ABSTRACT

So long as there are weaknesses that can be exploited for gain, companies, other organizations and private individuals will be taken advantage of. This theoretically-based but hugely practical book focuses on what is generally seen as financial or economic crime: theft, fraud, manipulation, and corruption. Petter Gottschalk considers how, in some competitive environments, goals can 'legitimise' all kinds of means, and how culture can exert a role in relation to what is seen as acceptable or unacceptable behaviour by individuals. In Investigation and Prevention of Financial Crime he addresses important topics including organized crime, money laundering, cyber crime, corruption in law enforcement agencies, and whistleblowing, and provides expert advice about strategies for the use of intelligence to combat financial crime. The uniqueness of his approach to the subject lies in the way he is able to explain intelligence and intelligence processes in the wider context of knowledge and knowledge management. The numerous case studies throughout the book illustrate the 'policing' of financial crime from an intelligence, knowledge management and systems perspective. Law enforcers, lawyers, security personnel, consultants and investigators, as well as those in auditing and accountancy and with responsibilities for containing risk in banks, other financial institutions and in businesses generally, will find this an invaluable source of practical guidance. The book will also be of interest to advanced students and researchers in criminology and police science.

chapter |4 pages

Introduction

chapter 1|30 pages

Financial Crime Categories

chapter 2|24 pages

Knowledge Management

chapter 3|18 pages

Intelligence Sources

chapter 4|16 pages

Information Systems

chapter 5|16 pages

Intelligence Strategy

chapter 6|16 pages

Regulation and Response

chapter 7|28 pages

Investigating Financial Crime

chapter 8|16 pages

Executive Leadership

chapter 9|22 pages

Prevention Strategy

chapter 10|12 pages

Corporate Social Responsibility

chapter 11|8 pages

Information Technology Strategy

chapter 12|20 pages

Applying Investigative Knowledge

chapter 13|4 pages

Conclusion