References
- Borgers, M.J. and Moors, J.A. (2007). Targeting the Proceeds of Crime: Bottlenecks in International Cooperation, European Journal of Crime, Criminal Law and Criminal Justice, 1–22.
- Elbashir, M.Z., Collier, P.A. and Davern, M.J. (2008). Measuring the effects of business intelligence systems: The relationship between business process and organizational performance, International Journal of Accounting Information Systems, 9, 135–153.
- Financial Intelligence Unit (2008). Annual Report, Norwegian National Authority for Investigation and Prosecution of Economic and Environmental Crime (Økokrim), Oslo, Norway.
- Gilsinan, J.F., Millar, J., Seitz, N., Fisher, J., Harshman, E., Islam, M. and Yeager, F. (2008). The role of private sector organizations in the control and policing of serious financial crime and abuse, Journal of Financial Crime, 15 (2), 111–123.
- Gottschalk, P. (2008). Stages of financial crime by business organizations, Journal of Financial Crime, 15 (1), 38–48.
- Hansen, L.L. (2009). Corporate financial crime: social diagnosis and treatment, Journal of Financial Crime, 16 (1), 28–40.
- Ilter, C. (2009). Fraudulent money transfers: a case from Turkey, Journal of Financial Crime, 16 (2), 125–136.
- Innes, M., Fielding, N. and Cope, N. (2005). The appliance of science: The theory and practice of crime intelligence analysis, British Journal of Criminology, 45, 39–57.
- Innes, M. and Sheptycki, J.W.E. (2004). From detection to disruption: Intelligence and the changing logic of police crime control in the United Kingdom, International Criminal Justice Review, 14, 1–24.
- Interpol (2009). Financial and high-tech crimes, International Criminal Police Organizaton (Interpol), 69006 Lyon, France, http://www.interpol.int/Public/FinancialCrime/Default.asp, retrieval July 3, 2009.
- Johnson, J. (2008). Is the global financial system AML/CFT prepared? Journal of Financial Crime, 15 (1), 7–21.
- Laudon, K.C. and Laudon, J.P. (2010). Management Information Systems: Managing the Digital Firm, Eleventh Edition, Pearson Education, London, UK.
- Lind, H., Hjelm, J. and Lind, M. (2007). Privacy surviving Data Retention in Europe? W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, www.w3.org.
- Michel, P. (2008). Financial crimes: the constant challenge of seeking effective prevention solutions, Journal of Financial Crime, 15 (4), 383–397.
- Pickett, K.H.S. and Picket, J.M. (2002). Financial Crime Investigation and Control. New York: John Wiley & Sons.
- Segell, G.M. (2007). Reform and transformation: The UK's serious organized crime agency, International Journal of Intelligence and CounterIntelligence, 20, 217–239.
- Srinivasa, K.G., Venugopal, K.R. og Patnaik, L.M. (2007). A self-adaptive migration modell genethic algorithm for data mining applications, Information Sciences, 177, 4295–4313.
- Stelfox, P. and Pease, K. (2005). Cognition and detection: reluctant bedfellows? In: Smith, M. and Tilley, N. (editors), Crime Science: New Approaches to Preventing and Detecting Crime, UK: Willan Publishing.
- Tellechea, A.F. (2008). Economic crimes in the capital markets, Journal of Financial Crime, 15 (2), 214–222.
- Toner, G.A. (2009). New ways of thinking about old crimes: Prosecuting corruption and organized criminal groups engaged in labor-management racketeering, Journal of Financial Crime, 16 (1), 41–59.
- Tong, S. (2007). Training the Effective Detective: Report of Recommendations, University of Cambridge. Author contact details: Dr Stephen Tong, Senior Lecturer in Policing, Canterbury Christ Church University, Kent, UK.
- Turoff, M., Walle, B. V. d., Chumer, M. and Yao, X. (2006). The Design of a Dynamic Emergency Response Management Information System (DERMIS), Annual Review of Network Management and Security, Volume 1, 101–121.
- Watkins, R.C., Reynolds, K.M., Demara, R., Georgiopoulos, M., Gonzalez, A. and Eaglin, R. (2003). Tracking dirty proceeds: exploring data mining technologies as tools to investigate money laundering, Police Practice and Research, 4 (2), 163–178.
- Williams, S. and Williams, N. (2003). The Business Value of Business Intelligence, Business Intelligence Journal, Fall, 30–39.