Keywords
policing
cryptocurrency
criime
cryptocurrency
criime
How to Cite
Cryptocurrency and law enforcement responses. (2018). Academic Journal of Internal Affairs, 66(10), 71-87. https://doi.org/10.38146/BSZ.2018.10.5
Abstract
The author provides an overview of potential criminal activity related to cryptocurrencies along applicable law enforcement responses.
Downloads
Download data is not yet available.
Similar Articles
- Árpád Budavári, Abstract Police , Academic Journal of Internal Affairs: Vol. 70 No. 5 (2022)
- István Szikinger, Can be the Hungarian word „rendészet” translated into English? , Academic Journal of Internal Affairs: Vol. 66 No. 4 (2018)
- Noémi Emőke Baráth, Mónika Füstös, „What may a policeman ask?” , Academic Journal of Internal Affairs: Vol. 66 No. 4 (2018)
- Ágota Németh, Tamás Suszter, Gergely Takács, Zsombor Hermann, Sándor Dragon, Ákos Erdélyi, Barbara Mágó, International Law Enforcement Observer IX. , Academic Journal of Internal Affairs: Vol. 71 No. 3 (2023)
- László Vájlok, Unique appearance of policing in different countries , Academic Journal of Internal Affairs: Vol. 70 No. 4 (2022)
- Gyula Bogdány, Examining injurious chest stabbings from various aspects I. , Academic Journal of Internal Affairs: Vol. 69 No. 5 (2021)
- Gyula Gaál, People Smuggling in Hungarian Criminal Law , Academic Journal of Internal Affairs: Vol. 71 No. 11 (2023)
- Zoltán Hautzinger, International Opportunities for the Study and Development of Police Science , Academic Journal of Internal Affairs: Vol. 71 No. 11 (2023)
- Árpád Budavári , Zsolt Lippai , Gergely Hlavacska , Ákos Erdélyi, János Tamás Skorka, International Law Enforcement Observer XI. , Academic Journal of Internal Affairs: Vol. 71 No. 9 (2023)
- Gábor Héra, The Japanese kōban community policing system , Academic Journal of Internal Affairs: Vol. 72 No. 1 (2024)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Béla Simon, Some issues of forensic expertise in criminal proceedings, especially in the field of information technology , Academic Journal of Internal Affairs: Vol. 64 No. 7-8 (2016)