Open Access

Dynamic and bibliometric analysis of terms identifying the combating financial and cyber fraud system


Cite

1. Bequai, A. (1998). Guide to cyber-crime investigations. Computers and Security, 17(7), 579 – 582. http://130.18.86.27/faculty/warkentin/SecurityPapers/Robert/Others/Bequai1998_C%26S17_CyberCrimeInvestigations.pdf10.1016/S0167-4048(99)80056-X Search in Google Scholar

2. Benjamin, R., Gladman, B. and Randell, B. (1998). Protecting IT Systems from Cyber Crime. Computer Journal, 41(7), 429 – 443. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.554310.1093/comjnl/41.7.429 Search in Google Scholar

3. Bolton, R. J. and Hand, D. J. (2002). Statistical fraud detection: A review. Statistical science, 17(3), 235 – 255. https://projecteuclid.org/journals/statistical-science/volume-17/issue-3/Statistical-Fraud-Detection-A-Review/10.1214/ss/1042727940.short10.1214/ss/1042727940 Search in Google Scholar

4. Choo, K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 30(8), 719 – 731. https://dl.acm.org/doi/10.1016/j.cose.2011.08.00410.1016/j.cose.2011.08.004 Search in Google Scholar

5. Colladon, A. F. and Remondi, E. (2017). Using social network analysis to prevent money laundering. Expert Systems with Applications, 67, 49 – 58. https://arxiv.org/abs/2105.0579310.1016/j.eswa.2016.09.029 Search in Google Scholar

6. FATF (2001). The FATF Recommendations. https://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html. Search in Google Scholar

7. Feily, M., Shahrestani, A., and Ramadass, S. (2009, June). A survey of botnet and botnet detection. In 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 268-273. https://www.semanticscholar.org/paper/A-Survey-of-Botnet-and-Botnet-Detection-Feily-Shahrestani/629e73e938469e92da0d225ed9de71524d3df673 Search in Google Scholar

8. Harpum, C. (1990). Liability for money laundering. The Cambridge Law Journal, 49(2), 217 – 220. https://www.cambridge.org/core/journals/cambridge-law-journal/article/liability-for-money-laundering/3EA770607A3558CB3DDA01FE064FFF9210.1017/S0008197300116976 Search in Google Scholar

9. Huang, Q., Singh, V. K. and Atrey, P. K. (2014, November). Cyber bullying detection using social and textual analysis. In Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, 3-6. https://dl.acm.org/doi/abs/10.1145/2661126.266113310.1145/2661126.2661133 Search in Google Scholar

10. Hutchings, A. and Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596 – 614. https://www.jstor.org/stable/4381929910.1093/bjc/azu106 Search in Google Scholar

11. IBM (2022). How much does a data breach cost in 2022? https://www.ibm.com/security/data-breach Search in Google Scholar

12. Juels, A., Kosba, A. and Shi, E. (2016, October). The ring of gyges: Investigating the future of criminal smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 283-295. https://dl.acm.org/doi/10.1145/2976749.297836210.1145/2976749.2978362 Search in Google Scholar

13. Kolodenker, E., Koch, W., Stringhini, G. and Egele, M. (2017, April). Paybreak: Defense against cryptographic ransomware. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 599-611. https://dl.acm.org/doi/10.1145/3052973.305303510.1145/3052973.3053035 Search in Google Scholar

14. Möser, M., Böhme, R. and Breuker, D. (2013, September). An inquiry into money laundering tools in the Bitcoin ecosystem. In 2013 APWG eCrime researchers summit, 1-14. Ieee. https://ieeexplore.ieee.org/document/680578010.1109/eCRS.2013.6805780 Search in Google Scholar

15. Mumford, Е. (1998). Problems, knowledge, solutions: Solving complex problems. Journal of Strategic Information Systems, 7(4), 255 – 269. https://ur.booksc.me/book/14256753/884f6810.1016/S0963-8687(99)00003-7 Search in Google Scholar

16. Ngai, E. W., Hu, Y., Wong, Y. H., Chen, Y. and Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision support systems, 50(3), 559 – 569. https://www.sciencedirect.com/science/article/pii/S016792361000130210.1016/j.dss.2010.08.006 Search in Google Scholar

17. OAS (1994). The Council of Europe Convention on Cybercrime: status quo and future challenges. Retrieved from August 1, 2022. http://www.oas.org/juridico/english/cyb_pry_coe.pdf Search in Google Scholar

18. Ruan, K., Carthy, J., Kechadi, T. and Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), 34 – 43. https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/23/10.1016/j.diin.2013.02.004 Search in Google Scholar

19. Tounsi, W. and Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers and Security, 72, 212 – 233. https://dl.acm.org/doi/10.1016/j.cose.2017.09.00110.1016/j.cose.2017.09.001 Search in Google Scholar