scopus 로고
    • Financial crime as a threat to the wealth of nations: a cost-effectiveness approach
    • Biagioli, A. (2008), “Financial crime as a threat to the wealth of nations: a cost-effectiveness approach”, Journal of Money Laundering Control, Vol. 11 No. 1, p. 88.
    • (2008) Journal of Money Laundering Control , vol.11 , Issue.1 , pp. 88
    • Biagioli, A.1
  • 5
    • 84986047328 scopus 로고    scopus 로고
    • A crossroad in combating and preventing financial crime: looking for synergetic instruments for attack and prevention
    • Biagioli, A. and Nardo, M. (2007), “A crossroad in combating and preventing financial crime: looking for synergetic instruments for attack and prevention”, Journal of Financial Crime, Vol. 14 No. 2.
    • (2007) Journal of Financial Crime , vol.14 , Issue.2
    • Biagioli, A.1    Nardo, M.2
  • 7
    • 69249215331 scopus 로고    scopus 로고
    • B2 model: a browsing behaviour model based on high-level Petri-nets to generate behavioural patterns for e-learning
    • Chang, Y.-C., Huang, Y.-C. and Chu, C.-P. (2009), “B2 model: a browsing behaviour model based on high-level Petri-nets to generate behavioural patterns for e-learning”, Expert Systems with Applications, Vol. 36, pp. 12423-40.
    • (2009) Expert Systems with Applications , vol.36 , pp. 12423-12440
    • Chang, Y.C.1    Huang, Y.C.2    Chu, C.P.3
  • 8
    • 46449097423 scopus 로고    scopus 로고
    • Criminal exploitation of online systems by organised crime groups
    • Choo, K.-K.R. and Smith, R.G. (2008), “Criminal exploitation of online systems by organised crime groups”, Springer Science, Asian Criminology, Vol. 3, pp. 37-59.
    • (2008) Springer Science, Asian Criminology , vol.3 , pp. 37-59
    • Choo, K.K.R.1    Smith, R.G.2
  • 10
    • 85064426485 scopus 로고    scopus 로고
    • accessed 23 August
    • FATF-GAFI.org (2011), How is Money Laundered?, available at: www.fatf-gafi.org/document/29/0,3746,en_32250379_32235720_33659613_1_1_1_1,00.html (accessed 23 August).
    • (2011) How is Money Laundered?
  • 11
    • 84955363882 scopus 로고    scopus 로고
    • Occasional Paper Series 36, August 2009, Financial Services Authority, : (accessed 22 August 2011
    • Fleming, M.H. (2009), “FSA's scale & impact of financial crime project (phase one): critical analysis”, Occasional Paper Series 36, August 2009, Financial Services Authority, available at: www.fsa.gov.uk/pubs/other/critical_analysis.pdf (accessed 22 August 2011).
    • (2009) FSA's scale & impact of financial crime project (phase one): critical analysis
    • Fleming, M.H.1
  • 12
    • 84858994469 scopus 로고    scopus 로고
    • accessed 22 August 2011).Financial Supervision Commission
    • FSC (2009), Money Laundering and the Financing of Terrorism, Financial Supervision Commission, available at: www.fsc.gov.im/aml/ (accessed 22 August 2011).
    • (2009) Money Laundering and the Financing of Terrorism
  • 13
    • 67651180668 scopus 로고    scopus 로고
    • Knowledge-based anti-money laundering: a software agent bank application
    • Gao, S., Xu, D., Wang, H. and Green, P. (2009), “Knowledge-based anti-money laundering: a software agent bank application”, Journal of Knowledge Management, Vol. 13 No. 2.
    • (2009) Journal of Knowledge Management , vol.13 , Issue.2
    • Gao, S.1    Xu, D.2    Wang, H.3    Green, P.4
  • 15
    • 84960286889 scopus 로고    scopus 로고
    • accessed 22 August 2011).Australian Institute of Criminology, Griffith
    • Graycar, A. and Grabosky, P. (1996), Money Laundering in the 21st Century: Risks and Countermeasures, Australian Institute of Criminology, Griffith, available at: www.aic.gov.au/documents/D/D/E/%7BDDE3E02F-CF47-473D-8603-9DDC708CE4F4%7DRPP02.pdf (accessed 22 August 2011).
    • (1996) Money Laundering in the 21st Century: Risks and Countermeasures
    • Graycar, A.1    Grabosky, P.2
  • 16
    • 84993077385 scopus 로고    scopus 로고
    • Banks governance and public-private partnership in preventing and confronting organized crime, corruption and terrorism financing
    • Hardouin, P. (2009), “Banks governance and public-private partnership in preventing and confronting organized crime, corruption and terrorism financing”, Journal of Financial Crime, Vol. 16 No. 3.
    • (2009) Journal of Financial Crime , vol.16 , Issue.3
    • Hardouin, P.1
  • 19
    • 51349087077 scopus 로고    scopus 로고
    • The art of information
    • Mueller, R.S. (2006), “The art of information”, Vital Speeches of the Day, Vol. 72 Nos 14/15, pp. 434-6.
    • (2006) Vital Speeches of the Day , vol.72 , Issue.14 , pp. 434-436
    • Mueller, R.S.1
  • 20
    • 84993028519 scopus 로고    scopus 로고
    • Mapping the trails of financial crime
    • Nardo, M. (2004), “Mapping the trails of financial crime”, Journal of Financial Crime, Vol. 12 No. 2, pp. 139-43.
    • (2004) Journal of Financial Crime , vol.12 , Issue.2 , pp. 139-143
    • Nardo, M.1
  • 21
    • 84986009673 scopus 로고    scopus 로고
    • Building synergies between theory and practice: countering financial crime on a systemic approach
    • Nardo, M. (2006), “Building synergies between theory and practice: countering financial crime on a systemic approach”, Journal of Financial Crime, Vol. 13 No. 3.
    • (2006) Journal of Financial Crime , vol.13 , Issue.3
    • Nardo, M.1
  • 22
    • 51349162664 scopus 로고    scopus 로고
    • The chess master's game: a model for incorporating local police agencies in the fight against global terrorism
    • O'Connell, P.E. (2008), “The chess master's game: a model for incorporating local police agencies in the fight against global terrorism”, Policing: An International Journal of Police Strategies & Management, Vol. 31 No. 3.
    • (2008) Policing: An International Journal of Police Strategies & Management , vol.31 , Issue.3
    • O'Connell, P.E.1
  • 23
    • 51149087062 scopus 로고    scopus 로고
    • Modelling multithreaded social protocols with colour Petri-nets
    • Springer, Boston, MA
    • Piccard, W. (2008), “Modelling multithreaded social protocols with colour Petri-nets”, IFIP International Federation for Information Processing, Springer, Boston, MA.
    • (2008) IFIP International Federation for Information Processing
    • Piccard, W.1
  • 24
    • 85064607324 scopus 로고    scopus 로고
    • accessed 7 May
    • University of Aarhus (2011), Coloured Petri Nets at the University of Aarhus, available at: http://daimi.au.dk/CPnets/proxy.php?url=/CPnets/index (accessed 7 May).
    • (2011) Coloured Petri Nets at the University of Aarhus
  • 27


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.