Cybercrime en witwassen
O%26B319_Volledige%20tekst_tcm28-228990
O%26B319_Volledige%20tekst_tcm28-228990
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
132 <strong>Cybercrime</strong> <strong>en</strong> witwass<strong>en</strong><br />
Leeuw<strong>en</strong>, D.J. van (2011). Witwass<strong>en</strong> naar Nederlands recht: Over voorhand<strong>en</strong><br />
hebb<strong>en</strong> <strong>en</strong> het bewijs van witwass<strong>en</strong>. Delikt <strong>en</strong> Delikw<strong>en</strong>t, 41(3),<br />
297-326.<br />
Marian, O.Y. (2013). Are cryptocurr<strong>en</strong>cies ‘super’ tax hav<strong>en</strong>s? Michigan Law<br />
Review First Impressions, 38, 38-48.<br />
Maurtiz H. (2014). De aard <strong>en</strong> omvang van Money Muling: Fraude met internetbankier<strong>en</strong><br />
<strong>en</strong> witwass<strong>en</strong>. Scriptie, uitgevoerd voor de Nationale Politie.<br />
Meiklejohn, S., Pomarole, M., Jordan, G., Levch<strong>en</strong>ko, K., McCoy, D., Voelker,<br />
G., & Savage, S. (2013). A fistful of bitcoins: Characterising paym<strong>en</strong>ts<br />
among m<strong>en</strong> with no names. Proceedings of the 2013 confer<strong>en</strong>ce on Internet<br />
measurem<strong>en</strong>t confer<strong>en</strong>ce, ACM, 127-140.<br />
Möser, M., Böhme, R., & Breuker, D. (2013). An inquiry into money laundering<br />
tools in the bitcoin ecosystem. Proceedings of the 2013 e Crime<br />
Researches Summit, 1-14.<br />
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin.org.<br />
Odinot, G., Verhoev<strong>en</strong>, M.A., Pool, R.L.D. & Poot, C.J. de (2017). <strong>Cybercrime</strong>,<br />
Organised Crime and Organised <strong>Cybercrime</strong> in the Netherlands. Empirical<br />
Findings and Implications for Law Enforcem<strong>en</strong>t. D<strong>en</strong> Haag: WODC (in<br />
voorbereiding).<br />
Parker, D.B. (1976). Crime by computer. New York: Scribner.<br />
Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system.<br />
Security and privacy in social networks, 197-223.<br />
Richet, J.L. (2013). Laundering Money Online: A review of cybercriminals<br />
methods. arXiv preprint arXiv:1310.2368.<br />
Ron, D., & Shamir, A. (2013). Quantitative analysis of the full bitcoin transaction<br />
graph. Financial cryptography and data security, 7859, 6-24.<br />
Rozemeijer, J.P. (2015). Witwasonderzoek<strong>en</strong> zonder aantoonbaar gronddelict:<br />
Het rechterlijk toetsingskader <strong>en</strong> efficiënt opspor<strong>en</strong> in zes stapp<strong>en</strong>.<br />
Justitiële verk<strong>en</strong>ning<strong>en</strong>, 41(1), 24-39.<br />
Sandee, M. (2015). Game over Zeus: Background on the Badguys and Back<strong>en</strong>ds.<br />
Whitepaper for the U.S. Blackhat confer<strong>en</strong>ce 2015.<br />
Schermer, B.W., Marbus, R., Gerding, R., & Van Kester<strong>en</strong>, S. (2008). Gaming:<br />
Meer dan e<strong>en</strong> spelletje. E<strong>en</strong> onderzoek naar de economische, juridische <strong>en</strong><br />
maatschappelijke aspect<strong>en</strong> van computerspell<strong>en</strong> <strong>en</strong> online wereld<strong>en</strong> in<br />
Nederland. Leidsch<strong>en</strong>dam: ECP Platform voor de Sam<strong>en</strong>leving.<br />
Seto, T.P. (2009). Wh<strong>en</strong> is a game only a game? The taxation of virtual worlds.<br />
University of Cincinatti Law Review, 77, 1027-1040.<br />
Si<strong>en</strong>kiewiz, S.J. (2007). Prepaid cards: Vulnerable to money laundering? Federal<br />
Reserve Bank of Philadelphia Paym<strong>en</strong>t Card Discussion Paper, 7.<br />
Singh, S.K. (2009). Banking Regulation. New Delhi: Discovery Publishing<br />
House.<br />
Soudijn, M.R.J., & Akse, T. (2012). Witwass<strong>en</strong>: Criminaliteitsbeeldanalyse<br />
2012. Drieberg<strong>en</strong>: KLPD.