Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Privacy based triage of suspicious activity reports using offline large language models (2024)
Book Chapter
Legg, P., Ryder, N., Bourton, S., Johnson, D., & Walker, R. (in press). Privacy based triage of suspicious activity reports using offline large language models. In Advancements in Cyber Crime Investigations and Modern Data Analytics. CRC Press / Taylor and Francis

Suspicious Activity Reports (SAR) form a vital part of incident response and case management for the investigation of known or suspected money laundering. However, those submitting SARs, and those tasked with analysing SARs, often find the task overw... Read More about Privacy based triage of suspicious activity reports using offline large language models.

Corporate criminal liability and the identification doctrine - A critical reflection (2023)
Book Chapter
Bourton, S., Hall, D., Johnson, D., & Ryder, N. (in press). Corporate criminal liability and the identification doctrine - A critical reflection. In Criminal Liability of Collective Entities: Dogmatic and Political-Criminal Profiles over Twenty Years after Legislative Decree 231/2001 (405-432). Italy: University of Bergamo

The identification doctrine frustrates the prosecution of companies for economic crimes in the United Kingdom (UK). This is because, while the identification and attribution of criminal intent may be straightforward in cases concerning small companie... Read More about Corporate criminal liability and the identification doctrine - A critical reflection.