Unit convenor and teaching staff |
Unit convenor and teaching staff
Moderator
Hope Ashiabor
Contact via N/A
N/A
N/A
Murray Lawson
|
---|---|
Credit points |
Credit points
4
|
Prerequisites |
Prerequisites
(4cp in ACCG or ACST or BUS or ECON or MKTG units at 600 level) or admission to MCyberSec
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
Recent high profile cases have illustrated that globalisation and the changing nature of technology is accelerating the challenges presented by financial and cyber crime. This unit is designed to provide an in-depth understanding of the many facets of financial and cyber crime and an understanding of the importance of cyber security for business and the community. The unit allows awareness of fraudulent behaviour associated with specific emerging global issues, problems, threats and opportunities relating to globalisation, e-commerce, privacy and multiple jurisdictions. Students embark on a research process that identifies and selects recent case studies that provide insight into a range of emerging sophisticated and innovative cyber methodologies utilised by fraudsters. The unit also includes an introduction to relevant research methods.
|
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
Extensions
You are expected to submit written assessment tasks by the published due date UNLESS you have received written permission to submit your work at a later date from the Unit convenor. No extensions will be granted. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late (for example, 25 hours late in submission – 20% penalty). This penalty does not apply for cases in which an application for disruption of studies is made and approved. No submission will be accepted after solutions have been posted.
Details of how the University defines serious and unavoidable disruption to studies, and information about the processes involved, are contained in the Special Consideration Policy.
Assignment Preparation and Submission
At the start of each assignment (Literature Review and Case Study), you are required to paste in the following words and insert your name:
I, [Insert your name], declare that:
This assignment is entirely my own work based on my personal study and/or research.
The password-protected component of your Unit's web site is hosted on Online Learning @ MQ. For information about confidentiality when studying online, see http://online.mq.edu.au/uw/conf.html
The submission of assignments (Literature Review and final Case Study) via iLearn involves an inbuilt automatic check for plagiarism using the Turnitin application.
It is important to note that the LR and Case Study documents must be uploaded and submitted correctly by clicking the 'submit' button on their designated unit website link. Documents left as drafts will not be marked.
Name | Weighting | Hurdle | Due |
---|---|---|---|
Reflective Review (RR) | 20% | No | Week 4/Week 6 |
Literature Review (LR) | 30% | No | 6th May 2018 |
Case Study | 50% | No | 10 June 2018 by 5 pm |
Due: Week 4/Week 6
Weighting: 20%
The Reflective Review is based on Module One and is in the form of two steps, a formal online forum and a reflective critique:
1. Formal Online Forum. The online forum is analogous to tutorials in a traditional course. You are required to participate actively in the Forum, and your contributions will be assessed.
Online Forum 1: Monday 19 March- Thursday 22 March
Submission: online through unit website. Details and requirements of the Online Forum and the topic designated for the Forum is listed on the unit website, in the ACCG877 Assessment Guide and will be discussed in the Module One block seminar session.
2. Reflective Critique. This assessment provides a link between formal learning and personal meaning. In a one page critique (330 words maximum, 1.5 spacing), refer to the online forum, the Module One seminar and the requirements and workload in the unit to :
Your contribution to the Forum and your Reflective Critique paper will be given a composite rating (= K+A+P): See the Assessment Guide on ilearn for more details on the Reflective Review requirements.
Due date: 5pm 8th April 2018.
Submission: Reflective Critique to be submitted online through the 'Reflective Review' link on the unit website by 5pm on the 8th April 2018 (due date). Submission will be subject to a check by Turnitin. Attached to the submission must be a statement as set out in "General Assessment Information' section of this unit guide under the heading 'Assignment Preparation and Submission'. This statement is not included in the final word count. Ensure that the RR document is uploaded and submitted correctly by clicking the 'submit' button. Documents left as drafts on the submission site will not be marked.
Penalty: This assignment is to be a concise word processed document and English expression is very important in this task. Late assignments will incur a 10% penalty per day or part thereof as detailed under the General Assessment Information.
Extension: No extensions will be granted unless approval has been given under the Special Consideration Policy.
Due: 6th May 2018
Weighting: 30%
The Literature Review is designed to effectively enhance research skills and help students learn to synthesise, analyse and interpret information using appropriate disciplinary content and methodology. The LR will act as a first step in the preparation of your final case study. The criteria for the LR assignment will be discussed in depth and sample literature reviews will be discussed at the Module One and Two on campus block sessions and will also be posted online on the unit website.
Your approach to the literature review should include the following steps.
• Provide a brief, informative and relevant title that establishes the financial crime/cyber security topic which is to be explored in the proposed case study research.
• Draw upon existing knowledge to identify a significant issue which relates to an aspect of financial crime/cyber security.
• Define your topic using appropriate journal articles, class readings, or scholarly reviews of the literature for background information.
• Use databases to find books, articles and web sites relevant to your topic.
• Evaluate the types and appropriateness of information used and describe what is known about this issue in the relevant literature.
• Complete an annotated bibliography explaining why each resource is appropriate for your paper and how it will support the case study.
Total word count: 1,000 words.
Further discussion about the structure of the LR will be covered in the Module 1 on-campus session on the 10 March, 2018.
Submission: Online through the Literature Review link on the unit website by 5pm on the 6th March 2018 (due date). Submission will be subject to a check by Turnitin. Attached to the submission must be a statement as set out in "General Assessment Information' section of this unit guide under the heading 'Assignment Preparation and Submission'. This statement is not included in the final word count. Ensure that the LR document is uploaded and submitted correctly by clicking the 'submit' button. Documents left as drafts on the submission site will not be marked.
Penalty: This assignment is to be a concise word processed document and English expression is very important in this task. Late assignments will incur a 10% penalty per day or part thereof as detailed under the General Assessment Information.
Extension: No extensions will be granted unless approval has been given under the Special Consideration Policy.
Due: 10 June 2018 by 5 pm
Weighting: 50%
The case study deals with a particular aspect of financial crime/cybersecurity. You are required to describe the trend/s and issues (for example, an increase/decrease, legislative reform, a change in character, sequence of activities, a problem) of your case study and analyse the repercussions of that financial crime on business and the community. The structure of the finished Case Study is:
1. Short introduction
2. Case Description (In final form, this should be no more than 1000 words)
3. Case Analysis (In final form, this should be around 1500 words)
4. Short conclusion summarising the main points you've made in your 'Analysis'
5. List of literature you've cited.
Total word count: 3,000 words
Submission: Online through the Case Study link on the unit website by 5pm on the 10th June, 2018 (due date). Submission will be subject to a check by Turnitin. Attached to the submission must be a statement as set out in "General Assessment Information' section of this unit guide, under the heading 'Assignment Preparation and Submission'. This statement is not included in the final word count. Ensure that the case study document is uploaded and submitted correctly by clicking the 'submit' button. Documents left as drafts will not be marked.
Penalty: This assignment is to be a concise word processed document and English expression is very important in this task. Late assignments will incur a 10% penalty per day or part thereof as detailed under the General Assessment Information. Note that non-submission of the case study will result in an automatic fail grade for the unit.
Extension: No extensions will be granted unless approval has been given under the Special Consideration Policy.
Unit web page
Course material is available on the Macquarie University learning management system (iLearn). The web page for this unit can be found at http://mq.edu.au/iLearn/index.htm
Unit Delivery
The unit is divided into three specific Modules, each Module will cover a specific set of topics as listed in the Unit Schedule. Each Module provides opportunities to explore concepts covered through discussions and group activities. The unit is delivered in online through recorded lecture seminars and materials, online webinar; 'convenor chat' and email. The recorded lecture seminars will be delivered as an ECHO recording and as a specific recorded lecture. The mode of delivery for each topic is listed in the unit schedule of this unit guide.
Please refer to http://www.timetables.mq.edu.au/ for clarification of the Session timetable.
Course Components |
Details |
Unit Outline |
Read this Unit Outline right through first. It contains a great deal of information that you'll need to know, including assessment requirements and grading criteria, schedules of activities, reading guidelines and information about plagiarism, progress and where to get help. |
Modules |
There are three Modules in this Unit: Module 1: Global Financial Trends and reforms. Module 2: Asset Misappropriation Module 3: Corruption. The unit schedule in this unit guide lists the three Modules and also provides summaries of content, suggested readings, activities and information about assignments. |
Reflective Review |
The Reflective Review will be conducted during the Semester. and is in two parts. The first is an online forum which is analogous to tutorials in a traditional course. You are required to participate actively in this tutorial, and your contributions to the forum on contemporary cyber security impacts and responses will be assessed. The second part is a reflective review which is based on the online forum and a number of other components. The reflective review is assessed. See 'Assessment Tasks' in this unit guide for further details of this assessment. |
Live Webinar | There is also a Live Webinar. This is an informal discussion forum, allowing opportunities for the kind of activities listed under 'Live Webinar' in each Module in the Unit Schedule of this unit guide. |
Literature Review |
The Literature Review (LR) is a review of an issue critical to financial crime theory, policy or practice. The research issue is a topic of your choice but must be an issue based on financial crime and/or cyber security. The LR is designed to enhance research skills and is the first step to your final case study. See 'Assessment Tasks' in this unit guide for further details of this assessment. |
Case Study |
The Final case study deals with trends/ issues/ impacts of your selected topic on financial crime/cyber security on business and the community. See 'Assessment Tasks' in this unit guide for further details of this assessment. |
Dialogue |
Use ‘Dialogue’ to email the Convenor when you need to get in touch, and to send drafts to other class-members. 'Dialogue' is also where you make requests for help from other students who are also enrolled online. For example, if you want to meet online with a few classmates to swap drafts of your evolving case study and get their help, 'the 'Dialogue' site is a good place to do it. 'Dialogue' is also where you post your draft case study work for comment. |
Convenor Chat |
Use 'Convenor chat' for your course-related queries, rather than emailing the convenor. This way both the convenor and students can answer each other's questions, and the whole class gets to see the answers. Common questions and answers can also be found in the 'Q & A's link on the unit webpage. |
e-Reserve |
Recommended readings can be downloaded from e-Reserve. The e-reserve link also takes you to a webpage that provides access to other areas of the library that you will need, namely the Journal Finder, Catalogue and relevant Databases.. |
Research Tools
There are no prescribed textbooks for the unit. The content of this unit will be supplemented with readings available on this unit web site listed under the Modules reading list and online journals. This reading list may be supplemented during the session is required. The electronic Journals and texts listed under the heading 'Useful Internet Sites' on this page are also useful as additional references and are available in the library and, unless otherwise referenced, electronic publications can be downloaded from e-Reserve.
Technology Used and Required
Students are expected to have:
Useful internet sites:
Databases from all Australian jurisdictions:Australasian Legal Information Institute http://www.austlii.edu.au/
For guidance in citing legal references:Australian Guide to Legal Citation, 3rd Edition, Melbourne University Law Review Association http://www.law.unimelb.edu.au/469B9330-4CA2-11E2-95000050568D0140
Australian Institute of Criminology publications
Hutchings, A. 2012, 'Computer security threats faced by small businesses in Australia', Trends & issues in crime and criminal justice no.433, Australian Institute of Criminology, Canberra.
Jorna, P. & Smith, R.G. 2015 'Fraud against the Commonwealth Report to Government 2010–11 to 2012–13', Monitoring Report no. 24, Australian Institute of Criminology, Canberra.
Levi M & Smith, RG 2011. 'Fraud Vulnerabilities and the Global Financial Crisis', Trends and Issues in Crime and Criminal Justice, No. 422, Australian Institute of Criminology, Canberra.
Ross S & Smith, RG 2011. 'Risk Factors for Advance Fee Fraud Victimisation', Trends and Issues in Crime and Criminal Justice, No. 420, Australian Institute of Criminology, Canberra.
Smith RG & Walker J 2010. The Illegal movement of Cash and Bearer Negotiable Instruments: Typologies and Regulatory Responses, in Trends and Issues in Crime and Criminal Justice, No. 402, Australian Institute of Criminology, Canberra.
Smith RG, McCusker R & Walters J 2010. 'Financing of terrorism: Risks for Australia', Trends and Issues in Crime and Criminal Justice, No 394, Australian Institute of Criminology, Canberra.
Journal articles
Braithwaite J 2011 'Diagnostics of white collar crime prevention', Criminology & Public Policy 9(3) 621-626, 2010
Smith RG 2011. 'The Criminogenic Effects of Cybercrime Prevention Advice – And How to Avoid Them, Targeting Tax Crime', Issue 4, February, pp. 26-7, Australian Taxation Office, Canberra.
Smith RG 2010. 'Organised Identity Theft in a Global Perspective', Security Solutions, No. 68, October, pp.88-92
Smith RG 2008, 'Coordinating individual and organisational responses to fraud', Crime, law and social change, vol. 49, no. 5, pp. 379-96.
Choo K-K R& Smith RG 2007, 'Criminal exploitation of online systems by organised crime groups', Asian Journal of Criminology, Vol 2 no. 2.
Books and reports
Graycar A& Smith RG (eds) 2011. 'Handbook of Global Research and Practice in Corruption', Edward Elgar Publishing Ltd: Cheltenham.
Choo K-K R, Smith RG & McCusker R 2007. 'Future directions in technology-enabled crime: 2007-09', Research and Public Policy Series No 78. pp. 1-131, Australian Institute of Criminology, Canberra.
Modules and Topics
Module 1: Global Financial Trends and Reform |
Online delivery |
Live Webinar |
|||
Topic/Subsection |
Readings and Activity (see Readings List Module 1)
|
Seminar Contents |
14 March 2018 |
||
1.1 Introduction |
Kickstart: Introduction to unit. |
Discussion forum based on the following:
|
|||
1.2 Legal Context |
|
Discussion on cyber security, including the problems/issues/threats re privacy, e-commerce, the Internet and globalization. |
|||
1.3 Research Skills Strategies |
|
Research skills strategies evaluation / analysing/ reflecting explained. |
|||
1.4 Process/Ethical Governance |
|
Review relevant fraud legislation/legal framework of cyber security and moral and ethical issues in business. |
|||
1.5 Cybercrime |
|
Recorded seminar: Recognition that cybercrime is now the global driver of fraud. Analysis of political, economic, social, cultural and environmental implications of ICT use. |
|||
1.6 Financial Crime in Southern China |
Guest Lecture*
|
Recorded seminar: Includes a focus on the rising impact and threat of cybercrime in southern China. |
|||
Module 2 : Asset Misappropriations |
Online delivery |
Live Webinar |
|||
Topic/Subsection |
Readings and Activity (see Readings List Module 2) |
|
3 May 2018 |
||
2.1 Occupational Fraud and Abuse |
Video ‘How Fraud Hurts You and Your Organisation’. |
Recorded seminar: Impact of fraud on victim organisations, fraudster red flags and fraud diamond unpacked. Cybercrime identified as underpinning increasing occupational fraud activity. |
Discussion forum based on the following:
|
||
2.2 Financial Fraud ‘Schemes’ |
Provided Case Studies 19, 20 and 21st Century
|
Financial fraud schemes often are repeated in history but cybercrime now adds a new insidious dimension to fraud schemes requiring greater cyber security. |
|||
2.3 Money Laundering and Capital Flight |
|
Recorded seminar: Seminar examines money laundering and capital flight across South-east Asia and the impact of digital technology in facilitating the migration of traditional organized crime online. |
|||
2.4 Shadow Economy |
|
Includes discussion on the underground illegal markets of cybercrime. |
|||
Module 3 :Corruption |
Online delivery |
Live Webinar |
|||
Topic |
Readings and Activity (see Readings List Module 3) |
30 May 2018 |
|||
3.1 Bribery |
|
Case Study: Financial Crime and Cyber security in the Mining and Construction Industry |
Discussion forum based on:
|
||
3.2 Conspiracy |
Guest Lecture*
|
Recorded seminar: Case Study: Strike Force Whittlesford. Illustrates the investigative tracking of an extensive cyber web of deceit. |
|||
3.3 Social Engineering/Identity Theft |
View www.social-engineering.org in preparation for seminar |
Recorded seminar: Dialogue on the aspects, tools and skills of professional and malicious social engineering as well as the role of cyber security in protecting modern business. |
|||
3.4 Environment Fraud |
|
Environment protection legislation, threats/impact of fraudulent activities on natural resources is examined, together with cyber security protection against cyber attacks on industrial infrastructures that manage natural resources. |
|||
3.5 Final Revision |
Film ‘Crimes Of Fashion’ |
Macquarie University policies and procedures are accessible from Policy Central (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policy-central). Students should be aware of the following policies in particular with regard to Learning and Teaching:
Undergraduate students seeking more policy resources can visit the Student Policy Gateway (https://students.mq.edu.au/support/study/student-policy-gateway). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.
If you would like to see all the policies relevant to Learning and Teaching visit Policy Central (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policy-central).
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/study/getting-started/student-conduct
Results shown in iLearn, or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au.
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to improve your marks and take control of your study.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/.
When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.
Our postgraduates will be able to demonstrate a significantly enhanced depth and breadth of knowledge, scholarly understanding, and specific subject content knowledge in their chosen fields.
This graduate capability is supported by:
Our postgraduates will be capable of utilising and reflecting on prior knowledge and experience, of applying higher level critical thinking skills, and of integrating and synthesising learning and knowledge from a range of sources and environments. A characteristic of this form of thinking is the generation of new, professionally oriented knowledge through personal or group-based critique of practice and theory.
This graduate capability is supported by:
Our postgraduates will be capable of systematic enquiry; able to use research skills to create new knowledge that can be applied to real world issues, or contribute to a field of study or practice to enhance society. They will be capable of creative questioning, problem finding and problem solving.
This graduate capability is supported by:
The unit is now also a core unit in the Master of Cyber Security, Cyber Governance and Management specialisation.
There is now only one Online Forum, this has been reduced from five days to four days and now forms part of the Reflective Review assessment.
The Reflective Task assessment has been deleted.
This external unit now has full online delivery (see unit schedule).
Suggested Readings:
MODULE 1 Global Financial Trends and Reform
Introduction/Legal Context
Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 NSW http://www.austlii.edu.au/au/legis/nsw/num_act/caiafoa2009n99500.pdf
Criminal Code (Theft, Fraud, Bribery and Related Offences) Amendment Act 2004 (ACT) http://www.legislation.act.gov.au/a/2004-15/20040409-12338/pdf/2004-15.pdf
Criminal Code Amendment (Theft, Fraud, Bribery and related Offences) Act 2000 (Cth)http://www.austlii.edu.au/au/legis/cth/consol_act/ccafbaroa2000505/
Cybercrime Act 2001, No. 161,200 (Cth) https://www.legislation.gov.au/Details/C2004A00937
Cybercrime Legislation Amendment Act 2012, No. 120, 2012 (Cth) https://www.legislation.gov.au/Details/C2012A00120
Hutchings A. 2012, 'Computer security threats faced by small businesses in Australia', Trends & issues in crime and criminal justice no. 433, Australian Institute of Criminology, Canberra.
Research Skills
Morley-Warner, T. (2001) Academic writing is….A guide to writing in a university context, University of Technology, Sydney: CREA.
Process/Ethical Governance
Braithwaite J (2011) Diagnostics of white collar crime prevention, Criminology & Public Policy 9(3) 621-626, 2010.
Jorna, P. & Smith, R.G. (2015) 'Fraud against the Commonwealth Report to Government 2010-11 to 2012-2013,' Monitoring Report No. 24, Australian Institute of Criminology, Canberra.
Levi M & Smith, R.G. (2011) Fraud Vulnerabilities and the Global Financial Crisis, Trends and Issues in Crime and Criminal Justice, No. 422, Australian Institute of Criminology, Canberra.
Smith R.G. (2008) Coordinating individual and organisational responses to fraud, Crime, law and social change, vol. 49, no. 5, pp. 379-96.
Occupational Fraud and Abuse
Association of Certified Fraud Examiners (ACFE) Report to the Nations, 2016 Global Fraud Survey, https://www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf
Smith RG & Walker J (2010) The Illegal movement of Cash and Bearer Negotiable Instruments: Typologies and Regulatory Responses, in Trends and Issues in Crime and Criminal Justice, No. 402, Australian Institute of Criminology, Canberra.
Ross S & Smith, RG (2011) Risk Factors for Advance Fee Fraud Victimisation, Trends and Issues in Crime and Criminal Justice, No. 420, Australian Institute of Criminology, Canberra.
Cybercrime
Chawki, M,, Darwish, A., Khan, M.A., Tyagi.S. (2015) Cybercrime, Digital Forensics and Jurisdiction, Springer International Publishing
Choo K-K R & Smith RG (2007) Criminal exploitation of online systems by organised crime groups, Asian Journal of Criminology vol 2 no. 2.
Choo K-K R, Smith RG & McCusker R (2007) Future directions in technology-enabled crime: 2007-09. Research and Public Policy Series No 78. pp. 1-131, Australian Institute of Criminology, Canberra.
Hayden, E.C. (2015) Cybercrime fighters target human error, Nature, Vol. 518(7539), p.282.
Smith RG (2010) Organised Identity Theft in a Global Perspective, Security Solutions, No. 68, October, pp.88-92
Smith RG (2011) The Criminogenic Effects of Cybercrime Prevention Advice – And How to Avoid Them, Targeting Tax Crime, Issue 4, February, pp. 26-7, Australian Taxation Office, Canberra.
Environmental Fraud
Bergenas, J. & Knight, A. (2015) "Green Terror: Environmental Crime and Illicit Financing." SAIS Review of International Affairs, vol. 35 no. 1, pp. 119-131. Project MUSE, doi:10.1353/sais.2015.0004
Bricknell, S (2010) Environmental Crime in Australia, AIC Research and Public Policy Series, Australian Institute of Criminology, Canberra.
Environment Protection and Biodiversity Act 1999 (Act No. 91 of 1999 as amended) (Cth) http://www.comlaw.gov.au/Details/C2012C00801
Elliot, L (Ed) (2007) ‘Transnational environmental crime in the Asia-Pacific: A workshop report’, Report of the Public Forum on Transnational Environmental Crime in the Asia Pacific, 22 March, Australian National University, Canberra, p. 42.
MODULE 2: Asset Misappropriations
Social Engineering
Financial Crime in Southern China
Dawnay, Kit (2012) Risky business - Money laundering in Macau, Jane's Intelligence Review, 28 Feb.
Greenwood, Verity A. and Dwyer, Larry (2016) ‘Reinventing Macau tourism: gambling on creativity?’, Current Issues in Tourism, 05/2016; DOI:10.1080/13683500.2016.1187585.
Isaacs, Matt (2011) The Macau connection, Reuters Special Report, 11 Mar., Reuters News
Johnstone, Maurice (2010) Korea criminals - Pyongyang's persistent illegal activities, Jane's Intelligence Review 16 Sept.
Peng Wang (2012) Partners in crime - Triad groups move to exploit mainland China, Jane’s Intelligence Review, 29 Oct.
Yingli Han (2011) Hong Kong Capital Flight: Determinants and Features, Master of Commerce and Management Thesis, Canterbury, New Zealand: Lincoln University, Digital Thesis, Chapters 1 and 2, pp. 1-35 (Available Google).
Financial Fraud 'Schemes'
Dawnay, Kit (2012) Risky business - Money laundering in Macau, Jane's Intelligence Review, 28 Feb.
Isaacs, Matt (2011) The Macau connection, Reuters Special Report, 11 Mar., Reuters News
Johnstone, Maurice (2010) Korea criminals - Pyongyang's persistent illegal activities, Jane's Intelligence Review 16 Sept.
McBarnet, Doreen J. (2004) Crime, compliance and control, Ashgate/Dartmouth Publishers, Burlington, VT (see Chapter 10)
Oppenheimer, J (2009) Madoff with the Money, Wiley Publishers, Hoboken, New Jersey.
Peng Wang (2012) Partners in crime - Triad groups move to exploit mainland China, Jane’s Intelligence Review, 29 Oct.
Raphael, Adam (1995) Ultimate Risk : the inside story of the Lloyd’s catastrophe, Four Walls Eight Windows Publishers, New York.
Yingli Han (2011) Hong Kong Capital Flight: Determinants and Features, Master of Commerce and Management Thesis, Canterbury, New Zealand: Lincoln University, Digital Thesis, Chapters 1 and 2, pp. 1-35 (Available Google Scholar)
MODULE 3 Corruption
Bribery
Caripis, L., Combatting corruption in mining approvals: assessing the risks in 18 resource-rich countries, Transparency International and Transparency International Australia, 2017.
Graycar A & Smith RG (eds) (2011) Handbook of Global Research and Practice in Corruption, Edward Elgar Publishing Ltd: Cheltenham.
Stasavage, D. and Daubree, C. (1998) Determinants of Customs Fraud and Corruption: Evidence from Two African Countries, OECD Development Centre Working Papers, 138, 1 August, 1998.
Conspiracy
Duffy, M. (2005) ‘Fraud on the Market’: judicial approaches to causation and loss from securities nondisclosure in the United States, Canada and Australia’, 29, Melbourne University Law Review, 621.
Marston, G. and Walsh, T (2008) ‘Case of Misrepresentation: Social Security Fraud and the Criminal Justice System in Australia’, 17, Griffith Law Review 285.
Shadow Economy
Baxt, R (2012) Securities and financial services law, LexisNexis Butterworths, Chatswood, NSW (see Chapter 17).
Qu, C.Z. (2008) Managed investments and insider trading: regulation and liability, Sandstone Academic Press, Melbourne.
Scheider, F. (2007) The shadow economy : an international survey, Cambridge University Press, Cambridge.
Money Laundering and Capital Flight
Abdulsamed, Farah (2011) Somali Investment in Kenya, London: Chatham House, Briefing Paper, March.
Ashin, Paul (2012) 'Dirty Money, Real Pain', Finance & Development, (International Monetary Fund), 49(2), 38-42.
Burger, Ethan S. (2009) 'Following only some of the money in Russia', Demokratizatsiya 17(1) , 41-70.
Christensen, John (2011) 'The looting continues: tax havens and corruption', Critical perspectives on International Business, 2011, Vol.7(2), p.177-196.
Smith RG, McCusker R & Walters J (2010) 'Financing of terrorism: Risks for Australia', Trends and Issues in Crime and Criminal Justice, No 394, Australian Institute of Criminology, Canberra.
UN Office of Drugs and Crime (2011) Estimating Illicit Financial Flows Resulting from Drug Trafficking and Other Transnational Crimes, Geneva.
U.S. Senate 2012 U.S. Vulnerabilities to Money Laundering, Drugs and Terrorist Financing: HSBC Case History, Washington, D.C. Permanent Subcommittee on Investigations.
Work Requirements
This Unit has been designed as a 4 postgraduate credit point Unit, requiring the equivalent of 13 weeks of work over one session. Being a four credit-points Unit you should expect to spend a minimum of 12 hours per week to meet the requirements of the Unit. As a guide students should spend the approximate amounts of time as listed on each of the following activities (Note: Each activity listed includes hours required for pre-reading and self-study):
|
Activities |
Hours |
1 |
3 online Module sessions |
50 |
2 |
Assessment Task 1 ( Reflective Review (RR)) |
20 |
3 |
Assessment Task 2 (Literature Review (LR)) |
30 |
4 |
Assessment Task 3 (Final Case Study) |
50 |
|
Total |
150 |
As a postgraduate student, you bring valuable knowledge and experience to the Unit. As you work through the Unit, try to:
In completing the Unit, you are expected to:
This unit uses research from external sources (references) and gives you practice in applying research findings in your assignments.
Recent Relevant Research by Convenor
Publications
Verity A. Greenwood and Larry Dwyer (2017) ‘Reinventing Macau tourism: gambling on creativity?’, Current Issues in Tourism, Vol. 20 , Issue. 6, pp. 580-602.
Verity A. Greenwood and Larry Dwyer (2015) ‘Consumer protection legislation: A neglected determinant of destination competitiveness? Journal of Hospitality and Tourism Management, Vol. 24, September, 2015.
Greenwood, V and Larry Dwyer (2014) ‘Challenges to Consumer Protection Legislation in Tourism Contexts’ Journal of Tourism Consumption and Practice, Vol. 6, 2. http://www.tourismconsumption.org/current.htm.
Conferences
Greenwood, Verity A. ‘Developing Macau Tourism : a Calculated gamble?’, Paper presented at School of Hospitality and Tourism Management Conference, Surrey, 22 July, 2016.
Greenwood, Verity A. ‘Navigating Evolving Global Trends in Financial Crime: a Tourism Focus’, BESTEN Think Tank, Berlin, 13 July 2016.
Greenwood, Verity A., ‘Surviving Participant Trauma and Grief as a Heuristic Researcher’, AAG Conference, San Francisco, 4 April, 2016.
Greenwood, Verity A. and Dwyer L, (2016) ‘Developing Macau Tourism: a calculated gamble?’ Paper presented 26th Annual CAUTHE Conference', Blue Mountains Tourism College, Sydney campus, February 4-6, 2016.
Greenwood, Verity.A. and Larry Dwyer ‘Consumer protection as essential to Destination Competitiveness’ (working paper- refereed). 25th Annual CAUTHE Conference 'Rising Tides and Sea Changes: Adaptation and Innovation in Tourism and Hospitality', Gold Coast campus, February 2-5 2015.
V.A. Greenwood and Larry Dwyer (2014) ‘Chinese ‘Hot Money’ Junkets and its implications for destination competitiveness in Macau’ , G20 First East-West Dialogue on Tourism and the Chinese Dream’, Gold Coast, 13-15th November, 2014 (working paper- refereed),14.11.14.
Greenwood, V.A. and Larry Dwyer, ‘Consumer Protection and Destination Competitiveness’, Consumer Behaviour in Tourism Symposium ‘Competitiveness, Innovation and Markets: The Multifaceted Tourists´ Role’, Brunico, Italy, December 4,, 2013.
Global & Sustainability
This unit provides an in-depth understanding of the many facets of financial crime and governance and allows appreciation of the political, economic, environmental, cultural and social repercussions of financial crime/cyber security at the global, regional and local level on business and the community. This unit addresses global and sustainability issues as direct areas of study and as necessary implications arising from the materials, assessment and academic discussion and debate in classes/seminars. We promote sustainability by developing ability in students to research and locate information within the financial crime and governance specialisation. We aim to provide students with an opportunity to obtain skills which will benefit them throughout their career.
The unit materials have a reference list at the end of each chapter/module/text containing all references cited by the author. These provide some guidance to references that could be used to research particular issues.
Global context:
Sustainability context:
- the physical environment and possible disparities between its private economic costs and the social costs of its activities and the external costs of business activities
- Pollution control; environment protection and the need for higher global environmental standards.