184
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Computer Information Systems in Financial Crime Investigations

&
Pages 41-49 | Received 01 Aug 2009, Accepted 22 Sep 2009, Published online: 11 Dec 2015

References

  • Borgers, M.J. and Moors, J.A. (2007). Targeting the Proceeds of Crime: Bottlenecks in International Cooperation, European Journal of Crime, Criminal Law and Criminal Justice, 1–22.
  • Elbashir, M.Z., Collier, P.A. and Davern, M.J. (2008). Measuring the effects of business intelligence systems: The relationship between business process and organizational performance, International Journal of Accounting Information Systems, 9, 135–153.
  • Financial Intelligence Unit (2008). Annual Report, Norwegian National Authority for Investigation and Prosecution of Economic and Environmental Crime (Økokrim), Oslo, Norway.
  • Gilsinan, J.F., Millar, J., Seitz, N., Fisher, J., Harshman, E., Islam, M. and Yeager, F. (2008). The role of private sector organizations in the control and policing of serious financial crime and abuse, Journal of Financial Crime, 15 (2), 111–123.
  • Gottschalk, P. (2008). Stages of financial crime by business organizations, Journal of Financial Crime, 15 (1), 38–48.
  • Hansen, L.L. (2009). Corporate financial crime: social diagnosis and treatment, Journal of Financial Crime, 16 (1), 28–40.
  • Ilter, C. (2009). Fraudulent money transfers: a case from Turkey, Journal of Financial Crime, 16 (2), 125–136.
  • Innes, M., Fielding, N. and Cope, N. (2005). The appliance of science: The theory and practice of crime intelligence analysis, British Journal of Criminology, 45, 39–57.
  • Innes, M. and Sheptycki, J.W.E. (2004). From detection to disruption: Intelligence and the changing logic of police crime control in the United Kingdom, International Criminal Justice Review, 14, 1–24.
  • Interpol (2009). Financial and high-tech crimes, International Criminal Police Organizaton (Interpol), 69006 Lyon, France, http://www.interpol.int/Public/FinancialCrime/Default.asp, retrieval July 3, 2009.
  • Johnson, J. (2008). Is the global financial system AML/CFT prepared? Journal of Financial Crime, 15 (1), 7–21.
  • Laudon, K.C. and Laudon, J.P. (2010). Management Information Systems: Managing the Digital Firm, Eleventh Edition, Pearson Education, London, UK.
  • Lind, H., Hjelm, J. and Lind, M. (2007). Privacy surviving Data Retention in Europe? W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, www.w3.org.
  • Michel, P. (2008). Financial crimes: the constant challenge of seeking effective prevention solutions, Journal of Financial Crime, 15 (4), 383–397.
  • Pickett, K.H.S. and Picket, J.M. (2002). Financial Crime Investigation and Control. New York: John Wiley & Sons.
  • Segell, G.M. (2007). Reform and transformation: The UK's serious organized crime agency, International Journal of Intelligence and CounterIntelligence, 20, 217–239.
  • Srinivasa, K.G., Venugopal, K.R. og Patnaik, L.M. (2007). A self-adaptive migration modell genethic algorithm for data mining applications, Information Sciences, 177, 4295–4313.
  • Stelfox, P. and Pease, K. (2005). Cognition and detection: reluctant bedfellows? In: Smith, M. and Tilley, N. (editors), Crime Science: New Approaches to Preventing and Detecting Crime, UK: Willan Publishing.
  • Tellechea, A.F. (2008). Economic crimes in the capital markets, Journal of Financial Crime, 15 (2), 214–222.
  • Toner, G.A. (2009). New ways of thinking about old crimes: Prosecuting corruption and organized criminal groups engaged in labor-management racketeering, Journal of Financial Crime, 16 (1), 41–59.
  • Tong, S. (2007). Training the Effective Detective: Report of Recommendations, University of Cambridge. Author contact details: Dr Stephen Tong, Senior Lecturer in Policing, Canterbury Christ Church University, Kent, UK.
  • Turoff, M., Walle, B. V. d., Chumer, M. and Yao, X. (2006). The Design of a Dynamic Emergency Response Management Information System (DERMIS), Annual Review of Network Management and Security, Volume 1, 101–121.
  • Watkins, R.C., Reynolds, K.M., Demara, R., Georgiopoulos, M., Gonzalez, A. and Eaglin, R. (2003). Tracking dirty proceeds: exploring data mining technologies as tools to investigate money laundering, Police Practice and Research, 4 (2), 163–178.
  • Williams, S. and Williams, N. (2003). The Business Value of Business Intelligence, Business Intelligence Journal, Fall, 30–39.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.