The Big Interview: How Money Laundering Works

ITNOW ◽  
2021 ◽  
Vol 63 (3) ◽  
pp. 41-43
Author(s):  
Dionysios Demetis

Abstract How and why do cyber criminals hide their money's source? Dr Dionysios Demetis, Senior Lecturer in Management Systems at Hull University, explains.

2020 ◽  
Author(s):  
Eva-Maria Vollmuth

Recent cases of money laundering involving globally active banks illustrate the growing importance of legal provisions to curb money laundering. Vollmuth examines the prevention of money laundering in financial institutions and shows that the security measures to be established must be an essential part of compliance management in order to combat money laundering successfully. The author deals with the new requirements of the revised Money Laundering Act of June 23, 2017 and discusses legal questions of interpretation of the revised Act. Eva-Maria Vollmuth is working in the field of regulatory audits and consulting on money laundering law and compliance.


Author(s):  
Romil Rawat ◽  
Vinod Mahor ◽  
Anjali Rawat ◽  
Bhagwati Garg ◽  
Shrikant Telang

The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.


Author(s):  
Dr.M.Suganya Aravazhi,

Cybercrime is an illegal action committed in the area of ITC and it is high speed, low cost and high tech offence. This kind of activity usually involves a modification of a conventional crime by using computers. The term ‘cyber-laundering’ is the practice of money laundering carried out in cyber space through online transactions. This article presents the meaning of cyber laundering dealing with offences concerned with the abuse of computers or other electronic gadgets. Cyber criminals also target at loopholes of mobile devices and the threats are growing faster than it does on personal computer. An effective legal frame work for combating cybercrime is important to develop the correct conceptual apparatus. Cyber criminals often favour those e-commerce portals and payment system where a great number of personal information and credit card data are being stored and processed. On the whole, an effective anti-cybercrime strategy is the need of the hour. KEY WORDS: Cybercrime, Money laundering, Information technology, Cyber security, Electronic gadgets, Financial services.


1998 ◽  
Vol 49 (7) ◽  
pp. 682-699 ◽  
Author(s):  
N C Proudlove ◽  
S Vaderá ◽  
K A H Kobbacy

Sign in / Sign up

Export Citation Format

Share Document