19.12.2016 Views

Cybercrime en witwassen

O%26B319_Volledige%20tekst_tcm28-228990

O%26B319_Volledige%20tekst_tcm28-228990

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

130 <strong>Cybercrime</strong> <strong>en</strong> witwass<strong>en</strong><br />

Charney, S. (1994). Computer crime: Law <strong>en</strong>forcem<strong>en</strong>t’s shift from a corporeal<br />

<strong>en</strong>vironm<strong>en</strong>t to the intangible, electronic world of cyberspace. Federal<br />

Bar News, 41(7), 489-494.<br />

Christopher, C.M. (2013). Whack-a-mole: Why prosecuting digital curr<strong>en</strong>cy<br />

exchanges won’t stop online laundering. Lewis & Clark Law Review, (18),<br />

1-36.<br />

Clough, J. (2010). Principles of cybercrime. Cambridge: Cambridge University<br />

Press 2010.<br />

Conings, C., & Oerlemans, J.J. (2013). Van e<strong>en</strong> netwerkzoeking naar online<br />

doorzoeking: Gr<strong>en</strong>zeloos of gr<strong>en</strong>sverlegg<strong>en</strong>d? Computerrecht, (1), 23-32.<br />

CSBN 4 (2014). Cyber Security Beeld Nederland 4. D<strong>en</strong> Haag: Nationaal Cyber<br />

Security C<strong>en</strong>trum.<br />

CSBN 5 (2015). Cyber Security Beeld Nederland 5. D<strong>en</strong> Haag: Nationaal Cyber<br />

Security C<strong>en</strong>trum.<br />

CSBN 6 (2016). Cyber Security Beeld Nederland 6. D<strong>en</strong> Haag: Nationaal Cyber<br />

Security C<strong>en</strong>trum.<br />

Custers, B.H.M. (2006). Risicoprofilering <strong>en</strong> id<strong>en</strong>tificatie van terreurfonds<strong>en</strong>.<br />

Banking Review, 28-33.<br />

Custers, B.H.M. (2007). Risk profiling of money laundering and terrorism funding:<br />

Practical problems of curr<strong>en</strong>t information strategies. Proceedings of<br />

the 9th International Confer<strong>en</strong>ce on Enterprise Information Systems. Portugal:<br />

Funchal.<br />

Cyber Threat Alliance (2015). Lucrative ransomware attacks: Analysis of the<br />

cryptowall version 3 threat.<br />

Davies, G. (2002). History of money: From anci<strong>en</strong>t times to the pres<strong>en</strong>t day.<br />

Cardiff: University of Wales Press.<br />

ETCF (Electronic Crimes Task Force) (2013). Projectdocum<strong>en</strong>t ‘Money mules’,<br />

Nationale politie <strong>en</strong> sam<strong>en</strong>werk<strong>en</strong>de Nederlandse bank<strong>en</strong>.<br />

Engelfriet, A.F. (2014). Ontwikkeling <strong>en</strong> recht: Waar gaat het he<strong>en</strong> met Bitcoin?<br />

Tijdschrift voor Internetrecht, 5.<br />

ECB (Europese C<strong>en</strong>trale Bank) (2012). Virtual curr<strong>en</strong>cy schemes. Frankfurt:<br />

Frankfurt am Main.<br />

ECB (Europese C<strong>en</strong>trale Bank) (2015). Virtual curr<strong>en</strong>cy schemes – a further<br />

analysis. Frankfurt: Frankfurt am Main.<br />

Europol (2014). The Internet Organised Crime Threat Assessm<strong>en</strong>t (iOCTA)<br />

2014. D<strong>en</strong> Haag: Europol Police Office.<br />

Europol (2015a). Why is cash still king? D<strong>en</strong> Haag: Europol Police Office.<br />

Europol (2015b). The internet organised crime threat assessm<strong>en</strong>t (iOCTA). D<strong>en</strong><br />

Haag: Europol Police Office.<br />

Europol (2015c). The future of organised crime report 2015. D<strong>en</strong> Haag: Europol<br />

Police Office.<br />

Europol (2016). An analysis of paym<strong>en</strong>t mechanisms used within cybercrime<br />

in the EU. D<strong>en</strong> Haag: Europol Police Office.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!