19.12.2016 Views

Cybercrime en witwassen

O%26B319_Volledige%20tekst_tcm28-228990

O%26B319_Volledige%20tekst_tcm28-228990

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Literatuur<br />

Akse, Th. (2003). En de kleur is vuil. Zoetermeer: KLPD.<br />

Angel, J.J., & McCabe, D. (2014). The ethics of paym<strong>en</strong>ts: Paper, plastic, or bitcoin?<br />

Journal of Business Ethics, (3), 603-611.<br />

Atzoria, L. Ierab, A., & Morabito, G. (2010). The internet of things: A survey.<br />

Computer Networks: The International Journal of Computer and Telecommunications<br />

Networking, (54), 2787-2805.<br />

Bal, A. (2013). Stateless virtual money in the tax system. European Taxation,<br />

7(53).<br />

Bauer, J., Eet<strong>en</strong>, M. van, Chattopadhyay, T., & Wu, B. (2008). ITU study on the<br />

financial aspects of network security: Malware and spam. G<strong>en</strong>ève: ITU.<br />

Baukema, J. (2013). Bitcoin: E<strong>en</strong> (ongereguleerd) betaalmiddel van de toekomst?<br />

Tijdschrift voor financieel recht, (12), 411-418.<br />

Berger, A.N., Molyneux, Ph., & Wilson, J.O.S. (2015). The Oxford handbook of<br />

banking. Oxford: Oxford University Press.<br />

Bernaards, F., Monsma, E., & Zinn, p. (2012). High tech crime: Criminaliteitsbeeldanalyse,<br />

Rotterdam: The Media C<strong>en</strong>tre.<br />

Bevington, P.R., & Robinson, D.K. (2003). Data reduction and error analysis.<br />

Boston: McGraw-Hill.<br />

Binsalleeh et al. (2010). On the analysis of the ZeuS Botnet Crimeware. In<br />

2010 Eighth Annual International Confer<strong>en</strong>ce on Privacy, Security and Trust<br />

(PST) (pp. 31-38). Geraadpleegd april 2016 via: http://ieeexplore.ieee.org/<br />

xpl/mostRec<strong>en</strong>tIssue.jsp?punumber=5564352<br />

Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of<br />

cli<strong>en</strong>ts in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC<br />

Confer<strong>en</strong>ce on Computer and Communications Security, ACM (pp. 15-29).<br />

New York: ACM.<br />

Boll<strong>en</strong>, R. (2012). The legal status of online curr<strong>en</strong>cies: Are bitcoins the<br />

future? Journal of Banking and Finance Law and Practice.<br />

Borgers, M.J., & Kooijmans, T. (2015), ‘Van probleem naar oplossing <strong>en</strong> weer<br />

terug. Het conceptwetsvoorstel aanpassing witwaswetgeving’, Delikt <strong>en</strong><br />

Delikw<strong>en</strong>t, 8(2), 57-74.<br />

Borgers, M.J. (2013), ‘Rechtsvorming door de Hoge Raad <strong>en</strong> de reikwijdte van<br />

de strafbaarstelling van witwass<strong>en</strong>’, Delikt <strong>en</strong> Delinkw<strong>en</strong>t, (5), 361-370.<br />

Bronk, C., Monk, C., & Villas<strong>en</strong>or, J. (2012). The dark side of cyber finance.<br />

Survival: Global Politics and Strategy, 54(2), 129-142.<br />

CBS (C<strong>en</strong>traal Bureau voor de Statistiek) (2012a). Kerncijfers wijk<strong>en</strong> <strong>en</strong> buurt<strong>en</strong><br />

2009-2012.<br />

CBS (C<strong>en</strong>traal Bureau voor de Statistiek) (2012b). Regionale spreiding van eersteg<strong>en</strong>eratieallochton<strong>en</strong><br />

<strong>en</strong> arbeidsmigrant<strong>en</strong> uit Midd<strong>en</strong>-, Oost- <strong>en</strong> Zuid-<br />

Europa.<br />

Chambers-Jones, C., & Hillman, H. (2014) Financial crime and gambling in a<br />

virtual world: A new frontier in cybercrime. Northhampton, MA: Edward<br />

Elger Publshing.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!