Search results1 – 10 of over 162000
The purpose of this paper is to critically examine the Economic and Financial Crime Act 2004 to investigate whether there are defects in the 2004 Acts which enable abuse…
The purpose of this paper is to critically examine the Economic and Financial Crime Act 2004 to investigate whether there are defects in the 2004 Acts which enable abuse of the system by those who are responsible for fighting corruption and other economic crimes in Nigeria.
The paper adopts qualitative methods of research. The research studied the laws and regulations relevant to the recovery and management of proceeds of crime. However, personal experience of the author in the civil service, security and law enforcement accounts significantly.
The paper finds that the provisions of the EFCC Act 2004 relevant to the recovery of proceeds of crime and management of recovered assets are defective. The 2004 Act contains loopholes that enable mismanagement and diversion of recovered assets for personal use. Although the EFCC Act empowers the Minister of Justice to issue Regulations to regulate the activities of the EFCC, the Asset Tracing, Recovery and Management Regulations 2019 the Minister of Justice issued cannot be used to close the loopholes. Thus, there is an urgent need to amend the EFCC Act 2004.
Non-availability of data on the mismanagement of seized and recovered assets is a severe limitation. Thus, analysis in this research focuses on the laws and regulations to illustrates the defects in the 2004 Act. Also, the study could only use reported cases and incidence of corruption among the security and law enforcement to illustrate unsuitability of security and law enforcement for the position of the chairman of the EFCC.
There is no comprehensive work that examines the defects of the provisions of the 2004 Act that breeds lack of transparency in the recovery of proceeds of crime as well as mismanagement of recovered assets. Therefore, this paper is of value to the Nigerian Government and the National Assembly in considering amendments to the EFCC Act 2004. The paper is also of importance to researchers.
In view of the recent enhanced concerns of the SEC and PCAOB that Accounting Principles Board Opinion No. 23 (APB 23)–asserting firms do not comply with the “sufficient…
In view of the recent enhanced concerns of the SEC and PCAOB that Accounting Principles Board Opinion No. 23 (APB 23)–asserting firms do not comply with the “sufficient evidence” criteria of APB 23, we examine whether APB 23–asserting firms that declared their foreign earnings as permanently reinvested abroad are less likely to repatriate those foreign earnings under the American Jobs Creation Act (AJCA) of 2004, compared with similar non-asserting firms. The asserting firms are required to disclose sufficient evidence that validates an ability to meet their domestic cash needs with only earnings generated in the United States and their plans to indefinitely reinvest foreign earnings outside the United States. Estimates show that asserting firms are more likely to repatriate their foreign earnings than non-asserting firms. In addition, we find that the probability of making an election to repatriate permanently invested foreign earnings under the AJCA of 2004 is higher for firms with nonbinding foreign tax credit (FTC) limitations that have made an APB 23 declaration to permanently invest foreign earnings abroad. These findings suggest that asserting firms’ declarations to indefinitely reinvest foreign earnings abroad are not well grounded, thereby indirectly validating the SEC’s and PCAOB’s increased scrutiny for supporting evidence for APB 23 assertion. The estimates also show that the likelihood of making an election to repatriate foreign earnings under the AJCA of 2004 increases with asserting firms’ liquidity constraints and financial distress: the financial characteristics listed as part of APB 23 criteria of sufficient evidence and highlighted by the SEC and PCAOB comment letters, indicating that asserting firms raid permanently reinvested foreign earnings to satisfy their financial needs and constraints.
Workplace abuse, interpersonal mistreatment that occurs within the victim’s work environment, has attracted considerable attention in recent years. In this chapter, we…
Workplace abuse, interpersonal mistreatment that occurs within the victim’s work environment, has attracted considerable attention in recent years. In this chapter, we argue that problems with the conceptualization and measurement of workplace abuse have thwarted scientific progress. We identify two needs that we believe are especially pressing: (a) the need to consider the construct breadth of workplace abuse scales and (b) the need to test whether the measures of various types of workplace abuse effectively capture the unique qualities of the constructs they purport to assess. To guide our discussion of these issues, we conducted a review of the item content of several workplace abuse measures. We offer suggestions for addressing these and other conceptualization and measurement issues, and we discuss the possible implications of these issues on the study of the hypothesized predictors and consequences of workplace abuse.
This study provides a comprehensive framework of adaptation in triadic business relationship settings in the service sector. The framework is based on the industrial…
This study provides a comprehensive framework of adaptation in triadic business relationship settings in the service sector. The framework is based on the industrial network approach (see, e.g., Axelsson & Easton, 1992; Håkansson & Snehota, 1995a). The study describes how adaptations initiate, how they progress, and what the outcomes of these adaptations are. Furthermore, the framework takes into account how adaptations spread in triadic relationship settings. The empirical context is corporate travel management, which is a chain of activities where an industrial enterprise, and its preferred travel agency and service supplier partners combine their resources. The scientific philosophy, on which the knowledge creation is based, is realist ontology. Epistemologically, the study relies on constructionist processes and interpretation. Case studies with in-depth interviews are the main source of data.
Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption…
Smart card-based E-payment systems are receiving increasing attention as the number of implementations is witnessed on the rise globally. Understanding of user adoption behavior of E-payment systems that employ smart card technology becomes a research area that is of particular value and interest to both IS researchers and professionals. However, research interest focuses mostly on why a smart card-based E-payment system results in a failure or how the system could have grown into a success. This signals the fact that researchers have not had much opportunity to critically review a smart card-based E-payment system that has gained wide support and overcome the hurdle of critical mass adoption. The Octopus in Hong Kong has provided a rare opportunity for investigating smart card-based E-payment system because of its unprecedented success. This research seeks to thoroughly analyze the Octopus from technology adoption behavior perspectives.
Cultural impacts on adoption behavior are one of the key areas that this research posits to investigate. Since the present research is conducted in Hong Kong where a majority of population is Chinese ethnicity and yet is westernized in a number of aspects, assuming that users in Hong Kong are characterized by eastern or western culture is less useful. Explicit cultural characteristics at individual level are tapped into here instead of applying generalization of cultural beliefs to users to more accurately reflect cultural bias. In this vein, the technology acceptance model (TAM) is adapted, extended, and tested for its applicability cross-culturally in Hong Kong on the Octopus. Four cultural dimensions developed by Hofstede are included in this study, namely uncertainty avoidance, masculinity, individualism, and Confucian Dynamism (long-term orientation), to explore their influence on usage behavior through the mediation of perceived usefulness.
TAM is also integrated with the innovation diffusion theory (IDT) to borrow two constructs in relation to innovative characteristics, namely relative advantage and compatibility, in order to enhance the explanatory power of the proposed research model. Besides, the normative accountability of the research model is strengthened by embracing two social influences, namely subjective norm and image. As the last antecedent to perceived usefulness, prior experience serves to bring in the time variation factor to allow level of prior experience to exert both direct and moderating effects on perceived usefulness.
The resulting research model is analyzed by partial least squares (PLS)-based Structural Equation Modeling (SEM) approach. The research findings reveal that all cultural dimensions demonstrate direct effect on perceived usefulness though the influence of uncertainty avoidance is found marginally significant. Other constructs on innovative characteristics and social influences are validated to be significant as hypothesized. Prior experience does indeed significantly moderate the two influences that perceived usefulness receives from relative advantage and compatibility, respectively. The research model has demonstrated convincing explanatory power and so may be employed for further studies in other contexts. In particular, cultural effects play a key role in contributing to the uniqueness of the model, enabling it to be an effective tool to help critically understand increasingly internationalized IS system development and implementation efforts. This research also suggests several practical implications in view of the findings that could better inform managerial decisions for designing, implementing, or promoting smart card-based E-payment system.
This article focuses on one court case concerning the regulation of Anti-Abortion protesting and asks: (1) Do the various actors involved in this case recognize a tension…
This article focuses on one court case concerning the regulation of Anti-Abortion protesting and asks: (1) Do the various actors involved in this case recognize a tension between their actions and their broader beliefs concerning the regulation of political protests? (2) If this tension is recognized, how do the actors resolve it, and if it is not recognized, why is it not? While concerned with legal consciousness and cognitive dissonance, the article is framed by broader questions concerning tolerance and the interaction of law and political passions.
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks…
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.
Review of relevant literature.
The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.
Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.
Originality/value of the chapter
The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.
Information and communications technology (ICT) offers enormous opportunities for individuals, businesses and society. The application of ICT is equally important to economic and non-economic activities. Researchers have increasingly focused on the adoption and use of ICT by small and medium enterprises (SMEs) as the economic development of a country is largely dependent on them. Following the success of ICT utilisation in SMEs in developed countries, many developing countries are looking to utilise the potential of the technology to develop SMEs. Past studies have shown that the contribution of ICT to the performance of SMEs is not clear and certain. Thus, it is crucial to determine the effectiveness of ICT in generating firm performance since this has implications for SMEs’ expenditure on the technology. This research examines the diffusion of ICT among SMEs with respect to the typical stages from innovation adoption to post-adoption, by analysing the actual usage of ICT and value creation. The mediating effects of integration and utilisation on SME performance are also studied. Grounded in the innovation diffusion literature, institutional theory and resource-based theory, this study has developed a comprehensive integrated research model focused on the research objectives. Following a positivist research paradigm, this study employs a mixed-method research approach. A preliminary conceptual framework is developed through an extensive literature review and is refined by results from an in-depth field study. During the field study, a total of 11 SME owners or decision-makers were interviewed. The recorded interviews were transcribed and analysed using NVivo 10 to refine the model to develop the research hypotheses. The final research model is composed of 30 first-order and five higher-order constructs which involve both reflective and formative measures. Partial least squares-based structural equation modelling (PLS-SEM) is employed to test the theoretical model with a cross-sectional data set of 282 SMEs in Bangladesh. Survey data were collected using a structured questionnaire issued to SMEs selected by applying a stratified random sampling technique. The structural equation modelling utilises a two-step procedure of data analysis. Prior to estimating the structural model, the measurement model is examined for construct validity of the study variables (i.e. convergent and discriminant validity).
The estimates show cognitive evaluation as an important antecedent for expectation which is shaped primarily by the entrepreneurs’ beliefs (perception) and also influenced by the owners’ innovativeness and culture. Culture further influences expectation. The study finds that facilitating condition, environmental pressure and country readiness are important antecedents of expectation and ICT use. The results also reveal that integration and the degree of ICT utilisation significantly affect SMEs’ performance. Surprisingly, the findings do not reveal any significant impact of ICT usage on performance which apparently suggests the possibility of the ICT productivity paradox. However, the analysis finally proves the non-existence of the paradox by demonstrating the mediating role of ICT integration and degree of utilisation explain the influence of information technology (IT) usage on firm performance which is consistent with the resource-based theory. The results suggest that the use of ICT can enhance SMEs’ performance if the technology is integrated and properly utilised. SME owners or managers, interested stakeholders and policy makers may follow the study’s outcomes and focus on ICT integration and degree of utilisation with a view to attaining superior organisational performance.
This study urges concerned business enterprises and government to look at the environmental and cultural factors with a view to achieving ICT usage success in terms of enhanced firm performance. In particular, improving organisational practices and procedures by eliminating the traditional power distance inside organisations and implementing necessary rules and regulations are important actions for managing environmental and cultural uncertainties. The application of a Bengali user interface may help to ensure the productivity of ICT use by SMEs in Bangladesh. Establishing a favourable national technology infrastructure and legal environment may contribute positively to improving the overall situation. This study also suggests some changes and modifications in the country’s existing policies and strategies. The government and policy makers should undertake mass promotional programs to disseminate information about the various uses of computers and their contribution in developing better organisational performance. Organising specialised training programs for SME capacity building may succeed in attaining the motivation for SMEs to use ICT. Ensuring easy access to the technology by providing loans, grants and subsidies is important. Various stakeholders, partners and related organisations should come forward to support government policies and priorities in order to ensure the productive use of ICT among SMEs which finally will help to foster Bangladesh’s economic development.
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally…
The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.
The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.
In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.
The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.