-
2
-
-
85064714621
-
-
accessed 22 August 2011
-
Belgian Financial Intelligence Processing Unit (2005), C.T.I.F.-C.F.I.: 12th Annual Report, available at: www.ctif-cfi.be/website/images/EN/annual_report/2005_ctif_cfi_en.pdf (accessed 22 August 2011).
-
(2005)
C.T.I.F.-C.F.I.: 12th Annual Report
-
-
-
3
-
-
84992996373
-
Methodological innovation and effective action: looking into synergies to countering economic crime
-
Biagioli, A. (2006), “Methodological innovation and effective action: looking into synergies to countering economic crime”, Journal of Financial Crime, Vol. 13 No. 3.
-
(2006)
Journal of Financial Crime
, vol.13
, Issue.3
-
-
Biagioli, A.1
-
4
-
-
85029263262
-
Financial crime as a threat to the wealth of nations: a cost-effectiveness approach
-
Biagioli, A. (2008), “Financial crime as a threat to the wealth of nations: a cost-effectiveness approach”, Journal of Money Laundering Control, Vol. 11 No. 1, p. 88.
-
(2008)
Journal of Money Laundering Control
, vol.11
, Issue.1
, pp. 88
-
-
Biagioli, A.1
-
5
-
-
84986047328
-
A crossroad in combating and preventing financial crime: looking for synergetic instruments for attack and prevention
-
Biagioli, A. and Nardo, M. (2007), “A crossroad in combating and preventing financial crime: looking for synergetic instruments for attack and prevention”, Journal of Financial Crime, Vol. 14 No. 2.
-
(2007)
Journal of Financial Crime
, vol.14
, Issue.2
-
-
Biagioli, A.1
Nardo, M.2
-
6
-
-
84962857593
-
Petri net script: a visual language for describing action, behaviour and plot
-
Blackwell, L, von Konsky, B. and Robey, M. (2001), “Petri net script: a visual language for describing action, behaviour and plot”, ACSC '01 Proceedings of the 24th Australasian conference on Computer Science, 29 January-4 February, pp. 29-37.
-
(2001)
ACSC '01 Proceedings of the 24th Australasian conference on Computer Science, 29 January-4 February
, pp. 29-37
-
-
Blackwell, L.1
von Konsky, B.2
Robey, M.3
-
7
-
-
69249215331
-
B2 model: a browsing behaviour model based on high-level Petri-nets to generate behavioural patterns for e-learning
-
Chang, Y.-C., Huang, Y.-C. and Chu, C.-P. (2009), “B2 model: a browsing behaviour model based on high-level Petri-nets to generate behavioural patterns for e-learning”, Expert Systems with Applications, Vol. 36, pp. 12423-40.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 12423-12440
-
-
Chang, Y.C.1
Huang, Y.C.2
Chu, C.P.3
-
8
-
-
46449097423
-
Criminal exploitation of online systems by organised crime groups
-
Choo, K.-K.R. and Smith, R.G. (2008), “Criminal exploitation of online systems by organised crime groups”, Springer Science, Asian Criminology, Vol. 3, pp. 37-59.
-
(2008)
Springer Science, Asian Criminology
, vol.3
, pp. 37-59
-
-
Choo, K.K.R.1
Smith, R.G.2
-
9
-
-
85064660550
-
-
accessed 22 August 2011
-
FATF-GAFI.org (2004), 9 Special Recommendations (SR) on Terrorist Financing (TF), 22 October, available at: www.fatf-gafi.org/document/9/0,3343,en_32250379_32236920_34032073_1_1_1_1,00.html (accessed 22 August 2011).
-
(2004)
9 Special Recommendations (SR) on Terrorist Financing (TF), 22 October
-
-
-
10
-
-
85064426485
-
-
accessed 23 August
-
FATF-GAFI.org (2011), How is Money Laundered?, available at: www.fatf-gafi.org/document/29/0,3746,en_32250379_32235720_33659613_1_1_1_1,00.html (accessed 23 August).
-
(2011)
How is Money Laundered?
-
-
-
11
-
-
84955363882
-
-
Occasional Paper Series 36, August 2009, Financial Services Authority, : (accessed 22 August 2011
-
Fleming, M.H. (2009), “FSA's scale & impact of financial crime project (phase one): critical analysis”, Occasional Paper Series 36, August 2009, Financial Services Authority, available at: www.fsa.gov.uk/pubs/other/critical_analysis.pdf (accessed 22 August 2011).
-
(2009)
FSA's scale & impact of financial crime project (phase one): critical analysis
-
-
Fleming, M.H.1
-
12
-
-
84858994469
-
-
accessed 22 August 2011).Financial Supervision Commission
-
FSC (2009), Money Laundering and the Financing of Terrorism, Financial Supervision Commission, available at: www.fsc.gov.im/aml/ (accessed 22 August 2011).
-
(2009)
Money Laundering and the Financing of Terrorism
-
-
-
13
-
-
67651180668
-
Knowledge-based anti-money laundering: a software agent bank application
-
Gao, S., Xu, D., Wang, H. and Green, P. (2009), “Knowledge-based anti-money laundering: a software agent bank application”, Journal of Knowledge Management, Vol. 13 No. 2.
-
(2009)
Journal of Knowledge Management
, vol.13
, Issue.2
-
-
Gao, S.1
Xu, D.2
Wang, H.3
Green, P.4
-
15
-
-
84960286889
-
-
accessed 22 August 2011).Australian Institute of Criminology, Griffith
-
Graycar, A. and Grabosky, P. (1996), Money Laundering in the 21st Century: Risks and Countermeasures, Australian Institute of Criminology, Griffith, available at: www.aic.gov.au/documents/D/D/E/%7BDDE3E02F-CF47-473D-8603-9DDC708CE4F4%7DRPP02.pdf (accessed 22 August 2011).
-
(1996)
Money Laundering in the 21st Century: Risks and Countermeasures
-
-
Graycar, A.1
Grabosky, P.2
-
16
-
-
84993077385
-
Banks governance and public-private partnership in preventing and confronting organized crime, corruption and terrorism financing
-
Hardouin, P. (2009), “Banks governance and public-private partnership in preventing and confronting organized crime, corruption and terrorism financing”, Journal of Financial Crime, Vol. 16 No. 3.
-
(2009)
Journal of Financial Crime
, vol.16
, Issue.3
-
-
Hardouin, P.1
-
18
-
-
38049034496
-
An agent based anti-money laundering system architecture for financial supervision
-
Liu, X. and Zhang, P. (2007), “An agent based anti-money laundering system architecture for financial supervision”, IEEE Wireless Communications, Networks and Mobile Computing, WiCom 2007, International Conference on 21-25 September, pp. 5472-5.
-
(2007)
IEEE Wireless Communications, Networks and Mobile Computing, WiCom 2007, International Conference on 21-25 September
, pp. 5472-5475
-
-
Liu, X.1
Zhang, P.2
-
19
-
-
51349087077
-
The art of information
-
Mueller, R.S. (2006), “The art of information”, Vital Speeches of the Day, Vol. 72 Nos 14/15, pp. 434-6.
-
(2006)
Vital Speeches of the Day
, vol.72
, Issue.14
, pp. 434-436
-
-
Mueller, R.S.1
-
20
-
-
84993028519
-
Mapping the trails of financial crime
-
Nardo, M. (2004), “Mapping the trails of financial crime”, Journal of Financial Crime, Vol. 12 No. 2, pp. 139-43.
-
(2004)
Journal of Financial Crime
, vol.12
, Issue.2
, pp. 139-143
-
-
Nardo, M.1
-
21
-
-
84986009673
-
Building synergies between theory and practice: countering financial crime on a systemic approach
-
Nardo, M. (2006), “Building synergies between theory and practice: countering financial crime on a systemic approach”, Journal of Financial Crime, Vol. 13 No. 3.
-
(2006)
Journal of Financial Crime
, vol.13
, Issue.3
-
-
Nardo, M.1
-
22
-
-
51349162664
-
The chess master's game: a model for incorporating local police agencies in the fight against global terrorism
-
O'Connell, P.E. (2008), “The chess master's game: a model for incorporating local police agencies in the fight against global terrorism”, Policing: An International Journal of Police Strategies & Management, Vol. 31 No. 3.
-
(2008)
Policing: An International Journal of Police Strategies & Management
, vol.31
, Issue.3
-
-
O'Connell, P.E.1
-
23
-
-
51149087062
-
Modelling multithreaded social protocols with colour Petri-nets
-
Springer, Boston, MA
-
Piccard, W. (2008), “Modelling multithreaded social protocols with colour Petri-nets”, IFIP International Federation for Information Processing, Springer, Boston, MA.
-
(2008)
IFIP International Federation for Information Processing
-
-
Piccard, W.1
-
24
-
-
85064607324
-
-
accessed 7 May
-
University of Aarhus (2011), Coloured Petri Nets at the University of Aarhus, available at: http://daimi.au.dk/CPnets/proxy.php?url=/CPnets/index (accessed 7 May).
-
(2011)
Coloured Petri Nets at the University of Aarhus
-
-
-
26
-
-
84885515261
-
-
accessed 11 July 2011
-
Wise, B.P., McDonald, M., Reuss, L.M. and Aronson, J. (2001), Task Order (TO) 69 – ATM Human Behaviour Modelling Approach Study, available at: www.asc.nasa.gov/aatt/rto/RTOFinal69.pdf (accessed 11 July 2011).
-
(2001)
Task Order (TO) 69 – ATM Human Behaviour Modelling Approach Study
-
-
Wise, B.P.1
McDonald, M.2
Reuss, L.M.3
Aronson, J.4
-
27
-
-
85064461092
-
-
Chapter 1, 30 March (accessed 22 August 2011
-
WorldBank.org (2003), Money Laundering and Terrorist Financing: Definitions and Explanations, Chapter 1, 30 March, available at: www1.worldbank.org/finance/assets/images/01-chap01-f.qxd.pdf (accessed 22 August 2011).
-
(2003)
Money Laundering and Terrorist Financing: Definitions and Explanations
-
-
|