Search results

1 – 10 of 120
Open Access
Article
Publication date: 11 February 2013

Kimberly L. D'Anna-Hernandez, Gary O. Zerbe, Sharon K. Hunter and Randal G. Ross

Understanding parental psychopathology interaction is important in preventing negative family outcomes. This study investigated the effect of paternal psychiatric history on…

425

Abstract

Understanding parental psychopathology interaction is important in preventing negative family outcomes. This study investigated the effect of paternal psychiatric history on maternal depressive symptom trajectory from birth to 12 months postpartum. Maternal Edinburgh Postpartum Depression screens were collected at 1, 6 and 12 months and fathers' psychiatric diagnoses were assessed with the Structured Clinical Interview for DSM-IV from 64 families. There was not a significant difference in the trajectory of maternal depressive symptoms between mothers with partners with history of or a current psychiatric condition or those without a condition. However, mothers with partners with substance abuse history had higher levels of depressive symptoms relative to those affected by mood/anxiety disorders or those without a disorder. Our results call for a closer look at paternal history of substance abuse when treating postpartum maternal depression.

Details

Mental Illness, vol. 5 no. 1
Type: Research Article
ISSN: 2036-7465

Keywords

Open Access
Article
Publication date: 26 July 2012

Rana Dadashova and Peter H. Silverstone

Atomoxetine has been approved for the treatment of attention deficit/hyperactivity disorder in both adults and children. However, it is also being examined for several off-label…

Abstract

Atomoxetine has been approved for the treatment of attention deficit/hyperactivity disorder in both adults and children. However, it is also being examined for several off-label uses in adults including mood disorders, eating disorders, cognitive dysfunction, and the treatment of addictions. Prior to such use it is important to examine the reported adverse events to see if this represents an appropriate level of risk. This is particularly important in the light of recent warnings from several regulatory bodies about an increase in blood pressure in a significant percentage of patients taking atomoxetine. To understand the risks a literature review was performed, and which identified the following potential problems. The first is that this drug should not be given in patients with known cardiovascular problems, and that all adult patients who receive atomoxetine should be monitored for changes in blood pressure throughout treatment. Secondly, there are several clinical situations in which atomoxetine should be closely monitored, or avoided, including patients who have a history or risk of narrow angle glaucoma, epileptic seizures, Tourette's syndrome, a history of urinary outflow obstruction, or who are pregnant or lactating. In conclusion, the current literature suggests that atomoxetine can be safely used off-label provided the above precautions are taken.

Details

Mental Illness, vol. 4 no. 2
Type: Research Article
ISSN: 2036-7465

Keywords

Open Access
Article
Publication date: 11 April 2023

Andrea Dubber, Constant Van Graan and Andre Groenewald

Previous research has indicated that trusts are used to commit various economic crimes, but limited studies examine the exact method of how trusts are abused. This paper aims to…

2109

Abstract

Purpose

Previous research has indicated that trusts are used to commit various economic crimes, but limited studies examine the exact method of how trusts are abused. This paper aims to determine how trusts are abused to conceal assets in insolvency and divorce proceedings. Apart from discussing how fraudulent trusts are evaluated by South African courts, two court cases will also be analysed to determine how trusts have been abused in the past to conceal assets in insolvency and divorce proceedings.

Design/methodology/approach

The methodology used is a literature study, predominantly using court cases and relevant statutes as the primary sources of information. The difference between a sham and alter ego trust is discussed, whereafter two court cases are dissected to identify how trusts have been abused to conceal assets.

Findings

The study found that trusts can be abused in different ways to conceal assets in insolvency and divorce proceedings. This can vary from the way the trust is established to the way the trust is used. But trusts are particularly susceptible to abuse when there is no separation between the ownership and enjoyment of trust assets, and the trust lacks independent trustees.

Originality/value

The research finding can be used to better understand how trusts are abused in divorce and insolvency proceedings.

Details

Journal of Financial Crime, vol. 31 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Book part
Publication date: 4 June 2021

Nicola Henry and Alice Witt

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we…

Abstract

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we examine the problem of image-based sexual abuse in the context of digital platform governance. Specifically, we focus on two key governance issues: first, the governance of platforms, including the regulatory frameworks that apply to technology companies; and second, the governance by platforms, focusing on their policies, tools, and practices for responding to image-based sexual abuse. After analyzing the policies and practices of a range of digital platforms, we identify four overarching shortcomings: (1) inconsistent, reductionist, and ambiguous language; (2) a stark gap between the policy and practice of content regulation, including transparency deficits; (3) imperfect technology for detecting abuse; and (4) the responsibilization of users to report and prevent abuse. Drawing on a model of corporate social responsibility (CSR), we argue that until platforms better address these problems, they risk failing victim-survivors of image-based sexual abuse and are implicated in the perpetration of such abuse. We conclude by calling for reasonable and proportionate state-based regulation that can help to better align governance by platforms with CSR-initiatives.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 6 March 2017

Kamil Omoteso and Hakeem Yusuf

The purpose of this paper is to contend that the dominant voluntarism approach to the accountability of transnational corporations (TNCs) is inadequate and not fit-for-purpose…

20442

Abstract

Purpose

The purpose of this paper is to contend that the dominant voluntarism approach to the accountability of transnational corporations (TNCs) is inadequate and not fit-for-purpose. The authors argue for the establishment of an international legal mechanism for securing the accountability of TNCs, particularly in the context of developing countries with notoriously weak governance mechanisms to protect all relevant stakeholders.

Design/methodology/approach

The study adopts insights from the fields of management and international law to draw out synergies from particular understandings of corporate governance, corporate social responsibility and international human rights. The challenges to governance in developing countries with regard to securing the accountability of TNCs are illustrated with the Nigerian experience of oil-industry legislation reform.

Findings

The specific context of the experiences of developing countries in Africa on the operations of TNCs particularly commends the need and expedience to create an international legal regime for ensuring the accountability of TNCs.

Originality/value

Mainstream research in this area has focused mainly on self and voluntary models of regulation and accountability that have privileged the legal fiction of the corporate status of TNCs. This paper departs from that model to argue for an enforceable model of TNC’s accountability – based on an international mechanism.

Details

critical perspectives on international business, vol. 13 no. 1
Type: Research Article
ISSN: 1742-2043

Keywords

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5130

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 1 January 2014

Priscilla A. Harries, Miranda L. Davies, Kenneth J. Gilhooly, Mary L.M. Gilhooly and Deborah Cairns

This paper reports on banking and finance professionals' decision making in the context of elder financial abuse. The aim was to identify the case features that influence when…

5905

Abstract

Purpose

This paper reports on banking and finance professionals' decision making in the context of elder financial abuse. The aim was to identify the case features that influence when abuse is identified and when action is taken.

Design/methodology/approach

Banking and finance professionals (n=70) were shown 35 financial abuse case scenarios and were asked to judge how certain they were that the older person was being abused and the likelihood of taking action.

Findings

Three case features significantly influenced certainty of financial abuse: the nature of the financial problem presented, the older person's level of mental capacity and who was in charge of the client's money. In cases where the older person was more confused and forgetful, there was increased suspicion that financial abuse was taking place. Finance professionals were less certain that financial abuse was occurring if the older person was in charge of his or her own finances.

Originality/value

The research findings have been used to develop freely available online training resources to promote professionals' decision making capacity (www.elderfinancialabuse.co.uk). The resources have been advocated for use by Building Societies Association as well as CIFAS, the UK's Fraud Prevention Service.

Details

Journal of Financial Crime, vol. 21 no. 1
Type: Research Article
ISSN: 1359-0790

Keywords

Open Access
Book part
Publication date: 30 April 2019

S. J. Oswald A. J. Mascarenhas

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of…

Abstract

Executive Summary

Rights and duties are involved in every area of business and markets, and society and governments. Most often, rights and duties involve serious ethical and moral issues of conflict. A good theory of the ethics of rights and duties, obligations, and responsibilities will empower us to understand the impact of our actions on various stakeholders. Additionally, a deep understanding of rights and duties could help us to analyze better the impact of our executive actions on various stakeholders and, in particular, to fathom the damaging effects of rights and duties violated by the man-made current financial crisis when seen from an ethical and moral point of view. Our coverage on the ethics of corporate rights and duties will comprise of two parts: Part 1: The Nature of Corporate Business Rights and Duties, and Part 2: Respecting Corporate Rights and Duties. The chapter will feature Newcomb Wellesley Hohfeld’s framework of legal interests such as claims, privileges, power, and immunity and its various applications to contemporary market and corporate executive situations. We illustrate the theory of rights and duties using several cases from the current turbulent markets.

Details

Corporate Ethics for Turbulent Markets
Type: Book
ISBN: 978-1-78756-192-2

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 9 June 2021

Fahad Alarifi

The purpose of the paper is to analyze the new Bankruptcy Law in Saudi Arabia (KSA Bankruptcy Law) under both a comparative lens and a policy-oriented one, while highlighting some…

3170

Abstract

Purpose

The purpose of the paper is to analyze the new Bankruptcy Law in Saudi Arabia (KSA Bankruptcy Law) under both a comparative lens and a policy-oriented one, while highlighting some of the most essential operational steps and procedures in a bankruptcy proceeding under the law.

Design/methodology/approach

The approach adopted analyzes the specific mechanics and procedures of a bankruptcy law under the general policies and goals of bankruptcy. Additionally, where appropriate, a brief comparison to the US Bankruptcy code and its provisions is presented to provide an alternative approach on how similar issues are handled under a reputable and proven bankruptcy system.

Findings

Overall, the KSA Bankruptcy Law is a major accomplishment and advancement to the Kingdom’s insolvency regime. The law consolidated and codified the laws governing bankruptcy under the Kingdom’s prior regime, and followed the structure of a modern bankruptcy regime. In doing so, several of the law’s policies and objectives have been fulfilled by providing an effective, predictable and reliable bankruptcy system.

Originality/value

Given the relatively recent adoption of the KSA Bankruptcy Law, the paper provides a comprehensive assessment of the law’s operation and its effectiveness in achieving its policy goals as a modern bankruptcy law.

Details

PSU Research Review, vol. 7 no. 3
Type: Research Article
ISSN: 2399-1747

Keywords

1 – 10 of 120