Legal Principles for Combatting Cyberlaundering.

By: Leslie, Daniel AdeoyéMaterial type: TextTextSeries: eBooks on DemandLaw, Governance and Technology Series: Publisher: Dordrecht : Springer, 2014Description: 1 online resource (377 p.)ISBN: 9783319064161Subject(s): Computer crimes | Computers -- Law and legislation | Internet -- Law and legislationGenre/Form: Electronic books.Additional physical formats: Print version:: Legal Principles for Combatting CyberlaunderingDDC classification: 345.0268 | 346.73070264 LOC classification: KD667 .C65Online resources: Click here to view this ebook.
Contents:
Foreword ; Preface ; Acknowledgments; Contents; Chapter-1; Introduction, Money Laundering and Cyber crime; 1.1 Epistemological Basis of Study; 1.2 Significance of Study; 1.2.1 The Problem of Cyberlaundering: A Legal Concern; 1.2.2 The Non-Existence of a Proper ACL Legal Regime; 1.3 Parameters of Study; 1.4 Money Laundering: An Overview; 1.4.1 Understanding the Meaning of Money Laundering; 1.4.2 The History and Evolution of the Anti-Money Laundering Legal Regime; 1.4.3 The Process of Money Laundering; 1.4.4 Money Laundering Techniques
1.4.5 Money Laundering and Rising Challenges: Impact and Weight of the Problem1.5 An Introduction to Cyber crime: The 'Cyber Root' of Cyberlaundering; 1.5.1 Understanding the Term 'Cybercrime'; 1.5.2 The Evolution of Cybercrime in Brief; 1.5.3 The Present State of the Anti-Cybercrime Legal Regime: An Overview; 1.6 Evaluation; References; Chapter-2; Cyberlaundering: Concept & Practice; 2.1 Deciphering Cyberlaundering; 2.1.1 The Meaning of Cyberlaundering; 2.1.2 Catalysts of the Cyberlaundering Dilemma; 2.1.3 Categorizing Cyberlaundering; 2.2 Electronic Payment Systems: New Tools for Laundering
2.2.1 The Concept of Illegal Electronic Money2.2.2 Models of E-Payment Systems; 2.2.3 Storing Methods and Examples of Electronic Money; 2.3 Cyberlaundering and the Three-Pronged Process; 2.3.1 Placement; 2.3.2 Layering; 2.3.3 Integration; 2.4 Vulnerable Industries and Techniques of Cyberlaundering; 2.4.1 Online Banking; 2.4.2 Online Auctioneering; 2.4.3 Online Gambling; 2.4.4 Online Barter Trade; 2.4.5 Virtual Worlds; 2.5 What the Future Holds for Cyberlaundering; 2.6 Evaluation; References; 3.1 An Overview of the Current Anti-Money Laundering Regime; Chapter-3
The Present International and National Legal Framework Against Cyberlaundering3.1.1 General; 3.1.2 Pillar 1: Prevention; 3.1.3 Pillar 2: Enforcement; 3.1.4 Pillar 3: Compliance; 3.2 The ACL Legal Regime: A Survey of Existing Relevant Laws, Policies and Initiatives; 3.2.1 Present International Legal Framework Against Cyberlaundering; 3.2.2 Present National Legal Framework for Cyberlaundering; 3.3 Evaluation; References; Chapter-4; Regulating Cyberlaundering; 4.1 Rationale for Regulation; 4.2 Regulatory Issues and Challenges; 4.3 An Adaptive Approach to Regulating Cyberlaundering
4.4 Prevention Pillar for the ACL Legal Regime4.4.1 Threshold Factor: Conceptualizing Cyberlaundering Legally; 4.4.2 General Preventive Measures Against Cyberlaundering; 4.4.3 Target Approach to Cyberlaundering Regulation; 4.5 Compliance Pillar for the ACL Legal Regime; 4.5.1 Duty to Comply; 4.5.2 Duty to Ensure Compliance; 4.6 Evaluation; References; 5.1 Path to Prosecuting Cyberlaundering: Issues and Challenges; Chapter-5; Prosecuting Cyberlaundering; 5.1.1 Practical and Logistic Challenges; 5.1.2 The Right to Privacy; 5.1.3 Electronic Evidence and the Question of Admissibility
5.2 Investigating Cyberlaundering
Summary: This volume deals with the very novel issue of cyber laundering. The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem. As a growing practice in these modern times, and manifesting through technological innovations, cyber laundering is the birth child of money laundering and cybercrime. It concerns how the internet is used for 'washing' illicit proceeds of crime. In addition to exploring the meaning and ambits
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
KD667 .C65 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1782934 Available EBL1782934

Foreword ; Preface ; Acknowledgments; Contents; Chapter-1; Introduction, Money Laundering and Cyber crime; 1.1 Epistemological Basis of Study; 1.2 Significance of Study; 1.2.1 The Problem of Cyberlaundering: A Legal Concern; 1.2.2 The Non-Existence of a Proper ACL Legal Regime; 1.3 Parameters of Study; 1.4 Money Laundering: An Overview; 1.4.1 Understanding the Meaning of Money Laundering; 1.4.2 The History and Evolution of the Anti-Money Laundering Legal Regime; 1.4.3 The Process of Money Laundering; 1.4.4 Money Laundering Techniques

1.4.5 Money Laundering and Rising Challenges: Impact and Weight of the Problem1.5 An Introduction to Cyber crime: The 'Cyber Root' of Cyberlaundering; 1.5.1 Understanding the Term 'Cybercrime'; 1.5.2 The Evolution of Cybercrime in Brief; 1.5.3 The Present State of the Anti-Cybercrime Legal Regime: An Overview; 1.6 Evaluation; References; Chapter-2; Cyberlaundering: Concept & Practice; 2.1 Deciphering Cyberlaundering; 2.1.1 The Meaning of Cyberlaundering; 2.1.2 Catalysts of the Cyberlaundering Dilemma; 2.1.3 Categorizing Cyberlaundering; 2.2 Electronic Payment Systems: New Tools for Laundering

2.2.1 The Concept of Illegal Electronic Money2.2.2 Models of E-Payment Systems; 2.2.3 Storing Methods and Examples of Electronic Money; 2.3 Cyberlaundering and the Three-Pronged Process; 2.3.1 Placement; 2.3.2 Layering; 2.3.3 Integration; 2.4 Vulnerable Industries and Techniques of Cyberlaundering; 2.4.1 Online Banking; 2.4.2 Online Auctioneering; 2.4.3 Online Gambling; 2.4.4 Online Barter Trade; 2.4.5 Virtual Worlds; 2.5 What the Future Holds for Cyberlaundering; 2.6 Evaluation; References; 3.1 An Overview of the Current Anti-Money Laundering Regime; Chapter-3

The Present International and National Legal Framework Against Cyberlaundering3.1.1 General; 3.1.2 Pillar 1: Prevention; 3.1.3 Pillar 2: Enforcement; 3.1.4 Pillar 3: Compliance; 3.2 The ACL Legal Regime: A Survey of Existing Relevant Laws, Policies and Initiatives; 3.2.1 Present International Legal Framework Against Cyberlaundering; 3.2.2 Present National Legal Framework for Cyberlaundering; 3.3 Evaluation; References; Chapter-4; Regulating Cyberlaundering; 4.1 Rationale for Regulation; 4.2 Regulatory Issues and Challenges; 4.3 An Adaptive Approach to Regulating Cyberlaundering

4.4 Prevention Pillar for the ACL Legal Regime4.4.1 Threshold Factor: Conceptualizing Cyberlaundering Legally; 4.4.2 General Preventive Measures Against Cyberlaundering; 4.4.3 Target Approach to Cyberlaundering Regulation; 4.5 Compliance Pillar for the ACL Legal Regime; 4.5.1 Duty to Comply; 4.5.2 Duty to Ensure Compliance; 4.6 Evaluation; References; 5.1 Path to Prosecuting Cyberlaundering: Issues and Challenges; Chapter-5; Prosecuting Cyberlaundering; 5.1.1 Practical and Logistic Challenges; 5.1.2 The Right to Privacy; 5.1.3 Electronic Evidence and the Question of Admissibility

5.2 Investigating Cyberlaundering

This volume deals with the very novel issue of cyber laundering. The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem. As a growing practice in these modern times, and manifesting through technological innovations, cyber laundering is the birth child of money laundering and cybercrime. It concerns how the internet is used for 'washing' illicit proceeds of crime. In addition to exploring the meaning and ambits

Description based upon print version of record.

There are no comments on this title.

to post a comment.