Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits
Tóm tắt
Từ khóa
Tài liệu tham khảo
ACFE. (2018). Report to the nations.global study on occupational fraud and abuse (p. 80). Austin, TX: Association of Certified Fraud Examiners.
BCC. (2008). The invisible crime: A business crime survey (p. 28). London, UK: British Chambre of Commerce.
Beasley, M. S., Carcello, J. V., Hermanson, D. R., et al. (2000). Fraudulent financial reporting: Consideration of industry traits and corporate governance mechanisms. Accounting Horizons,14, 441–454.
Beauregard, E., Rossmo, K., & Proulx, J. (2007). A descriptive model of the hunting process of serial sex offenders: A rational choice approach. Journal of Family Violence,22(6), 449–463.
Benson, M. L., Madensen, T. D., & Eck, J. E. (2009). White-collar crime from an opportunity perspective. New York: Springer.
Bloem, B. (2012). Horizontale fraude in kaart. Het tijdschrift voor de politie,75, 30–34.
Brenner, S. W., & Schwerha, J. J. (2001). Transnational evidence gathering and local prosecution of international cybercrime. J Marshall J Computer & Info L.,20, 347.
Broadhurst, R., Bouhours, B., & Bouhours, T. (2013). Business and The Risk of Crime in China. British Journal of Criminology,53, 276–296.
Brown, C. S. (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology,9, 55.
Brunet, J. R. (2002). Discouragement of crime through civil remedies: An application of a reformulated routine activities theory. Western Criminology Review,4, 68.
Button M, Lewis C and Tapley J. (2009) Fraud typologies and the victims of fraud. Literature review. London, UK: University of Portsmouth. Centre for Counter Fraud Studies, Institute of Criminal Justice Studies. National Fraud Authority.
Clarke RV and Eck JE. (2005) Crime Analysis for Problem Solvers in 60 Small Steps. Washington D.C.: U.S. Department of Justice, Office of Community Oriented Policing Services, 150.
Cohen, L. E., & Felson, M. (1979). Social-change and crime rate trends - routine activity approach. American Sociological Review,44, 588–608.
Cohn, E. G., & Rotton, J. (2000). Weather, seasonal trends and property crimes in Minneapolis, 1987–1988. A moderator-variable time-series analysis of routine activities. Journal of Environmental Psychology,20, 257–272.
Consumer organisation. (2020) Transfering money abroad. https://www.consumentenbond.nl/betaalrekening/geld-overmaken-naar-buitenland.
Coopers, P. W. (2014). 2014 Information security breaches survey. Technical report. London: Price Waterhouse Coopers.
Coopers PW (2018) Pulling fraud out of the shadows. Global Economic Crime and Fraud Survey 2018. USA.
Cornish DB. (1993) Crimes as scripts. In: Zahm D and Cromwell P (eds) Proceedings of the international seminar on environmental criminology and crime analysis. Coral Gables, Florida: Florida Criminal Justice Executive Institute Tallahassee, FL., 30-45.
Cornish, D. B., & Clarke, R. V. (2008). Rational choice perspective. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis. Willan: Abingdon, UK.
Cornish DB and Clarke RV. (2014) The reasoning criminal: Rational choice perspectives on offending: Transaction Publishers.
Cornish, D. B., & Clarke, R. V. (2017). The reasoning criminal: Rational choice perspectives on offending. Environmental criminology and crime analysis (pp. 29–61). Taylor & Francis Group: Abingdon.
Cressey, D. R. (1964). Delinquency, crime and differential association. The Hague, Nl.: Martinus Nijhoff.
Cromwell, P., & Olson, J. N. (2006). The Reasoning Burglar: Motives and Decision-Making Strategies. New York: Roxbury Publishing.
Deevy M and Beals ME. (2013) The scope of the problem an overview of fraud prevalence measurement. Stanford, CA: Fraud Research Center. Retrieved from: http://fraudresearchcenter.org/wp-content/uploads/2013/11/Scope-of-the-Problem-FINAL.pdf, 46.
Deevy M, Lucich S and Beals ME. (2012) Scams, schemes & swindles. A review of consumer financial fraud research. Stanford, CA: Fraud Research Center, 47.
Dehghanniri H, Borrion H. (2019) Crime scripting: a systematic review. European Journal of Criminology.
Dorminey, J., Fleming, A. S., Kranacher, M.-J., et al. (2012). The evolution of fraud theory. Issues in Accounting Education,27, 555–579.
Eggen ATJ and Kalidien SN. (2008) Criminaliteit en rechtshandhaving 2007. Ontwikkelingen en Samenhangen. Den Haag, Nl.: Boom, WODC, Ministerie van Jusitie, CBS.
EUROPOL. (2018). Click here and see how your money disappears—criminal #cyberscams of the 21st century. The Hague: EUROPOL.
EUROPOL. (2020) Money Muling. https://www.europol.europa.eu/crime-areas-and-trends/crime-areas/forgery-of-money-and-means-of-payment/money-muling.
EUROSTAT. (2008) Statistical Classification of Economic Activities in the European Community, Rev. 2 (2008). http://ec.europa.eu/eurostat/documents/3859598/5902521/KS-RA-07-015-EN.PDF.
Falk, G. J. (1952). The influence of the seasons on the crime rate. Journal of Criminal Law and Criminology & Police Science,43, 199.
Felson, M. (1995). Those who discourage crime. In R. V. Clarke (Ed.), Crime prevention studies (pp. 53–66). Monsey, NY: Criminal Justice Press.
Felson M. (2017) Linking criminal choices, routine activities, informal control, and criminal outcomes. The reasoning criminal. Routledge, 119–128.
Financial Intelligence Group. (2017) From suspicion to action. Converting financial intelligence into greater operational impact. In: EUROPOL (ed). Luxembourg, Lux.: European Union, Publications Office.
Finnerty, K., Motha, H., Shah, J., et al.: (2018) Cyber Security Breaches Survey 2018: Statistical Release.
Fraudehelpdesk.nl. (2018) Hoe voorkom ik acquisitiefraude? (How to prevent contract fraud?). https://www.fraudehelpdesk.nl/fraude-abc/voorkomen-acquisitiefraude/?zoekopdracht=acquisitiefraude.
Gigerenzer, G., & Goldstein, D. G. (1996). Reasoning the fast and frugal way: Models of bounded rationality. Psychological Review,103, 650–669.
Gross A. (2018) 51% of SMB Leaders Think Their Business Isn’t a Target for Cybercriminals.
Hess, M. F., & Cottrell, J. H., Jr. (2016). Fraud risk management: A small business perspective. Business Horizons,59, 13–18.
Hijma J. (2017) Annotatie HR 27 mei 2016, NJ 2017/312 (Van de Booren/Grenkefinance). Nederlandse Jurisprudentie 2017.
Holtfreter, K., Reisig, M. D., & Pratt, T. C. (2008). Low self-control, routine activities, and fraud victimization. Criminology,46, 189–220.
Hrncir, T., & Metts, S. (2012). Why small businesses fall victim to fraud: Size and trust issues. Business Studies Journal,4, 61–71.
Huisman K and Bunt HGvd. (2009) Misleidende handelspraktijken. Een onderzoek naar de aard, achtergronden en aanpak van acquisitiefraude in Nederland (Misleading commercial practices. An investigation into the nature, background and approach to fraudulent contract in the Netherlands). Rotterdam, Nl.: WODC, Erasmus Universiteit Rotterdam - Faculteit der Rechtsgeleerdheid.
Kalidien SN, de Heer-de Lange NE and van Rosmalen MM. (2011) Criminaliteit en rechtshandhaving 2010. Ontwikkelingen en samenhangen. Onderzoek en Beleid. Meppel: Boom Juridische uitgevers:, 574.
Kenessey, Z. (1987). The primary, secondary, tertiary and quaternary sectors of the economy. Review of Income and Wealth,33, 359–385.
Laufer, D. (2011). Small business entrepreneurs: A focus on fraud risk and prevention. American Journal of Economics and Business Administration,3, 401–404.
Levi, M. (2008). Organized fraud and organizing frauds: Unpacking research on networks and organization. Criminology and Criminal Justice,8, 389–419.
Levi, M., & Burrows, J. (2008). Measuring the Impact of Fraud in the UK: A Conceptual and Empirical Journey. British Journal of Criminology,48, 293–318.
Miro, L. F. (2014). Routine Activity Theory, The encyclopedia of theoretical criminology (pp. 1–7). New York: Wiley.
Lohrke, F. T., Franklin, G. M., & Frownfelter-Lohrke, C. (2006). The internet as an information conduit: a transaction cost analysis model of US SME internet use. International Small Business Journal,24, 159–178.
McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. London, UK: Home Office.
Montoya L, Junger M and Hartel P. (2013) How ‘Digital’ is Traditional Crime? European Intelligence and Security Informatics Conference (EISIC) 2013. Accessed August 12-14, 2013.
Moolenaar DEG, Nauta B and Tulder FPv. (2011) Kosten van criminaliteit (The costs of crime) Chapter 10. In: Rosmalen MMv, Kalidien SN and Heer-de Lange NEd (eds) Criminaliteit en rechtshandhaving 2011. Ontwikkelingen en samenhangen (Crime and law enforcement 2011. Developments and connections). The Hague, Nl.: WODC, CBS, Raad voor de Rechtspraak, Nl.
Murphy PR, Free C and Branston C. (2011) Organizational Culture as a Predictor of Fraud. Waterloo, Canada: Queen’s School of Business. http://accounting.uwaterloo.ca/SAF/Documents/Murphy%20paper.pdf.
National Academies of Sciences E, and Medicine (NAP). (2018). Modernizing Crime Statistics: Report 2-New Systems for Measuring Crime. Washington, DC, USA: The National Academies Press.
NCJRS. (2017). Financial Crime Fact Sheet - Office for Victims of Crime (p. 2). Washingron DC: National Criminal Justice Reference Service (NCJRS).
Nicita A and Benedettini S. (2009) Rational Drivers, Irrational Enforcers, and Road Safety. SSRN eLibrary.
Piquero, N. L., & Benson, M. L. (2004). White-Collar Crime and Criminal Careers: Specifying a Trajectory of Punctuated Situational Offending. Journal of Contemporary Criminal Justice,20, 148–165.
Rechtbank Amsterdam. (2018) ECLI:NL:RBAMS:2018:7881 - Rechtbank Amsterdam, 31-10-2018/7018728 EA VERZ 18-544 (in Dutch). Available at: https://linkeddata.overheid.nl/front/portal/document-viewer?ext-id=ECLI:NL:RBAMS:2018:7881.
Rengert G and Wasilchick J. (1985) Suburgan Burglary: a Time and a Place for Everything., Springfield IL USA: Charles C. Thomas.
Schuchter A and Levi M. (2013) The Fraud Triangle Revisited. Security Journal: 1-15.
Sillen, K. (2014). Clustering van bedrijven in beeld (clustering of companies). Economisch Statistische Berichten. Dossier Ecosystemen voor ondernemen,99, 14–19.
Simon, H. A. (1955). A Behavioral Model of Rational Choice. The Quarterly Journal of Economics,69, 99–118.
Simpson, S. S. (2010). Making sense of white-collar crime: Theory and research. Ohio St. J. Crim. L.,8, 481.
Simpson, S., Rorie, M., Alper, M. E., et al. (2014). Corporate crime deterrence: A systematic review. Campbell systematic reviews,10, 250.
Skogan, W. G. (1984). Issues in the measurement of victimization. Washington DC: U.S. Department of Justice, Bureau of Justice Statistics.
Smith GS. (2013) Small business fraud and the trusted employee. Protecting against unique vulnerabilities.
Statistics Netherlands. (2016) Banen van werknemers; bedrijfsgrootte en economisch activiteit (SBI2008), 2008-2014. Available at: http://statline.cbs.nl/StatWeb/publication/?VW=T&DM=SLNL&PA=81497NED&LA=NL.
Statistics Netherlands. (2017) Hoogseizoen telt bijna 10 miljoen vakantiegangers (High season has nearly 10 million vacationers). In: (CBS) CBvdS (ed).
Statistics Netherlands. (2018a) Bedrijven, naar bedrijfstak. http://statline.cbs.nl/Statweb/publication/?DM=SLNL&PA=81589NED.
Statistics Netherlands. (2018b) Geregistreerde criminaliteit; regio (indeling 2013) 2005-2012. http://statline.cbs.nl/Statweb/publication/?DM=SLNL&PA=80344NED&D1=0&D2=a&D3=0&D4=a&HDR=G2,T,G3&STB=G1&VW=T.
Statistics Netherlands. (2018c) SBI 2008 - Standaard Bedrijfsindeling 2008, Version 2018. https://www.cbs.nl/nl-nl/onze-diensten/methoden/classificaties/activiteiten/sbi-2008-standaard-bedrijfsindeling-2008.
Statistics Netherlands. (2019) https://www.cbs.nl/en-gb.
Sutherland, E. H., & Cressey, D. R. (1974). Criminology. Philadelphia, USA: J.B. Lippincott Company.
Tilley, N., & Sidebottom, A. (2015). Routine activities and opportunity theory. In M. D. Krohn & J. Lane (Eds.), The handbook of juvenile delinquency and juvenile justice (pp. 331–348). Oxford, UK: Wiley.
UK Finance. (2019). Fraud the facts 2019. The definitive overview of payment industry fraud (p. 4). Lononn, UK: UK Finance.
van Eck F. (2018) Acquisitiefraude en wetgeving (Contract fraud and legislation). In: Junger M (ed). Apeldoorn, Nl.
Van Koppen, P. J., & Jansen, R. W. J. (1998). The road to the robbery: Travel patterns in commercial robberies. British Journal of Criminology,38, 230–246.
Van Vlasselaer, V., Bravo, C., Caelen, O., et al. (2015). APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions. Decision Support Systems,75, 38–48.
Verizon Risk Team. (2017) 2017 Data Breach Investigations Report. 10th edition. Verizon. http://www.verizonenterprise.com/DBIR/.
Wolfe DT and Hermanson DR. (2004) The fraud diamond: Considering the four elements of fraud. The CPA Journal December.