Cybercrime en witwassen
O%26B319_Volledige%20tekst_tcm28-228990
O%26B319_Volledige%20tekst_tcm28-228990
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
130 <strong>Cybercrime</strong> <strong>en</strong> witwass<strong>en</strong><br />
Charney, S. (1994). Computer crime: Law <strong>en</strong>forcem<strong>en</strong>t’s shift from a corporeal<br />
<strong>en</strong>vironm<strong>en</strong>t to the intangible, electronic world of cyberspace. Federal<br />
Bar News, 41(7), 489-494.<br />
Christopher, C.M. (2013). Whack-a-mole: Why prosecuting digital curr<strong>en</strong>cy<br />
exchanges won’t stop online laundering. Lewis & Clark Law Review, (18),<br />
1-36.<br />
Clough, J. (2010). Principles of cybercrime. Cambridge: Cambridge University<br />
Press 2010.<br />
Conings, C., & Oerlemans, J.J. (2013). Van e<strong>en</strong> netwerkzoeking naar online<br />
doorzoeking: Gr<strong>en</strong>zeloos of gr<strong>en</strong>sverlegg<strong>en</strong>d? Computerrecht, (1), 23-32.<br />
CSBN 4 (2014). Cyber Security Beeld Nederland 4. D<strong>en</strong> Haag: Nationaal Cyber<br />
Security C<strong>en</strong>trum.<br />
CSBN 5 (2015). Cyber Security Beeld Nederland 5. D<strong>en</strong> Haag: Nationaal Cyber<br />
Security C<strong>en</strong>trum.<br />
CSBN 6 (2016). Cyber Security Beeld Nederland 6. D<strong>en</strong> Haag: Nationaal Cyber<br />
Security C<strong>en</strong>trum.<br />
Custers, B.H.M. (2006). Risicoprofilering <strong>en</strong> id<strong>en</strong>tificatie van terreurfonds<strong>en</strong>.<br />
Banking Review, 28-33.<br />
Custers, B.H.M. (2007). Risk profiling of money laundering and terrorism funding:<br />
Practical problems of curr<strong>en</strong>t information strategies. Proceedings of<br />
the 9th International Confer<strong>en</strong>ce on Enterprise Information Systems. Portugal:<br />
Funchal.<br />
Cyber Threat Alliance (2015). Lucrative ransomware attacks: Analysis of the<br />
cryptowall version 3 threat.<br />
Davies, G. (2002). History of money: From anci<strong>en</strong>t times to the pres<strong>en</strong>t day.<br />
Cardiff: University of Wales Press.<br />
ETCF (Electronic Crimes Task Force) (2013). Projectdocum<strong>en</strong>t ‘Money mules’,<br />
Nationale politie <strong>en</strong> sam<strong>en</strong>werk<strong>en</strong>de Nederlandse bank<strong>en</strong>.<br />
Engelfriet, A.F. (2014). Ontwikkeling <strong>en</strong> recht: Waar gaat het he<strong>en</strong> met Bitcoin?<br />
Tijdschrift voor Internetrecht, 5.<br />
ECB (Europese C<strong>en</strong>trale Bank) (2012). Virtual curr<strong>en</strong>cy schemes. Frankfurt:<br />
Frankfurt am Main.<br />
ECB (Europese C<strong>en</strong>trale Bank) (2015). Virtual curr<strong>en</strong>cy schemes – a further<br />
analysis. Frankfurt: Frankfurt am Main.<br />
Europol (2014). The Internet Organised Crime Threat Assessm<strong>en</strong>t (iOCTA)<br />
2014. D<strong>en</strong> Haag: Europol Police Office.<br />
Europol (2015a). Why is cash still king? D<strong>en</strong> Haag: Europol Police Office.<br />
Europol (2015b). The internet organised crime threat assessm<strong>en</strong>t (iOCTA). D<strong>en</strong><br />
Haag: Europol Police Office.<br />
Europol (2015c). The future of organised crime report 2015. D<strong>en</strong> Haag: Europol<br />
Police Office.<br />
Europol (2016). An analysis of paym<strong>en</strong>t mechanisms used within cybercrime<br />
in the EU. D<strong>en</strong> Haag: Europol Police Office.