Unit convenor and teaching staff |
Unit convenor and teaching staff
Moderator
Hope Ashiabor
Contact via N/A
N/A
N/A
Murray Lawson
|
---|---|
Credit points |
Credit points
4
|
Prerequisites |
Prerequisites
(4cp in ACCG or ACST or BUS or ECON or MKTG units at 600 level) or admission to MCyberSec
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
Recent high profile cases have illustrated that globalisation and the changing nature of technology is accelerating the challenges presented by financial and cyber crime. This unit is designed to provide an in-depth understanding of the many facets of financial and cyber crime and an understanding of the importance of cyber security for business and the community. The unit allows awareness of fraudulent behaviour associated with specific emerging global issues, problems, threats and opportunities relating to globalisation, e-commerce, privacy and multiple jurisdictions. Students embark on a research process that identifies and selects recent case studies that provide insight into a range of emerging sophisticated and innovative cyber methodologies utilised by fraudsters. The unit also includes an introduction to relevant research methods.
|
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
Extensions
You are expected to submit written assessment tasks by the published due date UNLESS you have received written permission to submit your work at a later date from the Unit convenor. No extensions will be granted. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late (for example, 25 hours late in submission – 20% penalty). This penalty does not apply for cases in which an application for disruption of studies is made and approved. No submission will be accepted after solutions have been posted.
Details of how the University defines serious and unavoidable disruption to studies, and information about the processes involved, are contained in the Special Consideration Policy.
Assignment Preparation and Submission
At the start of each assignment (Literature Review and Case Study), you are required to paste in the following words and insert your name:
I, [Insert your name], declare that:
This assignment is entirely my own work based on my personal study and/or research.
The password-protected component of your Unit's web site is hosted on Online Learning @ MQ. For information about confidentiality when studying online, see http://online.mq.edu.au/uw/conf.html
The submission of assignments (Literature Review and final Case Study) via iLearn involves an inbuilt automatic check for plagiarism using the Turnitin application.
It is important to note that the LR and Case Study documents must be uploaded and submitted correctly by clicking the 'submit' button on their designated unit website link. Documents left as drafts will not be marked.
Name | Weighting | Hurdle | Due |
---|---|---|---|
Reflective Review | 20% | No | Week 4/Week 6 |
Literature Review (LR) | 30% | No | 6th May 2018 |
Case Study | 50% | No | 10 June 2018 by 5 pm |
Due: Week 4/Week 6
Weighting: 20%
The Reflective Review is in the form of two steps:
1. Formal Online Forum. The online forum will be conducted in Module One. This Forum is analogous to tutorials in a traditional course. You are required to participate actively in the Forum, and your contributions will be assessed.
Online Forum 1: Monday 19 March- Thursday 22 March
Submission: online through unit website.
Important: Once a group has had an initial post made each subsequent posting must be threaded to a previous post within that group. If a post has begun in a group students must not make a separate posting outside that initial post and thread. Any separate posts made after a threaded posting has commenced will not be graded.
Details and requirements of the Online Forum and the topic designated for the Forum is listed on the unit website, in the ACCG877 Assessment Guide and will be discussed in the Module One block seminar session.
2. Reflective Critique. This assessment provides a link between formal learning and personal meaning. In a one page critique (330 words maximum, 1.5 spacing), refer to the online forum, the Module One seminar and the requirements and workload in the unit to :
Your contribution to the Forum and your Reflective Critique paper will be given a composite rating (= K+A+P): See the Assessment Guide on ilearn for more details on the Reflective Review requirements.
Due date: 5pm 8th April 2018.
Submission: Reflective Critique to be submitted online through the 'Reflective Review' link on the unit website by 5pm on the 8th April 2018 (due date). Submission will be subject to a check by Turnitin. Attached to the submission must be a statement as set out in "General Assessment Information' section of this unit guide under the heading 'Assignment Preparation and Submission'. This statement is not included in the final word count. Ensure that the RR document is uploaded and submitted correctly by clicking the 'submit' button. Documents left as drafts on the submission site will not be marked.
Penalty: This assignment is to be a concise word processed document and English expression is very important in this task. Late assignments will incur a 10% penalty per day or part thereof as detailed under the General Assessment Information.
Extension: No extensions will be granted unless approval has been given under the Special Consideration Policy.
Due: 6th May 2018
Weighting: 30%
The Literature Review is designed to effectively enhance research skills and help students learn to synthesise, analyse and interpret information using appropriate disciplinary content and methodology. The LR will act as a first step in the preparation of your final case study. The criteria for the LR assignment will be discussed in depth and sample literature reviews will be discussed at the Module One and Two on campus block sessions and will also be posted online on the unit website.
Your approach to the literature review should include the following steps.
• Provide a brief, informative and relevant title that establishes the financial crime/cyber security topic which is to be explored in the proposed case study research.
• Draw upon existing knowledge to identify a significant issue which relates to an aspect of financial crime/cyber security.
• Define your topic using appropriate journal articles, class readings, or scholarly reviews of the literature for background information.
• Use databases to find books, articles and web sites relevant to your topic.
• Evaluate the types and appropriateness of information used and describe what is known about this issue in the relevant literature.
• Complete an annotated bibliography explaining why each resource is appropriate for your paper and how it will support the case study.
Total word count: 1,000 words.
Further discussion about the structure of the LR will be covered in the Module 1 on-campus session on the 10 March, 2018.
Submission: Online through through the Literature Review link unit website by 5pm on the 6th March 2018 (due date). Submission will be subject to a check by Turnitin. Attached to the submission must be a statement as set out in "General Assessment Information' section of this unit guide under the heading 'Assignment Preparation and Submission'. This statement is not included in the final word count. Ensure that the LR document is uploaded and submitted correctly by clicking the 'submit' button. Documents left as drafts on the submission site will not be marked.
Penalty: This assignment is to be a concise word processed document and English expression is very important in this task. Late assignments will incur a 10% penalty per day or part thereof as detailed under the General Assessment Information.
Extension: No extensions will be granted unless approval has been given under the Special Consideration Policy.
Due: 10 June 2018 by 5 pm
Weighting: 50%
The case study deals with a particular aspect of financial crime/cybersecurity. You are required to describe the trend/s and issues (for example, an increase/decrease, legislative reform, a change in character, sequence of activities, a problem) of your case study and analyse the repercussions of that financial crime on business and the community. The structure of the finished Case Study is:
1. Short introduction
2. Case Description (In final form, this should be no more than 1000 words)
3. Case Analysis (In final form, this should be around 1500 words)
4. Short conclusion summarising the main points you've made in your 'Analysis'
5. List of literature you've cited.
Total word count: 3,000 words
Submission: Online through the Case Study link unit website by 5pm on the 10th June, 2018 (due date). Submission will be subject to a check by Turnitin. Attached to the submission must be a statement as set out in "General Assessment Information' section of this unit guide, under the heading 'Assignment Preparation and Submission'. This statement is not included in the final word count. Ensure that the case study document is uploaded and submitted correctly by clicking the 'submit' button. Documents left as drafts will not be marked.
Penalty: This assignment is to be a concise word processed document and English expression is very important in this task. Late assignments will incur a 10% penalty per day or part thereof as detailed under the General Assessment Information. Note that non-submission of the case study will result in an automatic fail grade for the unit.
Extension: No extensions will be granted unless approval has been given under the Special Consideration Policy.
The unit is delivered in compressed mode over three block sessions. Each block session will cover one complete Module with topics as listed in the Unit Schedule. In the on-campus session the lecturer will lead discussion covering the key points of the relevant material. The format and approach for this session will vary but may include activities where students will be asked to participate. This will require students to have pre-read the material and prepare for each activity listed..
The on-campus sessions provide opportunities to explore concepts covered in the Modules through seminars, discussions and group activities. Note that students studying in Australia on international study visas are required to attend all on-campus sessions. For other students, attendance is strongly encouraged but not a course requirement.
Date |
Time? |
Focus? |
Saturday 1 = Sat 10 March |
9.00am – 5.00pm |
Module 1, RR & LR, Case study |
Saturday 2 = Sat 14 April |
9.00am – 5.00pm |
Module 2, LR; Case Study description |
Saturday 3 = Sat 26 May |
9.00am – 5.00pm |
Module 3, Final Case Study analysis |
Please refer to http://www.timetables.mq.edu.au/ for clarification of the Session timetable.
Unit web page
Course material is available on the Macquarie University learning management system (iLearn).
The web page for this unit can be found at http://mq.edu.au/iLearn/index.htm
Research Tools
There are no prescribed textbooks for the unit. The content of this unit will be supplemented with readings available on this unit web site listed under the Modules reading list and online journals. This reading list may be supplemented during the session is required. The electronic Journals and texts listed under the heading 'Useful Internet Sites' on this page are also useful as additional references and are available in the library and, unless otherwise referenced, electronic publications can be downloaded from e-Reserve.
Technology Used and Required
Students are expected to have:
Useful internet sites:
Databases from all Australian jurisdictions:Australasian Legal Information Institute http://www.austlii.edu.au/
For guidance in citing legal references:Australian Guide to Legal Citation, 3rd Edition, Melbourne University Law Review Association http://www.law.unimelb.edu.au/469B9330-4CA2-11E2-95000050568D0140
Australian Institute of Criminology publications
Hutchings, A. 2012, 'Computer security threats faced by small businesses in Australia', Trends & issues in crime and criminal justice no.433, Australian Institute of Criminology, Canberra.
Jorna, P. & Smith, R.G. 2015 'Fraud against the Commonwealth Report to Government 2010–11 to 2012–13', Monitoring Report no. 24, Australian Institute of Criminology, Canberra.
Levi M & Smith, RG 2011. 'Fraud Vulnerabilities and the Global Financial Crisis', Trends and Issues in Crime and Criminal Justice, No. 422, Australian Institute of Criminology, Canberra.
Ross S & Smith, RG 2011. 'Risk Factors for Advance Fee Fraud Victimisation', Trends and Issues in Crime and Criminal Justice, No. 420, Australian Institute of Criminology, Canberra.
Smith RG & Walker J 2010. The Illegal movement of Cash and Bearer Negotiable Instruments: Typologies and Regulatory Responses, in Trends and Issues in Crime and Criminal Justice, No. 402, Australian Institute of Criminology, Canberra.
Smith RG, McCusker R & Walters J 2010. 'Financing of terrorism: Risks for Australia', Trends and Issues in Crime and Criminal Justice, No 394, Australian Institute of Criminology, Canberra.
Journal articles
Braithwaite J 2011 'Diagnostics of white collar crime prevention', Criminology & Public Policy 9(3) 621-626, 2010
Smith RG 2011. 'The Criminogenic Effects of Cybercrime Prevention Advice – And How to Avoid Them, Targeting Tax Crime', Issue 4, February, pp. 26-7, Australian Taxation Office, Canberra.
Smith RG 2010. 'Organised Identity Theft in a Global Perspective', Security Solutions, No. 68, October, pp.88-92
Smith RG 2008, 'Coordinating individual and organisational responses to fraud', Crime, law and social change, vol. 49, no. 5, pp. 379-96.
Choo K-K R& Smith RG 2007, 'Criminal exploitation of online systems by organised crime groups', Asian Journal of Criminology, Vol 2 no. 2.
Books and reports
Graycar A& Smith RG (eds) 2011. 'Handbook of Global Research and Practice in Corruption', Edward Elgar Publishing Ltd: Cheltenham.
Choo K-K R, Smith RG & McCusker R 2007. 'Future directions in technology-enabled crime: 2007-09', Research and Public Policy Series No 78. pp. 1-131, Australian Institute of Criminology, Canberra.
Module 1: Global Financial Trends and Reform |
On campus block session
|
Online delivery |
||
|
Topic/Subsection |
Readings (see Readings List Module 1)
|
Seminar Contents |
Online Delivery |
1.1 Introduction |
|
See Online delivery |
Kickstart: Introduction to unit.
|
|
1.2 Legal Context |
|
See online delivery |
Discussion on cyber security, including the problems/issues/threats re privacy, e-commerce, the Internet and globalization. |
|
1.3 Research Skills Strategies |
|
See online delivery |
Research skills strategies evaluation / analysing/ reflecting explained. |
|
1.4 Process/Ethical Governance |
|
See online delivery |
Review relevant fraud legislation/legal framework of cyber security and moral and ethical issues in business. |
|
|
1.5 Cybercrime |
|
Recognition that cybercrime is now the global driver of fraud. Analysis of political, economic, social, cultural and environmental implications of ICT use. Download online/hard copy media articles on any form of cybercrime and bring to the seminar for discussion. |
|
|
1.6 Financial Crime in Southern China |
Guest Lecture*
|
Includes a focus on the rising impact and threat of cybercrime in southern China. |
|
Module 2 : Asset Misappropriations |
On campus block session |
Online delivery |
||
|
Topic/Subsection |
Readings and Activity (see Readings List Module 2) |
|
|
2.1 Occupational Fraud and Abuse |
Video Presentation: ‘How Fraud Hurts You and Your Organisation’. |
Impact of fraud on victim organisations, fraudster red flags and fraud diamond unpacked. Cybercrime identified as underpinning increasing occupational fraud activity. Decide on a final topic for your case study, prepare a brief topic summary and bring three copies to discuss with other students in the seminar. |
|
|
2.2 Financial Fraud ‘Schemes’ |
Case Studies 19, 20 and 21st Century
|
See online delivery |
Financial fraud schemes often are repeated in history but cybercrime now adds a new insidious dimension to fraud schemes requiring greater cyber security. |
|
2.3 Money Laundering and Capital Flight
|
Guest Lecture*
|
Seminar examines money laundering and capital flight across South-east Asia and the impact of digital technology in facilitating the migration of traditional organized crime online. |
|
|
2.4 Shadow Economy |
|
See online delivery |
|
|
|
|
|
|
|
Module 3 :Corruption |
On-campus block session |
Online Delivery |
||
|
Topic/Subsection |
Readings and Activity (see (see Readings List Module 3) |
|
|
|
3.1 Bribery |
|
See online delivery |
Case Study: Financial Crime and Cyber security in the Mining and Construction Industry |
3.2 Conspiracy |
Guest Lecture*
|
Case Study: Strike Force Whittlesford. Illustrates the investigative tracking of an extensive cyber web of deceit. |
|
|
|
3.3 Social Engineering/ Identity Theft |
View www.social-engineering.org in preparation for seminar discussion |
Dialogue on the aspects, tools and skills of professional and malicious social engineering as well as the role of cyber security in protecting modern business. Bring completed case description and case analysis and discuss with other class members in the seminar.
|
|
|
3.4 Environment Fraud |
|
See online delivery |
|
|
3.5 Final Revision |
Film ‘Crimes Of Fashion’ |
Reflecting back discussion |
|
Macquarie University policies and procedures are accessible from Policy Central (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policy-central). Students should be aware of the following policies in particular with regard to Learning and Teaching:
Undergraduate students seeking more policy resources can visit the Student Policy Gateway (https://students.mq.edu.au/support/study/student-policy-gateway). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.
If you would like to see all the policies relevant to Learning and Teaching visit Policy Central (https://staff.mq.edu.au/work/strategy-planning-and-governance/university-policies-and-procedures/policy-central).
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/study/getting-started/student-conduct
Results shown in iLearn, or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au.
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to improve your marks and take control of your study.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/.
When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.
Our postgraduates will be able to demonstrate a significantly enhanced depth and breadth of knowledge, scholarly understanding, and specific subject content knowledge in their chosen fields.
This graduate capability is supported by:
Our postgraduates will be capable of utilising and reflecting on prior knowledge and experience, of applying higher level critical thinking skills, and of integrating and synthesising learning and knowledge from a range of sources and environments. A characteristic of this form of thinking is the generation of new, professionally oriented knowledge through personal or group-based critique of practice and theory.
This graduate capability is supported by:
Our postgraduates will be capable of systematic enquiry; able to use research skills to create new knowledge that can be applied to real world issues, or contribute to a field of study or practice to enhance society. They will be capable of creative questioning, problem finding and problem solving.
This graduate capability is supported by:
The unit is now also a core unit in the Master of Cyber Security, Cyber Governance and Management specialisation.
There is now only one Online Forum and this has been reduced from five days to four days.
The Reflective Task assessment has been deleted.
Some topics are now delivered online (see unit schedule).
Suggested Readings:
MODULE 1 Global Financial Trends and Reform
Introduction/Legal Context
Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 NSW http://www.austlii.edu.au/au/legis/nsw/num_act/caiafoa2009n99500.pdf
Criminal Code (Theft, Fraud, Bribery and Related Offences) Amendment Act 2004 (ACT) http://www.legislation.act.gov.au/a/2004-15/20040409-12338/pdf/2004-15.pdf
Criminal Code Amendment (Theft, Fraud, Bribery and related Offences) Act 2000 (Cth)http://www.austlii.edu.au/au/legis/cth/consol_act/ccafbaroa2000505/
Cybercrime Act 2001, No. 161,200 (Cth) https://www.legislation.gov.au/Details/C2004A00937
Cybercrime Legislation Amendment Act 2012, No. 120, 2012 (Cth) https://www.legislation.gov.au/Details/C2012A00120
Hutchings A. 2012, 'Computer security threats faced by small businesses in Australia', Trends & issues in crime and criminal justice no. 433, Australian Institute of Criminology, Canberra.
Research Skills
Morley-Warner, T. (2001) Academic writing is….A guide to writing in a university context, University of Technology, Sydney: CREA.
Process/Ethical Governance
Braithwaite J (2011) Diagnostics of white collar crime prevention, Criminology & Public Policy 9(3) 621-626, 2010.
Jorna, P. & Smith, R.G. (2015) 'Fraud against the Commonwealth Report to Government 2010-11 to 2012-2013,' Monitoring Report No. 24, Australian Institute of Criminology, Canberra.
Levi M & Smith, R.G. (2011) Fraud Vulnerabilities and the Global Financial Crisis, Trends and Issues in Crime and Criminal Justice, No. 422, Australian Institute of Criminology, Canberra.
Smith R.G. (2008) Coordinating individual and organisational responses to fraud, Crime, law and social change, vol. 49, no. 5, pp. 379-96.
Occupational Fraud and Abuse
Association of Certified Fraud Examiners (ACFE) Report to the Nations, 2016 Global Fraud Survey, https://www.acfe.com/rttn2016/docs/2016-report-to-the-nations.pdf
Smith RG & Walker J (2010) The Illegal movement of Cash and Bearer Negotiable Instruments: Typologies and Regulatory Responses, in Trends and Issues in Crime and Criminal Justice, No. 402, Australian Institute of Criminology, Canberra.
Ross S & Smith, RG (2011) Risk Factors for Advance Fee Fraud Victimisation, Trends and Issues in Crime and Criminal Justice, No. 420, Australian Institute of Criminology, Canberra.
Cybercrime
Chawki, M,, Darwish, A., Khan, M.A., Tyagi.S. (2015) Cybercrime, Digital Forensics and Jurisdiction, Springer International Publishing
Choo K-K R & Smith RG (2007) Criminal exploitation of online systems by organised crime groups, Asian Journal of Criminology vol 2 no. 2.
Choo K-K R, Smith RG & McCusker R (2007) Future directions in technology-enabled crime: 2007-09. Research and Public Policy Series No 78. pp. 1-131, Australian Institute of Criminology, Canberra.
Hayden, E.C. (2015) Cybercrime fighters target human error, Nature, Vol. 518(7539), p.282.
Smith RG (2010) Organised Identity Theft in a Global Perspective, Security Solutions, No. 68, October, pp.88-92
Smith RG (2011) The Criminogenic Effects of Cybercrime Prevention Advice – And How to Avoid Them, Targeting Tax Crime, Issue 4, February, pp. 26-7, Australian Taxation Office, Canberra.
Environmental Fraud
Bergenas, J. & Knight, A. (2015) "Green Terror: Environmental Crime and Illicit Financing." SAIS Review of International Affairs, vol. 35 no. 1, pp. 119-131. Project MUSE, doi:10.1353/sais.2015.0004
Bricknell, S (2010) Environmental Crime in Australia, AIC Research and Public Policy Series, Australian Institute of Criminology, Canberra.
Environment Protection and Biodiversity Act 1999 (Act No. 91 of 1999 as amended) (Cth) http://www.comlaw.gov.au/Details/C2012C00801
Elliot, L (Ed) (2007) ‘Transnational environmental crime in the Asia-Pacific: A workshop report’, Report of the Public Forum on Transnational Environmental Crime in the Asia Pacific, 22 March, Australian National University, Canberra, p. 42.
MODULE 2: Asset Misappropriations
Social Engineering
Financial Crime in Southern China
Dawnay, Kit (2012) Risky business - Money laundering in Macau, Jane's Intelligence Review, 28 Feb.
Greenwood, Verity A. and Dwyer, Larry (2016) ‘Reinventing Macau tourism: gambling on creativity?’, Current Issues in Tourism, 05/2016; DOI:10.1080/13683500.2016.1187585.
Isaacs, Matt (2011) The Macau connection, Reuters Special Report, 11 Mar., Reuters News
Johnstone, Maurice (2010) Korea criminals - Pyongyang's persistent illegal activities, Jane's Intelligence Review 16 Sept.
Peng Wang (2012) Partners in crime - Triad groups move to exploit mainland China, Jane’s Intelligence Review, 29 Oct.
Yingli Han (2011) Hong Kong Capital Flight: Determinants and Features, Master of Commerce and Management Thesis, Canterbury, New Zealand: Lincoln University, Digital Thesis, Chapters 1 and 2, pp. 1-35 (Available Google).
Financial Fraud 'Schemes'
Dawnay, Kit (2012) Risky business - Money laundering in Macau, Jane's Intelligence Review, 28 Feb.
Isaacs, Matt (2011) The Macau connection, Reuters Special Report, 11 Mar., Reuters News
Johnstone, Maurice (2010) Korea criminals - Pyongyang's persistent illegal activities, Jane's Intelligence Review 16 Sept.
McBarnet, Doreen J. (2004) Crime, compliance and control, Ashgate/Dartmouth Publishers, Burlington, VT (see Chapter 10)
Oppenheimer, J (2009) Madoff with the Money, Wiley Publishers, Hoboken, New Jersey.
Peng Wang (2012) Partners in crime - Triad groups move to exploit mainland China, Jane’s Intelligence Review, 29 Oct.
Raphael, Adam (1995) Ultimate Risk : the inside story of the Lloyd’s catastrophe, Four Walls Eight Windows Publishers, New York.
Yingli Han (2011) Hong Kong Capital Flight: Determinants and Features, Master of Commerce and Management Thesis, Canterbury, New Zealand: Lincoln University, Digital Thesis, Chapters 1 and 2, pp. 1-35 (Available Google Scholar)
MODULE 3 Corruption
Bribery
Caripis, L., Combatting corruption in mining approvals: assessing the risks in 18 resource-rich countries, Transparency International and Transparency International Australia, 2017.
Graycar A & Smith RG (eds) (2011) Handbook of Global Research and Practice in Corruption, Edward Elgar Publishing Ltd: Cheltenham.
Stasavage, D. and Daubree, C. (1998) Determinants of Customs Fraud and Corruption: Evidence from Two African Countries, OECD Development Centre Working Papers, 138, 1 August, 1998.
Conspiracy
Duffy, M. (2005) ‘Fraud on the Market’: judicial approaches to causation and loss from securities nondisclosure in the United States, Canada and Australia’, 29, Melbourne University Law Review, 621.
Marston, G. and Walsh, T (2008) ‘Case of Misrepresentation: Social Security Fraud and the Criminal Justice System in Australia’, 17, Griffith Law Review 285.
Shadow Economy
Baxt, R (2012) Securities and financial services law, LexisNexis Butterworths, Chatswood, NSW (see Chapter 17).
Qu, C.Z. (2008) Managed investments and insider trading: regulation and liability, Sandstone Academic Press, Melbourne.
Scheider, F. (2007) The shadow economy : an international survey, Cambridge University Press, Cambridge.
Money Laundering and Capital Flight
Abdulsamed, Farah (2011) Somali Investment in Kenya, London: Chatham House, Briefing Paper, March.
Ashin, Paul (2012) 'Dirty Money, Real Pain', Finance & Development, (International Monetary Fund), 49(2), 38-42.
Burger, Ethan S. (2009) 'Following only some of the money in Russia', Demokratizatsiya 17(1) , 41-70.
Christensen, John (2011) 'The looting continues: tax havens and corruption', Critical perspectives on International Business, 2011, Vol.7(2), p.177-196.
Smith RG, McCusker R & Walters J (2010) 'Financing of terrorism: Risks for Australia', Trends and Issues in Crime and Criminal Justice, No 394, Australian Institute of Criminology, Canberra.
UN Office of Drugs and Crime (2011) Estimating Illicit Financial Flows Resulting from Drug Trafficking and Other Transnational Crimes, Geneva.
U.S. Senate 2012 U.S. Vulnerabilities to Money Laundering, Drugs and Terrorist Financing: HSBC Case History, Washington, D.C. Permanent Subcommittee on Investigations.
Work Requirements
This Unit has been designed as a 4 postgraduate credit point Unit, requiring the equivalent of 13 weeks of work over one session. Being a four credit-points Unit you should expect to spend a minimum of 12 hours per week to meet the requirements of the Unit. As a guide students should spend the approximate amounts of time as listed on each of the following activities (Note: Each activity listed includes hours required for pre-reading and self-study):
|
Activities |
Hours |
1 |
3 Block on-campus sessions |
50 |
2 |
Assessment Task 1 ( Reflective Review) |
20 |
3 |
Assessment Task 2 (Literature Review (LR) |
30 |
4 |
Assessment Task 3 (Final Case Study) |
50 |
|
Total |
150 |
As a postgraduate student, you bring valuable knowledge and experience to the Unit. As you work through the Unit, try to:
In completing the Unit, you are expected to:
This unit uses research from external sources (references) and gives you practice in applying research findings in your assignments.
Recent Relevant Research by Convenor
Publications
Verity A. Greenwood and Larry Dwyer (2017) ‘Reinventing Macau tourism: gambling on creativity?’, Current Issues in Tourism, Vol. 20 , Issue. 6, pp. 580-602.
Verity A. Greenwood and Larry Dwyer (2015) ‘Consumer protection legislation: A neglected determinant of destination competitiveness? Journal of Hospitality and Tourism Management, Vol. 24, September, 2015.
Greenwood, V and Larry Dwyer (2014) ‘Challenges to Consumer Protection Legislation in Tourism Contexts’ Journal of Tourism Consumption and Practice, Vol. 6, 2. http://www.tourismconsumption.org/current.htm.
Conferences
Greenwood, Verity A. ‘Developing Macau Tourism : a Calculated gamble?’, Paper presented at School of Hospitality and Tourism Management Conference, Surrey, 22 July, 2016.
Greenwood, Verity A. ‘Navigating Evolving Global Trends in Financial Crime: a Tourism Focus’, BESTEN Think Tank, Berlin, 13 July 2016.
Greenwood, Verity A., ‘Surviving Participant Trauma and Grief as a Heuristic Researcher’, AAG Conference, San Francisco, 4 April, 2016.
Greenwood, Verity A. and Dwyer L, (2016) ‘Developing Macau Tourism: a calculated gamble?’ Paper presented 26th Annual CAUTHE Conference', Blue Mountains Tourism College, Sydney campus, February 4-6, 2016.
Greenwood, Verity.A. and Larry Dwyer ‘Consumer protection as essential to Destination Competitiveness’ (working paper- refereed). 25th Annual CAUTHE Conference 'Rising Tides and Sea Changes: Adaptation and Innovation in Tourism and Hospitality', Gold Coast campus, February 2-5 2015.
V.A. Greenwood and Larry Dwyer (2014) ‘Chinese ‘Hot Money’ Junkets and its implications for destination competitiveness in Macau’ , G20 First East-West Dialogue on Tourism and the Chinese Dream’, Gold Coast, 13-15th November, 2014 (working paper- refereed),14.11.14.
Greenwood, V.A. and Larry Dwyer, ‘Consumer Protection and Destination Competitiveness’, Consumer Behaviour in Tourism Symposium ‘Competitiveness, Innovation and Markets: The Multifaceted Tourists´ Role’, Brunico, Italy, December 4,, 2013.
Global & Sustainability
This unit provides an in-depth understanding of the many facets of financial crime and governance and allows appreciation of the political, economic, environmental, cultural and social repercussions of financial crime/cyber security at the global, regional and local level on business and the community. This unit addresses global and sustainability issues as direct areas of study and as necessary implications arising from the materials, assessment and academic discussion and debate in classes/seminars. We promote sustainability by developing ability in students to research and locate information within the financial crime and governance specialisation. We aim to provide students with an opportunity to obtain skills which will benefit them throughout their career.
The unit materials have a reference list at the end of each chapter/module/text containing all references cited by the author. These provide some guidance to references that could be used to research particular issues.
Global context:
Sustainability context:
- the physical environment and possible disparities between its private economic costs and the social costs of its activities and the external costs of business activities
- Pollution control; environment protection and the need for higher global environmental standards.