Chapter 7: Recommendations and Conclusion
INTRODUCTION Virtual economic crime is an interesting phenomenon. Throughout human history we have seen how technology advances our lives and also lets criminals devise new ingenious ways of breaking the laws that society have agreed on. Virtual worlds are just one new opportunity for those wishing to break the law, but the manner in which virtual worlds could be regulated is very uncertain. Little regulation is in place to control and monitor the goings-on in virtual worlds, enabling criminals to take advantage of these loopholes in the law and commit financial crime. As we already know, financial crime can have devastating effects. For example, financial crime can be the starting point of funding terrorist activity. Within this book an examination of virtual economic crime and in particular of money laundering within Second Life has taken place. Each chapter has added its own twist and turn to the multifaceted aspects of virtual economic crime. In the second chapter, the history and evolution of the virtual world, Second Life, was discussed. The aim of the chapter was to explain and highlight how virtual worlds, although based on the internet, have evolved and grown in similar ways to how real societies have evolved and developed. The point of this was to explain that although the ethos of these worlds is to create a second life outside the realms of the laws and physics of the real world, the human psyche is ingrained in the structure and organisation of virtual worlds. For example, even...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.