1. Abd Rahman, M. R. (2020). Online Scammers and Their Mules in Malaysia. Jurnal Undang-Undang Dan Masyarakat, 26, 65–72. https://doi.org/10.17576/juum-2020-26-08
2. Abdul Rani, M. I., Zolkaflil, S. & Syed Mustapha Nazri, S. N. F. (2022). The money mule red flags in anti-money laundering transaction monitoring investigation. International Journal of Business and Economy, 4(1), 150-163. https://myjms.mohe.gov.my/index.php/ijbec/article/view/17658/9295
3. Ang, R. (2022). 157 suspected scammers and money mules linked to nearly 500 cases under probe in Singapore. The Star. https://www.thestar.com.my/tech/tech-news/2022/02/11/157-suspected-scammers-and-money-mules-linked-to-nearly-500-cases-under-probe-in-spore
4. Bank Negara Malaysia (2014). National Risk Assessment on money laundering & terrorism financing. https://amlcft.bnm.gov.my/AMLCFT03.html
5. Barrett, C. (2021, March 3). Money mule scams target ‘Generation Covid’. Financial Times. https://www.ft.com/content/82efa8c0-be53-4da7-879f-d2a9f3f47e5f
6. Bernard, S. (2021). Financial services firms have a lot to lose from a cyber attack. Zurich North America. https://insights.zurichna.com/financial-services-firms-have-a-lot-to-lose-from-a-cyber-attack
7. Chen, T.-H. (2020). Do you know your customer? Bank risk assessment based on machine learning. Applied Soft Computing Journal, 86, 1–7. https://doi.org/10.1016/j.asoc.2019.105779
8. Choo, R. K.-K. (2011). Trends & Issues in Crime and Criminal Justice. Trends & Issues in Crime and Criminal Justice, 408(February 2011), 1–6.
9. Chorafas, D. N. (2006). Know your customer and his or her profile. In D. N. Chorafas (Ed.), Wealth Management (pp. 24–45). Butterworth-Heinemann. https://doi.org/10.1016/B978-075066855-2.50002-7
10. Cox, D. (2014). Handbook of Anti-Money Laundering. John Wiley & Sons Ltd.
11. Custers, B. H., Pool, R. L., & Cornelisse, R. (2019). Banking malware and the laundering of its profits. European Journal of Criminology, 16(6), 728–745. https://doi.org/https://doi.org/10/1177/1477370818788007
12. de Smet, D., & Mention, A. L. (2011). Improving auditor effectiveness in assessing KYC/AML practices: Case study in a Luxembourgish context. Managerial Auditing Journal, 26(2), 182–203. https://doi.org/10.1108/02686901111095038
13. Dunham, K. (2006). Money mules: An investigative view. The EDP Audit, Control, and Security Newsletter, 33(8), 6. https://doi.org/10.1201/1079.07366981/45802.33.8.20060201/91957.2
14. Elsinger, H., Lehar, A., & Summer, M. (2006). Risk assessment for banking systems. Management Science, 52(9), 1301–1314. https://doi.org/10.1287/mnsc.1060.0531
15. Esoimeme, E. E. (2021). Identifying and reducing the money laundering risks posed by individuals who have been unknowingly recruited as money mules. Journal of Money Laundering Control, 24(1), 201–212. https://doi.org/doi.org/10.1108/JMLC-05-2020-0053
16. Federal Bureau Investigation (2021, December 3). Don’t be a mule: Awareness can prevent crime. https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/money-mules
17. Florêncio, D. & Herley, C. (2010). Phishing and money mules. 2010 IEEE International Workshop on Information Forensics and Security, 1–5. https://doi.org/10.1109/WIFS.2010.5711465
18. Foy, K. (2021). Suspected ‘money mule’ (22) arrested as part of operation into €1.1m fraud. The Independent. https://www.independent.ie/news/suspected-money-mule-22-arrested-as-part-of-operation-into-11m-fraud-40151151.html
19. Hashim, R. & Abd Rahman, A. (2020). Peranan mule account dalam penggubahan wang haram di Malaysia: Satu kajian perbincangan melalui kajian kes. International Journal of Social Science Research, 2(4), 108-145.
20. Hollander, Y. (2000). Prevent web site defacement. Internet Security Advisor, 3(6), 2–4.
21. Howard, R., Thomas, R. & Winterfeld, S (2009). Cyber fraud: Principles, trends and mitigation techniques. In Howard, R., Thomas, R. & Winterfeld, S. (Eds), Cyber fraud: Tactics, Techniques and Procedures. CRC Press.
22. Hülsse, R (2017). The money mule: Its discursive construction and the implications. Vanderbilt Journal of Transnational Law, 50, 1007-1032. https://heinonline.org/HOL/LandingPage?handle=hein.journals/vantl50&div=32&id=&page=
23. Hutchings, A. (2014). Crime from the keyboard: Organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1), 1–20. https://doi.org/10.1007/s10611-014-9520-z
24. Jadavji, S. (2011). Fraud and money laundering: What’s the connection?. Acams Today. https://www.acamstoday.org/fraud-and-money-laundering-whats-the-connection/
25. Jakobsson, M. (2005). Modeling and preventing phishing attacks. In A. S. Patrick & M. Yung (Eds.), Financial Cryptography.
26. Kondalwar, M. N., & Shelke, C. J. (2014). Remote Administrative Trojan/Tool (RAT). International Journal of Computer Science and Mobile Computing, 3(3), 482–487.
27. Mansour, A. Z., Ahmi, A. & Popoola, O. M. J. (2020). The personality factor of conscientiousness on skills requirement and fraud risk assessment performance. International Journal of Financial Research, 11(20), 405-415. https://doi.org/10.5430/ijfr.v11n2p405
28. Mat-Isa, Y., Sanusi, Z. M., Haniff, M. N., & Barnes, P. A. (2015). Money laundering risk: From the bankers’ and regulators perspectives. Procedia Economics and Finance, 28(April), 7–13. https://doi.org/10.1016/s2212-5671(15)01075-8
29. McGlasson, L. (2010). Agencies issue ACH, wire fraud advisory. Bank Info Security. https://ww.bankinfosecurity.com/agencies-issue-ach-wire-fraud-advisory-a-2298
30. Mohd-Nassir, M. D., Mohd-Sanusi, Z. & Ghani, E. K (2016). Effect of brainstorming and expertise on fraud risk assessment. International Journal of Economics and Financial Issues, 6(S4), 62-67. https://www.econjournals.com/index.php/ijefi/article/view/2690
31. Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. Journal of Economic Perspectives, 23(3), 3–20. https://doi.org/10.1257/jep.23.3.3
32. Mugarura, N. (2016). Uncoupling the relationship between corruption and money laundering crimes. Journal of Financial Regulation and Compliance, 24(1), 74-89. https://doi.org/10.1108/JFRC-01-2014-0002
33. Mutch, J. (2020). Watch out for 'money mules' tactics by criminals, police say. The Boston News. https://www.theboltonnews.co.uk/news/18647800.watch-money-mules-tactics-criminals-police-say/
34. Naheem, M. A. (2015). Money laundering using investment companies. Journal of Money Laundering Control, 18(4), 438–446. https://doi.org/doi.org/10.1108/JMLC-10-2014-0031
35. Nguyen, T., & Luong, H. T. (2021). The structure of cybercrime networks: transnational computer fraud in Vietnam. Journal of Crime and Justice, 44(4), 419-440. https://doi.org/10.1080/0735648X.2020.1818605
36. Nicolas, S., & May, P. (2017). Building an effective compliance risk assessment programme for a financial institution. Journal of Securities Operations & Custody, 9(3), 215–224.
37. Parthasarathy, P. (2021). How banks can address rising cyber security threats to protect customers. The National News. https://www.thenationalnews.com/business/money/2021/09/15/how-banks-can-address-rising-cyber-security-threats-to-protect-customers/
38. Pemble, M. (2005). Evolutionary trends in bank customer-targeted malware early history. Network Security, 10, 4–7. https://doi.org/10.1016/S1353-4858(05)70288-9
39. Popoola, O. M. J., Che-Ahmad, A. & Samsudin, R. S. (2014). Impact of task performance fraud risk assessment on forensic skills and mindsets: Experience from Nigeria. International Journal of Business and Social Science, 5(9), 1-9.
40. Reboredo, F. (2013). Socio-economic, environmental, and governance impacts of illegal logging. Environment Systems and Decisions, 33(2), 295-304. https://doi.org/10.1007/s10669-013-9444-7
41. Rusanov, G. & Pudovochkin, Y. (2020). Money laundering in the modern crime system. Journal of Money Laundering Control, 24(4), 860-868. https://doi.org/10.1108/JMLC-08-2020-0085
42. Sahajwala, R., & Van der Bergh, P. (2000). Supervisory risk assessment and early warning system. In Basel Committee on Banking Supervision Working Paper (Issue 4).
43. Shabbir, A., Shabir, M., Javed, A. R., Chakraborty, C., & Rizwan, M. (2022). Suspicious transaction detection in banking cyber–physical systems. Computers and Electrical Engineering, 97(January 2021), 1–17. https://doi.org/10.1016/j.compeleceng.2021.107596
44. Sundarakani, S., & Ramasamy, M. (2013). Consequences of money laundering in banking sector. Jurnal Teknologi, 64(2), 93-96. https://doi.org/10.11113/jt.v64.2243
45. Sutton, M. (2015). Majority of UAE online fraud victims unable to recover losses. Arabian Business. https://www.arabianbusiness.com/industries/technology/majority-of-uae-online-fraud-victims-unable-recover-losses-577750
46. Tang, L. (2020). Jail for woman who laundered S$ 128,000 from overseas scam victims after second chance from police. Today. https://www.todayonline.com/singapore/jail-woman-who-laundered-s128000-overseas-scam-victims-after-second-chance-police
47. The Wolfsberg Group. (2015). The Wolfsberg frequently asked questions on risk assessments for money laundering, sanctions and bribery & corruption. http://www.bis.org/publ/bcbs275.pdf
48. Veyder, F. (2003). Case study: Where is the risk in transaction monitoring?. Journal of Financial Regulation and Compliance, 11(4), 323–328. https://doi.org/10.1108/13581980310810606
49. Weeks-Brown, R. (2018). Countries are advancing efforts to stop criminals from laundering their trillions. Finance & Development, 55(4). International Monetary Fund. https://www.imf.org/external/pubs/ft/fandd/2018/12/imf-anti-money-laundering-and-economic-stability-straight.htm
50. Wood, V. (2020). UK banks accused of facilitating fraudsters and criminals after financial documents leaked. The Independent. https://www.independent.co.uk/news/uk/home-news/fincen-document-leak-uk-banks-fraud-crime-russian-oligarch-b509133.html
51. Yeoh, P. (2020). Banks’ vulnerabilities to money laundering activities. Journal of Money Laundering Control, 23(1), 122-135. https://doi.org/10.1108/JMLC-05-2019-0040
52. Zeidan, M. J. (2013). Effects of illegal behavior on the financial performance of US banking institutions. Journal of Business Ethics, 112, 313-324. https://doi.org/10.1007/s10551-012-1253-2