Search results

1 – 10 of over 204000
To view the access options for this content please click here
Article

Fletcher N. Baldwin

Begins with the Staff Report to the National Commission on Terrorist Attack on the United States, which indicates the methods used to trace, seize and freeze terrorist…

Abstract

Begins with the Staff Report to the National Commission on Terrorist Attack on the United States, which indicates the methods used to trace, seize and freeze terrorist assets, and the informal methods used by al‐Qaeda to transfer money. Questions the amount of progress made since September 11 to freeze funds. Focuses on encryption technology and how it allows illegal use of the Internet in the form of cyber laundering and e‐cash, and on the move by terrorists into narcotics production and trafficking ‐ which is defined as nacre‐terrorism. Describes efforts to proscribe cyber crime, including cyber laundering and cyber terrorism, including controls on privacy and encryption. Shows how business corporations can become involved with terrorism, including a case study on tanzanite.

Details

Journal of Money Laundering Control, vol. 8 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

To view the access options for this content please click here
Article

Yuhan Liu

Defines dumping as the sale of goods onto the market of an importing country at less than their normal value on the domestic market, and explains the economic rationale…

Abstract

Defines dumping as the sale of goods onto the market of an importing country at less than their normal value on the domestic market, and explains the economic rationale behind dumping. Reviews the origin of anti‐dumping laws, and the objectives of applying anti‐dumping duty legislation to non‐market economy countries, with reference to European Union (EU) anti‐dumping measures against China; the latter is still viewed as a non‐market economy. Indicates the impact of the EU anti‐dumping campaign on Chinese industries and legal strategies for challenging the EU anti‐dumping campaign. Concludes that the campaign is unfair and should now recognise the progress of economic reform in China, which since 2001 is a member of the World Trade Organization.

Details

Journal of Financial Crime, vol. 12 no. 3
Type: Research Article
ISSN: 1359-0790

Keywords

To view the access options for this content please click here

Abstract

Details

Modelling the Riskiness in Country Risk Ratings
Type: Book
ISBN: 978-0-44451-837-8

To view the access options for this content please click here
Article

Fletcher N. Baldwin

Argues in this wideranging paper that the legitimacy of international law depends on the principle that pacts should be respected, reviewing the issues of…

Abstract

Argues in this wideranging paper that the legitimacy of international law depends on the principle that pacts should be respected, reviewing the issues of self‐preservation, proportionality and human rights in relation to this. Focuses on the economic war against terrorism by the USA preeminently, as expressed in the PATRIOT Act and the International Emergency Economic Powers Act and the Anti‐Terrorism and Effective Death Penalty Act. Concludes that the Patriot Act and the Homeland Security Act give the Executive branch of government extraordinary and warlike powers: but wars have an end whereas terrorism does not. Looks at the role of the US Federal courts in the context of national security, proportionality and human rights concerns, and finds them deficient; reports specific cases concerning Iranian resistance movements and their status as regards terrorism, and the Bajkajian, Austin and Alexander cases as regards proportionality.

Details

Journal of Money Laundering Control, vol. 7 no. 3
Type: Research Article
ISSN: 1368-5201

Keywords

To view the access options for this content please click here
Article

Chein-Shan Liu and Jiang-Ren Chang

The purpose of this paper is to solve the second-order nonlinear boundary value problem with nonlinear boundary conditions by an iterative numerical method.

Abstract

Purpose

The purpose of this paper is to solve the second-order nonlinear boundary value problem with nonlinear boundary conditions by an iterative numerical method.

Design/methodology/approach

The authors introduce eigenfunctions as test functions, such that a weak-form integral equation is derived. By expanding the numerical solution in terms of the weighted eigenfunctions and using the orthogonality of eigenfunctions with respect to a weight function, and together with the non-separated/mixed boundary conditions, one can obtain the closed-form expansion coefficients with the aid of Drazin inversion formula.

Findings

When the authors develop the iterative algorithm, removing the time-varying terms as well as the nonlinear terms to the right-hand sides, to solve the nonlinear boundary value problem, it is convergent very fast and also provides very accurate numerical solutions.

Research limitations/implications

Basically, the authors’ strategy for the iterative numerical algorithm is putting the time-varying terms as well as the nonlinear terms on the right-hand sides.

Practical implications

Starting from an initial guess with zero value, the authors used the closed-form formula to quickly generate the new solution, until the convergence is satisfied.

Originality/value

Through the tests by six numerical experiments, the authors have demonstrated that the proposed iterative algorithm is applicable to the highly complex nonlinear boundary value problems with nonlinear boundary conditions. Because the coefficient matrix is set up outside the iterative loop, and due to the property of closed-form expansion coefficients, the presented iterative algorithm is very time saving and converges very fast.

To view the access options for this content please click here
Article

Angela Veng Mei Leong

Discusses the relationship between organized crime and terrorism; this is an important area of research in the development of legal and other means for control both of…

Abstract

Discusses the relationship between organized crime and terrorism; this is an important area of research in the development of legal and other means for control both of them. Analyses paradigms of organized crime: as nationwide conspiracy, as an avenue for upward social mobility of disadvantaged ethnic groups, and as state‐organised crime or white‐collar crime. Proposes the view that in fact organisations like the Mafia should be regarded as “disorganised crime”. Explains various theories about the nature of terrorism: the instrumental approach, organisational process theory, world system theory, and military theory. Concludes that the distinction between organised crime and terrorism is less clear, since terrorists use the methods of organised crime in order to fund their activities, while organised crime groups often resemble cellular terrorist structures.

Details

Journal of Money Laundering Control, vol. 8 no. 1
Type: Research Article
ISSN: 1368-5201

Keywords

To view the access options for this content please click here
Article

Brian Day

When in‐plant and college‐based courses are run for supervisors and managers, it is conventional to use a U‐shaped seating arrangement in the training room to promote…

Abstract

When in‐plant and college‐based courses are run for supervisors and managers, it is conventional to use a U‐shaped seating arrangement in the training room to promote participation and discussion. However, at each class session, people will tend to sit with the same companions habitually, which may be more comfortable, but less productive than if they sat with different people each time.

Details

Industrial and Commercial Training, vol. 18 no. 1
Type: Research Article
ISSN: 0019-7858

To view the access options for this content please click here
Article

D.E. Clippinger and G.J. Morris

THE use of liquid oxygen as an oxidizer for various fuels in liquid rocket propellent systems is not new. Professor Goddard used liquid oxygen in his rocket experiments…

Abstract

THE use of liquid oxygen as an oxidizer for various fuels in liquid rocket propellent systems is not new. Professor Goddard used liquid oxygen in his rocket experiments and the well known German V‐2 rockets used this material as an oxidizer. However, its effect on non‐metallic materials ordinarily used in rocket systems was not investigated until recent years. This investigation was prompted by phenomena which had been experienced by rocket engine and rocket aircraft manufacturers and by suppliers of the material. It was observed that when some organic materials came in intimate contact with liquid oxygen they became prone to detonation when subjected to certain impact energies. This was undoubtedly due to the formation of unstable organo‐peroxide compounds which when impacted released high levels of energy resulting in an explosion. Specifically, when liquid oxygen was accidently spilled on asphalt and inadvertently stepped on, the asphalt would often explode. Also, leather gaskets immersed in liquid oxygen and subjected to surge impact detonated with disastrous effects.

Details

Aircraft Engineering and Aerospace Technology, vol. 31 no. 7
Type: Research Article
ISSN: 0002-2667

Content available
Article

Adrian Magdaş

The purpose of this paper is to study the coupled fixed point problem and the coupled best proximity problem for single-valued and multi-valued contraction type operators…

Abstract

The purpose of this paper is to study the coupled fixed point problem and the coupled best proximity problem for single-valued and multi-valued contraction type operators defined on cyclic representations of the space. The approach is based on fixed point results for appropriate operators generated by the initial problems.

To view the access options for this content please click here
Article

It has often been said that a great part of the strength of Aslib lies in the fact that it brings together those whose experience has been gained in many widely differing…

Abstract

It has often been said that a great part of the strength of Aslib lies in the fact that it brings together those whose experience has been gained in many widely differing fields but who have a common interest in the means by which information may be collected and disseminated to the greatest advantage. Lists of its members have, therefore, a more than ordinary value since they present, in miniature, a cross‐section of institutions and individuals who share this special interest.

Details

Aslib Proceedings, vol. 1 no. 4
Type: Research Article
ISSN: 0001-253X

1 – 10 of over 204000